full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/4280.ps1
4280.ps1
Function Get-FireWallRule { Param ( $Name, $Direction, $Enabled, $Protocol, $profile, $action, $grouping ) $Rules = (New-object -comObject HNetCfg.FwPolicy2).rules If ($name) { $rules= $rules | where-object {$_.name -like $name}} If ($direction) {$rules= $rules | where-object {$_.direction -eq $direction}} If ($Enabled) {$rules= $rules | where-object {$_.Enabled -eq $Enabled}} If ($protocol) {$rules= $rules | where-object {$_.protocol -eq $protocol}} If ($profile) {$rules= $rules | where-object {$_.Profiles -bAND $profile}} If ($Action) {$rules= $rules | where-object {$_.Action -eq $Action}} If ($Grouping) {$rules= $rules | where-object {$_.Grouping -Like $Grouping}} $rules } Function Get-FireWallRulesAll { Netsh.exe Advfirewall show allprofiles $spaces1 = " " * 71 $spaces2 = " " * 64 Get-FireWallRule -Enabled $true | sort name | ` format-table -property ` @{label="Name" + $spaces1 ; expression={$_.name} ; width=75}, ` @{label="Action" ; expression={$Fwaction[$_.action]} ; width=6 }, ` @{label="Direction" ; expression={$fwdirection[$_.direction]} ; width=9 }, ` @{label="Protocol" ; expression={$FwProtocols[$_.protocol]} ; width=8 }, ` @{label="Local Ports" ; expression={$_.localPorts} ; width=11}, ` @{label="Application Name" + $spaces2 ; expression={$_.applicationname} ; width=80} }
combined_dataset/train/non-malicious/sample_50_57.ps1
sample_50_57.ps1
# # Module manifest for module 'OCI.PSModules.Generativeaiinference' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Generativeaiinference.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '59f586b4-fbb6-47fb-9d66-75ada44be30d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Generativeaiinference Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeaiinference.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Invoke-OCIGenerativeaiinferenceEmbedText', 'Invoke-OCIGenerativeaiinferenceSummarizeText', 'New-OCIGenerativeaiinferenceText' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeaiinference' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_61_2.ps1
sample_61_2.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ function Remove-ServiceFabricApplicationType { <# .SYNOPSIS Removes all the applications for the specified service fabric application type & version and unregisters the applications type and version. .DESCRIPTION Removes all the applications for the specified service fabric application type & version and unregisters the applications type and version. .NOTES WARNING: This script file is invoked by Visual Studio. Its parameters must not be altered. .PARAMETER ApplicationTypeName The name of the application type to remove. .PARAMETER ApplicationTypeVersion The version of the application type to remove. .EXAMPLE Remove-ApplicationType.ps1 -ApplicationTypeName 'MyApplicationType' -ApplicationTypeVersion '1.0.0.0' #> Param ( [Parameter(Mandatory=$true)] [String] $ApplicationTypeName, [Parameter(Mandatory=$true)] [String] $ApplicationTypeVersion ) Write-Host "Removing application type..." try { [void](Test-ServiceFabricClusterConnection) } catch { Write-Warning "Unable to Verify connection to Service Fabric cluster." throw } $nodes = Get-ServiceFabricNode foreach ($app in Get-ServiceFabricApplication) { if ($app.ApplicationTypeName -eq $ApplicationTypeName -and $app.ApplicationTypeVersion -eq $ApplicationTypeVersion) { try { $app | Remove-ServiceFabricApplication -Force } catch [System.TimeoutException] { # Catch operation timeout and continue with force remove replica. } foreach ($node in $nodes) { [void](Get-ServiceFabricDeployedReplica -NodeName $node.NodeName -ApplicationName $app.ApplicationName | Remove-ServiceFabricReplica -NodeName $node.NodeName -ForceRemove) } } } $reg = Get-ServiceFabricApplicationType -ApplicationTypeName $ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $ApplicationTypeVersion } if ($reg) { $reg | Unregister-ServiceFabricApplicationType -ApplicationTypeVersion $ApplicationTypeVersion -Force } Write-Host "Finished removing the application type" } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDzslfuKADb8KjT # nAcLb76G3U3PWS65zaDijbWow04TEKCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPMCYqkzFtPBEdDyJm1qDx6/ # ukQg7tah6lzToJW7YJeqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAFNcDIGwYzpqOAl3Kobv/qPkvlM6mEAY4ijiylZ9H+1ETzKGaYS07ifj3 # tnJeUk1IfASwttw8c+vNSK07t5ukBynX4IifD/OeB7e3kg9fjreU7//+csZvzljI # X3WEohlMpw/Itp74tUvVXIAsW+TX9YVtMoPGfJtdLzuVVFVAr4U+h7SJE+B9El/I # s0X8Ifxyrr/oPK8oHIpxSOREtiKWMLd+dawAG/pA8buVr0lZZA9BeTtOaafHYqbz # NkGBPTNwBaE0CiNjoIdWurW/o5eQ2cunTuDJ6qH9NnWrUACMqKNUsvKp8syUzl/u # EDq4Tib8Bd3T1UMEnbOWk42b3icrUaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDGh9ixrxVVUBy6Rj9IbH4c1Zr0dZ4zafX9OCRJVODJiwIGZSiGVNck # GBMyMDIzMTAxNzE4MzMyMi4yMTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAdebDR5XLoxRjgABAAAB1zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MzdaFw0yNDAyMDExOTEyMzdaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDErGCkN2X/UvuNCcfl0yVBNo+LIIyzG7A10X5kVgGn # p9s8mf4aZsukZu5rvLs7NqaNExcwnPuHIWdp6kswja1Yw9SxTX+E0leq+WBucIRK # WdcMumIDBgLE0Eb/3/BY95ZtT1XsnnatBFZhr0uLkDiT9HgrRb122sm7/YkyMigF # kT0JuoiSPXoLL7waUE9teI9QOkojqjRlcIC4YVNY+2UIBM5QorKNaOdz/so+TIF6 # mzxX5ny2U/o/iMFVTfvwm4T8g/Yqxwye+lOma9KK98v6vwe/ii72TMTVWwKXFdXO # ysP9GiocXt38cuP9c8aE1eH3q4FdGTgKOd0rG+xhCgsRF8GqLT7k58VpQnJ8u+yj # RW6Lomt5Rcropgf9EH8e4foDUoUyU5Q7iPgwOJxYhoKxRjGZlthDmp5ex+6U6zv9 # 5rd973668pGpCku0IB43L/BTzMcDAV4/xu6RfcVFwarN/yJq5qfZyMspH5gcaTCV # AouXkQTc8LwtfxtgIz53qMSVR9c9gkSnxM5c1tHgiMX3D2GBnQan95ty+CdTYAAh # jgBTcyj9P7OGEMhr3lyaZxjr3gps6Zmo47VOTI8tsSYHhHtD8BpBog39L5e4/lDJ # g/Oq4rGsFKSxMXuIRZ1E08dmX67XM7qmvm27O804ChEmb+COR8Wb46MFEEz62ju+ # xQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFK6nwLv9WQL3NIxEJyPuJMZ6MI2NMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBSBd3UJ+IsvdMCX+K7xqHa5UBtVC1CaXZv # HRd+stW0lXA/dTNneCW0TFrBoJY59b9fnbTouPReaku2l3X5bmhsao6DCRVuqcmh # VPAZySXGeoVfj52cLGiyZLEw6TQzu6D++vjNOGmSibO0KE9Gdv8hQERx5RG0KgrT # mk8ckeC1VUqueUQHKVCESqTDUDD8dXTLWCmm6HqmQX6/+gKDSXggwpc75hi2AbKS # o4tulMwTfXJdGdwrsiHjkz8nzIW/Z3PnMgGFU76KuzYFV0XyH9DTS/DPO86RLtQj # A5ZlVGymTPfTnw7kxoiLJN/yluMHIkHSzpaJvCiqX+Dn1QGREEnNIZeRekvLourq # PREIOTm1bJRJ065c9YX7bJ0naPixzm5y8Y2B+YIIEAi4jUraOh3oE7a4JvIW3Eg3 # oNqP7qhpd7xMLxq2WnM+U9bqWTeT4VCopAhXu2uGQexdLq7bWdcYwyEFDhS4Z9N0 # uw3h6bjB7S4MX96pfYSEV0MKFGOKbmfCUS7WemkuFqZy0oNHPPx+cfdNYeSF6bhO # PHdsro1EVd3zWIkdD1G5kEDPnEQtFartM8H+bv5zUhAUJs8qLzuFAdBZQLueD9XZ # eynjQKwEeAz63xATICh8tOUM2zMgSEhVL8Hm45SB6foes4BTC0Y8SZWov3Iahtvw # yHFbUqs1YjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAx # W9uizG3hEY89uL2uu+X+mG/rdaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6NjzdTAiGA8yMDIzMTAxNzExNTAx # M1oYDzIwMjMxMDE4MTE1MDEzWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDo2PN1 # AgEAMAoCAQACAg3fAgH/MAcCAQACAhOhMAoCBQDo2kT1AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKoK2wUwxy/dy6ilNGOns2b1lA/TQcUejCKXFKrYqDTS # GD7AnU8HkDXe5keqG9/VXhBQQVTBeAr0tC1XGpBDhoLojMbniwWF7+ximf+zcQ+V # xnvvODG/PRbF5WUWDW3kAS+FcDpeeJyCEh0X3K8xNsMIMRtkx5VDiI2aN/PqwNtO # nEPkEN9Ko87YeSeANnQD9pB/R5TBY3CIID90a4smAQhcYaTe80Px3pH5Tk+s+xH9 # WhV4lThu8W/9ngpt0fF3WiFPYOVn5N1Luwiqy8u7cNjVR4JPNSMOTDni8Z1aWvLA # CPAQ4WTuPjPFLJK99+iMGj08Ro3Msrvj9Tf9i+FAAl8xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdebDR5XLoxRjgABAAAB # 1zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBqDGgr8GSLKdOzpvVhTfgD6AQJ1PlW/PO52qUZmWym # czCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIJzePl5LXn1PiqNjx8YN7TN1 # ZI0d1ZX/2zRdnI97rJo7MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHXmw0eVy6MUY4AAQAAAdcwIgQgyL73ma9OdQ2wI2yEwGE2J/4u # lsOO4sJcj4adQ8CrC8swDQYJKoZIhvcNAQELBQAEggIAGpsUJVuKnwyZ7B/iy28w # LNMQr9PrYHtsiBldl4wY1fFJOFddf+ATD4pkIqZLK1dt0eRB522LeDB93SS9J2vm # rLlCPcox9uQk0XcftMKy0L4TUdmGVKZKPeninq22hmxXyTQaDdBwy3HJk3n7mqQu # SGmOjOB4f+Cf6vFWL9Hv3UBeb/LgTthPTwfkRjdryytFmx0epnxKCfqRUglZ9ZRu # nlRnSoPlv6SVW1zI43g1L6aGrQQZlkCOmq8ocXYL2d5KNX4g7SyjTqGN1syooxrf # FZWTmMNnZX3hT0/J/hj0dHKWpFpYuDy4oGf/9mKH0BntC0PyRJ5r4IFFFKeStJ9i # TAQ5Ag7LYGRh+BV+KnpljbS1wBBFCKjVFQNfdM9/NcGz7qHVXAocJMP+uHHV+eKw # zSxwOGBG0LXCPH78up9tcXRWeNY4O2xuTmd7/JQF+wLc36EPkK3J15unHherQ1ab # jzIjN6Xw8n0Rxka8q1foz91xW0In10WUSjBMnJBbzW95mrOwK4xbzFKhJ9nH3mHx # yQv+pu9XBaiVa+cLYRDkcp/CKsGW+xY8FFh224icoNnogPOumBLFYxH8kYLS8QIR # i5668a/MChElXwp2mP7k32ARMQiKthwlGzmyxxFxvNwIz+IDCTCQFqChsa4xLYNv # cqWtRiY07arFmE709Q9ZtkA= # SIG # End signature block
combined_dataset/train/non-malicious/219.ps1
219.ps1
function Get-ParentGroup { [CmdletBinding()] PARAM( [Parameter(Mandatory = $true)] [String[]]$Name ) BEGIN { TRY{ if(-not(Get-Module Activedirectory -ErrorAction Stop)){ Write-Verbose -Message "[BEGIN] Loading ActiveDirectory Module" Import-Module ActiveDirectory -ErrorAction Stop} } CATCH { Write-Warning -Message "[BEGIN] An Error occured" Write-Warning -Message $error[0].exception.message } } PROCESS { TRY { FOREACH ($Obj in $Name) { $ADObject = Get-ADObject -LDAPFilter "(|(anr=$obj)(distinguishedname=$obj))" -Properties memberof -ErrorAction Stop IF($ADObject) { if ($ADObject.count -gt 1){Write-Warning -Message "More than one object found with the $obj request"} FOREACH ($Account in $ADObject) { Write-Verbose -Message "[PROCESS] $($Account.name)" $Account | Select-Object -ExpandProperty memberof | ForEach-Object -Process { $CurrentObject = Get-Adobject -LDAPFilter "(|(anr=$_)(distinguishedname=$_))" -Properties Samaccountname Write-Output $CurrentObject | Select-Object Name,SamAccountName,ObjectClass, @{L="Child";E={$Account.samaccountname}} Write-Verbose -Message "Inception - $($CurrentObject.distinguishedname)" Get-ParentGroup -OutBuffer $CurrentObject.distinguishedname } } } ELSE { } } } CATCH{ Write-Warning -Message "[PROCESS] An Error occured" Write-Warning -Message $error[0].exception.message } } END { Write-Verbose -Message "[END] Get-NestedMember" } }
