full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_17_51.ps1
sample_17_51.ps1
# # Module manifest for module 'OCI.PSModules.Vnmonitoring' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vnmonitoring.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ca53b640-70c1-4d8a-a7c2-5fbd89718e19' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vnmonitoring Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vnmonitoring.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVnmonitoringPathAnalysis', 'Get-OCIVnmonitoringPathAnalyzerTest', 'Get-OCIVnmonitoringPathAnalyzerTestsList', 'Get-OCIVnmonitoringWorkRequest', 'Get-OCIVnmonitoringWorkRequestErrorsList', 'Get-OCIVnmonitoringWorkRequestLogsList', 'Get-OCIVnmonitoringWorkRequestResultsList', 'Get-OCIVnmonitoringWorkRequestsList', 'Move-OCIVnmonitoringPathAnalyzerTestCompartment', 'New-OCIVnmonitoringPathAnalyzerTest', 'Remove-OCIVnmonitoringPathAnalyzerTest', 'Update-OCIVnmonitoringPathAnalyzerTest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vnmonitoring' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_55_98.ps1
sample_55_98.ps1
# # Module manifest for module 'OCI.PSModules.Filestorage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Filestorage.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '85a998bb-f613-464a-af19-f5aaed2d127b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Filestorage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Filestorage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIFilestorageKeyTabs', 'Get-OCIFilestorageExport', 'Get-OCIFilestorageExportSet', 'Get-OCIFilestorageExportSetsList', 'Get-OCIFilestorageExportsList', 'Get-OCIFilestorageFileSystem', 'Get-OCIFilestorageFileSystemsList', 'Get-OCIFilestorageFilesystemSnapshotPoliciesList', 'Get-OCIFilestorageFilesystemSnapshotPolicy', 'Get-OCIFilestorageMountTarget', 'Get-OCIFilestorageMountTargetsList', 'Get-OCIFilestorageOutboundConnector', 'Get-OCIFilestorageOutboundConnectorsList', 'Get-OCIFilestorageReplication', 'Get-OCIFilestorageReplicationsList', 'Get-OCIFilestorageReplicationTarget', 'Get-OCIFilestorageReplicationTargetsList', 'Get-OCIFilestorageSnapshot', 'Get-OCIFilestorageSnapshotsList', 'Invoke-OCIFilestorageEstimateReplication', 'Invoke-OCIFilestoragePauseFilesystemSnapshotPolicy', 'Invoke-OCIFilestorageUnpauseFilesystemSnapshotPolicy', 'Move-OCIFilestorageFileSystemCompartment', 'Move-OCIFilestorageFilesystemSnapshotPolicyCompartment', 'Move-OCIFilestorageMountTargetCompartment', 'Move-OCIFilestorageOutboundConnectorCompartment', 'Move-OCIFilestorageReplicationCompartment', 'New-OCIFilestorageExport', 'New-OCIFilestorageFileSystem', 'New-OCIFilestorageFilesystemSnapshotPolicy', 'New-OCIFilestorageMountTarget', 'New-OCIFilestorageOutboundConnector', 'New-OCIFilestorageReplication', 'New-OCIFilestorageSnapshot', 'Remove-OCIFilestorageExport', 'Remove-OCIFilestorageFileSystem', 'Remove-OCIFilestorageFilesystemSnapshotPolicy', 'Remove-OCIFilestorageMountTarget', 'Remove-OCIFilestorageOutboundConnector', 'Remove-OCIFilestorageReplication', 'Remove-OCIFilestorageReplicationTarget', 'Remove-OCIFilestorageSnapshot', 'Update-OCIFilestorageExport', 'Update-OCIFilestorageExportSet', 'Update-OCIFilestorageFileSystem', 'Update-OCIFilestorageFilesystemSnapshotPolicy', 'Update-OCIFilestorageMountTarget', 'Update-OCIFilestorageOutboundConnector', 'Update-OCIFilestorageReplication', 'Update-OCIFilestorageSnapshot' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Filestorage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/vmrc remote connector.ps1
vmrc remote connector.ps1
#region Global var $script:viserver = "esx.local" $script:vmrc = "C:\\Program Files\\VMwareVMRC\\vmware-vmrc.exe" $script:vm = "" $script:vmt = "" $script:vmcon = "" $script:selectvm = "" $script:multiple = $FALSE #Set to TRUE for multiple VMRC Instances #endregion $vmcon = Connect-VIServer -Server $script:viserver -Protocol https -Credential (Get-Credential) if (!$vmcon) { Write-Output "No Connection!" break } $script:vmt = Get-VM function GenerateForm { #region Import the Assembles [reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null [reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null #endregion #region Generated Form Objects $form1 = New-Object System.Windows.Forms.Form $btnConnect = New-Object System.Windows.Forms.Button $txtEntity = New-Object System.Windows.Forms.TextBox $chkIP = New-Object System.Windows.Forms.CheckBox $comboBox1 = New-Object System.Windows.Forms.ComboBox #endregion Generated Form Objects $btnConnect_OnClick= { #region Check User Inputs if (!$txtEntity.Text -eq "" -and !$comboBox1.Text -eq "") { Write-Host "Bitte nur eine Option anwählen!" break } #endregion if ($txtEntity.Text -eq "") { $script:selectvm = $comboBox1.Text } else { $script:selectvm = $txtEntity.Text } if ($chkIP.Checked) { $script:chk = "FALSE" foreach ($script:vm in $script:vmt) { $vmg = Get-VMGuest $script:vm if ($vmg.IPAddress -eq $script:selectvm) { $script:chk = "" break } } } If (!$script:selectvm -eq "" -and !$chkIP.Checked) { $script:vm = Get-VM $script:selectvm if($script:vm.Count) { Write-Output "Define only one host!" break } else { if (!$script:vm.id) { Write-Output "No VM found" $script:chk = "FALSE"; break } } } if (!$script:chk) { if (!$script:vm -eq "") { if (!($script:gvm = Get-View $script:vm.id) -eq "") { if (($multiple) -or (!($multiple) -and $script:gvm.Runtime.NumMksConnections -lt 1)) { $vmrcargs = '-h ' + $script:vm.Host + ' -m "' + $script:gvm.Config.Files.VmPathName + '"' [Diagnostics.Process]::Start($script:vmrc, $vmrcargs) } } } } } #---------------------------------------------- #region Generated Form Code $form1.Text = 'VMware Remote Connector' $form1.Name = 'form1' $form1.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 193 $System_Drawing_Size.Width = 281 $form1.ClientSize = $System_Drawing_Size $form1.FormBorderStyle = 1 $btnConnect.TabIndex = 2 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 75 $btnConnect.Size = $System_Drawing_Size $btnConnect.Name = 'btnConnect' $btnConnect.UseVisualStyleBackColor = $True $btnConnect.Text = 'Verbinden' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 97 $System_Drawing_Point.Y = 115 $btnConnect.Location = $System_Drawing_Point $btnConnect.DataBindings.DefaultDataSourceUpdateMode = 0 $btnConnect.add_Click($btnConnect_OnClick) $form1.Controls.Add($btnConnect) $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 12 $System_Drawing_Point.Y = 17 $txtEntity.Location = $System_Drawing_Point $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 20 $System_Drawing_Size.Width = 261 $txtEntity.Size = $System_Drawing_Size $txtEntity.DataBindings.DefaultDataSourceUpdateMode = 0 $txtEntity.Name = 'txtEntity' $txtEntity.TabIndex = 1 $form1.Controls.Add($txtEntity) $chkIP.TabIndex = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 19 $System_Drawing_Size.Width = 160 $chkIP.Size = $System_Drawing_Size $chkIP.Name = 'chkIP' $chkIP.UseVisualStyleBackColor = $True $chkIP.Text = 'IP Adresse' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 12 $System_Drawing_Point.Y = 43 $chkIP.Location = $System_Drawing_Point $chkIP.DataBindings.DefaultDataSourceUpdateMode = 0 $form1.Controls.Add($chkIP) $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 12 $System_Drawing_Point.Y = 73 $comboBox1.Location = $System_Drawing_Point $comboBox1.DataBindings.DefaultDataSourceUpdateMode = 0 $comboBox1.FormattingEnabled = $True $comboBox1.Name = 'comboBox1' $comboBox1.TabIndex = 0 #Get all VM foreach ($cvm in $script:vmt) { $comboBox1.Items.Add($cvm.Name) | Out-Null } $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 20 $System_Drawing_Size.Width = 261 $comboBox1.Size = $System_Drawing_Size $form1.Controls.Add($comboBox1) #endregion Generated Form Code #Show the Form $form1.ShowDialog()| Out-Null } GenerateForm
combined_dataset/train/non-malicious/sample_57_39.ps1
sample_57_39.ps1
# # Module manifest for module 'OCI.PSModules.Queue' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Queue.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2c5d60ce-a44b-46ce-97f7-351848bec841' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Queue Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Queue.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIQueue', 'Get-OCIQueueChannelsList', 'Get-OCIQueueMessages', 'Get-OCIQueuesList', 'Get-OCIQueueStats', 'Get-OCIQueueWorkRequest', 'Get-OCIQueueWorkRequestErrorsList', 'Get-OCIQueueWorkRequestLogsList', 'Get-OCIQueueWorkRequestsList', 'Invoke-OCIQueuePurgeQueue', 'Move-OCIQueueCompartment', 'New-OCIQueue', 'Remove-OCIQueue', 'Remove-OCIQueueMessage', 'Remove-OCIQueueMessages', 'Update-OCIQueue', 'Update-OCIQueueMessage', 'Update-OCIQueueMessages', 'Write-OCIQueueMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Queue' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4a37ac19-31f0-4d25-80a3-98a05980e63e.ps1
4a37ac19-31f0-4d25-80a3-98a05980e63e.ps1
#requires -version 2.0\nAdd-Type @"\npublic class Shift {\n public static int Right(int x, int count) { return x >> count; }\n public static uint Right(uint x, int count) { return x >> count; }\n public static long Right(long x, int count) { return x >> count; }\n public static ulong Right(ulong x, int count) { return x >> count; }\n public static int Left(int x, int count) { return x << count; }\n public static uint Left(uint x, int count) { return x << count; }\n public static long Left(long x, int count) { return x << count; }\n public static ulong Left(ulong x, int count) { return x << count; }\n} \n"@\n\n\n\n#.Example \n# Shift-Left 16 1 ## returns 32\n#.Example \n# 8,16 |Shift-Left ## returns 16,32\nfunction Shift-Left {\nPARAM( $x=1, $y )\nBEGIN {\n if($y) {\n [Shift]::Left( $x, $y )\n }\n}\nPROCESS {\n if($_){\n [Shift]::Left($_, $x)\n }\n}\n}\n\n\n#.Example \n# Shift-Right 8 1 ## returns 4\n#.Example \n# 2,4,8 |Shift-Right 2 ## returns 0,1,2\nfunction Shift-Right {\nPARAM( $x=1, $y )\nBEGIN {\n if($y) {\n [Shift]::Right( $x, $y )\n }\n}\nPROCESS {\n if($_){\n [Shift]::Right($_, $x)\n }\n}\n}function Write-FileByte {\n################################################################\n#.Synopsis\n#  Overwrites or creates a file with an array of raw bytes.\n#.Parameter ByteArray\n#  System.Byte[] array of bytes to put into the file.  If you\n#  pipe this array in, you must pipe the [Ref] to the array.\n#.Parameter Path\n#  Path to the file as a string or as System.IO.FileInfo object.\n#  Path as a string can be relative, absolute, or a simple file\n#  name if the file is in the present working directory.\n#.Example\n#  write-filebyte -bytearray $bytes -path outfile.bin\n#.Example\n#  [Ref] $bytes | write-filebyte -path c:\\temp\\outfile.bin\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [System.Byte[]] $ByteArray,\n [Parameter(Mandatory = $True)] $Path\n)\n\nif ($Path -is [System.IO.FileInfo])\n { $Path = $Path.FullName }\nelseif ($Path -notlike "*\\*") #Simple file name.\n { $Path = "$pwd" + "\\" + "$Path" }\nelseif ($Path -like ".\\*")  #pwd of script\n { $Path = $Path -replace "^\\.",$pwd.Path }\nelseif ($Path -like "..\\*") #parent directory of pwd of script\n { $Path = $Path -replace "^\\.\\.",$(get-item $pwd).Parent.FullName }\nelse\n { throw "Cannot resolve path!" }\n[System.IO.File]::WriteAllBytes($Path, $ByteArray)\n}\nfunction Convert-HexStringToByteArray {\n################################################################\n#.Synopsis\n#  Convert a string of hex data into a System.Byte[] array. An\n#  array is always returned, even if it contains only one byte.\n#.Parameter String\n#  A string containing hex data in any of a variety of formats,\n#  including strings like the following, with or without extra\n#  tabs, spaces, quotes or other non-hex characters:\n#     0x41,0x42,0x43,0x44\n#     \\x41\\x42\\x43\\x44\n#     41-42-43-44\n#     41424344\n#  The string can be piped into the function too.\n################################################################\n[CmdletBinding()]\nParam ( [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [String] $String )\n\n#Clean out whitespaces and any other non-hex crud.\n$String = $String.ToLower() -replace '[^a-f0-9\\\\\\,x\\-\\:]',''\n\n#Try to put into canonical colon-delimited format.\n$String = $String -replace '0x|\\\\x|\\-|,',':'\n\n#Remove beginning and ending colons, and other detritus.\n$String = $String -replace '^:+|:+$|x|\\\\',''\n\n#Maybe there's nothing left over to convert...\nif ($String.Length -eq 0) { ,@() ; return } \n\n#Split string with or without colon delimiters.\nif ($String.Length -eq 1)\n{ ,@([System.Convert]::ToByte($String,16)) }\nelseif (($String.Length % 2 -eq 0) -and ($String.IndexOf(":") -eq -1))\n{ ,@($String -split '([a-f0-9]{2})' | foreach-object { if ($_) {[System.Convert]::ToByte($_,16)}}) }\nelseif ($String.IndexOf(":") -ne -1)\n{ ,@($String -split ':+' | foreach-object {[System.Convert]::ToByte($_,16)}) }\nelse\n{ ,@() }\n#The strange ",@(...)" syntax is needed to force the output into an\n#array even if there is only one element in the output (or none).\n}\nfunction Convert-ByteArrayToHexString {\n################################################################\n#.Synopsis\n#  Returns a hex representation of a System.Byte[] array as\n#  one or more strings.  Hex format can be changed.\n#.Parameter ByteArray\n#  System.Byte[] array of bytes to put into the file.  If you\n#  pipe this array in, you must pipe the [Ref] to the array.\n#  Also accepts a single Byte object instead of Byte[].\n#.Parameter Width\n#  Number of hex characters per line of output.\n#.Parameter Delimiter\n#  How each pair of hex characters (each byte of input) will be\n#  delimited from the next pair in the output.  The default\n#  looks like "0x41,0xFF,0xB9" but you could specify "\\x" if\n#  you want the output like "\\x41\\xFF\\xB9" instead.  You do\n#  not have to worry about an extra comma, semicolon, colon\n#  or tab appearing before each line of output.  The default\n#  value is ",0x".\n#.Parameter Prepend\n#  An optional string you can prepend to each line of hex\n#  output, perhaps like '$x += ' to paste into another\n#  script, hence the single quotes.\n#.Parameter AddQuotes\n#  An switch which will enclose each line in double-quotes.\n#.Example\n#  [Byte[]] $x = 0x41,0x42,0x43,0x44\n#  Convert-ByteArrayToHexString $x\n#\n#  0x41,0x42,0x43,0x44\n#.Example\n#  [Byte[]] $x = 0x41,0x42,0x43,0x44\n#  Convert-ByteArrayToHexString $x -width 2 -delimiter "\\x" -addquotes\n#\n#  "\\x41\\x42"\n#  "\\x43\\x44"\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [System.Byte[]] $ByteArray,\n [Parameter()] [Int] $Width = 10,\n [Parameter()] [String] $Delimiter = ",0x",\n [Parameter()] [String] $Prepend = "",\n [Parameter()] [Switch] $AddQuotes\n)\n\nif ($Width -lt 1) { $Width = 1 }\nif ($ByteArray.Length -eq 0) { Return }\n$FirstDelimiter = $Delimiter -Replace "^[\\,\\;\\:\\t]",""\n$From = 0\n$To = $Width - 1\nDo\n{\n $String = [System.BitConverter]::ToString($ByteArray[$From..$To])\n $String = $FirstDelimiter + ($String -replace "\\-",$Delimiter)\n if ($AddQuotes) { $String = '"' + $String + '"' }\n if ($Prepend -ne "") { $String = $Prepend + $String }\n $String\n $From += $Width\n $To += $Width\n} While ($From -lt $ByteArray.Length)\n}\nfunction Convert-ByteArrayToString {\n################################################################\n#.Synopsis\n#  Returns the string representation of a System.Byte[] array.\n#  ASCII string is the default, but Unicode, UTF7, UTF8 and\n#  UTF32 are available too.\n#.Parameter ByteArray\n#  System.Byte[] array of bytes to put into the file.  If you\n#  pipe this array in, you must pipe the [Ref] to the array.\n#  Also accepts a single Byte object instead of Byte[].\n#.Parameter Encoding\n#  Encoding of the string: ASCII, Unicode, UTF7, UTF8 or UTF32.\n#  ASCII is the default.\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [System.Byte[]] $ByteArray,\n [Parameter()] [String] $Encoding = "ASCII"\n)\n\nswitch ( $Encoding.ToUpper() )\n{\n "ASCII"   { $EncodingType = "System.Text.ASCIIEncoding" }\n "UNICODE" { $EncodingType = "System.Text.UnicodeEncoding" }\n "UTF7"    { $EncodingType = "System.Text.UTF7Encoding" }\n "UTF8"    { $EncodingType = "System.Text.UTF8Encoding" }\n "UTF32"   { $EncodingType = "System.Text.UTF32Encoding" }\n Default   { $EncodingType = "System.Text.ASCIIEncoding" }\n}\n$Encode = new-object $EncodingType\n$Encode.GetString($ByteArray)\n}\nfunction Get-FileHex {\n################################################################\n#.Synopsis\n#  Display the hex dump of a file.\n#.Parameter Path\n#  Path to file as a string or as a System.IO.FileInfo object;\n#  object can be piped into the function, string cannot.\n#.Parameter Width\n#  Number of hex bytes shown per line (default = 16).\n#.Parameter Count\n#  Number of bytes in the file to process (default = all).\n#.Parameter NoOffset\n#  Switch to suppress offset line numbers in output.\n#.Parameter NoText\n#  Switch to suppress ASCII translation of bytes in output.\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]\n [Alias("FullName","FilePath")] $Path,\n [Parameter()] [Int] $Width = 16,\n [Parameter()] [Int] $Count = -1,\n [Parameter()] [Switch] $NoOffset,\n [Parameter()] [Switch] $NoText\n)\n\n$linecounter = 0        # Offset from beginning of file in hex.\n$placeholder = "."      # What to print when byte is not a letter or digit.\n\nget-content $path -encoding byte -readcount $width -totalcount $count |\nforeach-object {\n $paddedhex = $asciitext = $null\n $bytes = $_        # Array of [Byte] objects that is $width items in length.\n\n foreach ($byte in $bytes) {\n $byteinhex = [String]::Format("{0:X}", $byte)     # Convert byte to hex, e.g., "F".\n $paddedhex += $byteinhex.PadLeft(2,"0") + " "     # Pad with zero to force 2-digit length, e.g., "0F ".\n } \n\n # Total bytes in file unlikely to be evenly divisible by $width, so fix last line.\n # Hex output width is '$width * 3' because of the extra spaces added around hex characters.\n if ($paddedhex.length -lt $width * 3)\n { $paddedhex = $paddedhex.PadRight($width * 3," ") }\n\n foreach ($byte in $bytes) {\n if ( [Char]::IsLetterOrDigit($byte) -or\n [Char]::IsPunctuation($byte) -or\n [Char]::IsSymbol($byte) )\n { $asciitext += [Char] $byte }\n else\n { $asciitext += $placeholder }\n }\n\n $offsettext = [String]::Format("{0:X}", $linecounter) # Linecounter in hex too.\n $offsettext = $offsettext.PadLeft(8,"0") + "h:"       # Pad linecounter with left zeros.\n $linecounter += $width                                # Increment linecounter, each line representing $width bytes.\n\n if (-not $NoOffset) { $paddedhex = "$offsettext $paddedhex" }\n if (-not $NoText) { $paddedhex = $paddedhex + $asciitext }\n $paddedhex\n}\n}\nfunction Toggle-Endian {\n################################################################\n#.Synopsis\n#  Swaps the ordering of bytes in an array where each swappable\n#  unit can be one or more bytes, and, if more than one, the\n#  ordering of the bytes within that unit is NOT swapped. Can\n#  be used to toggle between little- and big-endian formats.\n#  Cannot be used to swap nibbles or bits within a single byte.\n#.Parameter ByteArray\n#  System.Byte[] array of bytes to be rearranged.  If you\n#  pipe this array in, you must pipe the [Ref] to the array, but\n#  a new array will be returned (originally array untouched).\n#.Parameter SubWidthInBytes\n#  Defaults to 1 byte.  Defines the number of bytes in each unit\n#  (or atomic element) which is swapped, but no swapping occurs\n#  within that unit.  The number of bytes in the ByteArray must\n#  be evenly divisible by SubWidthInBytes.\n#.Example\n#  $bytearray = toggle-endian $bytearray\n#.Example\n#  [Ref] $bytearray | toggle-endian -SubWidthInBytes 2\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [System.Byte[]] $ByteArray,\n [Parameter()] [Int] $SubWidthInBytes = 1\n)\n\nif ($ByteArray.count -eq 1 -or $ByteArray.count -eq 0) { $ByteArray ; return } \n\nif ($SubWidthInBytes -eq 1) { [System.Array]::Reverse($ByteArray); $ByteArray ; return } \n\nif ($ByteArray.count % $SubWidthInBytes -ne 0)\n{ throw "ByteArray size must be an even multiple of SubWidthInBytes!" ; return }  \n\n$newarray = new-object System.Byte[] $ByteArray.count \n\n# $i tracks ByteArray from head, $j tracks NewArray from end.\nfor ($($i = 0; $j = $newarray.count - 1) ;\n $i -lt $ByteArray.count ;\n $($i += $SubWidthInBytes; $j -= $SubWidthInBytes))\n{\n for ($k = 0 ; $k -lt $SubWidthInBytes ; $k++)\n { $newarray[$j - ($SubWidthInBytes - 1) + $k] = $ByteArray[$i + $k] }\n}\n$newarray\n}\nfunction PushToTcpPort\n{\n param ([Byte[]] $bytearray, [String] $ipaddress, [Int32] $port)\n $tcpclient = new-object System.Net.Sockets.TcpClient($ipaddress, $port) -ErrorAction "SilentlyContinue"\n trap { "Failed to connect to $ipaddress`:$port" ; return }\n $networkstream = $tcpclient.getstream()\n #write(payload,starting offset,number of bytes to send)\n $networkstream.write($bytearray,0,$bytearray.length)\n $networkstream.close(1) #Wait 1 second before closing TCP session.\n $tcpclient.close()\n}\n
combined_dataset/train/non-malicious/3409.ps1
3409.ps1
$rgname = "webappsslbindingrb" $appname = "webappsslbindingtest" $slot = "testslot" $prodHostname = "www.webappsslbindingtests.com" $slotHostname = "testslot.webappsslbindingtests.com" $thumbprint = "40D6600B0B8740C41BA4B3D13B967DDEF6ED1918" function Test-CreateNewWebAppSSLBinding { try { $createResult = New-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname -Thumbprint $thumbprint Assert-AreEqual $prodHostname $createResult.Name $createResult = New-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostname -Thumbprint $thumbprint Assert-AreEqual $slotHostname $createResult.Name } finally { Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname -Force Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostname -Force } } function Test-GetNewWebAppSSLBinding { try { $createWebAppResult = New-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname -Thumbprint $thumbprint $createWebAppSlotResult = New-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostname -Thumbprint $thumbprint $getResult = Get-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname Assert-AreEqual 2 $getResult.Count $currentHostNames = $getResult | Select -expand Name Assert-True { $currentHostNames -contains $createWebAppResult.Name } $getResult = Get-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname Assert-AreEqual $getResult.Name $createWebAppResult.Name $getResult = Get-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot Assert-AreEqual 1 $getResult.Count $currentHostNames = $getResult | Select -expand Name Assert-True { $currentHostNames -contains $createWebAppSlotResult.Name } $getResult = Get-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostname Assert-AreEqual $getResult.Name $createWebAppSlotResult.Name } finally { Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname -Force Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostname -Force } } function Test-RemoveNewWebAppSSLBinding { try { New-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname -Thumbprint $thumbprint New-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostname -Thumbprint $thumbprint Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname -Force Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostname -Force $res = Get-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname $currentHostNames = $res | Select -expand Name Assert-False { $currentHostNames -contains $prodHostname } $res = Get-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot $currentHostNames = $res | Select -expand Name Assert-False { $currentHostNames -contains $slotHostName } } finally { Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname -Force Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostname -Force } } function Test-WebAppSSLBindingPipeSupport { try { $webapp = Get-AzureRMWebApp -ResourceGroupName $rgname -Name $appname $webappslot = Get-AzureRMWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot $createResult = $webapp | New-AzureRMWebAppSSLBinding -Name $prodHostName -Thumbprint $thumbprint Assert-AreEqual $prodHostName $createResult.Name $createResult = $webappslot | New-AzureRMWebAppSSLBinding -Name $slotHostName -Thumbprint $thumbprint Assert-AreEqual $slotHostName $createResult.Name $getResult = $webapp | Get-AzureRMWebAppSSLBinding Assert-AreEqual 2 $getResult.Count $getResult = $webappslot | Get-AzureRMWebAppSSLBinding Assert-AreEqual 1 $getResult.Count $webapp | Remove-AzureRMWebAppSSLBinding -Name $prodHostName -Force $res = $webapp | Get-AzureRMWebAppSSLBinding $currentHostNames = $res | Select -expand Name Assert-False { $currentHostNames -contains $prodHostName } $webappslot | Remove-AzureRMWebAppSSLBinding -Name $slotHostName -Force $res = $webappslot | Get-AzureRMWebAppSSLBinding $currentHostNames = $res | Select -expand Name Assert-False { $currentHostNames -contains $slotHostName } } finally { Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostName -Force Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Slot $slot -Name $slotHostName -Force } } function Test-GetWebAppCertificate { try { New-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostname -Thumbprint $thumbprint $certificates = Get-AzureRMWebAppCertificate $thumbprints = $certificates | Select -expand Thumbprint Assert-True { $thumbprints -contains $thumbprint } $certificate = Get-AzureRMWebAppCertificate -Thumbprint $thumbprint Assert-AreEqual $thumbprint $certificate.Thumbprint } finally { Remove-AzureRMWebAppSSLBinding -ResourceGroupName $rgname -WebAppName $appname -Name $prodHostName -Force } }
combined_dataset/train/non-malicious/1158.ps1
1158.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldResolveBuiltinIdentity { $identity = Resolve-IdentityName -Name 'Administrators' Assert-Equal 'BUILTIN\Administrators' $identity } function Test-ShouldResolveNTAuthorityIdentity { $identity = Resolve-IdentityName -Name 'NetworkService' Assert-Equal 'NT AUTHORITY\NETWORK SERVICE' $identity } function Test-ShouldResolveEveryone { $identity = Resolve-IdentityName -Name 'Everyone' Assert-Equal 'Everyone' $identity } function Test-ShouldNotResolveMadeUpName { $fullName = Resolve-IdentityName -Name 'IDONotExist' Assert-NoError Assert-Null $fullName } function Test-ShouldResolveLocalSystem { Assert-Equal 'NT AUTHORITY\SYSTEM' (Resolve-IdentityName -Name 'localsystem') } function Test-ShouldResolveDotAccounts { foreach( $user in (Get-User) ) { $id = Resolve-IdentityName -Name ('.\{0}' -f $user.SamAccountName) Assert-Equal ('{0}\{1}' -f $env:COMPUTERNAME,$user.SamAccountName) $id } } function Test-ShouldResolveBySid { $id = Resolve-Identity -Name 'Administrators' Assert-NotNull $id $id = Resolve-IdentityName -Sid $id.Sid.ToString() Assert-Equal 'BUILTIN\Administrators' $id } function Test-ShouldResolveByUnknownSid { $id = Resolve-IdentityName -SID 'S-1-5-21-2678556459-1010642102-471947008-1017' Assert-Equal $id 'S-1-5-21-2678556459-1010642102-471947008-1017' Assert-NoError }
combined_dataset/train/non-malicious/Get-FileEncoding_6.ps1
Get-FileEncoding_6.ps1
<# .SYNOPSIS Gets file encoding. .DESCRIPTION The Get-FileEncoding function determines encoding by looking at Byte Order Mark (BOM). Based on port of C# code from http://www.west-wind.com/Weblog/posts/197245.aspx .EXAMPLE Get-ChildItem *.ps1 | select FullName, @{n='Encoding';e={Get-FileEncoding $_.FullName}} | where {$_.Encoding -ne 'ASCII'} This command gets ps1 files in current directory where encoding is not ASCII .EXAMPLE Get-ChildItem *.ps1 | select FullName, @{n='Encoding';e={Get-FileEncoding $_.FullName}} | where {$_.Encoding -ne 'ASCII'} | foreach {(get-content $_.FullName) | set-content $_.FullName -Encoding ASCII} Same as previous example but fixes encoding using set-content #> function Get-FileEncoding { [CmdletBinding()] Param ( [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [string]$Path ) [byte[]]$byte = get-content -Encoding byte -ReadCount 4 -TotalCount 4 -Path $Path if ( $byte[0] -eq 0xef -and $byte[1] -eq 0xbb -and $byte[2] -eq 0xbf ) { Write-Output 'UTF8' } elseif ($byte[0] -eq 0xfe -and $byte[1] -eq 0xff) { Write-Output 'Unicode' } elseif ($byte[0] -eq 0 -and $byte[1] -eq 0 -and $byte[2] -eq 0xfe -and $byte[3] -eq 0xff) { Write-Output 'UTF32' } elseif ($byte[0] -eq 0x2b -and $byte[1] -eq 0x2f -and $byte[2] -eq 0x76) { Write-Output 'UTF7'} else { Write-Output 'ASCII' } }
combined_dataset/train/non-malicious/sample_41_85.ps1
sample_41_85.ps1
########################################################### # # # Copyright (C) Microsoft. All rights reserved. # # # ########################################################### Write-Host "This script will create a zip file of diagnostic logs for Azure Monitor Agent" $ErrorActionPreference = "Continue" # Constants $onPremRegPath = "HKLM:\SOFTWARE\Microsoft\AzureMonitorAgent" $Ama1PModeDataStoreDir = "AMA_MT_DataStore*"; $vmDir = "C:\WindowsAzure\Resources\" $arcDir = "C:\Resources\Directory" function initialize { # Define destination logs directory $DesktopPath = [Environment]::GetFolderPath("Desktop") $time = Get-Date -Format "MM-dd-yyyy-HH-mm-ss" $folderName = "AMAFiles-$time"; $script:dest = Join-Path -Path $DesktopPath -ChildPath $folderName New-Item -Path $dest -ItemType Directory -Force $transcriptLogFile = Join-Path -Path $dest -ChildPath "TranscriptLog.txt" Start-Transcript -Path $transcriptLogFile; $script:zipFile = Join-Path -Path $DesktopPath -ChildPath "$folderName.zip" $script:separator = "`n" + "-" * 100 + "`n"; } function determineAMAType { # if the registry path for Client AMA is not found, then AMA must be running on a server (either Azure or ARC) if (Test-Path -Path $onPremRegPath) { Write-Host "AMA is running on Windows Client machine" return "Client" } elseif (Test-Path -Path $vmDir) { Write-Host "AMA is running on Azure VM"; return "AzVM" } elseif (Test-Path -Path $arcDir) { Write-Host "AMA is running on ARC server"; return "ARC" } else { Write-Error "The script cannot determine the type of AMA running on the machine" return "" } } function getVmExtWorkingDir { param ( $dataDir ) $workingdir = "nonexistent" $result = @(Get-ChildItem -LiteralPath $dataDir -Filter AmaDataStore*) | Sort-Object -Property LastWriteTime -Descending if ($result.Count -gt 0) { Write-Host "Choosing newest directory: " $result[0].Name; $workingdir = Join-Path -Path $dataDir -ChildPath $result[0].Name } return $workingDir; } function getVmExtPackageDir { $packagePath = "nonexistent" $parentPath = "C:\Packages\Plugins\Microsoft.Azure.Monitor.AzureMonitorWindowsAgent" $result = @(Get-ChildItem -LiteralPath $parentPath) | Sort-Object -Property LastWriteTime -Descending if ($result.Count -gt 0) { $latestVersionDir = $result[0] $result | ForEach-Object { if([version]$latestVersionDir.Name -lt [version]$_.Name) { $latestVersionDir = $_; } } $ver = $latestVersionDir.Name; Write-Host "Choosing newest version directory " $ver; $packagePath = Join-Path -Path $parentPath -ChildPath $ver } return $packagePath; } function getClientAmaDataDir { $dataDir = Get-ItemPropertyValue -Path $onPremRegPath -Name AMADataRootDirPath; return $dataDir; } function getClientAmaPackageDir { $packagePath = Get-ItemPropertyValue -Path $onPremRegPath -Name AMAInstallPath; return $packagePath; } function getTable2CsvPath { param ( $packagePath ) $table2csv = Join-Path -Path $packagePath -ChildPath "Monitoring\Agent\table2csv.exe" return $table2csv; } function getLastTenLines { param( $path ) if ($PSVersionTable.PSVersion -lt "3.0.0") { return (Get-Content -Path $path)[-10..-1]; } else { return Get-Content -Path $path -Tail 10 } } function scrapeAgentDataStore { param ( $table2csv, $DataStoreDir, $DestinationDir ) Write-Host "Collection information from $DataStoreDir and storing them in $DestinationDir"; if (!(Test-Path -Path $DestinationDir)) { New-Item -Path $DestinationDir -ItemType Directory -Force } $tabledir = Join-Path -Path $DataStoreDir -ChildPath "Tables" Write-Host $tabledir Get-ChildItem -Filter *.tsf -Path $tabledir | Foreach-Object { $fullname = $_.FullName if ($_.BaseName -notlike "*_[0-9][0-9][0-9]*") { Write-Host -BackgroundColor White -ForegroundColor DarkGreen -Object $fullname; & $table2csv $fullname | Select-Object -Last 10 } } $eventcsv = Join-Path -Path $tabledir -ChildPath "maeventtable.csv" $qoscsv = Join-Path -Path $tabledir -ChildPath "maqosevent.csv" Get-ChildItem -Filter *.csv -Path $tabledir | ForEach-Object { $fullname = $_.FullName $name = $_.Name Write-Host $name if ($fullname -eq $eventcsv) { Copy-Item $eventcsv $DestinationDir -Force } elseif ($fullname -eq $qoscsv) { Copy-Item $qoscsv $DestinationDir -Force } else { $truncated = Join-Path -Path $DestinationDir -ChildPath $name $content = getLastTenLines $fullname; Set-Content -Path $truncated -Value $content -Force } } # Collect AMA startup logs $configdir = Join-Path -Path $datastoredir -ChildPath "Configuration" Copy-Item $configdir -Destination $DestinationDir -Force -Recurse # Collect AMA configuration files and latest health data $mcsdir = Join-Path -Path $datastoredir -ChildPath "mcs" if (Test-Path -Path $mcsdir) { Copy-Item $mcsdir -Destination $DestinationDir -Force -Recurse $authtoken = Join-Path -Path $DestinationDir -ChildPath mcs\AuthToken-MSI.json Remove-Item $authtoken } # Collect MA configuration files for AMA 1P mode scenario $gcsdir = Join-Path -Path $datastoredir -ChildPath "Gcs" if (Test-Path -Path $gcsdir) { Copy-Item $gcsdir -Destination $DestinationDir -Force -Recurse } } function collectVMExtensionPackageFiles { param ( $PackagePath ) # Collect AMA environment file $envsrc = Join-Path -Path $PackagePath -ChildPath "Environment" Copy-Item -Path $envsrc -Destination $dest # Collect AMA RuntimeSettings $runtimeSettings = Join-Path -Path $PackagePath -ChildPath "RuntimeSettings" Copy-Item $runtimeSettings -Destination $dest -Force -Recurse } function collectAzVmExtensionLogs { # Collect AMA extension logs $amaExtensionLogsDir = "C:\WindowsAzure\Logs\Plugins\Microsoft.Azure.Monitor.AzureMonitorWindowsAgent" Copy-Item $amaExtensionLogsDir -Destination $dest -Force -Recurse # Collect Guest Agent extension aggregate status $extensionStatusDir = "C:\WindowsAzure\Logs\AggregateStatus" Copy-Item $extensionStatusDir -Destination $dest -Force -Recurse } function collectArcVmExtensionLogs { $AzureConnectedMachineAgentLogPath = "$Env:SystemDrive\ProgramData\GuestConfig"; # ARC equivalent of Azure Guest Agent # Collect AMA extension logs $amaExtensionLogsDir = "$AzureConnectedMachineAgentLogPath\extension_logs\Microsoft.Azure.Monitor.AzureMonitorWindowsAgent" Copy-Item $amaExtensionLogsDir -Destination $dest -Force -Recurse # Collect ARC agent extension manager logs $extensionManagerLogDir = "$AzureConnectedMachineAgentLogPath\ext_mgr_logs"; Copy-Item $extensionManagerLogDir -Destination $dest -Force -Recurse # Collect extension reports $extensionReportsDir = "$AzureConnectedMachineAgentLogPath\extension_reports"; Copy-Item $extensionReportsDir -Destination $dest -Force -Recurse } function collectClientAmaInfo { $packagePath = getClientAmaPackageDir; $envsrc = Join-Path -Path $packagePath -ChildPath "Service\Environment" Copy-Item -Path $envsrc -Destination $dest # Collect Service logs $dataDir = getClientAmaDataDir $amaServiceLogsDir = Join-Path -Path $dataDir -ChildPath "ServiceLog" Copy-Item $amaServiceLogsDir -Destination $dest -Force -Recurse # Collect registry values created with msi installer Get-ItemProperty -Path $onPremRegPath | Out-File -FilePath "$dest\AMARegVals.txt" -Append; # Confirm AMA service registration and status Get-Service -Name "AzureMonitorAgent" | Out-File -FilePath "$dest\AMAServiceInfo.txt"; } function collect1PModeFiles { param ( $DataStorePath, $table2csv ) $MAConfigJsonFiles = Get-ChildItem -Filter *.json -Path "$DataStorePath\__json\*.json" -Name Copy-Item "$DataStorePath\__json" -Destination $dest -Force -Recurse $MAConfigJsonFiles | ForEach-Object { $contentStr = (Get-Content -Path "$DataStorePath\__json\$_"); if ($contentStr -is [Array]) { $contentStr = $contentStr -join "`n"; } $targetStr = '"LocalPath":"'; $leftIndex = $contentStr.IndexOf($targetStr) + $targetStr.Length; $rightIndex = $contentStr.IndexOf('"', $leftIndex); $localPath = $contentStr.Substring($leftIndex, ($rightIndex-$leftIndex)); scrapeAgentDataStore $table2csv $localPath "$dest\$_"; } } function collectProcessInfo{ # Collect basic information about all AMA processes $processPath = Join-Path -Path $dest -ChildPath "AmaProcessesInfo.txt" Set-Content -Path $processPath -Value "Process Values" -Force -Encoding Unicode $processNames = @( "'AMAExtHealthMonitor.exe'", "'MonAgentLauncher.exe'", "'MonAgentHost.exe'", "'MonAgentManager.exe'", "'MonAgentCore.exe'", "'AzurePerfCollectorExtension.exe'", "'MetricsExtension.Native.exe'", "'KqlExtension.exe'", "'AMAService.exe'" ) $processNames | ForEach-Object { $s1 = Get-WmiObject Win32_Process -Filter "name = $_" | Select-Object Name, ExecutablePath, CommandLine | Format-List | Out-String; $s1 | Out-File -FilePath $processPath -Append; } # Collect names of all processes running on the system $allProcesses = Join-Path -Path $dest -ChildPath "AllProcesses.txt" $pl = Get-Process | Format-Table | Out-String; Write-Output -InputObject $pl >> $allProcesses } function collectNamedPipes { # Collect names of all named pipes created by AMA $amaNamedPipes = Join-Path -Path $dest -ChildPath "AmaNamedPipes.txt" $np = [System.IO.Directory]::GetFiles("\\.\\pipe\\") | Select-String CAgentStream | Format-List | Out-String; Write-Output -InputObject $np >> $amaNamedPipes } function parseEndpoint { param ( $contentStr ) $leftIndex = $contentStr.IndexOf('endpoint="') + 'endpoint="'.Length; $rightIndex = $contentStr.IndexOf('"', $leftIndex); return $contentStr.Substring($leftIndex, ($rightIndex-$leftIndex)); } function testNetworkConnectivity { # Collect network information $networkInfo = Join-Path -Path $dest -ChildPath "NetworkInfo.txt" if ($null -eq (Get-Command "curl.exe" -ErrorAction SilentlyContinue)) { Write-Error "curl.exe is not in path. Install curl.exe" return; } "$separator Connecting to IMDS" | Out-File -FilePath $networkInfo; $imdsEndpoint = "http://169.254.169.254/metadata/instance?api-version=2021-02-01"; if ($PSVersionTable.PSVersion -lt "3.0.0") { $imdsRawResponse = curl.exe -v -H "Metadata: true" $imdsEndpoint; $imdsRawResponse | Out-File -FilePath $networkInfo -Append; # Manually parsing json response because convertfrom-json does not work on PS 2.0. Response does not seem to contain spaces, removing them just in case. $imdsRawResponse = $imdsRawResponse -replace '\s',''; $subIdLength = 32; $subIdStartIndex = $imdsRawResponse.IndexOf("subscriptionId") + 'subscriptionId":"'.Length; $subId = $imdsRawResponse.Substring($subIdStartIndex, $subIdLength); } else { ($imdsResponse = curl.exe -v -H "Metadata: true" $imdsEndpoint | convertfrom-json) >> $networkInfo 2>&1; $subId = $imdsResponse.compute.subscriptionId } if ($subId) { "$separator Connecting to Azure subscription endpoint" | Out-File -FilePath $networkInfo -Append; $endpoint = ("https://management.azure.com/subscriptions/{0}?api-version=2014-04-01" -f $subId); curl.exe -v $endpoint >> $networkInfo 2>&1 } else { "$separator Skipping Azure subscription endpoint. Either connection to imds failed or parsing of subscription id was unsuccessful" | Out-File -FilePath $networkInfo -Append; } "$separator Connecting to himds for ARC Machines" | Out-File -FilePath $networkInfo -Append; curl.exe -v "http://localhost:40342" >> $networkInfo 2>&1; "$separator Connecting to MCS endpoint" | Out-File -FilePath $networkInfo -Append; curl.exe -v "https://global.handler.control.monitor.azure.com" >> $networkInfo 2>&1 $parsedEndpoints = @{}; $MAConfigLatestPath = "C:\WindowsAzure\Resources\AMADataStore.*\mcs\mcsconfig.latest.xml"; $MAConfigLkgPath = "C:\WindowsAzure\Resources\AMADataStore.*\mcs\mcsconfig.lkg.xml"; if (Test-Path -Path $MAConfigLatestPath) { $Contents = Select-Xml -Path $MAConfigLatestPath -XPath "/MonitoringManagement/EventStreamingAnnotations/EventStreamingAnnotation/OMS/Content"; } elseif (Test-Path -Path $MAConfigLkgPath) { $Contents = Select-Xml -Path $MAConfigLkgPath -XPath "/MonitoringManagement/EventStreamingAnnotations/EventStreamingAnnotation/OMS/Content"; } else { "$separator Cannot find mcs config file under AMA datastore. Cannot parse endpoints information downloaded from AMCS." | Out-File -FilePath $networkInfo -Append; } if ($Contents) { if ($Contents -is [Array]) { $Contents | ForEach-Object { if(!$parsedEndpoints.ContainsKey((parseEndpoint $_.Node.Innerxml))) { $parsedEndpoints.Add((parseEndpoint $_.Node.Innerxml), 0); } } } else { $parsedEndpoints.Add((parseEndpoint $Contents.Node.Innerxml), 0); } "$separator Connecting to endpoints found in mcsconfig file (ODS, GIG, etc...)" | Out-File -FilePath $networkInfo -Append; foreach ($endpoint in $parsedEndpoints.GetEnumerator() ) { $endpointUri = $endpoint.Name; "$separator Connecting to $endpointUri" | Out-File -FilePath $networkInfo -Append; curl.exe -v $endpointUri >> $networkInfo 2>&1; } } } function collectRegistryInfo { param ( [Parameter(Mandatory=$true)] [String] $outputFilePath, [Parameter(Mandatory=$true)] [String] $regKey, $valueName ) if (Test-Path -Path $regKey) { "`nFound $regKey" >> $outputFilePath 2>&1; if ($valueName) { $value = Get-ItemProperty -Path $regKey -Name $valueName -ErrorAction SilentlyContinue; if($value) { "$valueName :" >> $outputFilePath 2>&1; $value >> $outputFilePath 2>&1; } else { "$valueName cannot be found under $regKey" >> $outputFilePath 2>&1; } } else { "values: " >> $outputFilePath 2>&1; Get-ItemProperty -Path $regKey >> $outputFilePath 2>&1; } } else { "`nCannot find $regKey" >> $outputFilePath 2>&1; } } function collectTLSInfo { $networkInfo = Join-Path -Path $dest -ChildPath "NetworkInfo.txt" # OS Version is relevant to whether the TLS is enabled by default. "$separator OS Version" >> $networkInfo 2>&1; [environment]::OSVersion.Version >> $networkInfo 2>&1; $regKeyPaths = @( "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client", "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server" ) "$separator TLS related registry info" >> $networkInfo 2>&1; foreach ($regKey in $regKeyPaths) { collectRegistryInfo -outputFilePath $networkInfo -regkey $regKey; } $winHttpPaths = @( "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp", "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp" ); foreach ($regKey in $winHttpPaths) { collectRegistryInfo -outputFilePath $networkInfo -regkey $regKey -valueName "DefaultSecureProtocols" } $dotnetPaths = @( "HKLM:\SOFTWARE\Microsoft\.NETFramework", "HKLM:\SOFTWARE\Wow6432Node\Microsoft\.NETFramework" ); foreach ($dotnetPath in $dotnetPaths) { $dotnetVersions = Get-ChildItem -Path "$dotnetPath\v*" -Name; if ($dotnetVersions -isnot [Array]) { $dotnetVersions = @($dotnetVersions); } foreach ($version in $dotnetVersions) { $regKey = "$dotnetPath\$version" collectRegistryInfo -outputFilePath $networkInfo -regkey $regKey -valueName "SystemDefaultTlsVersions" collectRegistryInfo -outputFilePath $networkInfo -regkey $regKey -valueName "SchUseStrongCrypto" } } } # Finally create a zip of all the content. function zipOutputDir { try { Add-Type -assembly "system.io.compression.filesystem" [io.compression.zipfile]::CreateFromDirectory($dest, $zipFile) Write-Host "Done creating zipfile: $zipFile"; } catch { Write-Error "Cannot zip the output folder with error: $_.`n Manually zip AMAFiles folder on Desktop."; } } function main { initialize; $AMAType = determineAMAType; if ($AMAType -eq "AzVM") { collectAzVmExtensionLogs $dataDir = $vmDir; $workingDir = getVmExtWorkingDir $dataDir; $packageDir = getVmExtPackageDir; } if ($AMAType -eq "ARC") { collectArcVmExtensionLogs; $dataDir = $arcDir; $workingDir = getVmExtWorkingDir $dataDir; $packageDir = getVmExtPackageDir; } if (($AMAType -eq "AzVM") -Or ($AMAType -eq "ARC")) { $table2csv = getTable2CsvPath $packageDir; collectVMExtensionPackageFiles $packageDir; $Ama1PModeDataStorePath = Join-Path -Path $dataDir -ChildPath $Ama1PModeDataStoreDir; if (Test-Path $Ama1PModeDataStorePath) { collect1PModeFiles $Ama1PModeDataStorePath $table2csv; } } if ($AMAType -eq "Client") { collectClientAmaInfo; $dataDir = getClientAmaDataDir; $workingdir = Join-Path -Path $dataDir -ChildPath AzureMonitorAgent.MonitoringDataStore; $packageDir = getClientAmaPackageDir; $table2csv = getTable2CsvPath $packageDir; } Write-Host "Working Dir: $workingDir"; Write-Host "Data Dir: $dataDir"; Write-Host "Package Dir: $packageDir"; if ($workingDir) { # AMA standard DataStore might not exist if it is exclusively running on 1P mode. scrapeAgentDataStore $table2csv $workingdir $dest; } else { Write-Error "The script was not able to find AMA datastore." } collectProcessInfo; collectNamedPipes; testNetworkConnectivity; collectTLSInfo; Stop-Transcript zipOutputDir; } main
combined_dataset/train/non-malicious/2267.ps1
2267.ps1
function Load-Form { $Form.Controls.Add($TabControl) $TabControl.Controls.AddRange(@( $TabPageGeneral, $TabPageCAS, $TabPagePrimary, $TabPageSecondary, $TabPageSiteRoles, $TabPageOther )) $TabPageGeneral.Controls.AddRange(@( $OutputBoxGeneral, $BlogLink, $LBVersions, $CBValidationOverride, $LabelHeader, $LabelGeneralRestart, $LabelGeneralOS, $LabelGeneralPS, $LabelGeneralElevated, $PBReboot, $PBOS, $PBPS, $PBElevated, $GBGeneralReboot, $GBGeneralOS, $GBGeneralPS, $GBGeneralElevated, $GBGeneralValidation, $GBGeneralVersion )) $Form.Add_Shown({Validate-RunChecks}) $Form.Add_Shown({$Form.Activate()}) [void]$Form.ShowDialog() } function Load-CAS { if (-not(($TabPageCAS.Controls | Measure-Object).Count -ge 1)) { $TabPageCAS.Controls.Clear() $TabPageCAS.Controls.AddRange(@( $ProgressBarCAS, $OutputBoxCAS, $CBCASDownloadPrereqs, $ButtonInstallCAS )) } if ($ButtonInstallCAS.Enabled -eq $false) { $ButtonInstallCAS.Enabled = $true } } function Load-Primary { if (-not(($TabPagePrimary.Controls | Measure-Object).Count -ge 1)) { $TabPagePrimary.Controls.Clear() $TabPagePrimary.Controls.AddRange(@( $ProgressBarPrimary, $OutputBoxPrimary, $CBPrimaryDownloadPrereqs, $ButtonInstallPrimarySite )) } if ($ButtonInstallPrimarySite.Enabled -eq $false) { $ButtonInstallPrimarySite.Enabled = $true } } function Load-Secondary { if (-not(($TabPageSecondary.Controls | Measure-Object).Count -ge 1)) { $TabPageSecondary.Controls.Clear() $TabPageSecondary.Controls.AddRange(@( $ProgressBarSecondary, $OutputBoxSecondary, $ButtonInstallSecondarySite )) } if ($ButtonInstallSecondarySite.Enabled -eq $false) { $ButtonInstallSecondarySite.Enabled = $true } } function Load-SiteSystemRoles { if (-not(($TabPageSiteRoles.Controls | Measure-Object).Count -ge 1)) { $TabPageSiteRoles.Controls.Clear() $TabPageSiteRoles.Controls.AddRange(@( $ProgressBarSiteRoles, $OutputBoxSiteRoles, $RadioButtonSiteRoleMP, $RadioButtonSiteRoleDP, $RadioButtonSiteRoleAppCat, $RadioButtonSiteRoleEP, $RadioButtonSiteRoleSMP, $ButtonInstallSiteRoles, $GBSiteSystemRoles )) } } function Load-Other { if (-not(($TabPageOther.Controls | Measure-Object).Count -ge 1)) { $TabPageOther.Controls.Clear() $TabPageOther.Controls.AddRange(@( $ProgressBarOther, $OutputBoxOther, $ButtonInstallOther, $RadioButtonOtherEAD, $RadioButtonOtherWSUS, $RadioButtonOtherADK, $RadioButtonOtherSMC, $RadioButtonOtherNoSMS, $GBOther )) } } function Load-SystemManagementContainer { Validate-ADGroupSearch } function Interactive-TabPages { param( [parameter(Mandatory=$true)] [ValidateSet("Enable","Disable")] $Mode ) Begin { $CurrentTabPage = $TabControl.SelectedTab.Name switch ($Mode) { "Enable" { $TabPageMode = $true } "Disable" { $TabPageMode = $false } } $TabNameArrayList = New-Object -TypeName System.Collections.ArrayList foreach ($TabNameArrayListObject in (($TabControl.TabPages.Name))) { $TabNameArrayList.Add($TabNameArrayListObject) } } Process { foreach ($TabPageObject in $TabNameArrayList) { if ($Mode -like "Disable") { if ($CurrentTabPage -like "General") { $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Central Administration Site") { $TabPageGeneral.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Primary Site") { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Secondary Site") { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Site System Roles") { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Other") { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode } } else { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } } } } function Interactive-RadioButtons { param( [parameter(Mandatory=$true)] [ValidateSet("Enable","Disable")] $Mode, [parameter(Mandatory=$true)] [ValidateSet("Other","SiteRoles")] $Module ) Begin { switch ($Mode) { "Enable" { $TabPageRadioButtonMode = $true } "Disable" { $TabPageRadioButtonMode = $false } } } Process { if ($Module -eq "SiteRoles") { foreach ($Control in $TabPageSiteRoles.Controls) { if ($Control.GetType().ToString() -eq "System.Windows.Forms.RadioButton") { $Control.Enabled = $TabPageRadioButtonMode } if ($Control.GetType().ToString() -eq "System.Windows.Forms.ComboBox") { $Control.Enabled = $TabPageRadioButtonMode } } } if ($Module -eq "Other") { foreach ($Control in $TabPageOther.Controls) { if ($Control.GetType().ToString() -eq "System.Windows.Forms.RadioButton") { $Control.Enabled = $TabPageRadioButtonMode } if ($Control.GetType().ToString() -eq "System.Windows.Forms.ComboBox") { $Control.Enabled = $TabPageRadioButtonMode } if ($Control.GetType().ToString() -eq "System.Windows.Forms.CheckBox") { $Control.Enabled = $TabPageRadioButtonMode } if ($Control.GetType().ToString() -eq "System.Windows.Forms.TextBox") { $Control.Enabled = $TabPageRadioButtonMode } } } } } function Interactive-SiteRolesControlVisibility { param( [parameter(Mandatory=$true)] [ValidateSet("Enable","Disable")] $Mode, [parameter(Mandatory=$true)] [ValidateSet("MP","DP","AppCat","EP","SMP")] $Module ) Begin { $ControlsArrayList = New-Object System.Collections.ArrayList $ControlsArrayList.AddRange(@("Option Enrollment Point","Option Management Point","Option Distribution Point","Option Application Catalog","Option Site System Roles","Option State Migration Point")) switch ($Mode) { "Enable" { $TabPageSiteRolesVisibilityMode = $true } "Disable" { $TabPageSiteRolesVisibilityMode = $false } } } Process { $SiteRolesControls = $TabPageSiteRoles.Controls $SiteRolesControls | ForEach-Object { $CurrentControl = $_ if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.RadioButton") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.GroupBox") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.CheckBox") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.ComboBox") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.TextBox") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } } } } function Interactive-OtherControlVisibility { param( [parameter(Mandatory=$true)] [ValidateSet("Enable","Disable")] $Mode, [parameter(Mandatory=$true)] [ValidateSet("EAD","WSUS","ADK","SMC","NoSMS")] $Module ) Begin { $OtherControlsArrayList = New-Object System.Collections.ArrayList $OtherControlsArrayList.AddRange(@("Option Extend Active Directory","Option Install WSUS","Option Install Windows ADK","Option System Management Container","Option Make a selection","Option No SMS on drive")) switch ($Mode) { "Enable" { $TabPageOtherVisibilityMode = $true } "Disable" { $TabPageOtherVisibilityMode = $false } } } Process { $OtherControls = $TabPageOther.Controls $OtherControls | ForEach-Object { $OtherCurrentControl = $_ if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.RadioButton") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageOtherVisibilityMode } } } if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.GroupBox") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $OtherCurrentControl.Visible = $TabPageOtherVisibilityMode } } } if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.ComboBox") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $OtherCurrentControl.Visible = $TabPageOtherVisibilityMode } } } if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.TextBox") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $OtherCurrentControl.Visible = $TabPageOtherVisibilityMode } } } if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.CheckBox") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $OtherCurrentControl.Visible = $TabPageOtherVisibilityMode } } } } } } function Validate-RunChecks { $ValidateCounter = 0 if (Validate-RebootPendingCheck) { $ValidateCounter++ } if (Validate-OSCheck) { $ValidateCounter++ } if (Validate-PSCheck) { $ValidateCounter++ } if (Validate-Elevated) { $ValidateCounter++ } if ($ValidateCounter -ge 4) { Interactive-TabPages -Mode Enable Write-OutputBox -OutputBoxMessage "All validation checks passed successfully" -Type "INFO: " -Object General $CBValidationOverride.Enabled = $false } else { Interactive-TabPages -Mode Disable Write-OutputBox -OutputBoxMessage "All validation checks did not pass successfully, remediate the errors and re-launch the tool or check the override checkbox to use the tool anyway" -Type "ERROR: " -Object General } } function Validate-Elevated { $UserIdentity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $UserWP = New-Object Security.Principal.WindowsPrincipal($UserIdentity) $ErrorActionPreference = "Stop" try { if ($UserWP.IsInRole("S-1-5-32-544")) { $PBElevated.Image = $ValidatedImage $LabelGeneralElevated.Visible = $true Write-OutputBox -OutputBoxMessage "User has local administrative rights, and the tool was launched elevated" -Type "INFO: " -Object General return $true } else { $PBElevated.Image = $NonValidatedImage $LabelGeneralElevated.Visible = $true Write-OutputBox -OutputBoxMessage "The tool requires local administrative rights and was not launched elevated" -Type "ERROR: " -Object General return $false } } catch [System.Exception] { Write-OutputBox -OutputBoxMessage "An error occured when attempting to query for elevation, possible due to issues contacting the domain or the tool is launched in a sub-domain. If used in a sub-domain, check the override checkbox to enable this tool" -Type "WARNING: " -Object General $PBElevated.Image = $NonValidatedImage $LabelGeneralElevated.Visible = $true $ErrorActionPreference = "Continue" } } function Validate-RebootPending { param( [parameter(Mandatory=$true)] $ComputerName ) $RebootPendingCBS = $null $RebootPendingWUAU = $null $GetOS = Get-WmiObject -Class Win32_OperatingSystem -Property BuildNumber,CSName -ComputerName $ComputerName $ConnectRegistry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]"LocalMachine",$ComputerName) if ($GetOS.BuildNumber -ge 6001) { $RegistryCBS = $ConnectRegistry.OpenSubKey("SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\").GetSubKeyNames() $RebootPendingCBS = $RegistryCBS -contains "RebootPending" } $RegistryWUAU = $ConnectRegistry.OpenSubKey("SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\").GetSubKeyNames() $RebootPendingWUAU = $RegistryWUAU -contains "RebootRequired" $RegistryPFRO = $ConnectRegistry.OpenSubKey("SYSTEM\CurrentControlSet\Control\Session Manager\") $RegistryValuePFRO = $RegistryPFRO.GetValue("PendingFileRenameOperations",$null) if ($RegistryValuePFRO) { $RebootPendingPFRO = $true } if (($RebootPendingCBS) -or ($RebootPendingWUAU) -or ($RebootPendingPFRO)) { return $true } else { return $false } } function Validate-RebootPendingCheck { $GetComputerName = $env:COMPUTERNAME $ValidateRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateRebootPending) { $PBReboot.Image = $NonValidatedImage $LabelGeneralRestart.Visible = $true Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system" -Type "ERROR: " -Object General return $false } else { $PBReboot.Image = $ValidatedImage $LabelGeneralRestart.Visible = $true Write-OutputBox -OutputBoxMessage "Pending reboot checks validated successfully" -Type "INFO: " -Object General return $true } } function Validate-OSCheck { $OSProductType = Get-WmiObject -Namespace "root\cimv2" -Class Win32_OperatingSystem | Select-Object -ExpandProperty ProductType $OSBuildNumber = Get-WmiObject -Namespace "root\cimv2" -Class Win32_OperatingSystem | Select-Object -ExpandProperty BuildNumber if (($OSProductType -eq 3) -and ($OSBuildNumber -ge 9200)) { Write-OutputBox -OutputBoxMessage "Supported operating system found" -Type "INFO: " -Object General $PBOS.Image = $ValidatedImage $LabelGeneralOS.Visible = $true return $true } else { if ($OSBuildNumber -lt 9200) { Write-OutputBox -OutputBoxMessage "The detected operating system is not supported. This tool is supported on Windows Server 2012 and above" -Type "ERROR: " -Object General $PBOS.Image = $NonValidatedImage $LabelGeneralOS.Visible = $true return $false } if ($OSProductType -eq 2) { Write-OutputBox -OutputBoxMessage "The detected system is a Domain Controller. This tool is not supported on this platform" -Type "ERROR: " -Object General $PBOS.Image = $NonValidatedImage $LabelGeneralOS.Visible = $true return $false } if ($OSProductType -eq 1) { Write-OutputBox -OutputBoxMessage "The detected operating system is a Workstation OS. This tool is not supported on this platform" -Type "ERROR: " -Object General $PBOS.Image = $NonValidatedImage $LabelGeneralOS.Visible = $true return $false } } } function Validate-PSCheck { if ($host.Version -ge "3.0") { Write-OutputBox -OutputBoxMessage "Supported version of PowerShell was detected" -Type "INFO: " -Object General $PBPS.Image = $ValidatedImage $LabelGeneralPS.Visible = $true return $true } else { Write-OutputBox -OutputBoxMessage "Unsupported version of PowerShell detected. This tool requires PowerShell 3.0 and above" -Type "ERROR: " -Object General $PBPS.Image = $NonValidatedImage $LabelGeneralPS.Visible = $true return $false } } function Validate-DomainController { param( [parameter(Mandatory=$true)] $DCName ) Process { $SchemaMaster = ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).SchemaRoleOwner.Name if (($DCName -like $SchemaMaster) -or ($DCName -like $SchemaMaster.Split(".")[0])) { Write-OutputBox -OutputBoxMessage "Specified server name is the Schema Master role owner" -Type "INFO: " -Object Other return $true } elseif (($DCName -ne $SchemaMaster) -or ($DCName -ne $SchemaMaster.Split(".")[0])) { Write-OutputBox -OutputBoxMessage "The specified server name is not the Schema Master role owner in the forest" -Type "ERROR: " -Object Other return $false } else { return $false } } } function Validate-WSUS { $WSUSErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 9200) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $WSUSErrorHandler++ } if ($WSUSErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2012 64-bit and later is supported" -Type "ERROR: " -Object Other $ButtonInstallWSUS.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateWSUSRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateWSUSRebootPending) { $ButtonInstallWSUS.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " -Object Other } else { if (($TextBoxWSUSSQLServer.Text.Length -eq 0) -and ($RadioButtonSQL.Checked -eq $true)) { Write-OutputBox -OutputBoxMessage "Please enter a SQL Server computer name" -Type "ERROR: " -Object Other } else { Install-WSUS } } } } function Install-CAS { Interactive-TabPages -Mode Disable $ProgressBarCAS.Value = 0 $OutputBoxCAS.ResetText() $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($Host.Version)" -Type "INFO: " -Object CAS $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Net-Ext","Web-Net-Ext45","Web-ASP-Net","Web-ASP-Net45","Web-ASP","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Stat-Compression","Web-Dyn-Compression","Web-Metabase","Web-WMI","Web-HTTP-Redirect","Web-Log-Libraries","Web-HTTP-Tracing","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } $ProgressBarCAS.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallCAS.Enabled = $false $CBCASDownloadPrereqs.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object CAS do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS } $ProgressBarCAS.PerformStep() } Write-OutputBox -OutputBoxMessage "Installation completed" -Type "INFO: " -Object CAS if ($CBCASDownloadPrereqs.Checked -eq $true) { Get-PrereqFiles -Module CAS Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object CAS $ErrorVerify = 0 $ProgressBarCAS.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS $ProgressBarCAS.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object CAS $ProgressBarCAS.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object CAS } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object CAS } } else { Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object CAS $ErrorVerify = 0 $ProgressBarCAS.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS $ProgressBarCAS.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object CAS $ProgressBarCAS.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object CAS } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object CAS } } $ButtonInstallCAS.Enabled = $true $CBCASDownloadPrereqs.Enabled = $true Interactive-TabPages -Mode Enable } function Install-Primary { Interactive-TabPages -Mode Disable $ProgressBarPrimary.Value = 0 $OutputBoxPrimary.ResetText() $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object Primary $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Net-Ext","Web-Net-Ext45","Web-ASP-Net","Web-ASP-Net45","Web-ASP","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Stat-Compression","Web-Dyn-Compression","Web-Metabase","Web-WMI","Web-HTTP-Redirect","Web-Log-Libraries","Web-HTTP-Tracing","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } $ProgressBarPrimary.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallPrimarySite.Enabled = $false $CBPrimaryDownloadPrereqs.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Primary do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary } $ProgressBarPrimary.PerformStep() } Write-OutputBox -OutputBoxMessage "Installation completed" -Type "INFO: " -Object Primary if ($CBPrimaryDownloadPrereqs.Checked -eq $true) { Get-PrereqFiles -Module Primary Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object Primary $ErrorVerify = 0 $ProgressBarPrimary.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary $ProgressBarPrimary.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Primary $ProgressBarPrimary.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object Primary } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object Primary } } else { Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object Primary $ErrorVerify = 0 $ProgressBarPrimary.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary $ProgressBarPrimary.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Primary $ProgressBarPrimary.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object Primary } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object Primary } } $ButtonInstallPrimarySite.Enabled = $true $CBPrimaryDownloadPrereqs.Enabled = $true Interactive-TabPages -Mode Enable } function Install-Secondary { Interactive-TabPages -Mode Disable $ProgressBarSecondary.Value = 0 $OutputBoxSecondary.ResetText() $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object Secondary $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Metabase","Web-WMI") } $ProgressBarSecondary.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSecondarySite.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Secondary [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Secondary do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Secondary Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Secondary } $ProgressBarSecondary.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object Secondary $ErrorVerify = 0 $ProgressBarSecondary.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Secondary $ProgressBarSecondary.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Secondary $ProgressBarSecondary.