combined_dataset/train/non-malicious/sample_10_3.ps1
sample_10_3.ps1
# # Module manifest for module 'OCI.PSModules.Apmsynthetics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmsynthetics.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b2901c22-2813-4f21-ae94-09094aa70e0e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmsynthetics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmsynthetics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmsyntheticsDedicatedVantagePoint', 'Get-OCIApmsyntheticsDedicatedVantagePointsList', 'Get-OCIApmsyntheticsMonitor', 'Get-OCIApmsyntheticsMonitorResult', 'Get-OCIApmsyntheticsMonitorsList', 'Get-OCIApmsyntheticsOnPremiseVantagePoint', 'Get-OCIApmsyntheticsOnPremiseVantagePointsList', 'Get-OCIApmsyntheticsPublicVantagePointsList', 'Get-OCIApmsyntheticsScript', 'Get-OCIApmsyntheticsScriptsList', 'Get-OCIApmsyntheticsWorker', 'Get-OCIApmsyntheticsWorkersList', 'Invoke-OCIApmsyntheticsAggregateNetworkData', 'New-OCIApmsyntheticsDedicatedVantagePoint', 'New-OCIApmsyntheticsMonitor', 'New-OCIApmsyntheticsOnPremiseVantagePoint', 'New-OCIApmsyntheticsScript', 'New-OCIApmsyntheticsWorker', 'Remove-OCIApmsyntheticsDedicatedVantagePoint', 'Remove-OCIApmsyntheticsMonitor', 'Remove-OCIApmsyntheticsOnPremiseVantagePoint', 'Remove-OCIApmsyntheticsScript', 'Remove-OCIApmsyntheticsWorker', 'Update-OCIApmsyntheticsDedicatedVantagePoint', 'Update-OCIApmsyntheticsMonitor', 'Update-OCIApmsyntheticsOnPremiseVantagePoint', 'Update-OCIApmsyntheticsScript', 'Update-OCIApmsyntheticsWorker' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmsynthetics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/datareader to dataset.ps1
datareader to dataset.ps1
@@This code was copied from the site http://www.ti4fun.com @@----------------------------------------------------------- Public Function ConvDataReaderToDataTable(Byval command As System.Data.SqlClient.SqlCommand) As System.Data.DataTable Dim datatable As New System.Data.DataTable Dim reader As System.Data.SqlClient.SqlDataReader = command.ExecuteReader() Try datatable.Load(reader) Finally reader.Close() command.Connection = Nothing End Try Return datatable End Function @@This code was copied from the site http://www.ti4fun.com @@-----------------------------------------------------------
combined_dataset/train/non-malicious/3551.ps1
3551.ps1
$containerName = "pstestwlvm1bca8" $resourceGroupName = "pstestwlRG1bca8" $vaultName = "pstestwlRSV1bca8" $resourceId = "/subscriptions/da364f0f-307b-41c9-9d47-b7413ec45535/resourceGroups/pstestwlRG1bca8/providers/Microsoft.Compute/virtualMachines/pstestwlvm1bca8" $policyName = "HourlyLogBackup" function Enable-Protection( $vault, $container) { $policy = Get-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name $policyName $protectableItems = Get-AzRecoveryServicesBackupProtectableItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType "MSSQL"; Enable-AzRecoveryServicesBackupProtection ` -VaultId $vault.ID ` -Policy $policy ` -ProtectableItem $protectableItems[1] $item = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType MSSQL; return $item } function Cleanup-Vault( $vault, $item, $container) { Disable-AzureRmRecoveryServicesBackupProtection ` -VaultId $vault.ID ` -Item $item ` -RemoveRecoveryPoints ` -Force; Unregister-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -Container $container }
combined_dataset/train/non-malicious/sample_15_92.ps1
sample_15_92.ps1
@{ GUID = "A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author = "PowerShell" CompanyName = "Microsoft Corporation" Copyright = "Copyright (c) Microsoft Corporation." ModuleVersion = "7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion = "3.0" FunctionsToExport = @() CmdletsToExport = "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage" AliasesToExport = @() NestedModules = "Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWNhoZaJT5e8B1 # Q5H12dpK/1OtcJflTmkUj5T5DHeB1KCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII6raYMkfTa+0mZhw9hnCu1d # zwZDXcInd9yxKhuSWdG7MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAcSY2M36DPhx3ZSwPbWOQsZPOhWDCMg1czUOgnK/2pUNGyYgR6VcvFRib # 35rHXvwvj0BU2kzD6b/q4YREjNyBHeBSM5lD+NGb74k9bO8NbDKQ2eUr/xvoNtCr # THwrOnCsq7/B2qJfYaptVCWDkkiTF5sh7hsKzITC+pTT1x2Wog3UtTgsH67Sj1kY # j35e3DVPIGopgQQ/rjVGMQcMLHlNawYMW/i2iXs46Wt5Ns5jfdN0KqoEtCr386yS # x+ZeGCWeSK/0AQPakW216cJs7xo7I3jFHEQ6ixP9DGw1J45knHSxP0/fPmlXbljk # FMwvfzq+CYrgQHBQ0jp176J65foLs6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDRcqYLfGMzX91Dl5/K5Da/y9SM2INaoRIheu6dEgM0HAIGZwf/oHmE # GBMyMDI0MTAxNjE1MjgzMy45ODFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rm93DAiGA8yMDI0MTAxNjA0MjE0 # OFoYDzIwMjQxMDE3MDQyMTQ4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqub3c # AgEAMAoCAQACAhWPAgH/MAcCAQACAhNyMAoCBQDquw9cAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBACbJPRmIdE3WH1e57OYJ8eFfsWWTi/YXUdV83U5CZtOS # AT6Fp/tIe3Npo2sHXIHAV7q5+deIIsTzIppKrue349SQ7W2wwNggNLY+MMJpRyT7 # Z5w/WpEgAzZCZQMOzH9TrEs1QQiNQxMNip/ArKuiZydCnN2lpno6WR8AFUB4sBDI # r/lyChJEjnNFXJZv1n2yX3o9vKtBiCQLrdf/M+1MhxBX3eTDKBsmIleEC7Vwmu/W # BmiYgoraqVWsojYgmuUo2M+OGVOTyamb1Tq3BZll3I1vcySiHyHMHQfZM3cN1Mw/ # eMNII+HFu/eW1ZN6PlO+Z1enQzzQ3CfW1MCcEEoK6rYxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCEhPDMN+n6iKM3D5APTAhygj4BUybp6cmF5i5eeT/o # ajCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQg63C7e/ZiDyhwIXuZIZxhp/gw # jbHP1Li08qLFXSPFeH4wDQYJKoZIhvcNAQELBQAEggIALAkaaOwEFnyorE1qn1jq # bCKMFyq//Dud3aq4H5AEUnlANQ4oym9G7p8vXhgmYoAJQt/LXmrpPVYGb5LIJ+Mo # W4zXZ8JpcU2CFVExPoke1sMwZBkWvpT5YxBrQt1MDVB5KxXzMkTQBQQxlnjVycBA # XfwO46HXYVEuNU38ljONCfsMEp4O52Z2M/H9nHyhpgniopb5Mofd3xrrE89a+VgK # ivRaVockUegOvCfGSCLiYnvZcRKkHGmJxreWVU0gaUUj3bbmrINcpo3fwyC1Eig1 # Mu5zc1cHrRhBEtnv6Jc5zBZc7UqLdCHYuZq/lnU2OGFo6Wl+bR+Lehc92uDWBJfo # 8Dmul1sQz87Np9P+uIbJpc+z6unRNnLLqiFT8IZSHOBxJSu670Ez0mtO3bLb8KWN # CraTzIgQm0UGHjJLJyoyJFYCBv3Xi0lFTnC7TiQLcGiCQSxU+BiZkoEl23aQ+KPP # bWJ1WyjaEwtLOS7jUPMs/1xhzPvCZ3zKN+hjRDn0aiHzC2sR6TWdzcguKMzWdb4X # wm+2ONyeVbkE+gZt9Gs3ysQiWy35Vamt/aAj5v5bVzRVASPsVurRotRz0kde2uBJ # vcdXI6g6e4ubU7ccwjSLroZueJS0nTNk3Upo/qIbVtHk5EMW17Wx92ImgxJIkXXt # JDA59zg9Qop1yFIK65McnWU= # SIG # End signature block
combined_dataset/train/non-malicious/3379.ps1
3379.ps1
function Initialize-Mappings { param ( [Parameter(Mandatory = $false)] [string[]]$PathsToIgnore, [Parameter(Mandatory = $false)] [Hashtable]$CustomMappings ) $Mappings = [ordered]@{} Get-ChildItem -Path $Script:RootPath -File | ForEach-Object { $Mappings[$_.Name] = @() } Get-ChildItem -Path $Script:RootPath -Directory | Where-Object { $_.Name -ne "src" } | ForEach-Object { $Mappings[$_.Name] = @() } Get-ChildItem -Path $Script:SrcPath -File | ForEach-Object { $Mappings["src/$_.Name"] = @() } if ($CustomMappings -ne $null) { $CustomMappings.GetEnumerator() | ForEach-Object { $Mappings[$_.Name] = $_.Value } } if ($null -ne $PathsToIgnore) { foreach ($Path in $PathsToIgnore) { $Mappings[$Path] = $null $Mappings.Remove($Path) } } return $Mappings } function Format-Json { param ( [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [hashtable]$InputObject ) $Tab = " " return $InputObject | ConvertTo-Json -Depth 4 -Compress | ForEach-Object { $_.Replace("{", "{`n$Tab").Replace("],", "],`n$Tab").Replace(":[", ":[`n$Tab$Tab").Replace("`",", "`",`n$Tab$Tab").Replace("`"]", "`"`n$Tab]").Replace("]}", "]`n}") } } function Create-Key { param ( [Parameter(Mandatory = $true)] [string]$FilePath ) $Key = "" $TempFilePath = $FilePath while ($true) { $TempItem = Get-Item -Path $TempFilePath $Name = $TempItem.Name $Key = $Name + "/" + $Key if ($Name -eq "src") { break } if ($null -ne $TempItem.Parent) { $TempFilePath = $TempItem.Parent.FullName } else { $TempFilePath = $TempItem.Directory.FullName } } return $Key } function Create-ProjectToFullPathMappings { $Mappings = [ordered]@{} foreach ($ServiceFolder in $Script:ServiceFolders) { $CsprojFiles = Get-ChildItem -Path $ServiceFolder -Filter "*.csproj" -Recurse foreach ($CsprojFile in $CsprojFiles) { $Mappings[$CsprojFile.BaseName] = $CsprojFile.FullName } } return $Mappings } function Create-SolutionToProjectMappings { $Mappings = [ordered]@{} foreach ($ServiceFolder in $Script:ServiceFolders) { $SolutionFiles = Get-ChildItem -Path $ServiceFolder.FullName -Filter "*.sln" foreach ($SolutionFile in $SolutionFiles) { $Mappings = Add-ProjectDependencies -Mappings $Mappings -SolutionPath $SolutionFile.FullName } } return $Mappings } function Add-ProjectDependencies { param ( [Parameter(Mandatory = $true)] [hashtable]$Mappings, [Parameter(Mandatory = $true)] [string]$SolutionPath ) $CommonProjectsToIgnore = @( "Authentication", "Authentication.ResourceManager", "Authenticators", "ScenarioTest.ResourceManager", "TestFx", "Tests" ) $ProjectDependencies = @() $Content = Get-Content -Path $SolutionPath $Content | Select-String -Pattern "`"[a-zA-Z0-9.]