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object Secondary } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object Secondary } $ButtonInstallSecondarySite.Enabled = $true Interactive-TabPages -Mode Enable } function Install-AppCat { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("NET-Framework-Features","NET-Framework-Core","NET-HTTP-Activation","NET-Non-HTTP-Activ","NET-WCF-Services45","NET-WCF-HTTP-Activation45","RDC","WAS","WAS-Process-Model","WAS-NET-Environment","WAS-Config-APIs","Web-Server","Web-WebServer","Web-Common-Http","Web-Static-Content","Web-Default-Doc","Web-App-Dev","Web-ASP-Net","Web-ASP-Net45","Web-Net-Ext","Web-Net-Ext45","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Security","Web-Windows-Auth","Web-Filtering","Web-Mgmt-Tools","Web-Mgmt-Console","Web-Scripting-Tools","Web-Mgmt-Compat","Web-Metabase","Web-Lgcy-Mgmt-Console","Web-Lgcy-Scripting","Web-WMI") } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Install-MP { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("NET-Framework-Core","NET-Framework-45-Features","NET-Framework-45-Core","NET-WCF-TCP-PortSharing45","NET-WCF-Services45","BITS","BITS-IIS-Ext","BITS-Compact-Server","RSAT-Bits-Server","Web-Server","Web-WebServer","Web-ISAPI-Ext","Web-WMI","Web-Metabase","Web-Windows-Auth","Web-ISAPI-Ext","Web-ASP","Web-Asp-Net","Web-Asp-Net45") } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Install-DP { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("FS-FileServer","RDC","Web-WebServer","Web-Common-Http","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Redirect","Web-Health","Web-Http-Logging","Web-Performance","Web-Stat-Compression","Web-Security","Web-Filtering","Web-Windows-Auth","Web-App-Dev","Web-ISAPI-Ext","Web-Mgmt-Tools","Web-Mgmt-Console","Web-Mgmt-Compat","Web-Metabase","Web-WMI","Web-Scripting-Tools") } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Install-EP { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($ComboBoxSiteRolesEP.Text -eq "Enrollment Point") { if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("Web-Server","Web-WebServer","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Logging","Web-Stat-Compression","Web-Filtering","Web-Net-Ext","Web-Asp-Net","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Mgmt-Console","Web-Metabase","NET-Framework-Core","NET-Framework-Features","NET-HTTP-Activation","NET-Framework-45-Features","NET-Framework-45-Core","NET-Framework-45-ASPNET","NET-WCF-Services45","NET-WCF-TCP-PortSharing45") } } if ($ComboBoxSiteRolesEP.Text -eq "Enrollment Proxy Point") { if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("Web-Server","Web-WebServer","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Logging","Web-Stat-Compression","Web-Filtering","Web-Windows-Auth","Web-Net-Ext","Web-Net-Ext45","Web-Asp-Net","Web-Asp-Net45","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Mgmt-Console","Web-Metabase","NET-Framework-Core","NET-Framework-Features","NET-Framework-45-Features","NET-Framework-45-Core","NET-Framework-45-ASPNET","NET-WCF-Services45","NET-WCF-TCP-PortSharing45") } } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature -Force Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Install-SMP { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("Web-Server","Web-Common-Http","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Logging","Web-Dyn-Compression","Web-Filtering","Web-Windows-Auth","Web-Mgmt-Tools","Web-Mgmt-Console") } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Extend-ActiveDirectorySchema { $ButtonInstallOther.Enabled = $false Interactive-RadioButtons -Mode Disable -Module Other $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() $WindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) if (-not($TextBoxDC.Text -eq $WaterMarkDC)) { if (Test-Connection -ComputerName $TextBoxDC.Text -Count 1 -ErrorAction SilentlyContinue) { if (($WindowsPrincipal.IsInRole("Domain Admins")) -and ($WindowsPrincipal.IsInRole("Schema Admins"))) { $TextBoxDC.Enabled = $false do { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse to the '<ConfigMgr source files>\SMSSETUP\BIN\X64' folder." } until (Test-Path -Path "$($SetupDLLocation)\EXTADSCH.EXE") $DC = $TextBoxDC.Text $GetPath = Get-ChildItem -Recurse -Filter "EXTADSCH.EXE" -Path "$($SetupDLLocation)" $Path = $GetPath.DirectoryName + "\EXTADSCH.EXE" $Destination = "\\" + $DC + "\C$" Write-OutputBox -OutputBoxMessage "Copying EXTADSCH.EXE to the specified domain controller" -Type "INFO: " -Object Other Copy-Item $Path $Destination -Force Write-OutputBox -OutputBoxMessage "Starting to extend the Active Directory schema" -Type "INFO: " -Object Other Invoke-WmiMethod -Class Win32_Process -Name Create -ArgumentList "C:\EXTADSCH.EXE" -ComputerName $DC | Out-Null Start-Sleep -Seconds 10 $Content = Get-Content -Path "\\$($DC)\C$\extadsch.log" if ($Content -match "Successfully extended the Active Directory schema") { Write-OutputBox -OutputBoxMessage "Active Directory schema was successfully extended" -Type "INFO: " -Object Other } else { Write-OutputBox -OutputBoxMessage "Active Directory was not extended successfully, refer to C:\ExtADSch.log on the domain controller" -Type "ERROR: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "Current logged on user is not a member of the Domain Admins or Schema Admins group" -Type "ERROR: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "Unable to establish a connection to the specified domain controller" -Type "ERROR: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "Please enter a hostname of a domain controller" -Type "ERROR: " -Object Other } Interactive-RadioButtons -Mode Enable -Module Other $ButtonInstallOther.Enabled = $true $TextBoxDC.Enabled = $true } function Install-WSUS { Interactive-RadioButtons -Mode Disable -Module Other Interactive-TabPages -Mode Disable $ButtonInstallOther.Enabled = $false if ($ComboBoxOtherWSUS.Text -eq "WID") { $WinFeatures = @("UpdateServices","UpdateServices-WidDB","UpdateServices-Services","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } if ($ComboBoxOtherWSUS.Text -eq "SQL") { $WinFeatures = @("UpdateServices-Services","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI","UpdateServices-DB") } $ProgressBarOther.Maximum = 10 $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ProgressBarOther.PerformStep() $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Other Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Other } $ProgressBarOther.PerformStep() } Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object Other $WSUSContentPath = Read-FolderBrowserDialog -Message "Choose a location where WSUS content will be stored, e.g. C:\WSUS" $ProgressBarOther.PerformStep() if (-not(Test-Path -Path $WSUSContentPath)) { New-Item $WSUSContentPath -ItemType Directory | Out-Null } if (Test-Path -Path "$($Env:ProgramFiles)\Update Services\Tools\WsusUtil.exe") { $WSUSUtil = "$($Env:ProgramFiles)\Update Services\Tools\WsusUtil.exe" if ($ComboBoxOtherWSUS.SelectedItem -eq "WID") { $WSUSUtilArgs = "POSTINSTALL CONTENT_DIR=$($WSUSContentPath)" } if ($ComboBoxOtherWSUS.Text -eq "SQL") { if (($TextBoxWSUSSQLServer.Text.Length -ge 1) -and ($TextBoxWSUSSQLServer.Text -notlike $WaterMarkWSUSSQLServer) -and ($TextBoxWSUSSQLInstance.Text -like $WaterMarkWSUSSQLInstance)) { Write-OutputBox -OutputBoxMessage "Choosen configuration is SQL Server, default instance" -Type "INFO: " -Object Other $WSUSUtilArgs = "POSTINSTALL SQL_INSTANCE_NAME=$($TextBoxWSUSSQLServer.Text) CONTENT_DIR=$($WSUSContentPath)" } if (($TextBoxWSUSSQLServer.Text.Length -ge 1) -and ($TextBoxWSUSSQLServer.Text -notlike $WaterMarkWSUSSQLServer) -and ($TextBoxWSUSSQLInstance.Text.Length -ge 1) -and ($TextBoxWSUSSQLInstance.Text -notlike $WaterMarkWSUSSQLInstance)) { Write-OutputBox -OutputBoxMessage "Choosen configuration is SQL Server, named instance" -Type "INFO: " -Object Other $WSUSUtilArgs = "POSTINSTALL SQL_INSTANCE_NAME=$($TextBoxWSUSSQLServer.Text)\$($TextBoxWSUSSQLInstance.Text) CONTENT_DIR=$($WSUSContentPath)" } } Write-OutputBox -OutputBoxMessage "Starting WSUS post install configuration, this will take some time" -Type "INFO: " -Object Other $ProgressBarOther.PerformStep() Start-Process -FilePath $WSUSUtil -ArgumentList $WSUSUtilArgs -NoNewWindow -Wait -RedirectStandardOutput "C:\temp.txt" | Out-Null $ProgressBarOther.PerformStep() Write-OutputBox -OutputBoxMessage "Successfully installed and configured WSUS" -Type "INFO: " -Object Other Remove-Item "C:\temp.txt" -Force $ProgressBarOther.PerformStep() } else { $ProgressBarOther.Value = 10 Write-OutputBox -OutputBoxMessage "Unable to locate $($WSUSUtil)" -Type "INFO: " -Object Other } Interactive-RadioButtons -Mode Enable -Module Other Interactive-TabPages -Mode Enable $ButtonInstallOther.Enabled = $true } function Install-ADK { Interactive-RadioButtons -Mode Disable -Module Other Interactive-TabPages -Mode Disable $ButtonInstallOther.Enabled = $false $ADKInstalledFeatures = @() $ComputerName = $env:COMPUTERNAME $UninstallKey = "SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall" $Registry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('LocalMachine',$ComputerName) $RegistryKey = $Registry.OpenSubKey($UninstallKey) $SubKeys = $RegistryKey.GetSubKeyNames() ForEach ($Key in $SubKeys) { $CurrentKey = $UninstallKey + "\\" + $Key $CurrentSubKey = $Registry.OpenSubKey($CurrentKey) $DisplayName = $CurrentSubKey.GetValue("DisplayName") if ($DisplayName -like "Windows PE x86 x64") { $ADKInstalledFeatures += $DisplayName } elseif ($DisplayName -like "User State Migration Tool") { $ADKInstalledFeatures += $DisplayName } elseif ($DisplayName -like "Windows Deployment Tools") { $ADKInstalledFeatures += $DisplayName } } if (($ComboBoxOtherADK.Text -eq "Online") -and ($ADKInstalledFeatures.Length -ne 3)) { $ADKOnlineArguments = "/norestart /q /ceip off /features OptionId.WindowsPreinstallationEnvironment OptionId.DeploymentTools OptionId.UserStateMigrationTool" $ADKDownloadFolder = "C:\Downloads" $ADKSetupFile = "adksetup.exe" switch ($ComboBoxOtherADKVersion.SelectedItem) { "Windows ADK 10" { $ADKDownloadURL = "http://go.microsoft.com/fwlink/p/?LinkId=526740" } "Windows ADK 8.1" { $ADKDownloadURL = "http://download.microsoft.com/download/6/A/E/6AEA92B0-A412-4622-983E-5B305D2EBE56/adk/adksetup.exe" } } Get-WebDownloadFile -URL $ADKDownloadURL -DownloadFolder $ADKDownloadFolder -FileName $ADKSetupFile -Module Other Write-OutputBox -OutputBoxMessage "Download completed" -Type "INFO: " -Object Other [System.Windows.Forms.Application]::DoEvents() Write-OutputBox -OutputBoxMessage "Starting Windows ADK installation" -Type "INFO: " -Object Other [System.Windows.Forms.Application]::DoEvents() Write-OutputBox -OutputBoxMessage "Downloading Windows ADK components and installing, this will take some time depending on your internet connection" -Type "INFO: " -Object Other [System.Windows.Forms.Application]::DoEvents() Start-Process -FilePath "$($ADKDownloadFolder)\$($ADKSetupFile)" -ArgumentList $ADKOnlineArguments while (Get-WmiObject -Class Win32_Process -Filter 'Name="adksetup.exe"') { [System.Windows.Forms.Application]::DoEvents() Start-Sleep -Milliseconds 500 } Write-OutputBox -OutputBoxMessage "Successfully installed Windows ADK" -Type "INFO: " -Object Other } if (($ComboBoxOtherADK.Text -eq "Offline") -and ($ADKInstalledFeatures.Length -ne 3)) { $ADKOfflineArguments = "/norestart /q /ceip off /features OptionId.WindowsPreinstallationEnvironment OptionId.DeploymentTools OptionId.UserStateMigrationTool" $ADKSetupFile = "adksetup.exe" do { $SetupLocation = Read-FolderBrowserDialog -Message "Select the folder where adksetup.exe is located" if (-not(Test-Path -Path "$($SetupLocation)\$($ADKSetupFile)")) { $ADKShellObject = New-Object -ComObject WScript.Shell $PopupValidate = $ADKShellObject.Popup("Unable to find $($ADKSetupFile) in the selected folder",0,"Unable to locate file",0) } } until (Test-Path -Path "$($SetupLocation)\$($ADKSetupFile)") Write-OutputBox -OutputBoxMessage "Starting Windows ADK installation, this will take some time" -Type "INFO: " -Object Other Start-Process -FilePath "$($SetupLocation)\$($ADKSetupFile)" -ArgumentList $ADKOfflineArguments while (Get-WmiObject -Class Win32_Process -Filter 'Name="adksetup.exe"') { [System.Windows.Forms.Application]::DoEvents() Start-Sleep -Milliseconds 500 } Write-OutputBox -OutputBoxMessage "Successfully installed Windows ADK" -Type "INFO: " -Object Other } if ($ADKInstalledFeatures.Length -eq 3) { Write-OutputBox -OutputBoxMessage "All required Windows ADK features are already installed, skipping install" -Type "INFO: " -Object Other } Interactive-RadioButtons -Mode Enable -Module Other Interactive-TabPages -Mode Enable $ButtonInstallOther.Enabled = $true } function Create-SMCContainer { $ObjectDomain = New-Object System.DirectoryServices.DirectoryEntry $ObjectContainer = $ObjectDomain.Create("container", "CN=System Management,CN=System") $ObjectContainer.SetInfo() | Out-Null $SuccssContainerCreate = Get-SMCContainer if ($SuccssContainerCreate -eq $true) { return $true } else { return $false } } function Get-SMCContainer { $ADFilter = "(&(objectClass=container)(cn=*System Management*))" $ADSearch = New-Object System.DirectoryServices.DirectorySearcher($ADFilter) $ADResult = $ADSearch.FindOne() $SuccessContainer = $ADResult.GetDirectoryEntry() if ($SuccessContainer) { return $true } else { return $false } } function Configure-SystemManagementContainer { Interactive-RadioButtons -Mode Disable -Module Other Interactive-TabPages -Mode Disable $ButtonInstallOther.Enabled = $false $ADGroupName = $Global:SMCSharedData $ShellObject = New-Object -ComObject Wscript.Shell $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() $WindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) if ($WindowsPrincipal.IsInRole("Domain Admins")) { if ($CBSMCCreate.Checked -eq $true) { if (Get-SMCContainer -eq $true) { Write-OutputBox -OutputBoxMessage "Found the System Management container, will not create it" -Type "INFO: " -Object Other } else { Write-OutputBox -OutputBoxMessage "System Management container not found, creating it" -Type "INFO: " -Object Other Create-SMCContainer if (Get-SMCContainer -eq $true) { Write-OutputBox -OutputBoxMessage "System Management container created successfully" -Type "INFO: " -Object Other } } } if (Get-SMCContainer -eq $true) { Write-OutputBox -OutputBoxMessage "Found the System Management container" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Checking if '$($ADGroupName)' is already added to the System Management container" -Type "INFO: " -Object Other $ADDomain = New-Object System.DirectoryServices.DirectoryEntry | Select-Object -ExpandProperty distinguishedName $ADGroupFilter = "(&(ObjectCategory=group)(samAccountName=*$($ADGroupName)*))" $ADGroupSearch = New-Object System.DirectoryServices.DirectorySearcher($ADGroupFilter) $ADGroupSearch.FindAll() | ForEach-Object { $Object = New-Object System.Security.Principal.SecurityIdentifier $_.Properties["objectSID"][0],0 [System.Security.Principal.SecurityIdentifier]$ADGroupSID = $Object.Value } $IdentityReference = @() $ContainerObject = [ADSI]("LDAP://CN=System Management,CN=System,$($ADDomain)") $ContainerObject.ObjectSecurity.GetAccessRules($true,$true,[System.Security.Principal.SecurityIdentifier]) | ForEach-Object { $IdentityReference += $_.IdentityReference } if ($IdentityReference.Value -match $ADGroupSID.Value) { Write-OutputBox -OutputBoxMessage "'$($ADGroupName)' is already added to the System Management container" -Type "ERROR: " -Object Other } else { try { Write-OutputBox -OutputBoxMessage "Adding '$($ADGroupName)' to the System Management container" -Type "INFO: " -Object Other $ObjectGUID = New-Object GUID 00000000-0000-0000-0000-000000000000 $ContainerACE = New-Object System.DirectoryServices.ActiveDirectoryAccessRule ($ADGroupSID,"GenericAll","Allow","All",$ObjectGUID) $ContainerObject.ObjectSecurity.AddAccessRule($ContainerACE) $ContainerObject.CommitChanges() Write-OutputBox -OutputBoxMessage "Succesfully added '$($ADGroupName)' to the System Management container" -Type "INFO: " -Object Other } catch { Write-OutputBox -OutputBoxMessage "$($_.Exception.Message)" -Type "ERROR: " -Object Other } } } else { Write-OutputBox -OutputBoxMessage "Unable to find the System Management container, will not continue" -Type "ERROR: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "The current user is not a member of the Domain Admins group, please run this script as a member of the Domain Admin group" -Type "ERROR: " -Object Other } Interactive-RadioButtons -Mode Enable -Module Other Interactive-TabPages -Mode Enable $ButtonInstallOther.Enabled = $true } function Search-SMC { $FormSMCSearch.Controls.AddRange(@($ButtonSystemManagementContainerGroupSearch, $ButtonSMCOK, $TextBoxSMCGroupSearch, $TextBoxSMCGroupResult, $DGVSMCGroup, $GBSystemManagementContainerGroup, $GBSystemManagementContainerGroupSearch)) $FormSMCSearch.Add_Shown({$FormSMCSearch.Activate()}) [void]$FormSMCSearch.ShowDialog() $ButtonSMCOK.Enabled = $false if (($DGVSMCGroup.Rows | Measure-Object).Count -ge 1) { $TextBoxSMCGroupSearch.ResetText() $TextBoxSMCGroupResult.ResetText() $DGVSMCGroup.Rows.Clear() $DGVSMCGroup.Refresh() } } function Create-NoSMSOnDrive { $FilePathNoSMS = (Join-Path -Path $ComboBoxOtherNoSMS.SelectedItem -ChildPath "NO_SMS_ON_DRIVE.SMS") if (-not(Test-Path -Path $FilePathNoSMS -ErrorAction SilentlyContinue)) { try { New-Item -Path $FilePathNoSMS -ItemType File -ErrorAction Stop -Force Write-OutputBox -OutputBoxMessage "Successfully created a NO_SMS_ON_DRIVE.SMS file on target drive" -Type "INFO: " -Object Other } catch [System.Exception] { Write-OutputBox -OutputBoxMessage "Unable to create NO_SMS_ON_DRIVE.SMS file on target drive, this operatin requires elevation" -Type "WARNING: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "A NO_SMS_ON_DRIVE.SMS file already exists on target drive" -Type "INFO: " -Object Other } } function Validate-ADGroupSearch { $DGVSMCGroup.Rows.Clear() $DGVSMCGroup.Refresh() } function Search-ADGroup { if ($DGVSMCGroup.Rows.Count -ge 1) { Validate-ADGroupSearch } if ($TextBoxSMCGroupSearch.Text.Length -ge 1) { $ADGroupFilter = "(&(ObjectCategory=group)(samAccountName=*$($TextBoxSMCGroupSearch.Text)*))" $ADGroupSearch = New-Object System.DirectoryServices.DirectorySearcher($ADGroupFilter) $ADGroupSearch.FindAll() | ForEach-Object { $DGVSMCGroup.Rows.Add(([string]$_.Properties.Item("samAccountName"))) | Out-Null } } else { Write-OutputBox -OutputBoxMessage "Please enter an Active Directory group to search for in the text box" -Type "ERROR: " -Object Other } } function Read-FolderBrowserDialog { param( [parameter(Mandatory=$true)] [string]$Message ) $ShellApplication = New-Object -ComObject Shell.Application $FolderBrowserDialog = $ShellApplication.BrowseForFolder(0,"$($Message)",0,17) if ($FolderBrowserDialog) { return $FolderBrowserDialog.Self.Path } else { return "" } } function Clear-OutputBox { $OutputBox.ResetText() } function Get-WebDownloadFile { param( [Parameter(Mandatory=$true)] [String]$URL, [Parameter(Mandatory=$true)] [string]$DownloadFolder, [Parameter(Mandatory=$true)] [string]$FileName, [Parameter(Mandatory=$true)] [ValidateSet("SiteRoles","Other")] [string]$Module ) Process { if ($Module -eq "SiteRoles") { $ProgressBarSiteRoles.Maximum = 100 $ProgressBarSiteRoles.Value = 0 } if ($Module -eq "Other") { $ProgressBarOther.Maximum = 100 $ProgressBarOther.Value = 0 } $WebClient = New-Object System.Net.WebClient if (-not(Test-Path -Path $DownloadFolder)) { Write-OutputBox -OutputBoxMessage "Creating download folder: $($DownloadFolder)" -Type "INFO: " -Object $Module [System.Windows.Forms.Application]::DoEvents() New-Item $DownloadFolder -ItemType Directory | Out-Null } $Global:DownloadComplete = $False $EventDataComplete = Register-ObjectEvent $WebClient DownloadFileCompleted -SourceIdentifier WebClient.DownloadFileComplete -Action {$Global:DownloadComplete = $True} $EventDataProgress = Register-ObjectEvent $WebClient DownloadProgressChanged -SourceIdentifier WebClient.DownloadProgressChanged -Action { $Global:DPCEventArgs = $EventArgs } $WebClient.DownloadFileAsync($URL, "$($DownloadFolder)\$($FileName)") Write-OutputBox -OutputBoxMessage "Downloading ($($FileName) to $($DownloadFolder)" -Type "INFO: " -Object $Module do { $PercentComplete = $Global:DPCEventArgs.ProgressPercentage $DownloadedBytes = $Global:DPCEventArgs.BytesReceived $TotalBytes = $Global:DPCEventArgs.TotalBytesToReceive if ($Module -eq "SiteRoles") { $ProgressBarSiteRoles.Value = $PercentComplete } if ($Module -eq "Other") { $ProgressBarOther.Value = $PercentComplete } [System.Windows.Forms.Application]::DoEvents() } until ($Global:DownloadComplete) $WebClient.Dispose() Unregister-Event -SourceIdentifier WebClient.DownloadProgressChanged Unregister-Event -SourceIdentifier WebClient.DownloadFileComplete } } function Get-PrereqFiles { param( [parameter(Mandatory=$true)] [ValidateSet("CAS","Primary")] [string]$Module ) do { $GetDownloadDestination = Read-FolderBrowserDialog -Message "Browse for a folder where the prerequisite files will be downloaded to." $DownloadDestination = '"' + $GetDownloadDestination + '"' } until (Test-Path -Path $GetDownloadDestination) Write-OutputBox -OutputBoxMessage "Prerequisite files will be downloaded to: $($GetDownloadDestination)" -Type "INFO: " -Object $Module do { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse to the '<ConfigMgr source files>\SMSSETUP\BIN\X64' folder." } until (Test-Path -Path "$($SetupDLLocation)\setupdl.exe") Write-OutputBox -OutputBoxMessage "Downloading prerequisite files from Microsoft" -Type "INFO: " -Object $Module do { Start-Process -FilePath "$($SetupDLLocation)\setupdl.exe" -ArgumentList $DownloadDestination -Wait } until ((Get-ChildItem -Path $GetDownloadDestination | Measure-Object).Count -ge 59) Write-OutputBox -OutputBoxMessage "Successfully downloaded all prerequisite files" -Type "INFO: " -Object $Module } function Add-SiteServerLocalAdministrators { param( [parameter(Mandatory=$true)] [string]$ComputerName ) $ErrorActionPreference = "Stop" try { $AdministratorsGroup = [ADSI](”WinNT://$($env:COMPUTERNAME)/Administrators”) $AdministratorsGroupMembers = $AdministratorsGroup.PSBase.Invoke(“Members”) foreach ($Member in $AdministratorsGroupMembers) { [array]$AdministratorsGroupMemberList += $Member.GetType().InvokeMember(“Name”, ‘GetProperty’, $null, $Member, $null) } if (($ComputerName + "`$") -in $AdministratorsGroupMemberList) { Write-OutputBox -OutputBoxMessage "Site Server '$($ComputerName)' is already a member of the local Administrators group" -Type "INFO: " -Object SiteRoles } else { $Domain = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() | Select-Object -ExpandProperty Name $Group = [ADSI]("WinNT://$($env:COMPUTERNAME)/Administrators") $Computer = [ADSI]("WinNT://$($Domain)/$($ComputerName)$") $Group.PSBase.Invoke("Add", $Computer.PSBase.Path) Write-OutputBox -OutputBoxMessage "Added Site Server '$($ComputerName)' to the local Administrators group" -Type "INFO: " -Object SiteRoles } } catch [System.Exception] { Write-OutputBox -OutputBoxMessage "An error occured when attempting to add '$($ComputerName)' to the local Administrators group" -Type "ERROR: " -Object SiteRoles } } function Write-OutputBox { param( [parameter(Mandatory=$true)] [string]$OutputBoxMessage, [ValidateSet("WARNING: ","ERROR: ","INFO: ")] [string]$Type, [parameter(Mandatory=$true)] [ValidateSet("General","CAS","Primary","Secondary","SiteRoles","Other")] [string]$Object ) Process { if ($Object -like "General") { if ($OutputBoxGeneral.Text.Length -eq 0) { $OutputBoxGeneral.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxGeneral.ScrollToCaret() } else { $OutputBoxGeneral.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxGeneral.ScrollToCaret() } } if ($Object -like "CAS") { if ($OutputBoxCAS.Text.Length -eq 0) { $OutputBoxCAS.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxCAS.ScrollToCaret() } else { $OutputBoxCAS.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxCAS.ScrollToCaret() } } if ($Object -like "Primary") { if ($OutputBoxPrimary.Text.Length -eq 0) { $OutputBoxPrimary.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxPrimary.ScrollToCaret() } else { $OutputBoxPrimary.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxPrimary.ScrollToCaret() } } if ($Object -like "Secondary") { if ($OutputBoxSecondary.Text.Length -eq 0) { $OutputBoxSecondary.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxSecondary.ScrollToCaret() } else { $OutputBoxSecondary.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxSecondary.ScrollToCaret() } } if ($Object -like "SiteRoles") { if ($OutputBoxSiteRoles.Text.Length -eq 0) { $OutputBoxSiteRoles.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxSiteRoles.ScrollToCaret() } else { $OutputBoxSiteRoles.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxSiteRoles.ScrollToCaret() } } if ($Object -like "Other") { if ($OutputBoxOther.Text.Length -eq 0) { $OutputBoxOther.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxOther.ScrollToCaret() } else { $OutputBoxOther.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxOther.ScrollToCaret() } } } } function Enter-WaterMark { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text -eq $Text) { $InputObject.Text = "" $InputObject.ForeColor = "WindowText" } } function Leave-WaterMark { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text -eq "") { $InputObject.Text = $Text $InputObject.ForeColor = "LightGray" } } function Leave-WaterMarkStart { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text.Length -gt 0) { $InputObject.Text = $Text $InputObject.ForeColor = "LightGray" } } Add-Type -AssemblyName "System.Drawing" Add-Type -AssemblyName "System.Windows.Forms" Add-Type -AssemblyName "System.DirectoryServices" $Global:SMCSharedData = 0 $Form = New-Object System.Windows.Forms.Form $Form.Size = New-Object System.Drawing.Size(805,530) $Form.MinimumSize = New-Object System.Drawing.Size(805,530) $Form.MaximumSize = New-Object System.Drawing.Size(805,530) $Form.SizeGripStyle = "Hide" $Form.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe") $Form.Text = "ConfigMgr Prerequisites Tool 1.4.1" $FormSMCSearch = New-Object System.Windows.Forms.Form $FormSMCSearch.Size = New-Object System.Drawing.Size(505,480) $FormSMCSearch.MinimumSize = New-Object System.Drawing.Size(505,480) $FormSMCSearch.MaximumSize = New-Object System.Drawing.Size(505,480) $FormSMCSearch.SizeGripStyle = "Hide" $FormSMCSearch.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe") $FormSMCSearch.Text = "Search for an Active Directory group" $ValidatedBase64String = "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" $ValidatedImageBytes = [Convert]::FromBase64String($ValidatedBase64String) $ValidatedMemoryStream = New-Object -TypeName IO.MemoryStream($ValidatedImageBytes, 0, $ValidatedImageBytes.Length) $ValidatedMemoryStream.Write($ValidatedImageBytes, 0, $ValidatedImageBytes.Length) $ValidatedImage = [System.Drawing.Image]::FromStream($ValidatedMemoryStream, $true) $NonValidatedBase64String = "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" $NonValidatedImageBytes = [Convert]::FromBase64String($NonValidatedBase64String) $NonValidatedMemoryStream = New-Object -TypeName IO.MemoryStream($NonValidatedImageBytes, 0, $NonValidatedImageBytes.Length) $NonValidatedMemoryStream.Write($NonValidatedImageBytes, 0, $NonValidatedImageBytes.Length) $NonValidatedImage = [System.Drawing.Image]::FromStream($NonValidatedMemoryStream, $true) $PBReboot = New-Object -TypeName System.Windows.Forms.PictureBox $PBReboot.Location = New-Object -TypeName System.Drawing.Size(203,50) $PBReboot.Size = New-Object -TypeName System.Drawing.Size(16,16) $PBOS = New-Object -TypeName System.Windows.Forms.PictureBox $PBOS.Location = New-Object -TypeName System.Drawing.Size(203,90) $PBOS.Size = New-Object -TypeName System.Drawing.Size(16,16) $PBPS = New-Object -TypeName System.Windows.Forms.PictureBox $PBPS.Location = New-Object -TypeName System.Drawing.Size(203,130) $PBPS.Size = New-Object -TypeName System.Drawing.Size(16,16) $PBElevated = New-Object -TypeName System.Windows.Forms.PictureBox $PBElevated.Location = New-Object -TypeName System.Drawing.Size(203,170) $PBElevated.Size = New-Object -TypeName System.Drawing.Size(16,16) $LBVersions = New-Object -TypeName System.Windows.Forms.ListBox $LBVersions.Location = New-Object -TypeName System.Drawing.Size(30,275) $LBVersions.Size = New-Object -TypeName System.Drawing.Size(200,80) $LBVersions.SelectionMode = "None" $LBVersions.Items.AddRange(@("ConfigMgr 2012","ConfigMgr 2012 R2","ConfigMgr vNext")) $TabPageGeneral = New-Object System.Windows.Forms.TabPage $TabPageGeneral.Location = New-Object System.Drawing.Size(10,50) $TabPageGeneral.Size = New-Object System.Drawing.Size(300,300) $TabPageGeneral.Text = "General" $TabPageGeneral.Name = "General" $TabPageGeneral.Padding = "0,0,0,0" $TabPageGeneral.BackColor = "Control" $TabPageCAS = New-Object System.Windows.Forms.TabPage $TabPageCAS.Location = New-Object System.Drawing.Size(10,50) $TabPageCAS.Size = New-Object System.Drawing.Size(300,300) $TabPageCAS.Text = "Central Administration Site" $TabPageCAS.Name = "Central Administration Site" $TabPageCAS.Padding = "0,0,0,0" $TabPageCAS.BackColor = "Control" $TabPagePrimary = New-Object System.Windows.Forms.TabPage $TabPagePrimary.Location = New-Object System.Drawing.Size(10,50) $TabPagePrimary.Size = New-Object System.Drawing.Size(300,300) $TabPagePrimary.Text = "Primary Site" $TabPagePrimary.Name = "Primary Site" $TabPagePrimary.Padding = "0,0,0,0" $TabPagePrimary.BackColor = "Control" $TabPageSecondary = New-Object System.Windows.Forms.TabPage $TabPageSecondary.Location = New-Object System.Drawing.Size(10,50) $TabPageSecondary.Size = New-Object System.Drawing.Size(300,300) $TabPageSecondary.Text = "Secondary Site" $TabPageSecondary.Name = "Secondary Site" $TabPageSecondary.Padding = "0,0,0,0" $TabPageSecondary.BackColor = "Control" $TabPageSiteRoles = New-Object System.Windows.Forms.TabPage $TabPageSiteRoles.Location = New-Object System.Drawing.Size(10,50) $TabPageSiteRoles.Size = New-Object System.Drawing.Size(300,300) $TabPageSiteRoles.Text = "Site System Roles" $TabPageSiteRoles.Name = "Site System Roles" $TabPageSiteRoles.Padding = "0,0,0,0" $TabPageSiteRoles.BackColor = "Control" $TabPageOther = New-Object System.Windows.Forms.TabPage $TabPageOther.Location = New-Object System.Drawing.Size(10,50) $TabPageOther.Size = New-Object System.Drawing.Size(300,300) $TabPageOther.Text = "Other" $TabPageOther.Name = "Other" $TabPageOther.Padding = "0,0,0,0" $TabPageOther.BackColor = "Control" $TabPageSMCComputer = New-Object System.Windows.Forms.TabPage $TabPageSMCComputer.Location = New-Object System.Drawing.Size(10,50) $TabPageSMCComputer.Size = New-Object System.Drawing.Size(300,300) $TabPageSMCComputer.Text = "Computer" $TabPageSMCComputer.Name = "Computer" $TabPageSMCComputer.Padding = "0,0,0,0" $TabPageSMCComputer.BackColor = "Control" $TabPageSMCGroup = New-Object System.Windows.Forms.TabPage $TabPageSMCGroup.Location = New-Object System.Drawing.Size(0,0) $TabPageSMCGroup.Size = New-Object System.Drawing.Size(300,300) $TabPageSMCGroup.Text = "Group " $TabPageSMCGroup.Name = "Group" $TabPageSMCGroup.Padding = "0,0,0,0" $TabPageSMCGroup.BackColor = "Control" $TabPageSMCGroup.Margin = New-Object System.Windows.Forms.Padding('0') $TabControl = New-Object System.Windows.Forms.TabControl $TabControl.Location = New-Object System.Drawing.Size(0,0) $TabControl.Size = New-Object System.Drawing.Size(805,530) $TabControl.Anchor = "Top, Bottom, Left, Right" $TabControl.Name = "Global" $TabControl.SelectedIndex = 0 $TabControl.Add_Selected([System.Windows.Forms.TabControlEventHandler]{ if ($TabControl.SelectedTab.Name -like "Central Administration Site") { Load-CAS if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxCAS.Text.Length -ge 1)) { $OutputBoxCAS.ResetText() Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Central Administration Site. Additionally you can choose to also download the prerequisite files" -Type "INFO: " -Object CAS } } } if ($TabControl.SelectedTab.Name -like "Primary Site") { Load-Primary if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxPrimary.Text.Length -ge 1)) { $OutputBoxPrimary.ResetText() Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Primary Site. Additionally you can choose to also download the prerequisite files" -Type "INFO: " -Object Primary } } } if ($TabControl.SelectedTab.Name -like "Secondary Site") { Load-Secondary if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxSecondary.Text.Length -ge 1)) { $OutputBoxSecondary.ResetText() Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Secondary Site" -Type "INFO: " -Object Secondary } } } if ($TabControl.SelectedTab.Name -like "Site System Roles") { Load-SiteSystemRoles if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxSiteRoles.Text.Length -ge 1)) { $OutputBoxSiteRoles.ResetText() Write-OutputBox -OutputBoxMessage "Make a selection from the options on the left to begin" -Type "INFO: " -Object SiteRoles } } } if ($TabControl.SelectedTab.Name -like "Other") { Load-Other if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxOther.Text.Length -ge 1)) { $OutputBoxOther.ResetText() Write-OutputBox -OutputBoxMessage "Make a selection from the options on the left to begin" -Type "INFO: " -Object Other } } } }) $TabControlSMC = New-Object System.Windows.Forms.TabControl $TabControlSMC.Location = New-Object System.Drawing.Size(0,0) $TabControlSMC.Size = New-Object System.Drawing.Size(800,500) $TabControlSMC.Anchor = "Top, Bottom, Left, Right" $TabControlSMC.Name = "TabControl" $TabControlSMC.SelectedIndex = 0 $TabControlSMC.Add_Selected([System.Windows.Forms.TabControlEventHandler]{ if ($TabControlSMC.SelectedTab.Name -like "Group") { $OutputBox.ResetText() if ($OutputBox.Location.Y -eq 10) { $OutputBox.Location = New-Object System.Drawing.Size(380,65) $OutputBox.Size = New-Object System.Drawing.Size(393,296) } $TabPageSMCGroup.Controls.Add($OutputBox) } }) $TabControlSMC.Add_Selected([System.Windows.Forms.TabControlEventHandler]{ if ($TabControlSMC.SelectedTab.Name -like "Computer") { $OutputBox.ResetText() if ($OutputBox.ControlAdded) { $TabPageSMCGroup.Controls.Remove($OutputBox) } $OutputBox.Location = New-Object System.Drawing.Size(10,10) $OutputBox.Size = New-Object System.Drawing.Size(763,350) $TabPageSMCComputer.Controls.Add($OutputBox) } }) $ProgressBarCAS = New-Object System.Windows.Forms.ProgressBar $ProgressBarCAS.Location = New-Object System.Drawing.Size(10,375) $ProgressBarCAS.Size = New-Object System.Drawing.Size(763,30) $ProgressBarCAS.Step = 1 $ProgressBarCAS.Value = 0 $ProgressBarPrimary = New-Object System.Windows.Forms.ProgressBar $ProgressBarPrimary.Location = New-Object System.Drawing.Size(10,375) $ProgressBarPrimary.Size = New-Object System.Drawing.Size(763,30) $ProgressBarPrimary.Step = 1 $ProgressBarPrimary.Value = 0 $ProgressBarSecondary = New-Object System.Windows.Forms.ProgressBar $ProgressBarSecondary.Location = New-Object System.Drawing.Size(10,375) $ProgressBarSecondary.Size = New-Object System.Drawing.Size(763,30) $ProgressBarSecondary.Step = 1 $ProgressBarSecondary.Value = 0 $ProgressBarSiteRoles = New-Object System.Windows.Forms.ProgressBar $ProgressBarSiteRoles.Location = New-Object System.Drawing.Size(10,375) $ProgressBarSiteRoles.Size = New-Object System.Drawing.Size(763,30) $ProgressBarSiteRoles.Step = 1 $ProgressBarSiteRoles.Value = 0 $ProgressBarOther = New-Object System.Windows.Forms.ProgressBar $ProgressBarOther.Location = New-Object System.Drawing.Size(10,375) $ProgressBarOther.Size = New-Object System.Drawing.Size(763,30) $ProgressBarOther.Step = 1 $ProgressBarOther.Value = 0 $OutputBoxGeneral = New-Object System.Windows.Forms.RichTextBox $OutputBoxGeneral.Location = New-Object System.Drawing.Size(260,60) $OutputBoxGeneral.Size = New-Object System.Drawing.Size(500,365) $OutputBoxGeneral.Font = "Courier New" $OutputBoxGeneral.BackColor = "white" $OutputBoxGeneral.ReadOnly = $true $OutputBoxGeneral.MultiLine = $True $OutputBoxCAS = New-Object System.Windows.Forms.RichTextBox $OutputBoxCAS.Location = New-Object System.Drawing.Size(10,10) $OutputBoxCAS.Size = New-Object System.Drawing.Size(763,350) $OutputBoxCAS.Font = "Courier New" $OutputBoxCAS.BackColor = "white" $OutputBoxCAS.ReadOnly = $true $OutputBoxCAS.MultiLine = $True $OutputBoxPrimary = New-Object System.Windows.Forms.RichTextBox $OutputBoxPrimary.Location = New-Object System.Drawing.Size(10,10) $OutputBoxPrimary.Size = New-Object System.Drawing.Size(763,350) $OutputBoxPrimary.Font = "Courier New" $OutputBoxPrimary.BackColor = "white" $OutputBoxPrimary.ReadOnly = $true $OutputBoxPrimary.MultiLine = $True $OutputBoxSecondary = New-Object System.Windows.Forms.RichTextBox $OutputBoxSecondary.Location = New-Object System.Drawing.Size(10,10) $OutputBoxSecondary.Size = New-Object System.Drawing.Size(763,350) $OutputBoxSecondary.Font = "Courier New" $OutputBoxSecondary.BackColor = "white" $OutputBoxSecondary.ReadOnly = $true $OutputBoxSecondary.MultiLine = $True $OutputBoxSiteRoles = New-Object System.Windows.Forms.RichTextBox $OutputBoxSiteRoles.Location = New-Object System.Drawing.Size(210,10) $OutputBoxSiteRoles.Size = New-Object System.Drawing.Size(563,350) $OutputBoxSiteRoles.Font = "Courier New" $OutputBoxSiteRoles.BackColor = "white" $OutputBoxSiteRoles.ReadOnly = $true $OutputBoxSiteRoles.MultiLine = $True $OutputBoxOther = New-Object System.Windows.Forms.RichTextBox $OutputBoxOther.Location = New-Object System.Drawing.Size(220,10) $OutputBoxOther.Size = New-Object System.Drawing.Size(553,350) $OutputBoxOther.Font = "Courier New" $OutputBoxOther.BackColor = "white" $OutputBoxOther.ReadOnly = $true $OutputBoxOther.MultiLine = $True $DGVSMCGroup = New-Object System.Windows.Forms.DataGridView $DGVSMCGroup.Location = New-Object System.Drawing.Size(10,65) $DGVSMCGroup.Size = New-Object System.Drawing.Size(360,295) $DGVSMCGroup.ColumnCount = 1 $DGVSMCGroup.ColumnHeadersVisible = $true $DGVSMCGroup.Columns[0].Name = "Active Directory group" $DGVSMCGroup.AllowUserToAddRows = $false $DGVSMCGroup.AllowUserToDeleteRows = $false $DGVSMCGroup.ReadOnly = $True $DGVSMCGroup.ColumnHeadersHeightSizeMode = "DisableResizing" $DGVSMCGroup.AutoSizeColumnsMode = "Fill" $DGVSMCGroup.RowHeadersWidthSizeMode = "DisableResizing" $DGVSMCGroup.RowHeadersVisible = $false $DGVSMCGroup.Add_CellContentClick({ $DGVSMCResult = $DGVSMCGroup.CurrentCell.Value $TextBoxSMCGroupResult.Text = $DGVSMCResult $ButtonSMCOK.Enabled = $true }) $TextBoxDC = New-Object System.Windows.Forms.TextBox $TextBoxDC.Location = New-Object System.Drawing.Size(20,428) $TextBoxDC.Size = New-Object System.Drawing.Size(170,20) $TextBoxDC.TabIndex = "0" $TextBoxDC.Name = "EAD" $TextBoxSMCLocal = New-Object System.Windows.Forms.TextBox $TextBoxSMCLocal.Location = New-Object System.Drawing.Size(38,393) $TextBoxSMCLocal.Size = New-Object System.Drawing.Size(140,20) $TextBoxSMCLocal.TabIndex = "0" $TextBoxSMCLocal.Text = $env:COMPUTERNAME $TextBoxSMCLocal.Enabled = $false $TextBoxSMCRemote = New-Object System.Windows.Forms.TextBox $TextBoxSMCRemote.Location = New-Object System.Drawing.Size(218,393) $TextBoxSMCRemote.Size = New-Object System.Drawing.Size(140,20) $TextBoxSMCRemote.TabIndex = "0" $TextBoxSMCRemote.Enabled = $false $TextBoxSMCGroupSearch = New-Object System.Windows.Forms.TextBox $TextBoxSMCGroupSearch.Location = New-Object System.Drawing.Size(20,27) $TextBoxSMCGroupSearch.Size = New-Object System.Drawing.Size(340,20) $TextBoxSMCGroupSearch.TabIndex = "0" $TextBoxSMCGroupSearch.Add_KeyPress([System.Windows.Forms.KeyPressEventHandler]{ if ($_.KeyChar -eq 13) { Write-OutputBox -OutputBoxMessage "Searching Active Directory for '$($TextBoxSMCGroupSearch.Text)'" -Type "INFO: " -Object Other Search-ADGroup } }) $TextBoxSMCGroupResult = New-Object System.Windows.Forms.TextBox $TextBoxSMCGroupResult.Location = New-Object System.Drawing.Size(20,392) $TextBoxSMCGroupResult.Size = New-Object System.Drawing.Size(340,20) $TextBoxSMCGroupResult.Enabled = $false $TextBoxWSUSSQLServer = New-Object System.Windows.Forms.TextBox $TextBoxWSUSSQLServer.Location = New-Object System.Drawing.Size(160,428) $TextBoxWSUSSQLServer.Size = New-Object System.Drawing.Size(140,20) $TextBoxWSUSSQLServer.TabIndex = "0" $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLServer.Name = "WSUS" $TextBoxWSUSSQLInstance = New-Object System.Windows.Forms.TextBox $TextBoxWSUSSQLInstance.Location = New-Object System.Drawing.Size(310,428) $TextBoxWSUSSQLInstance.Size = New-Object System.Drawing.Size(140,20) $TextBoxWSUSSQLInstance.TabIndex = "0" $TextBoxWSUSSQLInstance.Text = $env:COMPUTERNAME $TextBoxWSUSSQLInstance.Enabled = $false $TextBoxWSUSSQLInstance.Name = "WSUS" $TextBoxSiteSystemRolesMP = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesMP.Location = New-Object System.Drawing.Size(17,428) $TextBoxSiteSystemRolesMP.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesMP.TabIndex = "0" $TextBoxSiteSystemRolesMP.Name = "MP" $TextBoxSiteSystemRolesDP = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesDP.Location = New-Object System.Drawing.Size(17,428) $TextBoxSiteSystemRolesDP.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesDP.TabIndex = "0" $TextBoxSiteSystemRolesDP.Name = "DP" $TextBoxSiteSystemRolesAppCat = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesAppCat.Location = New-Object System.Drawing.Size(17,428) $TextBoxSiteSystemRolesAppCat.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesAppCat.TabIndex = "0" $TextBoxSiteSystemRolesAppCat.Name = "AppCat" $TextBoxSiteSystemRolesEP = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesEP.Location = New-Object System.Drawing.Size(197,428) $TextBoxSiteSystemRolesEP.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesEP.TabIndex = "0" $TextBoxSiteSystemRolesEP.Name = "EP" $TextBoxSiteSystemRolesSMP = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesSMP.Location = New-Object System.Drawing.Size(17,428) $TextBoxSiteSystemRolesSMP.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesSMP.TabIndex = "0" $TextBoxSiteSystemRolesSMP.Name = "SMP" $ButtonInstallCAS = New-Object System.Windows.Forms.Button $ButtonInstallCAS.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallCAS.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallCAS.Text = "Install" $ButtonInstallCAS.TabIndex = "1" $ButtonInstallCAS.Add_Click({Install-CAS}) $ButtonInstallPrimarySite = New-Object System.Windows.Forms.Button $ButtonInstallPrimarySite.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallPrimarySite.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallPrimarySite.Text = "Install" $ButtonInstallPrimarySite.TabIndex = "1" $ButtonInstallPrimarySite.Add_Click({Install-Primary}) $ButtonInstallSecondarySite = New-Object System.Windows.Forms.Button $ButtonInstallSecondarySite.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallSecondarySite.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallSecondarySite.Text = "Install" $ButtonInstallSecondarySite.TabIndex = "1" $ButtonInstallSecondarySite.Add_Click({Install-Secondary}) $ButtonInstallSiteRoles = New-Object System.Windows.Forms.Button $ButtonInstallSiteRoles.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallSiteRoles.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallSiteRoles.Text = "Install" $ButtonInstallSiteRoles.TabIndex = "1" $ButtonInstallSiteRoles.Add_Click({ if ($RadioButtonSiteRoleMP.Checked -eq $true) { if ($TextBoxSiteSystemRolesMP.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesMP.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesMP.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesMP.Text Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Management Point role" -Type "INFO: " -Object SiteRoles Install-MP } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesMP.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Management Point role" -Type "INFO: " -Object SiteRoles Install-MP } } elseif ($RadioButtonSiteRoleDP.Checked -eq $true) { if ($TextBoxSiteSystemRolesDP.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesDP.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesDP.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesDP.Text Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Distribution Point role" -Type "INFO: " -Object SiteRoles Install-DP } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesDP.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Distribution Point role" -Type "INFO: " -Object SiteRoles Install-DP } } elseif ($RadioButtonSiteRoleAppCat.Checked -eq $true) { if ($TextBoxSiteSystemRolesAppCat.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesAppCat.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesAppCat.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesAppCat.Text Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Application Catalog role" -Type "INFO: " -Object SiteRoles Install-AppCat } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesAppCat.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Application Catalog role" -Type "INFO: " -Object SiteRoles Install-AppCat } } elseif ($RadioButtonSiteRoleEP.Checked -eq $true) { if ($TextBoxSiteSystemRolesEP.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesEP.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesEP.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesEP.Text if (($ComboBoxSiteRolesEP.Text -eq "Enrollment Point") -or ($ComboBoxSiteRolesEP.Text -eq "Enrollment Proxy Point")) { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a $($ComboBoxSiteRolesEP.Text) role" -Type "INFO: " -Object SiteRoles Install-EP } else { Write-OutputBox -OutputBoxMessage "Please select an Enrollment Point role" -Type "INFO: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesEP.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { if (($ComboBoxSiteRolesEP.Text -eq "Enrollment Point") -or ($ComboBoxSiteRolesEP.Text -eq "Enrollment Proxy Point")) { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a $($ComboBoxSiteRolesEP.Text) role" -Type "INFO: " -Object SiteRoles Install-EP } else { Write-OutputBox -OutputBoxMessage "Please select an Enrollment Point role" -Type "INFO: " -Object SiteRoles } } } elseif ($RadioButtonSiteRoleSMP.Checked -eq $true) { if ($TextBoxSiteSystemRolesSMP.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesSMP.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesSMP.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesSMP.Text Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a State Migration Point role" -Type "INFO: " -Object SiteRoles Install-SMP } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesDP.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a State Migration Point role" -Type "INFO: " -Object SiteRoles Install-SMP } } else { Write-OutputBox -OutputBoxMessage "Please select a Site System role to install" -Type "INFO: " -Object SiteRoles } }) $ButtonInstallOther = New-Object System.Windows.Forms.Button $ButtonInstallOther.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallOther.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallOther.Text = "Install" $ButtonInstallOther.TabIndex = "1" $ButtonInstallOther.Add_Click({ if (($RadioButtonOtherEAD.Checked -eq $true) -or ($RadioButtonOtherWSUS.Checked -eq $true) -or ($RadioButtonOtherADK.Checked -eq $true) -or ($RadioButtonOtherSMC.Checked -eq $true)) { if ($RadioButtonOtherEAD.Checked -eq $true) { Write-OutputBox -OutputBoxMessage "Begin validation checks for extending Active Directory" -Type "INFO: " -Object Other Extend-ActiveDirectorySchema } if ($RadioButtonOtherWSUS.Checked -eq $true) { if (($ComboBoxOtherWSUS.Text -eq "SQL") -or ($ComboBoxOtherWSUS.Text -eq "WID")) { Write-OutputBox -OutputBoxMessage "Preparing to install WSUS features configured for $($ComboBoxOtherWSUS.Text)" -Type "INFO: " -Object Other Install-WSUS } else { Write-OutputBox -OutputBoxMessage "Please select where to install the WSUS database" -Type "INFO: " -Object Other } } if ($RadioButtonOtherADK.Checked -eq $true) { if (($ComboBoxOtherADK.Text -eq "Online") -or ($ComboBoxOtherADK.Text -eq "Offline")) { Write-OutputBox -OutputBoxMessage "Preparing for an $(($ComboBoxOtherADK.Text).ToLower()) installation of Windows ADK" -Type "INFO: " -Object Other Install-ADK } else { Write-OutputBox -OutputBoxMessage "Please select an installation option" -Type "INFO: " -Object Other } } if ($RadioButtonOtherSMC.Checked -eq $true) { Search-SMC } } elseif ($RadioButtonOtherNoSMS.Checked -eq $true) { Create-NoSMSOnDrive } else { Write-OutputBox -OutputBoxMessage "Nothing has been selected, please make a selection first" -Type "INFO: " -Object Other } }) $ButtonSystemManagementContainerGroupSearch = New-Object System.Windows.Forms.Button $ButtonSystemManagementContainerGroupSearch.Location = New-Object System.Drawing.Size(380,20) $ButtonSystemManagementContainerGroupSearch.Size = New-Object System.Drawing.Size(100,30) $ButtonSystemManagementContainerGroupSearch.Text = "Search" $ButtonSystemManagementContainerGroupSearch.TabIndex = "1" $ButtonSystemManagementContainerGroupSearch.Add_Click({ Search-ADGroup }) $ButtonSMCOK = New-Object System.Windows.Forms.Button $ButtonSMCOK.Location = New-Object System.Drawing.Size(380,385) $ButtonSMCOK.Size = New-Object System.Drawing.Size(100,30) $ButtonSMCOK.Text = "OK" $ButtonSMCOK.TabIndex = "1" $ButtonSMCOK.Enabled = $false $ButtonSMCOK.Add_Click({ $Global:SMCSharedData = $TextBoxSMCGroupResult.Text Write-OutputBox -OutputBoxMessage "Selected Active Directory group: $($Global:SMCSharedData)" -Type "INFO: " -Object Other $FormSMCSearch.Close() Configure-SystemManagementContainer }) $WaterMarkDC = "Enter Schema Master server name" $TextBoxDC.ForeColor = "LightGray" $TextBoxDC.Text = $WaterMarkDC $TextBoxDC.add_Enter({Enter-WaterMark -InputObject $TextBoxDC -Text $WaterMarkDC}) $TextBoxDC.add_Leave({Leave-WaterMark -InputObject $TextBoxDC -Text $WaterMarkDC}) $WaterMarkWSUSSQLServer = "Enter SQL Server name" $TextBoxWSUSSQLServer.ForeColor = "LightGray" $TextBoxWSUSSQLServer.Text = $WaterMarkWSUSSQLServer $TextBoxWSUSSQLServer.add_Enter({Enter-WaterMark -InputObject $TextBoxWSUSSQLServer -Text $WaterMarkWSUSSQLServer}) $TextBoxWSUSSQLServer.add_Leave({Leave-WaterMark -InputObject $TextBoxWSUSSQLServer -Text $WaterMarkWSUSSQLServer}) $TextBoxWSUSSQLServer.Name = "WSUS" $WaterMarkWSUSSQLInstance = "Enter SQL Server instance" $TextBoxWSUSSQLInstance.ForeColor = "LightGray" $TextBoxWSUSSQLInstance.Text = $WaterMarkWSUSSQLInstance $TextBoxWSUSSQLInstance.add_Enter({Enter-WaterMark -InputObject $TextBoxWSUSSQLInstance -Text $WaterMarkWSUSSQLInstance}) $TextBoxWSUSSQLInstance.add_Leave({Leave-WaterMark -InputObject $TextBoxWSUSSQLInstance -Text $WaterMarkWSUSSQLInstance}) $TextBoxWSUSSQLInstance.Name = "WSUS" $LabelHeader = New-Object System.Windows.Forms.Label $LabelHeader.Location = New-Object System.Drawing.Size(257,23) $LabelHeader.Size = New-Object System.Drawing.Size(500,30) $LabelHeader.Text = "Install ConfigMgr Prerequisites" $LabelHeader.Font = New-Object System.Drawing.Font("Verdana",12,[System.Drawing.FontStyle]::Bold) $LabelGeneralRestart = New-Object System.Windows.Forms.Label $LabelGeneralRestart.Size = New-Object System.Drawing.Size(150,15) $LabelGeneralRestart.Location = New-Object System.Drawing.Size(38,52) $LabelGeneralRestart.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Bold) $LabelGeneralRestart.Text = "Reboot required" $LabelGeneralOS = New-Object System.Windows.Forms.Label $LabelGeneralOS.Size = New-Object System.Drawing.Size(160,15) $LabelGeneralOS.Location = New-Object System.Drawing.Size(38,92) $LabelGeneralOS.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Bold) $LabelGeneralOS.Text = "Supported platform" $LabelGeneralPS = New-Object System.Windows.Forms.Label $LabelGeneralPS.Size = New-Object System.Drawing.Size(160,15) $LabelGeneralPS.Location = New-Object System.Drawing.Size(38,132) $LabelGeneralPS.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Bold) $LabelGeneralPS.Text = "PowerShell version" $LabelGeneralElevated = New-Object System.Windows.Forms.Label $LabelGeneralElevated.Size = New-Object System.Drawing.Size(160,15) $LabelGeneralElevated.Location = New-Object System.Drawing.Size(38,172) $LabelGeneralElevated.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Bold) $LabelGeneralElevated.Text = "Elevated launch" $LabelSMCCreate = New-Object System.Windows.Forms.Label $LabelSMCCreate.Location = New-Object System.Drawing.Size(418,395) $LabelSMCCreate.Size = New-Object System.Drawing.Size(150,20) $LabelSMCCreate.Text = "Create the container" $OpenLink = {[System.Diagnostics.Process]::Start("http://www.scconfigmgr.com")} $BlogLink = New-Object System.Windows.Forms.LinkLabel $BlogLink.Location = New-Object System.Drawing.Size(20,440) $BlogLink.Size = New-Object System.Drawing.Size(150,25) $BlogLink.Text = "www.scconfigmgr.com" $BlogLink.Add_Click($OpenLink) $RadioButtonSiteRoleMP = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleMP.Location = New-Object System.Drawing.Size(25,35) $RadioButtonSiteRoleMP.Size = New-Object System.Drawing.Size(120,25) $RadioButtonSiteRoleMP.Text = "Management Point" $RadioButtonSiteRoleMP.Name = "Option Management Point" $RadioButtonSiteRoleMP.Checked = $false $RadioButtonSiteRoleMP.Add_Click({ if ($RadioButtonSiteRoleMP.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $OutputBoxSiteRoles.ResetText() $ProgressBarSiteRoles.Value = 0 Write-OutputBox -OutputBoxMessage "Management Point selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Management Point site system role" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module DP Interactive-SiteRolesControlVisibility -Mode Disable -Module AppCat Interactive-SiteRolesControlVisibility -Mode Disable -Module EP Interactive-SiteRolesControlVisibility -Mode Disable -Module SMP $TabPageSiteRoles.Controls.AddRange(@($TextBoxSiteSystemRolesMP, $GBSiteSystemRolesMP)) Interactive-SiteRolesControlVisibility -Mode Enable -Module MP }) $RadioButtonSiteRoleDP = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleDP.Location = New-Object System.Drawing.Size(25,65) $RadioButtonSiteRoleDP.Size = New-Object System.Drawing.Size(120,25) $RadioButtonSiteRoleDP.Text = "Distribution Point" $RadioButtonSiteRoleDP.Name = "Option Distribution Point" $RadioButtonSiteRoleDP.Checked = $false $RadioButtonSiteRoleDP.Add_Click({ if ($RadioButtonSiteRoleDP.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $OutputBoxSiteRoles.ResetText() $ProgressBarSiteRoles.Value = 0 Write-OutputBox -OutputBoxMessage "Distribution Point selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Distribution Point site system role" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module MP Interactive-SiteRolesControlVisibility -Mode Disable -Module AppCat Interactive-SiteRolesControlVisibility -Mode Disable -Module EP Interactive-SiteRolesControlVisibility -Mode Disable -Module SMP $TabPageSiteRoles.Controls.AddRange(@($TextBoxSiteSystemRolesDP, $GBSiteSystemRolesDP)) Interactive-SiteRolesControlVisibility -Mode Enable -Module DP }) $RadioButtonSiteRoleAppCat = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleAppCat.Location = New-Object System.Drawing.Size(25,95) $RadioButtonSiteRoleAppCat.Size = New-Object System.Drawing.Size(120,25) $RadioButtonSiteRoleAppCat.Text = "Application Catalog" $RadioButtonSiteRoleAppCat.Name = "Option Application Catalog" $RadioButtonSiteRoleAppCat.Checked = $false $RadioButtonSiteRoleAppCat.Add_Click({ if ($RadioButtonSiteRoleAppCat.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $OutputBoxSiteRoles.ResetText() $ProgressBarSiteRoles.Value = 0 Write-OutputBox -OutputBoxMessage "Application Catalog selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for the Application Catalog site system roles" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module MP Interactive-SiteRolesControlVisibility -Mode Disable -Module DP Interactive-SiteRolesControlVisibility -Mode Disable -Module EP Interactive-SiteRolesControlVisibility -Mode Disable -Module SMP $TabPageSiteRoles.Controls.AddRange(@($TextBoxSiteSystemRolesAppCat, $GBSiteSystemRolesAppCat)) Interactive-SiteRolesControlVisibility -Mode Enable -Module AppCat }) $RadioButtonSiteRoleEP = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleEP.Location = New-Object System.Drawing.Size(25,125) $RadioButtonSiteRoleEP.Size = New-Object System.Drawing.Size(120,25) $RadioButtonSiteRoleEP.Text = "Enrollment Point" $RadioButtonSiteRoleEP.Name = "Option Enrollment Point" $RadioButtonSiteRoleEP.Checked = $false $RadioButtonSiteRoleEP.Add_Click({ if ($RadioButtonSiteRoleEP.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $ProgressBarSiteRoles.Value = 0 $ComboBoxSiteRolesEP.SelectedIndex = -1 Write-OutputBox -OutputBoxMessage "Enrollment Point selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Select to install required Windows Features for either an Enrollment Point or an Enrollment Proxy Point site system role" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module MP Interactive-SiteRolesControlVisibility -Mode Disable -Module DP Interactive-SiteRolesControlVisibility -Mode Disable -Module AppCat Interactive-SiteRolesControlVisibility -Mode Disable -Module SMP $TabPageSiteRoles.Controls.AddRange(@($ComboBoxSiteRolesEP, $TextBoxSiteSystemRolesEP, $GBEP, $GBSiteSystemRolesEP)) Interactive-SiteRolesControlVisibility -Mode Enable -Module EP }) $RadioButtonSiteRoleSMP = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleSMP.Location = New-Object System.Drawing.Size(25,155) $RadioButtonSiteRoleSMP.Size = New-Object System.Drawing.Size(170,25) $RadioButtonSiteRoleSMP.Text = "State Migration Point" $RadioButtonSiteRoleSMP.Name = "Option State Migration Point" $RadioButtonSiteRoleSMP.Checked = $false $RadioButtonSiteRoleSMP.Add_Click({ if ($RadioButtonSiteRoleSMP.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $ProgressBarSiteRoles.Value = 0 Write-OutputBox -OutputBoxMessage "State Migration Point selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for the State Migration Point site system role" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module MP Interactive-SiteRolesControlVisibility -Mode Disable -Module DP Interactive-SiteRolesControlVisibility -Mode Disable -Module AppCat Interactive-SiteRolesControlVisibility -Mode Disable -Module EP $TabPageSiteRoles.Controls.AddRange(@($TextBoxSiteSystemRolesSMP, $GBSiteSystemRolesSMP)) Interactive-SiteRolesControlVisibility -Mode Enable -Module SMP }) $RadioButtonOtherEAD = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherEAD.Location = New-Object System.Drawing.Size(25,35) $RadioButtonOtherEAD.Size = New-Object System.Drawing.Size(170,25) $RadioButtonOtherEAD.Text = "Extend Active Directory" $RadioButtonOtherEAD.Name = "Option Extend Active Directory" $RadioButtonOtherEAD.Checked = $false $RadioButtonOtherEAD.Add_MouseClick({ if ($RadioButtonOtherEAD.Checked -eq $true) { $OutputBoxOther.ResetText() } $ProgressBarOther.Value = 0 $ButtonInstallOther.Text = "Extend" if ($TextBoxDC.Enabled -eq $false) { $TextBoxDC.Enabled = $true } Write-OutputBox -OutputBoxMessage "Extend Active Directory selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Enter the server name of the Schema Master server in the textbox below" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module WSUS Interactive-OtherControlVisibility -Mode Disable -Module ADK Interactive-OtherControlVisibility -Mode Disable -Module SMC Interactive-OtherControlVisibility -Mode Disable -Module NoSMS $TabPageOther.Controls.AddRange(@($TextBoxDC, $GBExtendAD)) Interactive-OtherControlVisibility -Mode Enable -Module EAD }) $RadioButtonOtherWSUS = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherWSUS.Location = New-Object System.Drawing.Size(25,65) $RadioButtonOtherWSUS.Size = New-Object System.Drawing.Size(170,25) $RadioButtonOtherWSUS.Text = "Install WSUS" $RadioButtonOtherWSUS.Name = "Option Install WSUS" $RadioButtonOtherWSUS.Checked = $false $RadioButtonOtherWSUS.Add_Click({ if ($RadioButtonOtherWSUS.Checked -eq $true) { $OutputBoxOther.ResetText() } $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance.Enabled = $false $ProgressBarOther.Value = 0 if (-not($ButtonInstallOther.Text -eq "Install")) { $ButtonInstallOther.Text = "Install" } $ComboBoxOtherWSUS.SelectedIndex = -1 Write-OutputBox -OutputBoxMessage "Install WSUS selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Select whether the WSUS database should be created on a SQL Server or by creating a local Windows Internal Database (WID)" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module EAD Interactive-OtherControlVisibility -Mode Disable -Module ADK Interactive-OtherControlVisibility -Mode Disable -Module SMC Interactive-OtherControlVisibility -Mode Disable -Module NoSMS $TabPageOther.Controls.AddRange(@($ComboBoxOtherWSUS, $TextBoxWSUSSQLServer, $TextBoxWSUSSQLInstance, $GBWSUS, $GBWSUSSQL)) Interactive-OtherControlVisibility -Mode Enable -Module WSUS }) $RadioButtonOtherADK = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherADK.Location = New-Object System.Drawing.Size(25,95) $RadioButtonOtherADK.Size = New-Object System.Drawing.Size(170,25) $RadioButtonOtherADK.Text = "Install Windows ADK" $RadioButtonOtherADK.Name = "Option Install Windows ADK" $RadioButtonOtherADK.Checked = $false $RadioButtonOtherADK.Add_Click({ if ($RadioButtonOtherADK.Checked -eq $true) { $OutputBoxOther.ResetText() } $ProgressBarOther.Value = 0 if (-not($ButtonInstallOther.Text -eq "Install")) { $ButtonInstallOther.Text = "Install" } Write-OutputBox -OutputBoxMessage "Install Windows ADK selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Select whether to install Windows ADK by downloading the setup bootstrapper from the internet (Online), or by pointing to a folder where the complete redistributed Windows ADK setup files have been downloaded locally (Offline)" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module EAD Interactive-OtherControlVisibility -Mode Disable -Module WSUS Interactive-OtherControlVisibility -Mode Disable -Module SMC Interactive-OtherControlVisibility -Mode Disable -Module NoSMS $TabPageOther.Controls.AddRange(@($ComboBoxOtherADK, $ComboBoxOtherADKVersion, $GBADK, $GBADKVersion)) Interactive-OtherControlVisibility -Mode Enable -Module ADK }) $RadioButtonOtherSMC = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherSMC.Location = New-Object System.Drawing.Size(25,125) $RadioButtonOtherSMC.Size = New-Object System.Drawing.Size(181,25) $RadioButtonOtherSMC.Text = "System Management Container" $RadioButtonOtherSMC.Name = "Option System Management Container" $RadioButtonOtherSMC.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Regular) $RadioButtonOtherSMC.Checked = $false $RadioButtonOtherSMC.Add_Click({ if ($RadioButtonOtherSMC.Checked -eq $true) { $OutputBoxOther.ResetText() } $ProgressBarOther.Value = 0 if (-not($ButtonInstallOther.Text -eq "Search")) { $ButtonInstallOther.Text = "Search" } Write-OutputBox -OutputBoxMessage "System Management Container selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Click on the Search button to find an Active Directory group that contains all Site servers that will be given Full Control permissions on the System Management container. If you havn't yet created such a group containing all the Site server, please do so before you continue" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module EAD Interactive-OtherControlVisibility -Mode Disable -Module ADK Interactive-OtherControlVisibility -Mode Disable -Module WSUS Interactive-OtherControlVisibility -Mode Disable -Module NoSMS $TabPageOther.Controls.Add($CBSMCCreate) Interactive-OtherControlVisibility -Mode Enable -Module SMC }) $RadioButtonOtherNoSMS = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherNoSMS.Location = New-Object System.Drawing.Size(25,155) $RadioButtonOtherNoSMS.Size = New-Object System.Drawing.Size(181,25) $RadioButtonOtherNoSMS.Text = "No SMS on drive" $RadioButtonOtherNoSMS.Name = "Option No SMS on drive" $RadioButtonOtherNoSMS.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Regular) $RadioButtonOtherNoSMS.Checked = $false $RadioButtonOtherNoSMS.Add_Click({ if ($RadioButtonOtherNoSMS.Checked -eq $true) { $OutputBoxOther.ResetText() } $ProgressBarOther.Value = 0 if (-not($ButtonInstallOther.Text -eq "Create")) { $ButtonInstallOther.Text = "Create" } Write-OutputBox -OutputBoxMessage "No SMS on drive selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Click on the Create button to create a NO_SMS_ON_DRIVE.SMS file that will instruct ConfigMgr not to use the drive for content, binaries etc" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module EAD Interactive-OtherControlVisibility -Mode Disable -Module ADK Interactive-OtherControlVisibility -Mode Disable -Module WSUS Interactive-OtherControlVisibility -Mode Disable -Module SMC $TabPageOther.Controls.AddRange(@($ComboBoxOtherNoSMS, $GBNoSMS)) $FixedDriveDeviceIDs = Get-WmiObject -Class Win32_LogicalDisk -ComputerName $env:COMPUTERNAME -Filter "DriveType = '3'" | Select-Object -ExpandProperty DeviceID | Sort-Object $ComboBoxOtherNoSMS.Items.AddRange(@($FixedDriveDeviceIDs)) Interactive-OtherControlVisibility -Mode Enable -Module NoSMS }) $RadioButtonOnline = New-Object System.Windows.Forms.RadioButton $RadioButtonOnline.Location = New-Object System.Drawing.Size(20,417) $RadioButtonOnline.Size = New-Object System.Drawing.Size(60,24) $RadioButtonOnline.Text = "Online" $RadioButtonOffline = New-Object System.Windows.Forms.RadioButton $RadioButtonOffline.Location = New-Object System.Drawing.Size(90,417) $RadioButtonOffline.Size = New-Object System.Drawing.Size(60,24) $RadioButtonOffline.Text = "Offline" $RadioButtonSMCLocal = New-Object System.Windows.Forms.RadioButton $RadioButtonSMCLocal.Location = New-Object System.Drawing.Size(20,392) $RadioButtonSMCLocal.Size = New-Object System.Drawing.Size(15,24) $RadioButtonSMCLocal.Add_Click({$TextBoxSMCRemote.Enabled = $false}) $RadioButtonSMCRemote = New-Object System.Windows.Forms.RadioButton $RadioButtonSMCRemote.Location = New-Object System.Drawing.Size(200,392) $RadioButtonSMCRemote.Size = New-Object System.Drawing.Size(15,24) $RadioButtonSMCRemote.Add_Click({$TextBoxSMCRemote.Enabled = $true}) $RadioButtonWID = New-Object System.Windows.Forms.RadioButton $RadioButtonWID.Location = New-Object System.Drawing.Size(20,417) $RadioButtonWID.Size = New-Object System.Drawing.Size(60,24) $RadioButtonWID.Text = "WID" $RadioButtonWID.Checked = $true $RadioButtonWID.Add_Click({ $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance.Enabled = $false $OutputBox.Clear() }) $RadioButtonSQL = New-Object System.Windows.Forms.RadioButton $RadioButtonSQL.Location = New-Object System.Drawing.Size(90,427) $RadioButtonSQL.Size = New-Object System.Drawing.Size(45,24) $RadioButtonSQL.Text = "SQL" $RadioButtonSQL.Add_Click({ $TextBoxWSUSSQLServer.Enabled = $true $TextBoxWSUSSQLInstance.Enabled = $true Write-OutputBox -OutputBoxMessage "Specify the SQL Server computer name and instance name in the fields below" -Type "INFO: " Write-OutputBox -OutputBoxMessage "Leave the instance field empty if you're using the default instance on the SQL Server" -Type "INFO: " }) $CBValidationOverride = New-Object System.Windows.Forms.CheckBox $CBValidationOverride.Location = New-Object System.Drawing.Size(30,205) $CBValidationOverride.Size = New-Object System.Drawing.Size(180,20) $CBValidationOverride.Text = "Override validation results" $CBValidationOverride.Name = "ValidationOverride" $CBValidationOverride.Add_CheckedChanged({ switch ($CBValidationOverride.Checked) { $true { Interactive-TabPages -Mode Enable } $false { Interactive-TabPages -Mode Disable } } }) $CBSMCCreate = New-Object System.Windows.Forms.CheckBox $CBSMCCreate.Location = New-Object System.Drawing.Size(10,425) $CBSMCCreate.Size = New-Object System.Drawing.Size(250,20) $CBSMCCreate.Text = "Create the System Management container" $CBSMCCreate.Name = "SMC" $CBCASDownloadPrereqs = New-Object System.Windows.Forms.CheckBox $CBCASDownloadPrereqs.Location = New-Object System.Drawing.Size(10,425) $CBCASDownloadPrereqs.Size = New-Object System.Drawing.Size(190,20) $CBCASDownloadPrereqs.Text = "Download prerequisite files" $CBPrimaryDownloadPrereqs = New-Object System.Windows.Forms.CheckBox $CBPrimaryDownloadPrereqs.Location = New-Object System.Drawing.Size(10,425) $CBPrimaryDownloadPrereqs.Size = New-Object System.Drawing.Size(190,20) $CBPrimaryDownloadPrereqs.Text = "Download prerequisite files" $GBGeneralValidation = New-Object System.Windows.Forms.GroupBox $GBGeneralValidation.Location = New-Object System.Drawing.Size(20,20) $GBGeneralValidation.Size = New-Object System.Drawing.Size(220,210) $GBGeneralValidation.Text = "Validation checks" $GBGeneralVersion = New-Object System.Windows.Forms.GroupBox $GBGeneralVersion.Location = New-Object System.Drawing.Size(20,250) $GBGeneralVersion.Size = New-Object System.Drawing.Size(220,110) $GBGeneralVersion.Text = "Supported ConfigMgr versions" $GBGeneralReboot = New-Object System.Windows.Forms.GroupBox $GBGeneralReboot.Location = New-Object System.Drawing.Size(30,35) $GBGeneralReboot.Size = New-Object System.Drawing.Size(200,40) $GBGeneralOS = New-Object System.Windows.Forms.GroupBox $GBGeneralOS.Location = New-Object System.Drawing.Size(30,75) $GBGeneralOS.Size = New-Object System.Drawing.Size(200,40) $GBGeneralPS = New-Object System.Windows.Forms.GroupBox $GBGeneralPS.Location = New-Object System.Drawing.Size(30,115) $GBGeneralPS.Size = New-Object System.Drawing.Size(200,40) $GBGeneralElevated = New-Object System.Windows.Forms.GroupBox $GBGeneralElevated.Location = New-Object System.Drawing.Size(30,155) $GBGeneralElevated.Size = New-Object System.Drawing.Size(200,40) $GBSiteSystemRoles = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRoles.Location = New-Object System.Drawing.Size(10,10) $GBSiteSystemRoles.Size = New-Object System.Drawing.Size(190,350) $GBSiteSystemRoles.Text = "Select a Site System Role" $GBSiteSystemRoles.Name = "Option Site System Roles" $GBSiteSystemRolesMP = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesMP.Location = New-Object System.Drawing.Size(10,410) $GBSiteSystemRolesMP.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesMP.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesMP.Name = "MP" $GBSiteSystemRolesDP = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesDP.Location = New-Object System.Drawing.Size(10,410) $GBSiteSystemRolesDP.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesDP.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesDP.Name = "DP" $GBSiteSystemRolesAppCat = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesAppCat.Location = New-Object System.Drawing.Size(10,410) $GBSiteSystemRolesAppCat.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesAppCat.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesAppCat.Name = "AppCat" $GBSiteSystemRolesEP = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesEP.Location = New-Object System.Drawing.Size(190,410) $GBSiteSystemRolesEP.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesEP.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesEP.Name = "EP" $GBSiteSystemRolesSMP = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesSMP.Location = New-Object System.Drawing.Size(10,410) $GBSiteSystemRolesSMP.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesSMP.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesSMP.Name = "SMP" $GBOther = New-Object System.Windows.Forms.GroupBox $GBOther.Location = New-Object System.Drawing.Size(10,10) $GBOther.Size = New-Object System.Drawing.Size(200,350) $GBOther.Text = "Make a selection" $GBOther.Name = "Option Make a selection" $GBADK = New-Object System.Windows.Forms.GroupBox $GBADK.Location = New-Object System.Drawing.Size(10,410) $GBADK.Size = New-Object System.Drawing.Size(150,45) $GBADK.Text = "Installation methods" $GBADK.Name = "ADK" $GBADKVersion = New-Object System.Windows.Forms.GroupBox $GBADKVersion.Location = New-Object System.Drawing.Size(170,410) $GBADKVersion.Size = New-Object System.Drawing.Size(150,45) $GBADKVersion.Text = "Version" $GBADKVersion.Name = "ADK" $GBWSUS = New-Object System.Windows.Forms.GroupBox $GBWSUS.Location = New-Object System.Drawing.Size(10,410) $GBWSUS.Size = New-Object System.Drawing.Size(130,45) $GBWSUS.Text = "Database options" $GBWSUS.Name = "WSUS" $GBWSUSSQL = New-Object System.Windows.Forms.GroupBox $GBWSUSSQL.Location = New-Object System.Drawing.Size(150,410) $GBWSUSSQL.Size = New-Object System.Drawing.Size(310,45) $GBWSUSSQL.Text = "SQL Server details" $GBWSUSSQL.Name = "WSUS" $GBExtendAD = New-Object System.Windows.Forms.GroupBox $GBExtendAD.Location = New-Object System.Drawing.Size(10,410) $GBExtendAD.Size = New-Object System.Drawing.Size(190,45) $GBExtendAD.Text = "Schema Master server name" $GBExtendAD.Name = "EAD" $GBSystemManagementContainer = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainer.Location = New-Object System.Drawing.Size(10,375) $GBSystemManagementContainer.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainer.Text = "Add computer account to the System Management container" $GBSystemManagementContainerGroup = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainerGroup.Location = New-Object System.Drawing.Size(10,375) $GBSystemManagementContainerGroup.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainerGroup.Text = "Selected Active Directory group" $GBSystemManagementContainerGroupSearch = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainerGroupSearch.Location = New-Object System.Drawing.Size(10,10) $GBSystemManagementContainerGroupSearch.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainerGroupSearch.Text = "Search for an Active Directory group" $GBNoSMS = New-Object System.Windows.Forms.GroupBox $GBNoSMS.Location = New-Object System.Drawing.Size(10,410) $GBNoSMS.Size = New-Object System.Drawing.Size(150,45) $GBNoSMS.Text = "Select drive" $GBNoSMS.Name = "NoSMS" $GBEP = New-Object System.Windows.Forms.GroupBox $GBEP.Location = New-Object System.Drawing.Size(10,410) $GBEP.Size = New-Object System.Drawing.Size(170,45) $GBEP.Text = "Select a site system role" $GBEP.Name = "EP" $ComboBoxSiteRolesEP = New-Object System.Windows.Forms.ComboBox $ComboBoxSiteRolesEP.Location = New-Object System.Drawing.Size(20,427) $ComboBoxSiteRolesEP.Size = New-Object System.Drawing.Size(150,20) $ComboBoxSiteRolesEP.DropDownStyle = "DropDownList" $ComboBoxSiteRolesEP.Items.AddRange(@("Enrollment Point","Enrollment Proxy Point")) $ComboBoxSiteRolesEP.Name = "EP" $ComboBoxOtherWSUS = New-Object System.Windows.Forms.ComboBox $ComboBoxOtherWSUS.Location = New-Object System.Drawing.Size(20,427) $ComboBoxOtherWSUS.Size = New-Object System.Drawing.Size(110,20) $ComboBoxOtherWSUS.DropDownStyle = "DropDownList" $ComboBoxOtherWSUS.Items.AddRange(@("SQL","WID")) $ComboBoxOtherWSUS.Name = "WSUS" $ComboBoxOtherWSUS.Add_SelectedValueChanged({ if ($ComboBoxOtherWSUS.SelectedItem -eq "SQL") { $TextBoxWSUSSQLServer.Enabled = $true $TextBoxWSUSSQLInstance.Enabled = $true } if ($ComboBoxOtherWSUS.SelectedItem -eq "WID") { $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance.Enabled = $false } }) $ComboBoxOtherADK = New-Object System.Windows.Forms.ComboBox $ComboBoxOtherADK.Location = New-Object System.Drawing.Size(20,427) $ComboBoxOtherADK.Size = New-Object System.Drawing.Size(130,20) $ComboBoxOtherADK.DropDownStyle = "DropDownList" $ComboBoxOtherADK.Items.AddRange(@("Online","Offline")) $ComboBoxOtherADK.SelectedIndex = "0" $ComboBoxOtherADK.Name = "ADK" $ComboBoxOtherADKVersion = New-Object System.Windows.Forms.ComboBox $ComboBoxOtherADKVersion.Location = New-Object System.Drawing.Size(180,427) $ComboBoxOtherADKVersion.Size = New-Object System.Drawing.Size(130,20) $ComboBoxOtherADKVersion.DropDownStyle = "DropDownList" $ComboBoxOtherADKVersion.Items.AddRange(@("Windows ADK 10","Windows ADK 8.1")) $ComboBoxOtherADKVersion.SelectedIndex = "0" $ComboBoxOtherADKVersion.Name = "ADK" $ComboBoxOtherNoSMS = New-Object System.Windows.Forms.ComboBox $ComboBoxOtherNoSMS.Location = New-Object System.Drawing.Size(20,427) $ComboBoxOtherNoSMS.Size = New-Object System.Drawing.Size(130,20) $ComboBoxOtherNoSMS.DropDownStyle = "DropDownList" $ComboBoxOtherNoSMS.Name = "NoSMS" Load-Form
combined_dataset/train/non-malicious/Add Voice to Powershell_1.ps1
Add Voice to Powershell_1.ps1
### # Description: Add Voice to Powershell # Version: 1.1 (11 Nov 2008) # Mike Hays / www.mike-hays.net / blog.mike-hays.net # Virtualization, Powershell, and more... ### # This is the actual speaking part. I cheat by adding spaces # (This makes the word sound right). $spokenText = "Super ca li fragilistic expi alidocious" # Create an object that represents the COM SAPI.SpVoice $voice = New-Object -com SAPI.SpVoice # Get the list of available voices $voiceList = $voice.GetVoices() # This script prefers using LH Michelle as a stand-in for Mary Poppins, # but I can't be sure that she exists on all computers, so I check for that. # She comes with some installations of Microsoft Word 2003. $voiceDescList = @() for ($i=0; $i -lt $voiceList.Count; $i++) { $voiceDescList += $voiceList.Item($i).GetDescription() } if ($voiceDescList -contains "LH Michelle") { $voiceMember = "Name=LH Michelle" } else { # This is the default voice if LH Michelle doesn't exist. # This will probably be Microsoft Sam $voiceMember = "Name=" + $voiceDescList[0] } $voiceToUse = $voice.GetVoices($voiceMember) # This sets the voice property on the COM object $voice.Voice = $voiceToUse.Item(0) # This actually does the speaking. [void] $voice.Speak($spokenText) # She's no Julie Andrews, but she'll say what you want. # END
combined_dataset/train/non-malicious/sample_17_61.ps1
sample_17_61.ps1
#************************************************ # DC_RDSRDWeb.ps1 # Version 1.0.1 # Date: 21-01-2012 # Author: Daniel Grund - dgrund@microsoft.com # Description: # This script gets the IIS config # 1.0.0 Beta release # 1.0.1 Release # TODO get windows\web\rdweb dir #************************************************ PARAM( [string] $TargetHost = "localhost", $OutputFileName ) $IISConfig = (C:\WINDOWS\SYSTEM32\INETSRV\APPCMD list config) if ($null -ne $IISConfig) { $savepath = $TargetHost + "_IISConfig.txt" [array]$OutputFileName += $savepath $IISConfig | Out-File $savepath } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD9+PNMwhf5kMaz # ON0qnIh8J95W070RF7L2itRGeWpnAKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHw6 # tntOk1lPhNQIhgUoYfH6CzKvo1vPCW2gQcBubJSKMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAeBiLxwUfwvm9xS4kx4c1B0IiHtuHX6zqKKTC # tnAp3X5ysglB7HFXtG9XB8fnU1itkIPAADdgm5C81hWUFMl8Vsi6/KEuFAiUQlmO # iCPCrkbybkuANtxs3R1oK2cgrTWPI7CbsnnYV2aSWBTjfLvJpN6uvHatvuzP9fHA # cVI4O5fQXgfJLmZzhF3lGBiMRJU+/R3d/KPFkEGI18WWErUJ/gneNvNXqGZ61Ebm # xWZ99UwT6jrCa0m0jCVVRDt54cK69GOnOpUrZ6fvU3yFVcGSgZpyxqpUMDiEEyMR # t2D5ctAKg6vwgQ0d3bwMvFDF5XcurBrb7jBJJzikpYprhMUewKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAObf0SNhXvlcvDynyKAVha097GqFfnlzX3 # bChIO4FDMwIGZusiCs74GBMyMDI0MTAyODExNDA0NC41MjRaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgPhnK8zlpV74QlpVhujWfRv9Vm/R8AkS8oLwnHxgw6lcwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAG4Wyjhtnzsyw4+eYkRaTI0tv8wgSZDboX6h # GsoawSosl8e/kTZqfcYNgUeVByOAK6NZblCFGQ94cJLpJAvgtUs+3fQUlFaaleJI # XrPrYarkjQSA/ZGfYZ/zK1KMYTDZH5L4Mg3biXAGPDJHUwzQ97n+fjmhS90A7E1m # qj2s9+sdEGiqq5mckIEqvwLeZfEOYFuqxXoiFRxwBznbI3OGSfds4dM3C4izJGjB # 8gRCCzHuJXoSxiUe4eGVtKy3n1en0UvIbFgua/hbwmYwlI/i6F0Wj8J+uI8geE7t # kHC1PTUgpvTlLejsv7tZwCkVITKpe7PBhs2skUKYt1t3FZTCaZvBY+uWLuUNTe2B # CCz5C7IgmAGr2wMbTIZqgM6KbZq/KO9RXV9PKdVUdmZMVYZle740OAQVCfIrHXbQ # HIqbiq603btotoqvxdsR6zjclxxIAz6vmcFKtZBGzR3vdTmoP2kjpwc7pfQSk/mQ # gm2tS6i8iluRdbbdFyT5ZD1nWOy0OBRwKvTXuuiYmjj3oF329mdXNqUcZ21HompX # iGbb3f8/AUvShL/1PxQNmH9+Po1EyzwDOyW3aANQzsVQoRWamebwuhS/OywlbzAI # etf3DMT8pdOnIgCG8BSdTOdfKeCBxHNUp52yPA06vQcDwbrq0slJH2OLVgEnHd6Z # wCpoeHYz # SIG # End signature block
combined_dataset/train/non-malicious/854.ps1
854.ps1
$resourceGroup = "bloblisttestrg" $storageAccountName = "contosobloblisttest" $containerName = "listtestblobs" $storageAccount = Get-AzStorageAccount ` -ResourceGroupName $resourceGroup ` -Name $storageAccountName $ctx = $storageAccount.Context $listOfBLobs = Get-AzStorageBlob -Container $ContainerName -Context $ctx $length = 0 $listOfBlobs | ForEach-Object {$length = $length + $_.Length} Write-Host "List of Blobs and their size (length)" Write-Host " " $listOfBlobs | select Name, Length Write-Host " " Write-Host "Total Length = " $length
combined_dataset/train/non-malicious/492.ps1
492.ps1
function Set-EnvironmentVariableValue{ [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Name, [Parameter(Mandatory=$true)] [String] $Value, [Parameter(Mandatory=$true)] [String] $Target, [Switch] $Add ) [Environment]::GetEnvironmentVariable($Name,$Target) | %{ if(-not $_.Contains($Value) -and $Add){ Write-Host "Adding value: $Value to variable: $Name" $Value = ("$_" + $Value) [Environment]::SetEnvironmentVariable($Name, $Value, $Target) Invoke-Expression "`$env:$Name = `"$Value`"" }elseif(-not $Add){ Write-Host "Set value: $Value on variable: $Name" [Environment]::SetEnvironmentVariable($Name,$Value,$Target) Invoke-Expression "`$env:$Name = `"$Value`"" } } }
combined_dataset/train/non-malicious/3053.ps1
3053.ps1
Set-StrictMode -Version Latest InModuleScope Pester { Describe "Should -FileContentMatch" { Context "when testing file contents" { Setup -File "test.txt" "this is line 1$([System.Environment]::NewLine)rush is awesome$([System.Environment]::NewLine)And this is Unicode: ☺" It "returns true if the file contains the specified content" { "$TestDrive\test.txt" | Should FileContentMatch rush "$TestDrive\test.txt" | Should -FileContentMatch rush } It "returns true if the file contains the specified content with different case" { "$TestDrive\test.txt" | Should FileContentMatch RUSH "$TestDrive\test.txt" | Should -FileContentMatch RUSH } It "returns false if the file does not contain the specified content" { "$TestDrive\test.txt" | Should Not FileContentMatch slime "$TestDrive\test.txt" | Should -Not -FileContentMatch slime } It "returns true if the file contains the specified UTF8 content" { "$TestDrive\test.txt" | Should FileContentMatch "☺" "$TestDrive\test.txt" | Should -FileContentMatch "☺" } } It 'returns correct assertion message when' { $path = 'TestDrive:\file.txt' 'abc' | Set-Content -Path $path $err = { $path | Should -FileContentMatch 'g' -Because 'reason' } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal "Expected 'g' to be found in file 'TestDrive:\file.txt', because reason, but it was not found." } } Describe "Should -Not -FileContentMatch" { It 'returns correct assertion message' { $path = 'TestDrive:\file.txt' 'abc' | Set-Content -Path $path $err = { $path | Should -Not -FileContentMatch 'a' -Because 'reason' } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal "Expected 'a' to not be found in file 'TestDrive:\file.txt', because reason, but it was found." } } }
combined_dataset/train/non-malicious/Test-Port_7.ps1
Test-Port_7.ps1
Param([string]$srv,$port=135,$timeout=3000,[switch]$verbose) # Test-Port.ps1 # Does a TCP connection on specified port (135 by default) $ErrorActionPreference = "SilentlyContinue" # Create TCP Client $tcpclient = new-Object system.Net.Sockets.TcpClient # Tell TCP Client to connect to machine on Port $iar = $tcpclient.BeginConnect($srv,$port,$null,$null) # Set the wait time $wait = $iar.AsyncWaitHandle.WaitOne($timeout,$false) # Check to see if the connection is done if(!$wait) { # Close the connection and report timeout $tcpclient.Close() if($verbose){Write-Host "Connection Timeout"} Return $false } else { # Close the connection and report the error if there is one $error.Clear() $tcpclient.EndConnect($iar) | out-Null if(!$?){if($verbose){write-host $error[0]};$failed = $true} $tcpclient.Close() } # Return $true if connection Establish else $False if($failed){return $false}else{return $true}
combined_dataset/train/non-malicious/sample_36_76.ps1
sample_36_76.ps1
# # Module manifest for module 'OCI.PSModules.Networkfirewall' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkfirewall.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6a784c1a-dca2-489e-beb9-d910537df35b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkfirewall Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkfirewall.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkfirewall', 'Get-OCINetworkfirewallAddressList', 'Get-OCINetworkfirewallAddressListsList', 'Get-OCINetworkfirewallApplication', 'Get-OCINetworkfirewallApplicationGroup', 'Get-OCINetworkfirewallApplicationGroupsList', 'Get-OCINetworkfirewallApplicationsList', 'Get-OCINetworkfirewallDecryptionProfile', 'Get-OCINetworkfirewallDecryptionProfilesList', 'Get-OCINetworkfirewallDecryptionRule', 'Get-OCINetworkfirewallDecryptionRulesList', 'Get-OCINetworkfirewallMappedSecret', 'Get-OCINetworkfirewallMappedSecretsList', 'Get-OCINetworkfirewallPoliciesList', 'Get-OCINetworkfirewallPolicy', 'Get-OCINetworkfirewallSecurityRule', 'Get-OCINetworkfirewallSecurityRulesList', 'Get-OCINetworkfirewallService', 'Get-OCINetworkfirewallServiceList', 'Get-OCINetworkfirewallServiceListsList', 'Get-OCINetworkfirewallServicesList', 'Get-OCINetworkfirewallsList', 'Get-OCINetworkfirewallUrlList', 'Get-OCINetworkfirewallUrlListsList', 'Get-OCINetworkfirewallWorkRequest', 'Get-OCINetworkfirewallWorkRequestErrorsList', 'Get-OCINetworkfirewallWorkRequestLogsList', 'Get-OCINetworkfirewallWorkRequestsList', 'Invoke-OCINetworkfirewallApplyNetworkFirewallPolicy', 'Invoke-OCINetworkfirewallBulkUploadAddressLists', 'Invoke-OCINetworkfirewallBulkUploadApplicationGroups', 'Invoke-OCINetworkfirewallBulkUploadApplications', 'Invoke-OCINetworkfirewallBulkUploadDecryptionProfiles', 'Invoke-OCINetworkfirewallBulkUploadDecryptionRules', 'Invoke-OCINetworkfirewallBulkUploadMappedSecrets', 'Invoke-OCINetworkfirewallBulkUploadSecurityRules', 'Invoke-OCINetworkfirewallBulkUploadServiceLists', 'Invoke-OCINetworkfirewallBulkUploadServices', 'Invoke-OCINetworkfirewallBulkUploadUrlLists', 'Invoke-OCINetworkfirewallCloneNetworkFirewallPolicy', 'Invoke-OCINetworkfirewallMigrateNetworkFirewallPolicy', 'Move-OCINetworkfirewallCompartment', 'Move-OCINetworkfirewallPolicyCompartment', 'New-OCINetworkfirewall', 'New-OCINetworkfirewallAddressList', 'New-OCINetworkfirewallApplication', 'New-OCINetworkfirewallApplicationGroup', 'New-OCINetworkfirewallDecryptionProfile', 'New-OCINetworkfirewallDecryptionRule', 'New-OCINetworkfirewallMappedSecret', 'New-OCINetworkfirewallPolicy', 'New-OCINetworkfirewallSecurityRule', 'New-OCINetworkfirewallService', 'New-OCINetworkfirewallServiceList', 'New-OCINetworkfirewallUrlList', 'Remove-OCINetworkfirewall', 'Remove-OCINetworkfirewallAddressList', 'Remove-OCINetworkfirewallApplication', 'Remove-OCINetworkfirewallApplicationGroup', 'Remove-OCINetworkfirewallDecryptionProfile', 'Remove-OCINetworkfirewallDecryptionRule', 'Remove-OCINetworkfirewallMappedSecret', 'Remove-OCINetworkfirewallPolicy', 'Remove-OCINetworkfirewallSecurityRule', 'Remove-OCINetworkfirewallService', 'Remove-OCINetworkfirewallServiceList', 'Remove-OCINetworkfirewallUrlList', 'Stop-OCINetworkfirewallWorkRequest', 'Update-OCINetworkfirewall', 'Update-OCINetworkfirewallAddressList', 'Update-OCINetworkfirewallApplication', 'Update-OCINetworkfirewallApplicationGroup', 'Update-OCINetworkfirewallDecryptionProfile', 'Update-OCINetworkfirewallDecryptionRule', 'Update-OCINetworkfirewallMappedSecret', 'Update-OCINetworkfirewallPolicy', 'Update-OCINetworkfirewallSecurityRule', 'Update-OCINetworkfirewallService', 'Update-OCINetworkfirewallServiceList', 'Update-OCINetworkfirewallUrlList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkfirewall' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/LetterDiamondOneliner v2.ps1
LetterDiamondOneliner v2.ps1
&{param([char]$c)[int]$s=65;$p=$c-$s;$r=,(' '*$p+[char]$s);$r+=@(do{"{0,$p} {1}{0}"-f([char]++$s),(' '*$f++)}until(!--$p));$r;$r[-2..-99]}Z
combined_dataset/train/non-malicious/sample_55_43.ps1
sample_55_43.ps1
# # Module manifest for module 'OCI.PSModules.Datasafe' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datasafe.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'acae3050-5046-4f4b-812f-d87bfcb51ba7' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datasafe Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datasafe.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatasafeMaskingColumnsFromSdm', 'Edit-OCIDatasafeGlobalSettings', 'Enable-OCIDatasafeConfiguration', 'Enable-OCIDatasafeTargetDatabase', 'Get-OCIDatasafeAlert', 'Get-OCIDatasafeAlertAnalyticsList', 'Get-OCIDatasafeAlertPoliciesList', 'Get-OCIDatasafeAlertPolicy', 'Get-OCIDatasafeAlertPolicyRule', 'Get-OCIDatasafeAlertPolicyRulesList', 'Get-OCIDatasafeAlertsList', 'Get-OCIDatasafeAuditArchiveRetrieval', 'Get-OCIDatasafeAuditArchiveRetrievalsList', 'Get-OCIDatasafeAuditEventAnalyticsList', 'Get-OCIDatasafeAuditEventsList', 'Get-OCIDatasafeAuditPoliciesList', 'Get-OCIDatasafeAuditPolicy', 'Get-OCIDatasafeAuditPolicyAnalyticsList', 'Get-OCIDatasafeAuditProfile', 'Get-OCIDatasafeAuditProfileAnalyticsList', 'Get-OCIDatasafeAuditProfilesList', 'Get-OCIDatasafeAuditTrail', 'Get-OCIDatasafeAuditTrailAnalyticsList', 'Get-OCIDatasafeAuditTrailsList', 'Get-OCIDatasafeAvailableAuditVolumesList', 'Get-OCIDatasafeCollectedAuditVolumesList', 'Get-OCIDatasafeColumnsList', 'Get-OCIDatasafeCompatibleFormatsForDataTypes', 'Get-OCIDatasafeCompatibleFormatsForSensitiveTypes', 'Get-OCIDatasafeConfiguration', 'Get-OCIDatasafeDatabaseSecurityConfig', 'Get-OCIDatasafeDatabaseSecurityConfigsList', 'Get-OCIDatasafeDatabaseTableAccessEntriesList', 'Get-OCIDatasafeDatabaseTableAccessEntry', 'Get-OCIDatasafeDatabaseViewAccessEntriesList', 'Get-OCIDatasafeDatabaseViewAccessEntry', 'Get-OCIDatasafeDifferenceColumn', 'Get-OCIDatasafeDifferenceColumnsList', 'Get-OCIDatasafeDiscoveryAnalyticsList', 'Get-OCIDatasafeDiscoveryJob', 'Get-OCIDatasafeDiscoveryJobResult', 'Get-OCIDatasafeDiscoveryJobResultsList', 'Get-OCIDatasafeDiscoveryJobsList', 'Get-OCIDatasafeFindingAnalyticsList', 'Get-OCIDatasafeFindingsChangeAuditLogsList', 'Get-OCIDatasafeFindingsList', 'Get-OCIDatasafeGrantsList', 'Get-OCIDatasafeLibraryMaskingFormat', 'Get-OCIDatasafeLibraryMaskingFormatsList', 'Get-OCIDatasafeMaskedColumnsList', 'Get-OCIDatasafeMaskingAnalyticsList', 'Get-OCIDatasafeMaskingColumn', 'Get-OCIDatasafeMaskingColumnsList', 'Get-OCIDatasafeMaskingObjectsList', 'Get-OCIDatasafeMaskingPoliciesList', 'Get-OCIDatasafeMaskingPolicy', 'Get-OCIDatasafeMaskingPolicyHealthReport', 'Get-OCIDatasafeMaskingPolicyHealthReportLogsList', 'Get-OCIDatasafeMaskingPolicyHealthReportsList', 'Get-OCIDatasafeMaskingReport', 'Get-OCIDatasafeMaskingReportsList', 'Get-OCIDatasafeMaskingSchemasList', 'Get-OCIDatasafeOnPremConnector', 'Get-OCIDatasafeOnPremConnectorsList', 'Get-OCIDatasafePeerTargetDatabase', 'Get-OCIDatasafePeerTargetDatabasesList', 'Get-OCIDatasafePrivateEndpoint', 'Get-OCIDatasafePrivateEndpointsList', 'Get-OCIDatasafeProfile', 'Get-OCIDatasafeProfileAnalyticsList', 'Get-OCIDatasafeProfileSummariesList', 'Get-OCIDatasafeReport', 'Get-OCIDatasafeReportContent', 'Get-OCIDatasafeReportDefinition', 'Get-OCIDatasafeReportDefinitionsList', 'Get-OCIDatasafeReportsList', 'Get-OCIDatasafeRoleGrantPathsList', 'Get-OCIDatasafeRolesList', 'Get-OCIDatasafeSchemasList', 'Get-OCIDatasafeSdmMaskingPolicyDifference', 'Get-OCIDatasafeSdmMaskingPolicyDifferencesList', 'Get-OCIDatasafeSecurityAssessment', 'Get-OCIDatasafeSecurityAssessmentComparison', 'Get-OCIDatasafeSecurityAssessmentsList', 'Get-OCIDatasafeSecurityFeatureAnalyticsList', 'Get-OCIDatasafeSecurityFeaturesList', 'Get-OCIDatasafeSecurityPoliciesList', 'Get-OCIDatasafeSecurityPolicy', 'Get-OCIDatasafeSecurityPolicyDeployment', 'Get-OCIDatasafeSecurityPolicyDeploymentsList', 'Get-OCIDatasafeSecurityPolicyEntryState', 'Get-OCIDatasafeSecurityPolicyEntryStatesList', 'Get-OCIDatasafeSecurityPolicyReport', 'Get-OCIDatasafeSecurityPolicyReportsList', 'Get-OCIDatasafeSensitiveColumn', 'Get-OCIDatasafeSensitiveColumnsList', 'Get-OCIDatasafeSensitiveDataModel', 'Get-OCIDatasafeSensitiveDataModelSensitiveTypesList', 'Get-OCIDatasafeSensitiveDataModelsList', 'Get-OCIDatasafeSensitiveObjectsList', 'Get-OCIDatasafeSensitiveSchemasList', 'Get-OCIDatasafeSensitiveType', 'Get-OCIDatasafeSensitiveTypesList', 'Get-OCIDatasafeSqlCollection', 'Get-OCIDatasafeSqlCollectionAnalyticsList', 'Get-OCIDatasafeSqlCollectionLogInsightsList', 'Get-OCIDatasafeSqlCollectionsList', 'Get-OCIDatasafeSqlFirewallAllowedSqlAnalyticsList', 'Get-OCIDatasafeSqlFirewallAllowedSqlsList', 'Get-OCIDatasafeSqlFirewallPoliciesList', 'Get-OCIDatasafeSqlFirewallPolicy', 'Get-OCIDatasafeSqlFirewallPolicyAnalyticsList', 'Get-OCIDatasafeSqlFirewallViolationAnalyticsList', 'Get-OCIDatasafeSqlFirewallViolationsList', 'Get-OCIDatasafeTablesList', 'Get-OCIDatasafeTargetAlertPolicyAssociation', 'Get-OCIDatasafeTargetAlertPolicyAssociationsList', 'Get-OCIDatasafeTargetDatabase', 'Get-OCIDatasafeTargetDatabasesList', 'Get-OCIDatasafeUserAccessAnalyticsList', 'Get-OCIDatasafeUserAnalyticsList', 'Get-OCIDatasafeUserAssessment', 'Get-OCIDatasafeUserAssessmentComparison', 'Get-OCIDatasafeUserAssessmentsList', 'Get-OCIDatasafeUsersList', 'Get-OCIDatasafeWorkRequest', 'Get-OCIDatasafeWorkRequestErrorsList', 'Get-OCIDatasafeWorkRequestLogsList', 'Get-OCIDatasafeWorkRequestsList', 'Invoke-OCIDatasafeAlertsUpdate', 'Invoke-OCIDatasafeApplyDiscoveryJobResults', 'Invoke-OCIDatasafeApplySdmMaskingPolicyDifference', 'Invoke-OCIDatasafeCalculateAuditVolumeAvailable', 'Invoke-OCIDatasafeCalculateAuditVolumeCollected', 'Invoke-OCIDatasafeCompareSecurityAssessment', 'Invoke-OCIDatasafeCompareUserAssessment', 'Invoke-OCIDatasafeDeactivateTargetDatabase', 'Invoke-OCIDatasafeDiscoverAuditTrails', 'Invoke-OCIDatasafeDownloadDiscoveryReport', 'Invoke-OCIDatasafeDownloadMaskingLog', 'Invoke-OCIDatasafeDownloadMaskingPolicy', 'Invoke-OCIDatasafeDownloadMaskingReport', 'Invoke-OCIDatasafeDownloadPrivilegeScript', 'Invoke-OCIDatasafeDownloadSecurityAssessmentReport', 'Invoke-OCIDatasafeDownloadSensitiveDataModel', 'Invoke-OCIDatasafeDownloadUserAssessmentReport', 'Invoke-OCIDatasafeMaskData', 'Invoke-OCIDatasafePatchAlerts', 'Invoke-OCIDatasafePatchDiscoveryJobResults', 'Invoke-OCIDatasafePatchMaskingColumns', 'Invoke-OCIDatasafePatchSdmMaskingPolicyDifferenceColumns', 'Invoke-OCIDatasafePatchSensitiveColumns', 'Invoke-OCIDatasafePatchTargetAlertPolicyAssociation', 'Invoke-OCIDatasafeProvisionAuditPolicy', 'Invoke-OCIDatasafePurgeSqlCollectionLogs', 'Invoke-OCIDatasafeRefreshDatabaseSecurityConfiguration', 'Invoke-OCIDatasafeRefreshSecurityAssessment', 'Invoke-OCIDatasafeRefreshSqlCollectionLogInsights', 'Invoke-OCIDatasafeRefreshTargetDatabase', 'Invoke-OCIDatasafeRefreshUserAssessment', 'Invoke-OCIDatasafeResumeAuditTrail', 'Invoke-OCIDatasafeResumeWorkRequest', 'Invoke-OCIDatasafeRetrieveAuditPolicies', 'Invoke-OCIDatasafeScheduleReport', 'Invoke-OCIDatasafeSetSecurityAssessmentBaseline', 'Invoke-OCIDatasafeSetUserAssessmentBaseline', 'Invoke-OCIDatasafeSuspendWorkRequest', 'Invoke-OCIDatasafeUnsetSecurityAssessmentBaseline', 'Invoke-OCIDatasafeUnsetUserAssessmentBaseline', 'Move-OCIDatasafeAlertCompartment', 'Move-OCIDatasafeAlertPolicyCompartment', 'Move-OCIDatasafeAuditArchiveRetrievalCompartment', 'Move-OCIDatasafeAuditPolicyCompartment', 'Move-OCIDatasafeAuditProfileCompartment', 'Move-OCIDatasafeDatabaseSecurityConfigCompartment', 'Move-OCIDatasafeDiscoveryJobCompartment', 'Move-OCIDatasafeLibraryMaskingFormatCompartment', 'Move-OCIDatasafeMaskingPolicyCompartment', 'Move-OCIDatasafeMaskingPolicyHealthReportCompartment', 'Move-OCIDatasafeOnPremConnectorCompartment', 'Move-OCIDatasafePrivateEndpointCompartment', 'Move-OCIDatasafeReportCompartment', 'Move-OCIDatasafeReportDefinitionCompartment', 'Move-OCIDatasafeRetention', 'Move-OCIDatasafeSdmMaskingPolicyDifferenceCompartment', 'Move-OCIDatasafeSecurityAssessmentCompartment', 'Move-OCIDatasafeSecurityPolicyCompartment', 'Move-OCIDatasafeSecurityPolicyDeploymentCompartment', 'Move-OCIDatasafeSensitiveDataModelCompartment', 'Move-OCIDatasafeSensitiveTypeCompartment', 'Move-OCIDatasafeSqlCollectionCompartment', 'Move-OCIDatasafeSqlFirewallPolicyCompartment', 'Move-OCIDatasafeTargetAlertPolicyAssociationCompartment', 'Move-OCIDatasafeTargetDatabaseCompartment', 'Move-OCIDatasafeUserAssessmentCompartment', 'New-OCIDatasafeAlertPolicy', 'New-OCIDatasafeAlertPolicyRule', 'New-OCIDatasafeAuditArchiveRetrieval', 'New-OCIDatasafeDiscoveryJob', 'New-OCIDatasafeDiscoveryReportForDownload', 'New-OCIDatasafeHealthReport', 'New-OCIDatasafeLibraryMaskingFormat', 'New-OCIDatasafeMaskingColumn', 'New-OCIDatasafeMaskingPolicy', 'New-OCIDatasafeMaskingPolicyForDownload', 'New-OCIDatasafeMaskingReportForDownload', 'New-OCIDatasafeOnPremConnector', 'New-OCIDatasafeOnPremConnectorConfiguration', 'New-OCIDatasafePeerTargetDatabase', 'New-OCIDatasafePrivateEndpoint', 'New-OCIDatasafeReport', 'New-OCIDatasafeReportDefinition', 'New-OCIDatasafeSdmMaskingPolicyDifference', 'New-OCIDatasafeSecurityAssessment', 'New-OCIDatasafeSecurityAssessmentReport', 'New-OCIDatasafeSensitiveColumn', 'New-OCIDatasafeSensitiveDataModel', 'New-OCIDatasafeSensitiveDataModelForDownload', 'New-OCIDatasafeSensitiveType', 'New-OCIDatasafeSqlCollection', 'New-OCIDatasafeSqlFirewallPolicy', 'New-OCIDatasafeTargetAlertPolicyAssociation', 'New-OCIDatasafeTargetDatabase', 'New-OCIDatasafeUserAssessment', 'New-OCIDatasafeUserAssessmentReport', 'Remove-OCIDatasafeAlertPolicy', 'Remove-OCIDatasafeAlertPolicyRule', 'Remove-OCIDatasafeAuditArchiveRetrieval', 'Remove-OCIDatasafeAuditTrail', 'Remove-OCIDatasafeDiscoveryJob', 'Remove-OCIDatasafeDiscoveryJobResult', 'Remove-OCIDatasafeLibraryMaskingFormat', 'Remove-OCIDatasafeMaskingColumn', 'Remove-OCIDatasafeMaskingPolicy', 'Remove-OCIDatasafeMaskingPolicyHealthReport', 'Remove-OCIDatasafeOnPremConnector', 'Remove-OCIDatasafePeerTargetDatabase', 'Remove-OCIDatasafePrivateEndpoint', 'Remove-OCIDatasafeReportDefinition', 'Remove-OCIDatasafeScheduleReport', 'Remove-OCIDatasafeSdmMaskingPolicyDifference', 'Remove-OCIDatasafeSecurityAssessment', 'Remove-OCIDatasafeSensitiveColumn', 'Remove-OCIDatasafeSensitiveDataModel', 'Remove-OCIDatasafeSensitiveType', 'Remove-OCIDatasafeSqlCollection', 'Remove-OCIDatasafeSqlFirewallPolicy', 'Remove-OCIDatasafeTargetAlertPolicyAssociation', 'Remove-OCIDatasafeTargetDatabase', 'Remove-OCIDatasafeUserAssessment', 'Start-OCIDatasafeAuditTrail', 'Start-OCIDatasafeSqlCollection', 'Stop-OCIDatasafeAuditTrail', 'Stop-OCIDatasafeSqlCollection', 'Stop-OCIDatasafeWorkRequest', 'Update-OCIDatasafeAlert', 'Update-OCIDatasafeAlertPolicy', 'Update-OCIDatasafeAlertPolicyRule', 'Update-OCIDatasafeAuditArchiveRetrieval', 'Update-OCIDatasafeAuditPolicy', 'Update-OCIDatasafeAuditProfile', 'Update-OCIDatasafeAuditTrail', 'Update-OCIDatasafeDatabaseSecurityConfig', 'Update-OCIDatasafeFinding', 'Update-OCIDatasafeLibraryMaskingFormat', 'Update-OCIDatasafeMaskingColumn', 'Update-OCIDatasafeMaskingPolicy', 'Update-OCIDatasafeOnPremConnector', 'Update-OCIDatasafeOnPremConnectorWallet', 'Update-OCIDatasafePeerTargetDatabase', 'Update-OCIDatasafePrivateEndpoint', 'Update-OCIDatasafeReport', 'Update-OCIDatasafeReportDefinition', 'Update-OCIDatasafeSdmMaskingPolicyDifference', 'Update-OCIDatasafeSecurityAssessment', 'Update-OCIDatasafeSecurityPolicy', 'Update-OCIDatasafeSecurityPolicyDeployment', 'Update-OCIDatasafeSensitiveColumn', 'Update-OCIDatasafeSensitiveDataModel', 'Update-OCIDatasafeSensitiveType', 'Update-OCIDatasafeSqlCollection', 'Update-OCIDatasafeSqlFirewallPolicy', 'Update-OCIDatasafeTargetAlertPolicyAssociation', 'Update-OCIDatasafeTargetDatabase', 'Update-OCIDatasafeUserAssessment', 'Write-OCIDatasafeMaskingPolicy', 'Write-OCIDatasafeSensitiveDataModel' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datasafe' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1024.ps1
1024.ps1
$endpoint = 'mysftestcluster.southcentralus.cloudapp.azure.com:19000' $thumbprint = '2779F0BB9A969FB88E04915FFE7955D0389DA7AF' $packagepath="C:\Users\sfuser\Documents\Visual Studio 2017\Projects\MyApplication\MyApplication\pkg\Release" Connect-ServiceFabricCluster -ConnectionEndpoint $endpoint ` -KeepAliveIntervalInSec 10 ` -X509Credential -ServerCertThumbprint $thumbprint ` -FindType FindByThumbprint -FindValue $thumbprint ` -StoreLocation CurrentUser -StoreName My Remove-ServiceFabricApplication -ApplicationName fabric:/MyApplication Unregister-ServiceFabricApplicationType -ApplicationTypeName MyApplicationType -ApplicationTypeVersion 1.0.0
combined_dataset/train/non-malicious/sample_65_33.ps1
sample_65_33.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for UrlSigningKeyParameters. .Description Create an in-memory object for UrlSigningKeyParameters. .Outputs Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.UrlSigningKeyParameters .Link https://learn.microsoft.com/powershell/module/az.Cdn/new-AzFrontDoorCdnSecretUrlSigningKeyParametersObject #> function New-AzFrontDoorCdnSecretUrlSigningKeyParametersObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.UrlSigningKeyParameters')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(Mandatory, HelpMessage="Defines the customer defined key Id. This id will exist in the incoming request to indicate the key used to form the hash.")] [string] $KeyId, [Parameter(HelpMessage="Resource ID.")] [string] $SecretSourceId, [Parameter(HelpMessage="Version of the secret to be used.")] [string] $SecretVersion, [Parameter(Mandatory, HelpMessage="The type of the secret resource.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.SecretType])] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.SecretType] $Type ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.UrlSigningKeyParameters]::New() if ($PSBoundParameters.ContainsKey('KeyId')) { $Object.KeyId = $KeyId } if ($PSBoundParameters.ContainsKey('SecretSourceId')) { $Object.SecretSourceId = $SecretSourceId } if ($PSBoundParameters.ContainsKey('SecretVersion')) { $Object.SecretVersion = $SecretVersion } if ($PSBoundParameters.ContainsKey('Type')) { $Object.Type = $Type } return $Object } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDhqWJIGqvXt3FJ # iagxvtDr660yPtsIR48G2fl2QUSMaKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEQmOiyUto4E+hOCUaQfaO0J # wjdTSP5A+zJezbTaXZDQMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhAG5uWfcK+E2AzrK8PB91UOHjWUm1ZjnbZduoA7cBe5IlY/VEuW+mHKE # EvN+FgC48+BUOdeyObK7Kov68eVvCU163VraBfJxcc0F8fT2iUE9aOLHz/w0Cwb0 # jXojA+tVKYn2JxE9WiEqhPSAUyPZKe0KCEAyKpf+cG9y4TdH8twDEiHynfGO8iHs # TVELeNUBOOPU6n+GWT7bXbBJIUl8PQ5bPJ3a/jc5pQv7QO2ItlDbYdMsfz9Oa6H1 # AdBhw0Je0W/Ro8P72VH1lNUdCWAZ7zfx3QeHlU0X2GQrF3cQpKa7dBjVeCTcTHAg # 9o/HSrgTpftsAWOySlbRzQfR0nv/y6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDIUaHbHUHVb5GZefAKE4vOoK6CnKajPZ5Rs6q+egQHywIGZpVaunkJ # GBMyMDI0MDczMTA3MDA0Mi4wMDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6lRHLjAiGA8yMDI0MDczMTA1MTYz # MFoYDzIwMjQwODAxMDUxNjMwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqVEcu # AgEAMAoCAQACAiHaAgH/MAcCAQACAhSWMAoCBQDqVZiuAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEP8vhzBzd5Vu32ANd129s6sjxVLjLIuLcB3VZbTUxwN # IiPkt6k6IfxSJTgc5RY3OXOTSl12RwoiihmXQ8WeRJan3AqHYP1LkXNblNKW73qE # SQtvulzvctgpAIJUoVl+X4N2Lrci3et0FnbQrHyfKbbdwTobGBkjiw2JHZuf/SnW # m/kYO0uz8mDgVFX5CD7hulf/HPaeAeQvlM+gcgp42sE0BREeMdlcvjfcJ1T+4EPA # rgTPtwMlofqLcnyHqWV+pHwap2hkhpIsk0axSt43AijRy5SMdQvvEmC6Dg3pYkKH # UzFWn2ZgoHtRrAR5zB3lsy4fG8vJ85Taw+qbFrZJkd4xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB # 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCA1OTA3o0+gugZbLfE7vS+w+QNeEVuDEjvHlS6YC7+8 # XzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4 # riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgiI9hgtV0ArVoCJOZ89+2jCNO # IowbVP/B/NV/B+BDLNYwDQYJKoZIhvcNAQELBQAEggIAoefTko5u1TEiqoNR0UAK # 5le4tVApNRUy/Ci2I8wij6nOLUvJA3F3ai6mhRBikNCmYEctNBrboHq1TyvYMJDn # XegrKChZyMm5lPkd7BEa66o1M7JIlez9DOl2w8UCitsuIKJG2TK3nuR28k62bi3b # x5/n7jADJIxw+9ysSXcGor+enpagB+moVzdQgdnDmDH6kv8kzNWt6bIlYT/uuCWQ # hd9Vnkv0gfJOkJaQcG3U2LUsZhRyAxR3REAsncK7NTF9hVdWYp/g6E0drZLCaO2E # h6dZgtlnDSZTuJfl6sSn6wEp/LGMJxARFNU/NV3K2NdyfT4NPbgdQsoH1JBHTEpA # Seny0HSbz7krFuBRgRI0fz7fmdfbE3otF/vQzISZKKtvTtLpTH8bhIabJkAKLKU5 # x3MXoACvu+cOvGM/SXAq7bsgIOo2D4NyrY/5rdWHbYGEwXRf7JHSndSB99lQhSwU # K+aI/MaxlZarCWb6DjlaMgV2zZt+b3PfHJWxIX2vkhfVm4eLBGgqWD2/Viyympfk # jv7HmPikKfvI0m/6VRVXaPWBJZPxhLxQ0Ydm8L0pEXv1OMSTuPtwsiunrPI7qWNJ # y163mGlswAful5TYcFsLN5Rwtiyl+oHwxy1FKHTrqfVhsJ+sBVBqybdg7N6ejdGu # LnFwl355T7CrI97twUaQpeQ= # SIG # End signature block
combined_dataset/train/non-malicious/898.ps1
898.ps1
$Random=(New-Guid).ToString().Substring(0,8) $ResourceGroupName="myResourceGroup$Random" $App1Name="AppServiceTM1$Random" $App2Name="AppServiceTM2$Random" $Location1="WestUS" $Location2="EastUS" New-AzResourceGroup -Name $ResourceGroupName -Location $Location1 New-AzTrafficManagerProfile -Name "$ResourceGroupName-tmp" -ResourceGroupName $ResourceGroupName -TrafficRoutingMethod Performance -MonitorPath '/' -MonitorProtocol "HTTP" -RelativeDnsName $ResourceGroupName -Ttl 30 -MonitorPort 80 New-AzAppservicePlan -Name "$App1Name-Plan" -ResourceGroupName $ResourceGroupName -Location $Location1 -Tier Standard New-AzAppservicePlan -Name "$App2Name-Plan" -ResourceGroupName $ResourceGroupName -Location $Location2 -Tier Standard $App1ResourceId=(New-AzWebApp -Name $App1Name -ResourceGroupName $ResourceGroupName -Location $Location1 -AppServicePlan "$App1Name-Plan").Id $App2ResourceId=(New-AzWebApp -Name $App2Name -ResourceGroupName $ResourceGroupName -Location $Location2 -AppServicePlan "$App2Name-Plan").Id New-AzTrafficManagerEndpoint -Name "$App1Name-$Location1" -ResourceGroupName $ResourceGroupName -ProfileName "$ResourceGroupName-tmp" -Type AzureEndpoints -TargetResourceId $App1ResourceId -EndpointStatus "Enabled" New-AzTrafficManagerEndpoint -Name "$App2Name-$Location2" -ResourceGroupName $ResourceGroupName -ProfileName "$ResourceGroupName-tmp" -Type AzureEndpoints -TargetResourceId $App2ResourceId -EndpointStatus "Enabled"
combined_dataset/train/non-malicious/FindNewVirtualMachines.ps1
FindNewVirtualMachines.ps1
#requires -pssnapin VMware.Vimautomation.Core Param( [int] $LastDays ) Process { $EventFilterSpecByTime = New-Object VMware.Vim.EventFilterSpecByTime If ($LastDays) { $EventFilterSpecByTime.BeginTime = (get-date).AddDays(-$($LastDays)) } $EventFilterSpec = New-Object VMware.Vim.EventFilterSpec $EventFilterSpec.Time = $EventFilterSpecByTime $EventFilterSpec.DisableFullMessage = $False $EventFilterSpec.Type = "VmCreatedEvent","VmDeployedEvent","VmClonedEvent","VmDiscoveredEvent","VmRegisteredEvent" $EventManager = Get-View EventManager $NewVmTasks = $EventManager.QueryEvents($EventFilterSpec) Foreach ($Task in $NewVmTasks) { # If VM was deployed from a template then record which template. If ($Task.Template -and $Task.SrcTemplate.Vm) { $srcTemplate = Get-View $Task.SrcTemplate.Vm -Property name | Select -ExpandProperty Name } Else { $srcTemplate = $null } write-output ""|Select-Object @{ Name="Name" Expression={$Task.Vm.name} }, @{ Name="Created" Expression={$Task.CreatedTime} }, @{ Name="UserName" Expression={$Task.UserName} }, @{ Name="Type" Expression={$Task.gettype().name} }, @{ Name="Template" Expression={$srcTemplate} } } }
combined_dataset/train/non-malicious/sample_5_66.ps1
sample_5_66.ps1
ConvertFrom-StringData @' id_dcpromologs=DCPromo id_dcpromologsobtaining=Obtaining DCPromo log files '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEn9Oa7AH8JVFC # C+TqdgFQ1pupY8oeB3tggCm9vU/m96CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAPKep4ktoQ3f75+nPR3JcTS # 0Ge+JqXMY9HKTXrXEkP4MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAKORH0QjYAXk8CNpw7oFmW7m6UV8ZvGnKiUGYP8GRl6KGcTJ2kpi54qcQ # tFAC4vjoloMmSvts86VJKZyUzcrffoi4smbvHZukLGNlVqRZmMcNpcNUXf9CM12O # gJI9iMTKVMiu/I6McNQJUJGbmqviyQYJwdV5eR0HypEmq4GnBVtXoxyCwmgldBco # 9ZvwlAu5piGd5mQArva/GAkuAv1UXMVLVeHfx7xRQJ/2MHZmFUVWF1RyY+pJmsB+ # YmdlQDn5sarnIcFwW7VQU1utNHlcRc4YdRwZQkZiPfYOhpAgRJoZxw5d6Wx5/9nN # vR0CSd7NAmL8W8y3oqyzLl8ec/2iLqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCE1w212BbPRhvANI9zB0sKJTvkx4lucxCisJO6JgadTAIGZus6esnq # GBMyMDI0MTAyODExNDA0My4zNTdaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT # j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt # gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh # 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY # X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd # F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI # J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc # QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry # 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn # Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5 # olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+ # Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ # I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf # hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI # hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut # Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8 # cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo # riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt # g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A # W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm # Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe # bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w # MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9 # YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0MTAyOTA4MjgwN1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEAAgIIXjAHAgEAAgITcTAK # AgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAZdq+OU23EaUch # wQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2DewxIzsFz1t8ELbs/7V+b+lL # Z25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh84y9kT8c5HUYL5kF2NJiq # gHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e72AvfpKtUZO94WfnvRVAu # 4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpUqnrIVhOqTZE0I5GJiVJy # dAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGEu6OFzH+g6bBiUu/Bsmlo # dM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgiptj+Om/CsaL # wnxn/bP5R+lyuCiVqB23Y2KG8VPYLj8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEAAAH5 # MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkHB7rdMA0GCSqGSIb3DQEB # CwUABIICAFHYl4nywpqMOBX3TKGiOcfd2M3KKkTNipB3FRIQcdu+8H+ZllGgmNhG # bFG8v75ay/yKuzMGvhjf/1IEzEZk1FmGMaMPAPOo0HF0ir/KBNC62nU8/xHi4uDw # 6lPn0ep3rqclwL7L/OSr8SvPX41LdIy5NGEG1ldlh4ah4crCc0puewCtMGwKqNM6 # ff1ChSdmgh3t1Z/AXLNiY9zFwVqd4H2ezToqbHGJZdIFSknWQyixmreu1txNzkl1 # OKtWoZaV6Z+KAN3L16ZXbTNjfVXuqauRNGIMGfzlxJG8RGfh776wVgL6TPYEKYh8 # a5OzewLOdYCe1dDOheOuWS1nayVTsX+IOHIEWSUYtQZiidRVILE13RNZcfny9SjD # BQEQpbetKaiOAOfQZuCd9tfiFd1s/jAzTfpzsnNGW7TysLLXWv9POnMIKG49B1RO # bI8XSbJcdnXZJgehAo0U58uGG02Rar1yXMcUUj444lowfMGPB9nr7lDMUgcM9ygl # f8qF2EdirxixS1pN0m3Y5g1a5zDGd3Y2Iu2Pc5dIVEjQD6I1eoMjh54rC3I/Wz/e # Im8kB2uXfSaWdMvFTXJnHoEPgEctx/3/H8Cpn5siDi0urmd4ojcCZmGYN53u6gYQ # 1x7266oBTRQFjA0leT+yha39tUMzhUxmKj17gVfTjbBAIpWdxbYf # SIG # End signature block
combined_dataset/train/non-malicious/New-TiedVariable.ps1
New-TiedVariable.ps1
function New-TiedVariable { #.Synopsis # Creates a ReadOnly variable that recalculates it's value each time it's read #.Description # Create a variable tied to a scriptblock by using a breakpoint ;-) #.Notes # New-TiedVariable uses breakpoints to trigger the automatic recalculation of the variables, so the use of a command like Get-PSBreakPoint | Remove-PSBreakPoint will break any variables created using New-TiedVariable param( # The name of the variable to create [String]$Name, # The scriptblock to use to calculate the value each time [ScriptBlock]$Value ) Set-Variable $Name -Value (.$Value) -Option ReadOnly, AllScope -Scope Global -Force $null = Set-PSBreakpoint -Variable $Name -Mode Read -Action { Set-Variable $Name (. $Value) -Option ReadOnly, AllScope -Scope Global -Force }.GetNewClosure() }
combined_dataset/train/non-malicious/sample_63_37.ps1
sample_63_37.ps1
# # Module manifest for module 'OCI.PSModules.Clusterplacementgroups' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Clusterplacementgroups.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6f928c67-e221-4d6b-8353-9cd39e4754c1' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Clusterplacementgroups Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Clusterplacementgroups.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIClusterplacementgroupsClusterPlacementGroup', 'Get-OCIClusterplacementgroupsClusterPlacementGroup', 'Get-OCIClusterplacementgroupsList', 'Get-OCIClusterplacementgroupsWorkRequest', 'Get-OCIClusterplacementgroupsWorkRequestErrorsList', 'Get-OCIClusterplacementgroupsWorkRequestLogsList', 'Get-OCIClusterplacementgroupsWorkRequestsList', 'Invoke-OCIClusterplacementgroupsDeactivateClusterPlacementGroup', 'Move-OCIClusterplacementgroupsClusterPlacementGroupCompartment', 'New-OCIClusterplacementgroupsClusterPlacementGroup', 'Remove-OCIClusterplacementgroupsClusterPlacementGroup', 'Stop-OCIClusterplacementgroupsWorkRequest', 'Update-OCIClusterplacementgroupsClusterPlacementGroup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Clusterplacementgroups' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1432.ps1
1432.ps1
function Set-CIisWebsiteID { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [string] $SiteName, [Parameter(Mandatory=$true)] [int] $ID ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not (Test-CIisWebsite -Name $SiteName) ) { Write-Error ('Website {0} not found.' -f $SiteName) return } $websiteWithID = Get-CIisWebsite | Where-Object { $_.ID -eq $ID -and $_.Name -ne $SiteName } if( $websiteWithID ) { Write-Error -Message ('ID {0} already in use for website {1}.' -f $ID,$SiteName) -Category ResourceExists return } $website = Get-CIisWebsite -SiteName $SiteName $startWhenDone = $false if( $website.ID -ne $ID ) { if( $PSCmdlet.ShouldProcess( ('website {0}' -f $SiteName), ('set site ID to {0}' -f $ID) ) ) { $startWhenDone = ($website.State -eq 'Started') $website.ID = $ID $website.CommitChanges() } } if( $PSBoundParameters.ContainsKey('WhatIf') ) { return } $website = $null $maxTries = 100 $numTries = 0 do { Start-Sleep -Milliseconds 100 $website = Get-CIisWebsite -SiteName $SiteName if( $website -and $website.ID -eq $ID ) { break } $numTries++ } while( $numTries -lt $maxTries ) if( -not $website -or $website.ID -ne $ID ) { Write-Error ('IIS:/{0}: site ID hasn''t changed to {1} after waiting 10 seconds. Please check IIS configuration.' -f $SiteName,$ID) } if( -not $startWhenDone ) { return } $numTries = 0 do { try { if( $website ) { $null = $website.Start() } } catch { $website = $null } Start-Sleep -Milliseconds 100 $website = Get-CIisWebsite -SiteName $SiteName if( $website -and $website.State -eq 'Started' ) { break } $numTries++ } while( $numTries -lt $maxTries ) if( -not $website -or $website.State -ne 'Started' ) { Write-Error ('IIS:/{0}: failed to start website after setting ID to {1}' -f $SiteName,$ID) } }
combined_dataset/train/non-malicious/1818.ps1
1818.ps1
Describe "Split-Path" -Tags "CI" { It "Should return a string object when invoked" { $result = Split-Path . $result | Should -BeOfType String $result = Split-Path . -Leaf $result | Should -BeOfType String $result = Split-Path . -Resolve $result | Should -BeOfType String } It "Should return the name of the drive when the qualifier switch is used" { Split-Path -Qualifier env: | Should -Be "env:" Split-Path -Qualifier env:PATH | Should -Be "env:" } It "Should error when using the qualifier switch and no qualifier in the path" { { Split-Path -Qualifier -ErrorAction Stop /Users } | Should -Throw { Split-Path -Qualifier -ErrorAction Stop abcdef } | Should -Throw } It "Should return the path when the noqualifier switch is used" { Split-Path env:PATH -NoQualifier | Should -BeExactly "PATH" } It "Should return the base name when the leaf switch is used" { Split-Path -Leaf /usr/bin | Should -BeExactly "bin" Split-Path -Leaf fs:/usr/local/bin | Should -BeExactly "bin" Split-Path -Leaf usr/bin | Should -BeExactly "bin" Split-Path -Leaf ./bin | Should -BeExactly "bin" Split-Path -Leaf bin | Should -BeExactly "bin" Split-Path -Leaf "C:\Temp\Folder1" | Should -BeExactly "Folder1" Split-Path -Leaf "C:\Temp" | Should -BeExactly "Temp" Split-Path -Leaf "\\server1\share1\folder" | Should -BeExactly "folder" Split-Path -Leaf "\\server1\share1" | Should -BeExactly "share1" } It "Should be able to accept regular expression input and output an array for multiple objects" { $testDir = $TestDrive $testFile1 = "testfile1.ps1" $testFile2 = "testfile2.ps1" $testFilePath1 = Join-Path -Path $testDir -ChildPath $testFile1 $testFilePath2 = Join-Path -Path $testDir -ChildPath $testFile2 New-Item -ItemType file -Path $testFilePath1, $testFilePath2 -Force Test-Path $testFilePath1 | Should -BeTrue Test-Path $testFilePath2 | Should -BeTrue $actual = ( Split-Path (Join-Path -Path $testDir -ChildPath "testfile*.ps1") -Leaf -Resolve ) | Sort-Object $actual.Count | Should -Be 2 $actual[0] | Should -BeExactly $testFile1 $actual[1] | Should -BeExactly $testFile2 ,$actual | Should -BeOfType "System.Array" } It "Should be able to tell if a given path is an absolute path" { Split-Path -IsAbsolute fs:/usr/bin | Should -BeTrue Split-Path -IsAbsolute .. | Should -BeFalse Split-Path -IsAbsolute /usr/.. | Should -Be (!$IsWindows) Split-Path -IsAbsolute fs:/usr/../ | Should -BeTrue Split-Path -IsAbsolute ../ | Should -BeFalse Split-Path -IsAbsolute . | Should -BeFalse Split-Path -IsAbsolute ~/ | Should -BeFalse Split-Path -IsAbsolute ~/.. | Should -BeFalse Split-Path -IsAbsolute ~/../.. | Should -BeFalse } It "Should support piping" { "usr/bin" | Split-Path | Should -Be "usr" } It "Should return the path up to the parent of the directory when Parent switch is used" { $dirSep = [string]([System.IO.Path]::DirectorySeparatorChar) Split-Path -Parent "fs:/usr/bin" | Should -BeExactly "fs:${dirSep}usr" Split-Path -Parent "/usr/bin" | Should -BeExactly "${dirSep}usr" Split-Path -Parent "/usr/local/bin" | Should -BeExactly "${dirSep}usr${dirSep}local" Split-Path -Parent "usr/local/bin" | Should -BeExactly "usr${dirSep}local" Split-Path -Parent "C:\Temp\Folder1" | Should -BeExactly "C:${dirSep}Temp" Split-Path -Parent "C:\Temp" | Should -BeExactly "C:${dirSep}" Split-Path -Parent "\\server1\share1\folder" | Should -BeExactly "${dirSep}${dirSep}server1${dirSep}share1" Split-Path -Parent "\\server1\share1" | Should -BeExactly "${dirSep}${dirSep}server1" } It 'Does not split a drive leter'{ Split-Path -Path 'C:\' | Should -BeNullOrEmpty } }
combined_dataset/train/non-malicious/sample_38_57.ps1
sample_38_57.ps1
# # Module manifest for module 'OCI.PSModules.Onesubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Onesubscription.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '22bf5ba6-749f-401c-8b99-0cf5afbd2958' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Onesubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Onesubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOnesubscriptionAggregatedComputedUsagesList', 'Get-OCIOnesubscriptionBillingSchedulesList', 'Get-OCIOnesubscriptionCommitment', 'Get-OCIOnesubscriptionCommitmentsList', 'Get-OCIOnesubscriptionComputedUsage', 'Get-OCIOnesubscriptionComputedUsagesList', 'Get-OCIOnesubscriptionInvoicelineComputedUsagesList', 'Get-OCIOnesubscriptionInvoicesList', 'Get-OCIOnesubscriptionOrganizationSubscriptionsList', 'Get-OCIOnesubscriptionRateCardsList', 'Get-OCIOnesubscriptionSubscribedService', 'Get-OCIOnesubscriptionSubscribedServicesList', 'Get-OCIOnesubscriptionSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Onesubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Unlock & Password Reset_1.ps1
Unlock & Password Reset_1.ps1
<# Author: Matt Schmitt Date: 12/4/12 Version: 2.0 From: USA Email: ithink2020@gmail.com Website: http://about.me/schmittmatt Twitter: @MatthewASchmitt Description A script checking for Locked Account, checking where a user is locked out, unlocking the user's account and for resetting a user's password. UPDATED 12/4/12 Cleaned up Checking LockedOut Status code - replaced with foreach statement that looks at $Servers array Cleaned up Unlock code - replaced with foreach statement that looks at $Servers array Cleaned up Get pwdlastset date - rewrote to use the method I was using for other lookups for AD properties. #> Import-Module ActiveDirectory Write-Host "" Write-Host "PowerShell AD Password Tool" Write-Host "" Write-Host "This tool displays the Exparation Date of a user's Password and thier Lockedout" Write-Host "Status. It will then allow you to unlock and/or reset the password." Write-Host "" Write-Host "" #Assing Domain Controllers to $servers Array #IMPORTANT ---> Need to Update with DCs chagnes $servers = "AUSDC01.intranet.theknot.com", "AUSDC02.intranet.theknot.com", "AUSDC03.intranet.theknot.com", "CORPDC01.intranet.theknot.com", "LADC03.intranet.theknot.com", "NYCDC04.intranet.theknot.com", "NYCDC05.intranet.theknot.com", "omadc01.intranet.theknot.com", "omadc02.intranet.theknot.com", "REDDC02.intranet.theknot.com" # Not includeing BJDC03.intranet.theknot.com, BJDC02.intranet.theknot.com #Counts how many locked account there are on the local DC and sets it to $count $count = Search-ADAccount –LockedOut | where { $_.Name -ne "Administrator" -and $_.Name -ne "Guest" } | Measure-Object | Select-Object -expand Count #If there are locked accounts (other than Administrator and Guest), then this will display who is locked out. If ( $count -gt 0 ) { Write-Host "Current Locked Out Accounts on your LOCAL Domain Controller:" Search-ADAccount –LockedOut | where { $_.Name -ne "Administrator" -and $_.Name -ne "Guest" } | Select-Object Name, @{Expression={$_.SamAccountName};Label="Username"},@{Expression={$_.physicalDeliveryOfficeName};Label="Office Location"},@{Expression={$_.TelephoneNumber};Label="Phone Number"},@{Expression={$_.LastLogonDate};Label="Last Logon Date"} | Format-Table -AutoSize }else{ # Write-Host "There are no locked out accounts on your local Domain Controller." } Write-Host "" #Asks for the username $user = Read-Host "Enter username of the employee you would like to check or [ Ctrl+c ] to exit" cls Write-Host "" Write-Host "" $Name = (Get-ADUser -Filter {samAccountName -eq $user } -Properties * | Select-Object -expand DisplayName) $phone = (Get-ADUser -Filter {samAccountName -eq $user } -Properties * | Select-Object -expand telephoneNumber) Write-Host "$Name's phone number is: $phone" Write-Host "" Write-Host "" [datetime]$today = (get-date) #Get pwdlastset date from AD and set it to $passdate $passdate2 = [datetime]::fromfiletime((Get-ADUser -Filter {samAccountName -eq $user } -Properties * | Select-Object -expand pwdlastset)) #Write-Host "passdate2: $passdate2" <# ----> REMOVE - Replaced with above line $searcher=New-Object DirectoryServices.DirectorySearcher $searcher.Filter="(&(samaccountname=$user))" $results=$searcher.findone() $passdate = [datetime]::fromfiletime($results.properties.pwdlastset[0]) Write-Host "passdate: $passdate" #> $PwdAge = ($today - $passdate2).Days If ($PwdAge -gt 90){ Write-Host "Password for $user is EXPIRED!" Write-Host "Password for $user is $PwdAge days old." }else{ Write-Host "Password for $user is $PwdAge days old." } Write-Host "" Write-Host "" Write-Host "Checking LockedOut Status on U.S. Domain Controllers:" #Get Lockedout status and set it to $Lock foreach ($object in $servers) { switch (Get-ADUser -server $object -Filter {samAccountName -eq $user } -Properties * | Select-Object -expand lockedout) { "False" {"$object `t `t Not Locked"} "True" {"$object `t `t LOCKED"} } } Write-Host "" Write-Host "" [int]$y = 0 $option = Read-Host "Would you like to (1) Unlock user, (2) Reset user's password, (3) Unlock and reset user's password or (4) Exit?" cls While ($y -eq 0) { switch ($option) { "1" { foreach ($object in $servers) { Write-Host "Unlocking account on $object" Unlock-ADAccount -Identity $user -server $object } #Get Lockedout status and set it to $Lock $Lock = (Get-ADUser -Filter {samAccountName -eq $user } -Properties * | Select-Object -expand lockedout) Write-Host "" #Depending on Status, tell user if the account is locked or not. switch ($Lock) { "False" { Write-Host "$user is unlocked." } "True" { Write-Host "$user is LOCKED Out." } } Write-Host "" Write-Host "Press any key to Exit." $y += 5 $x = $host.UI.RawUI.ReadKey("NoEcho,IncludeKeyDown") } "2" { $newpass = (Read-Host -AsSecureString "Enter user's New Password") Write-Host "" Write-Host "Resetting Password on Local DC" Write-Host "" Set-ADAccountPassword -Identity $user -NewPassword $newpass Write-Host "" Write-Host "Resetting Password on CORPDC01" Write-Host "" Set-ADAccountPassword -Server CORPDC01.intranet.theknot.com -Identity $user -NewPassword $newpass Write-Host "" Write-Host "Press any key to Exit." $x = $host.UI.RawUI.ReadKey("NoEcho,IncludeKeyDown") $y += 5 } "3" { $newpass = (Read-Host -AsSecureString "Enter user's New Password") Write-Host "" Write-Host "Resetting Password on Local DC..." Write-Host "" Set-ADAccountPassword -Identity $user -NewPassword $newpass Write-Host "" Write-Host "Resetting Password on CORPDC01 - for faster replication..." Write-Host "" Set-ADAccountPassword -Server CORPDC01.intranet.theknot.com -Identity $user -NewPassword $newpass Write-Host "" Write-Host "Password for $user has been reset." Write-Host "" foreach ($object in $servers) { Write-Host "Unlocking account on $object" Unlock-ADAccount -Identity $user -server $object } #Get Lockedout status and set it to $Lock $Lock = (Get-ADUser -Filter {samAccountName -eq $user } -Properties * | Select-Object -expand lockedout) Write-Host "" #Depending on Status, tell user if the account is locked or not. switch ($Lock) { "False" { Write-Host "$user is unlocked." } "True" { Write-Host "$user is LOCKED Out." } } Write-Host "" Write-Host "Press any key to Exit." $y += 5 $x = $host.UI.RawUI.ReadKey("NoEcho,IncludeKeyDown") } "4" { #exit code $y += 5 } default { Write-Host "You have entered and incorrect number." Write-Host "" $option = Read-Host "Would you like to (1) Unlock user, (2) Reset user's password, (3) Unlock and reset user's password or (4) Exit?" } } }
combined_dataset/train/non-malicious/2748.ps1
2748.ps1
if (Get-Command Get-NetNeighbor -ErrorAction SilentlyContinue) { Get-NetNeighbor } else { $IpPattern = "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}" foreach ($line in (& $env:windir\system32\arp.exe -a)) { $line = $line.Trim() if ($line.Length -gt 0) { if ($line -match 'Interface:\s(?<Interface>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s.*') { $Interface = $matches['Interface'] } elseif ($line -match '(?<IpAddr>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+(?<Mac>[0-9A-Fa-f]{2}\-[0-9A-Fa-f]{2}\-[0-9A-Fa-f]{2}\-[0-9A-Fa-f]{2}\-[0-9A-Fa-f]{2}\-[0-9A-Fa-f]{2})*\s+(?<Type>dynamic|static)') { $IpAddr = $matches['IpAddr'] if ($matches['Mac']) { $Mac = $matches['Mac'] } else { $Mac = "" } $Type = $matches['Type'] $o = "" | Select-Object Interface, IpAddr, Mac, Type $o.Interface, $o.IpAddr, $o.Mac, $o.Type = $Interface, $IpAddr, $Mac, $Type $o } } } }
combined_dataset/train/non-malicious/sample_51_14.ps1
sample_51_14.ps1
########################################################### # # 'GCArcService' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest Import-Module "$PSScriptRoot\ServiceHelper.psm1" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName $script:OperationRetryCount = 5 <# .SYNOPSIS Install Guest Configuration Arc Service. .Example Install-GCArcService #> Function Install-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Install-GCArcService" $ServiceType = "GCArc" $gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config' '{ "ServiceType": "GCArc" }' | Out-File $gcConfigPath -Encoding utf8 New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath) Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() # Install GC Service and verify it is installed correctly. Install-ServiceInternal -ServiceType "GCArc" } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Enable and start Guest Configuration Arc Service. .Example Enable-GCArcService #> Function Enable-GCArcService { [CmdletBinding()] Param() Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() Write-Verbose -Message "In Enable-GCArcService" $ServiceType = "GCArc" Start-ServiceInternal -ServiceType $ServiceType } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Uninstall Guest Configuration Arc Service. .Example Uninstall-GCArcService #> Function Uninstall-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Uninstall-GCArcService" $ServiceType = "GCArc" # Unregister GC Service Uninstall-ServiceInternal -ServiceType $ServiceType $guestConfigDataPath = Get-GuestConfigDataPath $configurationPath = Join-Path $guestConfigDataPath 'Configuration' if ((Test-Path -Path $configurationPath) -and (-not (CheckServiceExists($global:GCServiceName)))) { Write-Verbose "Removing GC user data from $configurationPath path ..." Remove-Item $configurationPath -Recurse -Force } } <# .SYNOPSIS Update Guest Configuration service. .Example Update-GCArcService #> Function Update-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Update-GCArcService" } Export-ModuleMember -Function @( 'Install-GCArcService', 'Enable-GCArcService', 'Uninstall-GCArcService', 'Update-GCArcService' ) # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBiMG+twTeJCd4D # inSASyoEH2LgmLtLl98tUNWujwJ94aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL59y+jhL9A0O3Idu+8nZayQ # Zp3eKfjLNeUNRLnJaOGNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArfyQHPzs77au0enSx/VethByLp4Pejw/40RLk/7rfMFKrzN9HdwZ1EXP # +4qnas/UyKwW3bO6NjtQhO0mtPlsJ/08YX0aHbn8H/Ry3mLasA3tWVD549RSSwcc # TCpsaMDGWP8VS0SfyL7I8Tmj36ZK9gIemO0puuda2thRX9UNcUXNBVnmFO3T9WLv # Q5DuNodRWurpIQqLwSqJKnjnMys67VHd5I3KrtIW/olipf/1AX6qLFLFJcRD6+eA # u6TvGVtB89kGtiVOtZtt0mZDluFV5lgs63dwSCAHYVKBJJALuQMkeOWE/u05wFpI # EwtCBFpJR7e/i+92FBg/j2Laxo7j6KGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB3EpLQfzyI+kJtuWloGU5+V+jfkBupO6aibcIeNsbrtgIGZbwTlIO2 # GBMyMDI0MDIxNDIxMDAyNS4yNzJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHsMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP # MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XcLnzAiGA8yMDI0MDIxNDA5NTEy # N1oYDzIwMjQwMjE1MDk1MTI3WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpdwuf # AgEAMAgCAQACAwCorTAIAgEAAgMBW/8wCgIFAOl4XR8CAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAawnUreDJf/Yn7Bd0RGAsR9Zier8b8PaN9L5IIdDZsVpR # +hQP9drjt+eNF3EKGbNMkU/bLJYhys1ixgJy6nLFsqD2aOM31ULsvyzKwZrQZr3r # qpMLwdTtGK5UuQ6HosD4qGifpiOJ/I7AyjZH1OdRiCAQJ7aASxNB3XzXL+FXZeQ2 # kYVIT1LpNjD7ZTodAPrB/O9gYIoNZvu+8Sd3SZTigh5EduAy9vCgqToT9z1ehA3Y # kWZsJYGlF7BQEETuF1VZ35Y03X/rNVAobuODIMStsLj+k9a1DB0/X6HgL3SQFPvA # L7lcxg2S9xpyZDqgf+nrjYdTS/y4Dt+lz3ADNIDixTGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHo # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEILIvy0m3XfujIl9M6yk0GN8nnydK0ac77DZK0zIaShFT # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKtLaxNUChCCCQdHn2k2qKB7T # F8lPYndTxbVJzwf46x0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAiBCC25FGR9Nc72C0DFfp+ERRAze2/ # dO1vMF8f8jiZC1OPuzANBgkqhkiG9w0BAQsFAASCAgDPbky6CI9TX0r9LoCTAH66 # sQzTAckWNE5v4p8ZWbz/BfBvAbKpkksc2Q7plv7ZWUseeqGFRPsyuhJIYpgF7Mqa # gsXYESCHc42SkpgabLRuulqMDXWmcQbbx+t3v+30fyNL4/7VU4HBw7mHh0TV/G9b # dDk1gHBhltd1RTNwy5HxVqRsXhfnVx3TIyBupYSbCBWX1wXJkZvQQiPcKkjQw6f9 # gUoK51P7vlNsNfyoJ6Ymb8HrWbeBvoSBcmt8xORivf4l6+7MR9EClg1t59/nctNY # 2b0Njw4tgrOyWHbcXDP+2lwYvfyxV4NS/KX8xgR8W+Vx5+vV9Yt8cHDYEy7pYBGO # Bv1/3aQ2mV8ZH2paxGDvUhCJrFyv2TDFRW3ws0UfXghpvlgr4cXiHohx/n0QnNRt # pE/y518ALCFTloBl6j5ivHZYmeUUEvTaqrDo9TKz6DZj7gAq6gkvaJQ2yKjyjr4w # 3DkK1CcxLvAmdZE3RLxPnBw5vRamx3NT3cAkOQQV6T7xoLhnjown0Qap+ZoSU2F+ # k2tS0GLUOTwHqqyonSyFGOQdEmcPbiquiY1XqPKokCh23K4BKSJSCvmeX+SCZjav # cKoYBT+aeSXEtS2iK2XSTvGAF3mfbF4Ge415uVTR24hWZAzs4oy9CJYkUqGiLUU1 # aNB3/ReMVYbQE1SJ+k6e3w== # SIG # End signature block
combined_dataset/train/non-malicious/sample_34_3.ps1
sample_34_3.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Clear-AMT3PDS { <# .Synopsis Deletes data from the Intel Active Management Technology Third Party Data Storage .Description This CmdLet deletes data from the Intel Active Management Technology (AMT) Third Party Data Storage (3PDS) from clients that have Intel AMT firmware version 3.0 or higher. .Notes Supported AMT Firmware Versions: 3.0 or higher. Understanding 3PDS structure: Data stored within the 3PDS is stored within blocks of nonvolatile memory in a hierarchical structure. Each block must be associated to a tiered structure of Enterprise -> Vendor -> Application -> Block Name. 3PDS Machine UUID: When a block is created the application that created the block will specify a GUID to identify itself as the entity that created the block. When modifying blocks that were created by a different entity it may be necessary to specify the Machine UUID as part of the CMDLet parameter. AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Clear-AMT3PDS -computer:vproclient.vprodemo.com -TLS -CertificateName "myCertificate" -Enterprise:Intel Will delete all block data under enterprise value specified. ComputerName Port Operation Status ------------ ---- --------- ------ vproclient.vprodemo.com 16993 Delete Successful .Example Clear-AMT3PDS 192.168.1.100 -credential $AMTCredential -Enterprise:Intel -Vendor:Intel Will delete all block data under Enterprise, Vendor value specified. ComputerName Port Operation Status ------------ ---- --------- ------ 192.168.1.100 16992 Delete Successful .Example Clear-AMT3PDS vproclient 16992 -Username:amtuser -Enterprise:Intel -Vendor:Intel -Application:PowerShell Will delete all block data under Enterprise, Vendor, Application value specified. ComputerName Port Operation Status ------------ ---- --------- ------ vproclient 16992 Delete Successful .Example Clear-AMT3PDS vproclient.vprodemo.com -credential $AMTCredential -Enterprise:Intel -Vendor:Intel -Application:PowerShell -Block:Test Will delete block data under Enterprise, Vendor, Application, Block specified. ComputerName Port Operation Status ------------ ---- --------- ------ vproclient.vprodemo.com 16992 Delete Successful .Example Get-Content computers.txt | Clear-AMT3PDS -TLS -Enterprise:Intel -Vendor:Intel -Application:PowerShell -Block:Test ComputerName Port Operation Status ------------ ---- --------- ------ computer1.vprodemo.com 16993 Delete Successful computer2.vprodemo.com 16993 Delete Successful computer3.vprodemo.com 16993 Delete Successful #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="Name of the Enterprise")] [string] $Enterprise, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=3, HelpMessage="Name of the Vendor")] [string] $Vendor, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=4, HelpMessage="Name of the Application")] [string] $Application, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=5, HelpMessage="Name of the Block")] [string] $Block, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=6, HelpMessage="Machine UUID")] [string] $MachineUUID, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=7, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential ) PROCESS { function DeleteEnterprise($Connection, $EnterpriseHandle) { $AdminService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService") $InputObj = $AdminService_EPR.CreateMethodInput("RemoveStorageEaclEntry") $InputObj.SetProperty("Handle",$EnterpriseHandle) $Output = $AdminService_EPR.InvokeMethod($InputObj) if($Output.GetProperty("ReturnValue").ToString() -ne "0") { return $false } else { return $true } } function GetEnterpriseHandle($Connection, $EnterpriseName, [ref]$EnterpriseHandle) { $AdminService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService") $InputObj = $AdminService_EPR.CreateMethodInput("EnumerateStorageEaclEntries") $Output = $AdminService_EPR.InvokeMethod($InputObj) if($Output.GetProperty("ReturnValue").ToString() -ne "0") { return $false } $Handles = $Output.GetProperty("Handles") for($i=0;$i -lt $Handles.Count;++$i) { $InputObj = $AdminService_EPR.CreateMethodInput("GetStorageEaclEntry") $InputObj.SetProperty("Handle",$Handles.Item($i).ToString()) $OutObj = $AdminService_EPR.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return $false } if($OutObj.GetProperty("EnterpriseName").ToString() -eq $EnterpriseName) { $EnterpriseHandle.Value = $Handles.Item($i).ToString() return $true } } $EnterpriseHandle.Value = "" return $true } function EnumerateEnterprise($Connection) { $RetVal = @() $AdminService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService") $InputObj = $AdminService_EPR.CreateMethodInput("EnumerateStorageEaclEntries") $Output = $AdminService_EPR.InvokeMethod($InputObj) $Handles = $Output.GetProperty("Handles") foreach($Handle in $Handles) { $InputObj = $AdminService_EPR.CreateMethodInput("GetStorageEaclEntry") $InputObj.SetProperty("Handle",$Handle.ToString()) $OutObj = $AdminService_EPR.InvokeMethod($InputObj) $RetVal += @($OutObj.GetProperty("EnterpriseName").ToString()) } return ,$RetVal } function DeallocateBlock($Connection, $sessionHandle, $blockHandle) { $DataStorageService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageService") $InputObject = $DataStorageService_EPR.CreateMethodInput("DeallocateBlock") $InputObject.SetProperty("SessionHandle",$sessionHandle) $InputObject.SetProperty("BlockHandle",$blockHandle) $OutputObject = $DataStorageService_EPR.InvokeMethod($InputObject) if($OutputObject.GetProperty("ReturnValue").ToString() -ne "0") { return $false } else { return $true } } function GetUUID() { $compname = hostname $uuid = (Get-WmiObject Win32_ComputerSystemProduct -ComputerName $compname).UUID $uuid = $uuid.Replace("-","") return $uuid } function RegisterApplication($Connection, $uuid, $vendorName, $appName, $entName, [ref]$SessionHandle) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService") $InputObj = $objref.CreateMethodInput("RegisterApplication") $InputObj.SetProperty("CallerUUID", $uuid) $InputObj.SetProperty("VendorName", $vendorName) $InputObj.SetProperty("ApplicationName", $appName) $InputObj.SetProperty("EnterpriseName", $entName) $OutObj = $objRef.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return($false) } else { $SessionHandle.Value = $OutObj.GetProperty('SessionHandle').ToString() return($true) } } function GetApplicationHandle($Connection, $SessionHandle, [ref]$ApplicationHandle) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService") $InputObj = $objref.CreateMethodInput("GetCurrentApplicationHandle") $InputObj.SetProperty("SessionHandle", "$SessionHandle") $OutObj = $objRef.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return $false } else { $ApplicationHandle.Value = $OutObj.GetProperty('ApplicationHandle').ToString() return $true } } function GetAllocatedBlocks($Connection, $SessionHandle, $ApplicationHandle) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService") $InputObj = $objref.CreateMethodInput("GetAllocatedBlocks") $InputObj.SetProperty("SessionHandle", "$SessionHandle") $InputObj.SetProperty("BlockOwnerApplication", "$ApplicationHandle") $OutObj = $objRef.InvokeMethod($InputObj) $BlockHandles = $OutObj.GetProperty('BlockHandles') $blocks = @() if($BlockHandles.IsArray) { for($i=0;$i -lt $BlockHandles.Count;++$i) { $blocks = $blocks + @($BlockHandles.Item($i).ToString()) } } else { if(!$BlockHandles.IsNull) { $blocks = @($BlockHandles.ToString()) } $blocks = ,$blocks } Return $blocks } function GetBlockName($Connection, $SessionHandle, $BlockHandle) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService") $InputObj = $objref.CreateMethodInput("GetBlockAttributes") $InputObj.SetProperty("SessionHandle", "$SessionHandle") $InputObj.SetProperty("BlockHandle", "$BlockHandle") $OutObj = $objRef.InvokeMethod($InputObj) $BlockName = $OutObj.GetProperty('BlockName').ToString() $BlockName } function RemoveStorageFpaclEntry($Connection, $Handle) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService") $InputObj = $objref.CreateMethodInput("RemoveStorageFpaclEntry") $InputObj.SetProperty("Handle",$Handle) $OutObj = $objRef.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return $false } else { return $true } } function GetStorageFpaclEntry($Connection, $ApplicationName, $VendorName, [ref]$Handle) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService") $InputObj = $objref.CreateMethodInput("EnumerateStorageAllocEntries") $OutObj = $objRef.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return $false } else { $handles = $OutObj.GetProperty("Handles") for($i=0;$i -lt $handles.Count;++$i) { $h = $handles.Item($i).ToString() $InputObj = $objref.CreateMethodInput("GetStorageAllocEntry") $InputObj.SetProperty("Handle",$h) $OutObj = $objRef.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return $false } else { if($OutObj.GetProperty("ApplicationName").ToString() -eq $ApplicationName -and $OutObj.GetProperty("VendorName").ToString() -eq $VendorName) { $Handle.Value = $h return $true } } } } return $false } function RemoveApplication($Connection, $SessionHandle) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService") $InputObj = $objref.CreateMethodInput("RemoveApplication") $InputObj.SetProperty("SessionHandle", "$SessionHandle") $OutObj = $objRef.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return $false } else { return $true } } function UnregisterApplication($Connection, $sessionHandle) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService") $InputObj = $objref.CreateMethodInput("UnregisterApplication") $InputObj.SetProperty("SessionHandle", "$SessionHandle") $OutObj = $objRef.InvokeMethod($InputObj) } function AdminGetRegisteredApplications([ref]$ApplicationHandles) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService") $InputObj = $objref.CreateMethodInput("AdminGetRegisteredApplications") $OutObj = $objRef.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return $false } $en = $OutObj.GetProperty('ApplicationHandles') $ApplicationHandles.Value = @() if($en.IsArray) { For($i=0;$i -lt $en.Count;++$i) { $ApplicationHandles.Value += @($en.Item($i).ToString()) } } return $true } function AdminGetApplicationAttributes($appHandle, [ref]$uuid, [ref]$VendorName, [ref]$ApplicationName, [ref]$EnterpriseName) { $objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService") $InputObj = $objref.CreateMethodInput("AdminGetApplicationAttributes") $InputObj.SetProperty("Handle", "$appHandle") $OutObj = $objRef.InvokeMethod($InputObj) if($OutObj.GetProperty("ReturnValue").ToString() -ne "0") { return $false } $uuid.Value = $OutObj.GetProperty('UUID').ToString() $VendorName.Value = $OutObj.GetProperty('VendorName').ToString() $ApplicationName.Value = $OutObj.GetProperty('ApplicationName').ToString() $EnterpriseName.Value = $OutObj.GetProperty('EnterpriseName').ToString() return $true } $Results = @() $Obj = new-object psobject try { #create a connection object $Connection = New-Object Intel.Management.Wsman.WsmanConnection if ($Credential.username.Length -gt 0) { $Connection.SetCredentials($Credential.Username, $Credential.Password) } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $Connection.SetCredentials($Username, $Password) } else { $Cred = Get-Credential $Username $Connection.SetCredentials($Cred.Username, $Cred.Password) } } if ($Port.Length -lt 1) { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } if($CertificateName.Length -gt 0) { $Connection.Options.SetClientCertificateByCertificateName($CertificateName) } #----------------- Code below this line is specific to each script. ForEach ($Comp in $ComputerName) { $skip = $false $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value $Port $Obj | Add-Member -MemberType noteproperty -Name Operation -value "Delete" try { #Attempt Connection with Client $Connection.SetHost($Comp, $Port) #--------------------------------- if($MachineUUID -ne "") { $uuid = $MachineUUID } else { $uuid = GetUUID } $SessionHandle = "" $ApplicationHandle = "" if($Enterprise -ne "" -and $Vendor -eq "" -and $Application -eq "" -and $Block -eq "") { # Delete Enterprise $Handle = "" $Success = GetEnterpriseHandle $Connection $Enterprise ([ref]$Handle) if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "GetEnterpriseHandleFailed" $Results += $Obj continue } elseif($Success -and $Handle -eq "") { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "EnterpriseNotFound[$Enterprise]" $Results += $Obj continue } $Success = DeleteEnterprise $Connection $Handle if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed" } else { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful" } } elseif($Enterprise -ne "" -and $Vendor -ne "" -and $Application -ne "" -and $Block -eq "") { # Get Application $Success = RegisterApplication $Connection $uuid $Vendor $Application $Enterprise ([ref]$SessionHandle) if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "RegisterApplicationFailed" $Results += $Obj continue } # Remove Application (This also unregisters) $Success = RemoveApplication $Connection $SessionHandle if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "RemoveApplicationFailed" $Results += $Obj continue } # Remove PACL Entry $Handle = "" $Success = GetStorageFpaclEntry $Connection $Application $Vendor ([ref]$Handle) if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "FpaclProcessingFailed" $Results += $Obj continue } $Success = RemoveStorageFpaclEntry $Connection $Handle if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Success[FpaclEntryMayBeInUse]" $Results += $Obj continue } $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful" } elseif($Enterprise -ne "" -and $Vendor -ne "" -and $Application -ne "" -and $Block -ne "") { # Delete Block $Success = RegisterApplication $Connection $uuid $Vendor $Application $Enterprise ([ref]$SessionHandle) if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "RegisterApplicationFailed" $Results += $Obj continue } $Success = GetApplicationHandle $Connection $SessionHandle ([ref]$ApplicationHandle) if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "GetApplicationHandleFailed" $Results += $Obj continue } $BlockHandles = GetAllocatedBlocks $Connection $SessionHandle $ApplicationHandle $Found = $false foreach ($tempBlockHandle in $BlockHandles) { $tempBlockName = GetBlockName $Connection $SessionHandle $tempBlockHandle if ($tempBlockName -eq $Block) { $Found = $true # Delete the associated blocks $Success = DeallocateBlock $Connection $sessionHandle $tempBlockHandle if(!$Success) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "DeallocateBlockFailed" $Results += $Obj continue } } } if($Found) { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful" } else { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "NoBlocksFound" } UnregisterApplication $Connection $SessionHandle } #------------------------------------ } catch { #Add Member to Object noting failed attempt $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp -Force $Obj | Add-Member -MemberType noteproperty -Name Port -value $Port -Force $Obj | Add-Member -MemberType noteproperty -Name Operation -value $Operation -Force $Obj | Add-Member -MemberType noteproperty -Name Status -value "ExceptionThrown" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message } $Results += $Obj } } catch { #Add Member to Object noting failed attempt $Obj | Add-Member -MemberType noteproperty -Name Status -value "ExceptionThrown" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message $Results += $Obj } Write-Output $Results } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD8XlgOIo2mXf2l # tClmD2AlYRH3DZjkP13fG/4mF1rw8qCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgU3BclFYVh2FTctf3 # NnqXgMwNEvZH/cdVIRET9VFW/hUwDQYJKoZIhvcNAQEBBQAEggGAiPG3R06I14vV # UUWb4HEOZDJFo5RfKxGJNy4NIWvjJ1m8CkocnB8KKaPHCAkkl6n5rBQVTlet/Isb # CG450M3LbjgiE4rPPQkY9hpVoRpqQmJfa8INO6Jo/ya+VZObypU3bOZnNu1eLK+i # H8ywPqGUi5YcLh7LqxXVVGgrcKqnG2xtuCchSY5x5b2Y7IE/6Wo8BkwRa+2Dv1Ei # DlE5vDh5xx7D8zKDH8jDqt1P+G2jCayOJRtip9SVhhz1fiuOynBHszwC4rsh9dZS # cnx6hfeHUQdtuFUvCgIlItW73gATIiY/i+9ipWAF6W7H2H1bkrKW6i8B7StNKYde # iToUM4i3R/hRcOVkIKJPgIQQw9G8qKus9HLGS5P9K+MaY/k93iYjeIsZ6ekzHHIn # HuMhxLwKcLAbDC36nziRzFjhzsNaDO6mG23eyd/qCCSEI8UhIybwEy7z0vHvy15L # xiUPVvzdti8eJZSeScZ/pEC1J9QMz+eyPW0p7NwRHoUwxAC2z6n1oYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIFALQFESiMMfpGnLdqumn7GRRuzij2y9gPr8 # BfCgbfVLAhQId9Mt6HenPMpMk64oZJLeD59lZhgPMjAyMTEwMjcxMjA5NDVaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjExMDI3MTIwOTQ1WjA/BgkqhkiG9w0BCQQxMgQwJcGYQMuJoUOq # pJgSnuH2Ve8gOxe8FFmYVopJPjLWBJJHry9eauiixLySm96hjFSQMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICAAK5gKc6qFzmiqCpIZJMmhSkW4ty/WKL2MFxncacs4JF4Xj4fPV7 # 58hOziAUfSH48aqo9I16Gq0aC+jYov0L1OZtHe0OOm3I3ywbAFLacbMikudpl8oi # Z6Y+U42SUq1xd1ng8+gZZRsu/Tj+uwIAwP+W1zRPlyXy8vkWQW+tbY/coCbuctoA # dM6Yn1r7ildwEZ5xTnGovA3JqbEKbW68yA4g8Lx/Qv4PnVMxbK1AiDzeeEx6To3m # 05dpGPXCM5CYGfsoHnPVI6XM7OoPuq7Uy9LfXxgJ6E7aFfVhzs9Vyv99tLP1Xh57 # Q+Z0dXHrg5V/+nnp2FD0jwRdT5xNW0/VJxzIv5KO4hyas4wbVRJDVkz3A5PSSwLM # 9UmY/TGnJOijzG65IHgCX5ON0rph4p7HfO5SZ+yX5+mQrYsiQs1NWlgc/AZGfmzw # 7SulNkCQlBcdganBpIp037qyaw9RcgRe27QP8aWtU9+q2B/64u2xsuOZZ2x4E3VU # /bVda6mKT5+jiixPtP4+YjsKVlRTuP4POBkEFLuE2twH4WCnRJqDxKy/EX9y2aYv # SSPL8eEqunK/SQqvP6P5Qpk5moZYi9JJGqXalqmOODEO1eUIgyKOFVZzkXwkyJSb # ApSUL1hRSkehZtgLx4dQLOvg6wZh7QQetLw7MoGwqb4sAooGmLdU2Xkh # SIG # End signature block