*`"" | ForEach-Object { $_.Matches[0].Value.Trim('"') } | Where-Object { $CommonProjectsToIgnore -notcontains $_ } | ForEach-Object { $ProjectDependencies += $_ } $Mappings[$SolutionPath] = $ProjectDependencies return $Mappings } function Create-ProjectToSolutionMappings { $Mappings = [ordered]@{} foreach ($ServiceFolder in $Script:ServiceFolders) { $Mappings = Add-SolutionReference -Mappings $Mappings -ServiceFolderPath $ServiceFolder.FullName } return $Mappings } function Add-SolutionReference { param ( [Parameter(Mandatory = $true)] [hashtable]$Mappings, [Parameter(Mandatory = $true)] [string]$ServiceFolderPath ) $CsprojFiles = Get-ChildItem -Path $ServiceFolderPath -Filter "*.csproj" -Recurse | Where-Object { $_.FullName -notlike "*Stack*" -and $_.FullName -notlike "*.Test*" } foreach ($CsprojFile in $CsprojFiles) { $Key = $CsprojFile.BaseName $Mappings[$Key] = @() $Script:SolutionToProjectMappings.Keys | Where-Object { $Script:SolutionToProjectMappings[$_] -contains $Key } | ForEach-Object { $Mappings[$Key] += $_ } } return $Mappings } function Create-ModuleMappings { $PathsToIgnore = @("tools") $CustomMappings = @{} $Script:ModuleMappings = Initialize-Mappings -PathsToIgnore $PathsToIgnore -CustomMappings $CustomMappings foreach ($ServiceFolder in $Script:ServiceFolders) { $Key = "src/$($ServiceFolder.Name)" $ModuleManifestFiles = Get-ChildItem -Path $ServiceFolder.FullName -Filter "*.psd1" -Recurse | Where-Object { $_.FullName -notlike "*.Test*" -and ` $_.FullName -notlike "*Release*" -and ` $_.FullName -notlike "*Debug*" -and ` $_.Name -like "Az.*" } if ($null -ne $ModuleManifestFiles) { $Value = @() $ModuleManifestFiles | ForEach-Object { $Value += $_.BaseName } $Script:ModuleMappings[$Key] = $Value } } } function Create-CsprojMappings { $PathsToIgnore = @("tools") $CustomMappings = @{} $Script:CsprojMappings = Initialize-Mappings -PathsToIgnore $PathsToIgnore -CustomMappings $CustomMappings foreach ($ServiceFolder in $Script:ServiceFolders) { Add-CsprojMappings -ServiceFolderPath $ServiceFolder.FullName } } function Add-CsprojMappings { param ( [Parameter(Mandatory = $true)] [string]$ServiceFolderPath ) $Key = Create-Key -FilePath $ServiceFolderPath $CsprojFiles = Get-ChildItem -Path $ServiceFolderPath -Filter "*.csproj" -Recurse if ($null -ne $CsprojFiles) { $Values = New-Object System.Collections.Generic.HashSet[string] foreach ($CsprojFile in $CsprojFiles) { $Project = $CsprojFile.BaseName foreach ($Solution in $Script:ProjectToSolutionMappings[$Project]) { foreach ($ReferencedProject in $Script:SolutionToProjectMappings[$Solution]) { $TempValue = $Script:ProjectToFullPathMappings[$ReferencedProject] if (-not [string]::IsNullOrEmpty($TempValue)) { $Values.Add($TempValue) | Out-Null } } } } $Script:CsprojMappings[$Key] = $Values } } $Script:RootPath = (Get-Item -Path $PSScriptRoot).Parent.FullName $Script:SrcPath = Join-Path -Path $Script:RootPath -ChildPath "src" $Script:ServiceFolders = Get-ChildItem -Path $Script:SrcPath -Directory $Script:ProjectToFullPathMappings = Create-ProjectToFullPathMappings $Script:SolutionToProjectMappings = Create-SolutionToProjectMappings $Script:ProjectToSolutionMappings = Create-ProjectToSolutionMappings Create-ModuleMappings Create-CsprojMappings $Script:ModuleMappings | Format-Json | Set-Content -Path (Join-Path -Path $Script:RootPath -ChildPath "ModuleMappings.json") $Script:CsprojMappings | Format-Json | Set-Content -Path (Join-Path -Path $Script:RootPath -ChildPath "CsprojMappings.json")
combined_dataset/train/non-malicious/sample_24_74.ps1
sample_24_74.ps1
[CmdletBinding()] param ( [Parameter(Mandatory)] [string]$MergeCommitSha ) Import-Module $(Join-Path $PSSCriptRoot Helpers.psm1) class DeleteEvent { [string]$Author; [string]$Sha; [DateTime]$CommitDate; DeleteEvent([string]$author, [string]$sha, [string]$datestring) { $this.Sha = $sha try { $this.CommitDate = $($datestring | ConvertTo-DateTime | Get-Date) } catch { } $this.Author = $author } } class PRFile { [string]$FileName; [string]$PreviousFileName; [string]$Content; [string[]]$Blame; [string[]]$Patch; [string[]]$Commits; [string[]]$WordDiff; [string]$PreviousContent; [bool]$Added; [bool]$Deleted; PRFile([string]$path, [string]$old) { $this.FileName = $path; $this.PreviousFileName = $old $this.Commits = @(); $this.Added = $false; $this.Deleted = $false; } } class PRCommit { [string]$Sha; [string]$MergeCommitSha; [datetime]$CommitDate; [string[]]$Patch; [string]$Author; [string]$PreviousFileName; [string]$NewFileName; [string]$Content; PRCommit([string]$sha, [string]$merge, [string]$datestring, [string[]]$patch, [string]$author, [string]$old, [string]$new) { $this.Sha = $; $this.MergeCommitSha = $merge; try { $this.CommitDate = $($datestring | ConvertTo-DateTime | Get-Date); } catch { } $this.Patch = $patch; $this.Author = $author; $this.NewFileName = $new; $this.PreviousFileName = $old; } } try { $jsonObjects = @() if (![String]::IsNullOrEmpty($MergeCommitSha)) { $addedFiles = $($(git log --name-status --oneline --format='' --diff-filter=A "$($MergeCommitSha)^-")3>&1 2>&1) foreach ($file in $addedFiles) { if ("$file" -match "(?mi)fatal:") { continue; } $file = @($file -split "(?mi)^[RA][ \t]+")[-1] if (![String]::IsNullOrEmpty($file)) { $prFile = New-Object PRFile -ArgumentList $file, "" try { $prFile.Content = $($(git show "$($MergeCommitSha):$($file)") -join "`r`n")3>&1 2>&1 $prFile.PreviousContent = $($(git show "$($MergeCommitSha)^:$($file)") -join "`r`n") 3>&1 2>&1 $prFile.Blame = @(($(git blame -e --date=short $file $MergeCommitSha)) 3>&1 2>&1) $prFile.Patch = @($(git diff --output-indicator-new=~ --output-indicator-old=^ "$($MergeCommitSha)^-" -- $file) 3>&1 2>&1) $prFile.WordDiff = @($(git diff --word-diff --output-indicator-new=~ --output-indicator-old=^ "$($MergeCommitSha)^-" -- $file 3>&1 2>&1)) $prFile.Commits = @((git log --oneline --format='%H||%aE||%aN' $MergeCommitSha~...$MergeCommitSha) 3>&1 2>&1) } catch { continue } $prFile.Added = $true $jsonObjects += $prFile } } $deletedFiles = $($(git log --name-status --oneline --format='' --diff-filter=D "$($MergeCommitSha)^-")3>&1 2>&1) foreach ($file in $deletedFiles) { if ("$file" -match "(?mi)fatal:") { continue; } $file = @($file -split "(?mi)^[RD][ \t]+")[-1] if (![String]::IsNullOrEmpty($file)) { try { $prFile = New-Object PRFile -ArgumentList $file, "" $prFile.Deleted = $true $jsonObjects += $prFile } catch { continue } } } $files = $($(git log --name-only --oneline --format='' --diff-filter=Mad "$($MergeCommitSha)^-" 3>&1 2>&1) | Microsoft.PowerShell.Utility\Select-Object -Unique) foreach ($file in $files) { if ("$file" -match "(?mi)fatal:") { continue; } $prFile = New-Object PRFile -ArgumentList $file, "" $file = @($file -split "(?mi)^[MR][ \t]+")[-1] if (![String]::IsNullOrEmpty($file)) { try { $prFile.Content = $($(git show "$($MergeCommitSha):$($file)") -join "`r`n")3>&1 2>&1 $prFile.PreviousContent = $($(git show "$($MergeCommitSha)^:$($file)") -join "`r`n") 3>&1 2>&1 $prFile.Blame = @(($(git blame -e --date=short $file $MergeCommitSha)) 3>&1 2>&1) $prFile.Patch = @($(git diff --output-indicator-new=~ --output-indicator-old=^ "$($MergeCommitSha)^-" -- $file) 3>&1 2>&1) $prFile.WordDiff = @($(git diff --word-diff --output-indicator-new=~ --output-indicator-old=^ "$($MergeCommitSha)^-" -- $file 3>&1 2>&1)) $prFile.Commits = @((git log --oneline --format='%H||%aE||%aN' $MergeCommitSha~...$MergeCommitSha) 3>&1 2>&1) } catch { continue } $jsonObjects += $prFile } } } return Microsoft.PowerShell.Utility\ConvertTo-Json -Depth 20 $jsonObjects } catch { Microsoft.PowerShell.Utility\Write-Host $_ $_.InvocationInfo } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDr+Wg++70c9JqE # rz7mFj8WIaWPN6ge/DGXKwHqQqNeHKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILwvc9D3euvLhZ6BUU1/keGa # /UvsYyA7YIDUPvGkG+cDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAY7IJqVPOExSW8vYWTgKMoHOpl0MKl/PGM6dpa2kardS3uzCzIzRmz9xz # SDSiaAYFvN9G5WpVRAdPoz9R1u5LiTnq2+vdiqQoE2OtkT4dOBScIZgxfMJdijKz # a4yLJ/x58qH2+6+yKY/3HcUbIDAHT5odXQlNWrMuu5JNcfTzz32WReJNA0l4GzUz # AKWlwSLkhavtepS8XRb6ItXwp77xg89FAgaQtEwgiKcM1GS+RVBFUP08RjHrfjlH # xFfJU+Js4fMKASjWB5bFNkqkhT/sjkMMHD9qSwMugZqKlGZ4lFvbSOAMfug7s2Jh # 7KRXkJEhj/fgcae3qM5eykSIMR2vDKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB22owBXDkiXhIYQbOsm8UgcsB+gpBmlYdjM68NCkmH5QIGZc4rK+Mq # GBMyMDI0MDIyMjE4NTc1MC43MTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6YHj8TAiGA8yMDI0MDIyMjE1MTcw # NVoYDzIwMjQwMjIzMTUxNzA1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpgePx # AgEAMAoCAQACAhv4AgH/MAcCAQACAhPHMAoCBQDpgzVxAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBABeHBZwf9nAXsvpSvAUxDFLyPcvbzKF5jVTt8WUgx/N6 # tcUK3QaP18R6QnTlaGEcABhUWTWLEJtzidClDZhVpkBwR/oCSi3ZF+Ui8rFnzW6x # v6DXp5ldLtmZqkUN22xxvCEgZU/ji+ruSolwWq7Ou2Kb3g4dzTeeBNzs2DmgJDyy # MP/ptGNaWF3dXzadZfvh9+4kJgkMRC8eBATp5fymENUJ5qr2KhMohY79WX4yROr2 # P1KwAQQLWiQ0/twYKTmEdTUywD0WV4qz1IMf8lBVJtJP1bZM9ZaGHtL4g1xoo5/d # v53psY8oCbyF8Pl1JlPoSChyg+kDLwsDe2PFoJp/8zExggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB # 7TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBJpfLoWW5AveGYixfXOVi8Bc3xGnrEwNfrgpMkjL3n # VjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrI # wrsSDrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJyHVRPSranhgDN+jA+EO5/Fh # mg7T9dyo5+QnS7TFtDAwDQYJKoZIhvcNAQELBQAEggIAdd3J1Le5qKCZ2GKu7xf2 # oDtnDtQyS+Ld0ushBFpRtXfghHTvAQamF6L222g4T0WQXmlb+wJii/rNh1SxjFqq # 3wRnWLzaWFgh75ELluNF4Ncm1B/Wch1Qk6n3SKROuFIGfR7bzY4d3hr8u0ko8e8u # 8ueLVGpSebQYGolUH81fSG03cBCWv1WVAuLBxDl92/wkiTsWc+GwmkNIHndE7hb6 # DB8tkGKYd2k4KsqHygYk0HZ8gEVacJTUQ17KouqcTNtjqjhtKmBkidhXydsS9ePm # DEaOsJsbxxkB9rxNs2LhDdz9R0NuKcqQaDshWIzo+T+6hUlNJUxr8B+fC20zfO8I # XXcYaA1Y/I3u2I1td4AYQvZUOu1L9YXMhMLdmrp+jGNo9fssFppqwx9C2HrBzzGC # X1nhPUa1MIQDjqQCxqPmQUTv5PXl2aPS+/We7PS0ey/wW7JQqrrk3VKD1VANAFk8 # DDiCSsipfdrI+Wrp2hNQCQULg+lXCixzW6K48XazjaqoGmh2+GoDWcM7wn6Zfpdw # 0TymqPReyEfGDhuabBBxs/89xH6gm9EryJqrIrQ4JACL3bZ9Ogb7tpNBzAdJDiqq # T1b5j/mMpfJYvW315LRdke5JO0D2r/UVFfOJr/1h9RJCM+yC1U8gW024LLzLqe5U # mXCqxzS3qDSAEqyAl2gU1Is= # SIG # End signature block
combined_dataset/train/non-malicious/TabExpansion_15.ps1
TabExpansion_15.ps1