combined_dataset/train/non-malicious/3177.ps1
3177.ps1
Function Get-GPPFile { [cmdletbinding(DefaultParameterSetName='Name')] param( [Parameter( Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName='Name' )] [string[]]$Name = $null, [Parameter( Position=1, ParameterSetName='GUID' )] [string[]]$GUID = $null ) Begin { try { Import-Module GroupPolicy -ErrorAction Stop If(-not (Get-Module GroupPolicy)) { throw "GroupPolicy module not Installed" break } } catch { throw "Error importing GroupPolicy module: $_" break } $xmlProps = "NamespaceURI", "Prefix", "NodeType", "ParentNode", "OwnerDocument", "IsEmpty", "Attributes", "HasAttributes", "SchemaInfo", "InnerXml", "InnerText", "NextSibling", "PreviousSibling", "Value", "ChildNodes", "FirstChild", "LastChild", "HasChildNodes", "IsReadOnly", "OuterXml", "BaseURI" } Process { if(-not $GUID -and -not $Name) { Write-Verbose "Getting all GPOs" $GPO = Get-GPO -all } if ( $Name -and $PsCmdlet.ParameterSetName -eq "Name" ) { $GPO = foreach($nam in $Name) { Get-GPO -Name $Nam } } if( $GUID -and $PsCmdlet.ParameterSetName -eq "GUID" ) { $GPO = foreach($ID in $GUID) { Get-GPO -Guid $ID } } foreach ($Policy in $GPO){ $GPOID = $Policy.Id $GPODom = $Policy.DomainName $GPODisp = $Policy.DisplayName $configTypes = "User", "Machine" foreach($configType in $configTypes) { $path = "\\$($GPODom)\SYSVOL\$($GPODom)\Policies\{$($GPOID)}\$configType\Preferences\Files\Files.xml" if (Test-Path $path -ErrorAction SilentlyContinue) { [xml]$xml = Get-Content $path foreach ( $prefItem in $xml.Files.File ) { $childNodes = $prefItem.filters.childnodes New-Object PSObject -Property @{ GPOName = $GPODisp ConfigType = $configType action = $prefItem.Properties.action.Replace("U","Update").Replace("C","Create").Replace("D","Delete").Replace("R","Replace") FromPath = $prefItem.Properties.FromPath targetPath = $prefItem.Properties.targetPath readOnly = $prefItem.Properties.readOnly archive = $prefItem.Properties.archive hidden = $prefItem.Properties.hidden suppress = $prefItem.Properties.suppress disabled = $prefItem.disabled changed = $( Try { Get-Date "$( $prefItem.changed )"} Catch {"Err"} ) filters = $( foreach($filter in $childNodes){ Try { $filter | select -Property * -ExcludeProperty $xmlProps } Catch { Continue } } ) } | Select GPOName, ConfigType, action, FromPath, targetPath, readOnly, archive, hidden, suppress, disabled, changed, filters } } } } } }
combined_dataset/train/non-malicious/hex2dec_4.ps1
hex2dec_4.ps1
@echo off ::interactive mode if "%1" equ "" ( if not defined run goto:interactive goto:error ) ::null results for %%i in ("0" "x0" "0x0") do if "%1" equ "%%~i" goto:null ::parsing argument(s) setlocal enabledelayedexpansion ::checking number of arguments set "arg=0" for %%i in (%*) do set /a "arg+=1" if "%arg%" neq "1" if not defined run goto:help if "%arg%" neq "1" if defined run goto:error ::get length of argument set "i=0" set "str=%1" for /l %%i in (0, 1, 255) do ( set "chr=!str:~%%i!" if defined chr set /a "i+=1" ) ::is it prefix or hex number starts without him if !i! equ 2 ( if "%str:~0,1%" equ "x" set "str=0%str%" & goto:check ) if !i! gtr 2 ( if "%str:~0,1%" equ "0" if "%str:~1,1%" neq "x" goto:error if "%str:~0,1%" equ "0" if "%str:~1,1%" equ "x" goto:hex2dec if "%str:~0,1%" equ "x" set "str=0%str%" && goto:check ) for %%i in (a b c d e f) do if "%str:~0,1%" equ "%%i" set "str=0x%str%" & goto:hex2dec :check 2>nul set /a "res=%str%" if "%errorlevel%" equ "0" ( if "%str%" equ "%res%" goto:dec2hex goto:hex2dec ) echo "%str%" | findstr /r [0-9a-f] > nul if "%errorlevel%" equ "0" set "str=0x%str%" && goto:hex2dec goto:error :dec2hex set "map=0123456789ABCDEF" for /l %%i in (1, 1, 8) do ( set /a "res=str & 15, str >>=4" for %%j in (!res!) do set "hex=!map:~%%j,1!!hex!" ) for /f "tokens=* delims=0" %%i in ("!hex!") do set "hex=0x%%i" echo %1 = !hex! & goto:eof :hex2dec 2>nul set /a "res=%str%" if "%errorlevel%" gtr "0" goto:error for /f "tokens=2,3" %%i in ('findstr "# " "%~dpnx0"') do set "str=!str:%%i=%%j!" if "%res%" neq "" if "%res%" neq "0" (echo %str% = %res%) else goto:error endlocal exit /b :error echo =^>err exit /b 1 :null echo =^>nil exit /b 0 :help ::Hex2dec v2.03 - converts hex to decimal and vice versa ::Copyright (C) 2012-2013 greg zakharov ::For bug reports - gregzakh@gmail.com :: ::Usage: hex2dec [decimal | hexademical] :: ::Example 1: :: C:\\>hex2dec 0x017a :: 0x017A = 378 ::You'll got the same result with x17a or 17a. :: ::Example 2: :: C:\\>hex2dec 13550 :: 13550 = 0x34EE :: ::Example 3: :: C:\\>hex2dec 23f :: 0x23F = 575 :: ::Note: hex2dec starts with interactive mode if there is ::no argument. for /f "tokens=* delims=:" %%i in ('findstr "^::" "%~dpnx0"') do echo.%%i exit /b 0 rem :: Upper case chart :: # a A # b B # c C # d D # e E # f F rem :: End of chart :: :interactive ::interactive mode on echo Hex2dec v2.03 - converts hex to decimal and vice versa echo. echo Enter decimal or hexademical number and press Enter to echo take result. Use "exit" or "clear" commands to quit or echo to make host clear. echo. setlocal ::already launched marker set "run=true" :begin set /p "ask=>>> " cmd /c "%~dpnx0" %ask% if "%ask%" equ "clear" cls if "%ask%" equ "exit" cls & goto:eof echo. goto:begin endlocal exit /b
combined_dataset/train/non-malicious/sample_48_69.ps1
sample_48_69.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2024 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Test-IntelEthernetHardware { [CmdletBinding()] Param( [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null ) Begin { $AdapterName = $Name $script:ErrorMessagesTest = @() $script:WarningMessagesTest = @() $FinalObject = @() GetIntelEthernetDevices } Process { $Adapters = $Adapter $PreProcessedAdapterNames = ValidateSetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesTest) $AdapterNameArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesTest)) $PreErrorActionPreference = $global:ErrorActionPreference $global:ErrorActionPreference = 'SilentlyContinue' foreach ($a in $AdapterNameArray) { try { $HardwareTestArray = EnumerateTests $a if ($HardwareTestArray.Count -eq 0) { $script:ErrorMessagesTest += $Messages.TestFailure -f $a continue } $Params = @{Version = [uint32]1; Size = [uint32]4; Type = [uint32]0} $StopResult = InvokeCimMethod "IntlLan_AdapterStop" $a "WmiAdapterStop" $Params if (-Not $StopResult) { $script:ErrorMessagesTest += $Messages.TestFailure -f $a continue } $TotalCount = $HardwareTestArray.Count $CurrentCount = 0 foreach ($DiagTestId in $HardwareTestArray) { $TestName = $INTEL_DIAG_TEST[[int]$DiagTestId] $Status = $Messages.TestProgress -f $CurrentCount, $TotalCount, $TestName Write-Progress -Activity $Messages.RunningTests -Status $Status -PercentComplete ($CurrentCount/$TotalCount*100) $ResultCode = ExecuteTest $a $DiagTestId if ($ResultCode -eq 0) { $Result = $Messages.TestResultPass } else { $Result = $Messages.TestResultFail } $FinalObject += [PsCustomObject] @{ PSTypeName = 'IntelEthernetTestResult' Name = $a TestName = $TestName Result = $Result ResultCode = $ResultCode } $CurrentCount++ } } catch { $script:ErrorMessagesTest += $Messages.TestFailure -f $a continue } finally { # attempt to restart device regardless of exception, error or success $Params = @{Version = [uint32]1; Size = [uint32]4; Type = [uint32]0} $StartResult = InvokeCimMethod "IntlLan_AdapterStart" $a "WmiAdapterStart" $Params if (-Not $StartResult) { $script:ErrorMessagesTest += $Messages.AdapterStartFail -f $a } } } $global:ErrorActionPreference = $PreErrorActionPreference } End { $FinalObject foreach ($WarningMessage in $script:WarningMessagesTest) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesTest) { Write-Error $ErrorMessage } } } # caller catches exceptions and handles errors function EnumerateTests($AdapterName) { $SupportedTests = @() $InBuf = [byte[]]::new(1024) $params = @{ Type = [uint32]1 Version = [uint32]1 Size = [uint32]1048 # OID header size (24 bytes) + data size (1024 bytes) Operation = [uint32]0x44 # Operation = 0x44 is INTEL_GEN_DATA_OP_GET_DIAGNOSTICS OpVersion = [uint32]1 DataSize = [uint32]1024 InBuf = $InBuf } $Result = InvokeCimMethod "IntlLan_SetGenData" $AdapterName "WmiSetGenData" $Params # if the Result is INTEL_GEN_DATA_STATUS_CALL_GET_GEN_DATA - read GenData if ($Result -and $Result.OutStatus -eq 1) { $Result = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetGenData if ($Result) { $GenData = ($Result | Where-Object {$_.InstanceName -eq $AdapterName}).GenData if ($GenData -and $GenData.Count -ge 26) { $DiagnosticsCount = $GenData[24] # GenData array contains IDs of supported tests maped with $INTEL_DIAG_TEST if ($GenData.Count -ge (25 + $DiagnosticsCount - 1)) { $SupportedTests = $GenData[25..(25 + $DiagnosticsCount - 1)] } } } } return $SupportedTests } # caller catches exceptions and handles errors function ExecuteTest($AdapterName, $DiagTestId) { $InBuf = [byte[]]::new(1024) [System.BitConverter]::GetBytes($DiagTestId).CopyTo($InBuf, 0) $Params = @{ Type = [uint32]1 Version = [uint32]1 Size = [uint32]1048 # OID header size (24 bytes) + Data Size (1024) Operation = [uint32]0x43 # Operation = 0x43 is INTEL_GEN_DATA_OP_RUN_DIAGNOSTICS OpVersion = [uint32]1 DataSize = [uint32]1024 InBuf = $InBuf } # WMI method call is blocking $Result = InvokeCimMethod "IntlLan_SetGenData" $AdapterName "WmiSetGenData" $Params # OutStatus contains test result return $Result.OutStatus } # SIG # Begin signature block # MIIocAYJKoZIhvcNAQcCoIIoYTCCKF0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAxbRJtytSMQZzQ # ErCxNeFuozuqS/PjOCu4OwH9a0rqYaCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1DCCFdACAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIC/zeDP8BO7+mxcwtaGJjP+C # YRmBF9fbcsDl1GRzyrRFMA0GCSqGSIb3DQEBAQUABIIBgHew/AFDyprDO5TmP/jQ # o79cInXGdTk2+JicEHZ9sJLNjnsOH9sGs5bJXTd0LKrftLlxOUfUDcx310c5Bknt # wqG1hcDicpoRZNOcpxb9gEhj2IK3sUP1GPXmuEwYfnchgbk6zW7PkA5EqLUSE3Gy # Nn4HvIrYyp0WgI94LFuznYTjqmuEgx9qpr1LgN6eI36d2bJrhStUWYkIO8HtlSJM # dIEE4oIoG0COaZIHWE8ruvghE9PIeZgq5Dz7agLCqUkqIXYVWUanFZFGKKA/YgWV # efQ6dxBs6aEHG7M1ZO8NEND55MPY5Aut6P75bto6iVioaMeAj44VK7yeROj7LYup # B8EurcV/7OHv0BtSzIGlp1a+cC8u7854azJ21UnNaYdJtRqlgm2a3ZBMAtqHXwGD # /occkNUb6yJogVuaBAOyLwxUnqfBru7CUMxHbOpu9qNOFBXwUlWfp5b0H8Jvj4sK # UAu/onEqjdkGupzhgiLQcj3+DFNGwLKD+xKeK5rcgkDeHaGCE04wghNKBgorBgEE # AYI3AwMBMYITOjCCEzYGCSqGSIb3DQEHAqCCEycwghMjAgEDMQ8wDQYJYIZIAWUD # BAICBQAwge8GCyqGSIb3DQEJEAEEoIHfBIHcMIHZAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIClXw4EfysKYaGzH9tEATK+7UWECuqrBC9oX+9GpyYbh # AhQD0W/k0clb/ak8YXYR9R4nmRq0whgPMjAyNDAzMTgxODI0MDFaoG6kbDBqMQsw # CQYDVQQGEwJHQjETMBEGA1UECBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGln # byBMaW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNp # Z25lciAjNKCCDekwggb1MIIE3aADAgECAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCSqG # SIb3DQEBDAUAMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNo # ZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRl # ZDElMCMGA1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMzA1 # MDMwMDAwMDBaFw0zNDA4MDIyMzU5NTlaMGoxCzAJBgNVBAYTAkdCMRMwEQYDVQQI # EwpNYW5jaGVzdGVyMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAqBgNVBAMM # I1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICM0MIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEApJMoUkvPJ4d2pCkcmTjA5w7U0RzsaMsBZOSK # zXewcWWCvJ/8i7u7lZj7JRGOWogJZhEUWLK6Ilvm9jLxXS3AeqIO4OBWZO2h5YEg # ciBkQWzHwwj6831d7yGawn7XLMO6EZge/NMgCEKzX79/iFgyqzCz2Ix6lkoZE1ys # /Oer6RwWLrCwOJVKz4VQq2cDJaG7OOkPb6lampEoEzW5H/M94STIa7GZ6A3vu03l # PYxUA5HQ/C3PVTM4egkcB9Ei4GOGp7790oNzEhSbmkwJRr00vOFLUHty4Fv9Gbsf # PGoZe267LUQqvjxMzKyKBJPGV4agczYrgZf6G5t+iIfYUnmJ/m53N9e7UJ/6GCVP # E/JefKmxIFopq6NCh3fg9EwCSN1YpVOmo6DtGZZlFSnF7TMwJeaWg4Ga9mBmkFgH # gM1Cdaz7tJHQxd0BQGq2qBDu9o16t551r9OlSxihDJ9XsF4lR5F0zXUS0Zxv5F4N # m+x1Ju7+0/WSL1KF6NpEUSqizADKh2ZDoxsA76K1lp1irScL8htKycOUQjeIIISo # h67DuiNye/hU7/hrJ7CF9adDhdgrOXTbWncC0aT69c2cPcwfrlHQe2zYHS0RQlNx # dMLlNaotUhLZJc/w09CRQxLXMn2YbON3Qcj/HyRU726txj5Ve/Fchzpk8WBLBU/v # uS/sCRMCAwEAAaOCAYIwggF+MB8GA1UdIwQYMBaAFBqh+GEZIA/DQXdFKI7RNV8G # EgRVMB0GA1UdDgQWBBQDDzHIkSqTvWPz0V1NpDQP0pUBGDAOBgNVHQ8BAf8EBAMC # BsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBKBgNVHSAE # QzBBMDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3Rp # Z28uY29tL0NQUzAIBgZngQwBBAIwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDovL2Ny # bC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3JsMHQGCCsG # AQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdvLmNvbS9T # ZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdodHRwOi8v # b2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEATJtlWPrgec/vFcMy # bd4zket3WOLrvctKPHXefpRtwyLHBJXfZWlhEwz2DJ71iSBewYfHAyTKx6XwJt/4 # +DFlDeDrbVFXpoyEUghGHCrC3vLaikXzvvf2LsR+7fjtaL96VkjpYeWaOXe8vrqR # ZIh1/12FFjQn0inL/+0t2v++kwzsbaINzMPxbr0hkRojAFKtl9RieCqEeajXPawh # j3DDJHk6l/ENo6NbU9irALpY+zWAT18ocWwZXsKDcpCu4MbY8pn76rSSZXwHfDVE # Ha1YGGti+95sxAqpbNMhRnDcL411TCPCQdB6ljvDS93NkiZ0dlw3oJoknk5fTtOP # D+UTT1lEZUtDZM9I+GdnuU2/zA2xOjDQoT1IrXpl5Ozf4AHwsypKOazBpPmpfTXQ # MkCgsRkqGCGyyH0FcRpLJzaq4Jgcg3Xnx35LhEPNQ/uQl3YqEqxAwXBbmQpA+oBt # lGF7yG65yGdnJFxQjQEg3gf3AdT4LhHNnYPl+MolHEQ9J+WwhkcqCxuEdn17aE+N # t/cTtO2gLe5zD9kQup2ZLHzXdR+PEMSU5n4k5ZVKiIwn1oVmHfmuZHaR6Ej+yFUK # 7SnDH944psAU+zI9+KmDYjbIw74Ahxyr+kpCHIkD3PVcfHDZXXhO7p9eIOYJanwr # CKNI9RX8BE/fzSEceuX1jhrUuUAwggbsMIIE1KADAgECAhAwD2+s3WaYdHypRjan # eC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3 # IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VS # VFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0 # aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5NTlaMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77NawHbWGgSl # zkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavVcRB5h/RG # Ks3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc1zjxFrJw # 06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQhe5cBlK9/ # gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzIjDzTFKKc # vSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4wZytGtzWv # lr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5VC0m7kUa # Om/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmTIBxKlyx3 # GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuoRsDJ8qb/ # fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdprt9v3GEBX # c/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVBeqeDAgMB # AAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNmyzAdBgNV # HQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGGMBIGA1Ud # EwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0gBAowCDAG # BgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNv # bS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEF # BQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9V # U0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29j # c3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNdFuG1U4GR # dd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9Aw63T4uRW # +VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbhRGdtj7BD # EA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4OZOTlJux # 3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhvWiVwYoFz # Y16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JHHfBd1qFz # VwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJLnfE5Xkze # SD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMftpmWJvQ8 # eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/poUGd/rG4 # oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq/eww2vGn # L8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWiAoa6Ke60 # WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQsMIIEKAIBATCBkTB9MQswCQYDVQQGEwJH # QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3Jk # MRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNB # IFRpbWUgU3RhbXBpbmcgQ0ECEDlMJeF8oG0nqGXiO9kdItQwDQYJYIZIAWUDBAIC # BQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUx # DxcNMjQwMzE4MTgyNDAxWjA/BgkqhkiG9w0BCQQxMgQwNY+y5ZkmZP65QDKytK6L # spwRDSWwx7DZJkOeXitIdA6xRssIBL7mp77eMn0wTBZbMIHtBgsqhkiG9w0BCRAC # DDGB3TCB2jCB1zAWBBSuYq91Cgy9R9ZGH3Vo4ryM58pPlDCBvAQUAtZbleKDcMFX # AJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpO # ZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVT # RVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmlj # YXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3DQEBAQUA # BIICACByjNduRVrQ0yRySyFPhmRf8DdXCmkZxyr3+5R0SumZG3hQF8pTtO9aipsZ # Jene06QAMXngWNoCLGClHCjVYw/FE2KGjdD+MHAsPvXYv/cvDApskxaPHj+RyVgT # yOyaYmGix9rWt51Atv/tpTdp8R9703kneo9vGO9dBn8U5pyI1Di6XAc9EWTX9yWb # PVA3zx5AHde2yuIzLYuRobDCYPOJTMC9TsMV8ypM2CPIljGbFCT2moPV79JZN0r/ # ru6QwsrqokHkRrLq/+TjdmR/fLMp/76UWQIZi2Jth1clbnzIBv8N+nyQv0iCbcZE # Fm6t5kYjA0bD138Fl41IXDp3c9Ifs7aDGsKJ1+YlFl3aAGt0jroLgAkXlNr+1rG0 # iNBuBvZtUwCWWZaUe2beKr2N1hBcjUuSrNnB3/e9oyQbIAJvIkuKdNi3Qo9enVer # CKZzA2IW3b82a+qoC15WU9GmnWAVlGI9S2U0BFIuJmu9m9tDNeXC3lSFrD4akLZ2 # tziEbSRvX5Ih2UamADizZW7NaYA3ddt5eONS5Z9VobS0ueVZOq/cr1621FtHyzsC # FfY48gm4q0TfotQ120nYuUv52RhBvE+WQZoQNKElBiweNsX5WrFZ9xGsWnm9RUXw # UPmNkHxZd01N8hwsf9N0bPexxPuVL3WT+W+KbobHRVgHqTRv # SIG # End signature block
combined_dataset/train/non-malicious/TabExpansion_11.ps1
TabExpansion_11.ps1
## Tab-Completion ################# ## For V2CTP3. ## This won't work on V1 and V2CTP and V2CTP2. ## Please dot souce this script file. ## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list. ## ## What this can do is: ## ## [datetime]::n<tab> ## [datetime]::now.d<tab> ## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell" ## $c = [ref]$a; $d = [ref]$b,$c ## $d[0].V<tab>[0][0].Get<tab> ## $d[1].V<tab>[0,0].tos<tab> ## $function:a<tab> ## $env:a<tab> ## [System.Type].a<tab> ## [datetime].Assembly.a<tab> ## ).a<tab> # shows System.Type properties and methods... ## #native command name expansion ## fsu<tab> ## #command option name expansion (for fsutil ipconfig net powershell only) ## fsutil <tab> ## ipconfig <tab> ## net <tab> ## powershell <tab> ## #TypeNames and Type accelerators expansion ## [Dec<tab> ## [system.Man<tab>.auto<tab>.p<tab> ## New-Object -TypeName IO.Dir<tab> ## New-Object System.win<tab>.for<tab>.bu<tab> ## #ProgIDs expansion ## New-Object -Com shel<tab> ## #Enum option expansion ## Set-ExecutionPolicy <tab> ## Set-ExecutionPolicy All<tab> ## Set-ExcusionPolisy -ex <tab> ## Get-TraceSource Inte<tab> ## iex -Errora <tab> -wa Sil<tab> ## #WmiClasses expansion ## Get-WmiObject -class Win32_<tab> ## gwmi __Instance<tab> ## #Encoding expansion ## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab> ## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab> ## #PSProvider name expansion ## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab> ## Get-PSProvider <tab> ## pwd -psp al<tab> ## #PSDrive name expansion ## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab> ## Get-PSDrive <tab> ## pwd -psd <tab> ## #PSSnapin name expansion ## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab> ## Get-Command -PSSnapin <tab> ## Remove-PSSnapin <tab> ## Get-PSSnapin M<tab> ## #Eventlog name and expansion ## Get-Eventlog -Log <tab> ## Get-Eventlog w<tab> ## #Eventlog's entrytype expansion ## Get-EventLog -EntryType <tab> ## Get-EventLog -EntryType Er<tab> ## Get-EventLog -Ent <tab> ## #Service name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab> ## New-Service -DependsOn <tab> ## New-Service -Dep e<tab> ## Get-Service -n <tab> ## Get-Service <tab>,a<tab>,p<tab> ## gsv <tab> ## #Service display name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab> ## Get-Service -Dis <tab> ## gsv -Dis <tab>,w<tab>,b<tab> ## #Cmdlet and Topic name expansion (this also support default help function and man alias) ## Get-Help [-Name] about_<tab> ## Get-Help <tab> ## #Category name expansion (this also support default help function and man alias) ## Get-Help -Category c<tab>,<tab> ## #Command name expansion ## Get-Command [-Name] <tab> ## Get-Command -Name <tab> ## gcm a<tab>,<tab> ## #Scope expansion ## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias ## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab> ## Clear-Variable -Scope G<tab> ## Set-Alias -s <tab> ## #Process name expansion ## [Get-Process | Stop-Process] [-Name] <tab> ## Stop-Process -Name <tab> ## Stop-Process -N pow<tab> ## Get-Process <tab> ## ps power<tab> ## #Trace sources expansion ## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab> ## #Trace -ListenerOption expansion ## [Set-TraceSource | Trace-Command] -ListenerOption <tab> ## Set-TraceSource -Lis <tab>,n<tab> ## #Trace -Option expansion ## [Set-TraceSource | Trace-Command] -Option <tab> ## Set-TraceSource -op <tab>,con<tab> ## #ItemType expansion ## New-Item -Item <tab> ## ni -ItemType d<tab> ## #ErrorAction and WarningAction option expansion ## CMDLET [-ErrorAction | -WarningAction] <tab> ## CMDLET -Errora s<tab> ## CMDLET -ea con<tab> ## CMDLET -wa <tab> ## #Continuous expansion with comma when parameter can treat multiple option ## # if there are spaces, occur display bug in the line ## # if strings contains '$' or '-', not work ## Get-Command -CommandType <tab>,<tab><tab>,cm<tab> ## pwd -psp <tab>,f<tab>,va<tab> ## Get-EventLog -EntryType <tab>,i<tab>,s<tab> ## #Enum expansion in method call expression ## # this needs one or more spaces after left parenthesis or comma ## $str = "day night" ## $str.Split( " ",<space>rem<tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR ## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success ## $type = [System.Type] ## $type.GetMembers(<space>Def<tab> ## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab> ## # this can do continuous enum expansion with comma and no spaces ## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>" ## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab> ## #Better '$_.' expansion when cmdlet output objects or method return objects ## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> } ## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB } ## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> } ## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" } ## $data = Get-Process ## $data[2,4,5] | % { $_.<tab> ## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type ## #Property name expansion by -Property parameter ## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object | ## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab> ## Select-Object -ExcludeProperty <tab> ## Select-Object -ExpandProperty <tab> ## gcm Get-Acl|select -exp Par<tab> ## ps |group na<tab> ## ls | ft A<tab>,M<tab>,L<tab> ## #Hashtable key expansion in the variable name and '.<tab>' ## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} } ## $hash.pow<tab>.pro<tab> ## #Parameter expansion for function, filter and script ## man -f<tab> ## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1 ## .\\foobar.ps1 -<tab> -b<tab> ## #Enum expansion for function, filter and scripts ## # this can do continuous enum expansion with comma and no spaces ## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab> ## #Enum expansion for assignment expression ## #needs space(s) after '=' and comma ## #strongly-typed with -as operator and space(s) ## $ErrorActionPreference =<space><tab> ## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3 ## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab> ## #Path expansion with variable and '\\' or '/' ## $PWD\\../../<tab>\\<tab> ## "$env:SystemDrive/pro<tab>/<tab> ## #Operator expansion which starts with '-' ## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2' ## 1..9 -co<tab> 5 ## #Keyword expansion ## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } } ## #Variable name expansion (only global scope) ## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab> ## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab> ## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab> ## Tee-Object -Variable <tab> ## gv pro<tab>,<tab> ## Remove-Variable -Name out<tab>,<tab>,ps<tab> ## ... | ... | tee -v <tab> ## #Alias name expansion ## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab> ## Export-Alias -Name <tab> ## Get-Alias i<tab>,e<tab>,a<tab> ## epal -n for<tab> ## #Property name expansion with -groupBy parameter ## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab> ## ps | ft -g <tab> ## gcm | Format-Wide -GroupBy Par<tab> ## #Type accelerators expansion with no charactors ## [<tab> ## New-Object -typename <tab> ## New-Object <tab> ## # File glob expansion with '@' ## ls *.txt@<tab> ## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma ## ls * -Filter *.txt # 2 <tab> refactoring ## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern ## This can also use '^'(hat) or '~'(tilde) for Excluding ## ls <hat>*.txt@<tab> ## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma ## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring ## *.txt<tilde>foo*<tilde>bar*@<tab> ## ls file.txt # 1 <tab> expanding with comma ## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring ## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> ) ## ls * -Filter * -Excluding foo*, bar*<Enter> ## #ls<tab> ## #1<tab> ## # Command buffer stack with ';'(semicolon) ## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1 ## echo "PowerShell"<semicolon><tab> # push command2 ## get-process<semicolon><tab> # push command3 ## {COMMAND}<Enter> # execute another command ## get-process # Auto pop command3 from stack by LIFO ## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon) ## get-process; <semicolon><comma><tab> ## get-process; echo "PowerShell" # pop command2 from stack by LIFO ## # Function name expansion after 'function' or 'filter' keywords ## function cl<tab> ## #Switch syntax option expansion ## switch -w<tab> -f<tab> ## #Better powershell.exe option expansion with '-' ## powershell -no<tab> -<tab> -en<tab> ## #A part of PowerShell attributes expansion ( CmdletBinding, Parameter, Alias, Validate*, Allow* ) ## [par<tab> ## [cmd<tab> ## #Member expansion for CmdletBinding and Parameter attributes ## [Parameter(man<tab>,<tab>1,val<tab>$true)] ## [CmdletBinding( <tab>"foo", su<tab>$true)] ## #Several current date/time formats with Ctrl+D ## <Ctrl+D><tab><tab><tab><tab><tab>... ## #Hand-operated pop from command buffer with Ctrl+P (this is also available with ';:' or ';,') ## <command>;<tab> # push command ## <Ctrl+D><tab> # pop ## #Paste clipboard with Ctrl+V ## <Ctrl+V><tab> ### Generate ProgIDs list... if ( Test-Path $PSHOME\\ProgIDs.txt ) { $_ProgID = type $PSHOME\\ProgIDs.txt -ReadCount 0 } else { $_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\") $_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_subkey in $_HKCR.GetSubKeyNames() ) { foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") ) { if ($_i -ne $null) { $_ProgID.Add($_i.GetValue("")) } } } '$_ProgID was updated...' | Out-Host $_ProgID = $_ProgID|sort -Unique Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose } ### Generate TypeNames list... if ( Test-Path $PSHOME\\TypeNames.txt ) { $_TypeNames = type $PSHOME\\TypeNames.txt -ReadCount 0 } else { $_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() ) { foreach ( $_type in $_asm.GetTypes() ) { $_TypeNames.Add($_type.FullName) } } '$_TypeNames was updated...' | Out-Host $_TypeNames = $_TypeNames | sort -Unique Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose } if ( Test-Path $PSHOME\\TypeNames_System.txt ) { $_TypeNames_System = type $PSHOME\\TypeNames_System.txt -ReadCount 0 } else { $_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.' '$_TypeNames_System was updated...' | Out-Host Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose } ### Generate WMIClasses list... if ( Test-Path $PSHOME\\WMIClasses.txt ) { $_WMIClasses = type $PSHOME\\WMIClasses.txt -ReadCount 0 } else { $_WMIClasses = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_class in gwmi -List ) { $_WMIClasses.Add($_class.Name) } $_WMIClasses = $_WMIClasses | sort -Unique '$_WMIClasses was updated...' | Out-Host Set-Content -Value $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose } [Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null $global:_cmdstack = New-Object Collections.Stack $global:_snapin = $null $global:_TypeAccelerators = "ADSI", "Array", "Bool", "Byte", "Char", "Decimal", "Double", "float", "hashtable", "int", "Long", "PSObject", "ref", "Regex", "ScriptBlock", "Single", "String", "switch", "Type", "WMI", "WMIClass", "WMISearcher", "xml" iex (@' function prompt { if ($_cmdstack.Count -gt 0) { $line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) } '@ + @" ${function:prompt} } "@) function Write-ClassNames ( $data, $i, $prefix='', $sep='.' ) { $preItem = "" foreach ( $class in $data -like $_opt ) { $Item = $class.Split($sep) if ( $preItem -ne $Item[$i] ) { if ( $i+1 -eq $Item.Count ) { if ( $prefix -eq "[" ) { $suffix = "]" } elseif ( $sep -eq "_" ) { $suffix = "" } else { $suffix = " " } } else { $suffix = "" } $prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix $preItem = $Item[$i] } } } function Get-PipeLineObject { $i = -2 $property = $null do { $str = $line.Split("|") # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1] # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] if ( $_cmdlet -eq "?" ) { $_cmdlet = "Where-Object" } $global:_exp = $_cmdlet # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0] } if ( "Select-Object" -eq $_cmdlet ) { if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' ) { $property = $Matches[1] + ";" + $property } } $i-- } while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet ) if ( $global:_forgci -eq $null ) { $a = @(ls "Alias:\\")[0] $e = @(ls "Env:\\")[0] $f = @(ls "Function:\\")[0] $h = @(ls "HKCU:\\")[0] $v = @(ls "Variable:\\")[0] $c = @(ls "cert:\\")[0] $global:_forgci = gi $PSHOME\\powershell.exe | Add-Member 'NoteProperty' CommandType $f.CommandType -P | Add-Member 'NoteProperty' Definition $a.Definition -P | Add-Member 'NoteProperty' Description $a.Description -P | Add-Member 'NoteProperty' Key $e.Key -P | Add-Member 'NoteProperty' Location $c.Location -P | Add-Member 'NoteProperty' LocationName $c.LocationName -P | Add-Member 'NoteProperty' Options $a.Options -P | Add-Member 'NoteProperty' ReferencedCommand $a.ReferencedCommand -P | Add-Member 'NoteProperty' ResolvedCommand $a.ResolvedCommand -P | Add-Member 'NoteProperty' ScriptBlock $f.ScriptBlock -P | Add-Member 'NoteProperty' StoreNames $c.StoreNames -P | Add-Member 'NoteProperty' SubKeyCount $h.SubKeyCount -P | Add-Member 'NoteProperty' Value $e.Value -P | Add-Member 'NoteProperty' ValueCount $h.ValueCount -P | Add-Member 'NoteProperty' Visibility $a.Visibility -P | Add-Member 'NoteProperty' Property $h.Property -P | Add-Member 'NoteProperty' ResolvedCommandName $a.ResolvedCommandName -P | Add-Member 'ScriptMethod' Close {} -P | Add-Member 'ScriptMethod' CreateSubKey {} -P | Add-Member 'ScriptMethod' DeleteSubKey {} -P | Add-Member 'ScriptMethod' DeleteSubKeyTree {} -P | Add-Member 'ScriptMethod' DeleteValue {} -P | Add-Member 'ScriptMethod' Flush {} -P | Add-Member 'ScriptMethod' GetSubKeyNames {} -P | Add-Member 'ScriptMethod' GetValue {} -P | Add-Member 'ScriptMethod' GetValueKind {} -P | Add-Member 'ScriptMethod' GetValueNames {} -P | Add-Member 'ScriptMethod' IsValidValue {} -P | Add-Member 'ScriptMethod' OpenSubKey {} -P | Add-Member 'ScriptMethod' SetValue {} -P } if ( $global:_mix -eq $null ) { $f = gi $PSHOME\\powershell.exe $t = [type] $s = "" $global:_mix = ` Add-Member -InputObject (New-Object PSObject) 'NoteProperty' Mode $f.Mode -P | Add-Member 'NoteProperty' Assembly $t.Assembly -P | Add-Member 'NoteProperty' AssemblyQualifiedName $t.AssemblyQualifiedName -P | Add-Member 'NoteProperty' Attributes $f.Attributes -P | Add-Member 'NoteProperty' BaseType $t.BaseType -P | Add-Member 'NoteProperty' ContainsGenericParameters $t.ContainsGenericParameters -P | Add-Member 'NoteProperty' CreationTime $f.CreationTime -P | Add-Member 'NoteProperty' CreationTimeUtc $f.CreationTimeUtc -P | Add-Member 'NoteProperty' DeclaringMethod $t.DeclaringMethod -P | Add-Member 'NoteProperty' DeclaringType $t.DeclaringType -P | Add-Member 'NoteProperty' Exists $f.Exists -P | Add-Member 'NoteProperty' Extension $f.Extension -P | Add-Member 'NoteProperty' FullName $f.FullName -P | Add-Member 'NoteProperty' GenericParameterAttributes $t.GenericParameterAttributes -P | Add-Member 'NoteProperty' GenericParameterPosition $t.GenericParameterPosition -P | Add-Member 'NoteProperty' GUID $t.GUID -P | Add-Member 'NoteProperty' HasElementType $t.HasElementType -P | Add-Member 'NoteProperty' IsAbstract $t.IsAbstract -P | Add-Member 'NoteProperty' IsAnsiClass $t.IsAnsiClass -P | Add-Member 'NoteProperty' IsArray $t.IsArray -P | Add-Member 'NoteProperty' IsAutoClass $t.IsAutoClass -P | Add-Member 'NoteProperty' IsAutoLayout $t.IsAutoLayout -P | Add-Member 'NoteProperty' IsByRef $t.IsByRef -P | Add-Member 'NoteProperty' IsClass $t.IsClass -P | Add-Member 'NoteProperty' IsCOMObject $t.IsCOMObject -P | Add-Member 'NoteProperty' IsContextful $t.IsContextful -P | Add-Member 'NoteProperty' IsEnum $t.IsEnum -P | Add-Member 'NoteProperty' IsExplicitLayout $t.IsExplicitLayout -P | Add-Member 'NoteProperty' IsGenericParameter $t.IsGenericParameter -P | Add-Member 'NoteProperty' IsGenericType $t.IsGenericType -P | Add-Member 'NoteProperty' IsGenericTypeDefinition $t.IsGenericTypeDefinition -P | Add-Member 'NoteProperty' IsImport $t.IsImport -P | Add-Member 'NoteProperty' IsInterface $t.IsInterface -P | Add-Member 'NoteProperty' IsLayoutSequential $t.IsLayoutSequential -P | Add-Member 'NoteProperty' IsMarshalByRef $t.IsMarshalByRef -P | Add-Member 'NoteProperty' IsNested $t.IsNested -P | Add-Member 'NoteProperty' IsNestedAssembly $t.IsNestedAssembly -P | Add-Member 'NoteProperty' IsNestedFamANDAssem $t.IsNestedFamANDAssem -P | Add-Member 'NoteProperty' IsNestedFamily $t.IsNestedFamily -P | Add-Member 'NoteProperty' IsNestedFamORAssem $t.IsNestedFamORAssem -P | Add-Member 'NoteProperty' IsNestedPrivate $t.IsNestedPrivate -P | Add-Member 'NoteProperty' IsNestedPublic $t.IsNestedPublic -P | Add-Member 'NoteProperty' IsNotPublic $t.IsNotPublic -P | Add-Member 'NoteProperty' IsPointer $t.IsPointer -P | Add-Member 'NoteProperty' IsPrimitive $t.IsPrimitive -P | Add-Member 'NoteProperty' IsPublic $t.IsPublic -P | Add-Member 'NoteProperty' IsSealed $t.IsSealed -P | Add-Member 'NoteProperty' IsSerializable $t.IsSerializable -P | Add-Member 'NoteProperty' IsSpecialName $t.IsSpecialName -P | Add-Member 'NoteProperty' IsUnicodeClass $t.IsUnicodeClass -P | Add-Member 'NoteProperty' IsValueType $t.IsValueType -P | Add-Member 'NoteProperty' IsVisible $t.IsVisible -P | Add-Member 'NoteProperty' LastAccessTime $f.LastAccessTime -P | Add-Member 'NoteProperty' LastAccessTimeUtc $f.LastAccessTimeUtc -P | Add-Member 'NoteProperty' LastWriteTime $f.LastWriteTime -P | Add-Member 'NoteProperty' LastWriteTimeUtc $f.LastWriteTimeUtc -P | Add-Member 'NoteProperty' MemberType $t.MemberType -P | Add-Member 'NoteProperty' MetadataToken $t.MetadataToken -P | Add-Member 'NoteProperty' Module $t.Module -P | Add-Member 'NoteProperty' Name $t.Name -P | Add-Member 'NoteProperty' Namespace $t.Namespace -P | Add-Member 'NoteProperty' Parent $f.Parent -P | Add-Member 'NoteProperty' ReflectedType $t.ReflectedType -P | Add-Member 'NoteProperty' Root $f.Root -P | Add-Member 'NoteProperty' StructLayoutAttribute $t.StructLayoutAttribute -P | Add-Member 'NoteProperty' TypeHandle $t.TypeHandle -P | Add-Member 'NoteProperty' TypeInitializer $t.TypeInitializer -P | Add-Member 'NoteProperty' UnderlyingSystemType $t.UnderlyingSystemType -P | Add-Member 'NoteProperty' PSChildName $f.PSChildName -P | Add-Member 'NoteProperty' PSDrive $f.PSDrive -P | Add-Member 'NoteProperty' PSIsContainer $f.PSIsContainer -P | Add-Member 'NoteProperty' PSParentPath $f.PSParentPath -P | Add-Member 'NoteProperty' PSPath $f.PSPath -P | Add-Member 'NoteProperty' PSProvider $f.PSProvider -P | Add-Member 'NoteProperty' BaseName $f.BaseName -P | Add-Member 'ScriptMethod' Clone {} -P | Add-Member 'ScriptMethod' CompareTo {} -P | Add-Member 'ScriptMethod' Contains {} -P | Add-Member 'ScriptMethod' CopyTo {} -P | Add-Member 'ScriptMethod' Create {} -P | Add-Member 'ScriptMethod' CreateObjRef {} -P | Add-Member 'ScriptMethod' CreateSubdirectory {} -P | Add-Member 'ScriptMethod' Delete {} -P | Add-Member 'ScriptMethod' EndsWith {} -P | Add-Member 'ScriptMethod' FindInterfaces {} -P | Add-Member 'ScriptMethod' FindMembers {} -P | Add-Member 'ScriptMethod' GetAccessControl {} -P | Add-Member 'ScriptMethod' GetArrayRank {} -P | Add-Member 'ScriptMethod' GetConstructor {} -P | Add-Member 'ScriptMethod' GetConstructors {} -P | Add-Member 'ScriptMethod' GetCustomAttributes {} -P | Add-Member 'ScriptMethod' GetDefaultMembers {} -P | Add-Member 'ScriptMethod' GetDirectories {} -P | Add-Member 'ScriptMethod' GetElementType {} -P | Add-Member 'ScriptMethod' GetEnumerator {} -P | Add-Member 'ScriptMethod' GetEvent {} -P | Add-Member 'ScriptMethod' GetEvents {} -P | Add-Member 'ScriptMethod' GetField {} -P | Add-Member 'ScriptMethod' GetFields {} -P | Add-Member 'ScriptMethod' GetFiles {} -P | Add-Member 'ScriptMethod' GetFileSystemInfos {} -P | Add-Member 'ScriptMethod' GetGenericArguments {} -P | Add-Member 'ScriptMethod' GetGenericParameterConstraints {} -P | Add-Member 'ScriptMethod' GetGenericTypeDefinition {} -P | Add-Member 'ScriptMethod' GetInterface {} -P | Add-Member 'ScriptMethod' GetInterfaceMap {} -P | Add-Member 'ScriptMethod' GetInterfaces {} -P | Add-Member 'ScriptMethod' GetLifetimeService {} -P | Add-Member 'ScriptMethod' GetMember {} -P | Add-Member 'ScriptMethod' GetMembers {} -P | Add-Member 'ScriptMethod' GetMethod {} -P | Add-Member 'ScriptMethod' GetMethods {} -P | Add-Member 'ScriptMethod' GetNestedType {} -P | Add-Member 'ScriptMethod' GetNestedTypes {} -P | Add-Member 'ScriptMethod' GetObjectData {} -P | Add-Member 'ScriptMethod' GetProperties {} -P | Add-Member 'ScriptMethod' GetProperty {} -P | Add-Member 'ScriptMethod' GetTypeCode {} -P | Add-Member 'ScriptMethod' IndexOf {} -P | Add-Member 'ScriptMethod' IndexOfAny {} -P | Add-Member 'ScriptMethod' InitializeLifetimeService {} -P | Add-Member 'ScriptMethod' Insert {} -P | Add-Member 'ScriptMethod' InvokeMember {} -P | Add-Member 'ScriptMethod' IsAssignableFrom {} -P | Add-Member 'ScriptMethod' IsDefined {} -P | Add-Member 'ScriptMethod' IsInstanceOfType {} -P | Add-Member 'ScriptMethod' IsNormalized {} -P | Add-Member 'ScriptMethod' IsSubclassOf {} -P | Add-Member 'ScriptMethod' LastIndexOf {} -P | Add-Member 'ScriptMethod' LastIndexOfAny {} -P | Add-Member 'ScriptMethod' MakeArrayType {} -P | Add-Member 'ScriptMethod' MakeByRefType {} -P | Add-Member 'ScriptMethod' MakeGenericType {} -P | Add-Member 'ScriptMethod' MakePointerType {} -P | Add-Member 'ScriptMethod' MoveTo {} -P | Add-Member 'ScriptMethod' Normalize {} -P | Add-Member 'ScriptMethod' PadLeft {} -P | Add-Member 'ScriptMethod' PadRight {} -P | Add-Member 'ScriptMethod' Refresh {} -P | Add-Member 'ScriptMethod' Remove {} -P | Add-Member 'ScriptMethod' Replace {} -P | Add-Member 'ScriptMethod' SetAccessControl {} -P | Add-Member 'ScriptMethod' Split {} -P | Add-Member 'ScriptMethod' StartsWith {} -P | Add-Member 'ScriptMethod' Substring {} -P | Add-Member 'ScriptMethod' ToCharArray {} -P | Add-Member 'ScriptMethod' ToLower {} -P | Add-Member 'ScriptMethod' ToLowerInvariant {} -P | Add-Member 'ScriptMethod' ToUpper {} -P | Add-Member 'ScriptMethod' ToUpperInvariant {} -P | Add-Member 'ScriptMethod' Trim {} -P | Add-Member 'ScriptMethod' TrimEnd {} -P | Add-Member 'ScriptMethod' TrimStart {} -P | Add-Member 'NoteProperty' Chars $s.Chars -P } if ( "Add-Member" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Compare-Object" -eq $_cmdlet ) { $global:_dummy = (Compare-Object 1 2)[0] } if ( "ConvertFrom-SecureString" -eq $_cmdlet ) { $global:_dummy = $null } if ( "ConvertTo-SecureString" -eq $_cmdlet ) { $global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force } if ( "ForEach-Object" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Acl" -eq $_cmdlet ) { $global:_dummy = Get-Acl } if ( "Get-Alias" -eq $_cmdlet ) { $global:_dummy = (Get-Alias)[0] } if ( "Get-AuthenticodeSignature" -eq $_cmdlet ) { $global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe } if ( "Get-ChildItem" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-Command" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Get-Content" -eq $_cmdlet ) { $global:_dummy = (type $PSHOME\\profile.ps1)[0] } if ( "Get-Credential" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Culture" -eq $_cmdlet ) { $global:_dummy = Get-Culture } if ( "Get-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( "Get-Event" -eq $_cmdlet ) { $global:_dummy = (Get-Event)[0] } if ( "Get-EventLog" -eq $_cmdlet ) { $global:_dummy = Get-EventLog Windows` PowerShell -Newest 1 } if ( "Get-ExecutionPolicy" -eq $_cmdlet ) { $global:_dummy = Get-ExecutionPolicy } if ( "Get-Help" -eq $_cmdlet ) { $global:_dummy = Get-Help Add-Content } if ( "Get-History" -eq $_cmdlet ) { $global:_dummy = Get-History -Count 1 } if ( "Get-Host" -eq $_cmdlet ) { $global:_dummy = Get-Host } if ( "Get-Item" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-ItemProperty" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Location" -eq $_cmdlet ) { $global:_dummy = Get-Location } if ( "Get-Member" -eq $_cmdlet ) { $global:_dummy = (1|Get-Member)[0] } if ( "Get-Module" -eq $_cmdlet ) { $global:_dummy = (Get-Module)[0] } if ( "Get-PfxCertificate" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Process" -eq $_cmdlet ) { $global:_dummy = ps powershell } if ( "Get-PSBreakpoint" -eq $_cmdlet ) { $global:_dummy = Add-Member -InputObject (New-Object PSObject) 'NoteProperty' Action '' -P | Add-Member 'NoteProperty' Command '' -P | Add-Member 'NoteProperty' Enabled '' -P | Add-Member 'NoteProperty' HitCount '' -P | Add-Member 'NoteProperty' Id '' -P | Add-Member 'NoteProperty' Script '' -P } if ( "Get-PSCallStack" -eq $_cmdlet ) { $global:_dummy = Get-PSCallStack } if ( "Get-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Function } if ( "Get-PSProvider" -eq $_cmdlet ) { $global:_dummy = Get-PSProvider FileSystem } if ( "Get-PSSnapin" -eq $_cmdlet ) { $global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core } if ( "Get-Service" -eq $_cmdlet ) { $global:_dummy = (Get-Service)[0] } if ( "Get-TraceSource" -eq $_cmdlet ) { $global:_dummy = Get-TraceSource AddMember } if ( "Get-UICulture" -eq $_cmdlet ) { $global:_dummy = Get-UICulture } if ( "Get-Variable" -eq $_cmdlet ) { $global:_dummy = Get-Variable _ } if ( "Get-WmiObject" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Group-Object" -eq $_cmdlet ) { $global:_dummy = 1 | group } if ( "Measure-Command" -eq $_cmdlet ) { $global:_dummy = Measure-Command {} } if ( "Measure-Object" -eq $_cmdlet ) { $global:_dummy = Measure-Object } if ( "New-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Alias } if ( "New-TimeSpan" -eq $_cmdlet ) { $global:_dummy = New-TimeSpan } if ( "Resolve-Path" -eq $_cmdlet ) { $global:_dummy = $PWD } if ( "Select-String" -eq $_cmdlet ) { $global:_dummy = " " | Select-String " " } if ( "Set-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( $property -ne $null) { foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) ) { $global:_dummy = @($global:_dummy.$name)[0] } } } function TabExpansion { # This is the default function to use for tab expansion. It handles simple # member expansion on variables, variable name expansion and parameter completion # on commands. It doesn't understand strings so strings containing ; | ( or { may # cause expansion to fail. param($line, $lastWord) & { # Helper function to write out the matching set of members. It depends # on dynamic scoping to get $_base, _$expression and $_pat function Write-Members ($sep='.') { # evaluate the expression to get the object to examine... Invoke-Expression ('$_val=' + $_expression) if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } $_method = [Management.Automation.PSMemberTypes] ` 'Method,CodeMethod,ScriptMethod,ParameterizedProperty' if ($sep -eq '.') { $members = ( [Object[]](Get-Member -InputObject $_val.PSextended $_pat) + [Object[]](Get-Member -InputObject $_val.PSadapted $_pat) + [Object[]](Get-Member -InputObject $_val.PSbase $_pat) ) if ( $_val -is [Hashtable] ) { [Microsoft.PowerShell.Commands.MemberDefinition[]]$_keys = $null foreach ( $_name in $_val.Keys ) { $_keys += ` New-Object Microsoft.PowerShell.Commands.MemberDefinition ` [int],$_name,"Property",0 } $members += [Object[]]$_keys | ? { $_.Name -like $_pat } } foreach ($_m in $members | sort membertype,name -Unique) { if ($_m.MemberType -band $_method) { # Return a method... $_base + $_expression + $sep + $_m.name + '(' } else { # Return a property... $_base + $_expression + $sep + $_m.name } } } else { foreach ($_m in Get-Member -Static -InputObject $_val $_pat | Sort-Object membertype,name) { if ($_m.MemberType -band $_method) { # Return a method... $_base + $_expression + $sep + $_m.name + '(' } else { # Return a property... $_base + $_expression + $sep + $_m.name } } } } switch ([int]$line[-1]) { # Ctrl+D several date/time formats 4 { "[DateTime]::Now" [DateTime]::Now [DateTime]::Now.ToString("yyyyMMdd") [DateTime]::Now.ToString("MMddyyyy") [DateTime]::Now.ToString("yyyyMMddHHmmss") [DateTime]::Now.ToString("MMddyyyyHHmmss") 'd f g m o r t u y'.Split(" ") | % { [DateTime]::Now.ToString($_) } break; } # Ctrl+P hand-operated pop from command buffer stack 16 { $_base = $lastword.SubString(0, $lastword.Length-1) $_buf = $global:_cmdstack.Pop() if ( $_buf.Contains("'") ) { $line = ($line.SubString(0, $line.Length-1) + $_buf) -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait("{Esc}$line") } else { $_base + $_buf } break; } # Ctrl+R $Host.UI.RawUI. 18 { '$Host.UI.RawUI.' '$Host.UI.RawUI' break; } # Ctrl+V paste clipboard 22 { $_base = $lastword.SubString(0, $lastword.Length-1) $global:_clip = New-Object System.Windows.Forms.TextBox $global:_clip.Multiline = $true $global:_clip.Paste() $line = ($line.SubString(0, $line.Length-1) + $global:_clip.Text) -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait("{Esc}$line") break; } } switch -regex ($lastWord) { # Handle property and method expansion at '$_' '(^.*)(\\$_\\.)(\\w*)$' { $_base = $matches[1] $_expression = '$global:_dummy' $_pat = $matches[3] + '*' $global:_dummy = $null Get-PipeLineObject if ( $global:_dummy -eq $null ) { if ( $global:_exp -match '^\\$.*\\(.*$' ) { $type = ( iex $_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' ) { $tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1] $type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' ) { $global:_dummy = @(iex $Matches[1])[0] } else { $global:_dummy = $global:_mix } } Write-Members break; } # Handle property and method expansion rooted at variables... # e.g. $a.b.<tab> '(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] $_pat = $matches[4] + '*' if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle simple property and method expansion on static members... # e.g. [datetime]::n<tab> '(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] $_pat = $matches[4] + '*' Write-Members '::' break; } # Handle complex property and method expansion on static members # where there are intermediate properties... # e.g. [datetime]::now.d<tab> '(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' { $_base = $matches[1] # everything before the expression $_expression = $matches[2].TrimEnd('.') # expression less trailing '.' $_pat = $matches[5] + '*' # the member to look for... Write-Members break; } # Handle variable name expansion... '(^.*\\$)(\\w+)$' { $_prefix = $matches[1] $_varName = $matches[2] foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*')) { $_prefix + $_v.name } break; } # Handle env&function drives variable name expansion... '(^.*\\$)(.*\\:)(\\w+)$' { $_prefix = $matches[1] $_drive = $matches[2] $_varName = $matches[3] if ($_drive -eq "env:" -or $_drive -eq "function:") { foreach ($_v in Get-ChildItem ($_drive + $_varName + '*')) { $_prefix + $_drive + $_v.name } } break; } # Handle array's element property and method expansion # where there are intermediate properties... # e.g. foo[0].n.b<tab> '(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$' { $_base = $matches[1] $_expression = $matches[2].TrimEnd('.') $_pat = $Matches[8] + '*' [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle property and method expansion rooted at type object... # e.g. [System.Type].a<tab> '(^\\[(\\w|\\.)+\\])\\.(\\w*)$' { if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; } $_expression = $Matches[1] $_pat = $Matches[$matches.Count-1] + '*' Write-Members break; } # Handle complex property and method expansion on type object members # where there are intermediate properties... # e.g. [datetime].Assembly.a<tab> '^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' { $_expression = $matches[1].TrimEnd('.') # expression less trailing '.' $_pat = $matches[4] + '*' # the member to look for... if ( $(iex $_expression) -eq $null ) { break; } Write-Members break; } # Handle property and method expansion rooted at close parenthes... # e.g. (123).a<tab> '^(.*)\\)((\\w|\\.)*)\\.(\\w*)$' { $_base = $Matches[1] + ")" if ( $matches[3] -eq $null) { $_expression = '[System.Type]' } else { $_expression = '[System.Type]' + $Matches[2] } $_pat = $matches[4] + '*' iex "$_expression | Get-Member $_pat | sort MemberType,Name" | % { if ( $_.MemberType -like "*Method*" -or $_.MemberType -like "*Parameterized*" ) { $parenthes = "(" } if ( $Matches[2] -eq "" ) { $_base + "." + $_.Name + $parenthes } else { $_base + $Matches[2] + "." + $_.Name + $parenthes } } break; } # Handle .NET type name expansion ... # e.g. [Microsoft.PowerShell.Com<tab> '^\\[(\\w+(\\.\\w*)*)$' { $_opt = $matches[1] + '*' if ( $_opt -eq "*" ) { $_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]' } else { $_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]' Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) '[' Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) '[' } break; } # Handle file/directory name which contains $env: variable # e.g. $env:windir\\<tab> '^\\$(env:)?\\w+([\\\\/][^\\\\/]*)*$' { $path = iex ('"' + $Matches[0] + '"') if ( $Matches[2].Length -gt 1 ) { $parent = Split-Path $path -Parent $leaf = (Split-Path $path -Leaf) + '*' } else { $parent = $path $leaf = '*' } if ( Test-Path $parent ) { $i = $Matches[0].LastIndexOfAny("/\\") $_base = $Matches[0].Substring(0,$i+1) [IO.Directory]::GetFileSystemEntries( $parent, $leaf ) | % { $_base + ($_.Split("\\/")[-1] -replace '([\\$\\s&])','`$1' -replace '([[\\]])', '````$1') } } } # Handle file glob expansion ... # e.g. *.txt~about*@<tab> '^(\\^?([^~]+))(~(.*))*@$' { if ( $Matches[1] -notlike "^*" ) { $include = $Matches[2] -replace '``','`' if ( $Matches[3] ) { $exclude = $Matches[3].Split("~", "RemoveEmptyEntries" -as [System.StringSplitOptions]) -replace '``','`' } } else { $include = "*" $exclude = $Matches[2] -replace '``','`' } $fse = [IO.Directory]::GetFileSystemEntries($PWD) $fse = $fse -replace '.*[\\\\/]([^/\\\\]*)$','$1' % -in ($fse -like $include) { $fse = $_; $exclude | % { $fse = $fse -notlike $_ } } $fse = $fse -replace '^.*\\s.*$', ('"$0"') $fse = $fse -replace '([\\[\\]])', '````$1' -replace '^.*([\\[\\]]).*$', ('"$0"') $fse = $fse -replace '""', '"' $OFS = ", "; "$fse" $OFS = ", "; "* -Filter $include " + $(if($exclude){"-Exclude $exclude"}) $Matches[0].Substring(0, $Matches[0].Length-1) break; } # Handle command buffer stack... '(.*);(.?)$' { $_base = $Matches[1] if ( $Matches[2] -eq ":" -or $Matches[2] -eq "," ) { if ( $_cmdstack.Count -gt 0 ) { $_buf = $global:_cmdstack.Pop() if ( $_buf.Contains("'") ) { $line = ($line.SubString(0, $line.Length-1) + $_buf) -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait("{Esc}$line") } else { $_base + $_buf } } else { "" } } elseif ( $Matches[2] -eq "" ) { $global:_cmdstack.Push($line.SubString(0,$line.Length-1)) [System.Windows.Forms.SendKeys]::SendWait("{ESC}") } } # Do completion on parameters... '^-([\\w0-9]*)' { $_pat = $matches[1] + '*' # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($line, '[|;=]')[-1] # Extract the trailing unclosed block e.g. ls | foreach { cp if ($_cmdlet -match '\\{([^\\{\\}]*)$') { $_cmdlet = $matches[1] } # Extract the longest unclosed parenthetical expression... if ($_cmdlet -match '\\(([^()]*)$') { $_cmdlet = $matches[1] } # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] # now get the info object for it... $_cmdlet = @(Get-Command -type 'All' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'All' $_cmdlet.Definition)[0] } if ( $_cmdlet.name -eq "powershell.exe" ) { if ( $global:_PSexeOption ) { $global:_PSexeOption -like "-$_pat" -replace '^(-[^,]+).*$', '$1' | sort } else { ($global:_PSexeOption = powershell.exe -?) -like "-$_pat" -replace '^(-[^,]+).*$', '$1' | sort } break; } if ( $_cmdlet.CommandType -eq "Cmdlet" ) { # expand the parameter sets and emit the matching elements foreach ($_n in $_cmdlet.ParameterSets | Select-Object -expand parameters | Sort-Object -Unique name) { $_n = $_n.name if ($_n -like $_pat) { '-' + $_n } } break; } elseif ( "ExternalScript", "Function", "Filter" -contains $_cmdlet.CommandType ) { if ( $_cmdlet.CommandType -eq "ExternalScript" ) { $_fsr = New-Object IO.StreamReader $_cmdlet.Definition $_def = "Function _Dummy { $($_fsr.ReadToEnd()) }" $_fsr.Close() iex $_def $_cmdlet = "_Dummy" } if ( ((gi "Function:$_cmdlet").Definition -replace '\\n').Split("{")[0] -match 'param\\((.*\\))\\s*[;\\.&a-zA-Z]*\\s*$' ) { ( ( ( $Matches[1].Split('$', "RemoveEmptyEntries" -as [System.StringSplitOptions]) -replace ` '^(\\w+)(.*)','$1' ) -notmatch '^\\s+$' ) -notmatch '^\\s*\\[.*\\]\\s*$' ) -like $_pat | sort | % { '-' + $_ } } break; } elseif ( $line -match 'switch\\s+(-\\w+\\s+)*-(\\w*)$') { $_pat = $Matches[2] + '*' "regex", "wildcard", "exact", "casesensitive", "file" -like $_pat -replace '^(.*)$', '-$1' break; } elseif ( $_cmdlet -eq $null ) { "-and", "-as", "-band", "-bnot", "-bor", "-bxor", "-ccontains", "-ceq", "-cge", "-cgt", "-cle", "-clike", "-clt", "-cmatch", "-cne", "-cnotcontains", "-cnotlike", "-cnotmatch", "-contains", "-creplace", "-csplit", "-eq", "-f", "-ge", "-gt", "-icontains", "-ieq", "-ige", "-igt", "-ile", "-ilike", "-ilt", "-imatch", "-ine", "-inotcontains", "-inotlike", "-inotmatch", "-ireplace", "-is", "-isnot", "-isplit", "-join", "-le", "-like", "-lt", "-match", "-ne", "-not", "-notcontains", "-notlike", "-notmatch", "-or", "-replace", "-split", "-xor" -like "-$_pat" } break; } # Tab complete against history either #<pattern> or #<id> '^#(\\w*)' { $_pattern = $matches[1] if ($_pattern -match '^[0-9]+$') { Get-History -ea SilentlyContinue -Id $_pattern | Foreach { $_.CommandLine } } else { $_pattern = '*' + $_pattern + '*' Get-History | Sort-Object -Descending Id| Foreach { $_.CommandLine } | where { $_ -like $_pattern } } break; } # try to find a matching command... default { $lastex = [regex]::Split($line, '[|;]')[-1] if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)"\\w+"\\s*-as\\s+$' ) { if ( $Matches[6] -ne $nul ) { $brackets = "[]" } '['+ $global:_enum + $brackets + ']' break; } if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)\\s*(\\w*)$' ) { $_pat = $Matches[7] + '*' $_type = @(iex $Matches[1])[0].GetType() if ( $_type.IsEnum ) { $global:_enum = $_type.FullName [Enum]::GetValues($_type) -like $_pat -replace '^(.*)$','"$1"' break; } } $lastex = [regex]::Split($line, '[|;=]')[-1] if ($lastex -match '[[$].*\\w+\\(.*-as\\s*$') { '['+ $global:_enum + ']' } elseif ( $lastex -match '([[$].*(\\w+))\\((.*)$' ) #elseif ( $lastex -match '([[$].*(\\w+))\\(([^)]*)$' ) { $_method = $Matches[1] if ( $Matches[3] -match "(.*)((`"|')(\\w+,)+(\\w*))$" ) { $continuous = $true $_opt = $Matches[5] + '*' $_base = $Matches[2].TrimStart('"') -replace '(.*,)\\w+$','$1' $position = $Matches[1].Split(",").Length } else { $continuous = $false $_opt = ($Matches[3].Split(',')[-1] -replace '^\\s*','') + "*" $position = $Matches[3].Split(",").Length } if ( ($_mdefs = iex ($_method + ".OverloadDefinitions")) -eq $null ) { $tname, $mname = $_method.Split(":", "RemoveEmptyEntries" -as [System.StringSplitOptions]) $_mdefs = iex ($tname + '.GetMember("' + $mname + '") | % { $_.ToString() }') } foreach ( $def in $_mdefs ) { [void] ($def -match '\\((.*)\\)') foreach ( $param in [regex]::Split($Matches[1], ', ')[$position-1] ) { if ($param -eq $null -or $param -eq "") { continue; } $type = $param.split()[0] if ( $type -like '*`[*' -or $type -eq "Params" -or $type -eq "" ) { continue; } $fullname = @($_typenames -like "*$type*") foreach ( $name in $fullname ) { if ( $continuous -eq $true -and ( $name -as [System.Type] ).IsEnum ) { $output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$',($_base + '$1') $output | sort } elseif ( ( $name -as [System.Type] ).IsEnum ) { $global:_enum = $name $output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$','"$1"' $output | sort } } } } if ( $output -ne $null ) { break; } } if ( $line -match '(function|filter)\\s+(\\w*)$') { $_pat = 'function:\\' + $Matches[2] + '*' Get-ChildItem $_pat| % { $_.Name } break; } if ( $line[-1] -eq " " ) { $_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-1] # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet.Definition)[0] } if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name ) { "Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" | sort break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ) { Get-TraceSource | % { $_.Name } | sort -Unique break; } if ( "New-Object" -eq $_cmdlet.Name ) { $_TypeAccelerators break; } if ( $_cmdlet.Noun -like "*WMI*" ) { $_WMIClasses break; } if ( "Get-Process" -eq $_cmdlet.Name ) { Get-Process | % { $_.Name } | sort break; } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name ) { if ( $global:_snapin -ne $null ) { $global:_snapin break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin break; } } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" ) { Get-PSDrive | sort break; } if ( "Get-Eventlog" -eq $_cmdlet.Name ) { Get-EventLog -List | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name -or "man" -eq $_cmdlet.Name ) { Get-Help -Category all | % { $_.Name } | sort -Unique break; } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { Get-Service | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name ) { Get-Command -CommandType All | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name ) { Get-PipeLineObject $_dummy | Get-Member -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ) { Get-Variable -Scope Global | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ) { Get-Alias | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( $line[-1] -eq " " ) { # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($line, '[|;=]')[-1] # Extract the trailing unclosed block e.g. ls | foreach { cp if ($_cmdlet -match '\\{([^\\{\\}]*)$') { $_cmdlet = $matches[1] } # Extract the longest unclosed parenthetical expression... if ($_cmdlet -match '\\(([^()]*)$') { $_cmdlet = $matches[1] } # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] # now get the info object for it... $_cmdlet = @(Get-Command -type 'Application' $_cmdlet)[0] if ( $_cmdlet.Name -eq "powershell.exe" ) { "-PSConsoleFile", "-Version", "-NoLogo", "-NoExit", "-Sta", "-NoProfile", "-NonInteractive", "-InputFormat", "-OutputFormat", "-EncodedCommand", "-File", "-Command" | sort break; } if ( $_cmdlet.Name -eq "fsutil.exe" ) { "behavior query", "behavior set", "dirty query", "dirty set", "file findbysid", "file queryallocranges", "file setshortname", "file setvaliddata", "file setzerodata", "file createnew", "fsinfo drives", "fsinfo drivetype", "fsinfo volumeinfo", "fsinfo ntfsinfo", "fsinfo statistics", "hardlink create", "objectid query", "objectid set", "objectid delete", "objectid create", "quota disable", "quota track", "quota enforce", "quota violations", "quota modify", "quota query", "reparsepoint query", "reparsepoint delete", "sparse setflag", "sparse queryflag", "sparse queryrange", "sparse setrange", "usn createjournal", "usn deletejournal", "usn enumdata", "usn queryjournal", "usn readdata", "volume dismount", "volume diskfree" | sort break; } if ( $_cmdlet.Name -eq "net.exe" ) { "ACCOUNTS ", " COMPUTER ", " CONFIG ", " CONTINUE ", " FILE ", " GROUP ", " HELP ", "HELPMSG ", " LOCALGROUP ", " NAME ", " PAUSE ", " PRINT ", " SEND ", " SESSION ", "SHARE ", " START ", " STATISTICS ", " STOP ", " TIME ", " USE ", " USER ", " VIEW" | sort break; } if ( $_cmdlet.Name -eq "ipconfig.exe" ) { "/?", "/all", "/renew", "/release", "/flushdns", "/displaydns", "/registerdns", "/showclassid", "/setclassid" break; } } if ( $line -match '\\w+\\s+(\\w+(\\.|[^\\s\\.])*)$' ) { #$_opt = $Matches[1] + '*' $_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-2] $_opt = $Matches[1].Split(" ,")[-1] + '*' $_base = $Matches[1].Substring(0,$Matches[1].Length-$Matches[1].Split(" ,")[-1].length) # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet.Definition)[0] } if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name ) { "Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" -like $_opt | sort break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ) { Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "New-Object" -eq $_cmdlet.Name ) { $_TypeAccelerators -like $_opt Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) break; } if ( $_cmdlet.Name -like "*WMI*" ) { Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_' break; } if ( "Get-Process" -eq $_cmdlet.Name ) { Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name ) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-PSProvider" -eq $_cmdlet.Name ) { Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Eventlog" -eq $_cmdlet.Name ) { Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name -or "man" -eq $_cmdlet.Name ) { Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique break; } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name ) { Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ) { Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( $line -match '(-(\\w+))\\s+([^-]*$)' ) { $_param = $matches[2] + '*' $_opt = $Matches[3].Split(" ,")[-1] + '*' $_base = $Matches[3].Substring(0,$Matches[3].Length-$Matches[3].Split(" ,")[-1].length) $_cmdlet = [regex]::Split($line, '[|;=]')[-1] # Extract the trailing unclosed block e.g. ls | foreach { cp if ($_cmdlet -match '\\{([^\\{\\}]*)$') { $_cmdlet = $matches[1] } if ($_cmdlet -match '\\(([^()]*)$') { $_cmdlet = $matches[1] } $_cmdlet = $_cmdlet.Trim().Split()[0] $_cmdlet = @(Get-Command -type 'cmdlet,alias,ExternalScript,Filter,Function' $_cmdlet)[0] while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias,ExternalScript,Filter,Function' $_cmdlet.Definition)[0] } if ( $_param.TrimEnd("*") -eq "ea" -or $_param.TrimEnd("*") -eq "wa" ) { "SilentlyContinue", "Stop", "Continue", "Inquire" | ? { $_ -like $_opt } | sort -Unique break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide" -contains $_cmdlet.Name ` -and "groupBy" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name } break; } if ( $_param.TrimEnd("*") -eq "ev" -or $_param.TrimEnd("*") -eq "ov" -or "ErrorVariable" -like $_param -or "OutVariable" -like $_param) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort break; } if ( "Tee-Object" -eq $_cmdlet.Name -and "Variable" -like $_param ) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Export-Alias", "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Out-File","Export-CSV","Select-String","Export-Clixml" -contains $_cmdlet.Name ` -and "Encoding" -like $_param) { "Unicode", "UTF7", "UTF8", "ASCII", "UTF32", "BigEndianUnicode", "Default", "OEM" | ? { $_ -like $_opt } | sort -Unique break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "New-Object" -like $_cmdlet.Name ) { if ( "ComObject" -like $_param ) { $_ProgID -like $_opt | % { $_ -replace '\\s','` ' } break; } if ( "TypeName" -like $_param ) { if ( $_opt -eq "*" ) { $_TypeAccelerators -like $_opt } else { $_TypeAccelerators -like $_opt Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) } break; } } if ( "New-Item" -eq $_cmdlet.Name ) { if ( "ItemType" -like $_param ) { "directory", "file" -like $_opt break; } } if ( "Get-Location", "Get-PSDrive", "Get-PSProvider", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name ` -and "PSProvider" -like $_param ) { Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Location" -eq $_cmdlet.Name -and "PSDrive" -like $_param ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" -like $_param ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name -and "PSSnapin" -like $_param) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + $_ } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" ` -contains $_cmdlet.Name -and "Name" -like $_param ) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + $_ } break; } } if ( "Clear-Variable", "Export-Alias", "Get-Alias", "Get-PSDrive", "Get-Variable", "Import-Alias", "New-Alias", "New-PSDrive", "New-Variable", "Remove-Variable", "Set-Alias", "Set-Variable" ` -contains $_cmdlet.Name -and "Scope" -like $_param ) { "Global", "Local", "Script" -like $_opt break; } if ( "Get-Process", "Stop-Process", "Wait-Process" -contains $_cmdlet.Name -and "Name" -like $_param ) { Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Eventlog" -eq $_cmdlet.Name -and "LogName" -like $_param ) { Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name -or "man" -eq $_cmdlet.Name ) { if ( "Name" -like $_param ) { Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique break; } if ( "Category" -like $_param ) { "Alias", "Cmdlet", "Provider", "General", "FAQ", "Glossary", "HelpFile", "All" -like $_opt | sort | % { $_base + $_ } break; } } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { if ( "Name" -like $_param ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "DisplayName" -like $_param ) { Get-Service -Name $_opt | sort DisplayName | % { $_base + ($_.DisplayName -replace '\\s','` ') } break; } } if ( "New-Service" -eq $_cmdlet.Name -and "dependsOn" -like $_param ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-EventLog" -eq $_cmdlet.Name -and "EntryType" -like $_param ) { "Error", "Information", "FailureAudit", "SuccessAudit", "Warning" -like $_opt | sort | % { $_base + $_ } break; } if ( "Get-Command" -eq $_cmdlet.Name -and "Name" -like $_param ) { Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( $_cmdlet.Noun -like "*WMI*" ) { if ( "Class" -like $_param ) { Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_' break; } } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name -and "Property" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Select-Object" -eq $_cmdlet.Name ) { if ( "ExcludeProperty" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "ExpandProperty" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name } break; } } if ( "ExternalScript", "Function", "Filter" -contains $_cmdlet.CommandType ) { if ( $_cmdlet.CommandType -eq "ExternalScript" ) { $_fsr = New-Object IO.StreamReader $_cmdlet.Definition $_def = "Function _Dummy { $($_fsr.ReadToEnd()) }" $_fsr.Close() iex $_def $_cmdlet = "_Dummy" } if ( ((gi "Function:$_cmdlet").Definition -replace '\\n').Split("{")[0] -match 'param\\((.*\\))\\s*[;\\.&a-zA-Z]*\\s*$' ) { $Matches[1].Split(',', "RemoveEmptyEntries" -as [System.StringSplitOptions]) -like "*$_param" | % { $_.Split("$ )`r`n", "RemoveEmptyEntries" -as [System.StringSplitOptions])[0] -replace '^\\[(.*)\\]$','$1' -as "System.Type" } | ? { $_.IsEnum } | % { [Enum]::GetNames($_) -like $_opt | sort } | % { $_base + $_ } } break; } select -InputObject $_cmdlet -ExpandProperty ParameterSets | select -ExpandProperty Parameters | ? { $_.Name -like $_param } | ? { $_.ParameterType.IsEnum } | % { [Enum]::GetNames($_.ParameterType) } | ? { $_ -like $_opt } | sort -Unique | % { $_base + $_ } } if ( $line[-1] -match "\\s" ) { break; } if ( $lastWord -ne $null -and $lastWord.IndexOfAny('/\\') -eq -1 ) { $command = $lastWord.Substring( ($lastWord -replace '([^\\|\\(;={]*)$').Length ) $_base = $lastWord.Substring( 0, ($lastWord -replace '([^\\|\\(;={]*)$').Length ) $pattern = $command + "*" "begin {", "break", "catch {", "continue", "data {", "do {", "else {", "elseif (", "end {", "exit", "filter ", "for (", "foreach ", "from", "function ", "if (", "in", "param (", "process {", "return", "switch ", "throw ", "trap ", "until (", "while (" ` -like $pattern | % { $_base + $_ } gcm -Name $pattern -CommandType All | % { $_base + $_.Name } | sort -Unique } } } } }
combined_dataset/train/non-malicious/4047.ps1
4047.ps1
param([string]$outputDir = $(throw "You must specify the output path to emit the generated file"), [string]$localizedHelpPath = $(throw "You must specify the path to the localized help dir"), [string]$configuration = $(throw "You must specify the build configuration")) $ScriptDir = Split-Path $MyInvocation.MyCommand.Path -Parent $ModuleDir = "$ScriptDir\..\..\Pscx\bin\$configuration" $PscxPath = Join-Path $ModuleDir "Pscx" $PscxManifest = "$PscxPath.psd1" $PscxModule = "$PscxPath.dll" $outputDir = Resolve-Path $outputDir $ProviderHelpPath = Split-Path $outputDir -parent $transformsDir = Join-Path $ProviderHelpPath Transformations $MergedHelpPath = Join-Path $outputDir MergedHelp.xml $PscxHelpPath = Join-Path $outputDir Pscx.dll-Help.xml Import-Module $PscxManifest gci $localizedHelpPath\*.xml | Foreach { if (!(Test-Xml $_)) { Test-Xml $_ -verbose Write-Error "$_ is not a valid XML file" exit 1 } } gci $providerHelpPath\Provider*.xml | Foreach { if (!(Test-Xml $_)) { Test-Xml $_ -verbose Write-Error "$_ is not a valid XML file" exit 1 } } Get-PSSnapinHelp $PscxModule -LocalizedHelpPath $localizedHelpPath -OutputPath $MergedHelpPath $contents = Get-Content $MergedHelpPath $contents | foreach {$_ -replace 'PscxPathInfo','String'} | Out-File $MergedHelpPath -Encoding Utf8 Convert-Xml $MergedHelpPath -xslt $transformsDir\Maml.xslt -OutputPath $PscxHelpPath $helpXml = [xml](Get-Content $PscxHelpPath) $attrs = $helpXml.helpItems.Attributes | Where Name -ne schema $attrs | Foreach {[void]$helpXml.helpItems.Attributes.Remove($_)} $msHelpAttr = $helpXml.CreateAttribute('xmlns', 'MSHelp', 'http://www.w3.org/2000/xmlns/') $msHelpAttr.Value = 'http://msdn.microsoft.com/mshelp' $attrs += $msHelpAttr $helpXml.helpItems.command | %{$cmd = $_; $attrs | % {[void]$cmd.SetAttributeNode($_.Clone())}} $helpXml.Save($PscxHelpPath) $helpfile = Get-Content $PscxHelpPath | ? {$_ -notmatch '</helpItems>'} $providerHelp = @() gci $providerHelpPath\Provider*.xml | ? {$_.Name -notmatch 'Provider_template'} | Foreach { Write-Host "Processing $_" $providerHelp += Get-Content $_ } $helpfile += $providerHelp $helpfile += '</helpItems>' $helpfile | Out-File $PscxHelpPath -Encoding Utf8
combined_dataset/train/non-malicious/sample_52_13.ps1
sample_52_13.ps1
# Localized 05/07/2022 03:58 AM (GMT) 303:7.0.30723 RunAsHelper.strings.psd1 # Localized resources for RunAsHelper ConvertFrom-StringData @' ###PSLOC ErrorInvalidUserName=UserName {0} is not valid. UserCouldNotBeLoggedError=The user could not be logged on. Ensure that the user has an existing profile on the machine and that correct credentials are provided. Logon error # OpenProcessTokenError=Open process token error # PrivilegeLookingUpError=Error in looking up privilege of the process. This should not happen if DSC is running as LocalSystem Lookup privilege error # TokenElevationError=Token elevation error # DuplicateTokenError=Duplicate Token error # CouldNotCreateProcessError=The process could not be created. Create process as user error # WaitFailedError=Wait during create process failed user error # RetriveStatusError=Retrieving status error # ###PSLOC '@
combined_dataset/train/non-malicious/sample_52_81.ps1
sample_52_81.ps1
using namespace System.Management.Automation using namespace System.Management.Automation.Language Register-ArgumentCompleter -Native -CommandName 'fd' -ScriptBlock { param($wordToComplete, $commandAst, $cursorPosition) $commandElements = $commandAst.CommandElements $command = @( 'fd' for ($i = 1; $i -lt $commandElements.Count; $i++) { $element = $commandElements[$i] if ($element -isnot [StringConstantExpressionAst] -or $element.StringConstantType -ne [StringConstantType]::BareWord -or $element.Value.StartsWith('-') -or $element.Value -eq $wordToComplete) { break } $element.Value }) -join ';' $completions = @(switch ($command) { 'fd' { [CompletionResult]::new('--and', 'and', [CompletionResultType]::ParameterName, 'Additional search patterns that need to be matched') [CompletionResult]::new('-d', 'd', [CompletionResultType]::ParameterName, 'Set maximum search depth (default: none)') [CompletionResult]::new('--max-depth', 'max-depth', [CompletionResultType]::ParameterName, 'Set maximum search depth (default: none)') [CompletionResult]::new('--min-depth', 'min-depth', [CompletionResultType]::ParameterName, 'Only show search results starting at the given depth.') [CompletionResult]::new('--exact-depth', 'exact-depth', [CompletionResultType]::ParameterName, 'Only show search results at the exact given depth') [CompletionResult]::new('-E', 'E ', [CompletionResultType]::ParameterName, 'Exclude entries that match the given glob pattern') [CompletionResult]::new('--exclude', 'exclude', [CompletionResultType]::ParameterName, 'Exclude entries that match the given glob pattern') [CompletionResult]::new('-t', 't', [CompletionResultType]::ParameterName, 'Filter by type: file (f), directory (d/dir), symlink (l), executable (x), empty (e), socket (s), pipe (p), char-device (c), block-device (b)') [CompletionResult]::new('--type', 'type', [CompletionResultType]::ParameterName, 'Filter by type: file (f), directory (d/dir), symlink (l), executable (x), empty (e), socket (s), pipe (p), char-device (c), block-device (b)') [CompletionResult]::new('-e', 'e', [CompletionResultType]::ParameterName, 'Filter by file extension') [CompletionResult]::new('--extension', 'extension', [CompletionResultType]::ParameterName, 'Filter by file extension') [CompletionResult]::new('-S', 'S ', [CompletionResultType]::ParameterName, 'Limit results based on the size of files') [CompletionResult]::new('--size', 'size', [CompletionResultType]::ParameterName, 'Limit results based on the size of files') [CompletionResult]::new('--changed-within', 'changed-within', [CompletionResultType]::ParameterName, 'Filter by file modification time (newer than)') [CompletionResult]::new('--changed-before', 'changed-before', [CompletionResultType]::ParameterName, 'Filter by file modification time (older than)') [CompletionResult]::new('-o', 'o', [CompletionResultType]::ParameterName, 'Filter by owning user and/or group') [CompletionResult]::new('--owner', 'owner', [CompletionResultType]::ParameterName, 'Filter by owning user and/or group') [CompletionResult]::new('--format', 'format', [CompletionResultType]::ParameterName, 'Print results according to template') [CompletionResult]::new('-x', 'x', [CompletionResultType]::ParameterName, 'Execute a command for each search result') [CompletionResult]::new('--exec', 'exec', [CompletionResultType]::ParameterName, 'Execute a command for each search result') [CompletionResult]::new('-X', 'X ', [CompletionResultType]::ParameterName, 'Execute a command with all search results at once') [CompletionResult]::new('--exec-batch', 'exec-batch', [CompletionResultType]::ParameterName, 'Execute a command with all search results at once') [CompletionResult]::new('--batch-size', 'batch-size', [CompletionResultType]::ParameterName, 'Max number of arguments to run as a batch size with -X') [CompletionResult]::new('--ignore-file', 'ignore-file', [CompletionResultType]::ParameterName, 'Add a custom ignore-file in ''.gitignore'' format') [CompletionResult]::new('-c', 'c', [CompletionResultType]::ParameterName, 'When to use colors') [CompletionResult]::new('--color', 'color', [CompletionResultType]::ParameterName, 'When to use colors') [CompletionResult]::new('-j', 'j', [CompletionResultType]::ParameterName, 'Set number of threads to use for searching & executing (default: number of available CPU cores)') [CompletionResult]::new('--threads', 'threads', [CompletionResultType]::ParameterName, 'Set number of threads to use for searching & executing (default: number of available CPU cores)') [CompletionResult]::new('--max-buffer-time', 'max-buffer-time', [CompletionResultType]::ParameterName, 'Milliseconds to buffer before streaming search results to console') [CompletionResult]::new('--max-results', 'max-results', [CompletionResultType]::ParameterName, 'Limit the number of search results') [CompletionResult]::new('--base-directory', 'base-directory', [CompletionResultType]::ParameterName, 'Change current working directory') [CompletionResult]::new('--path-separator', 'path-separator', [CompletionResultType]::ParameterName, 'Set path separator when printing file paths') [CompletionResult]::new('--search-path', 'search-path', [CompletionResultType]::ParameterName, 'Provides paths to search as an alternative to the positional <path> argument') [CompletionResult]::new('--strip-cwd-prefix', 'strip-cwd-prefix', [CompletionResultType]::ParameterName, 'By default, relative paths are prefixed with ''./'' when -x/--exec, -X/--exec-batch, or -0/--print0 are given, to reduce the risk of a path starting with ''-'' being treated as a command line option. Use this flag to change this behavior. If this flag is used without a value, it is equivalent to passing "always"') [CompletionResult]::new('--gen-completions', 'gen-completions', [CompletionResultType]::ParameterName, 'gen-completions') [CompletionResult]::new('-H', 'H ', [CompletionResultType]::ParameterName, 'Search hidden files and directories') [CompletionResult]::new('--hidden', 'hidden', [CompletionResultType]::ParameterName, 'Search hidden files and directories') [CompletionResult]::new('--no-hidden', 'no-hidden', [CompletionResultType]::ParameterName, 'Overrides --hidden') [CompletionResult]::new('-I', 'I ', [CompletionResultType]::ParameterName, 'Do not respect .(git|fd)ignore files') [CompletionResult]::new('--no-ignore', 'no-ignore', [CompletionResultType]::ParameterName, 'Do not respect .(git|fd)ignore files') [CompletionResult]::new('--ignore', 'ignore', [CompletionResultType]::ParameterName, 'Overrides --no-ignore') [CompletionResult]::new('--no-ignore-vcs', 'no-ignore-vcs', [CompletionResultType]::ParameterName, 'Do not respect .gitignore files') [CompletionResult]::new('--ignore-vcs', 'ignore-vcs', [CompletionResultType]::ParameterName, 'Overrides --no-ignore-vcs') [CompletionResult]::new('--no-require-git', 'no-require-git', [CompletionResultType]::ParameterName, 'Do not require a git repository to respect gitignores. By default, fd will only respect global gitignore rules, .gitignore rules, and local exclude rules if fd detects that you are searching inside a git repository. This flag allows you to relax this restriction such that fd will respect all git related ignore rules regardless of whether you''re searching in a git repository or not') [CompletionResult]::new('--require-git', 'require-git', [CompletionResultType]::ParameterName, 'Overrides --no-require-git') [CompletionResult]::new('--no-ignore-parent', 'no-ignore-parent', [CompletionResultType]::ParameterName, 'Do not respect .(git|fd)ignore files in parent directories') [CompletionResult]::new('--no-global-ignore-file', 'no-global-ignore-file', [CompletionResultType]::ParameterName, 'Do not respect the global ignore file') [CompletionResult]::new('-u', 'u', [CompletionResultType]::ParameterName, 'Unrestricted search, alias for ''--no-ignore --hidden''') [CompletionResult]::new('--unrestricted', 'unrestricted', [CompletionResultType]::ParameterName, 'Unrestricted search, alias for ''--no-ignore --hidden''') [CompletionResult]::new('-s', 's', [CompletionResultType]::ParameterName, 'Case-sensitive search (default: smart case)') [CompletionResult]::new('--case-sensitive', 'case-sensitive', [CompletionResultType]::ParameterName, 'Case-sensitive search (default: smart case)') [CompletionResult]::new('-i', 'i', [CompletionResultType]::ParameterName, 'Case-insensitive search (default: smart case)') [CompletionResult]::new('--ignore-case', 'ignore-case', [CompletionResultType]::ParameterName, 'Case-insensitive search (default: smart case)') [CompletionResult]::new('-g', 'g', [CompletionResultType]::ParameterName, 'Glob-based search (default: regular expression)') [CompletionResult]::new('--glob', 'glob', [CompletionResultType]::ParameterName, 'Glob-based search (default: regular expression)') [CompletionResult]::new('--regex', 'regex', [CompletionResultType]::ParameterName, 'Regular-expression based search (default)') [CompletionResult]::new('-F', 'F ', [CompletionResultType]::ParameterName, 'Treat pattern as literal string stead of regex') [CompletionResult]::new('--fixed-strings', 'fixed-strings', [CompletionResultType]::ParameterName, 'Treat pattern as literal string stead of regex') [CompletionResult]::new('-a', 'a', [CompletionResultType]::ParameterName, 'Show absolute instead of relative paths') [CompletionResult]::new('--absolute-path', 'absolute-path', [CompletionResultType]::ParameterName, 'Show absolute instead of relative paths') [CompletionResult]::new('--relative-path', 'relative-path', [CompletionResultType]::ParameterName, 'Overrides --absolute-path') [CompletionResult]::new('-l', 'l', [CompletionResultType]::ParameterName, 'Use a long listing format with file metadata') [CompletionResult]::new('--list-details', 'list-details', [CompletionResultType]::ParameterName, 'Use a long listing format with file metadata') [CompletionResult]::new('-L', 'L ', [CompletionResultType]::ParameterName, 'Follow symbolic links') [CompletionResult]::new('--follow', 'follow', [CompletionResultType]::ParameterName, 'Follow symbolic links') [CompletionResult]::new('--no-follow', 'no-follow', [CompletionResultType]::ParameterName, 'Overrides --follow') [CompletionResult]::new('-p', 'p', [CompletionResultType]::ParameterName, 'Search full abs. path (default: filename only)') [CompletionResult]::new('--full-path', 'full-path', [CompletionResultType]::ParameterName, 'Search full abs. path (default: filename only)') [CompletionResult]::new('-0', '0', [CompletionResultType]::ParameterName, 'Separate search results by the null character') [CompletionResult]::new('--print0', 'print0', [CompletionResultType]::ParameterName, 'Separate search results by the null character') [CompletionResult]::new('--prune', 'prune', [CompletionResultType]::ParameterName, 'Do not traverse into directories that match the search criteria. If you want to exclude specific directories, use the ''--exclude=…'' option') [CompletionResult]::new('-1', '1', [CompletionResultType]::ParameterName, 'Limit search to a single result') [CompletionResult]::new('-q', 'q', [CompletionResultType]::ParameterName, 'Print nothing, exit code 0 if match found, 1 otherwise') [CompletionResult]::new('--quiet', 'quiet', [CompletionResultType]::ParameterName, 'Print nothing, exit code 0 if match found, 1 otherwise') [CompletionResult]::new('--show-errors', 'show-errors', [CompletionResultType]::ParameterName, 'Show filesystem errors') [CompletionResult]::new('--one-file-system', 'one-file-system', [CompletionResultType]::ParameterName, 'By default, fd will traverse the file system tree as far as other options dictate. With this flag, fd ensures that it does not descend into a different file system than the one it started in. Comparable to the -mount or -xdev filters of find(1)') [CompletionResult]::new('-h', 'h', [CompletionResultType]::ParameterName, 'Print help (see more with ''--help'')') [CompletionResult]::new('--help', 'help', [CompletionResultType]::ParameterName, 'Print help (see more with ''--help'')') [CompletionResult]::new('-V', 'V ', [CompletionResultType]::ParameterName, 'Print version') [CompletionResult]::new('--version', 'version', [CompletionResultType]::ParameterName, 'Print version') break } }) $completions.Where{ $_.CompletionText -like "$wordToComplete*" } | Sort-Object -Property ListItemText }
combined_dataset/train/non-malicious/sample_22_66.ps1
sample_22_66.ps1
# Localized ArchiveResources.psd1 ConvertFrom-StringData @' ###PSLOC PathNotFoundError=The path '{0}' either does not exist or is not a valid file system path. ExpandArchiveInValidDestinationPath=The path '{0}' is not a valid file system directory path. InvalidZipFileExtensionError={0} is not a supported archive file format. {1} is the only supported archive file format. ArchiveFileIsReadOnly=The attributes of the archive file {0} is set to 'ReadOnly' hence it cannot be updated. If you intend to update the existing archive file, remove the 'ReadOnly' attribute on the archive file else use -Force parameter to override and create a new archive file. ZipFileExistError=The archive file {0} already exists. Use the -Update parameter to update the existing archive file or use the -Force parameter to overwrite the existing archive file. DuplicatePathFoundError=The input to {0} parameter contains a duplicate path '{1}'. Provide a unique set of paths as input to {2} parameter. ArchiveFileIsEmpty=The archive file {0} is empty. CompressProgressBarText=The archive file '{0}' creation is in progress... ExpandProgressBarText=The archive file '{0}' expansion is in progress... AppendArchiveFileExtensionMessage=The archive file path '{0}' supplied to the DestinationPath parameter does not include .zip extension. Hence .zip is appended to the supplied DestinationPath path and the archive file would be created at '{1}'. AddItemtoArchiveFile=Adding '{0}'. BadArchiveEntry=Can not process invalid archive entry '{0}'. CreateFileAtExpandedPath=Created '{0}'. InvalidArchiveFilePathError=The archive file path '{0}' specified as input to the {1} parameter is resolving to multiple file system paths. Provide a unique path to the {2} parameter where the archive file has to be created. InvalidExpandedDirPathError=The directory path '{0}' specified as input to the DestinationPath parameter is resolving to multiple file system paths. Provide a unique path to the Destination parameter where the archive file contents have to be expanded. FileExistsError=Failed to create file '{0}' while expanding the archive file '{1}' contents as the file '{2}' already exists. Use the -Force parameter if you want to overwrite the existing directory '{3}' contents when expanding the archive file. DeleteArchiveFile=The partially created archive file '{0}' is deleted as it is not usable. InvalidDestinationPath=The destination path '{0}' does not contain a valid archive file name. PreparingToCompressVerboseMessage=Preparing to compress... PreparingToExpandVerboseMessage=Preparing to expand... ###PSLOC '@ # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDGjHELqNjhDMSl # VEIGYXlY2v2AY207IXvPYrihKxZIeaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF81uWLyDAVYFRKBYmFuri8r # ynQzScrsGbN5kcR5OrTuMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAewIeyvhp0c2E3/Kyf8dZH9Ffk6JBtKldwR3NI0OPgrmmoAdVCGLy7I/B # drTLsiLKNVQ/FDOsBZvLSuxB9ZsCgmwkEk7HgJD/HX1Hec671u/E7m+2O2HZLWcY # ZEP/dFZGg6AG4Vjk0CwF4wYKjm5wUCuLpk/0H5Kq/lxr0a4YkLo1a3Rqmh0E6BlW # sWqp0Ap2E49Ig+5/CUNxyXIkTRmXuQrgWgap8SGlQApvtKU4PuOOQqUIUPZpCEV9 # EjSvDVDx2dBRHhCUuCG6g5OK8F3hTXx461/1Hv4lxcDOO7kwLfjaOJQzTlaehkv8 # n5+nt1a5WvVWjAOp+O9nDT4zaOsvxqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAwNAZ7bq4r+aKzvViI+YtYKvTtjBHxqxeHaWrQMcEzWAIGZh/GnLI9 # GBMyMDI0MDQyMzAyMjQwOS45MjdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRhK4wIhgPMjAyNDA0MjMwODUxNThaGA8yMDI0MDQyNDA4NTE1OFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dGErgIBADAHAgEAAgIA2DAHAgEAAgIT1zAKAgUA # 6dLWLgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABr3CCFecKtjV+G2jsRm # 6HI36UUbDg0s1Bzw07h6kESofnXZBlaEgGg3NX4Tos5kWI4PWOUodJ+KhWZtD8cz # PP/nlNimQbLkLv837f8NM1zSDFw38iIxrl9vMwn1Ffv8R0YDesM7cyXPyI478q06 # KSl13ritOOjB/goYprh7kYI3MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgI11Xb1PHxH7JOTUZmko4Lnb0Rz6AJww/pLvw75BnE4EwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEICdrlHLtV03wrw+ChlVXNwvPQGnD+0h7/7HV/algzp1L # MA0GCSqGSIb3DQEBCwUABIICACxsisqQDHHEVJEhkipTOQiuvjoxzubm4Mbv6tT2 # TcP3x8qHeROiaMWTFN+u0yywziFCYqLobeThQtybZlO58esaWkhW5aCRD/gz2rzE # UVzfVA9DsvwLkGE+4g9q+WDWQbBAyVTmAenoLJuiTmyhWCI4+hVOic10FluScWW8 # 3KBn8qrDJcAhx8yIpygBldqX1OZYHvmxD+TUfVF5Je5i4cMmd7RaGfUqGrStZ0Aq # DUCM+xiZXNOQw79sWITE7S/rfBc8HGzkAYaieGbyeqQIq5tSCqq+pJh3nlZXJXqF # xDIUwuVl8kKSfxkzz+IoazSTqL4ltK3QviQgCG2yvtd+BRnJSZ0XaHdFOC4ogWII # /br8hawOOZ7WsHvJXrJvdElbBVMASl2lWpQijnxfMMQI3/d//YDPaMFU+hkHFVYe # 2RWI3BFHLjcoqNUur7Hh8u08kegfuQ+RvltHkY7Glg29t+Lu6ZrcmoeeIDwvfkQk # LRULYOKlCGlV4QLiWDNAibRCQgUxpuXt7bfD/oYsRMaRIwSEqvDhMFdRYzwT2v/j # 6v3Ar8uH4IOcU2zvjFeo9+3zsig0jO01LIp2buYmusdw2k53k5a1bF+OjmEp5Vdp # QduwA+AGz1DfHnUMFm24TyGUstpUGIzYrTn3raqeHrJEuSEXfokrzt1KzzrXvw2c # uU9J # SIG # End signature block
combined_dataset/train/non-malicious/sample_5_21.ps1
sample_5_21.ps1
ConvertFrom-StringData @' id_ctsnps=Network Policy Server (NPS) id_ctsnpsdescription=Collects information about Network Policy Server (NPS) [RADIUS/IAS]. '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCyj/dbKsENrkLU # fhRtbHpyROqit768vPACKs2jr/gVB6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFm+7pUjkEbH9AseyBlVYExo # pl5wNMFxI7lRCava2htDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAIdrnHzRUxxXWVVHfzW3FzhJGQKlFKVHYZYGf90MJeECUEjM8bDxQrc4H # eHLRuGqgdcbJdrEUfzHud09yfLJdIW0HmjsKsR2rCgXaflUwvMnCpdl+DeAf6zNm # F8KinQwYjFdaHgsfigL72nSWp8ec9nUDSlLQUQYPji/Kprlf4dPzMmXLz+N6Y4Z4 # D1fL+xzhsmBs2DrGlTHHLFlwKrr0oLmF+WIQkRRXyMLFD+H7m3Y2t/q8sVtRwciP # o3tZVVFV2MrLBB6kFPx0QfJUYGM6E8yBWjzsqGqtp+qtPKUprD/LphEuDDEvbYMk # +U6Nl2qD3kX80HORQe0yyPZfD7rni6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAHfccqtqJpm7QD4rABvjZ/ddsgq4JaA2HqWrp3e9SEoAIGZxqGn6w9 # GBMyMDI0MTAyODExNDA0Mi43NzFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smiIDAiGA8yMDI0MTAyODA1Mzk0 # NFoYDzIwMjQxMDI5MDUzOTQ0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaIg # AgEAMAcCAQACAikmMAcCAQACAhNdMAoCBQDqyvOgAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAFmckdUeifZt8BprZ3zxv8eo/W1geDvTCg+AfBgsP5eubV4p # W8eAaVQPjzjVseXEjtLErgpcesWIgWtwjTBdGPVhCatB3NRfg/awbJSa7tZm4sDy # cdvhoeYBZ3BqswvkYUxhhKUbAnZYYibg+H6YnGrog3UF4G0KdCndtoLOLZfqFPkL # DzGpuEBwwuEfDjxgLz2GfRP0jeSHOA0d2f5CnwY3Tij2x/Thsl/+cvbZ4a/Eqb8p # D8brFUdxFlOHbW3UMTLvz863JdgDarmdvyz/z5x1qIsWwKHlydHqbGF6reb09z9d # EdUNok4tjGHZW5O/uOd7Y340oWdSzkS012Nnz8UxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAtRYBYDLpXqoYQ1/GwLvxSIGrDZD8CzCjHaNo6scJO4jCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsS # DrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJHwmHNb0a877pzs9GGBhooAWbWEx # ml1o498sDW/Bg5wwDQYJKoZIhvcNAQELBQAEggIAOseTm2ltJDGUz7uu1IWp+yLB # WXX2ZzIQsAsHy5LFge8xdjMdJRS9ua27q+KL7b2IUYlQG6ByJO/2pvr2YBXmW/LC # ih1nYahGDfx8H8/hdA+Ju4pqQqTH6ypzXE/QTxTRZa3nFNNNNZBTzjRkQ8ws/+YU # Nyi4cqqRl8ih+FOS/x6X7JoC7tCSgwuRI9IHfoPUt+meJjRCVb4pc8C+SLgNTRbV # waeG30lZocSzrPwhbiraLi6cghDNKvq+X0E//fSiJhgIdMGdJBdBN3tskJpmlBza # sbhy4kwCP/dEFvA0t6f4nMQQi4vKc7zgPb7pjbFXj7W0TEOOyuisbu39rwcmX9ee # lqg6S5boymy2F5bazT4RqdiQ6py8HC1Oa5bHo9m6smeMBRK6RhzY2K8UHikrT4mQ # QidgebSW7y/Y0T5z33npdPpKEW8J5XDPO82aTV4ty/xm79OJKduw35zB+A4Nu0OQ # 2NsDhKdkgQwRQqhmIU2FNNg5ue1FsLq/1pl6k2fJki9gV1AJTVFXp7zcTl0BEwJ/ # d+HxO1E7c5gHZqGgkMDf8a8JStscKPHVl8DBJgKReDZZq26tvPe1I4frBVB+Wxis # H9Fet+09Lo0vYxBmsZX6SIqQs34xlmhLCN5LKp3nOFdPgiV5afjhNSwsYRePgKa4 # k0p/3qkxAuDkZyxIlxI= # SIG # End signature block
combined_dataset/train/non-malicious/New-ODataServiceProxy_1.ps1
New-ODataServiceProxy_1.ps1
function New-ODataServiceProxy { #.Synopsis # Creates a proxy class for an odata web service # YOU NEED TO BE VERY CAREFUL NOT TO OUTPUT THE PROXY OBJECT TO THE POWERSHELL HOST! #.Description # Uses the data service client utility (DataSvcUtil.exe) to generate a proxy class (and types for all objects) for an OData web service. # WARNING: Outputting this object to the PowerShell host will result in queriying all the object collections on the service. #.Parameter URI # The URI for the web service #.Parameter Passthru # Causes the method to output all of the types defined by the service metadata as well as the actual service object. #.Example # $proxy = New-ODataServiceProxy http://odata.netflix.com/Catalog/ # $AdventuresInOdyssey = $proxy.Titles.AddQueryOption('$filter',"substringof('Adventures in Odyssey',Name)") # $AdventuresInOdyssey | Format-List Name, ReleaseYear, Url, Synopsis #.Link http://msdn.microsoft.com/en-us/library/ee383989.aspx #.Notes # I can't stress enough that you should not output the object or any property that returns a System.Data.Services.Client.DataServiceQuery[T] without a filter unless you're sure that's what you want. # # ADO.NET Data Service Client Utility http://msdn.microsoft.com/en-us/library/ee383989.aspx # AddQueryOption http://msdn.microsoft.com/en-us/library/cc646860.aspx # NetFlix Catalog http://developer.netflix.com/docs/oData_Catalog # Data Services Update for .Net 3.5 SP1 http://support.microsoft.com/kb/982307 # # VERSION HISTORY: # v1.0 - 2010 Aug 02 - First Version http://poshcode.org/2039 # v1.1 - 2010 Aug 03 - This Version # - Added a type cache to make it easier to find proxies you've already compiled (because we can't recompile them) # param( $URI = "http://odata.netflix.com/Catalog/", [switch]$Passthru ) if(!(Test-Path Variable::Global:ODataServices)){ ## You can only use this on .Net 4 or .Net 3.5 SP1 ## For .Net 3.5 SP1 you need to download http://support.microsoft.com/kb/982307 ## If you don't have it, this won't succeed [Reflection.Assembly]::Load("System.Data.Services.Client, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089") | Out-Null $global:ODataServices = @{} } $normalized = ([uri]$URI).AbsoluteUri.TrimEnd("/") if($global:ODataServices.ContainsKey($normalized)) { New-Object $global:ODataServices.$normalized.ContextType $URI if($Passthru) { $global:ODataServices.$normalized.OtherTypes } return } ## Find the right DataSvcUtil for this version of .Net switch($PSVersionTable.ClrVersion.Major) { 4 { # PoshConsole and modded .Net4 PowerShell_ISE etc. Set-Alias Get-ODataServiceDefinition (Get-ChildItem ([System.Runtime.InteropServices.RuntimeEnvironment]::GetRuntimeDirectory()) DataSvcUtil.exe) break } 2 { # PowerShell.exe and everyone else $FrameworkPath = [System.Runtime.InteropServices.RuntimeEnvironment]::GetRuntimeDirectory() | Split-Path Set-Alias Get-ODataServiceDefinition (Get-ChildItem $FrameworkPath\\v3.5\\DataSvcUtil.exe) break } } ## Get the service definition into a string via a temp file $temp = [IO.Path]::GetTempFileName() Get-ODataServiceDefinition -out:$temp -uri:$URI -nologo | Out-Null $code = @(Get-Content $temp) -join "`n" # -Delim ([char]0) Remove-Item $temp $Types = Add-Type $code -Reference "System.Data.Services.Client, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" -Language CSharpVersion3 -Passthru $ContextType = $Types | Where-Object { $_.BaseType -eq [System.Data.Services.Client.DataServiceContext] } $global:ODataServices.$normalized = New-Object PSObject -Property @{ContextType=$ContextType; OtherTypes=$([Type[]]($Types|Where-Object{$_.BaseType -ne [System.Data.Services.Client.DataServiceContext]}))} $ctx = new-object $ContextType $URI Write-Output $ctx if($Passthru) { Write-Output $types } } # SIG # Begin signature block # MIIRDAYJKoZIhvcNAQcCoIIQ/TCCEPkCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUSq4znHc6Cix23VtPNHaAqfbB # 2/eggg5CMIIHBjCCBO6gAwIBAgIBFTANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQG # EwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERp # Z2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDcxMDI0MjIwMTQ1WhcNMTIxMDI0MjIw # MTQ1WjCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzAp # BgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNV # BAMTL1N0YXJ0Q29tIENsYXNzIDIgUHJpbWFyeSBJbnRlcm1lZGlhdGUgT2JqZWN0 # IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyiOLIjUemqAbPJ1J # 0D8MlzgWKbr4fYlbRVjvhHDtfhFN6RQxq0PjTQxRgWzwFQNKJCdU5ftKoM5N4YSj # Id6ZNavcSa6/McVnhDAQm+8H3HWoD030NVOxbjgD/Ih3HaV3/z9159nnvyxQEckR # ZfpJB2Kfk6aHqW3JnSvRe+XVZSufDVCe/vtxGSEwKCaNrsLc9pboUoYIC3oyzWoU # TZ65+c0H4paR8c8eK/mC914mBo6N0dQ512/bkSdaeY9YaQpGtW/h/W/FkbQRT3sC # pttLVlIjnkuY4r9+zvqhToPjxcfDYEf+XD8VGkAqle8Aa8hQ+M1qGdQjAye8OzbV # uUOw7wIDAQABo4ICfzCCAnswDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAQYwHQYD # VR0OBBYEFNBOD0CZbLhLGW87KLjg44gHNKq3MIGoBgNVHSMEgaAwgZ2AFE4L7xqk # QFulF2mHMMo0aEPQQa7yoYGBpH8wfTELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0 # YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRl # IFNpZ25pbmcxKTAnBgNVBAMTIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9y # aXR5ggEBMAkGA1UdEgQCMAAwPQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzAChiFo # dHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9zZnNjYS5jcnQwYAYDVR0fBFkwVzAsoCqg # KIYmaHR0cDovL2NlcnQuc3RhcnRjb20ub3JnL3Nmc2NhLWNybC5jcmwwJ6AloCOG # IWh0dHA6Ly9jcmwuc3RhcnRzc2wuY29tL3Nmc2NhLmNybDCBggYDVR0gBHsweTB3 # BgsrBgEEAYG1NwEBBTBoMC8GCCsGAQUFBwIBFiNodHRwOi8vY2VydC5zdGFydGNv # bS5vcmcvcG9saWN5LnBkZjA1BggrBgEFBQcCARYpaHR0cDovL2NlcnQuc3RhcnRj # b20ub3JnL2ludGVybWVkaWF0ZS5wZGYwEQYJYIZIAYb4QgEBBAQDAgABMFAGCWCG # SAGG+EIBDQRDFkFTdGFydENvbSBDbGFzcyAyIFByaW1hcnkgSW50ZXJtZWRpYXRl # IE9iamVjdCBTaWduaW5nIENlcnRpZmljYXRlczANBgkqhkiG9w0BAQUFAAOCAgEA # UKLQmPRwQHAAtm7slo01fXugNxp/gTJY3+aIhhs8Gog+IwIsT75Q1kLsnnfUQfbF # pl/UrlB02FQSOZ+4Dn2S9l7ewXQhIXwtuwKiQg3NdD9tuA8Ohu3eY1cPl7eOaY4Q # qvqSj8+Ol7f0Zp6qTGiRZxCv/aNPIbp0v3rD9GdhGtPvKLRS0CqKgsH2nweovk4h # fXjRQjp5N5PnfBW1X2DCSTqmjweWhlleQ2KDg93W61Tw6M6yGJAGG3GnzbwadF9B # UW88WcRsnOWHIu1473bNKBnf1OKxxAQ1/3WwJGZWJ5UxhCpA+wr+l+NbHP5x5XZ5 # 8xhhxu7WQ7rwIDj8d/lGU9A6EaeXv3NwwcbIo/aou5v9y94+leAYqr8bbBNAFTX1 # pTxQJylfsKrkB8EOIx+Zrlwa0WE32AgxaKhWAGho/Ph7d6UXUSn5bw2+usvhdkW4 # npUoxAk3RhT3+nupi1fic4NG7iQG84PZ2bbS5YxOmaIIsIAxclf25FwssWjieMwV # 0k91nlzUFB1HQMuE6TurAakS7tnIKTJ+ZWJBDduUbcD1094X38OvMO/++H5S45Ki # 3r/13YTm0AWGOvMFkEAF8LbuEyecKTaJMTiNRfBGMgnqGBfqiOnzxxRVNOw2hSQp # 0B+C9Ij/q375z3iAIYCbKUd/5SSELcmlLl+BuNknXE0wggc0MIIGHKADAgECAgFR # MA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRD # b20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2ln # bmluZzE4MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3MgMiBQcmltYXJ5IEludGVybWVk # aWF0ZSBPYmplY3QgQ0EwHhcNMDkxMTExMDAwMDAxWhcNMTExMTExMDYyODQzWjCB # qDELMAkGA1UEBhMCVVMxETAPBgNVBAgTCE5ldyBZb3JrMRcwFQYDVQQHEw5XZXN0 # IEhlbnJpZXR0YTEtMCsGA1UECxMkU3RhcnRDb20gVmVyaWZpZWQgQ2VydGlmaWNh # dGUgTWVtYmVyMRUwEwYDVQQDEwxKb2VsIEJlbm5ldHQxJzAlBgkqhkiG9w0BCQEW # GEpheWt1bEBIdWRkbGVkTWFzc2VzLm9yZzCCASIwDQYJKoZIhvcNAQEBBQADggEP # ADCCAQoCggEBAMfjItJjMWVaQTECvnV/swHQP0FTYUvRizKzUubGNDNaj7v2dAWC # rAA+XE0lt9JBNFtCCcweDzphbWU/AAY0sEPuKobV5UGOLJvW/DcHAWdNB/wRrrUD # dpcsapQ0IxxKqpRTrbu5UGt442+6hJReGTnHzQbX8FoGMjt7sLrHc3a4wTH3nMc0 # U/TznE13azfdtPOfrGzhyBFJw2H1g5Ag2cmWkwsQrOBU+kFbD4UjxIyus/Z9UQT2 # R7bI2R4L/vWM3UiNj4M8LIuN6UaIrh5SA8q/UvDumvMzjkxGHNpPZsAPaOS+RNmU # Go6X83jijjbL39PJtMX+doCjS/lnclws5lUCAwEAAaOCA4EwggN9MAkGA1UdEwQC # MAAwDgYDVR0PAQH/BAQDAgeAMDoGA1UdJQEB/wQwMC4GCCsGAQUFBwMDBgorBgEE # AYI3AgEVBgorBgEEAYI3AgEWBgorBgEEAYI3CgMNMB0GA1UdDgQWBBR5tWPGCLNQ # yCXI5fY5ViayKj6xATCBqAYDVR0jBIGgMIGdgBTQTg9AmWy4SxlvOyi44OOIBzSq # t6GBgaR/MH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSsw # KQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYD # VQQDEyBTdGFydENvbSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eYIBFTCCAUIGA1Ud # IASCATkwggE1MIIBMQYLKwYBBAGBtTcBAgEwggEgMC4GCCsGAQUFBwIBFiJodHRw # Oi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMDQGCCsGAQUFBwIBFihodHRw # Oi8vd3d3LnN0YXJ0c3NsLmNvbS9pbnRlcm1lZGlhdGUucGRmMIG3BggrBgEFBQcC # AjCBqjAUFg1TdGFydENvbSBMdGQuMAMCAQEagZFMaW1pdGVkIExpYWJpbGl0eSwg # c2VlIHNlY3Rpb24gKkxlZ2FsIExpbWl0YXRpb25zKiBvZiB0aGUgU3RhcnRDb20g # Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUG9saWN5IGF2YWlsYWJsZSBhdCBodHRw # Oi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMGMGA1UdHwRcMFowK6ApoCeG # JWh0dHA6Ly93d3cuc3RhcnRzc2wuY29tL2NydGMyLWNybC5jcmwwK6ApoCeGJWh0 # dHA6Ly9jcmwuc3RhcnRzc2wuY29tL2NydGMyLWNybC5jcmwwgYkGCCsGAQUFBwEB # BH0wezA3BggrBgEFBQcwAYYraHR0cDovL29jc3Auc3RhcnRzc2wuY29tL3N1Yi9j # bGFzczIvY29kZS9jYTBABggrBgEFBQcwAoY0aHR0cDovL3d3dy5zdGFydHNzbC5j # b20vY2VydHMvc3ViLmNsYXNzMi5jb2RlLmNhLmNydDAjBgNVHRIEHDAahhhodHRw # Oi8vd3d3LnN0YXJ0c3NsLmNvbS8wDQYJKoZIhvcNAQEFBQADggEBACY+J88ZYr5A # 6lYz/L4OGILS7b6VQQYn2w9Wl0OEQEwlTq3bMYinNoExqCxXhFCHOi58X6r8wdHb # E6mU8h40vNYBI9KpvLjAn6Dy1nQEwfvAfYAL8WMwyZykPYIS/y2Dq3SB2XvzFy27 # zpIdla8qIShuNlX22FQL6/FKBriy96jcdGEYF9rbsuWku04NqSLjNM47wCAzLs/n # FXpdcBL1R6QEK4MRhcEL9Ho4hGbVvmJES64IY+P3xlV2vlEJkk3etB/FpNDOQf8j # RTXrrBUYFvOCv20uHsRpc3kFduXt3HRV2QnAlRpG26YpZN4xvgqSGXUeqRceef7D # dm4iTdHK5tIxggI0MIICMAIBATCBkjCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoT # DVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmlj # YXRlIFNpZ25pbmcxODA2BgNVBAMTL1N0YXJ0Q29tIENsYXNzIDIgUHJpbWFyeSBJ # bnRlcm1lZGlhdGUgT2JqZWN0IENBAgFRMAkGBSsOAwIaBQCgeDAYBgorBgEEAYI3 # AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG # AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEWMCMGCSqGSIb3DQEJBDEWBBQpBamAvk2k # TpZahjyjWtx7E7BscDANBgkqhkiG9w0BAQEFAASCAQCRPD5IJetAL7W+uLUAnKNr # ACZ8XY9rkrb5rldNnLZQr7cxz0ARCeyRbJrh5znBirrro+PekR4IOrKRJbZPNnLw # lefWikq8R1QTpq+N8Tvqfi+j0/f07bbSNSXByhoCXheapxOE7cZBDtgaKmqBsGZi # s5mhWGXkrsYJotyHWQQHZAGmuZuYbYSB/WrG+LlScrLf2f4qr4lTwL3IszWd5Nz2 # 0Uw1yfo7bPltjS+euidPl6d1EIue8kc848FbLypuPSMyB1ThRgjxiysIUTur0urS # 6IIo4+CNYryba4OM+MWCy8xvYeSt8xwSoRAKqpGWMGOTgCpQLFeLfEPzv79MfGOe # SIG # End signature block
combined_dataset/train/non-malicious/sample_52_91.ps1
sample_52_91.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2022 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope="function")] param() #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Write-IntelEthernetDebugDump { [CmdletBinding(DefaultParameterSetName = 'ByAdapter')] Param( [parameter(Mandatory=$true, ParameterSetName="ByName")] [ValidateNotNullOrEmpty()] [String] $Name, [parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ParameterSetName="ByAdapter")] [ValidateNotNullOrEmpty()] [Object] $Adapter, [parameter(Mandatory=$false, ParameterSetName="ByName")] [parameter(Mandatory=$false, Position=1, ParameterSetName="ByAdapter")] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Cluster = '*', [string] [parameter(Mandatory=$false, ParameterSetName="ByName")] [parameter(Mandatory=$false, Position=2, ParameterSetName="ByAdapter")] [ValidateNotNullOrEmpty()] $Path = '', [parameter(Mandatory=$false, ParameterSetName="ByName")] [parameter(Mandatory=$false, ParameterSetName="ByAdapter")] [switch] $Force = $false, [parameter(Mandatory=$false, ParameterSetName="ByName")] [parameter(Mandatory=$false, ParameterSetName="ByAdapter")] [switch] $Append = $false ) Begin { $script:ErrorMessagesWrite = @() $script:WarningMessagesWrite = @() GetIntelEthernetDevices $script:SupportedAdapters = @(GetSupportedAdaptersByDriver @('icea')) $Clusters = $Cluster } End { do { if ($Name -match '\*') { $script:ErrorMessagesWrite += $Messages.AdapterNotFound -f $Name break } $AdapterName = ValidateSetAdapterNameParams $Name $Adapter ([ref]$script:ErrorMessagesWrite) if (-not (ValidateSingleAdapter $input $AdapterName ([ref]$script:ErrorMessagesWrite))) { break } $AdapterName = GetSupportedAdapters $AdapterName ([ref]$script:ErrorMessagesWrite) if (([string]::IsNullOrEmpty($AdapterName))) { break } if (([string]::IsNullOrEmpty($Path))) { $Timestamp = Get-Date -Format "MMddyyyy" $DefaultName = ($AdapterName -replace '\s+', '_') + "_$Timestamp`_dump.bin" $UseDefaultPath = $true } $LogPath = '' if (-not (ValidatePathParams ([ref]$LogPath) $UseDefaultPath $DefaultName ([ref]$script:ErrorMessagesWrite))) { break } $ClusterIDs = ValidateClusterParam $Clusters $AdapterName if ($ClusterIDs.Count) { $Output = [System.Collections.ArrayList]::new() # First Dump the 24 Byte Metadata Cluster $Metadata = CreateMetadataCluster $AdapterName if ($null -eq $Metadata) { foreach ($ClusterID in $ClusterIDs) { $script:ErrorMessagesWrite += $Messages.FailedToReadCluster -f $DebugClusterMap.[int]$ClusterID } break } $Output.AddRange($Metadata) $bWriteFile = $false $bUseTableMethod = $true foreach ($ClusterID in $ClusterIDs) { $ClusterID = [int]$ClusterID $Dump = $null if ($bUseTableMethod) { $Dump = ReadClusterTable $ClusterID } if (-Not $Dump) { $bUseTableMethod = $false $Dump = ReadCluster $ClusterID } if ($Dump) { $Output.AddRange($Dump) $bWriteFile = $true $Dump = $null # hint to Garbage Collector that memory can be freed } else { $bUseTableMethod = $true $TmpMsg = $Messages.FailedToReadCluster -f $DebugClusterMap.[int]$ClusterID if (-Not ($TmpMsg -in $script:ErrorMessagesWrite)) { $script:ErrorMessagesWrite += $TmpMsg } } } if ($bWriteFile) { WriteToFile $LogPath $Output $Append } $Output = $null # hint to Garbage Collector that memory can be freed } else { break } } while ($false) foreach ($WarningMessage in $script:WarningMessagesWrite) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesWrite) { Write-Error $ErrorMessage } # trigger Garbage Collection [System.GC]::Collect() } } Function CreateMetadataCluster($AdapterName) { $MetadataClusterOutput = [System.Collections.ArrayList]::new() $EETrackIDs = @(Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_EetrackId -Property Id -ErrorAction SilentlyContinue) if ($EETrackIDs) { $EETrackID = ($EETrackIDs.Where({$_.InstanceName -eq $AdapterName})).Id if ($EETrackID) { $MetadataClusterOutput.AddRange([System.BitConverter]::GetBytes(0x80000001)) # Metadata Cluster ID $MetadataClusterOutput.AddRange([System.BitConverter]::GetBytes($EETrackID)) $MetadataClusterOutput.AddRange([byte[]]::new(16)) # Reserved / not used } } $MetadataClusterOutput } Function WriteToFile($Path, $Output, $Append) { if ($Append) { Add-Content $Path -Value $Output -Encoding Byte } else { Set-Content $Path -Value $Output -Encoding Byte } Resolve-Path -Path $Path -ErrorAction SilentlyContinue } Function ValidateClusterParam($Clusters, $AdapterName) { $ValidClusterIDs = @() $InvalidClusters = @() # Throw an error for Invalid Clusters, but still run if there are any valid ones foreach ($Cluster in $Clusters) { $ClusterID = $DebugClusterMap.GetEnumerator().Where({$_.Value -like $Cluster}).Name if ($ClusterID.Count -gt 0) # Check for corresponding Keys { $ValidClusterIDs += $ClusterID continue } # Check if they sent in the numerical Cluster ID if($Cluster -match "^\d+$") { if ($DebugClusterMap.[int]$Cluster) # Check for corresponding Values { $ValidClusterIDs += $Cluster continue } } $InvalidClusters += $Cluster } $InvalidClusters = $InvalidClusters | Sort-Object | Get-Unique foreach ($Cluster in $InvalidClusters) { $script:ErrorMessagesWrite += $Messages.InvalidCluster -f $AdapterName, $Cluster } $ValidClusterIDs = $ValidClusterIDs | Sort-Object | Get-Unique $ValidClusterIDs } function ReadClusterTable($ClusterID) { $i = 0 $TableID = 0 $TableIndex = 0 $ClusterOutput = [System.Collections.ArrayList]::new() Write-Verbose "`[IN`] $($DebugClusterMap.$ClusterID) Cluster `($ClusterID`)`tTableID $($TableID)`tTableIndex $($TableIndex)" $Dump = GetTable $ClusterID $TableID $TableIndex if ($null -ne $Dump) { $ClusterOutput.AddRange($Dump.Table[0..($Dump.TableSize - 1)]) } while ($null -ne $Dump -and $Dump.NextClusterId -eq $ClusterID -and $Dump.NextClusterId -ne 0xFFFF -and $Dump.MoreDataAvailable -eq 1) { Write-Progress -Activity $Messages.WritingDebugDump -PercentComplete $i $TableId = $Dump.NextTableId $TableIndex = $Dump.NextTableIndex if ($i++ -ge 100) { $i = 0 } Write-Verbose "`[IN`] $($DebugClusterMap.$ClusterID) Cluster `($ClusterID`)`tTableID $($TableID)`tTableIndex $($TableIndex)" $Dump = GetTable $ClusterID $TableID $TableIndex if ($null -ne $Dump) { $ClusterOutput.AddRange($Dump.Table[0..($Dump.TableSize - 1)]) } } return $ClusterOutput } function GetTable($ClusterId, $TableId, $TableIndex) { $params = @{ Type = [uint32]1 Version = [uint32]1 Size = [uint32]24 ClusterId = [uint32]$ClusterId TableId = [uint32]$TableId TableIndex = [uint32]$TableIndex } $Result = InvokeCimMethod "IntlLan_GetFWClusterTable" $AdapterName "WmiGetFWClusterTable" $Params if ($null -ne $Result -and $Result.FwErrorCode -ne 0) { $TmpMsg = $Messages.FailedToReadCluster -f $DebugClusterMap.[int]$ClusterID if ($script:ErrorMessagesWrite -NotContains $TmpMsg) { $script:ErrorMessagesWrite += $TmpMsg } Write-Verbose "`[OUT`] $($DebugClusterMap.$ClusterId) Cluster `($ClusterId`)`tTableID $($TableId)`tTableIndex $($TableIndex)" return $null } return $Result } Function BuildTableOutput($ClusterID, $TableID, $TableIndex, $TableBufferSize, $TableBuffer) { $Output = [System.Collections.ArrayList]::new() $Output.AddRange([System.BitConverter]::GetBytes($ClusterID)) $Output.AddRange([System.BitConverter]::GetBytes($TableID)) $Output.AddRange([System.BitConverter]::GetBytes($TableBufferSize)) $Output.AddRange([System.BitConverter]::GetBytes($TableIndex)) $Output.AddRange([byte[]]::new(8)) # Reserved Bytes $Output.AddRange($TableBuffer) $Output } Function ReadCluster($ClusterID) { $i = 0 $j = 0 $TableID = 0 $TableIndex = 0 $ClusterOutput = [System.Collections.ArrayList]::new() $FinalTableID = 0xFF $FinalTableID_FWBug = 0xFFFF $FinalTableIndex = [uint32]0xFFFFFFFFL while ($TableID -ne $FinalTableID -and $TableID -ne $FinalTableID_FWBug) { Write-Progress -Activity $Messages.WritingDebugDump -PercentComplete $j # Call the OID for the current buffer and the next iteration info Write-Verbose "`[IN`] Buffer $i : $($DebugClusterMap.$ClusterID) Cluster `($ClusterID`)`tTableID $TableID`tTableIndex $TableIndex" $Dump = GetDump $ClusterID $TableID $TableIndex $Output = BuildTableOutput $ClusterID $TableID $TableIndex $Dump.TableBufferSize $Dump.TableBuffer $ClusterOutput.AddRange($Output) if ($Dump.NextTableID -eq -1 -or ($TableID -eq $Dump.NextTableID -and $TableIndex -eq $Dump.NextTableIndex)) { return $ClusterOutput } if ($TableID -ne $Dump.NextTableID -or $TableIndex -eq $FinalTableIndex) { $TableIndex = 0 $TableID = $Dump.NextTableID } else { $TableIndex = $Dump.NextTableIndex } $i++ if ($j++ -ge 100) { $j = 0 } } $ClusterOutput } function GetDump($ClusterID, $TableID, $TableIndex) { $TableBuffer = [System.Collections.ArrayList]::new() $TableBufferSize = 0 $MaxOIDBufs = 8 for ($BufIndex = 0; $BufIndex -lt $MaxOIDBufs; $BufIndex++) { # Build Input Buffer: BufIndex, ClusterId, TableId, TableIndex starting at the 4th byte $InBuf = [byte[]]::new(1024) [System.BitConverter]::GetBytes($BufIndex).CopyTo($InBuf, 4) [System.BitConverter]::GetBytes($ClusterID).CopyTo($InBuf, 8) [System.BitConverter]::GetBytes($TableID).CopyTo($InBuf, 12) [System.BitConverter]::GetBytes($TableIndex).CopyTo($InBuf, 16) $params = @{ Type = [uint32]1 Version = [uint32]1 Size = [uint32]1048 # Header size (24 bytes) + Data Size (1024) Operation = [uint32]0x22 # Operation = 0x22 is INTEL_GEN_DATA_OP_GET_DUMP OpVersion = [uint32]1 DataSize = [uint32]1024 InBuf = $InBuf } # first call WmiSetGenData $Result = InvokeCimMethod "IntlLan_SetGenData" $AdapterName "WmiSetGenData" $Params # if the Result is INTEL_GEN_DATA_STATUS_CALL_GET_GEN_DATA - read GenData if ($Result.OutStatus -eq 1) { $Result = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetGenData -Filter "InstanceName = '$AdapterName'" if ($null -eq $Result) { $TmpMsg = $Messages.FailedToReadCluster -f $DebugClusterMap.[int]$ClusterID if ($script:ErrorMessagesWrite -NotContains $TmpMsg) { $script:ErrorMessagesWrite += $TmpMsg } $TableID = -1 break } # DumpHeader consists of (Little Endian): # UInt32 BufIndex # UInt32 TableId # UInt32 TableIndex # UInt32 TableSize # UInt32 FwError # UInt32 BufSize # Byte DumpBuf[512] $OIDHeaderSize = 48 $DumpParametersHeaderSize = 48 $GenDataLength = $Result.GenData.Length $DumpHeaderLength = $GenDataLength - $OIDHeaderSize $DumpHeader = [byte[]]::new($DumpHeaderLength) $DumpBufLength = $DumpHeaderLength - $DumpParametersHeaderSize $DumpBufContent = [byte[]]::new($DumpBufLength) # Strip OID response header [System.Array]::ConstrainedCopy($Result.GenData, 24, $DumpHeader, 0, $DumpHeaderLength) # Strip DumpParameters header [System.Array]::ConstrainedCopy($DumpHeader, 24, $DumpBufContent, 0, $DumpBufLength) $BufIndex = [bitconverter]::ToUInt32($DumpHeader, 0) $NextTableId = [bitconverter]::ToUInt32($DumpHeader, 4) $NextTableIndex = [bitconverter]::ToUInt32($DumpHeader, 8) $TableSize = [bitconverter]::ToUInt32($DumpHeader, 12) $FwError = [bitconverter]::ToUInt32($DumpHeader, 16) $BufSize = [bitconverter]::ToUInt32($DumpHeader, 20) if ($BufIndex -eq 0) { Write-Verbose "`[OUT`] $($DebugClusterMap.$ClusterID) Cluster `($ClusterID`)`tNextTableID $($NextTableID)`tNextTableIndex $($NextTableIndex)" $TableID = $NextTableID $TableIndex = $NextTableIndex $TableBufferSize = $TableSize } if (-Not $BufSize) { break } $TableBuffer.AddRange($DumpBufContent[0..($BufSize-1)]) } else { $TmpMsg = $Messages.FailedToReadCluster -f $DebugClusterMap.[int]$ClusterID if ($script:ErrorMessagesWrite -NotContains $TmpMsg) { $script:ErrorMessagesWrite += $TmpMsg } $TableID = -1 Write-Verbose "`[OUT`] Buffer $($BufIndex) : $($DebugClusterMap.$ClusterID) Cluster `($ClusterID`)`tNextTableID $($NextTableID)`tNextTableIndex $($NextTableIndex)`tFwError: $($FwError)" break } } return [PsCustomObject] @{ NextTableId = $TableID NextTableIndex = $TableIndex TableBuffer = $TableBuffer TableBufferSize = $TableBufferSize } } # SIG # Begin signature block # MIIocAYJKoZIhvcNAQcCoIIoYTCCKF0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBGykbbyQjnuLmT # q8ku78KmAgC4vo2Jy2DvSH95k0P4sqCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1DCCFdACAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIFrxIbmwUgsOTnUnmb1n0f8e # 6pyIzBEKEEQ4btq4JdZIMA0GCSqGSIb3DQEBAQUABIIBgI/Ou70xRqpIGQ2UQrwd # mGhKVwJAEW0VjyPtOUoOnzIV0x2tDBUr2z8uURR6ieZYui2NPt6IIpaKQIaDuyrG # zruqlc/a4XD5ntIJJOdNDdjzSjUL45bmWf63WX+pZweO7WKp5QG0/gFSYXV9Goyg # EOuKDcRov8ymFtAwEXpz/CHN9NyZonfvLKCS+Cf6csgqqzOJrhFdMT0nMT68QQK+ # XQgHmIpVZfl35tCHKkz2+g2zvrRjh4prqky/O8SHrZu+cSbOOrDcQ2m2Ah5aNZUW # v9K8+VKNhBB9C/Kbstg1Asbj9lH/UQoRMU7Rm9ud73WtjR9FhvQfdHBVb4f68SnT # Mgky3wcyBe6neeuEKZ6WTMqaaHsy1lU1jg6+sd1ZWixjHBKY/2yfI43v4NU+iXR0 # qOkkHVPx00H1fpFQ5/LYsvLsl+pG/qWIwJriYEt+AIgsXI9lkfogoKKkX8T+Durd # uqLZMV6/aIxctlyjCEv2POZUhhAca7if8kfHNr/ACq+jZKGCE04wghNKBgorBgEE # AYI3AwMBMYITOjCCEzYGCSqGSIb3DQEHAqCCEycwghMjAgEDMQ8wDQYJYIZIAWUD # BAICBQAwge8GCyqGSIb3DQEJEAEEoIHfBIHcMIHZAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIEciOOGng5o1a8KEzVO71wFm1v8I0nEkFQ63GyZAvGy9 # AhR7Hus/bXP/2CsLucgyS2TrEZpjFhgPMjAyNDAzMTgxODI0MDdaoG6kbDBqMQsw # CQYDVQQGEwJHQjETMBEGA1UECBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGln # byBMaW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNp # Z25lciAjNKCCDekwggb1MIIE3aADAgECAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCSqG # SIb3DQEBDAUAMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNo # ZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRl # ZDElMCMGA1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMzA1 # MDMwMDAwMDBaFw0zNDA4MDIyMzU5NTlaMGoxCzAJBgNVBAYTAkdCMRMwEQYDVQQI # EwpNYW5jaGVzdGVyMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAqBgNVBAMM # I1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICM0MIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEApJMoUkvPJ4d2pCkcmTjA5w7U0RzsaMsBZOSK # zXewcWWCvJ/8i7u7lZj7JRGOWogJZhEUWLK6Ilvm9jLxXS3AeqIO4OBWZO2h5YEg # ciBkQWzHwwj6831d7yGawn7XLMO6EZge/NMgCEKzX79/iFgyqzCz2Ix6lkoZE1ys # /Oer6RwWLrCwOJVKz4VQq2cDJaG7OOkPb6lampEoEzW5H/M94STIa7GZ6A3vu03l # PYxUA5HQ/C3PVTM4egkcB9Ei4GOGp7790oNzEhSbmkwJRr00vOFLUHty4Fv9Gbsf # PGoZe267LUQqvjxMzKyKBJPGV4agczYrgZf6G5t+iIfYUnmJ/m53N9e7UJ/6GCVP # E/JefKmxIFopq6NCh3fg9EwCSN1YpVOmo6DtGZZlFSnF7TMwJeaWg4Ga9mBmkFgH # gM1Cdaz7tJHQxd0BQGq2qBDu9o16t551r9OlSxihDJ9XsF4lR5F0zXUS0Zxv5F4N # m+x1Ju7+0/WSL1KF6NpEUSqizADKh2ZDoxsA76K1lp1irScL8htKycOUQjeIIISo # h67DuiNye/hU7/hrJ7CF9adDhdgrOXTbWncC0aT69c2cPcwfrlHQe2zYHS0RQlNx # dMLlNaotUhLZJc/w09CRQxLXMn2YbON3Qcj/HyRU726txj5Ve/Fchzpk8WBLBU/v # uS/sCRMCAwEAAaOCAYIwggF+MB8GA1UdIwQYMBaAFBqh+GEZIA/DQXdFKI7RNV8G # EgRVMB0GA1UdDgQWBBQDDzHIkSqTvWPz0V1NpDQP0pUBGDAOBgNVHQ8BAf8EBAMC # BsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBKBgNVHSAE # QzBBMDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3Rp # Z28uY29tL0NQUzAIBgZngQwBBAIwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDovL2Ny # bC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3JsMHQGCCsG # AQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdvLmNvbS9T # ZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdodHRwOi8v # b2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEATJtlWPrgec/vFcMy # bd4zket3WOLrvctKPHXefpRtwyLHBJXfZWlhEwz2DJ71iSBewYfHAyTKx6XwJt/4 # +DFlDeDrbVFXpoyEUghGHCrC3vLaikXzvvf2LsR+7fjtaL96VkjpYeWaOXe8vrqR # ZIh1/12FFjQn0inL/+0t2v++kwzsbaINzMPxbr0hkRojAFKtl9RieCqEeajXPawh # j3DDJHk6l/ENo6NbU9irALpY+zWAT18ocWwZXsKDcpCu4MbY8pn76rSSZXwHfDVE # Ha1YGGti+95sxAqpbNMhRnDcL411TCPCQdB6ljvDS93NkiZ0dlw3oJoknk5fTtOP # D+UTT1lEZUtDZM9I+GdnuU2/zA2xOjDQoT1IrXpl5Ozf4AHwsypKOazBpPmpfTXQ # MkCgsRkqGCGyyH0FcRpLJzaq4Jgcg3Xnx35LhEPNQ/uQl3YqEqxAwXBbmQpA+oBt # lGF7yG65yGdnJFxQjQEg3gf3AdT4LhHNnYPl+MolHEQ9J+WwhkcqCxuEdn17aE+N # t/cTtO2gLe5zD9kQup2ZLHzXdR+PEMSU5n4k5ZVKiIwn1oVmHfmuZHaR6Ej+yFUK # 7SnDH944psAU+zI9+KmDYjbIw74Ahxyr+kpCHIkD3PVcfHDZXXhO7p9eIOYJanwr # CKNI9RX8BE/fzSEceuX1jhrUuUAwggbsMIIE1KADAgECAhAwD2+s3WaYdHypRjan # eC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3 # IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VS # VFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0 # aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5NTlaMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77NawHbWGgSl # zkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavVcRB5h/RG # Ks3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc1zjxFrJw # 06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQhe5cBlK9/ # gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzIjDzTFKKc # vSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4wZytGtzWv # lr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5VC0m7kUa # Om/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmTIBxKlyx3 # GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuoRsDJ8qb/ # fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdprt9v3GEBX # c/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVBeqeDAgMB # AAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNmyzAdBgNV # HQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGGMBIGA1Ud # EwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0gBAowCDAG # BgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNv # bS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEF # BQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9V # U0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29j # c3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNdFuG1U4GR # dd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9Aw63T4uRW # +VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbhRGdtj7BD # EA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4OZOTlJux # 3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhvWiVwYoFz # Y16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JHHfBd1qFz # VwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJLnfE5Xkze # SD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMftpmWJvQ8 # eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/poUGd/rG4 # oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq/eww2vGn # L8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWiAoa6Ke60 # WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQsMIIEKAIBATCBkTB9MQswCQYDVQQGEwJH # QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3Jk # MRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNB # IFRpbWUgU3RhbXBpbmcgQ0ECEDlMJeF8oG0nqGXiO9kdItQwDQYJYIZIAWUDBAIC # BQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUx # DxcNMjQwMzE4MTgyNDA3WjA/BgkqhkiG9w0BCQQxMgQwZaz7Zvq2UY8N4Ddetpfk # elRW6wHk6MvsXPP4XRsyJbU57MAyNoOnajLAdhE15ON5MIHtBgsqhkiG9w0BCRAC # DDGB3TCB2jCB1zAWBBSuYq91Cgy9R9ZGH3Vo4ryM58pPlDCBvAQUAtZbleKDcMFX # AJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpO # ZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVT # RVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmlj # YXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3DQEBAQUA # BIICADvLKD8iv67pdvKrw1DKA+JgEXzYWQa/3POdUwFu2SKsMgQBj6rovIzIML+X # uzAI/L8yuqAlVrKYmNkm7d8Pzlo4A6bJa4d9UgKe3GmOvCDjnyFauoJZ1Jgf2eSd # BClFvJ8UQhz7S89tyiYwI9G/Ic8Zl0o39aQ2l1jk3DnMxjKEmKIR1ODYCgUc4qDP # pxHm/BTPwe8qAhL+w2qw7qzhiHy0CKXv9BQdjTuXl/px39E+1325G8krjd4h7cEk # znNJrj2PnG5N2HBFsB7JwGA4MajJJ9FlmveDreAe0+eC24AR0Nb10HmndA15W9Is # pkRdD4MM1DbCfX7Py3iXRHAa3AFHhJ4eICEAzEtQc3uKPkFK0kmj77XeDOU+3Otj # bYDSGnvF7xp8/RkOms4JwnRzgsl2LSddgQNdALWAOfl9WRiEB6rqi32ItBXt7wCE # alaRZMHWZfBslaaLJ8douSswrNTjtYTXifL8T73YToEBQbnFGl0qXYBN3+l8zGCp # rWrh5zKke8G1bv4Qs0MeMrHlTZWFO0wKaQW+HLiblL776YRIpsOPxcFYo2sKbn1C # ol3QOOXAwNLYQtezL9ulP9xa+SfHaDaz/he0+9acJGNnzJ2+5PHr498CD0kpjIAX # i1auxjwcgIMiHNBSG879R0nN6qHYZHS0QLuLWnYq9rErRpzJ # SIG # End signature block
combined_dataset/train/non-malicious/53.ps1
53.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-IntuneApplication(){ [cmdletbinding()] param ( $Name ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileApps" try { if($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") -and (!($_.'@odata.type').Contains("managed")) -and (!($_.'@odata.type').Contains(" } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { (!($_.'@odata.type').Contains("managed")) -and (!($_.'@odata.type').Contains(" } } catch { $ex = $_.Exception Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Remove-IntuneApplication(){ [cmdletbinding()] param ( $id ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileApps" try { if($id -eq "" -or $id -eq $null){ write-host "No id specified for application, can't remove application..." -f Red write-host "Please specify id for application..." -f Red break } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)/$id" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Delete } } catch { $ex = $_.Exception Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $App = Get-IntuneApplication -Name "Microsoft Excel" if($App){ if(@($App).count -gt 1){ Write-Host "More than one application has been found, please specify a single application..." -ForegroundColor Red Write-Host } elseif(@($App).count -eq 1){ write-host "Removing Application..." -f Yellow $App.displayname + ": " + $App.'@odata.type' $App.id Remove-IntuneApplication -id $App.id write-host } } else { Write-Host "Application doesn't exist in Intune..." -ForegroundColor Red Write-Host }
combined_dataset/train/non-malicious/1093.ps1
1093.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldEscapeADSpecialCharacters { $specialCharacters = "*()\`0/" $escapedCharacters = Format-ADSearchFilterValue -String $specialCharacters Assert-Equal '\2a\28\29\5c\00\2f' $escapedCharacters }
combined_dataset/train/non-malicious/sample_22_77.ps1
sample_22_77.ps1
# # Module manifest for module 'OCI.PSModules.Identitydomains' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identitydomains.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a6c13cbd-d51d-4887-9285-9eb20c02e9cc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identitydomains Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydomains.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIIdentitydomainsAccountMgmtInfo', 'Get-OCIIdentitydomainsAccountMgmtInfosList', 'Get-OCIIdentitydomainsAccountRecoverySetting', 'Get-OCIIdentitydomainsAccountRecoverySettingsList', 'Get-OCIIdentitydomainsApiKey', 'Get-OCIIdentitydomainsApiKeysList', 'Get-OCIIdentitydomainsApp', 'Get-OCIIdentitydomainsAppRole', 'Get-OCIIdentitydomainsAppRolesList', 'Get-OCIIdentitydomainsApprovalWorkflow', 'Get-OCIIdentitydomainsApprovalWorkflowAssignment', 'Get-OCIIdentitydomainsApprovalWorkflowAssignmentsList', 'Get-OCIIdentitydomainsApprovalWorkflowsList', 'Get-OCIIdentitydomainsApprovalWorkflowStep', 'Get-OCIIdentitydomainsApprovalWorkflowStepsList', 'Get-OCIIdentitydomainsAppsList', 'Get-OCIIdentitydomainsAuthenticationFactorSetting', 'Get-OCIIdentitydomainsAuthenticationFactorSettingsList', 'Get-OCIIdentitydomainsAuthToken', 'Get-OCIIdentitydomainsAuthTokensList', 'Get-OCIIdentitydomainsBrandingSetting', 'Get-OCIIdentitydomainsBrandingSettingsList', 'Get-OCIIdentitydomainsCloudGate', 'Get-OCIIdentitydomainsCloudGateMapping', 'Get-OCIIdentitydomainsCloudGateMappingsList', 'Get-OCIIdentitydomainsCloudGateServer', 'Get-OCIIdentitydomainsCloudGateServersList', 'Get-OCIIdentitydomainsCloudGatesList', 'Get-OCIIdentitydomainsCondition', 'Get-OCIIdentitydomainsConditionsList', 'Get-OCIIdentitydomainsCustomerSecretKey', 'Get-OCIIdentitydomainsCustomerSecretKeysList', 'Get-OCIIdentitydomainsDynamicResourceGroup', 'Get-OCIIdentitydomainsDynamicResourceGroupsList', 'Get-OCIIdentitydomainsGrant', 'Get-OCIIdentitydomainsGrantsList', 'Get-OCIIdentitydomainsGroup', 'Get-OCIIdentitydomainsGroupsList', 'Get-OCIIdentitydomainsIdentityPropagationTrust', 'Get-OCIIdentitydomainsIdentityPropagationTrustsList', 'Get-OCIIdentitydomainsIdentityProvider', 'Get-OCIIdentitydomainsIdentityProvidersList', 'Get-OCIIdentitydomainsIdentitySetting', 'Get-OCIIdentitydomainsIdentitySettingsList', 'Get-OCIIdentitydomainsKmsiSetting', 'Get-OCIIdentitydomainsKmsiSettingsList', 'Get-OCIIdentitydomainsMe', 'Get-OCIIdentitydomainsMyApiKey', 'Get-OCIIdentitydomainsMyApiKeysList', 'Get-OCIIdentitydomainsMyAppsList', 'Get-OCIIdentitydomainsMyAuthToken', 'Get-OCIIdentitydomainsMyAuthTokensList', 'Get-OCIIdentitydomainsMyCompletedApproval', 'Get-OCIIdentitydomainsMyCompletedApprovalsList', 'Get-OCIIdentitydomainsMyCustomerSecretKey', 'Get-OCIIdentitydomainsMyCustomerSecretKeysList', 'Get-OCIIdentitydomainsMyDevice', 'Get-OCIIdentitydomainsMyDevicesList', 'Get-OCIIdentitydomainsMyGroupsList', 'Get-OCIIdentitydomainsMyOAuth2ClientCredential', 'Get-OCIIdentitydomainsMyOAuth2ClientCredentialsList', 'Get-OCIIdentitydomainsMyPendingApproval', 'Get-OCIIdentitydomainsMyPendingApprovalsList', 'Get-OCIIdentitydomainsMyRequest', 'Get-OCIIdentitydomainsMyRequestableGroupsList', 'Get-OCIIdentitydomainsMyRequestsList', 'Get-OCIIdentitydomainsMySmtpCredential', 'Get-OCIIdentitydomainsMySmtpCredentialsList', 'Get-OCIIdentitydomainsMySupportAccount', 'Get-OCIIdentitydomainsMySupportAccountsList', 'Get-OCIIdentitydomainsMyTrustedUserAgent', 'Get-OCIIdentitydomainsMyTrustedUserAgentsList', 'Get-OCIIdentitydomainsMyUserDbCredential', 'Get-OCIIdentitydomainsMyUserDbCredentialsList', 'Get-OCIIdentitydomainsNetworkPerimeter', 'Get-OCIIdentitydomainsNetworkPerimetersList', 'Get-OCIIdentitydomainsNotificationSetting', 'Get-OCIIdentitydomainsNotificationSettingsList', 'Get-OCIIdentitydomainsOAuth2ClientCredential', 'Get-OCIIdentitydomainsOAuth2ClientCredentialsList', 'Get-OCIIdentitydomainsOAuthClientCertificate', 'Get-OCIIdentitydomainsOAuthClientCertificatesList', 'Get-OCIIdentitydomainsOAuthPartnerCertificate', 'Get-OCIIdentitydomainsOAuthPartnerCertificatesList', 'Get-OCIIdentitydomainsPasswordPoliciesList', 'Get-OCIIdentitydomainsPasswordPolicy', 'Get-OCIIdentitydomainsPoliciesList', 'Get-OCIIdentitydomainsPolicy', 'Get-OCIIdentitydomainsResourceTypeSchemaAttributesList', 'Get-OCIIdentitydomainsRule', 'Get-OCIIdentitydomainsRulesList', 'Get-OCIIdentitydomainsSchema', 'Get-OCIIdentitydomainsSchemasList', 'Get-OCIIdentitydomainsSecurityQuestion', 'Get-OCIIdentitydomainsSecurityQuestionSetting', 'Get-OCIIdentitydomainsSecurityQuestionSettingsList', 'Get-OCIIdentitydomainsSecurityQuestionsList', 'Get-OCIIdentitydomainsSelfRegistrationProfile', 'Get-OCIIdentitydomainsSelfRegistrationProfilesList', 'Get-OCIIdentitydomainsSetting', 'Get-OCIIdentitydomainsSettingsList', 'Get-OCIIdentitydomainsSmtpCredential', 'Get-OCIIdentitydomainsSmtpCredentialsList', 'Get-OCIIdentitydomainsUser', 'Get-OCIIdentitydomainsUserAttributesSetting', 'Get-OCIIdentitydomainsUserAttributesSettingsList', 'Get-OCIIdentitydomainsUserDbCredential', 'Get-OCIIdentitydomainsUserDbCredentialsList', 'Get-OCIIdentitydomainsUsersList', 'Invoke-OCIIdentitydomainsPatchAccountRecoverySetting', 'Invoke-OCIIdentitydomainsPatchApiKey', 'Invoke-OCIIdentitydomainsPatchApp', 'Invoke-OCIIdentitydomainsPatchAppRole', 'Invoke-OCIIdentitydomainsPatchApprovalWorkflow', 'Invoke-OCIIdentitydomainsPatchApprovalWorkflowStep', 'Invoke-OCIIdentitydomainsPatchAuthToken', 'Invoke-OCIIdentitydomainsPatchCloudGate', 'Invoke-OCIIdentitydomainsPatchCloudGateMapping', 'Invoke-OCIIdentitydomainsPatchCloudGateServer', 'Invoke-OCIIdentitydomainsPatchCondition', 'Invoke-OCIIdentitydomainsPatchCustomerSecretKey', 'Invoke-OCIIdentitydomainsPatchDynamicResourceGroup', 'Invoke-OCIIdentitydomainsPatchGrant', 'Invoke-OCIIdentitydomainsPatchGroup', 'Invoke-OCIIdentitydomainsPatchIdentityPropagationTrust', 'Invoke-OCIIdentitydomainsPatchIdentityProvider', 'Invoke-OCIIdentitydomainsPatchIdentitySetting', 'Invoke-OCIIdentitydomainsPatchKmsiSetting', 'Invoke-OCIIdentitydomainsPatchMe', 'Invoke-OCIIdentitydomainsPatchMyApiKey', 'Invoke-OCIIdentitydomainsPatchMyAuthToken', 'Invoke-OCIIdentitydomainsPatchMyCustomerSecretKey', 'Invoke-OCIIdentitydomainsPatchMyDevice', 'Invoke-OCIIdentitydomainsPatchMyOAuth2ClientCredential', 'Invoke-OCIIdentitydomainsPatchMyPendingApproval', 'Invoke-OCIIdentitydomainsPatchMyRequest', 'Invoke-OCIIdentitydomainsPatchMySmtpCredential', 'Invoke-OCIIdentitydomainsPatchNetworkPerimeter', 'Invoke-OCIIdentitydomainsPatchOAuth2ClientCredential', 'Invoke-OCIIdentitydomainsPatchPasswordPolicy', 'Invoke-OCIIdentitydomainsPatchPolicy', 'Invoke-OCIIdentitydomainsPatchRule', 'Invoke-OCIIdentitydomainsPatchSchema', 'Invoke-OCIIdentitydomainsPatchSecurityQuestion', 'Invoke-OCIIdentitydomainsPatchSecurityQuestionSetting', 'Invoke-OCIIdentitydomainsPatchSelfRegistrationProfile', 'Invoke-OCIIdentitydomainsPatchSetting', 'Invoke-OCIIdentitydomainsPatchSmtpCredential', 'Invoke-OCIIdentitydomainsPatchUser', 'Invoke-OCIIdentitydomainsPatchUserAttributesSetting', 'Invoke-OCIIdentitydomainsSearchAccountMgmtInfos', 'Invoke-OCIIdentitydomainsSearchApiKeys', 'Invoke-OCIIdentitydomainsSearchAppRoles', 'Invoke-OCIIdentitydomainsSearchApps', 'Invoke-OCIIdentitydomainsSearchAuthenticationFactorSettings', 'Invoke-OCIIdentitydomainsSearchAuthTokens', 'Invoke-OCIIdentitydomainsSearchCloudGateMappings', 'Invoke-OCIIdentitydomainsSearchCloudGates', 'Invoke-OCIIdentitydomainsSearchCloudGateServers', 'Invoke-OCIIdentitydomainsSearchConditions', 'Invoke-OCIIdentitydomainsSearchCustomerSecretKeys', 'Invoke-OCIIdentitydomainsSearchDynamicResourceGroups', 'Invoke-OCIIdentitydomainsSearchGrants', 'Invoke-OCIIdentitydomainsSearchGroups', 'Invoke-OCIIdentitydomainsSearchIdentityProviders', 'Invoke-OCIIdentitydomainsSearchIdentitySettings', 'Invoke-OCIIdentitydomainsSearchKmsiSettings', 'Invoke-OCIIdentitydomainsSearchMyApps', 'Invoke-OCIIdentitydomainsSearchMyGroups', 'Invoke-OCIIdentitydomainsSearchMyRequestableGroups', 'Invoke-OCIIdentitydomainsSearchMyRequests', 'Invoke-OCIIdentitydomainsSearchNetworkPerimeters', 'Invoke-OCIIdentitydomainsSearchNotificationSettings', 'Invoke-OCIIdentitydomainsSearchOAuth2ClientCredentials', 'Invoke-OCIIdentitydomainsSearchOAuthClientCertificates', 'Invoke-OCIIdentitydomainsSearchOAuthPartnerCertificates', 'Invoke-OCIIdentitydomainsSearchPasswordPolicies', 'Invoke-OCIIdentitydomainsSearchPolicies', 'Invoke-OCIIdentitydomainsSearchResourceTypeSchemaAttributes', 'Invoke-OCIIdentitydomainsSearchRules', 'Invoke-OCIIdentitydomainsSearchSchemas', 'Invoke-OCIIdentitydomainsSearchSecurityQuestions', 'Invoke-OCIIdentitydomainsSearchSecurityQuestionSettings', 'Invoke-OCIIdentitydomainsSearchSelfRegistrationProfiles', 'Invoke-OCIIdentitydomainsSearchSettings', 'Invoke-OCIIdentitydomainsSearchSmtpCredentials', 'Invoke-OCIIdentitydomainsSearchUserAttributesSettings', 'Invoke-OCIIdentitydomainsSearchUserDbCredentials', 'Invoke-OCIIdentitydomainsSearchUsers', 'New-OCIIdentitydomainsApiKey', 'New-OCIIdentitydomainsApp', 'New-OCIIdentitydomainsAppRole', 'New-OCIIdentitydomainsApprovalWorkflow', 'New-OCIIdentitydomainsApprovalWorkflowAssignment', 'New-OCIIdentitydomainsApprovalWorkflowStep', 'New-OCIIdentitydomainsAuthenticationFactorsRemover', 'New-OCIIdentitydomainsAuthToken', 'New-OCIIdentitydomainsCloudGate', 'New-OCIIdentitydomainsCloudGateMapping', 'New-OCIIdentitydomainsCloudGateServer', 'New-OCIIdentitydomainsCondition', 'New-OCIIdentitydomainsCustomerSecretKey', 'New-OCIIdentitydomainsDynamicResourceGroup', 'New-OCIIdentitydomainsGrant', 'New-OCIIdentitydomainsGroup', 'New-OCIIdentitydomainsIdentityPropagationTrust', 'New-OCIIdentitydomainsIdentityProvider', 'New-OCIIdentitydomainsMe', 'New-OCIIdentitydomainsMyApiKey', 'New-OCIIdentitydomainsMyAuthenticationFactorInitiator', 'New-OCIIdentitydomainsMyAuthenticationFactorsRemover', 'New-OCIIdentitydomainsMyAuthenticationFactorValidator', 'New-OCIIdentitydomainsMyAuthToken', 'New-OCIIdentitydomainsMyCustomerSecretKey', 'New-OCIIdentitydomainsMyOAuth2ClientCredential', 'New-OCIIdentitydomainsMyRequest', 'New-OCIIdentitydomainsMySmtpCredential', 'New-OCIIdentitydomainsMySupportAccount', 'New-OCIIdentitydomainsMyUserDbCredential', 'New-OCIIdentitydomainsNetworkPerimeter', 'New-OCIIdentitydomainsOAuth2ClientCredential', 'New-OCIIdentitydomainsOAuthClientCertificate', 'New-OCIIdentitydomainsOAuthPartnerCertificate', 'New-OCIIdentitydomainsPasswordPolicy', 'New-OCIIdentitydomainsPolicy', 'New-OCIIdentitydomainsRule', 'New-OCIIdentitydomainsSecurityQuestion', 'New-OCIIdentitydomainsSelfRegistrationProfile', 'New-OCIIdentitydomainsSmtpCredential', 'New-OCIIdentitydomainsUser', 'New-OCIIdentitydomainsUserDbCredential', 'Remove-OCIIdentitydomainsApiKey', 'Remove-OCIIdentitydomainsApp', 'Remove-OCIIdentitydomainsAppRole', 'Remove-OCIIdentitydomainsApprovalWorkflow', 'Remove-OCIIdentitydomainsApprovalWorkflowAssignment', 'Remove-OCIIdentitydomainsApprovalWorkflowStep', 'Remove-OCIIdentitydomainsAuthToken', 'Remove-OCIIdentitydomainsCloudGate', 'Remove-OCIIdentitydomainsCloudGateMapping', 'Remove-OCIIdentitydomainsCloudGateServer', 'Remove-OCIIdentitydomainsCondition', 'Remove-OCIIdentitydomainsCustomerSecretKey', 'Remove-OCIIdentitydomainsDynamicResourceGroup', 'Remove-OCIIdentitydomainsGrant', 'Remove-OCIIdentitydomainsGroup', 'Remove-OCIIdentitydomainsIdentityPropagationTrust', 'Remove-OCIIdentitydomainsIdentityProvider', 'Remove-OCIIdentitydomainsMyApiKey', 'Remove-OCIIdentitydomainsMyAuthToken', 'Remove-OCIIdentitydomainsMyCustomerSecretKey', 'Remove-OCIIdentitydomainsMyDevice', 'Remove-OCIIdentitydomainsMyOAuth2ClientCredential', 'Remove-OCIIdentitydomainsMySmtpCredential', 'Remove-OCIIdentitydomainsMySupportAccount', 'Remove-OCIIdentitydomainsMyTrustedUserAgent', 'Remove-OCIIdentitydomainsMyUserDbCredential', 'Remove-OCIIdentitydomainsNetworkPerimeter', 'Remove-OCIIdentitydomainsOAuth2ClientCredential', 'Remove-OCIIdentitydomainsOAuthClientCertificate', 'Remove-OCIIdentitydomainsOAuthPartnerCertificate', 'Remove-OCIIdentitydomainsPasswordPolicy', 'Remove-OCIIdentitydomainsPolicy', 'Remove-OCIIdentitydomainsRule', 'Remove-OCIIdentitydomainsSecurityQuestion', 'Remove-OCIIdentitydomainsSelfRegistrationProfile', 'Remove-OCIIdentitydomainsSmtpCredential', 'Remove-OCIIdentitydomainsUser', 'Remove-OCIIdentitydomainsUserDbCredential', 'Write-OCIIdentitydomainsAccountRecoverySetting', 'Write-OCIIdentitydomainsApp', 'Write-OCIIdentitydomainsApprovalWorkflow', 'Write-OCIIdentitydomainsAppStatusChanger', 'Write-OCIIdentitydomainsAuthenticationFactorSetting', 'Write-OCIIdentitydomainsCloudGate', 'Write-OCIIdentitydomainsCloudGateMapping', 'Write-OCIIdentitydomainsCloudGateServer', 'Write-OCIIdentitydomainsCondition', 'Write-OCIIdentitydomainsDynamicResourceGroup', 'Write-OCIIdentitydomainsGroup', 'Write-OCIIdentitydomainsIdentityPropagationTrust', 'Write-OCIIdentitydomainsIdentityProvider', 'Write-OCIIdentitydomainsIdentitySetting', 'Write-OCIIdentitydomainsKmsiSetting', 'Write-OCIIdentitydomainsMe', 'Write-OCIIdentitydomainsMePasswordChanger', 'Write-OCIIdentitydomainsNetworkPerimeter', 'Write-OCIIdentitydomainsNotificationSetting', 'Write-OCIIdentitydomainsPasswordPolicy', 'Write-OCIIdentitydomainsPolicy', 'Write-OCIIdentitydomainsRule', 'Write-OCIIdentitydomainsSchema', 'Write-OCIIdentitydomainsSecurityQuestionSetting', 'Write-OCIIdentitydomainsSelfRegistrationProfile', 'Write-OCIIdentitydomainsSetting', 'Write-OCIIdentitydomainsUser', 'Write-OCIIdentitydomainsUserCapabilitiesChanger', 'Write-OCIIdentitydomainsUserPasswordChanger', 'Write-OCIIdentitydomainsUserPasswordResetter', 'Write-OCIIdentitydomainsUserStatusChanger' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydomains' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_24_25.ps1
sample_24_25.ps1
# # Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker' # # Generated by: Microsoft Corporation # # Generated on: 19/01/2022 # @{ # Script module or binary module file associated with this manifest. RootModule = '' # Version number of this module. ModuleVersion = '1.2100.2531.331' # Supported PSEditions # CompatiblePSEditions = '' # ID used to uniquely identify this module GUID = '9f4ce447-4385-4da7-9467-539e69e132e4' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft AzStackHci Readiness Checker' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @( 'AzStackHci.Observability.psm1' 'AzStackHci.Observability.Helpers.psm1' ) # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @('Invoke-AzStackHciObservabilityValidation' ) # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Microsoft','AzStackHci' # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALliPIjRoRMcw+ # /R+uXxxWU51nlEQDN+X+KWxI7AD3PKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINqw1KwZ8k37/48cImLgIUZG # lOzUydBj8yw8sHdUDOVnMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArICwrwK+zwPBE+8NF/KOqsgCOJUC9nVzu5ypDE5excAqQJ2eweAH/0cG # PxntsJMeniX9OWkt9CH8eyAdyRMTzBEtW7Ijax+BZTfo6Xh3SJVTvi1ZjNoEVEGD # m0JTfBhrHPD0nQLU0pYijwnuY4jockh7HOcD6uh73UaPuo77e4lbAvhqy5/e4TVD # FyTIonBNuWkz8w5y1cCjoI4E2J8L+Zvl9QIwfzynqgiFwDi3fTo66HKwZ54S2IeR # cUwtm2Oc/+2GGG92weGq5P4Evv8zOjRPempgC/Ec9ZeqO1Hk2EG039lgSBpGR4Yz # lI+g+3O+RKHhLk2RgcfTZe6ru698iaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAaQvhMS+CvDvHDTfnmp0QxDBIBOv5zxC7Hj4I/y/b0kwIGZbqeuldM # GBMyMDI0MDIxMjE0MDYzOC45MjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0RNYwIhgPMjAyNDAyMTIxNTE4NDZaGA8yMDI0MDIxMzE1MTg0NlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XRE1gIBADAKAgEAAgIBRwIB/zAHAgEAAgISkjAK # AgUA6XWWVgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEHMH8eDwQ5UEvYI # N/9Kq6PkMHM1J4YpUps7G5vN9ACEiNOyRzo1u51vINRVtW35RkXd/FwSJxwy2FsB # v/D0WmPV4Zm4NoWqDnB/Dpb4oBYpgmXmXTcFHbPKZldyI3/XMMJxnSLiJ6zmzbCt # mhPIujUMoFKQpSrn7wOflyWjp5aaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQglGBp8cLV/uqpCSgWeJ2QOCC1GnHUau6gDuwF0YY9svYwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIDnRr0iTxo7N39RYkJQjNKgSUzMlqo106/A0RY2l # 63UJMA0GCSqGSIb3DQEBCwUABIICABbylNZdoury1Y0L+XJkfKQOFm599xirWwqa # REs1OZUf8GwnYAOmYLDQcZmyTLcOHRi2/RmYXUkJLgWRHpPZjsgjw3w4/aImuLvU # IArOj6xLpHiV/CHT0/HGFxYU+/X3de1Iag4D9N2zsh5LhE77ejBroro9yg6dGipW # /XyctNwh20ijeZb2PF7W++lXIuSEzNnZZymWGx/vStYSRui4YJqJ9/Pszt4qm0WB # VEbp2LBtGwXPSbHOCFL+3GiIT1eoYMkI5M2UaDeVKv1YvOhUdEh4V2b/rfMHkteb # YjzdJAHZOHLDx7J2jMTLLdUTKOQJc95mGsN0XlHROUfaNXym2Opro385ccZsRxTu # iO9IoWbnBP0+6VY+tXKyv9IOeHy/oOYEiv0XBn6PFt1WqVCizbL541WN889+4mJH # ylxfKZ2CjfDYBFuhra16ziOzDfibydiUS1aCFh9c2UMikpcDvp9WlWsT7pCb7FMM # ut6S+SScNjeWYYwbIK65mNa2LoiH6uev6ed1S7QLGlx1N+Yi714s3ISOyusXHndk # jI54q3UT9uKKcGK6exjniTydsp27Tisc/qmtbYDYgn0lbCgfnmJUZVpy/A+xmA3E # TR+vA3N0RowHBn1YB6DqpPPfKMx8m2poEL2Qn7RYzCjA3sCq2w1ZwuBpD4oUYSu4 # wR5Ka2hi # SIG # End signature block
combined_dataset/train/non-malicious/sample_20_18.ps1
sample_20_18.ps1
# # Module manifest for module 'ThreadJob' # @{ # Script module or binary module file associated with this manifest. RootModule = '.\Microsoft.PowerShell.ThreadJob.dll' # Version number of this module. ModuleVersion = '2.0.3' # ID used to uniquely identify this module GUID = '0e7b895d-2fec-43f7-8cae-11e8d16f6e40' Author = 'Microsoft Corporation' CompanyName = 'Microsoft Corporation' Copyright = '(c) Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = " PowerShell's built-in BackgroundJob jobs (Start-Job) are run in separate processes on the local machine. They provide excellent isolation but are resource heavy. Running hundreds of BackgroundJob jobs can quickly absorb system resources. This module extends the existing PowerShell BackgroundJob to include a new thread based ThreadJob job. This is a lighter weight solution for running concurrent PowerShell scripts that works within the existing PowerShell job infrastructure. ThreadJob jobs will tend to run quicker because there is lower overhead and they do not use the remoting serialization system. And they will use up fewer system resources. In addition output objects returned from the job will be 'live' since they are not re-hydrated from the serialization system. However, there is less isolation. If one ThreadJob job crashes the process then all ThreadJob jobs running in that process will be terminated. This module exports a single cmdlet, Start-ThreadJob, which works similarly to the existing Start-Job cmdlet. The main difference is that the jobs which are created run in separate threads within the local process. One difference is that ThreadJob jobs support a ThrottleLimit parameter to limit the number of running jobs, and thus active threads, at a time. If more jobs are started then they go into a queue and wait until the current number of jobs drops below the throttle limit. Source for this module is at GitHub. Please submit any issues there. https://github.com/PaulHigin/PSThreadJob Added Runspace cleanup. Added Using variable expression support. Added StreamingHost parameter to stream host data writes to a provided host object. Added Information stream handling. Bumped version to 2.0.0, and now only support PowerShell version 5.1 and higher. Fixed using keyword bug with PowerShell preview version, and removed unneeded version check. Added setting current working directory to running jobs, when available. Added help URI to module. " # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Cmdlets to export from this module CmdletsToExport = 'Start-ThreadJob' HelpInfoURI = 'https://go.microsoft.com/fwlink/?linkid=2113345' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCv4Sy4df4Y/sf/ # 4d7im71N8tCny9H0XszagzRNoGf2raCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHladHYi2lfI6orS+P2p3tLX # iHwb+pI1x7mEwA8VwGMTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJWsEdgQFLu/2/K+184cobDXbEG4Y19OmmCi/9yJ9wRcZI3/yo/WEkszZ # 5F0/vO1SzwRn9jVdB4d5pVGvtS0URM0derfF5by/6BjOfC/5+akaJHGCDcrc17NW # REWk3pYekLB/p+mqeYhBEs3gZVg5JZEWU2ILRMwefOF5TCqoEeTFWzlgjKnGCuP9 # i/FvE0bX9uLLu4DwOm5burC4tyh9fzoNotra/1DWjxprUcqYYOCaE4NptRLnaXXO # PGo3grd9JV1finlqFozCy6ErWgxvk/gM0SvDhHhD5yrUopK9E5OfsP0vL13VrSEF # sbwrizX4ZRGbzNfU4BTB7Y4WbXdFnKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDd9gvLTyCQTEweHSyAt7WPYvHCYcHot091/jFuDkcHsAIGZfypflVd # GBMyMDI0MDQxNzE0NDMyMS43MjlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnKFXMwIhgPMjAyNDA0MTcxNzMxMzFaGA8yMDI0MDQxODE3MzEzMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6coVcwIBADAHAgEAAgIcXjAHAgEAAgIRfDAKAgUA # 6ctm8wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGHj8sVzfh0uupx47pHv # ZZjzq36biRHek7Y7t2YX9eJmkgbps2NAu8/BJb/d1PG6ESW5UZZV/5aUie1uYUP7 # UmPkqIyO78ZDNCiR98gnU0FLApnERB3oP7qxLe/O5IUkbIHHaht67sWrhtsQ1g4Q # 0j6/6ePSfdteDb7+TpdEGDhiMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgWD6+1QmzysXkYOvgDh1tQpAqvF2V5/vmjckD34FzsAYwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIO0GtXpb51D31Pe5k2EeH+UCeNSHTxSqH63fPlmSQBsn # MA0GCSqGSIb3DQEBCwUABIICAHjuZjgaAy4AxIK2aC0RfTxYCqadVD2MzoeRRNGd # UB1/tL1pHkLL4Il9i4kL2Jus7LxZQUI44cccMsLsHx8dxH45DHk0ol1SCqmZ4Azc # CN1E+7oVrcSKEYfc+gz9J101Pb1hE4WgtP/aUY8h5xJ8uGyNPNDTGrkByt0dIu0l # XXRv6x4V0lIEr53aZT4Bw5s6EYqNvDJRmxg88NDPObRFALL2F8qwCEnO8l03Y8lM # t/iglBqSQuOugfXQ8f3zmkGkdabzp/Wy9Zy9PqNS9P+4gSgPkmi2frpgCZzyGAD9 # ius0g7RGbUApkmDOlyc35t5JvfvcF7sqIgEi936kiqPxeGwtEgHVkpgxvnef4JCr # /SF3KwmKzp1jjPfbiQU/xsikXL0T+gUAjb2NH5c6UyeMJJttl8oiLPJN04XT3ctq # dkICMoB0Lo/vdLmbektM+6TJ4rHnXsPHDIxaKyNfIBjzg9mpvWG0fgyWvjQjGQNQ # zBL8GNO9QbnpkK5i53Xzc2CPbg9sCio762LeMdJwrWAyrlIGyXdjVF+XSgGQ7xkH # oIx2R4licQw1btJST66skuo6iLdEzzu7OkeNXr/mb4MElr5scQ4TeG1iiAb+X+Fw # gX6kiBoXLa3mn1eLUfNDDbmfZx5orxerJF2wV2Bzr1m29z9JJohjaMSutfKKMBUt # pT0D # SIG # End signature block
combined_dataset/train/non-malicious/sample_44_21.ps1
sample_44_21.ps1
########################################################### # # 'GCArcService' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest Import-Module "$PSScriptRoot\ServiceHelper.psm1" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName $script:OperationRetryCount = 5 <# .SYNOPSIS Install Guest Configuration Arc Service. .Example Install-GCArcService #> Function Install-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Install-GCArcService" $ServiceType = "GCArc" $gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config' '{ "ServiceType": "GCArc" }' | Out-File $gcConfigPath -Encoding utf8 New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath) Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() # Install GC Service and verify it is installed correctly. Install-ServiceInternal -ServiceType "GCArc" } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Enable and start Guest Configuration Arc Service. .Example Enable-GCArcService #> Function Enable-GCArcService { [CmdletBinding()] Param() Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() Write-Verbose -Message "In Enable-GCArcService" $ServiceType = "GCArc" Start-ServiceInternal -ServiceType $ServiceType } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Uninstall Guest Configuration Arc Service. .Example Uninstall-GCArcService #> Function Uninstall-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Uninstall-GCArcService" $ServiceType = "GCArc" # Unregister GC Service Uninstall-ServiceInternal -ServiceType $ServiceType $guestConfigDataPath = Get-GuestConfigDataPath $configurationPath = Join-Path $guestConfigDataPath 'Configuration' if ((Test-Path -Path $configurationPath) -and (-not (CheckServiceExists($global:GCServiceName)))) { Write-Verbose "Removing GC user data from $configurationPath path ..." Remove-Item $configurationPath -Recurse -Force } } <# .SYNOPSIS Update Guest Configuration service. .Example Update-GCArcService #> Function Update-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Update-GCArcService" } Export-ModuleMember -Function @( 'Install-GCArcService', 'Enable-GCArcService', 'Uninstall-GCArcService', 'Update-GCArcService' ) # SIG # Begin signature block # MIInzwYJKoZIhvcNAQcCoIInwDCCJ7wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBiMG+twTeJCd4D # inSASyoEH2LgmLtLl98tUNWujwJ94aCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaAwghmcAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL59 # y+jhL9A0O3Idu+8nZayQZp3eKfjLNeUNRLnJaOGNMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEASer6kMmduNGk0bXQ/EKgERvR8tUAas9GPfWV # BthQGiMFYkyu4LCJT20VXiS/L6nJCeQ5wyNvWuWfXOpU7HSjDrc8eWqZdabqiBwb # hZKruOt0v6oL1N0v/ai0uZEjsrAmpe2v0h2TX9HK7b08Esa7Bvw6Die4f21qKxSY # 9FO4IyYn93TSyC10m4EQUUUAWeptVNUioSoNGjtRv9Ofrxswuc0t7Cqzs33neoo1 # MCc+r+vR0Zy1ghCTRGdLrLQI7C94ctmFG96wN+uuLJ5C8CAHrenvxa79l0+3KfsF # Pl58mtIC7aWkdAaRiqyE3jrFBQurjbrGDLMCixth6Q5VL/8ToaGCFyowghcmBgor # BgEEAYI3AwMBMYIXFjCCFxIGCSqGSIb3DQEHAqCCFwMwghb/AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCArshEJNwl7A2HzOvVEj885ZrBBSOBs/yLU # uukJ8k5xXwIGZh+4B1VBGBIyMDI0MDQxNzE0NDMyMy40NlowBIACAfSggdikgdUw # gdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd # VGhhbGVzIFRTUyBFU046MDg0Mi00QkU2LUMyOUExJTAjBgNVBAMTHE1pY3Jvc29m # dCBUaW1lLVN0YW1wIFNlcnZpY2WgghF6MIIHJzCCBQ+gAwIBAgITMwAAAdqO1cla # ANERsQABAAAB2jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDAeFw0yMzEwMTIxOTA2NTlaFw0yNTAxMTAxOTA2NTlaMIHSMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3Nv # ZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBU # U1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T # dGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAk5AG # CHa1UVHWPyNADg0N/xtxWtdI3TzQI0o9JCjtLnuwKc9TQUoXjvDYvqoe3CbgScKU # XZyu5cWn+Xs+kxCDbkTtfzEOa/GvwEETqIBIA8J+tN5u68CxlZwliHLumuAK4F/s # 6J1emCxbXLynpWzuwPZq6n/S695jF5eUq2w+MwKmUeSTRtr4eAuGjQnrwp2OLcMz # Yrn3AfL3Gu2xgr5f16tsMZnaaZffvrlpLlDv+6APExWDPKPzTImfpQueScP2LiRR # DFWGpXV1z8MXpQF67N+6SQx53u2vNQRkxHKVruqG/BR5CWDMJCGlmPP7OxCCleU9 # zO8Z3SKqvuUALB9UaiDmmUjN0TG+3VMDwmZ5/zX1pMrAfUhUQjBgsDq69LyRF0Dp # HG8xxv/+6U2Mi4Zx7LKQwBcTKdWssb1W8rit+sKwYvePfQuaJ26D6jCtwKNBqBia # saTWEHKReKWj1gHxDLLlDUqEa4frlXfMXLxrSTBsoFGzxVHge2g9jD3PUN1wl9kE # 7Z2HNffIAyKkIabpKa+a9q9GxeHLzTmOICkPI36zT9vuizbPyJFYYmToz265Pbj3 # eAVX/0ksaDlgkkIlcj7LGQ785edkmy4a3T7NYt0dLhchcEbXug+7kqwV9FMdESWh # HZ0jobBprEjIPJIdg628jJ2Vru7iV+d8KNj+opMCAwEAAaOCAUkwggFFMB0GA1Ud # DgQWBBShfI3JUT1mE5WLMRRXCE2Avw9fRTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP0 # 5dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB # /wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOC # AgEAuYNV1O24jSMAS3jU7Y4zwJTbftMYzKGsavsXMoIQVpfG2iqT8g5tCuKrVxod # WHa/K5DbifPdN04G/utyz+qc+M7GdcUvJk95pYuw24BFWZRWLJVheNdgHkPDNpZm # BJxjwYovvIaPJauHvxYlSCHusTX7lUPmHT/quz10FGoDMj1+FnPuymyO3y+fHnRY # TFsFJIfut9psd6d2l6ptOZb9F9xpP4YUixP6DZ6PvBEoir9CGeygXyakU08dXWr9 # Yr+sX8KGi+SEkwO+Wq0RNaL3saiU5IpqZkL1tiBw8p/Pbx53blYnLXRW1D0/n4L/ # Z058NrPVGZ45vbspt6CFrRJ89yuJN85FW+o8NJref03t2FNjv7j0jx6+hp32F1nw # J8g49+3C3fFNfZGExkkJWgWVpsdy99vzitoUzpzPkRiT7HVpUSJe2ArpHTGfXCMx # cd/QBaVKOpGTO9KdErMWxnASXvhVqGUpWEj4KL1FP37oZzTFbMnvNAhQUTcmKLHn # 7sovwCsd8Fj1QUvPiydugntCKncgANuRThkvSJDyPwjGtrtpJh9OhR5+Zy3d0zr1 # 9/gR6HYqH02wqKKmHnz0Cn/FLWMRKWt+Mv+D9luhpLl31rZ8Dn3ya5sO8sPnHk8/ # fvvTS+b9j48iGanZ9O+5Layd15kGbJOpxQ0dE2YKT6eNXecwggdxMIIFWaADAgEC # AhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQg # Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVa # Fw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V # gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF # RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3X # D9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoP # z130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+ # tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5Jas # AUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/b # fV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuv # XsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg # 8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzF # a/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqP # nhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw # IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf # pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBB # MD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0Rv # Y3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGC # NxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8w # HwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmg # R4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWlj # Um9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEF # BQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29D # ZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEs # H2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk # wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL # btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCg # vxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsId # w2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2 # zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23K # jgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beu # yOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/ # tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjm # jJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBj # U02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1jCCAj8CAQEwggEAoYHYpIHVMIHS # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN # aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo # YWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQg # VGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBCoh8hiWMdRs2hjT/C # OFdGf+xIDaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0G # CSqGSIb3DQEBBQUAAgUA6co2hDAiGA8yMDI0MDQxNzE5NTIzNloYDzIwMjQwNDE4 # MTk1MjM2WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpyjaEAgEAMAkCAQACAU4C # Af8wBwIBAAICESwwCgIFAOnLiAQCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYB # BAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOB # gQBdjqwYrYQhrQntVuVKs/qenJKoCvv/sN55fjm7QBZNsBupk4YQ0mMamruxxdTL # g091qorTfduKM62NjJ+w4ZCa1YVdUOYwJz3tIWsFNezPRd0QXJdVcKfUyDMTA/uC # nokC4ShqO+zOYlVEWqS6UDmASovGo8bk25VpDfdedNrdVDGCBA0wggQJAgEBMIGT # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7VyVoA0RGxAAEA # AAHaMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQ # AQQwLwYJKoZIhvcNAQkEMSIEIA4/1qo43tof6PFXFtLkaQksj6JmoIpRlLM690s1 # dVb+MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgIqWjaWLA756k3veQ49Qt # PdNtCOZY4m61v53SAjsYPcYwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMAITMwAAAdqO1claANERsQABAAAB2jAiBCAvVjWLxMPeioBfYLkQ+kwe # PJ9ct8fa3bfo4svTuSVVeTANBgkqhkiG9w0BAQsFAASCAgAisWemFbj1CHLd5xM5 # tclV8hSmSsy7t0wuHzDBPc5qNeJTwVUNXRqILE1/2WKPnFinCpaV8NoGD8OuXuwB # H/NcJ1601Tb8uUjONPUtYkRfGxqpysYTGfXxFzRdlI1vbzecOOWIjxQ/lgWQiUIe # bU64eo6TvA8jnkmDRLbvGCDA/55VBQqHJVb2TfXxbOuebPWBAqal9lNk3kmCYOHZ # GsqQR6t61cpNjueBbVPuxL8vtatGHhuyMqkW72GU3ZNG0johAOWiqX8KsKcyqmt+ # V7iqaJqkQL0pvlYYlPpw3sapc0Vp4/vGZQiA2JNbYzFpGjJto5sdRVSf0OlHrNzo # Dh9xVCszCi+TWGbOQEScPbawsoVtP3Z/+uja2gk76YjWiLPDxWtmWnc0KUPPAHhX # W+1swrt+d9LtfntjfqCQn1NN+9Ny4w+Wk8HrWM1wVu6BvV/9UzT+3APP0j6hqt4S # GuHwFHKI/i8dRF0v/3L1aYD2sGl+5LUQygWM/phV7gmNh13zL9+XDVEnKwMCrMJW # Yy5eFZN6Ya/r1WXzHzLody+sNHAoNzviQGYVtvP9pPciHX4ZM3X2aQglC4lIJXyT # PAwrMUQiXPFs3WX7bnsIiFr+IYK6/0e3kuoNjk+jLTp0NskrB4qszpaJLF+9ileC # uCSZCspXCX0MeVW0jIkGvSn8JQ== # SIG # End signature block
combined_dataset/train/non-malicious/sample_51_32.ps1
sample_51_32.ps1
# # Module manifest for module 'OCI.PSModules.Aidocument' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aidocument.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '48b9296a-b4a7-43bb-8d59-3eaf832baf2a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aidocument Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aidocument.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAidocumentModel', 'Get-OCIAidocumentModelsList', 'Get-OCIAidocumentProcessorJob', 'Get-OCIAidocumentProject', 'Get-OCIAidocumentProjectsList', 'Get-OCIAidocumentWorkRequest', 'Get-OCIAidocumentWorkRequestErrorsList', 'Get-OCIAidocumentWorkRequestLogsList', 'Get-OCIAidocumentWorkRequestsList', 'Invoke-OCIAidocumentAnalyzeDocument', 'Invoke-OCIAidocumentPatchModel', 'Move-OCIAidocumentModelCompartment', 'Move-OCIAidocumentProjectCompartment', 'New-OCIAidocumentModel', 'New-OCIAidocumentProcessorJob', 'New-OCIAidocumentProject', 'Remove-OCIAidocumentModel', 'Remove-OCIAidocumentProject', 'Stop-OCIAidocumentProcessorJob', 'Stop-OCIAidocumentWorkRequest', 'Update-OCIAidocumentModel', 'Update-OCIAidocumentProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aidocument' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get Twitter RSS Feed_6.ps1
Get Twitter RSS Feed_6.ps1
param ([String] $ScreenName) $client = New-Object System.Net.WebClient $idUrl = "https://api.twitter.com/1/users/show.json?screen_name=$ScreenName" $data = $client.DownloadString($idUrl) $start = 0 $findStr = '"id":' do { $start = $data.IndexOf($findStr, $start + 1) if ($start -gt 0) { $start += $findStr.Length $end = $data.IndexOf(',', $start) $userId = $data.SubString($start, $end-$start) } } while ($start -le $data.Length -and $start -gt 0) $feed = "http://twitter.com/statuses/user_timeline/$userId.rss" $feed
combined_dataset/train/non-malicious/sample_65_66.ps1
sample_65_66.ps1
# # Module manifest for module 'OCI.PSModules.Apmsynthetics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmsynthetics.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b2901c22-2813-4f21-ae94-09094aa70e0e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmsynthetics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmsynthetics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmsyntheticsDedicatedVantagePoint', 'Get-OCIApmsyntheticsDedicatedVantagePointsList', 'Get-OCIApmsyntheticsMonitor', 'Get-OCIApmsyntheticsMonitorResult', 'Get-OCIApmsyntheticsMonitorsList', 'Get-OCIApmsyntheticsOnPremiseVantagePoint', 'Get-OCIApmsyntheticsOnPremiseVantagePointsList', 'Get-OCIApmsyntheticsPublicVantagePointsList', 'Get-OCIApmsyntheticsScript', 'Get-OCIApmsyntheticsScriptsList', 'Get-OCIApmsyntheticsWorker', 'Get-OCIApmsyntheticsWorkersList', 'Invoke-OCIApmsyntheticsAggregateNetworkData', 'New-OCIApmsyntheticsDedicatedVantagePoint', 'New-OCIApmsyntheticsMonitor', 'New-OCIApmsyntheticsOnPremiseVantagePoint', 'New-OCIApmsyntheticsScript', 'New-OCIApmsyntheticsWorker', 'Remove-OCIApmsyntheticsDedicatedVantagePoint', 'Remove-OCIApmsyntheticsMonitor', 'Remove-OCIApmsyntheticsOnPremiseVantagePoint', 'Remove-OCIApmsyntheticsScript', 'Remove-OCIApmsyntheticsWorker', 'Update-OCIApmsyntheticsDedicatedVantagePoint', 'Update-OCIApmsyntheticsMonitor', 'Update-OCIApmsyntheticsOnPremiseVantagePoint', 'Update-OCIApmsyntheticsScript', 'Update-OCIApmsyntheticsWorker' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmsynthetics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/h20 -Hashtables 2 object_3.ps1
h20 -Hashtables 2 object_3.ps1
#hashtable to object function. #used to be able to make custom objects with math inside the pipeline #examples # 1..10 | h20 { @{karl = $_;dude = $_+1} } #modify the incoming data with an expression # gps | h20 { @{name = $_.processname; mem = $_.workingset / 1MB} } #easily flatten data with subexpressions # get-command -verb get | h20 { @{ name = $_.name; type = $_.commandtype; synopsis = ($_ | get-help).synopsis ; } } #don't lose the incoming pipeline data when you don't explicitly include it in the hashtable. Its automatically stored in the property ".." #below, while the expression just includes string properties from the get-help object, the actual commandinfo object is stored in ".." # $a = get-command -verb ("get","set") | h20 { $_ | get-help | % { @{name = $_.name ; synopsis = $_.synopsis} } } # a[0].".." function h20([scriptblock]$sb, [switch]$dontkeepreference = $false) { begin {} process{ if ($sb -ne $null) { $local:obj = $_; $local:ht = &$sb; if ($local:ht -is [hashtable]) { if (!$dontkeepreference) { $local:ht.".." = $local:obj; } New-Object PSObject -Property $local:ht } } if ($local:ht -is [object[]]) { $local:ht | where { $_ -is [hashtable]} | % { if (!$dontkeepreference) {$_.".." = $local:obj} New-Object PSObject -Property $_ } } } end{} }
combined_dataset/train/non-malicious/3211.ps1
3211.ps1
using namespace System.Management.Automation using namespace System.Management.Automation.Language Import-Module PSReadLine Set-PSReadLineOption -EditMode Emacs Set-PSReadLineOption -HistorySearchCursorMovesToEnd Set-PSReadLineKeyHandler -Key UpArrow -Function HistorySearchBackward Set-PSReadLineKeyHandler -Key DownArrow -Function HistorySearchForward Set-PSReadLineKeyHandler -Key F7 ` -BriefDescription History ` -LongDescription 'Show command history' ` -ScriptBlock { $pattern = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$pattern, [ref]$null) if ($pattern) { $pattern = [regex]::Escape($pattern) } $history = [System.Collections.ArrayList]@( $last = '' $lines = '' foreach ($line in [System.IO.File]::ReadLines((Get-PSReadLineOption).HistorySavePath)) { if ($line.EndsWith('`')) { $line = $line.Substring(0, $line.Length - 1) $lines = if ($lines) { "$lines`n$line" } else { $line } continue } if ($lines) { $line = "$lines`n$line" $lines = '' } if (($line -cne $last) -and (!$pattern -or ($line -match $pattern))) { $last = $line $line } } ) $history.Reverse() $command = $history | Out-GridView -Title History -PassThru if ($command) { [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() [Microsoft.PowerShell.PSConsoleReadLine]::Insert(($command -join "`n")) } } Set-PSReadLineKeyHandler -Key Ctrl+B ` -BriefDescription BuildCurrentDirectory ` -LongDescription "Build the current directory" ` -ScriptBlock { [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() [Microsoft.PowerShell.PSConsoleReadLine]::Insert("msbuild") [Microsoft.PowerShell.PSConsoleReadLine]::AcceptLine() } Set-PSReadLineKeyHandler -Key Ctrl+Q -Function TabCompleteNext Set-PSReadLineKeyHandler -Key Ctrl+Shift+Q -Function TabCompletePrevious Set-PSReadLineKeyHandler -Key Shift+Ctrl+C -Function Copy Set-PSReadLineKeyHandler -Key Ctrl+V -Function Paste Set-PSReadLineKeyHandler -Chord 'Ctrl+D,Ctrl+C' -Function CaptureScreen Set-PSReadLineKeyHandler -Key Alt+D -Function ShellKillWord Set-PSReadLineKeyHandler -Key Alt+Backspace -Function ShellBackwardKillWord Set-PSReadLineKeyHandler -Key Alt+B -Function ShellBackwardWord Set-PSReadLineKeyHandler -Key Alt+F -Function ShellForwardWord Set-PSReadLineKeyHandler -Key Shift+Alt+B -Function SelectShellBackwardWord Set-PSReadLineKeyHandler -Key Shift+Alt+F -Function SelectShellForwardWord Set-PSReadLineKeyHandler -Key '"',"'" ` -BriefDescription SmartInsertQuote ` -LongDescription "Insert paired quotes if not already on a quote" ` -ScriptBlock { param($key, $arg) $quote = $key.KeyChar $selectionStart = $null $selectionLength = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($selectionStart -ne -1) { [Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, $quote + $line.SubString($selectionStart, $selectionLength) + $quote) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2) return } $ast = $null $tokens = $null $parseErrors = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$parseErrors, [ref]$null) function FindToken { param($tokens, $cursor) foreach ($token in $tokens) { if ($cursor -lt $token.Extent.StartOffset) { continue } if ($cursor -lt $token.Extent.EndOffset) { $result = $token $token = $token -as [StringExpandableToken] if ($token) { $nested = FindToken $token.NestedTokens $cursor if ($nested) { $result = $nested } } return $result } } return $null } $token = FindToken $tokens $cursor if ($token -is [StringToken] -and $token.Kind -ne [TokenKind]::Generic) { if ($token.Extent.StartOffset -eq $cursor) { [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$quote$quote ") [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) return } if ($token.Extent.EndOffset -eq ($cursor + 1) -and $line[$cursor] -eq $quote) { [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) return } } if ($null -eq $token) { if ($line[0..$cursor].Where{$_ -eq $quote}.Count % 2 -eq 1) { [Microsoft.PowerShell.PSConsoleReadLine]::Insert($quote) } else { [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$quote$quote") [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) } return } if ($token.Extent.StartOffset -eq $cursor) { if ($token.Kind -eq [TokenKind]::Generic -or $token.Kind -eq [TokenKind]::Identifier) { $end = $token.Extent.EndOffset $len = $end - $cursor [Microsoft.PowerShell.PSConsoleReadLine]::Replace($cursor, $len, $quote + $line.SubString($cursor, $len) + $quote) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($end + 2) } return } [Microsoft.PowerShell.PSConsoleReadLine]::Insert($quote) } Set-PSReadLineKeyHandler -Key '(','{','[' ` -BriefDescription InsertPairedBraces ` -LongDescription "Insert matching braces" ` -ScriptBlock { param($key, $arg) $closeChar = switch ($key.KeyChar) { '(' { [char]')'; break } '{' { [char]'}'; break } '[' { [char]']'; break } } [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$($key.KeyChar)$closeChar") $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor - 1) } Set-PSReadLineKeyHandler -Key ')',']','}' ` -BriefDescription SmartCloseBraces ` -LongDescription "Insert closing brace or skip" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($line[$cursor] -eq $key.KeyChar) { [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) } else { [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$($key.KeyChar)") } } Set-PSReadLineKeyHandler -Key Backspace ` -BriefDescription SmartBackspace ` -LongDescription "Delete previous character or matching quotes/parens/braces" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($cursor -gt 0) { $toMatch = $null if ($cursor -lt $line.Length) { switch ($line[$cursor]) { '"' { $toMatch = '"'; break } "'" { $toMatch = "'"; break } ')' { $toMatch = '('; break } ']' { $toMatch = '['; break } '}' { $toMatch = '{'; break } } } if ($toMatch -ne $null -and $line[$cursor-1] -eq $toMatch) { [Microsoft.PowerShell.PSConsoleReadLine]::Delete($cursor - 1, 2) } else { [Microsoft.PowerShell.PSConsoleReadLine]::BackwardDeleteChar($key, $arg) } } } Set-PSReadLineKeyHandler -Key Alt+w ` -BriefDescription SaveInHistory ` -LongDescription "Save current line in history but do not execute" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) [Microsoft.PowerShell.PSConsoleReadLine]::AddToHistory($line) [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() } Set-PSReadLineKeyHandler -Key Ctrl+Shift+v ` -BriefDescription PasteAsHereString ` -LongDescription "Paste the clipboard text as a here string" ` -ScriptBlock { param($key, $arg) Add-Type -Assembly PresentationCore if ([System.Windows.Clipboard]::ContainsText()) { $text = ([System.Windows.Clipboard]::GetText() -replace "\p{Zs}*`r?`n","`n").TrimEnd() [Microsoft.PowerShell.PSConsoleReadLine]::Insert("@'`n$text`n'@") } else { [Microsoft.PowerShell.PSConsoleReadLine]::Ding() } } Set-PSReadLineKeyHandler -Key 'Alt+(' ` -BriefDescription ParenthesizeSelection ` -LongDescription "Put parenthesis around the selection or entire line and move the cursor to after the closing parenthesis" ` -ScriptBlock { param($key, $arg) $selectionStart = $null $selectionLength = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($selectionStart -ne -1) { [Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, '(' + $line.SubString($selectionStart, $selectionLength) + ')') [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2) } else { [Microsoft.PowerShell.PSConsoleReadLine]::Replace(0, $line.Length, '(' + $line + ')') [Microsoft.PowerShell.PSConsoleReadLine]::EndOfLine() } } Set-PSReadLineKeyHandler -Key "Alt+'" ` -BriefDescription ToggleQuoteArgument ` -LongDescription "Toggle quotes on the argument under the cursor" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $tokenToChange = $null foreach ($token in $tokens) { $extent = $token.Extent if ($extent.StartOffset -le $cursor -and $extent.EndOffset -ge $cursor) { $tokenToChange = $token if ($extent.EndOffset -eq $cursor -and $foreach.MoveNext()) { $nextToken = $foreach.Current if ($nextToken.Extent.StartOffset -eq $cursor) { $tokenToChange = $nextToken } } break } } if ($tokenToChange -ne $null) { $extent = $tokenToChange.Extent $tokenText = $extent.Text if ($tokenText[0] -eq '"' -and $tokenText[-1] -eq '"') { $replacement = $tokenText.Substring(1, $tokenText.Length - 2) } elseif ($tokenText[0] -eq "'" -and $tokenText[-1] -eq "'") { $replacement = '"' + $tokenText.Substring(1, $tokenText.Length - 2) + '"' } else { $replacement = "'" + $tokenText + "'" } [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $extent.StartOffset, $tokenText.Length, $replacement) } } Set-PSReadLineKeyHandler -Key "Alt+%" ` -BriefDescription ExpandAliases ` -LongDescription "Replace all aliases with the full command" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $startAdjustment = 0 foreach ($token in $tokens) { if ($token.TokenFlags -band [TokenFlags]::CommandName) { $alias = $ExecutionContext.InvokeCommand.GetCommand($token.Extent.Text, 'Alias') if ($alias -ne $null) { $resolvedCommand = $alias.ResolvedCommandName if ($resolvedCommand -ne $null) { $extent = $token.Extent $length = $extent.EndOffset - $extent.StartOffset [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $extent.StartOffset + $startAdjustment, $length, $resolvedCommand) $startAdjustment += ($resolvedCommand.Length - $length) } } } } } Set-PSReadLineKeyHandler -Key F1 ` -BriefDescription CommandHelp ` -LongDescription "Open the help window for the current command" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $commandAst = $ast.FindAll( { $node = $args[0] $node -is [CommandAst] -and $node.Extent.StartOffset -le $cursor -and $node.Extent.EndOffset -ge $cursor }, $true) | Select-Object -Last 1 if ($commandAst -ne $null) { $commandName = $commandAst.GetCommandName() if ($commandName -ne $null) { $command = $ExecutionContext.InvokeCommand.GetCommand($commandName, 'All') if ($command -is [AliasInfo]) { $commandName = $command.ResolvedCommandName } if ($commandName -ne $null) { Get-Help $commandName -ShowWindow } } } } $global:PSReadLineMarks = @{} Set-PSReadLineKeyHandler -Key Ctrl+Shift+j ` -BriefDescription MarkDirectory ` -LongDescription "Mark the current directory" ` -ScriptBlock { param($key, $arg) $key = [Console]::ReadKey($true) $global:PSReadLineMarks[$key.KeyChar] = $pwd } Set-PSReadLineKeyHandler -Key Ctrl+j ` -BriefDescription JumpDirectory ` -LongDescription "Goto the marked directory" ` -ScriptBlock { param($key, $arg) $key = [Console]::ReadKey() $dir = $global:PSReadLineMarks[$key.KeyChar] if ($dir) { cd $dir [Microsoft.PowerShell.PSConsoleReadLine]::InvokePrompt() } } Set-PSReadLineKeyHandler -Key Alt+j ` -BriefDescription ShowDirectoryMarks ` -LongDescription "Show the currently marked directories" ` -ScriptBlock { param($key, $arg) $global:PSReadLineMarks.GetEnumerator() | % { [PSCustomObject]@{Key = $_.Key; Dir = $_.Value} } | Format-Table -AutoSize | Out-Host [Microsoft.PowerShell.PSConsoleReadLine]::InvokePrompt() } Set-PSReadLineOption -CommandValidationHandler { param([CommandAst]$CommandAst) switch ($CommandAst.GetCommandName()) { 'git' { $gitCmd = $CommandAst.CommandElements[1].Extent switch ($gitCmd.Text) { 'cmt' { [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $gitCmd.StartOffset, $gitCmd.EndOffset - $gitCmd.StartOffset, 'commit') } } } } }
combined_dataset/train/non-malicious/sample_30_67.ps1
sample_30_67.ps1
# # Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker' # # Generated by: Microsoft Corporation # # Generated on: 19/01/2022 # @{ # Script module or binary module file associated with this manifest. RootModule = '' # Version number of this module. ModuleVersion = '1.2100.2531.331' # Supported PSEditions # CompatiblePSEditions = '' # ID used to uniquely identify this module GUID = '293b6f68-901b-4145-bc42-65dd900c795c' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft AzStackHci Readiness Checker' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @( 'AzStackHci.Storage.psm1' 'AzStackHci.Storage.Helpers.psm1' ) # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @('Invoke-AzStackHciStorageValidation' ) # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Microsoft','AzStackHci' # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD64Y+AEritlBiy # x8C2MlN5l7zqLQReTDAY5T28yYuRiKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFgmDbkTvAyunYVu2WapzIRj # J4EoXSZ54mxCjD97FI60MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAgiZLuBEN7dY3rY4wvLpVJe/TFRroHMvojEoO+D0XlVJyLsorIHHtqFrh # HC4mDbtYigRlDfZuDd5DQuCYnmuyTX0C42rd3XMgUAYUZR0xaIFCvt7klX1Seuot # H86A4bFD5w+kVBNZvmHXdbxFajyQWHAkGvaegmAXsr/fGcRRKED95L4NMu8kCsmj # ye1ozvH9btNitrlwwQYhLFcUkkAbUaQIoRmjeMEOfu6+lENkLjyxKqfkdYy/fwPy # phTU5C9lTheK1s+mdjFRFq2GoX/Uy67k3sgS96UQx7PWejpWBwu2eLmZyCmLrTZC # BAvVB8U07Dsdp3k5IXmcwi1TW1hM16GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA2vVNlhZl+UzNOmSUE/TxdnGFXAN1t6fnCWjXwEmODTwIGZbqeuk5J # GBMyMDI0MDIxMjE0MDUyOS43MDdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0RNYwIhgPMjAyNDAyMTIxNTE4NDZaGA8yMDI0MDIxMzE1MTg0NlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XRE1gIBADAKAgEAAgIBRwIB/zAHAgEAAgISkjAK # AgUA6XWWVgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEHMH8eDwQ5UEvYI # N/9Kq6PkMHM1J4YpUps7G5vN9ACEiNOyRzo1u51vINRVtW35RkXd/FwSJxwy2FsB # v/D0WmPV4Zm4NoWqDnB/Dpb4oBYpgmXmXTcFHbPKZldyI3/XMMJxnSLiJ6zmzbCt # mhPIujUMoFKQpSrn7wOflyWjp5aaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgHFRGcFmWFk3j+AFrvtQ8jWvLoyl9HrI+ZpjY+PQp1JIwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIDnRr0iTxo7N39RYkJQjNKgSUzMlqo106/A0RY2l # 63UJMA0GCSqGSIb3DQEBCwUABIICAIigH1HS3tN0M/D6fhhgFoQkYOb4ds/HnUet # uba5HG+OajduTprNUHmhvV1e7HR3pBFSu6VnWm0VT60s2ByAqR0GwOdCMtfKz657 # e9OSBBir4nJXe/VHa5GRqP0JfIx/dT5lxFD8g4R7nXShbimGF0rTPdcwcI27FUdT # iT5+JepsoiNoBU6poZq8WidcCRRw7/OeDHRM9hqpazBON9w9yraWkNMH3ON69HuR # B/Wc0HYu1u6QluiVhlJ+LsvIDf3BVhqKu3yU0alwsJ0/5HTxQRz86veMmk5995I+ # luRzjf9+sktyou/fOHNd0RvIWyokdwuhTqlX4s6wYnqeZ+6bqIY2aZYPiV0Y+Je/ # Je4X2Z4s5qVI7ioApLgDM/EOSAmJzVipAQax8FcyQFjOFD+bPZcJHXPPaOvrRp8r # feIGj0WP0jMy63yIug7HTcF2y8dE14orGXvGVwvDQ4ees5e2htqiN9jbST70IwD/ # 2Qbai21EVuH7zE1INizcEt39VdrqSOcp5+y/OW3DUT/asO99uU2dRtza8TDkW25+ # nxaRqKFP+pD/FwD90ZLXJ/jIc6gGnfmRCbLnrzYdrscHTDzYlXGInTGFWaPtazEE # F15RdoV9IMfSH0k2orcb1RyWKZqRWxf+P9EwTA2HkUTy7fckQiebnmZe7iYbk7SE # YAjxk+dl # SIG # End signature block
combined_dataset/train/non-malicious/Get-ADMapObject.ps1
Get-ADMapObject.ps1
# Author: Steven Murawski http://www.mindofroot.com # This script requires the Show-NetMap script from Doug Finke and the NetMap files # These can be found at http://dougfinke.com/blog/?p=465 # # Also required are the Quest AD Cmdlets. #requires -pssnapin Quest.ActiveRoles.ADManagement function Write-Help() { $ExampleUsage = @' To use this script, you will need the Show-Netmap script from Doug Finke, along with the NetMap DLLs (included with the Show-NetMap script on Doug's blog). Downloadable from http://dougfinke.com/blog/?p=465 Usage: . .\\Get-ADMapObject.ps1 Get-ADMapObject ([Object Class Name] | [Array of Object Class Names]) | % { New-SourceTarget $_.Name $_.Parent } | Show-NetMap Example: . .\\Get-ADMapObject.ps1 Get-ADMapObject group | % { New-SourceTarget $_.Name $_.Parent } | Show-NetMap -layoutType G Get-ADMapObject ou, group, user | % { New-SourceTarget $_.Name $_.Parent } | Show-NetMap -layoutType S If you would like to get a listing (or array) of the Object Class Names, use the Get-ADObjectClassName function $classes = Get-ADObjectClassName '@ Write-Host $ExampleUsage } #Check to see if the required files are present to run the script. function Test-Prerequisites() { $required = @{ShowNetMap = 'Show-Netmap.ps1'; NetMapApp = 'Microsoft.NetMap.ApplicationUtil.dll'; NetMapControl = 'Microsoft.NetMap.Control.dll'; NetMapCore = 'Microsoft.NetMap.Core.dll'; NetMapUtil = 'Microsoft.NetMap.Util.dll'; NetMapVisual = 'Microsoft.NetMap.Visualization.dll' } $report = @() foreach ($key in $required.Keys) { $file = $required[$($key)] if (Test-Path $file ) { Write-Debug "Found $file" } else { $report += "Missing $file" } } if ($report.count -eq 0) { Write-Debug "All prerequisites were found." return $true } else { Write-Help Write-Host "Missing files: " $report | ForEach-Object { Write-Host "`tMissing $_" } throw "Please move the needed files into the current directory!" } } #If all the prereq's are in the local directory and the script was not run #with the -help switch, load everything up! if (Test-Prerequisites) { #Add the Show-Netmap functions from Doug Finke . .\\Show-NetMap.ps1 #This is just a helper function to find the parent of an object based on the parent's distinguished name function Get-ParentFromDN() { PROCESS { $root = '^DC=(\\w+),DC=(\\w+)$' $pattern = '^(OU|CN)=(\\w+?),.*?DC=\\w+?,DC=\\w+?$' $dn = $_ if ($dn -notmatch $root) { $dn -replace $pattern, '$2' } else { $dn -replace $root, '$1.$2' } } } #This will return an array of all the Object Classes in your Active Directory function Get-ADObjectClassName() { Get-QADObject | Select-Object -property @{name='Name';Expression={$_.type}} -unique | Sort-Object } function Get-ADMapObject() { param($TypesToMap=$(Throw 'One (or more object types as an array) are required to run this function'), [switch]$help) if ($help) { Write-Help } if ($TypesToMap -is [string]) { Get-QADObject -Type $TypesToMap | select Name, @{name='Parent';Expression={$_.ParentContainerDN | Get-ParentFromDN}} } else { foreach ( $type in $TypesToMap ) { Get-QADObject -Type $type | select Name, @{name='Parent';Expression={$_.ParentContainerDN | Get-ParentFromDN}} } } } #Helper function stolen from Doug Finke and used to create the objects to feed to #Show-Netmap function New-SourceTarget ($s,$t) { New-Object PSObject | Add-Member -pass noteproperty source $s | Add-Member -pass noteproperty target $t } } Write-Help
combined_dataset/train/non-malicious/3823.ps1
3823.ps1
function Test-VirtualMachineProfile { Get-AzVmss -ResourceGroupName "fakeresource" -VMScaleSetName "fakevmss" -ErrorAction SilentlyContinue $vmsize = 'Standard_A2'; $vmname = 'pstestvm' + ((Get-Random) % 10000); $vmssID = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rggroup/providers/Microsoft.Compute/virtualMachineScaleSets/testvmss" $p = New-AzVMConfig -VMName $vmname -VMSize $vmsize -VmssId $vmssID; Assert-AreEqual $p.HardwareProfile.VmSize $vmsize; Assert-AreEqual $vmssID $p.VirtualMachineScaleSet.Id; $ipname = 'hpfip' + ((Get-Random) % 10000); $ipRefUri1 = "https://test.foo.bar/$ipname"; $nicName = $ipname + 'nic1'; $publicIPName = $ipname + 'name1'; $p = Add-AzVMNetworkInterface -VM $p -Id $ipRefUri1; $ipname = 'hpfip' + ((Get-Random) % 10000); $ipRefUri2 = "https://test.foo.bar/$ipname"; $p = Add-AzVMNetworkInterface -VM $p -Id $ipRefUri2; $p = $p | Remove-AzVMNetworkInterface; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 0; $p = Add-AzVMNetworkInterface -VM $p -Id $ipRefUri1 -Primary; $p = Add-AzVMNetworkInterface -VM $p -Id $ipRefUri2; $p = Remove-AzVMNetworkInterface -VM $p -Id $ipRefUri2; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $ipRefUri1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true; $stoname = 'hpfteststo' + ((Get-Random) % 10000); $stotype = 'Standard_GRS'; $osDiskName = 'osDisk'; $osDiskCaching = 'ReadWrite'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd"; $dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd"; $p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption Empty; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 0 -VhdUri $dataDiskVhdUri1 -CreateOption Empty; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 1 -VhdUri $dataDiskVhdUri2 -CreateOption Empty; $managedDataDiskId = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rggroup/providers/Microsoft.Compute/disks/testDataDisk3"; Assert-ThrowsContains ` { Add-AzVMDataDisk -VM $p -Name 'dataDisk' -Caching 'ReadOnly' -DiskSizeInGB $null -Lun 2 -CreateOption Empty -ManagedDiskId $managedDataDiskId -StorageAccountType Standard_LRS; } ` "does not match with given managed disk ID"; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB $null -Lun 2 -CreateOption Empty ` -ManagedDiskId $managedDataDiskId -StorageAccountType Standard_LRS -DiskEncryptionSetId "enc_id1"; Assert-AreEqual $managedDataDiskId $p.StorageProfile.DataDisks[2].ManagedDisk.Id; Assert-AreEqual "Standard_LRS" $p.StorageProfile.DataDisks[2].ManagedDisk.StorageAccountType; Assert-Null $p.StorageProfile.DataDisks[2].DiskSizeGB; Assert-AreEqual $false $p.StorageProfile.DataDisks[2].WriteAcceleratorEnabled; Assert-AreEqual "enc_id1" $p.StorageProfile.DataDisks[2].ManagedDisk.DiskEncryptionSet.Id; $p = Set-AzVMDataDisk -VM $p -Name 'testDataDisk3' -StorageAccountType Premium_LRS -WriteAccelerator -DiskEncryptionSetId "enc_id2"; Assert-AreEqual $managedDataDiskId $p.StorageProfile.DataDisks[2].ManagedDisk.Id; Assert-AreEqual "Premium_LRS" $p.StorageProfile.DataDisks[2].ManagedDisk.StorageAccountType; Assert-AreEqual $true $p.StorageProfile.DataDisks[2].WriteAcceleratorEnabled; Assert-AreEqual "enc_id2" $p.StorageProfile.DataDisks[2].ManagedDisk.DiskEncryptionSet.Id; $p = Remove-AzVMDataDisk -VM $p -Name 'testDataDisk3'; Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching; Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; Assert-AreEqual $p.StorageProfile.DataDisks.Count 2; Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly'; Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10; Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 0; Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1; Assert-Null $p.StorageProfile.DataDisks[0].WriteAcceleratorEnabled; Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly'; Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11; Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 1; Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2; Assert-Null $p.StorageProfile.DataDisks[1].WriteAcceleratorEnabled; $p = $p | Remove-AzVMDataDisk; Assert-AreEqual $p.StorageProfile.DataDisks.Count 0; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 0 -VhdUri $dataDiskVhdUri1 -CreateOption Empty; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 1 -VhdUri $dataDiskVhdUri2 -CreateOption Empty; Assert-AreEqual $p.StorageProfile.DataDisks.Count 2; Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly'; Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10; Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 0; Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1; Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly'; Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11; Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 1; Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2; $managedOsDiskId_0 = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rggroup/providers/Microsoft.Compute/disks/osDisk0"; $managedOsDiskId_1 = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rggroup/providers/Microsoft.Compute/disks/osDisk1"; $p = Set-AzVMOsDisk -VM $p -ManagedDiskId $managedOsDiskId_0 -StorageAccountType Standard_LRS -WriteAccelerator; Assert-AreEqual $osDiskCaching $p.StorageProfile.OSDisk.Caching; Assert-AreEqual $osDiskName $p.StorageProfile.OSDisk.Name; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; Assert-AreEqual $managedOsDiskId_0 $p.StorageProfile.OSDisk.ManagedDisk.Id; Assert-AreEqual "Standard_LRS" $p.StorageProfile.OSDisk.ManagedDisk.StorageAccountType; Assert-AreEqual $true $p.StorageProfile.OSDisk.WriteAcceleratorEnabled; Assert-Null $p.StorageProfile.OSDisk.DiffDiskSettings; $p = Set-AzVMOsDisk -VM $p -ManagedDiskId $managedOsDiskId_1 -DiffDiskSetting "Local" -DiskEncryptionSetId "enc_id3"; Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching; Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; Assert-AreEqual $managedOsDiskId_1 $p.StorageProfile.OSDisk.ManagedDisk.Id; Assert-AreEqual "enc_id3" $p.StorageProfile.OSDisk.ManagedDisk.DiskEncryptionSet.Id; Assert-Null $p.StorageProfile.OSDisk.ManagedDisk.StorageAccountType; Assert-AreEqual $false $p.StorageProfile.OSDisk.WriteAcceleratorEnabled; Assert-AreEqual "Local" $p.StorageProfile.OSDisk.DiffDiskSettings.Option; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $winRMCertUrl = "http://keyVaultName.vault.azure.net/secrets/secretName/secretVersion"; $timeZone = "Pacific Standard Time"; $custom = "echo 'Hello World'"; $encodedCustom = "ZWNobyAnSGVsbG8gV29ybGQn"; $p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -CustomData $custom -WinRMHttp -WinRMHttps -WinRMCertificateUrl $winRMCertUrl -ProvisionVMAgent -EnableAutoUpdate -TimeZone $timeZone; $imgRef = Get-DefaultCRPWindowsImageOffline -loc $loc; $p = ($imgRef | Set-AzVMSourceImage -VM $p); $subid = (Get-AzContext).Subscription.SubscriptionId; $referenceUri = "/subscriptions/" + $subid + "/resourceGroups/RgTest1/providers/Microsoft.KeyVault/vaults/TestVault123"; $certStore = "My"; $certUrl = "https://testvault123.vault.azure.net/secrets/Test1/514ceb769c984379a7e0230bdd703272"; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri -CertificateStore $certStore -CertificateUrl $certUrl; $referenceUri2 = "/subscriptions/" + $subid + "/resourceGroups/RgTest1/providers/Microsoft.KeyVault/vaults/TestVault456"; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri2 -CertificateStore $certStore -CertificateUrl $certUrl; $certStore2 = "My2"; $certUrl2 = "https://testvault123.vault.azure.net/secrets/Test1/514ceb769c984379a7e0230bddaaaaaa"; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri -CertificateStore $certStore2 -CertificateUrl $certUrl2; Assert-AreEqual 2 $p.OSProfile.Secrets.Count; Assert-AreEqual $p.OSProfile.Secrets[0].SourceVault.Id $referenceUri; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateStore $certStore; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateUrl $certUrl; Assert-AreEqual $p.OSProfile.Secrets[0].SourceVault.Id $referenceUri; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[1].CertificateStore $certStore2; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[1].CertificateUrl $certUrl2; Assert-AreEqual $p.OSProfile.Secrets[1].SourceVault.Id $referenceUri2; Assert-AreEqual $p.OSProfile.Secrets[1].VaultCertificates[0].CertificateStore $certStore; Assert-AreEqual $p.OSProfile.Secrets[1].VaultCertificates[0].CertificateUrl $certUrl; $p = Remove-AzVMSecret -VM $p -SourceVaultId $referenceUri; Assert-AreEqual 1 $p.OSProfile.Secrets.Count; Assert-AreEqual $p.OSProfile.Secrets[0].SourceVault.Id $referenceUri2; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateStore $certStore; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateUrl $certUrl; $p = Remove-AzVMSecret -VM $p; Assert-AreEqual 0 $p.OSProfile.Secrets.Count; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri -CertificateStore $certStore -CertificateUrl $certUrl; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri2 -CertificateStore $certStore -CertificateUrl $certUrl; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri -CertificateStore $certStore2 -CertificateUrl $certUrl2; $aucSetting = "AutoLogon"; $aucContent = "<UserAccounts><AdministratorPassword><Value>" + $password + "</Value><PlainText>true</PlainText></AdministratorPassword></UserAccounts>"; $p = Add-AzVMAdditionalUnattendContent -VM $p -Content $aucContent -SettingName $aucSetting; $p = Add-AzVMAdditionalUnattendContent -VM $p -Content $aucContent -SettingName $aucSetting; Assert-AreEqual $p.OSProfile.AdminUsername $user; Assert-AreEqual $p.OSProfile.ComputerName $computerName; Assert-AreEqual $p.OSProfile.AdminPassword $password; Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $p.OSProfile.Secrets[0].SourceVault.Id $referenceUri; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateStore $certStore; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateUrl $certUrl; Assert-AreEqual $p.OSProfile.Secrets[0].SourceVault.Id $referenceUri; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[1].CertificateStore $certStore2; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[1].CertificateUrl $certUrl2; Assert-AreEqual $p.OSProfile.Secrets[1].SourceVault.Id $referenceUri2; Assert-AreEqual $p.OSProfile.Secrets[1].VaultCertificates[0].CertificateStore $certStore; Assert-AreEqual $p.OSProfile.Secrets[1].VaultCertificates[0].CertificateUrl $certUrl; Assert-AreEqual $encodedCustom $p.OSProfile.CustomData; Assert-Null $p.OSProfile.WindowsConfiguration.WinRM.Listeners[0].CertificateUrl; Assert-AreEqual "http" $p.OSProfile.WindowsConfiguration.WinRM.Listeners[0].Protocol ; Assert-AreEqual $winRMCertUrl $p.OSProfile.WindowsConfiguration.WinRM.Listeners[1].CertificateUrl ; Assert-AreEqual "https" $p.OSProfile.WindowsConfiguration.WinRM.Listeners[1].Protocol ; Assert-AreEqual $true $p.OSProfile.WindowsConfiguration.ProvisionVMAgent; Assert-AreEqual $true $p.OSProfile.WindowsConfiguration.EnableAutomaticUpdates; Assert-AreEqual $timeZone $p.OSProfile.WindowsConfiguration.TimeZone; Assert-AreEqual $aucContent $p.OSProfile.WindowsConfiguration.AdditionalUnattendContent[0].Content; Assert-AreEqual "oobeSystem" $p.OSProfile.WindowsConfiguration.AdditionalUnattendContent[0].PassName; Assert-AreEqual $aucSetting $p.OSProfile.WindowsConfiguration.AdditionalUnattendContent[0].SettingName; Assert-AreEqual $aucContent $p.OSProfile.WindowsConfiguration.AdditionalUnattendContent[1].Content; Assert-AreEqual "oobeSystem" $p.OSProfile.WindowsConfiguration.AdditionalUnattendContent[1].PassName; Assert-AreEqual $aucSetting $p.OSProfile.WindowsConfiguration.AdditionalUnattendContent[1].SettingName; $img = "b4590d9e3ed742e4a1d46e5424aa335e__SUSE-Linux-Enterprise-Server-11-SP3-v206"; $p = Set-AzVMOperatingSystem -VM $p -Linux -ComputerName $computerName -Credential $cred -CustomData $custom -DisablePasswordAuthentication; $imgRef = Get-DefaultCRPLinuxImageOffline -loc $loc; $p = ($imgRef | Set-AzVMSourceImage -VM $p); $sshPath = "/home/pstestuser/.ssh/authorized_keys"; $sshPublicKey = "MIIDszCCApugAwIBAgIJALBV9YJCF/tAMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV"; $p = Add-AzVMSshPublicKey -VM $p -KeyData $sshPublicKey -Path $sshPath; $p = Add-AzVMSshPublicKey -VM $p -KeyData $sshPublicKey -Path $sshPath; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri -CertificateStore $certStore -CertificateUrl $certUrl; Assert-AreEqual $p.OSProfile.AdminUsername $user; Assert-AreEqual $p.OSProfile.ComputerName $computerName; Assert-AreEqual $p.OSProfile.AdminPassword $password; Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $p.OSProfile.Secrets[0].SourceVault.Id $referenceUri; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateStore $certStore; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateUrl $certUrl; Assert-AreEqual $encodedCustom $p.OSProfile.CustomData; Assert-AreEqual $sshPublicKey $p.OSProfile.LinuxConfiguration.Ssh.PublicKeys[0].KeyData; Assert-AreEqual $sshPath $p.OSProfile.LinuxConfiguration.Ssh.PublicKeys[0].Path; Assert-AreEqual $sshPublicKey $p.OSProfile.LinuxConfiguration.Ssh.PublicKeys[1].KeyData; Assert-AreEqual $sshPath $p.OSProfile.LinuxConfiguration.Ssh.PublicKeys[1].Path; Assert-AreEqual $true $p.OSProfile.LinuxConfiguration.DisablePasswordAuthentication; Assert-Null $p.AdditionalCapabilities; } function Test-VirtualMachineProfileWithoutAUC { $vmsize = 'Standard_A2'; $vmname = 'pstestvm' + ((Get-Random) % 10000); $p = New-AzVMConfig -VMName $vmname -VMSize $vmsize -EnableUltraSSD; Assert-AreEqual $p.HardwareProfile.VmSize $vmsize; Assert-True { $p.AdditionalCapabilities.UltraSSDEnabled }; $ipname = 'hpfip' + ((Get-Random) % 10000); $ipRefUri = "https://test.foo.bar/$ipname"; $nicName = $ipname + 'nic1'; $publicIPName = $ipname + 'name1'; $p = Add-AzVMNetworkInterface -VM $p -Id $ipRefUri; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $ipRefUri; $stoname = 'hpfteststo' + ((Get-Random) % 10000); $stotype = 'Standard_GRS'; $osDiskName = 'osDisk'; $osDiskCaching = 'ReadWrite'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd"; $dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd"; $dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd"; $dekUri = "https://testvault123.vault.azure.net/secrets/Test1/514ceb769c984379a7e0230bddaaaaaa"; $dekId = "/subscriptions/" + $subid + "/resourceGroups/RgTest1/providers/Microsoft.KeyVault/vaults/TestVault123"; $kekUri = "http://keyVaultName.vault.azure.net/secrets/secretName/secretVersion"; $kekId = "/subscriptions/" + $subid + "/resourceGroups/RgTest1/providers/Microsoft.KeyVault/vaults/TestVault123"; $p = Set-AzVMOSDisk -VM $p -Windows -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption Empty -DiskEncryptionKeyUrl $dekUri -DiskEncryptionKeyVaultId $dekId -KeyEncryptionKeyUrl $kekUri -KeyEncryptionKeyVaultId $kekId; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 0 -VhdUri $dataDiskVhdUri1 -CreateOption Empty; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 1 -VhdUri $dataDiskVhdUri2 -CreateOption Empty; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 2 -VhdUri $dataDiskVhdUri3 -CreateOption Empty; $p = Remove-AzVMDataDisk -VM $p -Name 'testDataDisk3'; Assert-AreEqual $p.StorageProfile.OSDisk.EncryptionSettings.DiskEncryptionKey.SourceVault.Id $dekId Assert-AreEqual $p.StorageProfile.OSDisk.EncryptionSettings.DiskEncryptionKey.SecretUrl $dekUri Assert-AreEqual $p.StorageProfile.OSDisk.EncryptionSettings.KeyEncryptionKey.SourceVault.Id $kekId Assert-AreEqual $p.StorageProfile.OSDisk.EncryptionSettings.KeyEncryptionKey.KeyUrl $kekUri Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching; Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; Assert-AreEqual $p.StorageProfile.DataDisks.Count 2; Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly'; Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10; Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 0; Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1; Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly'; Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11; Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 1; Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $img = 'a699494373c04fc0bc8f2bb1389d6106__Windows-Server-2012-Datacenter-201503.01-en.us-127GB.vhd'; $winRMCertUrl = "http://keyVaultName.vault.azure.net/secrets/secretName/secretVersion"; $timeZone = "Pacific Standard Time"; $custom = "echo 'Hello World'"; $encodedCustom = "ZWNobyAnSGVsbG8gV29ybGQn"; $p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -CustomData $custom -WinRMHttp -WinRMHttps -WinRMCertificateUrl $winRMCertUrl -ProvisionVMAgent -EnableAutoUpdate -TimeZone $timeZone; $imgRef = Get-DefaultCRPWindowsImageOffline -loc $loc; $p = ($imgRef | Set-AzVMSourceImage -VM $p); $subid = (Get-AzContext).Subscription.SubscriptionId; $referenceUri = "/subscriptions/" + $subid + "/resourceGroups/RgTest1/providers/Microsoft.KeyVault/vaults/TestVault123"; $certStore = "My"; $certUrl = "https://testvault123.vault.azure.net/secrets/Test1/514ceb769c984Assert-True379a7e0230bdd703272"; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri -CertificateStore $certStore -CertificateUrl $certUrl; $referenceUri2 = "/subscriptions/" + $subid + "/resourceGroups/RgTest1/providers/Microsoft.KeyVault/vaults/TestVault456"; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri2 -CertificateStore $certStore -CertificateUrl $certUrl; $certStore2 = "My2"; $certUrl2 = "https://testvault123.vault.azure.net/secrets/Test1/514ceb769c984379a7e0230bddaaaaaa"; $p = Add-AzVMSecret -VM $p -SourceVaultId $referenceUri -CertificateStore $certStore2 -CertificateUrl $certUrl2; Assert-AreEqual $p.OSProfile.AdminUsername $user; Assert-AreEqual $p.OSProfile.ComputerName $computerName; Assert-AreEqual $p.OSProfile.AdminPassword $password; Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $p.OSProfile.Secrets[0].SourceVault.Id $referenceUri; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateStore $certStore; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[0].CertificateUrl $certUrl; Assert-AreEqual $p.OSProfile.Secrets[0].SourceVault.Id $referenceUri; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[1].CertificateStore $certStore2; Assert-AreEqual $p.OSProfile.Secrets[0].VaultCertificates[1].CertificateUrl $certUrl2; Assert-AreEqual $p.OSProfile.Secrets[1].SourceVault.Id $referenceUri2; Assert-AreEqual $p.OSProfile.Secrets[1].VaultCertificates[0].CertificateStore $certStore; Assert-AreEqual $p.OSProfile.Secrets[1].VaultCertificates[0].CertificateUrl $certUrl; Assert-AreEqual $encodedCustom $p.OSProfile.CustomData; Assert-Null $p.OSProfile.WindowsConfiguration.WinRM.Listeners[0].CertificateUrl; Assert-AreEqual "http" $p.OSProfile.WindowsConfiguration.WinRM.Listeners[0].Protocol ; Assert-AreEqual $winRMCertUrl $p.OSProfile.WindowsConfiguration.WinRM.Listeners[1].CertificateUrl ; Assert-AreEqual "https" $p.OSProfile.WindowsConfiguration.WinRM.Listeners[1].Protocol ; Assert-AreEqual $true $p.OSProfile.WindowsConfiguration.ProvisionVMAgent; Assert-AreEqual $true $p.OSProfile.WindowsConfiguration.EnableAutomaticUpdates; Assert-AreEqual $timeZone $p.OSProfile.WindowsConfiguration.TimeZone; Assert-Null $p.OSProfile.WindowsConfiguration.AdditionalUnattendContent "NULL"; Assert-False {$p.OSProfile.WindowsConfiguration.AdditionalUnattendContent.IsInitialized}; $p.OSProfile = $null; $p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred; Assert-Null $p.OSProfile.WindowsConfiguration.ProvisionVMAgent; $p.OSProfile = $null; $p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -DisableVMAgent; Assert-False {$p.OSProfile.WindowsConfiguration.ProvisionVMAgent}; }
combined_dataset/train/non-malicious/1646.ps1
1646.ps1
function Release-Ref ($ref) { ([System.Runtime.InteropServices.Marshal]::ReleaseComObject([System.__ComObject]$ref) -gt 0) [System.GC]::Collect() [System.GC]::WaitForPendingFinalizers() } function Remove-InvalidFileNameChars ([String]$Name, [switch]$IncludeSpace) { if ($IncludeSpace) { [RegEx]::Replace($Name, "[{0}]" -f ([RegEx]::Escape([String][System.IO.Path]::GetInvalidFileNameChars())), '') } else { [RegEx]::Replace($Name, "[{0}]" -f ([RegEx]::Escape(-join [System.IO.Path]::GetInvalidFileNameChars())), '') } } function Get-Files { param ( [string[]]$Path = $PWD, [string[]]$Include, [switch]$Recurse, [switch]$FoldersOnly ) $params = '/L', '/NJH', '/BYTES', '/FP', '/NC', '/TS', '/XJ', '/R:0', '/W:0' if ($Recurse) {$params += '/E'} if ($Include) {$params += $Include} foreach ($dir in $Path) { foreach ($line in $(robocopy $dir NULL $params)) { if (!$Include -and $line -match '\s+\d+\s+(?<FullName>.*\\)$') { New-Object PSObject -Property @{ FullName = $matches.FullName Size = $null DateModified = $null } } elseif (!$FoldersOnly -and $line -match '(?<Size>\d+)\s(?<Date>\S+\s\S+)\s+(?<FullName>.*)') { New-Object PSObject -Property @{ FullName = $matches.FullName Size = $matches.Size DateModified = $matches.Date } } else { Write-Verbose ('{0}' -f $line) } } } } cls $folder = Read-Host 'Drag and drop the folder you wish to process.' $folder = $folder -replace '"' if (!$folder) { Throw 'No folder provided.' } $recursive = Read-Host 'Check all subfolders? y/[N]' if ($recursive -eq 'y') { $mails = Get-Files $folder -Include *.msg -Recurse | select -ExpandProperty fullname | ? {$_ -match '\.msg$'} } else { $mails = Get-Files $folder -Include *.msg | select -ExpandProperty fullname | ? {$_ -match '\.msg$'} } Write-Host ' 1: SUBJECT [A][FROM][DATE]' Write-Host ' 2: [DATE][FROM][A] SUBJECT' $format = $null while ($format -ne 1 -and $format -ne 2) { $format = Read-Host 'Choose a formatting option. [1]/2' if (!$format) { $format = 1 } } if ($format -eq 1) { $mails = $mails | ? {$_ -notmatch '\[.*\]\[[0-9]{4}-[0-9]{2}-[0-9]{2} [0-9]{2}\.[0-9]{2}\.[0-9]{2}\](?:-\d+)?\.msg$'} } else { $mails = $mails | ? {$_ -notmatch '\\\[[0-9]{4}-[0-9]{2}-[0-9]{2} [0-9]{2}\.[0-9]{2}\.[0-9]{2}\]\[.*\]'} } $Outlook = New-Object -ComObject Outlook.application $user = $Outlook.Session.CurrentUser.Name $drives = [io.driveinfo]::getdrives() | % {$_.name[0]} $alpha = [char[]](65..90) $avail = diff $drives $alpha | select -ExpandProperty inputobject $drive = $avail[0] + ':' $i = 1 $total = $mails.Count foreach ($mail in $mails) { $type = 1 $file = (Split-Path $mail -Leaf) -replace '\.msg$' $folder = Split-Path $mail if ($total -gt 1) { Write-Progress ` -Activity 'Processing...' ` -Status "($i of $total) [$('{0:N0}' -f (($i/$total)*100))%] FOLDER: $folder" ` -CurrentOperation "FILE: $file" ` -PercentComplete (($i/$total)*100) $i++ } $null = subst $drive /d $subst = $false if ($mail.length -gt 240) { $path = Split-Path $mail subst $drive $path $subst = $true rv path $mail = Join-Path $drive $(Split-Path $mail -Leaf) } try { $msg = $Outlook.CreateItemFromTemplate($mail) } catch { try { $type = 2 $text = $null $text = cmd /c "type `"$mail`" 2>&1" if ($text -match 'The system cannot find') { Throw 'Unable to process. Probably due to strange characters in the filename.' } 0..$($text.count-1) | % {$text[$_] = -join([string[]]$text[$_] | % {[char[]]$_} | ? {$_})} $subject = $null $subject = @($text | ? {$_ -match '(?:subject|emne): '})[0] -replace '^.*(?:subject|emne): ' $attachment = $false $attached = $text | ? {$_ -match 'X-MS-Has-Attach: yes'} if ($attached) { $attached = 'A' $attachment = $true } $from = $null $from = @($text | ? {$_ -match '(?:fra|from): '})[0] -replace '^.*(?:fra|from): ' $from = $from.Trim() if ($from -match '^\<') { $from = $from -replace '\<|\>' } elseif ($from -match '^\[') { $from = $from -replace '\[|\]' } elseif ($from -match '\[') { $from = $from -replace '^([^\[]+) \[.*$', '$1' -replace '"' } else { $from = $from -replace '^([^\<]+) <.*$', '$1' -replace '"' } $from = $from -replace '\s+$' $from = Remove-InvalidFileNameChars $from $from = ($from.split() | ? {$_}) -join ' ' $date = $null $date = ($text | ? {$_ -match 'date: '} | select -f 1) -replace '^.*date: ' try { $day = Get-Date $date -f yyyy-MM-dd $date = ($date -replace '^.*(\d\d:\d\d:\d\d).*$', '$1').Replace(':', '.') $date = "$day $date" } catch { $date = $null } if (!$date) { Write-Host "Date Error: $file" -ForegroundColor Red $(Get-Date -f yyyyMMdd_HHmmss) >> "$env:temp\MTFerror.txt" "filename: $mail" >> "$env:temp\MTFerror.txt" 'Could not get DATE information' >> "$env:temp\MTFerror.txt" '' >> "$env:temp\MTFerror.txt" } } catch { Write-Host "Skipping: $file" -ForegroundColor Yellow $(Get-Date -f yyyyMMdd_HHmmss) >> "$env:temp\MTFerror.txt" "filename: $mail" >> "$env:temp\MTFerror.txt" $error[0] >> "$env:temp\MTFerror.txt" '' >> "$env:temp\MTFerror.txt" if ($subst) { subst $drive /d } continue } } if ($type -eq 1) { $subject = Remove-InvalidFileNameChars $msg.Subject $attachment = $false try { $attached = $msg.Attachments | % {if ($_.filename) {$_.filename} elseif ($_.displayname -eq 'Picture (Device Independent Bitmap)') {'image000.jpg'} else {'?'}} } catch { Write-Host "Attachments Error: $file" -ForegroundColor Red $(Get-Date -f yyyyMMdd_HHmmss) >> "$env:temp\MTFerror.txt" "filename: $mail" >> "$env:temp\MTFerror.txt" "attached: $attached" >> "$env:temp\MTFerror.txt" $error[0] >> "$env:temp\MTFerror.txt" '' >> "$env:temp\MTFerror.txt" } if ($attached) { $attached = ($attached | % {if ($_ -match '^image[0-9]{3}.[a-zA-Z]{3,4}$') {'.img'} else {$_}} | % {if ($_ -match '\.') {$_.substring($_.lastindexof('.') + 1).ToLower()} else {'..'}} | ? {$_} | select -Unique | sort) -join ',' $attachment = $true } $from = $null $from = Remove-InvalidFileNameChars $msg.SenderName $date = $null $date = Get-Date $msg.SentOn -f 'yyyy-MM-dd HH.mm.ss' if (!$date) { Write-Host "Date Error: $file" -ForegroundColor Red $(Get-Date -f yyyyMMdd_HHmmss) >> "$env:temp\MTFerror.txt" "filename: $mail" >> "$env:temp\MTFerror.txt" 'Could not get DATE information' >> "$env:temp\MTFerror.txt" '' >> "$env:temp\MTFerror.txt" } } $null = $msg | % { while (Release-Ref $_) { Release-Ref $_ } } if ($format -eq 1) { $basename = '' $basename += "$subject " if ($attachment) { $basename += "[$attached]" } if ($to) { $basename += "[»$to][$date]" } else { $basename += "[$from][$date]" } } else { $basename = '' if ($to) { $basename += "[$date][»$to]" } else { $basename += "[$date][$from]" } if ($attachment) { $basename += "[$attached]" } $basename += " $subject" } $num = 1 $TargetPath = Split-Path $mail $ext = '.msg' $newname = Join-Path $TargetPath ($basename + $ext) while (Test-Path -LiteralPath $newname) { $newname = Join-Path $TargetPath $($basename + "-$num" + $ext) $num++ } rv TargetPath try { mv -LiteralPath $mail $newname } catch { Write-Host "Rename Error: $mail" -ForegroundColor Red $(Get-Date -f yyyyMMdd_HHmmss) >> "$env:temp\MTFerror.txt" "filename: $mail" >> "$env:temp\MTFerror.txt" "new name: $newname" >> "$env:temp\MTFerror.txt" $error[0] >> "$env:temp\MTFerror.txt" '' >> "$env:temp\MTFerror.txt" } if ($subst) { subst $drive /d } } $null = subst $drive /d $null = $Outlook | % { while (Release-Ref $_) { Release-Ref $_ } } Write-Host 'Done!' Read-Host 'Press Enter to continue...'