## Tab-Completion ################# ## Please dot souce this script file. ## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list. ## ## What this can do is: ## ## [datetime]::n<tab> ## [datetime]::now.d<tab> ## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell" ## $c = [ref]$a; $d = [ref]$b,$c ## $d[0].V<tab>[0][0].Get<tab> ## $d[1].V<tab>[0,0].tos<tab> ## $function:a<tab> ## $env:a<tab> ## [System.Type].a<tab> ## [datetime].Assembly.a<tab> ## ).a<tab> # shows System.Type properties and methods... ## #native command name expansion ## fsu<tab> ## #command option name expansion (for fsutil ipconfig net powershell only) ## fsutil <tab> ## ipconfig <tab> ## net <tab> ## powershell <tab> ## #TypeNames and Type accelerators expansion ## [Dec<tab> ## [system.Man<tab>.auto<tab>.p<tab> ## New-Object -TypeName IO.Dir<tab> ## New-Object System.win<tab>.for<tab>.bu<tab> ## #ProgIDs expansion ## New-Object -Com shel<tab> ## #Enum option expansion ## Set-ExecutionPolicy <tab> ## Set-ExecutionPolicy All<tab> ## Set-ExcusionPolisy -ex <tab> ## Get-TraceSource Inte<tab> ## iex -Errora <tab> -wa Sil<tab> ## #WmiClasses expansion ## Get-WmiObject -class Win32_<tab> ## gwmi __Instance<tab> ## #Encoding expansion ## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab> ## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab> ## #PSProvider name expansion ## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab> ## Get-PSProvider <tab> ## pwd -psp al<tab> ## #PSDrive name expansion ## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab> ## Get-PSDrive <tab> ## pwd -psd <tab> ## #PSSnapin name expansion ## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab> ## Get-Command -PSSnapin <tab> ## Remove-PSSnapin <tab> ## Get-PSSnapin M<tab> ## #Eventlog name and expansion ## Get-Eventlog -Log <tab> ## Get-Eventlog w<tab> ## #Eventlog's entrytype expansion ## Get-EventLog -EntryType <tab> ## Get-EventLog -EntryType Er<tab> ## Get-EventLog -Ent <tab> ## #Service name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab> ## New-Service -DependsOn <tab> ## New-Service -Dep e<tab> ## Get-Service -n <tab> ## Get-Service <tab>,a<tab>,p<tab> ## gsv <tab> ## #Service display name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab> ## Get-Service -Dis <tab> ## gsv -Dis <tab>,w<tab>,b<tab> ## #Cmdlet and Topic name expansion (this also support default help function and man alias) ## Get-Help [-Name] about_<tab> ## Get-Help <tab> ## #Category name expansion (this also support default help function and man alias) ## Get-Help -Category c<tab>,<tab> ## #Command name expansion ## Get-Command [-Name] <tab> ## Get-Command -Name <tab> ## gcm a<tab>,<tab> ## #Scope expansion ## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias ## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab> ## Clear-Variable -Scope G<tab> ## Set-Alias -s <tab> ## #Process name expansion ## [Get-Process | Stop-Process] [-Name] <tab> ## Stop-Process -Name <tab> ## Stop-Process -N pow<tab> ## Get-Process <tab> ## ps power<tab> ## #Trace sources expansion ## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab> ## #Trace -ListenerOption expansion ## [Set-TraceSource | Trace-Command] -ListenerOption <tab> ## Set-TraceSource -Lis <tab>,n<tab> ## #Trace -Option expansion ## [Set-TraceSource | Trace-Command] -Option <tab> ## Set-TraceSource -op <tab>,con<tab> ## #ItemType expansion ## New-Item -Item <tab> ## ni -ItemType d<tab> ## #ErrorAction and WarningAction option expansion ## CMDLET [-ErrorAction | -WarningAction] <tab> ## CMDLET -Errora s<tab> ## CMDLET -ea con<tab> ## CMDLET -wa <tab> ## #Continuous expansion with comma when parameter can treat multiple option ## # if there are spaces, occur display bug in the line ## # if strings contains '$' or '-', not work ## Get-Command -CommandType <tab>,<tab><tab>,cm<tab> ## pwd -psp <tab>,f<tab>,va<tab> ## Get-EventLog -EntryType <tab>,i<tab>,s<tab> ## #Enum expansion in method call expression ## # this needs one or more spaces after left parenthesis or comma ## $str = "day night" ## $str.Split( " ",<space>rem<tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR ## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success ## $type = [System.Type] ## $type.GetMembers(<space>Def<tab> ## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab> ## # this can do continuous enum expansion with comma and no spaces ## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>" ## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab> ## #Better '$_.' expansion when cmdlet output objects or method return objects ## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> } ## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB } ## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> } ## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" } ## $data = Get-Process ## $data[2,4,5] | % { $_.<tab> ## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type ## #Property name expansion by -Property parameter ## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object | ## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab> ## Select-Object -ExcludeProperty <tab> ## Select-Object -ExpandProperty <tab> ## gcm Get-Acl|select -exp Par<tab> ## ps |group na<tab> ## ls | ft A<tab>,M<tab>,L<tab> ## #Hashtable key expansion in the variable name and '.<tab>' ## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} } ## $hash.pow<tab>.pro<tab> ## #Parameter expansion for function, filter and script ## man -f<tab> ## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1 ## .\\foobar.ps1 -<tab> -b<tab> ## #Enum expansion for function, filter and scripts ## # this can do continuous enum expansion with comma and no spaces ## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab> ## #Enum expansion for assignment expression ## #needs space(s) after '=' and comma ## #strongly-typed with -as operator and space(s) ## $ErrorActionPreference =<space><tab> ## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3 ## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab> ## #Path expansion with variable and '\\' or '/' ## $PWD\\../../<tab>\\<tab> ## "$env:SystemDrive/pro<tab>/<tab> ## #Operator expansion which starts with '-' ## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2' ## 1..9 -co<tab> 5 ## #Keyword expansion ## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } } ## #Variable name expansion (only global scope) ## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab> ## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab> ## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab> ## Tee-Object -Variable <tab> ## gv pro<tab>,<tab> ## Remove-Variable -Name out<tab>,<tab>,ps<tab> ## ... | ... | tee -v <tab> ## #Alias name expansion ## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab> ## Export-Alias -Name <tab> ## Get-Alias i<tab>,e<tab>,a<tab> ## epal -n for<tab> ## #Property name expansion with -groupBy parameter ## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab> ## ps | ft -g <tab> ## gcm | Format-Wide -GroupBy Par<tab> ## #Type accelerators expansion with no characters ## [<tab> ## New-Object -typename <tab> ## New-Object <tab> ## # File glob expansion with '@' ## ls *.txt@<tab> ## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma ## ls * -Filter *.txt # 2 <tab> refactoring ## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern ## This can also use '^'(hat) or '~'(tilde) for Excluding ## ls <hat>*.txt@<tab> ## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma ## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring ## *.txt<tilde>foo*<tilde>bar*@<tab> ## ls file.txt # 1 <tab> expanding with comma ## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring ## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> ) ## ls * -Filter * -Excluding foo*, bar*<Enter> ## #ls<tab> ## #1<tab> ## # Command buffer stack with ';'(semicolon) ## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1 ## echo "PowerShell"<semicolon><tab> # push command2 ## get-process<semicolon><tab> # push command3 ## {COMMAND}<Enter> # execute another command ## get-process # Auto pop command3 from stack by LIFO ## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon) ## get-process; <semicolon><comma><tab> ## get-process; echo "PowerShell" # pop command2 from stack by LIFO ## # Function name expansion after 'function' or 'filter' keywords ## function cl<tab> ## #Switch syntax option expansion ## switch -w<tab> -f<tab> ## #Better powershell.exe option expansion with '-' ## powershell -no<tab> -<tab> -en<tab> ## #A part of PowerShell attributes expansion ( CmdletBinding, Parameter, Alias, Validate*, Allow* ) ## [par<tab> ## [cmd<tab> ## #Member expansion for CmdletBinding and Parameter attributes ## [Parameter(man<tab>,<tab>1,val<tab>$true)] ## [CmdletBinding( <tab>"foo", su<tab>$true)] ## #Several current date/time formats with Ctrl+D ## <Ctrl+D><tab><tab><tab><tab><tab>... ## #Hand-operated pop from command buffer with Ctrl+P (this is also available with ';:' or ';,') ## <command>;<tab> # push command ## <Ctrl+D><tab> # pop ## #Paste clipboard with Ctrl+V ## <Ctrl+V><tab> ## # Cut current line with Ctrl+X ## <command><Ctrl+X><tab> ## # Cut words with a character after Ctrl+X until the character ## 1: PS > dir -Filter *.txt<Ctrl+X>-<tab> # Cut words until '-' ## 2: PS > dir - ## 3: PS > dir -<Ctrl+V><tab> # Paste words that were copyed now ## # Cut last word in current line with Ctrl+Z ## 1: PS > Get-ChildItem *.txt<Ctrl+Z><tab> # Cut last word in current line ## 2: PS > Get-ChildItem ## 3: PS > Get-ChildItem -Exclude <Ctrl+V><tab> # Paste last word that was copyed now ## #[ScriptBlock] member expansion for [ScriptBlock] literal ## { 1+1 }.inv<tab> ## #A part of history commands expansion with Ctrl+L (using split(";"),split("|"),split(";|") ) ## ls -Force -Recurse -Filter *.txt | ? { $_.LastWriteTime -lt [DateTime]::Today } ; echo PowerShell ## ls<Ctrl+L><tab><tab> ## ?