combined_dataset/train/non-malicious/sample_59_48.ps1
sample_59_48.ps1
#======================================================================================================================================================================= # Copyright (c) Microsoft Corporation. All rights reserved. # # Description: # # ModifyProxySettings.ps1 - To be used by the installer - Modify proxy settings # #======================================================================================================================================================================= <# .SYNOPSIS Modify proxy settings. .DESCRIPTION Modify proxy settings .EXAMPLE ModifyProxySettings.ps1 -Address <String> -Port <int> [-UserName <String>] [-Password <String>] .PARAMETER Address Address .PARAMETER Port Port .PARAMETER UserName UserName .PARAMETER Password Password #> param ( # PARAMETERS [Parameter(Mandatory=$true)] [string] $Address, [Parameter(Mandatory=$false)] [int] $Port, [Parameter(Mandatory=$false)] [string] $UserName, [Parameter(Mandatory=$false)] [string] $Password ) if ($UserName -and $UserName.Trim() -and $Password -and $Password.Trim()) { $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force $Creds = New-Object System.Management.Automation.PSCredential ($UserName, $SecurePassword) if ($Port -and $Port -gt 0) { Set-StorageSyncProxyConfiguration -Address $Address -Port $Port -ProxyCredential $Creds } else { Set-StorageSyncProxyConfiguration -Address $Address -ProxyCredential $Creds } } elseif ($Port -and $Port -gt 0) { Set-StorageSyncProxyConfiguration -Address $Address -Port $Port } else { Set-StorageSyncProxyConfiguration -Address $Address } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBa/kuTAExrOa4t # BjuDXZQtU7Hzj8FT7PG0g4tSNNdy4qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICgW+t+bkthqNbmEn8nF/k84 # sCDQ+c9qvK5KDk1UQEllMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmw1/2ybeMbZaUlIH6/SpcRVWjN/EK5F39oJ03IGsLix97ZXgdZw8hCvd # zuxFJCc7CexYglrF+YSJdMY4ufnMDqKMwiy//f4Z253/NQFbcIO1cBc+tek5QnuG # x28ugSiJA+38aSLUK1QpHv2U4PG8T0UY+l+ZKmeQ8ibvhuAQg7j5gCdFO1eZYNfH # +xNGdquxzUbFX79bWXv09p6+T3sloF+ShPKf8KB1eOZZ969fxuaEzT3D00jZnNEg # SNmG3UxmPK6sLinq9CsDGbspfeUmOYOds8FxRKDcTYehV6whW87X1ExlbB0FafZu # f3ZZ/MAxftNh/WH4/qyN5yZkajGCCaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAQ5vdPBhBFR19BbN1WW1SZnnGllp3CRHCXfNdQSEfQcwIGZlcd1yiA # GBMyMDI0MDUzMDIyMDUzNS4xMDJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoC7awwIhgPMjAyNDA1MzAyMDIxMDBaGA8yMDI0MDUzMTIwMjEwMFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6gLtrAIBADAHAgEAAgIV8jAHAgEAAgISIjAKAgUA # 6gQ/LAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFL7SWDWWYiQ3IfJ5eLQ # 3xqqplZ7hM7w7CV/Q4AslctMZG0hrFHJcN/JjkQfySiSS8AHtiYV4xxpgTpmRSmk # 9jxnSpKqgl+mAGziok0txXCv/WO4ouzJ+Y+n3Q46PSem2/mhvDC+SLPq2bbuIX7V # ZwtsbtNhku49PID/a7UEQntbMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQghPGfx3h6YOAjiKWbKFzqAPneKDEEutx7TtjC5e98yBAwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIL8ut4JIM7ZOdisEjpo9jCcJOSdtH/FbwLPX7QMh77oD # MA0GCSqGSIb3DQEBCwUABIICAGJOHTB9cCRAHdvpLMI7NewlZG2wt9CTmvkIbBA5 # Ja3CA2hfPd4/5aOFFK81IKPL/OA4ZezKpSUjvCNi2Uyb8xxjnw1TdDLVnYHBgL8R # m2E4pJwd2mZCtZd3AZQogZJaidD4N9+gcrSSSJXVfFRCjtZZIikREi/LOQzJAk7g # E47xFg1Nz2JMBQKkHhCHmGateDY/Uo9NLYOJeAXOx5oTJt6fD/Q/hPdUsVd1q6hs # vc5yw/3XAzhQ6upKG/1XXpmCdywmr3pitHp63Ynmzvg/U+mDTxgCPDy7dcOH/MYq # OpUdaeBIaFeJmsk60d39RbcXYVgL58w87UxFhyb2eQSmsrnnUBA4jXlnVD/BEFVo # f6ajezs6FnKVhe0HdPZ0RzfKHVw5OGNxAuIBa+SDNV1CCfOGPnIW8D6gvgydVxAS # clBcT4z6+6UeVfzbUQer9Q2aUKPmyGoFfWupayUVTr3xyyQCq1Imj0JcTMRGjJUS # Ms49RW1vVJwMFDCOCNnY+KeAYN4RLTRoDvTrnRihoHY4ExGVQpNzBWM7IZWgzk2k # KLlAh2OzZoWT3o5JvGQmrEdS7An7y01Ept9ql32VI1NqMrM/4NGVP7G2qmYDhyy5 # jx5x1UtGIQq50L+hW+Yw1hcjOxmdKKi0liJFM0woz1bs9tbXxz9Wl5D0FE58RxxG # 6cg9 # SIG # End signature block
combined_dataset/train/non-malicious/sample_23_16.ps1
sample_23_16.ps1
@{ GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59" Author = "PowerShell" CompanyName = "Microsoft Corporation" Copyright = "Copyright (c) Microsoft Corporation." ModuleVersion = "7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion = "3.0" CmdletsToExport = @( 'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml', 'Import-Clixml', 'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv', 'Import-Csv', 'Get-Culture', 'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger', 'Register-EngineEvent', 'Write-Error', 'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event', 'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression', 'Out-File', 'Get-FileHash', 'Export-FormatData', 'Get-FormatData', 'Update-FormatData', 'New-Guid', 'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host', 'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json', 'ConvertTo-Json', 'Test-Json', 'Format-List', 'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown', 'Show-Markdown', 'Get-MarkdownOption', 'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object', 'Measure-Object', 'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output', 'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint', 'Get-PSBreakpoint', 'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession', 'Import-PSSession', 'Get-Random', 'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace', 'Disable-RunspaceDebug', 'Enable-RunspaceDebug', 'Get-RunspaceDebug', 'Start-Sleep', 'Join-String', 'Out-String', 'Select-String', 'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan', 'Get-TraceSource', 'Set-TraceSource', 'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData', 'Get-UICulture', 'Get-Unique', 'Get-Uptime', 'Clear-Variable', 'Get-Variable', 'New-Variable', 'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose', 'Write-Warning', 'Invoke-WebRequest', 'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List', 'Unblock-File' ) FunctionsToExport = @() AliasesToExport = @('fhx') NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll") HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBDLy8cuBKbodtC # NmoItuifgQ/o9EygYihmiHbOdTTdE6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHbROJ5XEpIAi8a8uENwQoVd # lwSV4zcT+W3Q7IeGDPFUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArPtJOGTCI2ICkpeNDAHlXiCOF0D0SVlPH/ipbN09RXGAEYgraOIWZWPs # v26ypFIbOyHG9u9i56tDKyBVEc+p0AQwEpaJK6cwnKkWxyszCC8fzuGcB27497pG # Lz4GjAfQ2t47JWcQtIBPEYcrrXR4WGTUXSrn2HeEhj2ZYl5YVVARQ+IyJlKYrhL+ # 9sCszWn3CeiHPHYMBYXpLOPdByafn3BB26AqyuxAzHuHPJon3k8W2pcezZBZM5ZF # flXQ3qWTj2A4HjbPjHOr5X0PRaHCzenAb5pyf2HjCEpa9i6wZgK7l50tnpUFDvkM # xh+ntRNwgGSCtHgxJaPpuHoyDbZFXaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCANIGNoOx/3rpmYWM5t6fFwl/zOEGmeeCboC2qF8ohDQgIGZfxw4dvF # GBMyMDI0MDQwOTIzMDY0Mi4wMjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOm/UNswIhgPMjAyNDA0MDkxMzMwMDNaGA8yMDI0MDQxMDEzMzAwM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6b9Q2wIBADAHAgEAAgIafjAHAgEAAgIRMzAKAgUA # 6cCiWwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAF1TLo09RllJVBPdJAmY # hDxMj4u4iKFfvBfxZ5CdZ0cZT2ecwVvGjvsitRLgMp24VNJjfO0krTY2lI5tIGv9 # 5MgYhVcaaSiQ3zq7UZfYXNKkHbFk/zmz3ds/Tb1uKnxjFxxyOMsKsC2rwCXgTIYp # crItCpqbnJClYmSe6q/zgV6bMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgKP6+Id+/KUjOJs806otjh7xD1f4K+02EMfP7f7MGgAkwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIGp7S/NCvSBFp5jvm90RMPGYMAgx20Oc3b9Hsk0n2AWM # MA0GCSqGSIb3DQEBCwUABIICACyVbLk+T3LEuIX/p2j/Ub7MtvypfPT6xSelb8Cd # 6DUr2Ljq8yFKKN/iPwJM5ZXCsGTQ42cu9CVtLNonSzd5/c9to6IKu64Nqbc+1wJB # 0Hr8UQNgaSFyznX8xpHcgZYMmduUS8gaUBM6bipvXbPpcsuciK8AJiLzEFqN5HEU # ribRS4kf6FnmewienFyJTcM6SpFi7TgkeHVE4V+JgqdfcrYthVBig6O+kqutqCIo # seGXRYOfLVlXc056fxJGzeCYeoZ5gNQQmIstcVvfsFxF6mE48aGPLXZfSXvKf2LY # QNvB4mteltaCQB2PsQdqZI56jLN130651pw4HT5kfSoNydcpLt+Exh1WR4MuWn3w # lC5P8Cmm1hisqY2UA+exfI0Yzj2Utt6nzcQLWkXkHKBhJoWfuuLxNzn7AZNAeXQw # eBjjYrbURmFCH+l+ExaM7C5oWNiXuBbfKyRDCR0JqLUQ7WkSHzLS6mtEoAewbfhd # F6BvqJEgk6LTz7kaaj6tn1jVC1dCe+D18d9MbE/7ZddBbRm25aFLYdoWNv9k1aAV # CrwJFtL4kYUWCVoM/eRr7gsfkJKO1QXssCugWmtpDeTLXTByWj5hk9y3MtvVXf3B # sfmMMYoBFbMCtShNrphVnZwZUW2vkdqtN+8Zd/jGmuuhss9CWeOZLqs/9080rnWQ # pykb # SIG # End signature block
combined_dataset/train/non-malicious/1452.ps1
1452.ps1
function Set-CIisWindowsAuthentication { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [string] $SiteName, [Alias('Path')] [string] $VirtualPath = '', [Switch] $DisableKernelMode ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $useKernelMode = 'True' if( $DisableKernelMode ) { $useKernelMode = 'False' } $authSettings = Get-CIisSecurityAuthentication -SiteName $SiteName -VirtualPath $VirtualPath -Windows $authSettings.SetAttributeValue( 'useKernelMode', $useKernelMode ) $fullPath = Join-CIisVirtualPath $SiteName $VirtualPath if( $pscmdlet.ShouldProcess( $fullPath, "set Windows authentication" ) ) { $authSettings.CommitChanges() } }
combined_dataset/train/non-malicious/sample_14_0.ps1
sample_14_0.ps1
# # Module manifest for module 'Microsoft.Online.SharePoint.PowerShell' # # Generated by: Microsoft Corportation # # Generated on: 8/29/2011 # @{ # Script module or binary module file associated with this manifest ModuleToProcess = 'Microsoft.Online.SharePoint.PowerShell.dll' # Version number of this module. ModuleVersion = '16.0.24614.0' # ID used to uniquely identify this module GUID = 'adedde5f-e77b-4682-ab3d-a4cb4ff79b83' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft SharePoint Online Services Module for Windows PowerShell' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '2.0' # Name of the Windows PowerShell host required by this module PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module PowerShellHostVersion = '' # Minimum version of the .NET Framework required by this module DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module CLRVersion = '4.0' # Processor architecture (None, X86, Amd64, IA64) required by this module ProcessorArchitecture = 'None' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = @('Microsoft.Online.SharePoint.PowerShell.ps1xml') # Modules to import as nested modules of the module specified in ModuleToProcess NestedModules = @() # Functions to export from this module FunctionsToExport = '*' # Cmdlets to export from this module CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module AliasesToExport = '*' # List of all modules packaged with this module ModuleList = @() # List of all files packaged with this module FileList = @() # Private data to pass to the module specified in ModuleToProcess PrivateData = '' }
combined_dataset/train/non-malicious/sample_26_3.ps1
sample_26_3.ps1
# Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. @{ RootModule = './Microsoft.PowerShell.PSResourceGet.dll' NestedModules = @('./Microsoft.PowerShell.PSResourceGet.psm1') ModuleVersion = '1.0.5' CompatiblePSEditions = @('Core', 'Desktop') GUID = 'e4e0bda1-0703-44a5-b70d-8fe704cd0643' Author = 'Microsoft Corporation' CompanyName = 'Microsoft Corporation' Copyright = '(c) Microsoft Corporation. All rights reserved.' Description = 'PowerShell module with commands for discovering, installing, updating and publishing the PowerShell artifacts like Modules, Scripts, and DSC Resources.' PowerShellVersion = '5.1' DotNetFrameworkVersion = '2.0' CLRVersion = '4.0.0' FormatsToProcess = 'PSGet.Format.ps1xml' CmdletsToExport = @( 'Find-PSResource', 'Get-InstalledPSResource', 'Get-PSResourceRepository', 'Get-PSScriptFileInfo', 'Install-PSResource', 'Register-PSResourceRepository', 'Save-PSResource', 'Set-PSResourceRepository', 'New-PSScriptFileInfo', 'Test-PSScriptFileInfo', 'Update-PSScriptFileInfo', 'Publish-PSResource', 'Uninstall-PSResource', 'Unregister-PSResourceRepository', 'Update-PSModuleManifest', 'Update-PSResource' ) FunctionsToExport = @( 'Import-PSGetRepository' ) VariablesToExport = 'PSGetPath' AliasesToExport = @( 'Get-PSResource', 'fdres', 'isres', 'pbres', 'udres') PrivateData = @{ PSData = @{ #Prerelease = '' Tags = @('PackageManagement', 'PSEdition_Desktop', 'PSEdition_Core', 'Linux', 'Mac', 'Windows') ProjectUri = 'https://go.microsoft.com/fwlink/?LinkId=828955' LicenseUri = 'https://go.microsoft.com/fwlink/?LinkId=829061' ReleaseNotes = @' ## 1.0.5 ### Bug Fixes - Update `nuget.config` to use PowerShell packages feed (#1649) - Refactor V2ServerAPICalls and NuGetServerAPICalls to use object-oriented query/filter builder (#1645 Thanks @sean-r-williams!) - Fix unnecessary `and` for version globbing in V2ServerAPICalls (#1644 Thanks again @sean-r-williams!) - Fix requiring `tags` in server response (#1627 Thanks @evelyn-bi!) - Add 10 minute timeout to HTTPClient (#1626) - Fix save script without `-IncludeXml` (#1609, #1614 Thanks @o-l-a-v!) - PAT token fix to translate into HttpClient 'Basic Authorization'(#1599 Thanks @gerryleys!) - Fix incorrect request url when installing from ADO (#1597 Thanks @antonyoni!) - Improved exception handling (#1569) - Ensure that .NET methods are not called in order to enable use in Constrained Language Mode (#1564) ## 1.0.4.1 - PSResourceGet packaging update ## 1.0.4 ### Patch - Dependency package updates ## 1.0.3 ### Bug Fixes - Bug fix for null package version in `Install-PSResource` ## 1.0.2 ### Bug Fixes - Bug fix for `Update-PSResource` not updating from correct repository (#1549) - Bug fix for creating temp home directory on Unix (#1544) - Bug fix for creating `InstalledScriptInfos` directory when it does not exist (#1542) - Bug fix for `Update-ModuleManifest` throwing null pointer exception (#1538) - Bug fix for `name` property not populating in `PSResourceInfo` object when using `Find-PSResource` with JFrog Artifactory (#1535) - Bug fix for incorrect configuration of requests to JFrog Artifactory v2 endpoints (#1533 Thanks @sean-r-williams!) - Bug fix for determining JFrog Artifactory repositories (#1532 Thanks @sean-r-williams!) - Bug fix for v2 server repositories incorrectly adding script endpoint (1526) - Bug fixes for null references (#1525) - Typo fixes in message prompts in `Install-PSResource` (#1510 Thanks @NextGData!) - Bug fix to add `NormalizedVersion` property to `AdditionalMetadata` only when it exists (#1503 Thanks @sean-r-williams!) - Bug fix to verify whether `Uri` is a UNC path and set respective `ApiVersion` (#1479 Thanks @kborowinski!) ## 1.0.1 ### Bug Fixes - Bugfix to update Unix local user installation paths to be compatible with .NET 7 and .NET 8 (#1464) - Bugfix for Import-PSGetRepository in Windows PowerShell (#1460) - Bugfix for Test-PSScriptFileInfo to be less sensitive to whitespace (#1457) - Bugfix to overwrite rels/rels directory on net472 when extracting nupkg to directory (#1456) - Bugfix to add pipeline by property name support for Name and Repository properties for Find-PSResource (#1451 Thanks @ThomasNieto!) ## 1.0.0 ### New Features - Add `ApiVersion` parameter for `Register-PSResourceRepository` (#1431) ### Bug Fixes - Automatically set the ApiVersion to v2 for repositories imported from PowerShellGet (#1430) - Bug fix ADO v2 feed installation failures (#1429) - Bug fix Artifactory v2 endpoint failures (#1428) - Bug fix Artifactory v3 endpoint failures (#1427) - Bug fix `-RequiredResource` silent failures (#1426) - Bug fix for v2 repository returning extra packages for `-Tag` based search with `-Prerelease` (#1405) See change log (CHANGELOG.md) at https://github.com/PowerShell/PSResourceGet '@ } } HelpInfoUri = 'https://go.microsoft.com/fwlink/?linkid=2238183' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaRt0JRuafuHSl # quTM7RULMmz/vkSRGaBQpt407H5g0aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGKWYQUyIIPNiiVJOUpQCSKm # 4CzUD0uhA4RF7MjRYWTqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJ4ZNF+p39V+jVmzbK9wUvDK35RG1n6aXTJX6tVDw0sXKZNkh9Mckgd3u # uOg1sbhHaf7OEq553ovJZwDxFhn1fHDYG1fxZhsoW5JwjFYbD0cGYLRrIjt6eK3Q # EycWdAa4SCAOz83iW2kdVqZL7MamD6jE4oFR+nW7dsWOgdhmC4vDlKimqGA6Yw9y # 3HRCC/jGHAwt3h6yfxb1mrE5zxXkf/ZRWaL6d1aJSWg6yR8ru9pS5rn/bVYCChEF # /95xWO7HLCdAS1GDBGrJpyS32NM3wYVBVVS7BC45Yl2csRpaddETZgZEMyBEhlV1 # ashddT2944QBDjPaXViZa30BHxHrc6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBtTAqWWm6uTP4ua1JaubXlYgMIIMJH2WCUBvP53WJl5wIGZjOaMlKx # GBMyMDI0MDUxMzIwMjY0OS4xNjNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6eyYqjAiGA8yMDI0MDUxMzEzNDgy # NloYDzIwMjQwNTE0MTM0ODI2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7Jiq # AgEAMAoCAQACAip8AgH/MAcCAQACAhLRMAoCBQDp7eoqAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAFV83n257B5XQ5kpeJHyZ/LbMBmS+DNPxlc96vcHN55d # Pn+i+2J7EkdnXU2Jp+4FqrEDyUs9wh85MfuBj/VLiaRAXO2iarPqDMI9zdRZGhJF # CfpdmIQJpIvrWLPrFrvcRdIIkzQqWyVV3CiPVL/pTRO5d7I0XbAgcdiUVRjjCm33 # 4XECRW802EmGVJZsZyCNLtrfY35MNKzf1dziZsbkJdAs3rBOT5ZVq+TDGPHigJtu # op4psXb/joREPsWhgv1UQBYRg3VoRula4IYODGoxEpI4n0Nxwsn0shUo8TwKDXLQ # gHaQNAvhz+cb5LZNPfe4Rt28KYX4TmjPg9TiQ4zcEkgxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBEm0bWoJVsyzxC/fryVUnGdK0w9yhb0chSXqPCpjmK # MTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgFi1eRWCNMF757qhcrue/+RCb # CfoEq2oN3sYTyrkw5q0wDQYJKoZIhvcNAQELBQAEggIAWt/MZp5XYi4uRIoRcZis # XOHVmKPrNQ+QKZr6INC4HXBg+TT2h0zdnq7aCyHi+OAIgrEq1LyPvcWeuxok0Ux2 # +CDrF/t9hRmHOhIxE66K8Fdgg9XFVrsLgEBobPu/CRWlSXL8KGxw8mk38Tl+jtJo # QIUUwTIwwwTFvRxLjPmHyO2Er8f5KRsktftTQE0uKAKdSbGlNaE/jryvCqgUTxfq # fsA2PWZp7dfgB3Ra+F6KKVJVlJtfxm6wCF8Fk+uMBPD022jOYltQgaxuF36kbvil # rNt/tCpU/yJ/TIUXjG+SmWkvSFdoQ6IiRosCTqX8oQePXvJyp1w+3UqGM6fv1BX8 # iByIUUNq+dIh+zyxzIZ2f+kA1E6KfIYBtQboG8x3dZRA8Mz3k0Trjs9o29y1qW7A # APGYhEw+++uZU9hg9KXMLFRlQDtoi6iHJ7Yiu73IqQo5LbzMfHM5zjHqWhzoDz/S # TpMdC2L6Fm80Q46q67weD+/a22XPE/nE14gIJIhUWXz/CObbI3DY1v0HJiiL2yeO # iW6+fVcvHwtanauvcQiM70ajIsWQAfuGgp0URO3tDg4NGHCpEw7qGSXpSOCpSyma # N8fqNVl0MybIzQ5xzORZJ1JHABWSbSgprv8SamuU2VkFI/BWtkbtTSvbamO7nWgp # 4bkyayFKz/kq52kdY32DGDE= # SIG # End signature block
combined_dataset/train/non-malicious/Get-ImageMetaData.ps1
Get-ImageMetaData.ps1
## Get-ImageMetaData -- pull EXIF, XMP, and other data from images using the BitmapMetaData ## Usage: ls *.jpg | Get-ImageMetaData | ft Length, LastWriteTime, Name, "36867" ## Note that '36867' is the decimal value of (0x9003) the EXIF tag for DateTimeOriginal ## For more information see: http://owl.phy.queensu.ca/~phil/exiftool/TagNames/EXIF.html ##################################################################################################### ## History: ## - v1.0 - First release, retrieves all the data and stacks it somehow onto a FileInfo object ##################################################################################################### # filter Get-ImageMetadata { PARAM($file) BEGIN { $null = [Reflection.Assembly]::LoadWithPartialName("PresentationCore"); function Get-ImageMetadata { PARAM([System.Windows.Media.Imaging.BitmapFrame]$bitmapFrame, [string]$path) PROCESS { if($path -is [string]) { ## To read metadata, you use GetQuery. To write metadata, you use SetQuery ## To WRITE metadata, you need a writer, ## but first you have to open the file ReadWrite, instead of Read only # $writer = $bitmapFrame.CreateInPlaceBitmapMetadataWriter(); # if ($writer.TrySave()){ # $writer.SetQuery("/tEXt/{str=Description}", "Have a nice day."); # } else { # Write-Host "Couldn't save data" -Fore Red # } $next=$bitmapFrame.MetaData.GetQuery($path); if($next.Location){ $next | ForEach-Object { Get-ImageMetadata $bitmapFrame "$($next.Location)$_" } } else { if($path.Split("/")[-1] -match "{ushort=(?<code>\\d+)}") { # $path = "0x{0:X}" -f [int]$matches["code"] $path = [int]$matches["code"] } Add-Member -in ($Global:ImageMetaData) -Type NoteProperty -Name $path -value $next -Force # @{$path=$next} } } else { $bitmapFrame.Metadata | ForEach-Object { Get-ImageMetadata $bitmapFrame $_ } } } } } PROCESS { if($_) { $file = $_ } if($file -is [IO.FileInfo]) { $file = [string]$file.FullName; } elseif($file -is [String]) { $file = [string](Resolve-Path $file) } $Global:ImageMetaData = New-Object IO.FileInfo $file $stream = new-object IO.FileStream $file, ([IO.FileMode]::Open), ([IO.FileAccess]::Read), ([IO.FileShare]::Read); & { $decoder = [System.Windows.Media.Imaging.BitmapDecoder]::Create( $stream, "None", "Default" ) $bitmapFrame = $decoder.Frames[0]; $bitmapFrame.Metadata | ForEach-Object { Get-ImageMetadata $bitmapFrame $_ } } trap { Write-Error "WARNING: $_" continue; } $stream.Close() $stream.Dispose() Write-Output $Global:ImageMetaData }
combined_dataset/train/non-malicious/Object ProxyAddress Scan.ps1
Object ProxyAddress Scan.ps1
Param ( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, HelpMessage="Enter SMTP address to search for in Active-Directory." )] [string]$objSMTP ) Function Get-ProxyAddresses ([string]$Address){ $objAD = $null $objAD = Get-QADObject -LdapFilter "(proxyAddresses=*$Address*)" -IncludeAllProperties -SizeLimit 0 -ErrorAction SilentlyContinue Write-Output $objAD }#Close Function #Validate Quest PSSnapin is loaded Add-PSSnapin -Name Quest.ActiveRoles.ADManagement -ErrorAction SilentlyContinue #Run Function to search AD for SMTP address $Results = $null $Results = Get-ProxyAddresses -Address $objSMTP | Select-Object Name,DisplayName,ObjectClass,Email,AccountisDisabled,AccountisLockedOut,MailNickName,LegacyExchangeDN -ErrorAction SilentlyContinue IF($Results -eq $null){ Write-Host "" Write-Host "No Object Found with .attribute[proxyAddress] containing $objSMTP."} Else{$Results | Format-List *} #End
combined_dataset/train/non-malicious/sample_65_2.ps1
sample_65_2.ps1
#======================================================================================================================================================================= # Copyright (c) Microsoft Corporation. All rights reserved. # # Description: # RemoveMDS.ps1 # Kill all Monitoring processes and clean up trace logs. #======================================================================================================================================================================= param( [Parameter(Mandatory=$true)] [string]$MDSFolder ) function Start-ProcessAndPipeOutput { param ( [string]$commandPath, [string]$commandArguments ) Write-Output ">>>>Executing commmand '$commandPath' with arguments '$commandArguments'" $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = $commandPath $pinfo.RedirectStandardError = $true $pinfo.RedirectStandardOutput = $true $pinfo.UseShellExecute = $false $pinfo.Arguments = $commandArguments $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null $p.WaitForExit() Write-Output ">>>>Command completed with exit code '$($p.ExitCode)'" Write-Output ">>>>Output stream: " Write-Output "$($p.StandardOutput.ReadToEnd())" Write-Output ">>>>Error stream: " Write-Output "$($p.StandardError.ReadToEnd())" } # Execution of the script begins here: $Error.Clear() $timestamp = Get-Date -UFormat "%Y%m%d-%H%M%S" $transcriptPath = Join-Path $env:TEMP "StorageSyncAgent-RemoveMDS-$timestamp.log" Start-Transcript -Path $transcriptPath try { Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentLauncher.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentHost.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentManager.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentCore.exe /T' } catch { Write-Output "Exception occured while attempting to kill Monitoring Agent processes: $_" Write-Output "Ignoring failures while killing Monitoring Agent processes and proceeding with the script" } $Error.Clear() # Stop and Delete Logman trace sessions to cleanup logs. $logmanCleanupScriptBlock = { # Clean up UserMode traces. Write-Output "Stopping session AfsUserModeTraceSession" cmd /c "logman -stop -as AfsUserModeTraceSession" Write-Output "`nDeleting session AfsUserModeTraceSession" cmd /c "logman -delete AfsUserModeTraceSession" # Clean up KernelMode traces. Write-Output "Stopping session AfsKernelModeTraceSession" cmd /c "logman -stop -as AfsKernelModeTraceSession" Write-Output "`nDeleting session AfsKernelModeTraceSession" cmd /c "logman -delete AfsKernelModeTraceSession" } # Starting the cleanup job. $logmanCleanupJob = Start-Job -ScriptBlock $logmanCleanupScriptBlock # Waiting for job execution. Wait-Job -Job $logmanCleanupJob -Timeout 120 # Receiving the job to see script output. Wait-Job does not show output. $logmanCleanupResultJob = Receive-Job $logmanCleanupJob foreach ($output in $logmanCleanupResultJob) { Write-Host $output } $Error.Clear() # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAmhh//P+aR9tqU # GqG65pyqv85kXFfu1CLo0XqKASYgzaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICx/wnN+pbv9QKpdvUDC4Jmg # I77ScrZZjb26BA9xa51EMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAXFnMB0cLclLk1LyXCdjGlXj/rPwu5xbPCGvzEQkuVl+cY+cLV1CvQkzP # xewK5OUVrqnJQtB+vwC39vZL13CmZzuQwFcvemu+8R6dXWOw/EFb9TB5zs/ms1ZR # ybyuJI4EWiinE5wtH3AlxagwAe6FUmOn72306PrCOBNBTvmAyvw+UViT0dDnQMhM # PHTgYFWH0BFirk9YBzQgE6n+F/UVR1Qg48KZrHUqkZU8Cb3t9qcR3o0qRBZMZUdx # nZ4V8z9jsQ3dkE5XbYbhNIT4PzxNXu6JPtuETqRzhASnvUm9aeNY/KTZ41gtX2QB # 9ibSiMdyoDG6UEn7y4nW85kd2uOaKaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCGlFaPPH+CG/PxM6S1ZO2TVYURz4HV2Mzjyd3VWlJn2gIGZldccLKA # GBMyMDI0MDUzMDIwMzA0MS44NDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoCg4wwIhgPMjAyNDA1MzAxMjQ4MTJaGA8yMDI0MDUzMTEyNDgxMlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6gKDjAIBADAHAgEAAgIG5jAHAgEAAgIRZzAKAgUA # 6gPVDAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAIaObFbBvT9hsT4w7dgR # NRIgOI3C5bS4qqS2zPDEPoMOob/8t/hM4lyMarP448zagxk4my/XXKezS/qHOd8a # wMV7oyyX8jOOSXZp2ifWFMeKJAQdJbgQpvJLIIydfmiQ6ploVviOBzql2DaVlAx/ # 44h3Uu3yo+/h2MP/Ge3trTqSMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgX9yymyA3eHHGGLyVY/fjljWuBT5YDbxy3Seaodo91hEwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIGa3ha1M1jwOy65xJyCuABsY09i04yb3k9Nlmm+6uvi6 # MA0GCSqGSIb3DQEBCwUABIICAANbev+RxsSQgKV0COEtX4zeqRSZ98zP492ONnuX # vrqG1uRegbWO8gEeIk1p79niBBtGfpDQll2c+PXAa9tYLWesCD35CxzTH4bTIVTC # b4xHTt1o02g1y5xaOkOEhh+LyH54Tsspf8oSUBG3MPdwvLEN9jx2ItAhaw4zjZpF # pQoA3Sg0s74ToAvjgOfS+8Lgzdf0HiT2DkmnStNqx3KTD4HqqM0DBtBPI2zHGeIR # QNvcXgv3mN2XL5KdHyooo+rUAUR2gA/LPm3LEMgJh5+yZmu+Z43MbMAcsmT7H9+b # X7AbhWV1l1kzgSq/YYCumuHH91RzO6/Li3z9DLfM/Hmhs4e5MTB/zMvRS3gfLEqB # 2coI9Dyp+OUnsbeTQmjRWP/Sh+DUxj+IaEUy3oq0t9xKYmm5mc2KeWAVFn92DOzE # TInW6yyU25htzJsgRN5li47bIfRwhh82OG6TxYhm/RuWY/aa1mEly2MSLIsEGgn5 # u0Bg4S7lEVTOHo3Q7e98YZbyWf0r9XiNAaQ8Uzl4J3/hTQJGs+NqotzT5wkCmhdA # o4gwNmLtHouDEqjwGA11zaFe27smISdVcikC6ml9EVaTW8Mi/6FQT9wtbV3qXuEw # ainUx61AcoN7CNXmVTlD2jqPBDCz1328628rZKbcLRdAmtBPSEYy9+plmTyXUn0X # G/ax # SIG # End signature block
combined_dataset/train/non-malicious/561.ps1
561.ps1
function Connect-SPO { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string]$siteURL, [Parameter(Mandatory=$false, Position=2)] [bool]$online, [Parameter(Mandatory=$false, Position=3)] [string]$username, [Parameter(Mandatory=$false, Position=4)] [string]$password ) Write-Host "Loading the CSOM library" -foregroundcolor black -backgroundcolor yellow [Reflection.Assembly]::LoadFrom((Get-ChildItem -Path $PSlib.Path -Filter "Microsoft.SharePoint.Client.dll" -Recurse).FullName) Write-Host "Succesfully loaded the CSOM library" -foregroundcolor black -backgroundcolor green Write-Host "Create client context for site $siteUrl" -foregroundcolor black -backgroundcolor yellow $SPOContext = New-Object Microsoft.SharePoint.Client.ClientContext($siteURL) $SPOContext.RequestTimeOut = 1000 * 60 * 10; if ($online) { Write-Host "Setting SharePoint Online credentials" -foregroundcolor black -backgroundcolor yellow $SPOContext.AuthenticationMode = [Microsoft.SharePoint.Client.ClientAuthenticationMode]::Default $securePassword = ConvertTo-SecureString $password -AsPlainText -Force $credentials = New-Object Microsoft.SharePoint.Client.SharePointOnlineCredentials($username, $securePassword) $SPOContext.Credentials = $credentials } Write-Host "Check connection" -foregroundcolor black -backgroundcolor yellow $web = $SPOContext.Web $site = $SPOContext.Site $SPOContext.Load($web) $SPOContext.Load($site) $SPOContext.ExecuteQuery() Set-Variable -Name "clientContext" -Value $SPOContext -Scope Global Set-Variable -Name "rootSiteUrl" -Value $siteURL -Scope Global Write-Host "Succesfully connected" -foregroundcolor black -backgroundcolor green }
combined_dataset/train/non-malicious/517.ps1
517.ps1
function Get-SPList{ param( [Parameter(Mandatory=$true)] [String[]]$Url ) if(-not (Get-PSSnapin "Microsoft.SharePoint.PowerShell" -ErrorAction SilentlyContinue)){Add-PSSnapin "Microsoft.SharePoint.PowerShell"} $Url | %{ Get-SPUrl $_ | %{ $ListName = ([Uri]$_.Url).LocalPath -replace ".*/","" Get-SPWeb $_.WebUrl | %{ $_.Lists | where{$_.Title -eq $ListName} } } } }
combined_dataset/train/non-malicious/sample_45_25.ps1
sample_45_25.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # # This PS DSC resource enables installing a package. The resource uses Install-Package cmdlet # to install the package from various providers/sources. Import-LocalizedData -BindingVariable LocalizedData -filename MSFT_PackageManagement.strings.psd1 Import-Module -Name "$PSScriptRoot\..\PackageManagementDscUtilities.psm1" function Get-TargetResource { <# .SYNOPSIS This DSC resource provides a mechanism to download and install packages on a computer. Get-TargetResource returns the current state of the resource. .PARAMETER Name Specifies the name of the Package to be installed or uninstalled. .PARAMETER Source Specifies the name of the package source where the package can be found. This can either be a URI or a source registered with Register-PackageSource cmdlet. The DSC resource MSFT_PackageManagementSource can also register a package source. .PARAMETER RequiredVersion Specifies the exact version of the package that you want to install. If you do not specify this parameter, this DSC resource installs the newest available version of the package that also satisfies any maximum version specified by the MaximumVersion parameter. .PARAMETER MaximumVersion Specifies the maximum allowed version of the package that you want to install. If you do not specify this parameter, this DSC resource installs the highest-numbered available version of the package. .PARAMETER MinimumVersion Specifies the minimum allowed version of the package that you want to install. If you do not add this parameter, this DSC resource intalls the highest available version of the package that also satisfies any maximum specified version specified by the MaximumVersion parameter. .PARAMETER SourceCredential Specifies a user account that has rights to install a package for a specified package provider or source. .PARAMETER ProviderName Specifies a package provider name to which to scope your package search. You can get package provider names by running the Get-PackageProvider cmdlet. .PARAMETER AdditionalParameters Provider specific parameters that are passed as an Hashtable. For example, for NuGet provider you can pass additional parameters like DestinationPath. #> [CmdletBinding()] [OutputType([System.Collections.Hashtable])] param ( [Parameter(Mandatory = $true)] [System.String] $Name, [Parameter()] [System.String] $RequiredVersion, [Parameter()] [System.String] $MinimumVersion, [Parameter()] [System.String] $MaximumVersion, [Parameter()] [System.String] $Source, [Parameter()] [PSCredential] $SourceCredential, [Parameter()] [System.String] $ProviderName, [Parameter()] [Microsoft.Management.Infrastructure.CimInstance[]]$AdditionalParameters ) $ensure = "Absent" $null = $PSBoundParameters.Remove("Source") $null = $PSBoundParameters.Remove("SourceCredential") if ($AdditionalParameters) { foreach($instance in $AdditionalParameters) { Write-Verbose ('AdditionalParameter: {0}, AdditionalParameterValue: {1}' -f $instance.Key, $instance.Value) $null = $PSBoundParameters.Add($instance.Key, $instance.Value) } } $null = $PSBoundParameters.Remove("AdditionalParameters") $verboseMessage =$localizedData.StartGetPackage -f (GetMessageFromParameterDictionary $PSBoundParameters),$env:PSModulePath Write-Verbose -Message $verboseMessage $result = PackageManagement\Get-Package @PSBoundParameters -ErrorAction SilentlyContinue -WarningAction SilentlyContinue if ($result.count -eq 1) { Write-Verbose -Message ($localizedData.PackageFound -f $Name) $ensure = "Present" } elseif ($result.count -gt 1) { Write-Verbose -Message ($localizedData.MultiplePackagesFound -f $Name) $ensure = "Present" } else { Write-Verbose -Message ($localizedData.PackageNotFound -f $($Name)) } Write-Debug -Message "Source $($Name) is $($ensure)" if ($ensure -eq 'Absent') { return @{ Ensure = $ensure Name = $Name ProviderName = $ProviderName RequiredVersion = $RequiredVersion MinimumVersion = $MinimumVersion MaximumVersion = $MaximumVersion } } else { if ($result.Count -gt 1) { $result = $result[0] } return @{ Ensure = $ensure Name = $result.Name ProviderName = $result.ProviderName Source = $result.source RequiredVersion = $result.Version } } } function Test-TargetResource { <# .SYNOPSIS This DSC resource provides a mechanism to download and install packages on a computer. Test-TargetResource returns a boolean which determines whether the resource is in desired state or not. .PARAMETER Name Specifies the name of the Package to be installed or uninstalled. .PARAMETER Source Specifies the name of the package source where the package can be found. This can either be a URI or a source registered with Register-PackageSource cmdlet. The DSC resource MSFT_PackageManagementSource can also register a package source. .PARAMETER RequiredVersion Specifies the exact version of the package that you want to install. If you do not specify this parameter, this DSC resource installs the newest available version of the package that also satisfies any maximum version specified by the MaximumVersion parameter. .PARAMETER MaximumVersion Specifies the maximum allowed version of the package that you want to install. If you do not specify this parameter, this DSC resource installs the highest-numbered available version of the package. .PARAMETER MinimumVersion Specifies the minimum allowed version of the package that you want to install. If you do not add this parameter, this DSC resource intalls the highest available version of the package that also satisfies any maximum specified version specified by the MaximumVersion parameter. .PARAMETER SourceCredential Specifies a user account that has rights to install a package for a specified package provider or source. .PARAMETER ProviderName Specifies a package provider name to which to scope your package search. You can get package provider names by running the Get-PackageProvider cmdlet. .PARAMETER AdditionalParameters Provider specific parameters that are passed as an Hashtable. For example, for NuGet provider you can pass additional parameters like DestinationPath. #> [CmdletBinding()] [OutputType([bool])] param ( [Parameter(Mandatory = $true)] [System.String] $Name, [Parameter()] [System.String] $RequiredVersion, [Parameter()] [System.String] $MinimumVersion, [Parameter()] [System.String] $MaximumVersion, [Parameter()] [System.String] $Source, [Parameter()] [PSCredential] $SourceCredential, [ValidateSet("Present","Absent")] [System.String] $Ensure="Present", [Parameter()] [System.String] $ProviderName, [Parameter()] [Microsoft.Management.Infrastructure.CimInstance[]]$AdditionalParameters ) Write-Verbose -Message ($localizedData.StartTestPackage -f (GetMessageFromParameterDictionary $PSBoundParameters)) $null = $PSBoundParameters.Remove("Ensure") $temp = Get-TargetResource @PSBoundParameters if ($temp.Ensure -eq $ensure) { Write-Verbose -Message ($localizedData.InDesiredState -f $Name, $Ensure, $temp.Ensure) return $True } else { Write-Verbose -Message ($localizedData.NotInDesiredState -f $Name,$ensure,$temp.ensure) return [bool] $False } } function Set-TargetResource { <# .SYNOPSIS This DSC resource provides a mechanism to download and install packages on a computer. Set-TargetResource either intalls or uninstall a package as defined by the vaule of Ensure parameter. .PARAMETER Name Specifies the name of the Package to be installed or uninstalled. .PARAMETER Source Specifies the name of the package source where the package can be found. This can either be a URI or a source registered with Register-PackageSource cmdlet. The DSC resource MSFT_PackageManagementSource can also register a package source. .PARAMETER RequiredVersion Specifies the exact version of the package that you want to install. If you do not specify this parameter, this DSC resource installs the newest available version of the package that also satisfies any maximum version specified by the MaximumVersion parameter. .PARAMETER MaximumVersion Specifies the maximum allowed version of the package that you want to install. If you do not specify this parameter, this DSC resource installs the highest-numbered available version of the package. .PARAMETER MinimumVersion Specifies the minimum allowed version of the package that you want to install. If you do not add this parameter, this DSC resource intalls the highest available version of the package that also satisfies any maximum specified version specified by the MaximumVersion parameter. .PARAMETER SourceCredential Specifies a user account that has rights to install a package for a specified package provider or source. .PARAMETER ProviderName Specifies a package provider name to which to scope your package search. You can get package provider names by running the Get-PackageProvider cmdlet. .PARAMETER AdditionalParameters Provider specific parameters that are passed as an Hashtable. For example, for NuGet provider you can pass additional parameters like DestinationPath. #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.String] $Name, [Parameter()] [System.String] $RequiredVersion, [Parameter()] [System.String] $MinimumVersion, [Parameter()] [System.String] $MaximumVersion, [Parameter()] [System.String] $Source, [Parameter()] [PSCredential] $SourceCredential, [ValidateSet("Present","Absent")] [System.String] $Ensure="Present", [Parameter()] [System.String] $ProviderName, [Parameter()] [Microsoft.Management.Infrastructure.CimInstance[]]$AdditionalParameters ) Write-Verbose -Message ($localizedData.StartSetPackage -f (GetMessageFromParameterDictionary $PSBoundParameters)) $null = $PSBoundParameters.Remove("Ensure") if ($PSBoundParameters.ContainsKey("SourceCredential")) { $PSBoundParameters.Add("Credential", $SourceCredential) $null = $PSBoundParameters.Remove("SourceCredential") } if ($AdditionalParameters) { foreach($instance in $AdditionalParameters) { Write-Verbose ('AdditionalParameter: {0}, AdditionalParameterValue: {1}' -f $instance.Key, $instance.Value) $null = $PSBoundParameters.Add($instance.Key, $instance.Value) } } $PSBoundParameters.Remove("AdditionalParameters") # We do not want others to control the behavior of ErrorAction # while calling Install-Package/Uninstall-Package. $PSBoundParameters.Remove("ErrorAction") if ($Ensure -eq "Present") { PackageManagement\Install-Package @PSBoundParameters -ErrorAction Stop } else { # we dont source location for uninstalling an already # installed package $PSBoundParameters.Remove("Source") # Ensure is Absent PackageManagement\Uninstall-Package @PSBoundParameters -ErrorAction Stop } } function GetMessageFromParameterDictionary { <# Returns a strng of form "ParameterName:ParameterValue" Used with Write-Verbose message. The input is mostly $PSBoundParameters #> param([System.Collections.IDictionary] $paramDictionary) $returnValue = "" $paramDictionary.Keys | ForEach-Object { $returnValue += "-{0} {1} " -f $_,$paramDictionary[$_] } return $returnValue } Export-ModuleMember -function Get-TargetResource, Set-TargetResource, Test-TargetResource # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBNHExVsaD0kyJT # faO9Fdru5c5dZNw/I2f/WOIZwqnZQKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPEdT5n6MHHUWamAKxOugW8J # XFcy18ebdrQ+YUj78gxKMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkPtgrSOPwM6RKw4+IhtiVx4hBuTt4TVUJQY9oT/0quzKhc2dJlhqvOA0 # GyVT/AwqY0bEKJePQLz3KyOu75MbG+Oy4P6moi27V+WxxZQ5khD8+pSOq87DHjgq # HLWJM37wNK2owy0oDT7XoEW3cWHX41GmNiVN1Zopb2Ysad1GXqP8DGRK35VVHdrd # 8sgHZD2QEP5I2wCNQGPPp8ktj3LEa+GHIny3sBQwmkRUTGtc9SdyLIecBcFlVP7c # qAwEy/+A86+Dtplgu0hdueO+hJnwurhuZlsK+Ujb6EvUu1AgJW8OwELmGfW0AW34 # uoA9y6lyDTenll7ZL3NNMoqNtydAn6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBm5hFAtQHO0iNPWelduchZTQVv2TGAUKnSURJtBRwN0gIGZhflZgfO # GBMyMDI0MDQyMzAyMjQxMC4xMDdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGMrTAiGA8yMDI0MDQyMzAxMjYw # NVoYDzIwMjQwNDI0MDEyNjA1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0Yyt # AgEAMAoCAQACAg5dAgH/MAcCAQACAhL4MAoCBQDp0t4tAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAMqkmU0sz3ZG5MVITOXZbXTUlOOwAdEG02GeqLebsJRJ # 1vHqBvw7bgMdDm+D/2PxZz7KR907WGe0iHkRj6FvTmcHPI8VBMHz7AxiFOGjLOmF # C3S32XM0rKWRrkDCm6PCBG/MhCXh0uBX8B438Nopf1zFZzHViGjpfg60d2y/aSkX # b9Ou5Nw/kS22nuLwLdDpO8YzMatiKDFlORZnjBr3xA8x+lMt4IbFZYWspGJQ4ZE2 # iF8vAlI+iSWRmCLK4X/VRAt/exAEcR4YXD/EQnOq4VJrZE+/QuIjYhMczTFaNv2J # CFuVfbFbJtTVaRHD1ngCHDoWnQnyGrDEDR8958/Xb7ExggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAEo161zWsuuKwOyVi1++jLcHS6dZAvkOvOX1i07Y+l # TDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgajlt74FseeC8WmVX3+ugNWC9 # T1RpGCgssvXYWhcYA+swDQYJKoZIhvcNAQELBQAEggIAINZfkyfNDUYD3iMLv9YP # bxn8kp2HdbYvDQPs037ezUFtGE2r3smEXMUSkV3BhV6sHba2UDLgoPTVp9IhnykP # O6SRFWWQl76LE4mxlSDYSNFdPj2Qq5Yd4qCyIhqpb9FwytLLZ+zYEGayHxFrbThq # p4ARL6y+U+p/xjwqYCTGVlpf83Haab5klCi9RHJtRRjwH/marFNgOFfLyqDlC+3h # k3V9Tiup5WGULDwuoHBZB2FCoK2ANl4NIMaoUzJ5aNTDLPBOO4qMVd5xNupecUCa # oSN71VDifculpFue90Gs1esqhS+qqgWNboUWSxrWqRUhg8rQb/eDlA+7R0/jHiEs # oQa/7/X6wPd/iaCZcjIhBv3YucQdcGw6k8JQitGW+8dSYwJuU4HuV8E0+yOKXqih # /dK6q7CIRvYm4DjbJ79u4g6MWlCT9mRTBNOJrczdhfKR3zwqAs60szW2Ur0SLR0s # QTaZRjpzYW6lsLoSg3Jfxm8W7xlkDx2rGx7vfZUwxrwCDb69WyyKsaDblQhh63Rl # GUNsBGWDRl07nQcxqfSiP5fk6ZBXqW69XdBQSxCNiw+P1EQZKxOeJQJzo389yQe7 # eqeuvwEy2tr5LBtcnUf4r++4zvuVCODSXBMYEp3dAuXzEz4mu9utPnBo57a47REV # txPzZ06R8ap3NsT/Y36JnOg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_8_68.ps1
sample_8_68.ps1
#************************************************ # DC_Certificates-Component.ps1 # Version 1.1: Added the -silent switch. 11/2012 # Version 1.2: Added table of contents to output # Version 1.3.08.22.14: The overview heading was missing from output file _Certificates-userstore.TXT. Corrected by moving $OutputFile definition to line 58. TFS264120 # Date: 2009-2014 # Author: Boyd Benson (bbenson@microsoft.com) # Description: Collects information using CertUtil.exe. # Called from: Networking Diagnostics #******************************************************* Trap [Exception] { # Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ "[info]: Exception occurred." | WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut $Error.Clear() continue } $sectionDescription = "Certificates Information" # detect OS version and SKU $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber Import-LocalizedData -BindingVariable ScriptVariable Write-DiagProgress -Activity $ScriptVariable.ID_CTSCertificates -Status $ScriptVariable.ID_CTSCertificatesDescription Write-DiagProgress -Activity $ScriptVariable.ID_CTSCertificatesMachineStore -Status $ScriptVariable.ID_CTSCertificatesMachineStoreDescription "[info]: Collecting information about certificates in the machine store." | WriteTo-StdOut $OutputFile = $ComputerName + "_Certificates-machinestore.TXT" "====================================================" | Out-File -FilePath $OutputFile -append "Certificate Output with CertUtil (Machine Store)" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "Overview" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append " 1. certutil -v -silent -store my" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append "certutil -silent -store my" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append #----------CertUtil -silent -store > Certificates_machinestore.txt $CommandToExecute = "cmd.exe /c certutil -v -silent -store my >> $OutputFile" RunCmD -commandToRun $CommandToExecute -CollectFiles $false CollectFiles -filesToCollect $OutputFile -fileDescription "Certificate Output with CertUtil (Machine Store)" -SectionDescription $sectionDescription Write-DiagProgress -Activity $ScriptVariable.ID_CTSCertificatesUserStore -Status $ScriptVariable.ID_CTSCertificatesUserStoreDescription $OutputFile = $ComputerName + "_Certificates-userstore.TXT" "[info]: Collecting information about certificates in the user store." | WriteTo-StdOut "====================================================" | Out-File -FilePath $OutputFile -append "Certificate Output with CertUtil (User Store)" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "Overview" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append " 1. certutil -silent -user -store my" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append "certutil -silent -user -store my" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append #----------CertUtil -silent -user -store my > Certificates_userstore.txt $CommandToExecute = "cmd.exe /c certutil -silent -user -store my >> $OutputFile" RunCmD -commandToRun $CommandToExecute -CollectFiles $false CollectFiles -filesToCollect $OutputFile -fileDescription "Certificate Output with CertUtil (User Store)" -SectionDescription $sectionDescription #----------Registry $OutputFile= $Computername + "_Certificates_reg_.TXT" $CurrentVersionKeys = "HKLM\SYSTEM\CurrentControlSet\services\crypt32", "HKLM\SYSTEM\CurrentControlSet\services\CryptSvc", "HKLM\SYSTEM\CurrentControlSet\services\CertPropSvc", "HKLM\SYSTEM\CurrentControlSet\services\SCardSvr", "HKLM\SYSTEM\CurrentControlSet\services\SCPolicySvc" RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "Certificates Registry Keys" -SectionDescription $sectionDescription #W2008+ if ($bn -gt 6000) { #----------Certificates EventLogs (CAPI2) $sectionDescription = "Certificate EventLogs" $EventLogNames = "Microsoft-Windows-CAPI2/Operational" $Prefix = "" $Suffix = "_evt_" .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription -Prefix $Prefix -Suffix $Suffix } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDNRghsdeH85Oun # ZW6fZ1Yf/UjRabz439k2Y1VpVQ1ROqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINcm # N+jQ8bGYrObG5+7BPzfmZCK0iM0LuzlohFd9zbF3MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAMehmAHY7tac5EJlTbhaCZcsf0fnzHNMDaIyY # JQNkW18UEpx8Zng9sBIJI+D7aPojngFLBPGP/wbxu2PJMcyXJvglaUDWZQdB6Xdt # gOI+MvjZODeC8KiQEn5uROSwnILb9spQnjZSq24djylbSh7VM0r4YsGNRY1JkbzV # x4f5aaXSOSoUmk/yzhK9/quGimx6OkZmDTgIYZcIe8B62N+gm0eBwixoqQOhhumZ # TZ8bcm9vTjmYwRL1IqRTTYbQjLO1aw+Uxt/LPr0WFErAaM3Xyrh0UrdVEO37MdzW # tGCIUyG8yk6Gf69i3WKVkrE1+X/fkVJv7bdGH1pTgZ8i7POoo6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBAdnCfk3qB6fwCYv4bWSXmhdh7wkwfGC0g # WYyHilpYZgIGZusiCs8EGBMyMDI0MTAyODExNDA0NC45NDNaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg4qPLWZQVyXtV1OlIEoitcIIDEy3RlWv20KZmhn66/RcwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAMPR+wYZoBSQuOTdlbJ6UzNIP1HBmOKV5YKh # nzzMP4LkEhoZIdoMWhbgdK56par/pkzxgecfMcXSMa6wx+y529gLWv7IHn5KGwut # q0BhRlkxifIgte7guBvJiT1jrhWqUEXIwCI5nZO2/lx8Temd4F5WTAINZswTGx3e # SpLMARIqfwdL65OqiQRhjSxpQ/FH531cffUWyNLYa/GNpQv0MuUKhiElaTK4SI0d # A2HS3ade016NsCG8fQsfXkzjGvL29QShW+rBttjXKXcM2ejzKWNgUKhigPSIM0Ys # wxUsxZW7FEEVeBUOvSZkaypRxm0Fn9M7kl6YOk4MAP1+h0hwLBVQYK2Dj0emMyBW # 3gzc1rs7dVIxFIW6cUSb7wmUUtcIp9bd1Zh8MVqLYvL/h1FQ0rhheEWA/sod63X+ # tKFORi0qgrT01nxBlHS+0TUyFCKrBkYf9MuiYcK5W+ov101XXkNZLzb/z5UORxqi # HYIZwtsDXAuGo9egxAAB95+bcuniLhX+7qH+sUV+zO2t6UNHPxluAoXwtIhGsbZI # WRZzYH2BRgz8foM6knN0li/Jrz2Bj9Dpj+tBfBkqj7a6ZJrtsw5C4NgdxEfuyecZ # 5TImrtiBoXcNDT+30fhsQ3x+gPoPqeeDad8HZjd3QYY2/iQbQOjc2uW/Pkr73+oL # z5b+Rz+H # SIG # End signature block
combined_dataset/train/non-malicious/sample_58_75.ps1
sample_58_75.ps1
# # Module manifest for module 'OCI.PSModules.Loadbalancer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loadbalancer.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f5ec8fef-b511-4f9f-910d-3600a849ca41' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loadbalancer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loadbalancer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCILoadbalancer', 'Get-OCILoadbalancerBackend', 'Get-OCILoadbalancerBackendHealth', 'Get-OCILoadbalancerBackendSet', 'Get-OCILoadbalancerBackendSetHealth', 'Get-OCILoadbalancerBackendSetsList', 'Get-OCILoadbalancerBackendsList', 'Get-OCILoadbalancerCertificatesList', 'Get-OCILoadbalancerHealth', 'Get-OCILoadbalancerHealthChecker', 'Get-OCILoadbalancerHealthsList', 'Get-OCILoadbalancerHostname', 'Get-OCILoadbalancerHostnamesList', 'Get-OCILoadbalancerListenerRulesList', 'Get-OCILoadbalancerPathRouteSet', 'Get-OCILoadbalancerPathRouteSetsList', 'Get-OCILoadbalancerPoliciesList', 'Get-OCILoadbalancerProtocolsList', 'Get-OCILoadbalancerRoutingPoliciesList', 'Get-OCILoadbalancerRoutingPolicy', 'Get-OCILoadbalancerRuleSet', 'Get-OCILoadbalancerRuleSetsList', 'Get-OCILoadbalancerShapesList', 'Get-OCILoadbalancersList', 'Get-OCILoadbalancerSSLCipherSuite', 'Get-OCILoadbalancerSSLCipherSuitesList', 'Get-OCILoadbalancerWorkRequest', 'Get-OCILoadbalancerWorkRequestsList', 'Move-OCILoadbalancerCompartment', 'New-OCILoadbalancer', 'New-OCILoadbalancerBackend', 'New-OCILoadbalancerBackendSet', 'New-OCILoadbalancerCertificate', 'New-OCILoadbalancerHostname', 'New-OCILoadbalancerListener', 'New-OCILoadbalancerPathRouteSet', 'New-OCILoadbalancerRoutingPolicy', 'New-OCILoadbalancerRuleSet', 'New-OCILoadbalancerSSLCipherSuite', 'Remove-OCILoadbalancer', 'Remove-OCILoadbalancerBackend', 'Remove-OCILoadbalancerBackendSet', 'Remove-OCILoadbalancerCertificate', 'Remove-OCILoadbalancerHostname', 'Remove-OCILoadbalancerListener', 'Remove-OCILoadbalancerPathRouteSet', 'Remove-OCILoadbalancerRoutingPolicy', 'Remove-OCILoadbalancerRuleSet', 'Remove-OCILoadbalancerSSLCipherSuite', 'Update-OCILoadbalancer', 'Update-OCILoadbalancerBackend', 'Update-OCILoadbalancerBackendSet', 'Update-OCILoadbalancerHealthChecker', 'Update-OCILoadbalancerHostname', 'Update-OCILoadbalancerListener', 'Update-OCILoadbalancerNetworkSecurityGroups', 'Update-OCILoadbalancerPathRouteSet', 'Update-OCILoadbalancerRoutingPolicy', 'Update-OCILoadbalancerRuleSet', 'Update-OCILoadbalancerShape', 'Update-OCILoadbalancerSSLCipherSuite' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loadbalancer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_60_27.ps1
sample_60_27.ps1
# # Module manifest for module 'GCArcService' # # Generated by: Microsoft # # Generated on: 08/09/2020 # @{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'GCArcService.psm1' # Version number of this module. ModuleVersion = '1.0' # ID used to uniquely identify this module GUID = 'c5d905c4-c9a5-4a0a-8115-9216509a36f5' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2017 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'This module is used to install/uninstall Guest Configuration Service.' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '2.0' # Functions to export from this module FunctionsToExport = @('Install-GCArcService', 'Enable-GCArcService', 'Uninstall-GCArcService', 'Update-GCArcService') } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBECPA5J5/o6uzP # EAC976FTzZ20v0rLlWThfMKjQi2k+6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC55tAOOpy5cwx25UWLszMQ4 # l4N/S9Dkf8RTi9D1E8wwMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEADFi5YbeLW7Xfgfk5PJ5fXGzmCMe6ZpfF0aDcPLQmHfMt+cVGDY6buiLf # I19uu/5Uxv6IysN9u1n4XkQsKg/RJbFMuxuWPuAmwThlqmi4zga05HR6r4rBX2Dh # yDoLwW5CbkOzdmcpslSn23ajoec8RGc4VYMqA57kbbZCraT6099mBRi7Pd2x3b0d # zcZtPcolCSTXtb+IEnOw0v4hEJop50KG5BFtba3aNL8MAh4U1bLB4ywztzdc2f2J # Pi/TLzMyBxcT8rcL5FoV7GcvNIsFBAWC/2hNlgvJiuzaY2QtkO+KrSjtLE2F5lV7 # FPXmm38OHTHA/MU2rGZHhcaxS3fCTqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCiaKF5j/wAI1BaQZyUf3+x1sxqr5gKxRjD979E2l6jAwIGZlUnIG5Y # GBMyMDI0MDYxNzIyMTQzMC42OTdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoaqlswIhgPMjAyNDA2MTcyMDI4MTFaGA8yMDI0MDYxODIwMjgxMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6hqqWwIBADAHAgEAAgIH5TAHAgEAAgIRLjAKAgUA # 6hv72wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAITXI0sRLcc3jMK/tBsH # 34zG62dWyFL/09psN3nesAcjrNFflhCkU3m1VnWPRTRG97Y6UkDnThkBIX6DfnSN # V0P5imL2pg3lmdon+OnjpHrVTm94SQESZXioG2ccgy5ty0I1YGxd9mRXcmXEmAWj # Ia9FmGKHJerByr8jMuTx5f9IMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgUMVMoovkf0X2aEE3ycD2updxXD9y/pp2KTG3hyO5Or4wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIHfozbpsKVIDmR2b84efA7DItA/FhVU8p1r3ad2mnKpX # MA0GCSqGSIb3DQEBCwUABIICACcCuS/n4H7w0NT01X7TupsymiodEGH2i3xkXmC/ # NM4lpGbk7YKdkSm7wRR3+95XJZqAfVFcbfULSTd1dUVyGTZPrTFelqdgjV54zhDa # PMHePFU2uiU0wmgPcvpkpX/dgoQc+4o6d/qPw/HV0cJnpT+qBfEYg5GFZOyHZvNp # 4JUToNHlgkBbCGqvMte117vd0xqQ97ltXPYXs0ohuLu3lwDIOeesNcCIcdOzCg7p # l02MVrLKDBQjq5tAkqJrTbLSxnXpIfTH51prQoIS3dUFTPYuwE527AejTJ8mQO4n # 7hupa3a40jsq6oLMuVUecH3HZMXhhyf0E4+hUbXSOU1TwyBK+jISP4IfAqOsTkOF # iWhl3cMZM/u/M3/7TqU5/USYVA/MlyC+hKG4T1PyvxW3q/LGgMAUs2vdGpRmzZ2M # e3Mdn6yP5ZGXdsU8mV2E4rbuVQqOdcq7OtL9wD0R2zTMUE3ytVaGUTILa7kuwvqt # wC/5x3QECPLdkAEBto5o6DfXCY5UsYy2BKWF81d7IbqdFomLGY7aK4yxxkKuO5eH # rHXl5tIUB9JO5KhTBbVr2tu+UvmKOgDXaveTMd9Hp172zNydQEsfem6ujhOQ+8+m # KbbCvc7LT368d2ij+ZDaCdKyZ43jc7RFy4o2QYp3f9TG2DvpFcL6T7e/hTlx65a4 # Ms1o # SIG # End signature block
combined_dataset/train/non-malicious/sample_58_86.ps1
sample_58_86.ps1
# # Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker' # # Generated by: Microsoft Corporation # # Generated on: 19/01/2022 # @{ # Script module or binary module file associated with this manifest. RootModule = '' # Version number of this module. ModuleVersion = '1.2100.2671.410' # Supported PSEditions # CompatiblePSEditions = '' # ID used to uniquely identify this module GUID = 'd4d76297-1fd8-4ff9-bc8a-690382525c43' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft AzStackHci Environment Checker' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @( 'AzStackHci.ArcIntegration.psm1' 'AzStackHci.ArcIntegration.Helpers.psm1' ) # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @('Invoke-AzStackHciArcIntegrationValidation') # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Microsoft','AzStackHci' # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBvn3v1p4iWxJpO # n4NFuK3bzsektdk1PVdmMotgZaMChaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOC8y2vLy3Z481Gvx9QlIADt # HHeOSrTlxuoS9NfH7fsyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAebCdi1j2nnFHKT2rzITEjgzdMZKYT5Ra6UkNsghgZV9GSJ/ayjCVXYq # 5cnqH7cnf5uKlg1jfdLJTQtmm600Sc1vVKuH0YJD6weLh/HLAn15LtwBl4di47a/ # SJ01LuWPmxfwG/1emxTMf52TdGzkBqaX0H5zPrCxKhgwRanqJ/0QUS/9nV9U0RUc # lbOfcN4Kubk1gBYh70+P4hUDPaktNFb14ki9grLsOwhRdJS+ZX27xri83RZWTTBm # xlBLIIStt3pBRsDMjpr5d48uEeuUI1hUPO8qUNrNc4QKaGd8m8s2sP8NHCFao+bm # oF4c8i+Vzc/MvW7NMRFGvh273uklkqGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA9BgMg0t7qirh91aXl159X7cJXwunZ0RznX+Sz8QmZ5gIGZkXxCZ/T # GBMyMDI0MDUxNjE4NDQyNi4zNDdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHsMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP # MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6fBvhDAiGA8yMDI0MDUxNjExNDE1 # NloYDzIwMjQwNTE3MTE0MTU2WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDp8G+E # AgEAMAkCAQACAQACAf8wBwIBAAICEzUwCgIFAOnxwQQCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAMD4BV4GaQd+Drl9ZxYa0XPBo0JwfghA6tHN5eeTTqgj4 # csYiGeJTHCrWzxvu95f6KD8s6bHNK6gw9oNtGlUEJ8OupJyQtTy75DcdBfVCaYSl # YToMC5Awj6cgYhVpsEVD+i813sdqP3s01SMKuT5Jo87XpGYg3yO9sxIIxAsCfj1D # whajYFmBIVvk0m/25IjmVescI1gHoEV80X0fJEOfF66msKRf8jrqjqItra/RRuUZ # PPIEwRGaTtVb3MbYtPJ1pmdmQiLK6EdH7gBmdixpaLcqI7OKFmAm0VIYzGjcmWc5 # ThQXyQIcOM0fW9W/RFFOBW3fX5NSOlOHowsAL6Ph4zGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6Q9xMH5d8RI2AAEAAAHp # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIKB/NeH6EGMWwGZ/I2LLwcFUICb569Ptx5UU04udIjrT # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgpJCSeJdpNyaPVMpBYX7HZTiu # JWisYPxPCaBVs32qxCUwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAiBCAzbf2os4NRjrE8gb8BwoOCviwq # gj3EUkvJWUN+TbRaAzANBgkqhkiG9w0BAQsFAASCAgANTlZT06wxPOQC8SrmE3SL # 9RW4Dpt6tF4B8vb6SjvJqXCXX/LnHyOC8hmy5RLWoWpH8G1eTNDQvjI32FzkBhNI # KqizW6If677oAJ5bmCHBmdOgQ1gYEzTqrRRVxjkIt5Qt+zwIfqOICXB1D74lC+Xt # 5QqqsLPz143m9SEZ1FiM2Jtrj6X3l7rF/EAIJ28RSNsUhe/VWzFsXb0kDiYJcTEW # aRlc9MsMz2ypCjhTw9wbEgEOlgD6MVguFS0Ysl2SfZGu/4fRcHk60zs+4nvd2qWo # F9FlA4nppHJJn3xWpgjhk6/IRx9OY3XsvvteqeuBLamv21lQez+elHvZs79QJ0aP # UMVDbW3MihpFCbW144bvbwg184DTXrhBeuLnSEdY2DC6viD0UHUEnUJEEgELFh0e # YDvjPCedoyhPJfEQE+AgC3z/723a9s1MrbEfrfWBTTNeumvBrqJ3Beg5l07GbnYM # F8jo6ZyLVKwXa0qiMF/WgxyE9pBh1xVarHdZM7o2hvzgGY8LvZb6IvkK/Z9kWOxI # IVL4O1ee3NlkrYVM7vCxUS/yLsUGlNGM+VM/K3klzkTiDcrZG9c6wvzEVgKIOd2I # j6pifVi+BwyTie4S2jc6DqTOdq9VctZx8JeOtNo3Dzji0TYjDgKnL1rSMxrKkHX6 # 0LFs35gn6cmtChzVH27eyQ== # SIG # End signature block
combined_dataset/train/non-malicious/RDC RemoteApp PassMan.ps1
RDC RemoteApp PassMan.ps1
################################################## # ENV Setup ################################################## #------------------------------------------------- # Initialize-ENV #------------------------------------------------- # Usage: Used to build the execution ENV. # **Function is not for interactive execution.** #------------------------------------------------- function Initialize-ENV { Import-Module .\\WPK # Modify these variables to meet your needs. The MinPasswordAge # and MaxPasswordAge variables can be pulled from AD. But, for this # version they are hardcoded. The ApplicationPath is the application # that you want to start after the PassMan screen. $Global:MinPasswordAge = 30 #Number of days to start warning. $Global:MaxPasswordAge = 40 #Number of days to force password change. $Global:ApplicationPath = "C:\\Program Files\\Windows NT\\Accessories\\wordpad.exe" } ################################################## # Functions ################################################## # Note: These functions are used to complete the various # automation tasks for this script. #------------------------------------------------- # Get-CurrentIdentity #------------------------------------------------- # Usage: Used to get the identiy for the currently # logged on user. #------------------------------------------------- function Get-CurrentIdentity { $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) } function Get-ADUser { param ([string]$UserName) $ADDomain = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() $Root = [ADSI] "LDAP://$($ADDomain.Name)" $Searcher = New-Object System.DirectoryServices.DirectorySearcher $Root $Searcher.Filter = "(&(objectCategory=person)(objectClass=user)(sAMAccountName=$UserName))" $Searcher.FindOne() } ################################################## # Main ################################################## try { Initialize-ENV $Global:UserIdentity = Get-CurrentIdentity $Global:UsersAMAccountName = (($UserIdentity.Identity.Name).Split("\\"))[1] $Global:UserObject = Get-ADUser $UsersAMAccountName $Global:PwdLastSet = [datetime]::FromFileTime($UserObject.properties.pwdlastset[0]) $Global:PwdLastSetDays = (([System.DateTime]::Now) - $PwdLastSet).TotalDays $Global:PwdExpire = "{0:N0}" -f ($MaxPasswordAge - $PwdLastSetDays) $Global:ExistingPassword $Global:NewPassword1 $Global:NewPassword2 if ($PwdLastSetDays -ge $MinPasswordAge){ New-Window -Title "Password change for $($UsersAMAccountName)" ` -WindowStartupLocation CenterScreen ` -Width 320 -Height 255 -Show ` -ResizeMode NoResize { $BColor = New-SolidColorBrush -Color "#E0E0E0" New-Grid -Rows 'Auto', 'Auto', 'Auto', 'Auto', 'Auto', 'Auto' ` -Columns 'Auto', '150' -Background $BColor { New-Label -Name rtbHeader ` -VerticalContentAlignment Top ` -HorizontalContentAlignment Left ` -Row 0 -Column 0 -ColumnSpan 2 ` -Margin "10 10 0 0" -Width 320 -Height 30 ` -Foreground Red -FontWeight Bold New-TextBlock -Name rtbMessage ` -HorizontalAlignment Left ` -VerticalContentAlignment Top ` -HorizontalContentAlignment Left ` -Row 1 -Column 0 -ColumnSpan 2 ` -Margin "10 0 0 0" -Width 275 -Height 80 ` -Foreground Red -FontWeight Bold -TextWrapping "0" New-Label -Content "Existing password:" ` -Row 2 -Column 0 -Margin "10 0 0 0" New-PasswordBox -Name pbExistingPassword ` -Row 2 -Column 1 -Width 130 ` -VerticalContentAlignment Center ` -HorizontalAlignment Left -PasswordChar "*" ` -On_PasswordChanged {$pbNewPassword1.IsEnabled = $True; $pbNewPassword2.IsEnabled = $True; $btnChange.IsEnabled =$True; $ExistingPassword = $this.password} New-Label -Content "New password:" ` -Row 3 -Column 0 -Margin "10 0 0 0" New-PasswordBox -Name pbNewPassword1 ` -Row 3 -Column 1 -Width 130 ` -VerticalContentAlignment Center ` -HorizontalAlignment Left -PasswordChar "*" ` -On_PasswordChanged {$NewPassword1 = $this.password} New-Label -Content "Retype New password:" ` -Row 4 -Column 0 -Margin "10 0 0 0" New-PasswordBox -Name pbNewPassword2 ` -Row 4 -Column 1 -Width 130 ` -VerticalContentAlignment Center ` -HorizontalAlignment Left -PasswordChar "*" ` -On_PasswordChanged {$NewPassword2 = $this.password} New-Button -Name btnChange -Content "_Change" ` -HorizontalAlignment Left ` -Row 5 -Column 2 ` -Margin "0 10 0 0" -Width 50 New-Button -Name btnCancel -Content "_Cancel" ` -On_Click {$Window.Close(); Start-Process $ApplicationPath} ` -HorizontalAlignment Left ` -Row 5 -Column 2 ` -Margin "55 10 0 0" -Width 50 } } -On_Loaded { if (($PwdLastSetDays -ge $MinPasswordAge) -or ($PwdLastSetDays -ge $MaxPasswordAge)) { $rtbHeader = $Window | Get-ChildControl rtbHeader $rtbMessage = $Window | Get-ChildControl rtbMessage $pbNewPassword1 = $Window | Get-ChildControl pbNewPassword1 $pbNewPassword2 = $Window | Get-ChildControl pbNewPassword2 $btnChange = $Window | Get-ChildControl btnChange $btnCancel = $Window | Get-ChildControl btnCancel # Disable relevate controls $pbNewPassword1.IsEnabled = $false $pbNewPassword2.IsEnabled = $false $btnChange.IsEnabled = $false # If we haven't gotten to the MaxPasswordAge The user can change their password. if ($PwdLastSetDays -ge $MinPasswordAge) { $rtbHeader.Content = "***WARNING***" $rtbMessage.Text = "Your password will expire in $($PwdExpire) days. Please change your password now or click Cancel to continue." } # If we are at the MaxPasswordAge. The user must change their password. if ($PwdLastSetDays -ge $MaxPasswordAge) { $rtbHeader.Content = "***WARNING***" $rtbMessage.Text = "Your password is about to expire. You must change your password now." $btnCancel.IsEnabled = $false } # Here is the password change logic. $Command = {if (!($NewPassword1 -eq $NewPassword2)){ $rtbHeader.Foreground = "Red" $rtbHeader.Content = "***WARNING***" $rtbMessage.Foreground = "Red" $rtbMessage.Text = "Passwords do not match, please try again." } else { $rtbHeader.Foreground = "Black" $rtbHeader.Content = "Progress..." $rtbMessage.Foreground = "Black" $rtbMessage.Text = "Please wait, trying to change password." try{ $User = $UserObject.GetDirectoryEntry() $User.psbase.invoke("ChangePassword",$ExistingPassword, $NewPassword1) # Nothing to do, start application Start-Process $ApplicationPath } catch { $rtbHeader.Foreground = "Red" $rtbHeader.Content = "***ERROR***" $rtbMessage.Foreground = "Red" $rtbMessage.Text = $_.Exception.InnerException.Message } } } $btnChange.Add_Click($Command) } } } else{ # Nothing to do, start application Start-Process $ApplicationPath } } catch { # Nothing to do, start application Start-Process $ApplicationPath }
combined_dataset/train/non-malicious/set-localpwd_1.ps1
set-localpwd_1.ps1
# Sets local account passwords on one or more computers # usage [computerName1,computerName2,... | ] ./set-localpwd.ps1 [-user] <userName> [-password] <password> [[-computers] computerName1,computerName2,...] param( [string] $User , [string] $Password , [string[]] $ComputerNames = @() ) $ComputerNames += @($input) if (! $ComputerNames) { $ComputerNames = $env:computername } function ChangePassword ([string] $ChangeComputer, [string] $ChangeUser, [string] $ChangePassword) { "*** Setting password for $ChangeComputer/$ChangeUser" & { $ErrorActionPreference="silentlycontinue" ([ADSI] "WinNT://$ChangeComputer/$ChangeUser").SetPassword($ChangePassword) if ($?) { " Success" } else { " Failed: $($error[0])" } } } function ShowUsage { @' usage [computerName1,computerName2,... | ] ./set-localpwd.ps1 [-user] <userName> [-password] <password> [[-computers] computerName1,computerName2,...] '@ } if ($user -match '^$|-\\?|/\\?|-help' -or ! $password) { ShowUsage; break; } ForEach ($computer in $ComputerNames) { ChangePassword $computer $user $password }
combined_dataset/train/non-malicious/12.ps1
12.ps1
$poshGitModule = Get-Module posh-git -ListAvailable | Sort-Object Version -Descending | Select-Object -First 1 if ($poshGitModule) { $poshGitModule | Import-Module } elseif (Test-Path -LiteralPath ($modulePath = Join-Path (Split-Path $MyInvocation.MyCommand.Path -Parent) (Join-Path src 'posh-git.psd1'))) { Import-Module $modulePath } else { throw "Failed to import posh-git." } if ($args[0] -ne 'choco') { Write-Warning "posh-git's profile.example.ps1 will be removed in a future version." Write-Warning "Consider using `Add-PoshGitToProfile` instead." }
combined_dataset/train/non-malicious/Test-WebDAV_1.ps1
Test-WebDAV_1.ps1
function Test-WebDav () { param ( $Url = "$( throw 'URL parameter is required.')" ) $xhttp = New-Object -ComObject msxml2.xmlhttp $xhttp.open("OPTIONS", $url, $false) $xhttp.send() if ( $xhttp.getResponseHeader("DAV") ) { $true } else { $false } }
combined_dataset/train/non-malicious/sample_23_49.ps1
sample_23_49.ps1
# # Module manifest for module 'OCI.PSModules.Usageapi' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Usageapi.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'fdfc4635-1080-4383-bc06-feef14dcb718' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Usageapi Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Usageapi.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIUsageapiCustomTable', 'Get-OCIUsageapiCustomTablesList', 'Get-OCIUsageapiQueriesList', 'Get-OCIUsageapiQuery', 'Get-OCIUsageapiSchedule', 'Get-OCIUsageapiScheduledRun', 'Get-OCIUsageapiScheduledRunsList', 'Get-OCIUsageapiSchedulesList', 'Get-OCIUsageapiUsageCarbonEmissionsQueriesList', 'Get-OCIUsageapiUsageCarbonEmissionsQuery', 'Invoke-OCIUsageapiRequestAverageCarbonEmission', 'Invoke-OCIUsageapiRequestCleanEnergyUsage', 'Invoke-OCIUsageapiRequestSummarizedConfigurations', 'Invoke-OCIUsageapiRequestSummarizedUsages', 'Invoke-OCIUsageapiRequestUsageCarbonEmissionConfig', 'Invoke-OCIUsageapiRequestUsageCarbonEmissions', 'New-OCIUsageapiCustomTable', 'New-OCIUsageapiQuery', 'New-OCIUsageapiSchedule', 'New-OCIUsageapiUsageCarbonEmissionsQuery', 'Remove-OCIUsageapiCustomTable', 'Remove-OCIUsageapiQuery', 'Remove-OCIUsageapiSchedule', 'Remove-OCIUsageapiUsageCarbonEmissionsQuery', 'Update-OCIUsageapiCustomTable', 'Update-OCIUsageapiQuery', 'Update-OCIUsageapiSchedule', 'Update-OCIUsageapiUsageCarbonEmissionsQuery' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Usageapi' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_47_33.ps1
sample_47_33.ps1
@{ GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-Acl", "Set-Acl", "Get-PfxCertificate", "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "Get-AuthenticodeSignature", "Set-AuthenticodeSignature", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-CmsMessage", "Unprotect-CmsMessage", "Protect-CmsMessage" , "New-FileCatalog" , "Test-FileCatalog" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD++xTkW7oivoiQ # gqU/R85f/MwSI1hVEeaegSriXP6+BqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFh1eRlM7vpfcyNRhGD2p01b # 7R1UWqEpDNm2QYTPq7fWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAXspH6BNY7nbQAAzC1kvWt9mAW2aV64hI290LtAjJOjj9tyjJNAREJUod # Ti94rwhNCwq2Qpv0KJBSuHJ1XYbEkLboaiEPI/5smx7L4A+eGYgZ0dGNoCpVWYpe # FgCRxD0fAmKZ8Ed3S54uX3J+EfpMXkrPhjkfKNvropz0oK7MeUXy74sWd1lUaIpQ # 5smOjzDyQijq8o2dIo6S2GoxZiRcq8wgpT0UY7lhySgmkFFZiU5CUm7xEkHB0rWR # TpDsR3r6kTAX9miBICR+sR/V6zs03MTba8DNLXGLxKq0pdHkclj8ohNFmYDsjewl # /irOwKDbn8oN3G2ptSd59iFx7s5GoqGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBghnvISx3TWuYdWp0s1Tt43KKzwQFCwn2wxdlvF7cmhwIGZbqj1zIv # GBMyMDI0MDIxNDIxMDAyNi40ODJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl3lHMwIhgPMjAyNDAyMTUwMzM1MTVaGA8yMDI0MDIxNjAzMzUxNVowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XeUcwIBADAKAgEAAgID+AIB/zAHAgEAAgITJjAK # AgUA6Xjl8wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEPF8M/MNoD45ZGB # Kw0xpPIu9NsrfUH8ac6df880DomsAtv729JUMLYmLY5us8mDxazuqtXiGgpQz5rk # 955j/vZbbx0OpN4lcUoRPLo20Rl1IhiDihXTtUJJPCw3qVOZGE6noa64svoiAf1/ # gO1CiHFWYlVaioymlvwueb8U+5i5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgVwuDRRuuxyCSOzBqDIupy0b0pWq+X00J3NiNdfJCSs0wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH # 9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 5Y9qwPM9tAujAAEAAAHlMCIEILVnBgmprI+GG6P8gyh9eD5dz8rCkLZBc+6WmC4Q # VECoMA0GCSqGSIb3DQEBCwUABIICAJQJmoYbi3tSP6wvlgKWGjgl7i8DHIwMniIP # sI6UI2gT1UpMD2CtzcfhjqYDUYidQmdgjiJYIkhYYw7/iJNNK5mBl07BKcjeD6Xj # Sxnwt10OrUTJEyPkoSJ+s4AZ5tFRqp81pmcpEtIikpBkJ9/H/Wc/IBsnEgx2ORG7 # QbUe7lGjV0DjztgIQpgL69M1Z1UoSIdI0ToFZvKv5pik+74drHBuGqmA4yRLI+TB # yS/2NwBLrC/hXE+lCo3biipfFGsZ8XoJxWj1txj9zaEn0n7YLTg3F8i742wT0QJu # HJ6xDYKc0qevBINssnhgGaSwsoTw/vw5zoS/tG3ShRwU0vm7hH2bQHFkeTK72YL9 # kuaIGXf1mmcJ/Y7BLxP0Nm98k2Sa4xgu16aFC3Buiw9kPgW5NrieOMYdejPbK4SM # IOv0rjUGQJMa+6V418i2jT9kW4Xh1ApwD6DL7xFR4qTzg4f8eQvtYZj52k3C8wW8 # iP8D5qPeh+gQamM6jtE1kyvyUJPTGYkIClSq8Y9MpDAi03s6tmaXVH659MGbSQEX # OizCVn9xWY9Q67NqZPFvytV4Qw2OhD46Hy/VrBLnFCaFgKhIcH5dtCzcJJEJQm5d # xlE2CF/bSnfUHrY/YQH0D2e+9Pqgig3BdixOOnZsrYesqfhtKmvLrUpWIA1pdO4/ # vhxsLmfC # SIG # End signature block
combined_dataset/train/non-malicious/sample_10_42.ps1
sample_10_42.ps1
#************************************************ # TS_WMIHandleLeakKB2639077.ps1 # Version 1.0.1 # Date: 7/19/2013 # Author: v-kaw # Description: [KSE Rule] [ Windows V3] Handle leak in Svchost.exe when a WMI query is triggered by using the Win32_PowerSettingCapabilities # Rule number: 5c139a00-370c-4d1c-a929-defcdae591dc # Rule URL: https://kse.microsoft.com/Contribute/Idea/de085f8b-e790-4dd1-b69c-26acb0493c63 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 5c139a00-370c-4d1c-a929-defcdae591dc $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_WMIHandleLeakKB2639077" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Windows 7 and Windows server 2008 R2 sp1 return ($OSVersion.Build -eq 7601) } # ************** # Detection Logic # ************** Function CheckUmpoVersion { $UmpoPath = Join-Path $Env:windir "System32\Umpo.dll" if(Test-Path $UmpoPath) { $UmpoVersionInfo = Get-FileVersionString $UmpoPath $versionPrivatePart = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($UmpoPath).FilePrivatePart add-member -inputobject $InformationCollected -membertype noteproperty -name "Umpo.dll current version" -value $UmpoVersionInfo if($versionPrivatePart.StartsWith(18)) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Umpo.dll required version" -value "6.1.7601.18331" } if($versionPrivatePart.StartsWith(22)) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Umpo.dll required version" -value "6.1.7601.22529" } return ((CheckMinimalFileVersion $UmpoPath 6 1 7601 18331 -LDRGDR) -and (CheckMinimalFileVersion $UmpoPath 6 1 7601 22529 -LDRGDR)) } else { "$UmpoPath does not exist." | WriteTo-StdOut return $false } } Function CheckHandleCountOfWMIServices { Trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText "Checking Handle Count of WMI Services" } $WMIService = Get-CimInstance -Class Win32_Service |Where-Object {$_.Name -eq 'winmgmt' } $ProcessAssociatedWithWmiService = Get-Process -Id $WMIService.ProcessId if ($processAssociatedWithWmiService.HandleCount -gt 10000) { add-member -inputobject $InformationCollected -membertype noteproperty -name "WMI Service process ID" -value $WMIService.ProcessId add-member -inputobject $InformationCollected -membertype noteproperty -name "Current handle count" -value $processAssociatedWithWmiService.HandleCount return $true } return $false } #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if ((CheckUmpoVersion) -and (CheckHandleCountOfWMIServices )) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBAr0bTbUMa0hJy # GkiKKXsH1RqamGNgX+b8ku3H41gVH6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA4p # Xk5kPOtox2jTpefyJS9ZEvH8munC/Ym1QM8RmWosMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAC//mmiqlv2+7tk4mdmmFTgimCS6mHQzpt5oc # 1zVGdE2Lf6qHF3kAKEUfF1xxIcO03oIE6jXtH0zV28NbafFTJNRGhhv90Xn/YL3I # QlT0U9twamQgVtdEAo4sD7ZG9x8TkYsks76MwCXGueRz1usMeZovU4GGrj4039pa # GadIAWTyX8kucOzqQjJaOQqNRPMKDECivpTOy9XLNP0n2YeDkvVdFFOTs9kvl/F1 # 9VeH49B1kq5uFajRWoQLOlc7H8fkP036Oh/0t7DsD+hCsTa+1PBCSb0dqlRf3gFE # 6IgWeEDyiVpH59PxLqPMORxcWlO1FzXTsexFMzvrJeULZxn/16GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDWolY3NFyGwf91hL847kNbGU+oeLdrtzQN # M5ose3eemQIGZutwxmXfGBMyMDI0MTAyODExNDA0Mi4xMjdaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF # WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP # AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF # s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX # ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL # Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN # gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m # r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB # BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp # vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr # OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI # +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP # Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri # LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi # mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV # liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ # dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L # tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u # EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US # LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq # 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu # 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100 # DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0 # MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA # AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b # zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC # K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga # wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46 # vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW # YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg6EnacrGu7ryQh+R6cwX/JS0WNqLqufM2TDQ6sx2oh2AwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq # Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC # AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf # HyoaMA0GCSqGSIb3DQEBCwUABIICAGniP4bg+8EhggEGVRB+koQqMnSg2OPiS1Al # mkLcwvHFz0ICi5kjA0YzZ4bDwx3YXEXZ87wSbDWowp7Kuw6JKrT2DLBGNJ4h+dbm # PGNWxnC3HNYuMVyQhP1JWcKIep/gsmByC7/if2BjQ8S8qtKmp3OzDjAXLc9eqk+O # cR3lPR9/CzIBIYY+wSjV+IsMi86VD5wvHX2fi0pgQCtSmsedqiiJ314h5C+QLhg4 # s7CPBuLcppDcste1Yd3KmP5+kzEOxqXSI+X2IE1VwJwriB6jrg/m7/E+Q/4hy6c5 # XolwvnqcBE2Xnvj3DJhbisEF3XljJ02j1ZdnA/4l/txi+KXwfqsyNCKQdvkZYXEU # AmYkkkM3RCTlpdVt0CmrMfViA8aMdsJoCvrrfM8+EgTtB8Rd8SGdZq+UgnmazjmC # 4P+7QuvPzIyEDKNZAYU1TCUoAW9gRfTozSyV+lwICey2eX9oQ0uIbSy+EojbP55D # 9PbDqc4fd1ZOTOr0RS/LIIIT0KxCTjYFw9NEsv+/BCw2c3YRGSbD8HPIPfCV6NUs # lDcDdT3LvXcc+CJ0aBpnyj7IC8pauPca/m93eQYnGGpsfB4NcgNQ9bGdhckZ9dvv # IMKlqzbGcZ/+hsspPeblgGddTbYH6Ev8An5Ch4Z4g6tKByrSB0scuWrIqPYbzMCA # v9a3zZb9 # SIG # End signature block
combined_dataset/train/non-malicious/Find Local Group Members_3.ps1
Find Local Group Members_3.ps1
# Author: Hal Rottenberg # Purpose: Find matching members in a local group # Used tip from RichS here: http://powershellcommunity.org/Forums/tabid/54/view/topic/postid/1528/Default.aspx # Change these two to suit your needs $ChildGroups = "Domain Admins", "group two" $LocalGroup = "Administrators" $error.clear() $MemberNames = @() # uncomment this line to grab list of computers from a file $Servers = Get-Content serverlist.txt # $Servers = $env:computername # for testing on local computer foreach ( $Server in $Servers ) { $MemberNames = @() $Group= [ADSI]"WinNT://$Server/$LocalGroup,group" $Members = @($Group.psbase.Invoke("Members")) $Members | ForEach-Object { $MemberNames += $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null) } $errCount = $error.count $ChildGroups | ForEach-Object { $output = "" | Select-Object Server, Group, InLocalAdmin $output.Server = $Server $output.Group = $_ If ($errCount -gt 0){$output.InLocalAdmin = "Connection Error!"}ELSE{$output.InLocalAdmin = $MemberNames -contains $_} Write-Output $output } $error.clear() }
combined_dataset/train/non-malicious/2482.ps1
2482.ps1
[CmdletBinding()] [OutputType()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Class, [Parameter()] [ValidateNotNullOrEmpty()] [string[]]$ComputerName = $env:COMPUTERNAME, [Parameter()] [ValidateNotNullOrEmpty()] [pscredential]$Credential, [Parameter()] [ValidateNotNullOrEmpty()] [string]$Namespace = 'root\cimv2', [Parameter()] [ValidateNotNullOrEmpty()] [switch]$FriendlyProperties, [Parameter()] [ValidateNotNullOrEmpty()] [ValidateRange(0, 4)] [int]$Impersonation, [Parameter()] [ValidateNotNullOrEmpty()] [ValidateRange(0, 6)] [int]$Authentication ) begin { $FriendlyPropNames = @{ 'BuildNumber' = 'Build Number' 'CodeSet' = 'Code Set' 'CurrentLanguage' = 'Current Language' 'IdentificationCode' = 'Identification Code' 'InstallableLanguages' = 'Installable Languages' 'LanguageEdition' = 'Language Edition' 'OtherTargetOS' = 'Other Target OS' 'SerialNumber' = 'Serial Number' 'SMBIOSBIOSVersion' = 'SMBIOS BIOS Version' 'SMBIOSMajorVersion' = 'SMBIOS Major Version' 'SMBIOSMinorVersion' = 'SMBIOS Minor Version' 'SMBIOSPresent' = 'SMBIOS Present' 'BIOSVersion' = 'BIOS Version' 'InstallDate' = 'Install Date' 'ListOfLanguages' = 'List of Languages' 'PrimaryBIOS' = 'Primary BIOS' } $FriendlyBiosChars = @{ '28' = 'Int 14h, Serial Services are supported' '19' = 'EDD (Enhanced Disk Drive) Specification is supported' '4' = 'ISA is supported' '3' = 'BIOS Characteristics Not Supported' '38' = '1394 boot is supported' '27' = 'Int 9h, 8042 Keyboard services are supported' '2' = 'Unknown' '39' = 'Smart Battery supported' '26' = 'Int 5h, Print Screen Service is supported' '1' = 'Reserved' '25' = "Int 13h - 3.5' / 2.88 MB Floppy Services are supported" '0' = 'Reserved' '24' = "Int 13h - 3.5' / 720 KB Floppy Services are supported" '12' = 'BIOS shadowing is allowed' '23' = "Int 13h - 5.25' /1.2MB Floppy Services are supported" '13' = 'VL-VESA is supported' '34' = 'AGP is supported' '22' = "Int 13h - 5.25' / 360 KB Floppy Services are supported" '10' = 'APM is supported' '35' = 'I2O boot is supported' '21' = "Int 13h - Japanese Floppy for Toshiba 1.2mb (3.5', 360 RPM) is supported" '11' = 'BIOS is Upgradeable (Flash)' '36' = 'LS-120 boot is supported' '20' = "Int 13h - Japanese Floppy for NEC 9800 1.2mb (3.5', 1k Bytes/Sector, 360 RPM) is supported" '16' = 'Selectable Boot is supported' '37' = 'ATAPI ZIP Drive boot is supported' '17' = 'BIOS ROM is socketed' '30' = 'Int 10h, CGA/Mono Video Services are supported' '14' = 'ESCD support is available' '31' = 'NEC PC-98' '15' = 'Boot from CD is supported' '9' = 'Plug and Play is supported' '32' = 'ACPI supported' '8' = 'PC Card (PCMCIA) is supported' '33' = 'USB Legacy is supported' '7' = 'PCI is supported' '6' = 'EISA is supported' '29' = 'Int 17h, printer services are supported' '18' = 'Boot From PC Card (PCMCIA) is supported' '5' = 'MCA is supported' } $FriendlyOsNames = @{ '54' = 'HP MPE' '28' = 'IRIX' '19' = 'WINCE' '4' = 'DGUX' '55' = 'NextStep' '3' = 'ATTUNIX' '52' = 'MiNT' '38' = 'XENIX' '27' = 'Sequent' '2' = 'MACOS' '53' = 'BeOS' '41' = 'BSDUNIX' '39' = 'VM/ESA' '26' = 'SCO OpenServer' '1' = 'Other' '50' = 'IxWorks' '40' = 'Interactive UNIX' '25' = 'SCO UnixWare' '0' = 'Unknown' '61' = 'TPF' '51' = 'VxWorks' '43' = 'NetBSD' '24' = 'Reliant UNIX' '12' = 'OS/2' '60' = 'VSE' '42' = 'FreeBSD' '23' = 'DC/OS' '13' = 'JavaVM' '45' = 'OS9' '34' = 'TandemNT' '22' = 'OSF' '10' = 'MVS' '44' = 'GNU Hurd' '35' = 'BS2000' '21' = 'NetWare' '11' = 'OS400' '47' = 'Inferno' '36' = 'LINUX' '20' = 'NCR3000' '16' = 'WIN95' '46' = 'MACH Kernel' '37' = 'Lynx' '17' = 'WIN98' '49' = 'EPOC' '30' = 'SunOS' '14' = 'MSDOS' '48' = 'QNX' '31' = 'U6000' '15' = 'WIN3x' '9' = 'AIX' '58' = 'Windows 2000' '32' = 'ASERIES' '8' = 'HPUX' '59' = 'Dedicated' '33' = 'TandemNSK' '7' = 'OpenVMS' '56' = 'PalmPilot' '6' = 'Digital Unix' '57' = 'Rhapsody' '29' = 'Solaris' '18' = 'WINNT' '5' = 'DECNT' } $FriendlySwElement = @{ '3' = 'Running' '2' = 'Executable' '1' = 'Installable' '0' = 'Deployable' } } process { try { $connParams = @{} if ($PSBoundParameters.ContainsKey('Credential')) { $connParams.Credential = $Credential } foreach ($computer in $ComputerName) { try { $connParams.ComputerName = $computer if (-not (Test-Connection -ComputerName $computer -Quiet -Count 1)) { throw "The computer [$computer] is offline and cannot be queried" } Write-Verbose -Message "The computer [$($computer)] is online. Proceeding..." $wmiParams = $connParams + @{ 'Namespace' = $Namespace 'Class' = $Class 'Property' = '*' } if ($PSBoundParameters.ContainsKey('Authentication')) { $wmiParams.Authentication = $Authentication } if ($PSBoundParameters.ContainsKey('Impersonation')) { $wmiParams.Impersonation = $Impersonation } Write-Verbose -Message "Querying the WMI class [$($Class)] in namespace [$($Namespace)] on computer [$($computer)]" if (-not $FriendlyProperties.IsPresent) { Get-WmiObject @wmiParams | Select-Object * } else { $output = [ordered]@{} (Get-WmiObject @wmiParams).psbase.psobject.baseobject.properties | foreach { if ($FriendlyPropNames[$_.Name]) { $output[$FriendlyPropNames[$_.Name]] = $_.Value } elseif ($_.Value -and $_.Value.ToString().EndsWith('000000+000')) { $output[$_.Name] = [Management.ManagementDateTimeconverter]::ToDateTime($_.Value) } elseif ($_.Name -eq 'BIOSCharacteristics') { $output['BIOS Characteristics'] = $_.Value | foreach { $FriendlyBiosChars[[string]$_] } } elseif ($_.Name -eq 'TargetOperatingSystem') { $output['Target Operating System'] = $FriendlyOsNames[[string]$_.Value] } elseif ($_.Name -eq 'SoftwareElementState') { $output['Software Element State'] = $FriendlySwElement[[string]$_.Value] } else { $output[$_.Name] = $_.Value } } [pscustomobject]$output } } catch { Write-Error "Unable to query WMI on [$computer] - $($_.Exception.Message)" } } } catch { Write-Error $_.Exception.Message } finally { Write-Verbose -Message 'WMIX script by GoverLAN complete' } }
combined_dataset/train/non-malicious/Get-WebVideoFile.ps1
Get-WebVideoFile.ps1
<# .SYNOPSIS Download video-files from the specified RSS-feed URL, based on HTML scraping and a regular expression. .DESCRIPTION Download video-files from the specified RSS-feed URL, based on HTML scraping and a regular expression for finding the download URL. Joel Bennett`s Get-WebFile function from poshcode.org, which provides progress status during download, is used for downloading the files. The script was originally created for downloading wmv-files from Microsoft TechNet Edge (http://technet.microsoft.com/en-us/edge). .PARAMETER RssUrl The URL for the RSS feed to process .PARAMETER destination The destination-folder for the downloaded video files. If not specified, the downloaded files will be placed in the current user`s Video-folder ($home\\Videos). .PARAMETER UseOriginalFileName Switch-parameter to specify usage of original filenames. If not specified the RSS title will be used as filename. .PARAMETER UrlRegex A regular expression used to search for video URL`s. If not specified a regular expression for finding wmv-files on TechNet Edge is used. .EXAMPLE .\\Get-WebVideoFile.ps1 -RssUrl "http://technet.microsoft.com/en-us/edge/SyndicationGetTopics/cc543196.aspx?field=Category&value=System Center 2012&ancestor=ff524487&version=MSDN.10" .EXAMPLE .\\Get-WebVideoFile.ps1 -Destination "C:\\TechNet Edge Videos\\" -RssUrl "http://technet.microsoft.com/en-us/edge/SyndicationGetTopics/cc543196.aspx?field=Category&value=System Center 2012&ancestor=ff524487&version=MSDN.10" .EXAMPLE .\\Get-WebVideoFile.ps1 -UseOriginalFileName -RssUrl "http://technet.microsoft.com/en-us/edge/SyndicationGetTopics/cc543196.aspx?field=Category&value=System Center 2012&ancestor=ff524487&version=MSDN.10" .EXAMPLE .\\Get-WebVideoFile.ps1 -Verbose -RssUrl "http://technet.microsoft.com/en-us/edge/SyndicationGetTopics/cc543196.aspx?field=Category&value=System Center 2012&ancestor=ff524487&version=MSDN.10" .NOTES Name: Get-WebVideoFile.ps1 Author: Jan Egil Ring Website: http://blog.powershell.no Usage: 1) Find and browse to the category you want to download files from. Available categories: http://technet.microsoft.com/en-us/edge/ff701756 2) Find the RSS URL by clicking the RSS-icon next to the category title on the top of the website 3) Specify the URL on the URL-parameter: .\\Get-WebVideoFile.ps1 -RssUrl "http://technet.microsoft.com/en-us/edge/Syndication..." You have a royalty-free right to use, modify, reproduce, and distribute this script file in any way you find useful, provided that you agree that the creator, owner above has no warranty, obligations, or liability for such use. VERSION HISTORY: 1.0 05.05.2012 - Initial release #Requires -Version 2.0 #> Param( [Parameter(Mandatory=$true)] [string]$RssUrl, [string]$Destination = "$home\\Videos\\", [switch]$UseOriginalFileName, [regex]$UrlRegex = "(?<url>http://content\\d.catalog.video.msn.com/../../[0-f]{8}-[0-f]{4}-[0-f]{4}-[0-f]{4}-[0-f]{12}(?<file>[^>]*?wmv))" ) # Get-WebFile function from http://poshcode.org/3219 function Get-WebFile { param( $url = (Read-Host "The URL to download"), $fileName = $null, [switch]$Passthru, [switch]$quiet ) if($url.contains("http")) { $req = [System.Net.HttpWebRequest]::Create($url); } else { $URL_Format_Error = [string]"Connection protocol not specified. Recommended action: Try again using protocol (for example 'http://" + $url + "') instead. Function aborting..."; Write-Error $URL_Format_Error; return; } $req.CookieContainer = New-Object System.Net.CookieContainer try{ $res = $req.GetResponse(); } catch { Write-Error $error[0].Exception.InnerException.Message; return; } if($fileName -and !(Split-Path $fileName)) { $fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName } elseif((!$Passthru -and ($fileName -eq $null)) -or (($fileName -ne $null) -and (Test-Path -PathType "Container" $fileName))) { [string]$fileName = ([regex]'(?i)filename=(.*)$').Match( $res.Headers["Content-Disposition"] ).Groups[1].Value $fileName = $fileName.trim("\\/""'") if(!$fileName) { $fileName = $res.ResponseUri.Segments[-1] $fileName = $fileName.trim("\\/") if(!$fileName) { $fileName = Read-Host "Please provide a file name" } $fileName = $fileName.trim("\\/") if(!([IO.FileInfo]$fileName).Extension) { $fileName = $fileName + "." + $res.ContentType.Split(";")[0].Split("/")[1] } } $fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName } if($Passthru) { $encoding = [System.Text.Encoding]::GetEncoding( $res.CharacterSet ) [string]$output = "" } if($res.StatusCode -eq 200) { [long]$goal = $res.ContentLength $reader = $res.GetResponseStream() if($fileName) { try{ $writer = new-object System.IO.FileStream $fileName, "Create" } catch{ Write-Error $error[0].Exception.InnerException.Message; return; } } [byte[]]$buffer = new-object byte[] 4096 [long]$total = [long]$count = 0 do { $count = $reader.Read($buffer, 0, $buffer.Length); if($fileName) { $writer.Write($buffer, 0, $count); } if($Passthru){ $output += $encoding.GetString($buffer,0,$count) } elseif(!$quiet) { $total += $count if($goal -gt 0) { Write-Progress "Downloading $url" "Saving $total of $goal" -id 0 -percentComplete (($total/$goal)*100) } else { Write-Progress "Downloading $url" "Saving $total bytes..." -id 0 } } } while ($count -gt 0) $reader.Close() if($fileName) { $writer.Flush() $writer.Close() } if($Passthru){ $output } } $res.Close(); if($fileName) { ls $fileName } } $wc = New-Object net.webclient [xml]$xml = $wc.DownloadString($rssurl) $itemcount = $xml.rss.channel.item.count $count = 0 $xml.rss.channel.item | foreach { $count ++ Write-Verbose "Processing RSS item $count of $itemcount : $($_.title)" $string = $wc.DownloadString($_.link) if ($string -match $urlregex) { Write-Verbose "URL regex matched" $url = $matches.url } else { Write-Verbose "URL regex did not match" return } if ($UseOriginalFileName) { $file = $url.split("/")[-1] } else { $file = $_.Title # Remove illegal filename characters / ? * : ; { } \\ | foreach ($character in ('/','?','*',':',';','{','}','\\','|')) { $file = $file.Replace($character,'') } $file = $file + '.' + $url.split(".")[-1] } if ($url) { $filepath = "$destination$file" if (Test-Path $filepath) {Write-Verbose "$file is already present"} else { Write-Verbose "Downloading $file" Get-WebFile -url $url -filename $filepath } } }
combined_dataset/train/non-malicious/278.ps1
278.ps1
function Get-NetworkLevelAuthentication { [CmdletBinding()] PARAM ( [Parameter(ValueFromPipeline)] [String[]]$ComputerName = $env:ComputerName, [Alias("RunAs")] [System.Management.Automation.Credential()] $Credential = [System.Management.Automation.PSCredential]::Empty ) BEGIN { TRY { IF (-not (Get-Module -Name CimCmdlets)) { Write-Verbose -Message 'BEGIN - Import Module CimCmdlets' Import-Module CimCmdlets -ErrorAction 'Stop' -ErrorVariable ErrorBeginCimCmdlets } } CATCH { IF ($ErrorBeginCimCmdlets) { Write-Error -Message "BEGIN - Can't find CimCmdlets Module" } } } PROCESS { FOREACH ($Computer in $ComputerName) { TRY { $CIMSessionParams = @{ ComputerName = $Computer ErrorAction = 'Stop' ErrorVariable = 'ProcessError' } IF ($PSBoundParameters['Credential']) { $CIMSessionParams.credential = $Credential } Write-Verbose -Message "PROCESS - $Computer - Testing Connection..." Test-Connection -ComputerName $Computer -count 1 -ErrorAction Stop -ErrorVariable ErrorTestConnection | Out-Null IF ((Test-WSMan -ComputerName $Computer -ErrorAction SilentlyContinue).productversion -match 'Stack: 3.0') { Write-Verbose -Message "PROCESS - $Computer - WSMAN is responsive" $CimSession = New-CimSession @CIMSessionParams $CimProtocol = $CimSession.protocol Write-Verbose -message "PROCESS - $Computer - [$CimProtocol] CIM SESSION - Opened" } ELSE { Write-Verbose -Message "PROCESS - $Computer - Trying to connect via DCOM protocol" $CIMSessionParams.SessionOption = New-CimSessionOption -Protocol Dcom $CimSession = New-CimSession @CIMSessionParams $CimProtocol = $CimSession.protocol Write-Verbose -message "PROCESS - $Computer - [$CimProtocol] CIM SESSION - Opened" } Write-Verbose -message "PROCESS - $Computer - [$CimProtocol] CIM SESSION - Get the Terminal Services Information" $NLAinfo = Get-CimInstance -CimSession $CimSession -ClassName Win32_TSGeneralSetting -Namespace root\cimv2\terminalservices -Filter "TerminalName='RDP-tcp'" [pscustomobject][ordered]@{ 'ComputerName' = $NLAinfo.PSComputerName 'NLAEnabled' = $NLAinfo.UserAuthenticationRequired -as [bool] 'TerminalName' = $NLAinfo.TerminalName 'TerminalProtocol' = $NLAinfo.TerminalProtocol 'Transport' = $NLAinfo.transport } } CATCH { Write-Warning -Message "PROCESS - Error on $Computer" $_.Exception.Message if ($ErrorTestConnection) { Write-Warning -Message "PROCESS Error - $ErrorTestConnection" } if ($ProcessError) { Write-Warning -Message "PROCESS Error - $ProcessError" } } } } END { if ($CimSession) { Write-Verbose -Message "END - Close CIM Session(s)" Remove-CimSession $CimSession } Write-Verbose -Message "END - Script is completed" } }
combined_dataset/train/non-malicious/sample_33_91.ps1
sample_33_91.ps1
function PSConsoleHostReadLine { [System.Diagnostics.DebuggerHidden()] param() ## Get the execution status of the last accepted user input. ## This needs to be done as the first thing because any script run will flush $?. $lastRunStatus = $? Microsoft.PowerShell.Core\Set-StrictMode -Off [Microsoft.PowerShell.PSConsoleReadLine]::ReadLine($host.Runspace, $ExecutionContext, $lastRunStatus) } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCOq8uG0Uyp0Vok # HIN3IrKfRkVvdLzDGC8ThJiUqX4y5qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOSdA5BMt2RMcjzywY8AowJ5 # 5oQcEDpeUNV6duwPX3j2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAriN/5uMAZhA4o8MEEDum2Mf7cfVnjptvVZEZET/5rPM49xxnPcoNHxMf # 2M/6A2AYb4SUWtjAAdFcP9k297StPG5aose5x2YuieFCDgnh3aqv+w/v3wcTJ7hc # y4UjsgLhIys2VPVQacU179DC9i2ev9XCeyH9keB1blhPDQxohUsKV7XN90+JHxz8 # QhHrH5i61an3MFYMPQ6AXMDByFgy6pX1eFXjdCAXFgALoqc/Q8j4k3g0ly26FpKT # dlpf8RAn/JET25kp71VJ/a/6+N0D5PrAyZAMWM/5VUTeNUba30J3g0weAA37JicR # 6uY1cVbDlQxQnOMlfcacfL4DjmG8qaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA1L/U42zaQ5n8e8joBGlfiniIjjG9dZcKHvHLdeIIePQIGZjK+5u3a # GBMyMDI0MDUwMzIzMzAxOC4xMjdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6d/gMTAiGA8yMDI0MDUwMzIyMTQw # OVoYDzIwMjQwNTA0MjIxNDA5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp3+Ax # AgEAMAcCAQACAhT2MAcCAQACAhK1MAoCBQDp4TGxAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBACuXCSpm3JRym4ixuZ09cyRgQ9md9aKvmkqa6P+3EvT9TGvG # olM8L2GihyNPCgMVSqIw0VMicNJQnSR+kU/hI5IYnAkFfR3nXKY7dCdjRPRhwgW3 # enL867E8fnQi6OLLoLMEkibbukcHLgikZ03Towi37XzSudOSZKAjjHwN8WupQD50 # 6WFB+a3q3uImgQxFtpQQE8SjODB6Vs6IWFGtxJdoVaum0j+f+20In/VycMjWCuV5 # ai+XnW1QXtVvlzR+kEUNxOFdLfvM+qTMlvxHUT5FnUcsxpcvFwVWom6CJYo6uYkb # DiK8ftKS9udtokGjbSIQnzh+zGq3H5lmyaPpCWMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCB3xjtlU65iTFiEL/ZjzBn7SUlvvskENovGJRQmt3mpyjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh8 # 41sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgP7RAulOCkE9mkSQwjVSweGhty+dT # NvxYeWdIpsDz8JgwDQYJKoZIhvcNAQELBQAEggIANlJyHRVDHZpVk6zBR8G+uwss # TSgY/Sheg8AhkjLb6Vb3oZij1rSrn2f55RCQocR5MMh63NAeWQMeugCcsQlqPP9t # 9qDB4cjJXWsUir246opCD/Sjk2RRJLLEZJ3cY1k4fyRr5DZ+kWmUQhk1c2eWaqjq # e0Lpjl6fciuH0cf/paoho+K9xW/XDZgjx2sGlEL+LyuhSyb2G82YaBvi5SMV51Ja # coNOX4QCdB1XJm2acHGDL3wMyDNQxa6Kn2PhlF/KIwJBB6jeO2rUTQb4yLjiDSA6 # LvCFUQSgu2iWh5RK/MkZhdAgRh/Pg78oYNlgdlFAzZITnjgP/e1NwjaEGUk6prEy # hiS4jF/C4Vo4ICE31JG+M1vvelKm/RErNfFZ7okLRRqh6DztAshvWpAfulMaSkSi # /eLyGFScf6ns/XpZLZxTa6+K3GssLzI0P/kT6hMONPF0l3kCXTDU/TSOqbzVici1 # tbQw3Bhyht/bKuHEWbYXFcRVRMHE/xEeDD59crRLrp1VayBtdPNjCihu4w01Q0OL # ZuDc9WSGV7X9A4SHrwqSVj/YZXY1izTqwGMZ2Rmiv3olZp+1A2G6DagVkYdwnLuV # eWIGXhlT/PVZgNc23ZJkxD6ZyR4YvMHwGCv69sWwae0JegAR0PohFq3d1bOGA1Lp # ceia3n0/AEnIlKhBgGc= # SIG # End signature block
combined_dataset/train/non-malicious/1622.ps1
1622.ps1
function Out-Menu { param ( [Parameter( Mandatory=$true, ValueFromPipeline=$True, ValueFromPipelinebyPropertyName=$True)] [object[]]$Object, [string]$Header, [string]$Footer, [switch]$AllowCancel, [switch]$AllowMultiple ) if ($input) { $Object = @($input) } if (!$Object) { throw 'Must provide an object.' } Write-Host '' do { $prompt = New-Object System.Text.StringBuilder switch ($true) { {[bool]$Header -and $Header -notmatch '^(?:\s+)?$'} { $null = $prompt.Append($Header); break } $true { $null = $prompt.Append('Choose an option') } $AllowCancel { $null = $prompt.Append(', or enter "c" to cancel.') } $AllowMultiple {$null = $prompt.Append("`nTo select multiple, enter numbers separated by a comma EX: 1, 2") } } Write-Host $prompt.ToString() $nums = $Object.Count.ToString().Length for ($i = 0; $i -lt $Object.Count; $i++) { Write-Host "$("{0:D$nums}" -f ($i+1)). $($Object[$i])" } if ($Footer) { Write-Host $Footer } Write-Host '' if ($AllowMultiple) { $answers = @(Read-Host).Split(',').Trim() if ($AllowCancel -and $answers -match 'c') { return } $ok = $true foreach ($ans in $answers) { if ($ans -in 1..$Object.Count) { $Object[$ans-1] } else { Write-Host 'Not an option!' -ForegroundColor Red Write-Host '' $ok = $false } } } else { $answer = Read-Host if ($AllowCancel -and $answer -eq 'c') { return } $ok = $true if ($answer -in 1..$Object.Count) { $Object[$answer-1] } else { Write-Host 'Not an option!' -ForegroundColor Red Write-Host '' $ok = $false } } } while (!$ok) } Set-Alias -Name Menu -Value Out-Menu
combined_dataset/train/non-malicious/1451.ps1
1451.ps1
function Test-CIdentity { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Name, [Switch] $PassThru ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $identity = [Carbon.Identity]::FindByName( $Name ) if( -not $identity ) { return $false } if( $PassThru ) { return $identity } return $true }
combined_dataset/train/non-malicious/455.ps1
455.ps1
Register-PSFConfigValidation -Name "double" -ScriptBlock { Param ( $Value ) $Result = New-Object PSOBject -Property @{ Success = $True Value = $null Message = "" } try { [double]$number = $Value } catch { $Result.Message = "Not a double: $Value" $Result.Success = $False return $Result } $Result.Value = $number return $Result }
combined_dataset/train/non-malicious/sample_19_50.ps1
sample_19_50.ps1
# # Module manifest for module 'OCI.PSModules.Filestorage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Filestorage.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '85a998bb-f613-464a-af19-f5aaed2d127b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Filestorage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Filestorage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIFilestorageKeyTabs', 'Get-OCIFilestorageExport', 'Get-OCIFilestorageExportSet', 'Get-OCIFilestorageExportSetsList', 'Get-OCIFilestorageExportsList', 'Get-OCIFilestorageFileSystem', 'Get-OCIFilestorageFileSystemsList', 'Get-OCIFilestorageFilesystemSnapshotPoliciesList', 'Get-OCIFilestorageFilesystemSnapshotPolicy', 'Get-OCIFilestorageMountTarget', 'Get-OCIFilestorageMountTargetsList', 'Get-OCIFilestorageOutboundConnector', 'Get-OCIFilestorageOutboundConnectorsList', 'Get-OCIFilestorageReplication', 'Get-OCIFilestorageReplicationsList', 'Get-OCIFilestorageReplicationTarget', 'Get-OCIFilestorageReplicationTargetsList', 'Get-OCIFilestorageSnapshot', 'Get-OCIFilestorageSnapshotsList', 'Invoke-OCIFilestorageEstimateReplication', 'Invoke-OCIFilestoragePauseFilesystemSnapshotPolicy', 'Invoke-OCIFilestorageUnpauseFilesystemSnapshotPolicy', 'Move-OCIFilestorageFileSystemCompartment', 'Move-OCIFilestorageFilesystemSnapshotPolicyCompartment', 'Move-OCIFilestorageMountTargetCompartment', 'Move-OCIFilestorageOutboundConnectorCompartment', 'Move-OCIFilestorageReplicationCompartment', 'New-OCIFilestorageExport', 'New-OCIFilestorageFileSystem', 'New-OCIFilestorageFilesystemSnapshotPolicy', 'New-OCIFilestorageMountTarget', 'New-OCIFilestorageOutboundConnector', 'New-OCIFilestorageReplication', 'New-OCIFilestorageSnapshot', 'Remove-OCIFilestorageExport', 'Remove-OCIFilestorageFileSystem', 'Remove-OCIFilestorageFilesystemSnapshotPolicy', 'Remove-OCIFilestorageMountTarget', 'Remove-OCIFilestorageOutboundConnector', 'Remove-OCIFilestorageReplication', 'Remove-OCIFilestorageReplicationTarget', 'Remove-OCIFilestorageSnapshot', 'Update-OCIFilestorageExport', 'Update-OCIFilestorageExportSet', 'Update-OCIFilestorageFileSystem', 'Update-OCIFilestorageFilesystemSnapshotPolicy', 'Update-OCIFilestorageMountTarget', 'Update-OCIFilestorageOutboundConnector', 'Update-OCIFilestorageReplication', 'Update-OCIFilestorageSnapshot' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Filestorage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/SetDefaultPrinter_2.ps1
SetDefaultPrinter_2.ps1
<# .SYNOPSIS Sets the Default Printer for any user on any machine in active directory. .DESCRIPTION Search AD for Computername; Select User Account and Printer and make that printer the default printer for that user on that computer. .PARAMETER Hostnme This parameter is required and should reflect the computer name (or names) you wish to inventory. This is basically a search criteria because the first thing the script will do is search Active Directory for computer names matching this input. .NOTES Author: Brad Blaylock Version: 3.2 Date: October 3, 2011 Contact: brad.blaylock@gmail.com Details: This Script accepts an AD Query (Computername) in the form of an entire computer name or partial computername as in sbcomp* or *2471wk1 and will find any listed computers that match the criteria in AD. This list will be presented to the user. The user will select the computer they are needing, and click [LOAD]. Load will find all user accounts that have ever had a profile on that computer; Load will also list all printers installed on that computer. The user will then select the user account and printer and click [Set Default]. SetDefault will make the selected printer default for the selected user on the selected computer. 3.0 -If the selected user is not logged into the selected computer at the time, SetDefault will Load the selected user's NTUSER.DAT registry Hive and make the selected changes offline. 3.2 -Added Current User Display Issues: None Discovered as of Yet. } #> #~~~~~~~~Global \\ Script Variables~~~~~~# $Script:ping = new-object System.Net.NetworkInformation.Ping $Script:tcpClient = New-Object System.Net.Sockets.TcpClient $Script:Search = New-Object DirectoryServices.DirectorySearcher([ADSI]“”) $Script:hku = 2147483651 $Script:hklm = 2147483650 $Script:UserPath = "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList" $Script:PrinterPath = "Software\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers" $Script:domain = $env:USERDOMAIN #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~# #~~~~~~~~~~~CUSTOM FUNCTIONS~~~~~~~~~~~~# function Test-Alive($comp) { $stat=$ping.Send("$comp") $reply = $stat.status trap { $False continue; } if($reply -eq "Success") {$True} } function Ping-Port([string]$server, [int]$port) { trap { $False continue; } $tcpClient.Connect($server,$port) if ($tcpClient.Connected) {$True} } Function ADSearch { $Input = $Args[0] $Search.filter = "(&(objectClass=Computer)(Name=$Input))" $Results = $Search.Findall() foreach ($i in $Results) { $Item = $i.properties $lbxServers.Items.Add("$($Item.cn)") } } function LoadUsers { $UserWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv" $Accounts = $UserWMI.EnumKey($hklm,$UserPath) foreach ($Account in $Accounts.snames) { $User = $UserWMI.GetStringValue($hklm,"$UserPath\\$Account","ProfileImagePath") $UserName = ($User.svalue).split("\\")[2] $cbxUserAccount.Items.Add($Username) } $currentuser = (gwmi win32_ComputerSystem -computername $Computer | select UserName).UserName $tbxCurrentUser.Text = $currentuser } Function LoadPrinters { $PrinterWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv" $Printers = $PrinterWMI.EnumKey($hklm,$PrinterPath) foreach ($Printer in $Printers.snames) { $Print = $PrinterWMI.GetStringValue($hklm,"$PrinterPath\\$Printer","Name") $PrinterName = $Print.svalue $cbxPrinter.Items.Add($PrinterName) } } Function SetWithLocalRegHive { #<# #Test OS Version (2000, XP or Vista\\7\\8) $ostest = (gwmi win32_operatingsystem -computername $Computer | select Version | %{$_ -replace "@{Version=", ""} | %{$_ -replace "}", ""}) $tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0) Switch -wildcard ($ostest) { "5.0*" {$tbxStatus.Text = "Windows 2000"; $profileroot = "Documents and Settings"} "5.1*" {$tbxStatus.Text = "Windows XP"; $profileroot = "Documents and Settings"} "6.0*" {$tbxStatus.Text = "Windows Vista"; $profileroot = "Users" } "6.1*" {$tbxStatus.Text = "Windows 7"; $profileroot = "Users"} } Reg Load HKLM\\TemporaryHive \\\\$Computer\\C$\\$profileroot\\$UserName\\NTUSER.DAT $LocalDefPrinter = (New-Object -ComObject Wscript.shell).RegRead("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Device") $localDetailsTest = Test-Path "HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Devices" If (!$LocalDetailsTest) { $tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,64,64) $tbxStatus.Text = "Incomplete User Profile" } Else { $LocalDefPrinterDetails = (New-Object -ComObject Wscript.Shell).RegRead("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Devices\\$PrinterName") $LocalDefaultPrinter = ($LocalDefPrinter).split(",")[0] $Localspool = ($LocalDefPrinterDetails).split(",")[0] $LocalPort = ($LocalDefPrinterDetails).split(",")[1] $LocalNewDefPrinter = $PrinterName + "," + $Localspool + "," + $LocalPort (New-Object -comobject Wscript.Shell).regWrite("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Device", "$LocalNewDefPrinter", "REG_SZ") Reg Unload HKLM\\TemporaryHive $tbxStatus.Text = "Default Printer Changed!" } } Function SetDefaultPrinter { Get-service -ComputerName $Computer -Include 'RemoteRegistry' | Start-Service $ntAccount = new-object System.Security.Principal.NTAccount($domain, $UserName) $sid = $ntAccount.Translate([System.Security.Principal.SecurityIdentifier]) $ActionPath = "$sid\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows" $DevicesPath = "$sid\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Devices" $ActionWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv" $DefPrinter = $ActionWMI.GetStringValue($hku,"$ActionPath","Device") $DefPrinterDetails = $ActionWMI.GetStringValue($hku,"$DevicesPath","$PrinterName") $testRegKey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($hku,$Computer) $testReg = $testRegKey.OpenSubKey("$sid") If (!$testReg) { SetWithLocalRegHive } Else { $DefaultPrinter = ($DefPrinter.svalue).split(",")[0] $spool = ($DefPrinterDetails.svalue).split(",")[0] $Port = ($DefPrinterDetails.svalue).split(",")[1] $NewDefPrinter = $PrinterName + "," + $spool + "," + $Port $ActionWMI.SetStringValue($HKU,"$ActionPath","Device","$NewDefPrinter") #SET THE DEFAULT PRINTER# $tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0) $tbxStatus.Text = "Default Printer Changed!" } $cbxUserAccount.ResetText() $cbxPrinter.ResetText() } #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~# #Generated Form Function function GenerateForm { ######################################################################## # Code Generated By: SAPIEN Technologies PrimalForms (Community Edition) v1.0.8.0 # Generated On: 2/28/2011 11:35 AM # Generated By: bwblaylock ######################################################################## #region Import the Assemblies [reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null [reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null [reflection.assembly]::loadwithpartialname("System.Windows.Forms.VisualStyles") | Out-Null [System.Windows.Forms.Application]::EnableVisualStyles() #endregion #region Generated Form Objects $FrmMain = New-Object System.Windows.Forms.Form $pgbProgress = New-Object System.Windows.Forms.ProgressBar $lblPrinter = New-Object System.Windows.Forms.Label $lblUserAccount = New-Object System.Windows.Forms.Label $lblSearch = New-Object System.Windows.Forms.Label $btnSearch = New-Object System.Windows.Forms.Button $tbxSearch = New-Object System.Windows.Forms.TextBox $btnClose = New-Object System.Windows.Forms.Button $btnLoad = New-Object System.Windows.Forms.Button $tbxServer = New-Object System.Windows.Forms.TextBox $tbxStatus = New-Object System.Windows.Forms.TextBox $tbxCurrentUser = New-Object System.Windows.Forms.TextBox $lbxServers = New-Object System.Windows.Forms.ListBox $btnSetDefault = New-Object System.Windows.Forms.Button $cbxPrinter = New-Object System.Windows.Forms.ComboBox $cbxUserAccount = New-Object System.Windows.Forms.ComboBox $InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState #endregion Generated Form Objects #---------------------------------------------- #Generated Event Script Blocks #---------------------------------------------- #Provide Custom Code for events specified in PrimalForms. $btnClose_OnClick= { $FrmMain.Close() } $lbxServers.add_SelectedIndexChanged({ $tbxStatus.Text = $Null $tbxStatus.Refresh() $tbxServer.Text = $lbxServers.SelectedItem $tbxServer.Refresh() $tbxCurrentUser.Text = $null $tbxCurrentUser.Refresh() $cbxPrinter.Items.clear() $cbxPrinter.Text = $null $cbxPrinter.Refresh() $cbxUserAccount.Items.clear() $cbxUserAccount.Text = $null $cbxUserAccount.Refresh() }) $btnLoad_OnClick= { $tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,255,0) $tbxStatus.Text = "Loading..." $tbxStatus.Refresh() $Computer = $tbxServer.Text If (Test-Alive $Computer) { if ( (ping-port $Computer 135) -and (ping-port $Computer 445) ) { LoadUsers $Computer LoadPrinters $Computer $tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0) $tbxStatus.Text = "Ready..." } Else { $tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,64,64) $tbxStatus.Text = "RPC Server Not Available" } } Else { $tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,64,64) $tbxStatus.Text = "Server Offline" } $pgbProgress.Visible = $False } $btnSetDefault_OnClick= { $Script:Computer = $tbxServer.Text $Script:UserName = $cbxUserAccount.SelectedItem $Script:PrinterName = $cbxPrinter.SelectedItem SetDefaultPrinter } $btnSearch_OnClick= { $lbxServers.Items.Clear() $Criteria = $tbxSearch.Text ADSearch $Criteria } $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $FrmMain.WindowState = $InitialFormWindowState } #---------------------------------------------- #region Generated Form Code #Main Form $FrmMain.CancelButton = $btnClose $FrmMain.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240) $FrmMain.Text = "Set Default Printer" $FrmMain.Name = "FrmMain" $FrmMain.KeyPreview = $True $FrmMain.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 439 $System_Drawing_Size.Height = 272 $FrmMain.ClientSize = $System_Drawing_Size $FrmMain.AcceptButton = $btnSearch $FrmMain.FormBorderStyle = 2 #Search Label $lblSearch.TabIndex = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 100 $System_Drawing_Size.Height = 14 $lblSearch.Size = $System_Drawing_Size $lblSearch.Text = "Search" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 13 $System_Drawing_Point.Y = 9 $lblSearch.Location = $System_Drawing_Point $lblSearch.DataBindings.DefaultDataSourceUpdateMode = 0 $lblSearch.Name = "lblSearch" $FrmMain.Controls.Add($lblSearch) #Printer Label $lblPrinter.TabIndex = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 100 $System_Drawing_Size.Height = 12 $lblPrinter.Size = $System_Drawing_Size $lblPrinter.Text = "Printer:" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 258 $System_Drawing_Point.Y = 185 $lblPrinter.Location = $System_Drawing_Point $lblPrinter.DataBindings.DefaultDataSourceUpdateMode = 0 $lblPrinter.Name = "lblPrinter" $FrmMain.Controls.Add($lblPrinter) #UserAccount Label $lblUserAccount.TabIndex = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 100 $System_Drawing_Size.Height = 13 $lblUserAccount.Size = $System_Drawing_Size $lblUserAccount.Text = "User Account:" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 259 $System_Drawing_Point.Y = 145 $lblUserAccount.Location = $System_Drawing_Point $lblUserAccount.DataBindings.DefaultDataSourceUpdateMode = 0 $lblUserAccount.Name = "lblUserAccount" $FrmMain.Controls.Add($lblUserAccount) #Progress Bar $pgbProgress.DataBindings.DefaultDataSourceUpdateMode = 0 $pgbProgress.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240) $pgbProgress.ForeColor = [System.Drawing.Color]::FromArgb(255,0,255,0) $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 191 $System_Drawing_Size.Height = 8 $pgbProgress.Size = $System_Drawing_Size $pgbProgress.Step = 1 $pgbProgress.TabIndex = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 246 $System_Drawing_Point.Y = 105 $pgbProgress.Location = $System_Drawing_Point $pgbProgress.Style = [System.Windows.Forms.ProgressBarStyle]::Marquee #2 $pgbProgress.MarqueeAnimationSpeed = 50 $pgbProgress.Visible = $False $pgbProgress.Name = "pgbProgress" $FrmMain.Controls.Add($pgbProgress) #Status Textbox $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 168 $System_Drawing_Size.Height = 17 $tbxStatus.Size = $System_Drawing_Size $tbxStatus.DataBindings.DefaultDataSourceUpdateMode = 0 $tbxStatus.TextAlign = 2 $tbxStatus.BorderStyle = 0 $tbxStatus.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",10,1,3,0) $tbxStatus.Name = "tbxStatus" $tbxStatus.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240) $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 259 $System_Drawing_Point.Y = 88 $tbxStatus.Location = $System_Drawing_Point $tbxStatus.TabIndex = 20 $FrmMain.Controls.Add($tbxStatus) #Server Textbox $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 168 $System_Drawing_Size.Height = 17 $tbxServer.Size = $System_Drawing_Size $tbxServer.DataBindings.DefaultDataSourceUpdateMode = 0 $tbxServer.TextAlign = 2 $tbxServer.BorderStyle = 0 $tbxServer.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",10,1,3,1) $tbxServer.Name = "tbxServer" $tbxServer.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240) $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 259 $System_Drawing_Point.Y = 32 $tbxServer.Location = $System_Drawing_Point $tbxServer.TabIndex = 19 $FrmMain.Controls.Add($tbxServer) #CurrentUser Textbox $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 168 $System_Drawing_Size.Height = 17 $tbxCurrentUser.Size = $System_Drawing_Size $tbxCurrentUser.DataBindings.DefaultDataSourceUpdateMode = 0 $tbxCurrentUser.TextAlign = 2 $tbxCurrentUser.BorderStyle = 0 $tbxCurrentUser.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",8,[Drawing.FontStyle]'Italic') #0,3,1) $tbxCurrentUser.Name = "tbxCurrentUser" $tbxCurrentUser.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240) $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 259 $System_Drawing_Point.Y = 60 $tbxCurrentUser.Location = $System_Drawing_Point $tbxCurrentUser.TabIndex = 20 $FrmMain.Controls.Add($tbxCurrentUser) #Search Button $btnSearch.TabIndex = 2 $btnSearch.Name = "btnSearch" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 60 $System_Drawing_Size.Height = 23 $btnSearch.Size = $System_Drawing_Size $btnSearch.UseVisualStyleBackColor = $True $btnSearch.Text = "Search" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 180 $System_Drawing_Point.Y = 26 $btnSearch.Location = $System_Drawing_Point $btnSearch.DataBindings.DefaultDataSourceUpdateMode = 0 $btnSearch.add_Click($btnSearch_OnClick) $FrmMain.Controls.Add($btnSearch) #Load Button $btnLoad.TabIndex = 4 $btnLoad.Name = "btnLoad" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 60 $System_Drawing_Size.Height = 23 $btnLoad.Size = $System_Drawing_Size $btnLoad.UseVisualStyleBackColor = $True $btnLoad.Text = "Load" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 310 $System_Drawing_Point.Y = 120 $btnLoad.Location = $System_Drawing_Point $btnLoad.DataBindings.DefaultDataSourceUpdateMode = 0 $btnLoad.add_Click($btnLoad_OnClick) $FrmMain.Controls.Add($btnLoad) #Close Button $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 351 $System_Drawing_Point.Y = 236 $btnClose.Location = $System_Drawing_Point $btnClose.DataBindings.DefaultDataSourceUpdateMode = 0 $btnClose.DialogResult = 2 $btnClose.add_Click($btnClose_OnClick) $FrmMain.Controls.Add($btnClose) #SetDefault Button $btnSetDefault.TabIndex = 7 $btnSetDefault.Name = "btnSetDefault" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 75 $System_Drawing_Size.Height = 23 $btnSetDefault.Size = $System_Drawing_Size $btnSetDefault.UseVisualStyleBackColor = $True $btnSetDefault.Text = "Set Default" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 259 $System_Drawing_Point.Y = 236 $btnSetDefault.Location = $System_Drawing_Point $btnSetDefault.DataBindings.DefaultDataSourceUpdateMode = 0 $btnSetDefault.add_Click($btnSetDefault_OnClick) $FrmMain.Controls.Add($btnSetDefault) #Search Textbox $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 161 $System_Drawing_Size.Height = 20 $tbxSearch.Size = $System_Drawing_Size $tbxSearch.DataBindings.DefaultDataSourceUpdateMode = 0 $tbxSearch.Name = "tbxSearch" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 13 $System_Drawing_Point.Y = 29 $tbxSearch.Location = $System_Drawing_Point $tbxSearch.TabIndex = 1 $FrmMain.Controls.Add($tbxSearch) $btnClose.TabIndex = 8 $btnClose.Name = "btnClose" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 75 $System_Drawing_Size.Height = 23 $btnClose.Size = $System_Drawing_Size $btnClose.UseVisualStyleBackColor = $True $btnClose.Text = "Close" #Servers Listbox #$lbxServers.UseCompatibleStateImageBehavior = $False $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 227 $System_Drawing_Size.Height = 205 $lbxServers.Size = $System_Drawing_Size $lbxServers.DataBindings.DefaultDataSourceUpdateMode = 0 $lbxServers.Name = "lbxServers" #$lbxServers.View = 3 $lbxServers.TabIndex = 3 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 13 $System_Drawing_Point.Y = 55 $lbxServers.Location = $System_Drawing_Point $FrmMain.Controls.Add($lbxServers) #Printer Combobox $cbxPrinter.FormattingEnabled = $True $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 168 $System_Drawing_Size.Height = 21 $cbxPrinter.Size = $System_Drawing_Size $cbxPrinter.DataBindings.DefaultDataSourceUpdateMode = 0 $cbxPrinter.Name = "cbxPrinter" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 258 $System_Drawing_Point.Y = 200 $cbxPrinter.Location = $System_Drawing_Point $cbxPrinter.TabIndex = 6 $FrmMain.Controls.Add($cbxPrinter) #UserAccount Combobox $cbxUserAccount.FormattingEnabled = $True $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 168 $System_Drawing_Size.Height = 21 $cbxUserAccount.Size = $System_Drawing_Size $cbxUserAccount.DataBindings.DefaultDataSourceUpdateMode = 0 $cbxUserAccount.Name = "cbxUserAccount" $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 258 $System_Drawing_Point.Y = 161 $cbxUserAccount.Location = $System_Drawing_Point $cbxUserAccount.TabIndex = 5 $FrmMain.Controls.Add($cbxUserAccount) #endregion Generated Form Code #Save the initial state of the form $InitialFormWindowState = $FrmMain.WindowState #Init the OnLoad event to correct the initial state of the form $FrmMain.add_Load($OnLoadForm_StateCorrection) #Show the Form $FrmMain.ShowDialog()| Out-Null } #End Function #Call the Function GenerateForm
combined_dataset/train/non-malicious/sample_47_75.ps1
sample_47_75.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Stop-AMTUserConsent { <# .Synopsis Stops the Intel Active Management Technology user consent process .Description This CmdLet stops the user consent process on clients that have Intel Active Management Technology (AMT) firmware version 6.0 and higher. .Notes Supported AMT Firmware Versions: 6.0 and higher. AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Stop-AMTUserConsent vproclient.vprodemo.com -credential $AMTCredential ComputerName Port Status ------------ ---- ------ vproclient.vprodemo.com 16992 Successful #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=1, HelpMessage="Validate Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest or Kerberos User")] [string] $Username, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest or Kerberos Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=3, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential ) Process{ $Results = @() $Obj = new-object psobject try { #create a connection object $Connection = New-Object Intel.Management.Wsman.WsmanConnection if ($Credential.username.Length -gt 0) { $Connection.SetCredentials($Credential.Username, $Credential.Password) } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $Connection.SetCredentials($Username, $Password) } else { $Cred = Get-Credential $Username $Connection.SetCredentials($Cred.Username, $Cred.Password) } } if ($Port.Length -lt 1) { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } if($CertificateName.Length -gt 0) { $Connection.Options.SetClientCertificateByCertificateName($CertificateName) } ForEach ($Comp in $ComputerName) { try { #Attempt Connection with Client $Connection.SetHost($Comp, $Port) #Get opt-in service state $ObjRef = $Connection.NewReference("http://intel.com/wbem/wscim/1/ips-schema/1/IPS_OptInService") $IPSObj = $ObjRef.Get() #Check user consent is required if ($IPSObj.GetProperty("OptInRequired").ToString() -ne 0) { #Check user consent started if ($IPSObj.GetProperty("OptInState").ToString() -ne 0) { #Stop user consent process $InputObj = $ObjRef.CreateMethodInput("CancelOptIn") $OutObj = $ObjRef.InvokeMethod($InputObj); #Note Return Status $ReturnValue = $OutObj.GetProperty("ReturnValue").ToString() #Check opt-in state changed do { #Get opt-in service state $IPSObj = $ObjRef.Get() } while ($IPSObj.GetProperty("OptInState").ToString() -ne 0) } else { $ReturnValue = 0 } } else { #Skip stop user consent operation $ReturnValue = 0 } #Add Member to Object. Include Computer Name, Port and Operation success $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value $Port if ($ReturnValue -eq 0) { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Successful" } else { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Failed" } } catch { if ($_.Exception.GetType().ToString() -eq "Intel.Management.Wsman.WsmanUnreachableException") { # AMT will not have this object when Host Based Configuration is not available $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Status -value "Not Required" } elseif($_.ToString().Contains("Unauthorized")) { $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Status -value "Unauthorized" } else { $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message } } #Append to Result $Results += $Obj } } catch { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message #Append to Result $Results += $Obj } #Write out Results Write-Output $Results } } # SIG # Begin signature block # MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCA/hSIxxCGEeTE # Ie2mGNA5JJg0ZClzt9WT40VmvDP/eKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg0/OUYT0sLfvrY4CA # i9Zt4TBIhtxqQhEPw0G2dvRwGlAwDQYJKoZIhvcNAQEBBQAEggGAiG+/DDch0s4N # AhI+5XlE28wm16jMOPUnqBQ4y8ReXu5eNwJcpc6YJyhQ2erbsGSKhoHZP4Lx11Xq # WF5witFeMOF4mIGBn/3cDJvhBIWm93iMGiNrnpG0YcNk63KW+Kvu/XBH8Iof3WCC # 42xwJVXLJISzXmthCQKwJZImwj0x8zZ+qSz3RXpQ/V6pSE7eMmuy1VNFSuax9WSU # yOFJh5a9ESBRjOe0o4KfW5mIa1YKiNOlhXYD8PLuDsRVA3B7a6+quqUWT8ZzprKi # FcdYoM23BzVfmcpoi88pHAn3zqkiRoYQSzHRoCPZmYad0Hv2Cj28HdjBgBwNBEDi # IRiLkBZU82xSsaGA3HnJl+DHzMKTyDJQiDlh4FnAm2jdLQtxqq9iCiC7Co+BdY4e # QkhJuh9fSQyhhdlLINKDYcImwzpmfscol+WkDfzGEFYAwCda3lIg0G4R9Jan0XdQ # k4IOF0pQf2VEEzZey8fXYMqiIG8NPTrPN9fZ6xHEEFuaZ8KEVU7RoYITgDCCE3wG # CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg # hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIDK5LeUkUzDnVUNcoC1G5ye/lwbOvntnH3VR # mbqBNhIDAhUA4ss3Ttdgg/s324yq/qGiPAjobIgYDzIwMjEwNzE5MTYzMTQ3WqCB # iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl # cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww # KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw # ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN # MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg # TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM # aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l # ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T # B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi # Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL # GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q # BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8 # 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG # 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy # 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK # 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K # ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb # LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U # Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa # ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu # 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC # ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0 # cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js # MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv # LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo # dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz # 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX # VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu # k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA # 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g # XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA # iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f # XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC # A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg # no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q # uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p # sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY # dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo # ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5 # NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx # EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG # A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na # wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV # cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc # 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh # e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI # jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w # ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5 # VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT # IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo # RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr # t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB # eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm # yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG # MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g # BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy # dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 # BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 # LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 # cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd # FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A # w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh # RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4 # OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv # WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH # HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL # nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf # tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p # oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq # /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi # Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD # VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT # YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp # Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG # SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI # hvcNAQkFMQ8XDTIxMDcxOTE2MzE0N1owPwYJKoZIhvcNAQkEMTIEMNiIZTvEAnP6 # mcOnegrGVLjU1TixupmsxmbyttKebG+jzt+3kJ8WPRPp6Tdu3nRYxTCB7QYLKoZI # hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW # W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT # FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD # ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG # 9w0BAQEFAASCAgBUs5VtqTltdtcHNGJO5LnPvKANlFJuDHYYhDN73as2cJdS5/G1 # RHlFkHq4U753sCxLScSVr7K8MOY7lmBSby2/eWVA2coOqq7hWWRwnS6kgHIa91e/ # XlvaBA6xWe8I9s6vS/IzIcSvmPlUSevau5BWsiInzc1s8nk5G8suHcYNzEfzCWDo # Kl/DUaHc2n1OzwoSvmGqtfzkbW2+6xgHbaT4N56kySUa1Cn4cyWp4FZxQDdKufji # DwAjhutgR/DqOqKqzgE2e9eI1sACyn1U6gcv1DlRR6U6CO8bOABwXzp08VwI9rqj # zSF1j0Y7XZaDKTqbEen92+oLkIik/HoaYPvQldQMNxSQMSFYojybbBMvuzROBlde # Dy2NeOUOvIhEDkl5ukU0laMbZJMdq12IB7Vh6ZXln/fjZrY0cJRK+TGpDbg8OLfP # j2i1uzznZKk3OnaRNgzWNVuSDWSgNVQqXFswANr+7vH7HQAkHQeqYHdb34g/LgLr # 5hN/aiEX3g/DeRSaePk/jDuNDG3bHWpDfkE6MNJcXOgwc2yWDlglOtEzACiMuezn # aVyZE4odOLsOG0iERP5c+QxkssHyrG2YPA0gibB46f2rfOnr9DNMnXixOIMNnuIC # EeNzFjHhA28VIAB3k3p07TWJtBP3AuKSNJqIBF6GA8NO1zIQi6TRy9Gvlg== # SIG # End signature block
combined_dataset/train/non-malicious/2378.ps1
2378.ps1
[CmdletBinding()] param ( [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [string]$Computername = 'localhost' ) begin { Set-StrictMode -Version Latest } process { try { $WmiResult = Get-WmiObject -Class Win32_OperatingSystem -ComputerName $ComputerName $LastBoot = $WmiResult.ConvertToDateTime($WmiResult.LastBootupTime) $ObjParams = [ordered]@{'Computername' = $Computername } ((Get-Date) - $LastBoot).psobject.properties | foreach { $ObjParams[$_.Name] = $_.Value } New-Object -TypeName PSObject -Property $ObjParams } catch { Write-Error $_.Exception.Message } } end { }
combined_dataset/train/non-malicious/3445.ps1
3445.ps1
[CmdletBinding()] Param ( [Parameter()] [string]$FilesChanged ) $PathsToCheck = @("src") $PathStringsToIgnore = @( "Test", ".sln", "Nuget.config", ".psd1", "Netcore", "Stack" ) Write-Host "Files changed: $FilesChanged" $FilesChangedList = @() while ($true) { $Idx = $FilesChanged.IndexOf(";") if ($Idx -lt 0) { $FilesChangedList += $FilesChanged break } $TempFile = $FilesChanged.Substring(0, $Idx) Write-Host "Adding '$TempFile' to 'FilesChangedList'" $FilesChangedList += $TempFile $FilesChanged = $FilesChanged.Substring($Idx + 1) } if ([string]::IsNullOrEmpty($FilesChanged) -or ($FilesChangedList.Count -eq 300)) { Write-Host "The list of files changed is empty or is past the 300 file limit; skipping check for change log entry" return } $ChangeLogs = $FilesChangedList | where { $_ -like "*ChangeLog.md*" } $UpdatedServicePaths = New-Object System.Collections.Generic.HashSet[string] foreach ($ChangeLog in $ChangeLogs) { if ($ChangeLog -eq "ChangeLog.md") { continue } elseif ($ChangeLog -like "src/ServiceManagement*") { $UpdatedServicePaths.Add("src/ServiceManagement") | Out-Null } elseif ($ChangeLog -like "src/Storage*") { $UpdatedServicePaths.Add("src/Storage") | Out-Null } else { $SplitPath = @() while ($true) { $Idx = $ChangeLog.IndexOf("/") if ($Idx -lt 0) { $SplitPath += $ChangeLog break } $TempPath = $ChangeLog.Substring(0, $Idx) Write-Host "Adding '$TempPath' to 'SplitPath'" $SplitPath += $TempPath $ChangeLog = $ChangeLog.Substring($Idx + 1) } $BasePath = $SplitPath[0],$SplitPath[1],$SplitPath[2] -join "/" Write-Host "Change log '$ChangeLog' processed to base path '$BasePath'" $UpdatedServicePaths.Add($BasePath) | Out-Null } } $message = "The following services were found to have a change log update:`n" $UpdatedServicePaths | % { $message += "`t- $_`n" } Write-Host "$message`n" $FlaggedFiles = @() foreach ($File in $FilesChangedList) { if ($File -like "*ChangeLog.md*" -or $File -like "*.psd1*" -or $File -like "*.sln") { continue } if (($PathsToCheck | where { $File.StartsWith($_) } | Measure-Object).Count -gt 0 -and ` ($PathStringsToIgnore | where { $File -like "*$_*" } | Measure-Object).Count -eq 0 -and ` ($UpdatedServicePaths | where { $File.StartsWith($_) } | Measure-Object).Count -eq 0) { $FlaggedFiles += $File } } if ($FlaggedFiles.Count -gt 0) { $message = "The following files were flagged for not having a change log entry:`n" $FlaggedFiles | % { $message += "`t- $_`n" } Write-Host $message throw "Modified files were found with no update to their change log. Please add a snippet to the affected modules' change log." }
combined_dataset/train/non-malicious/sample_16_66.ps1
sample_16_66.ps1
# # Module manifest for module 'OCI.PSModules.Accessgovernancecp' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Accessgovernancecp.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c71dab6b-b390-499f-9d71-506da8082df7' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Accessgovernancecp Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Accessgovernancecp.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAccessgovernancecpGovernanceInstance', 'Get-OCIAccessgovernancecpGovernanceInstanceConfiguration', 'Get-OCIAccessgovernancecpGovernanceInstancesList', 'Move-OCIAccessgovernancecpGovernanceInstanceCompartment', 'New-OCIAccessgovernancecpGovernanceInstance', 'Remove-OCIAccessgovernancecpGovernanceInstance', 'Update-OCIAccessgovernancecpGovernanceInstance', 'Update-OCIAccessgovernancecpGovernanceInstanceConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Accessgovernancecp' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3411.ps1
3411.ps1
function Get-RandomLetters { return -join ((97..122) | Get-Random -Count 5 | % {[char]$_}) } function Get-WebsiteName { return "someuniqueWebsite$(Get-RandomLetters)" } function Get-TrafficManagerProfileName { return "someuniqueTrafficManager" } function Get-WebHostPlanName { return "hostplan231" } function Get-ResourceGroupName { return "rg$(Get-RandomLetters)" } function Get-BackupName { return "someuniqueBackupName" } function Get-AseName { return "someuniqueAseName" } function Get-Location { $namespace = "Microsoft.Web" $type = "sites" $location = Get-AzureRmResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type} if ($location -eq $null) { return "West US" } else { return $location.Locations[0] } } function Get-SecondaryLocation { $namespace = "Microsoft.Web" $type = "sites" $location = Get-AzureRmResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type} if ($location -eq $null) { return "East US" } else { return $location.Locations[1] } return "EastUS" } function Clean-Website($resourceGroup, $websiteName) { $result = Remove-AzureRmWebsite -ResourceGroupName $resourceGroup.ToString() -WebsiteName $websiteName.ToString() -Force } function PingWebApp($webApp) { try { $result = Invoke-WebRequest $webApp.HostNames[0] $statusCode = $result.StatusCode } catch [System.Net.WebException ] { $statusCode = $_.Exception.Response.StatusCode } return $statusCode } function Get-SasUri { param ([string] $storageAccount, [string] $storageKey, [string] $container, [TimeSpan] $duration, [Microsoft.WindowsAzure.Storage.Blob.SharedAccessBlobPermissions] $type) $uri = "https://$storageAccount.blob.core.windows.net/$container" $destUri = New-Object -TypeName System.Uri($uri); $cred = New-Object -TypeName Microsoft.WindowsAzure.Storage.Auth.StorageCredentials($storageAccount, $storageKey); $destBlob = New-Object -TypeName Microsoft.WindowsAzure.Storage.Blob.CloudPageBlob($destUri, $cred); $policy = New-Object Microsoft.WindowsAzure.Storage.Blob.SharedAccessBlobPolicy; $policy.Permissions = $type; $policy.SharedAccessExpiryTime = (Get-Date).Add($duration); $uri += $destBlob.GetSharedAccessSignature($policy); return $uri; }
combined_dataset/train/non-malicious/sample_11_99.ps1
sample_11_99.ps1
# # Module manifest for module 'OCI.PSModules.Oce' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Oce.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '044c91ad-abeb-41a8-9bf6-cf7d46964003' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Oce Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oce.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOceInstance', 'Get-OCIOceInstancesList', 'Get-OCIOceWorkRequest', 'Get-OCIOceWorkRequestErrorsList', 'Get-OCIOceWorkRequestLogsList', 'Get-OCIOceWorkRequestsList', 'Move-OCIOceInstanceCompartment', 'New-OCIOceInstance', 'Remove-OCIOceInstance', 'Update-OCIOceInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oce' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/get-windowsproductkey.ps1
get-windowsproductkey.ps1
function get-windowsproductkey([string]$computer) { $Reg = [WMIClass] ("\\\\" + $computer + "\\root\\default:StdRegProv") $values = [byte[]]($reg.getbinaryvalue(2147483650,"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion","DigitalProductId").uvalue) $lookup = [char[]]("B","C","D","F","G","H","J","K","M","P","Q","R","T","V","W","X","Y","2","3","4","6","7","8","9") $keyStartIndex = [int]52; $keyEndIndex = [int]($keyStartIndex + 15); $decodeLength = [int]29 $decodeStringLength = [int]15 $decodedChars = new-object char[] $decodeLength $hexPid = new-object System.Collections.ArrayList for ($i = $keyStartIndex; $i -le $keyEndIndex; $i++){ [void]$hexPid.Add($values[$i]) } for ( $i = $decodeLength - 1; $i -ge 0; $i--) { if (($i + 1) % 6 -eq 0){$decodedChars[$i] = '-'} else { $digitMapIndex = [int]0 for ($j = $decodeStringLength - 1; $j -ge 0; $j--) { $byteValue = [int](($digitMapIndex * [int]256) -bor [byte]$hexPid[$j]); $hexPid[$j] = [byte] ([math]::Floor($byteValue / 24)); $digitMapIndex = $byteValue % 24; $decodedChars[$i] = $lookup[$digitMapIndex]; } } } $STR = '' $decodedChars | % { $str+=$_} $STR } get-windowsproductkey .
combined_dataset/train/non-malicious/sample_32_1.ps1
sample_32_1.ps1
# Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. # IMPORTANT: Do not invoke this file directly. Please instead run eng/common/TestResources/New-TestResources.ps1 from the repository root. param ( [hashtable] $AdditionalParameters = @{}, [hashtable] $DeploymentOutputs ) $ErrorActionPreference = 'Stop' $PSNativeCommandUseErrorActionPreference = $true if ($CI) { if (!$AdditionalParameters['deployResources']) { Write-Host "Skipping post-provisioning script because resources weren't deployed" return } az login --service-principal -u $DeploymentOutputs['AZIDENTITY_CLIENT_ID'] -p $DeploymentOutputs['AZIDENTITY_CLIENT_SECRET'] --tenant $DeploymentOutputs['AZIDENTITY_TENANT_ID'] az account set --subscription $DeploymentOutputs['AZIDENTITY_SUBSCRIPTION_ID'] } Write-Host "Building container" $image = "$($DeploymentOutputs['AZIDENTITY_ACR_LOGIN_SERVER'])/azidentity-managed-id-test" Set-Content -Path "$PSScriptRoot/Dockerfile" -Value @" FROM mcr.microsoft.com/oss/go/microsoft/golang:latest as builder ENV GOARCH=amd64 GOWORK=off COPY . /azidentity WORKDIR /azidentity/testdata/managed-id-test RUN go mod tidy RUN go build -o /build/managed-id-test . RUN GOOS=windows go build -o /build/managed-id-test.exe . FROM mcr.microsoft.com/mirror/docker/library/alpine:3.16 RUN apk add gcompat COPY --from=builder /build/* . RUN chmod +x managed-id-test CMD ["./managed-id-test"] "@ # build from sdk/azidentity because we need that dir in the context (because the test app uses local azidentity) docker build -t $image "$PSScriptRoot" az acr login -n $DeploymentOutputs['AZIDENTITY_ACR_NAME'] docker push $image $rg = $DeploymentOutputs['AZIDENTITY_RESOURCE_GROUP'] # ACI is easier to provision here than in the bicep file because the image isn't available before now Write-Host "Deploying Azure Container Instance" $aciName = "azidentity-test" az container create -g $rg -n $aciName --image $image ` --acr-identity $($DeploymentOutputs['AZIDENTITY_USER_ASSIGNED_IDENTITY']) ` --assign-identity [system] $($DeploymentOutputs['AZIDENTITY_USER_ASSIGNED_IDENTITY']) ` --role "Storage Blob Data Reader" ` --scope $($DeploymentOutputs['AZIDENTITY_STORAGE_ID']) ` -e AZIDENTITY_STORAGE_NAME=$($DeploymentOutputs['AZIDENTITY_STORAGE_NAME']) ` AZIDENTITY_STORAGE_NAME_USER_ASSIGNED=$($DeploymentOutputs['AZIDENTITY_STORAGE_NAME_USER_ASSIGNED']) ` AZIDENTITY_USER_ASSIGNED_IDENTITY=$($DeploymentOutputs['AZIDENTITY_USER_ASSIGNED_IDENTITY']) ` FUNCTIONS_CUSTOMHANDLER_PORT=80 Write-Host "##vso[task.setvariable variable=AZIDENTITY_ACI_NAME;]$aciName" # Azure Functions deployment: copy the Windows binary from the Docker image, deploy it in a zip Write-Host "Deploying to Azure Functions" $container = docker create $image docker cp ${container}:managed-id-test.exe "$PSScriptRoot/testdata/managed-id-test/" docker rm -v $container Compress-Archive -Path "$PSScriptRoot/testdata/managed-id-test/*" -DestinationPath func.zip -Force az functionapp deploy -g $rg -n $DeploymentOutputs['AZIDENTITY_FUNCTION_NAME'] --src-path func.zip --type zip Write-Host "Creating federated identity" $aksName = $DeploymentOutputs['AZIDENTITY_AKS_NAME'] $idName = $DeploymentOutputs['AZIDENTITY_USER_ASSIGNED_IDENTITY_NAME'] $issuer = az aks show -g $rg -n $aksName --query "oidcIssuerProfile.issuerUrl" -otsv $podName = "azidentity-test" $serviceAccountName = "workload-identity-sa" az identity federated-credential create -g $rg --identity-name $idName --issuer $issuer --name $idName --subject system:serviceaccount:default:$serviceAccountName Write-Host "Deploying to AKS" az aks get-credentials -g $rg -n $aksName az aks update --attach-acr $DeploymentOutputs['AZIDENTITY_ACR_NAME'] -g $rg -n $aksName Set-Content -Path "$PSScriptRoot/k8s.yaml" -Value @" apiVersion: v1 kind: ServiceAccount metadata: annotations: azure.workload.identity/client-id: $($DeploymentOutputs['AZIDENTITY_USER_ASSIGNED_IDENTITY_CLIENT_ID']) name: $serviceAccountName namespace: default --- apiVersion: v1 kind: Pod metadata: name: $podName namespace: default labels: app: $podName azure.workload.identity/use: "true" spec: serviceAccountName: $serviceAccountName containers: - name: $podName image: $image env: - name: AZIDENTITY_STORAGE_NAME value: $($DeploymentOutputs['AZIDENTITY_STORAGE_NAME_USER_ASSIGNED']) - name: AZIDENTITY_USE_WORKLOAD_IDENTITY value: "true" - name: FUNCTIONS_CUSTOMHANDLER_PORT value: "80" nodeSelector: kubernetes.io/os: linux "@ kubectl apply -f "$PSScriptRoot/k8s.yaml" Write-Host "##vso[task.setvariable variable=AZIDENTITY_POD_NAME;]$podName"
combined_dataset/train/non-malicious/4191.ps1
4191.ps1
[CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$ReportFile = 'Applications.csv', [ValidateNotNullOrEmpty()][string]$ReportFileLocation = 'c:\windows\waller' ) function Get-AddRemovePrograms { [CmdletBinding()][OutputType([string])] param () $Architecture = Get-Architecture if ($Architecture -eq "32-bit") { $Applications = Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\" | ForEach-Object -Process { $_.GetValue("DisplayName") } } else { $Applicationsx86 = Get-ChildItem -Path "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\" | ForEach-Object -Process { $_.GetValue("DisplayName") } $Applicationsx64 = Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\" | ForEach-Object -Process { $_.GetValue("DisplayName") } $Applications = $Applicationsx86 + $Applicationsx64 } $Applications = $Applications | Sort-Object $Applications = $Applications | Select-Object -Unique Return $Applications } function Get-Architecture { [CmdletBinding()][OutputType([string])] param () $OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture $OSArchitecture = $OSArchitecture.OSArchitecture Return $OSArchitecture } function Get-RelativePath { [CmdletBinding()][OutputType([string])] param () $Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" Return $Path } function New-LogFile { [CmdletBinding()] param () If ($ReportFileLocation[$ReportFileLocation.Count - 1] -eq '\') { $File = $ReportFileLocation + $ReportFile } else { $File = $ReportFileLocation + '\' + $ReportFile } if ((Test-Path $File) -eq $true) { Remove-Item -Path $File -Force | Out-Null } if ((Test-Path $File) -eq $false) { New-Item -Path $File -ItemType file -Force | Out-Null } } function New-Report { param ( [ValidateNotNullOrEmpty()][object]$Applications ) If ($ReportFileLocation[$ReportFileLocation.Count - 1] -eq '\') { $File = $ReportFileLocation + $ReportFile } else { $File = $ReportFileLocation + '\' + $ReportFile } If ((Test-Path $File) -eq $true) { $Applications Out-File -FilePath $File -InputObject $Applications -Append -Force -Encoding UTF8 } else { Write-Host "Report File not present to generate report" -ForegroundColor Red } } function Update-AppList { [CmdletBinding()][OutputType([object])] param ( [ValidateNotNullOrEmpty()][object]$Applications ) $RelativePath = Get-RelativePath $File = $RelativePath + "ExclusionList.txt" If ((Test-Path $File) -eq $true) { $Exclusions = Get-Content -Path $File $SortedExclusions = $Exclusions | Sort-Object $SortedExclusions = $SortedExclusions | Select-Object -Unique $Sorted = !(Compare-Object $Exclusions $SortedExclusions -SyncWindow 0) If ($Sorted -eq $false) { Do { Try { $Exclusions = Get-Content -Path $File $SortedExclusions = $Exclusions | Sort-Object $SortedExclusions = $SortedExclusions | Select-Object -Unique $Sorted = !(Compare-Object $Exclusions $SortedExclusions -SyncWindow 0) If ($Sorted -eq $false) { Out-File -FilePath $File -InputObject $SortedExclusions -Force -Encoding UTF8 -ErrorAction SilentlyContinue } $Success = $true } Catch { $Success = $false } } while ($Success -eq $false) } $Applications = $Applications | Where-Object { ($_ -notin $SortedExclusions) -and ($_ -ne "") -and ($_ -ne $null) } } Return $Applications } Clear-Host New-LogFile $Apps = Get-AddRemovePrograms $Apps = Update-AppList -Applications $Apps New-Report -Applications $Apps