<Ctrl+L><tab><tab> ## ec<Ctrl+L><tab> ## # Using Ctrl+K, characters insertion (bihind space or semi-coron or pipe operator) feature : it encloses tokens with parnthesis by default ## 1 - 1 - 1 - 1<Ctrl+K><tab> ## 1 - 1 - 1 - (1)<tab> ## 1 - 1 - 1 (- 1)<tab> ## 1 - 1 - (1 - 1)<tab><tab><tab>... ## with double Ctrl+K, it encloses tokens with $( ) ## for ( $i=0;$j=1<Ctrl+K><Ctrl+K><tab><tab> ## for ( $($i=0;$j=1) ## if there is a character between <Ctrl+K> and <tab>, it is inserted between tokens ## 1+1 | {$_*2}<Ctrl+K>%<tab> ## 1+1 | %{$_*2} ## 1+1 +1+1<Ctrl+K>;<tab> ## 1+1 ;+1+1 ## if the character is ( or { or {, tokens are enclosed ( ) or { } or {} ## int<Ctrl+K>[<tab> ## [int] ## with double Ctrl+K, and if there is a character between <Ctrl+K> and <tab>, it is inserted between tokens with '$' ## C:\\WINDOWS\\system32\\notepad.exe<Ctrl+K><Ctrl+K>{<tab> ## ${C:\\WINDOWS\\system32\\notepad.exe} ## % and ? are given special treatment with double Ctrl+K, these enclose tokens with % { } or ? { } behind '|' ## ls | $_.LastWriteTime -gt "2009/5"<Ctrl+K><Ctrl+K>?<tab> ## ls | ? {$_.LastWriteTime -gt "2009/5"} ## ls | $_.FullName<Ctrl+K><Ctrl+K>%<tab> ## ls | % {$_.FullName} ## # WMI Namespaces expansion for Get-WmiObject ## gwmi -Namespace <tab> ## Get-WmiObject -Namespace root\\asp<tab> ## # WMI Classes expansion which is corresponding to WMI Namespace (*) ## gwmi -Namespace ROOT\\CIMV2\\ms_409 -Class <tab>_<tab> ### Generate ProgIDs list... if ( Test-Path $PSHOME\\ProgIDs.txt ) { $_ProgID = type $PSHOME\\ProgIDs.txt -ReadCount 0 } else { $_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\") $_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_subkey in $_HKCR.GetSubKeyNames() ) { foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") ) { if ($_i -ne $null) { $_ProgID.Add($_i.GetValue("")) } } } '$_ProgID was updated...' | Out-Host $_ProgID = $_ProgID|sort -Unique Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose } ### Generate TypeNames list... if ( Test-Path $PSHOME\\TypeNames.txt ) { $_TypeNames = type $PSHOME\\TypeNames.txt -ReadCount 0 } else { $_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() ) { foreach ( $_type in $_asm.GetTypes() ) { $_TypeNames.Add($_type.FullName) } } '$_TypeNames was updated...' | Out-Host $_TypeNames = $_TypeNames | sort -Unique Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose } if ( Test-Path $PSHOME\\TypeNames_System.txt ) { $_TypeNames_System = type $PSHOME\\TypeNames_System.txt -ReadCount 0 } else { $_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.' '$_TypeNames_System was updated...' | Out-Host Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose } ### Generate Namespaces list... if ( Test-Path $PSHOME\\WMINamespaces.txt ) { $_WMINamespaces = type $PSHOME\\WMINamespaces.txt -ReadCount 0 } else { $_WMINamespaces = & { $sb = { param ($ns) gwmi __NAMESPACE -Namespace $ns -com . | % { $ns = $_.__NAMESPACE + "\\" + $_.Name $ns & $sb $ns } } & $sb root } $_WMINamespaces = $_WMINamespaces + "ROOT" | sort '$_WMINamespaces was updated...' | Out-Host Set-Content -Value $_WMINamespaces -Path $PSHOME\\WMINamespaces.txt -Verbose } ### Get default WMI Namespace... $_WMIdftNS = $_WMINamespaces -eq (Get-ItemProperty HKLM:\\SOFTWARE\\Microsoft\\WBEM\\Scripting)."Default Namespace" ### Generate WMIClasses list... if ( Test-Path $PSHOME\\WMIClasses.txt ) { $_WMIClasses = Import-Clixml $PSHOME\\WMIClasses.txt } else { $_new = '=(New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ));' $_WMIClasses = iex ('@{"' + [String]::Join( "`"$_new`"", $_WMINamespaces ) + "`"$_new}") foreach ( $_namespace in $_WMINamespaces ) { foreach ( $_class in gwmi -Namespace $_namespace -List ) { $_WMIClasses.$_namespace.Add($_class.Name) } $_WMIClasses.$_namespace.Sort() } '$_WMIClasses was updated...' | Out-Host Export-Clixml -InputObject $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose } [Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null $global:_cmdstack = New-Object Collections.Stack $global:_snapin = $null $global:_TypeAccelerators = "ADSI", "Array", "Bool", "Byte", "Char", "Decimal", "Double", "float", "hashtable", "int", "Long", "PSObject", "ref", "Regex", "ScriptBlock", "Single", "String", "switch", "Type", "WMI", "WMIClass", "WMISearcher", "xml" $global:_cmdline = New-Object Collections.ArrayList iex (@' function prompt { h -Count 1 -OutVariable line | % { $_.CommandLine.Split("|"); $_.CommandLine.Split(";"); $_.CommandLine.Split(";"); $_.CommandLine.Split(";|") } | Get-Unique | ? { $_ -ne $line.CommandLine -and $_ -notmatch '^\\s*$' } | % { $_.Trim(" ") } | ? { $global:_cmdline -notcontains $_ } | % { Set-CommandLine $_ | Out-Null } if ($_cmdstack.Count -gt 0) { $line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) } '@ + @" ${function:prompt} } "@) function Write-ClassNames ( $data, $i, $prefix='', $sep='.' ) { $preItem = "" foreach ( $class in $data -like $_opt ) { $Item = $class.Split($sep) if ( $preItem -ne $Item[$i] ) { if ( $i+1 -eq $Item.Count ) { if ( $prefix -eq "[" ) { $suffix = "]" } elseif ( $sep -like "[_\\]" ) { $suffix = "" } else { $suffix = " " } } else { $suffix = "" } $prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix $preItem = $Item[$i] } } } function Get-PipeLineObject { $i = -2 $property = $null do { $str = $line.Split("|") # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1] # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] if ( $_cmdlet -eq "?" ) { $_cmdlet = "Where-Object" } $global:_exp = $_cmdlet # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0] } if ( "Select-Object" -eq $_cmdlet ) { if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' ) { $property = $Matches[1] + ";" + $property } } $i-- } while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet ) if ( $global:_forgci -eq $null ) { $a = @(ls "Alias:\\")[0] $e = @(ls "Env:\\")[0] $f = @(ls "Function:\\")[0] $h = @(ls "HKCU:\\")[0] $v = @(ls "Variable:\\")[0] $c = @(ls "cert:\\")[0] $global:_forgci = gi $PSHOME\\powershell.exe | Add-Member -Name CommandType -MemberType 'NoteProperty' -Value $f.CommandType -PassThru | Add-Member -Name Definition -MemberType 'NoteProperty' -Value $a.Definition -PassThru | Add-Member -Name Description -MemberType 'NoteProperty' -Value $a.Description -PassThru | Add-Member -Name Key -MemberType 'NoteProperty' -Value $e.Key -PassThru | Add-Member -Name Location -MemberType 'NoteProperty' -Value $c.Location -PassThru | Add-Member -Name LocationName -MemberType 'NoteProperty' -Value $c.LocationName -PassThru | Add-Member -Name Options -MemberType 'NoteProperty' -Value $a.Options -PassThru | Add-Member -Name ReferencedCommand -MemberType 'NoteProperty' -Value $a.ReferencedCommand -PassThru | Add-Member -Name ResolvedCommand -MemberType 'NoteProperty' -Value $a.ResolvedCommand -PassThru | Add-Member -Name ScriptBlock -MemberType 'NoteProperty' -Value $f.ScriptBlock -PassThru | Add-Member -Name StoreNames -MemberType 'NoteProperty' -Value $c.StoreNames -PassThru | Add-Member -Name SubKeyCount -MemberType 'NoteProperty' -Value $h.SubKeyCount -PassThru | Add-Member -Name Value -MemberType 'NoteProperty' -Value $e.Value -PassThru | Add-Member -Name ValueCount -MemberType 'NoteProperty' -Value $h.ValueCount -PassThru | Add-Member -Name Visibility -MemberType 'NoteProperty' -Value $a.Visibility -PassThru | Add-Member -Name Property -MemberType 'NoteProperty' -Value $h.Property -PassThru | Add-Member -Name ResolvedCommandName -MemberType 'NoteProperty' -Value $a.ResolvedCommandName -PassThru | Add-Member -Name Close -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteSubKeyTree -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Flush -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetSubKeyNames -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValueKind -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValueNames -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsValidValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name OpenSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name SetValue -MemberType 'ScriptMethod' -Value {} -PassThru } if ( $global:_mix -eq $null ) { $f = gi $PSHOME\\powershell.exe $t = [type] $s = "" $global:_mix = ` Add-Member -InputObject (New-Object PSObject) -Name Mode -MemberType 'NoteProperty' -Value $f.Mode -PassThru | Add-Member -Name Assembly -MemberType 'NoteProperty' -Value $t.Assembly -PassThru | Add-Member -Name AssemblyQualifiedName -MemberType 'NoteProperty' -Value $t.AssemblyQualifiedName -PassThru | Add-Member -Name Attributes -MemberType 'NoteProperty' -Value $f.Attributes -PassThru | Add-Member -Name BaseType -MemberType 'NoteProperty' -Value $t.BaseType -PassThru | Add-Member -Name ContainsGenericParameters -MemberType 'NoteProperty' -Value $t.ContainsGenericParameters -PassThru | Add-Member -Name CreationTime -MemberType 'NoteProperty' -Value $f.CreationTime -PassThru | Add-Member -Name CreationTimeUtc -MemberType 'NoteProperty' -Value $f.CreationTimeUtc -PassThru | Add-Member -Name DeclaringMethod -MemberType 'NoteProperty' -Value $t.DeclaringMethod -PassThru | Add-Member -Name DeclaringType -MemberType 'NoteProperty' -Value $t.DeclaringType -PassThru | Add-Member -Name Exists -MemberType 'NoteProperty' -Value $f.Exists -PassThru | Add-Member -Name Extension -MemberType 'NoteProperty' -Value $f.Extension -PassThru | Add-Member -Name FullName -MemberType 'NoteProperty' -Value $f.FullName -PassThru | Add-Member -Name GenericParameterAttributes -MemberType 'NoteProperty' -Value $t.GenericParameterAttributes -PassThru | Add-Member -Name GenericParameterPosition -MemberType 'NoteProperty' -Value $t.GenericParameterPosition -PassThru | Add-Member -Name GUID -MemberType 'NoteProperty' -Value $t.GUID -PassThru | Add-Member -Name HasElementType -MemberType 'NoteProperty' -Value $t.HasElementType -PassThru | Add-Member -Name IsAbstract -MemberType 'NoteProperty' -Value $t.IsAbstract -PassThru | Add-Member -Name IsAnsiClass -MemberType 'NoteProperty' -Value $t.IsAnsiClass -PassThru | Add-Member -Name IsArray -MemberType 'NoteProperty' -Value $t.IsArray -PassThru | Add-Member -Name IsAutoClass -MemberType 'NoteProperty' -Value $t.IsAutoClass -PassThru | Add-Member -Name IsAutoLayout -MemberType 'NoteProperty' -Value $t.IsAutoLayout -PassThru | Add-Member -Name IsByRef -MemberType 'NoteProperty' -Value $t.IsByRef -PassThru | Add-Member -Name IsClass -MemberType 'NoteProperty' -Value $t.IsClass -PassThru | Add-Member -Name IsCOMObject -MemberType 'NoteProperty' -Value $t.IsCOMObject -PassThru | Add-Member -Name IsContextful -MemberType 'NoteProperty' -Value $t.IsContextful -PassThru | Add-Member -Name IsEnum -MemberType 'NoteProperty' -Value $t.IsEnum -PassThru | Add-Member -Name IsExplicitLayout -MemberType 'NoteProperty' -Value $t.IsExplicitLayout -PassThru | Add-Member -Name IsGenericParameter -MemberType 'NoteProperty' -Value $t.IsGenericParameter -PassThru | Add-Member -Name IsGenericType -MemberType 'NoteProperty' -Value $t.IsGenericType -PassThru | Add-Member -Name IsGenericTypeDefinition -MemberType 'NoteProperty' -Value $t.IsGenericTypeDefinition -PassThru | Add-Member -Name IsImport -MemberType 'NoteProperty' -Value $t.IsImport -PassThru | Add-Member -Name IsInterface -MemberType 'NoteProperty' -Value $t.IsInterface -PassThru | Add-Member -Name IsLayoutSequential -MemberType 'NoteProperty' -Value $t.IsLayoutSequential -PassThru | Add-Member -Name IsMarshalByRef -MemberType 'NoteProperty' -Value $t.IsMarshalByRef -PassThru | Add-Member -Name IsNested -MemberType 'NoteProperty' -Value $t.IsNested -PassThru | Add-Member -Name IsNestedAssembly -MemberType 'NoteProperty' -Value $t.IsNestedAssembly -PassThru | Add-Member -Name IsNestedFamANDAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamANDAssem -PassThru | Add-Member -Name IsNestedFamily -MemberType 'NoteProperty' -Value $t.IsNestedFamily -PassThru | Add-Member -Name IsNestedFamORAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamORAssem -PassThru | Add-Member -Name IsNestedPrivate -MemberType 'NoteProperty' -Value $t.IsNestedPrivate -PassThru | Add-Member -Name IsNestedPublic -MemberType 'NoteProperty' -Value $t.IsNestedPublic -PassThru | Add-Member -Name IsNotPublic -MemberType 'NoteProperty' -Value $t.IsNotPublic -PassThru | Add-Member -Name IsPointer -MemberType 'NoteProperty' -Value $t.IsPointer -PassThru | Add-Member -Name IsPrimitive -MemberType 'NoteProperty' -Value $t.IsPrimitive -PassThru | Add-Member -Name IsPublic -MemberType 'NoteProperty' -Value $t.IsPublic -PassThru | Add-Member -Name IsSealed -MemberType 'NoteProperty' -Value $t.IsSealed -PassThru | Add-Member -Name IsSerializable -MemberType 'NoteProperty' -Value $t.IsSerializable -PassThru | Add-Member -Name IsSpecialName -MemberType 'NoteProperty' -Value $t.IsSpecialName -PassThru | Add-Member -Name IsUnicodeClass -MemberType 'NoteProperty' -Value $t.IsUnicodeClass -PassThru | Add-Member -Name IsValueType -MemberType 'NoteProperty' -Value $t.IsValueType -PassThru | Add-Member -Name IsVisible -MemberType 'NoteProperty' -Value $t.IsVisible -PassThru | Add-Member -Name LastAccessTime -MemberType 'NoteProperty' -Value $f.LastAccessTime -PassThru | Add-Member -Name LastAccessTimeUtc -MemberType 'NoteProperty' -Value $f.LastAccessTimeUtc -PassThru | Add-Member -Name LastWriteTime -MemberType 'NoteProperty' -Value $f.LastWriteTime -PassThru | Add-Member -Name LastWriteTimeUtc -MemberType 'NoteProperty' -Value $f.LastWriteTimeUtc -PassThru | Add-Member -Name MemberType -MemberType 'NoteProperty' -Value $t.MemberType -PassThru | Add-Member -Name MetadataToken -MemberType 'NoteProperty' -Value $t.MetadataToken -PassThru | Add-Member -Name Module -MemberType 'NoteProperty' -Value $t.Module -PassThru | Add-Member -Name Name -MemberType 'NoteProperty' -Value $t.Name -PassThru | Add-Member -Name Namespace -MemberType 'NoteProperty' -Value $t.Namespace -PassThru | Add-Member -Name Parent -MemberType 'NoteProperty' -Value $f.Parent -PassThru | Add-Member -Name ReflectedType -MemberType 'NoteProperty' -Value $t.ReflectedType -PassThru | Add-Member -Name Root -MemberType 'NoteProperty' -Value $f.Root -PassThru | Add-Member -Name StructLayoutAttribute -MemberType 'NoteProperty' -Value $t.StructLayoutAttribute -PassThru | Add-Member -Name TypeHandle -MemberType 'NoteProperty' -Value $t.TypeHandle -PassThru | Add-Member -Name TypeInitializer -MemberType 'NoteProperty' -Value $t.TypeInitializer -PassThru | Add-Member -Name UnderlyingSystemType -MemberType 'NoteProperty' -Value $t.UnderlyingSystemType -PassThru | Add-Member -Name PSChildName -MemberType 'NoteProperty' -Value $f.PSChildName -PassThru | Add-Member -Name PSDrive -MemberType 'NoteProperty' -Value $f.PSDrive -PassThru | Add-Member -Name PSIsContainer -MemberType 'NoteProperty' -Value $f.PSIsContainer -PassThru | Add-Member -Name PSParentPath -MemberType 'NoteProperty' -Value $f.PSParentPath -PassThru | Add-Member -Name PSPath -MemberType 'NoteProperty' -Value $f.PSPath -PassThru | Add-Member -Name PSProvider -MemberType 'NoteProperty' -Value $f.PSProvider -PassThru | Add-Member -Name BaseName -MemberType 'NoteProperty' -Value $f.BaseName -PassThru | Add-Member -Name Clone -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CompareTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Contains -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CopyTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Create -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateObjRef -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateSubdirectory -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Delete -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name EndsWith -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name FindInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name FindMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetArrayRank -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetConstructor -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetConstructors -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetCustomAttributes -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetDefaultMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetDirectories -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetElementType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEnumerator -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEvent -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEvents -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetField -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFields -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFiles -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFileSystemInfos -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericArguments -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericParameterConstraints -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericTypeDefinition -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterface -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterfaceMap -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMember -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMethod -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMethods -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetNestedType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetNestedTypes -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetObjectData -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetProperties -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetProperty -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetTypeCode -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IndexOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name InitializeLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Insert -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name InvokeMember -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsAssignableFrom -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsDefined -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsInstanceOfType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsNormalized -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsSubclassOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name LastIndexOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name LastIndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeArrayType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeByRefType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeGenericType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakePointerType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MoveTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Normalize -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name PadLeft -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name PadRight -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Refresh -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Remove -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Replace -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name SetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Split -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name StartsWith -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Substring -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToCharArray -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToLower -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToLowerInvariant -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToUpper -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToUpperInvariant -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Trim -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name TrimEnd -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name TrimStart -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Chars -MemberType 'NoteProperty' -Value $s.Chars -PassThru } if ( "Add-Member" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Compare-Object" -eq $_cmdlet ) { $global:_dummy = (Compare-Object 1 2)[0] } if ( "ConvertFrom-SecureString" -eq $_cmdlet ) { $global:_dummy = $null } if ( "ConvertTo-SecureString" -eq $_cmdlet ) { $global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force } if ( "ForEach-Object" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Acl" -eq $_cmdlet ) { $global:_dummy = Get-Acl } if ( "Get-Alias" -eq $_cmdlet ) { $global:_dummy = (Get-Alias)[0] } if ( "Get-AuthenticodeSignature" -eq $_cmdlet ) { $global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe } if ( "Get-ChildItem" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-Command" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Get-Content" -eq $_cmdlet ) { $global:_dummy = (type $PSHOME\\profile.ps1)[0] } if ( "Get-Credential" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Culture" -eq $_cmdlet ) { $global:_dummy = Get-Culture } if ( "Get-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( "Get-Event" -eq $_cmdlet ) { $global:_dummy = (Get-Event)[0] } if ( "Get-EventLog" -eq $_cmdlet ) { $global:_dummy = Get-EventLog Windows` PowerShell -Newest 1 } if ( "Get-ExecutionPolicy" -eq $_cmdlet ) { $global:_dummy = Get-ExecutionPolicy } if ( "Get-Help" -eq $_cmdlet ) { $global:_dummy = Get-Help Add-Content } if ( "Get-History" -eq $_cmdlet ) { $global:_dummy = Get-History -Count 1 } if ( "Get-Host" -eq $_cmdlet ) { $global:_dummy = Get-Host } if ( "Get-Item" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-ItemProperty" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Location" -eq $_cmdlet ) { $global:_dummy = Get-Location } if ( "Get-Member" -eq $_cmdlet ) { $global:_dummy = (1|Get-Member)[0] } if ( "Get-Module" -eq $_cmdlet ) { $global:_dummy = (Get-Module)[0] } if ( "Get-PfxCertificate" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Process" -eq $_cmdlet ) { $global:_dummy = ps powershell } if ( "Get-PSBreakpoint" -eq $_cmdlet ) { $global:_dummy = Add-Member -InputObject (New-Object PSObject) -Name Action -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Command -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Enabled -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name HitCount -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Id -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Script -MemberType 'NoteProperty' -Value '' -PassThru } if ( "Get-PSCallStack" -eq $_cmdlet ) { $global:_dummy = Get-PSCallStack } if ( "Get-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Function } if ( "Get-PSProvider" -eq $_cmdlet ) { $global:_dummy = Get-PSProvider FileSystem } if ( "Get-PSSnapin" -eq $_cmdlet ) { $global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core } if ( "Get-Service" -eq $_cmdlet ) { $global:_dummy = (Get-Service)[0] } if ( "Get-TraceSource" -eq $_cmdlet ) { $global:_dummy = Get-TraceSource AddMember } if ( "Get-UICulture" -eq $_cmdlet ) { $global:_dummy = Get-UICulture } if ( "Get-Variable" -eq $_cmdlet ) { $global:_dummy = Get-Variable _ } if ( "Get-WmiObject" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Group-Object" -eq $_cmdlet ) { $global:_dummy = 1 | group } if ( "Measure-Command" -eq $_cmdlet ) { $global:_dummy = Measure-Command {} } if ( "Measure-Object" -eq $_cmdlet ) { $global:_dummy = Measure-Object } if ( "New-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Alias } if ( "New-TimeSpan" -eq $_cmdlet ) { $global:_dummy = New-TimeSpan } if ( "Resolve-Path" -eq $_cmdlet ) { $global:_dummy = $PWD } if ( "Select-String" -eq $_cmdlet ) { $global:_dummy = " " | Select-String " " } if ( "Set-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( $property -ne $null) { foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) ) { $global:_dummy = @($global:_dummy.$name)[0] } } } function Set-CommandLine ( [string]$script ) { $global:_cmdline.Add($script) } function Get-CommandLine ( [string]$name ) { $name = $name -replace '\\?','`?' $global:_cmdline -like "$name*" } function TabExpansion { # This is the default function to use for tab expansion. It handles simple # member expansion on variables, variable name expansion and parameter completion # on commands. It doesn't understand strings so strings containing ; | ( or { may # cause expansion to fail. param($line, $lastWord) & { # Helper function to write out the matching set of members. It depends # on dynamic scoping to get $_base, _$expression and $_pat function Write-Members ($sep='.') { # evaluate the expression to get the object to examine... Invoke-Expression ('$_val=' + $_expression) if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } $_method = [Management.Automation.PSMemberTypes] ` 'Method,CodeMethod,ScriptMethod,ParameterizedProperty' if ($sep -eq '.') { $members = ( [Object[]](Get-Member -InputObject $_val.PSextended $_pat) + [Object[]](Get-Member -InputObject $_val.PSadapted $_pat) + [Object[]](Get-Member -InputObject $_val.PSbase $_pat) ) if ( $_val -is [Hashtable] ) { [Microsoft.PowerShell.Commands.MemberDefinition[]]$_keys = $null foreach ( $_name in $_val.Keys ) { $_keys += ` New-Object Microsoft.PowerShell.Commands.MemberDefinition ` [int],$_name,"Property",0 } $members += [Object[]]$_keys | ? { $_.Name -like $_pat } } foreach ($_m in $members | sort membertype,name -Unique) { if ($_m.MemberType -band $_method) { # Return a method... $_base + $_expression + $sep + $_m.name + '(' } else { # Return a property... $_base + $_expression + $sep + $_m.name } } } else { foreach ($_m in Get-Member -Static -InputObject $_val $_pat | Sort-Object membertype,name) { if ($_m.MemberType -band $_method) { # Return a method... $_base + $_expression + $sep + $_m.name + '(' } else { # Return a property... $_base + $_expression + $sep + $_m.name } } } } switch ([int]$line[-1]) { # Ctrl+D several date/time formats 4 { "[DateTime]::Now" [DateTime]::Now [DateTime]::Now.ToString("yyyyMMdd") [DateTime]::Now.ToString("MMddyyyy") [DateTime]::Now.ToString("yyyyMMddHHmmss") [DateTime]::Now.ToString("MMddyyyyHHmmss") 'd f g m o r t u y'.Split(" ") | % { [DateTime]::Now.ToString($_) } break TabExpansion; } # Ctrl+K put parentheses behind space or semi-coron or pipe operator 11 { if ( $line -ne $( "=" + [Char]11 ) ) { if ( $line[-2] -eq 11 ) { $left = '$' + "(" $line = $line.Substring(0,$line.length-2) } else { $left = "(" $line = $line.Substring(0,$line.length-1) } $global:_ctrlk = @() $l = $line.Length while ( $l -ge 0 ) { $i = $line.Substring(0,$l).LastIndexOfAny(" ;|") $global:_ctrlk += $line.Insert($i+1, $left) + ")" $l = $i } $global:_ctrlk += $line [Windows.Forms.SendKeys]::SendWait("{Esc}=^K{TAB}") } else { $global:_ctrlk } break TabExpansion; } # Ctrl+L a part of history commands expansion 12 { Get-CommandLine $lastWord.SubString(0, $lastword.Length-1) break TabExpansion; } # Ctrl+P hand-operated pop from command buffer stack 16 { $_base = $lastword.SubString(0, $lastword.Length-1) $_buf = $global:_cmdstack.Pop() if ( $_buf.Contains("'") ) { $line = ($line.SubString(0, $line.Length-1) + $_buf) -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait("{Esc}$line") } else { $_base + $_buf } break TabExpansion; } # Ctrl+R $Host.UI.RawUI. 18 { '$Host.UI.RawUI.' '$Host.UI.RawUI' break TabExpansion; } # Ctrl+V paste clipboard 22 { $_base = $lastword.SubString(0, $lastword.Length-1) $global:_clip = New-Object System.Windows.Forms.TextBox $global:_clip.Multiline = $true $global:_clip.Paste() $line = ($line.SubString(0, $line.Length-1) + $global:_clip.Text) -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait("{Esc}$line") break TabExpansion; } # Ctrl+X cut current line 24 { $_clip = new-object System.Windows.Forms.TextBox; $_clip.Multiline = $true; $_clip.Text = $line.SubString(0, $line.Length-1) $_clip.SelectAll() $_clip.Copy() [System.Windows.Forms.SendKeys]::SendWait("{ESC}") break TabExpansion; } # Ctrl+Z cut last word in current line 26 { $line.SubString(0, $line.Length-1) -match '(^(.*\\s)([^\\s]*)$)|(^[^\\s]*$)' | Out-Null $_clip = new-object System.Windows.Forms.TextBox; $_clip.Multiline = $true; $_clip.Text = $Matches[3] $_clip.SelectAll() $_clip.Copy() [System.Windows.Forms.SendKeys]::SendWait("{ESC}") $line = $Matches[2] -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) break TabExpansion; } } switch ( [int]$line[-2] ) { # Ctrl+K put character behind space or semi-coron or pipe operator 11 { switch ( $line[-1] ) { '{' { $right = '}' } '(' { $right = ')' } '[' { $right = ']' } } $left = $line[-1] $delimiter = " ;|" if ( $line[-3] -eq 11 ) { if ( $line[-1] -eq '%' -or $line[-1] -eq '?' ) { $left = ' ' + $left + ' {'; $right = '}' $delimiter = '|' } else { $left = '$' + $left } $line = $line.Substring(0,$line.length-3) } else { $line = $line.Substring(0,$line.length-2) } $global:_ctrlk = @() $l = $line.Length while ( $l -ge 0 ) { $i = $line.Substring(0,$l).LastIndexOfAny($delimiter) $global:_ctrlk += $line.Insert($i+1, $left) + $right $l = $i } $global:_ctrlk += $line [Windows.Forms.SendKeys]::SendWait("{Esc}=^K{TAB}") break TabExpansion; } # Ctrl+X cut words with a character after Ctrl+X until the character 24 { $line.SubString(0, $line.Length-2) -match "(^(.*$($line[-1]))([^$($line[-1])]*)`$)|(^[^\\$($line[-1])]*`$)" | Out-Null $_clip = new-object System.Windows.Forms.TextBox; $_clip.Multiline = $true; $_clip.Text = $Matches[3] $_clip.SelectAll() $_clip.Copy() [System.Windows.Forms.SendKeys]::SendWait("{ESC}") $line = $Matches[2] -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) break TabExpansion; } } switch -regex ($lastWord) { # Handle property and method expansion at '$_' '(^.*)(\\$_\\.)(\\w*)$' { $_base = $matches[1] $_expression = '$global:_dummy' $_pat = $matches[3] + '*' $global:_dummy = $null Get-PipeLineObject if ( $global:_dummy -eq $null ) { if ( $global:_exp -match '^\\$.*\\(.*$' ) { $type = ( iex $_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' ) { $tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1] $type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' ) { $global:_dummy = @(iex $Matches[1])[0] } else { $global:_dummy = $global:_mix } } Write-Members break; } # Handle property and method expansion rooted at variables... # e.g. $a.b.<tab> '(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] $_pat = $matches[4] + '*' if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle simple property and method expansion on static members... # e.g. [datetime]::n<tab> '(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] $_pat = $matches[4] + '*' Write-Members '::' break; } # Handle complex property and method expansion on static members # where there are intermediate properties... # e.g. [datetime]::now.d<tab> '(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' { $_base = $matches[1] # everything before the expression $_expression = $matches[2].TrimEnd('.') # expression less trailing '.' $_pat = $matches[5] + '*' # the member to look for... Write-Members break; } # Handle property and method expansion rooted at variables... # e.g. { 1+1 }.inv<tab> '(^.*})\\.(\\w*)$' { $_base = $matches[1] $_pat = $matches[2] + '*' foreach ( $_m in {} | Get-Member $_pat | sort membertype,name ) { if ($_m.MemberType -eq "Method") { $_base + '.' + $_m.name + '(' } else { $_base + '.' + $_m.name } } break; } # Handle variable name expansion... '(^.*\\$)(\\w+)$' { $_prefix = $matches[1] $_varName = $matches[2] foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*')) { $_prefix + $_v.name } break; } # Handle item name expansion in variable notation... '(^.*\\${)(((\\w+):([\\\\/]?))[^\\\\/]+([\\\\/][^\\\\/]*)*)$' { $_prefix = $matches[1] $_driveName = $matches[3] $_itemName = $matches[2] + "*" Get-ChildItem $_itemName | % { if ( $matches[5] -and $_.PSProvider.Name -eq "FileSystem" ) { $output = $_prefix + $_.FullName } elseif ( $_.PSProvider.Name -eq "FileSystem" -and $matches[6] ) { $cd = (Get-Location -PSDrive $matches[4]).Path $output = $_prefix + $_driveName + $_.FullName.Substring($cd.Length+1) } elseif ( $_.PSProvider.Name -eq "FileSystem" ) { $cd = (Get-Location -PSDrive $matches[4]).Path $output = $_prefix + $_driveName + $_.FullName.Substring($cd.Length+1) } else { $output = $_prefix + $_driveName + $_.Name } if ( $_.PSIsContainer ) { $output } else { $output + "}" } } break; } # Handle PSDrive name expansion in variable notation... '(^.*\\${)(\\w+)$' { $_prefix = $matches[1] $_driveName = $matches[2] + "*" Get-PSDrive $_driveName | % { $_prefix + $_ + ':' } break; } # Handle env&function drives variable name expansion... '(^.*\\$)(.*\\:)(\\w+)$' { $_prefix = $matches[1] $_drive = $matches[2] $_varName = $matches[3] if ($_drive -eq "env:" -or $_drive -eq "function:") { foreach ($_v in Get-ChildItem ($_drive + $_varName + '*')) { $_prefix + $_drive + $_v.name } } break; } # Handle array's element property and method expansion # where there are intermediate properties... # e.g. foo[0].n.b<tab> '(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$' { $_base = $matches[1] $_expression = $matches[2].TrimEnd('.') $_pat = $Matches[8] + '*' [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle property and method expansion rooted at type object... # e.g. [System.Type].a<tab> '(^\\[(\\w|\\.)+\\])\\.(\\w*)$' { if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; } $_expression = $Matches[1] $_pat = $Matches[$matches.Count-1] + '*' Write-Members break; } # Handle complex property and method expansion on type object members # where there are intermediate properties... # e.g. [datetime].Assembly.a<tab> '^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' { $_expression = $matches
combined_dataset/train/non-malicious/sample_62_41.ps1
sample_62_41.ps1
# default-build.yml # Description: Defines a build phase for invoking build.sh/cmd # Parameters: # jobName: string # The name of the job. Defaults to the name of the OS. No spaces allowed # jobDisplayName: string # The friendly job name to display in the UI. Defaults to the name of the OS. # agentOs: string # Used in templates to define variables which are OS specific. Typically from the set { Windows, Linux, macOS } # buildArgs: string # Additional arguments to pass to the build.sh/cmd script. # Note: -ci is always passed # beforeBuild: [steps] # Additional steps to run before build.sh/cmd # steps: [steps] # Instead of running build.cmd/sh, run these build steps. # afterBuild: [steps] # Additional steps to run after build.sh/cmd # artifacts: [array] # name: string # The name of the artifact container # - path: string # The file path to artifacts output # includeForks: boolean # Should artifacts from forks be published? # publishOnError: boolean # Should artifacts be published if previous step failed? # dependsOn: string | [ string ] # For fan-out/fan-in. https://learn.microsoft.com/en-us/azure/devops/pipelines/yaml-schema?view=azure-devops&tabs=schema#job # condition: string # A condition which can be used to skip the job completely # codeSign: boolean # This build definition is enabled for code signing. (Only applies to Windows) # buildDirectory: string # Specifies what directory to run build.sh/cmd # isAzDOTestingJob: boolean # Determines if this job runs tests on the AzDO build agent. Controls some (currently Windows-only) # installations and enables test publication (unless enablePublishTestResults is overridden). # enablePublishTestResults: boolean # Determines if test results should be published. Defaults to the isAzDOTestingJob setting. # enableSbom: boolean # Determines if an SBOM should be created. Defaults to true. Ignored in public builds. # variables: [array] # Job-specific variables. Defined using either name/value pairs or a variable list (using name or group syntax). # # See https://learn.microsoft.com/en-us/azure/devops/pipelines/yaml-schema for details # parameters: # jobName: '' - use agentOs by default. # jobDisplayName: '' - use agentOs by default. agentOs: 'Windows' buildArgs: '' beforeBuild: [] # steps: [] don't define an empty object default because there is no way in template expression yet to check "if isEmpty(parameters.steps)" afterBuild: [] artifacts: [] dependsOn: '' condition: '' codeSign: false buildDirectory: $(System.DefaultWorkingDirectory)/eng/ isAzDOTestingJob: false enablePublishTestResults: '' enableSbom: true variables: [] configuration: 'Release' container: '' enableRichCodeNavigation: '' installNodeJs: true installJdk: true # Ignored unless agentOs == Windows. timeoutInMinutes: 180 testRunTitle: $(AgentOsName)-$(BuildConfiguration) useHostedUbuntu: true # We need longer than the default amount of 5 minutes to upload our logs/artifacts. (We currently take around 5 mins in the best case). # This makes sure we have time to upload everything in the case of a build timeout - really important for investigating a build # timeout due to test hangs. cancelTimeoutInMinutes: 15 jobs: - ${{ if ne(variables['System.TeamProject'], 'internal') }}: - template: /eng/common/templates/job/job.yml@self parameters: name: ${{ coalesce(parameters.jobName, parameters.agentOs) }} displayName: ${{ coalesce(parameters.jobDisplayName, parameters.agentOs) }} dependsOn: ${{ parameters.dependsOn }} ${{ if ne(parameters.condition, '') }}: condition: ${{ parameters.condition }} ${{ if ne(parameters.enableRichCodeNavigation, '') }}: enableRichCodeNavigation: true richCodeNavigationLanguage: 'csharp,typescript,java' timeoutInMinutes: ${{ parameters.timeoutInMinutes }} cancelTimeoutInMinutes: ${{ parameters.cancelTimeoutInMinutes }} ${{ if and(eq(parameters.isAzDOTestingJob, true), ne(parameters.enablePublishTestResults, false)) }}: enablePublishTestResults: true testResultsFormat: xUnit # Have no vsTest results in any job. mergeTestResults: true testRunTitle: ${{ parameters.testRunTitle }} enableSbom: ${{ parameters.enableSbom }} enableTelemetry: true helixRepo: dotnet/aspnetcore helixType: build.product/ workspace: clean: all # Map friendly OS names to the right queue # See https://github.com/dotnet/arcade/blob/master/Documentation/ChoosingAMachinePool.md pool: ${{ if eq(parameters.agentOs, 'macOS') }}: vmImage: macOS-11 ${{ if eq(parameters.agentOs, 'Linux') }}: ${{ if eq(parameters.useHostedUbuntu, true) }}: vmImage: ubuntu-20.04 ${{ if eq(parameters.useHostedUbuntu, false) }}: name: $(DncEngPublicBuildPool) demands: ImageOverride -equals Build.Ubuntu.2004.Amd64.Open ${{ if eq(parameters.agentOs, 'Windows') }}: name: $(DncEngPublicBuildPool) demands: ImageOverride -equals 1es-windows-2022-open ${{ if ne(parameters.container, '') }}: container: ${{ parameters.container }} ${{ if ne(parameters.disableComponentGovernance, '') }}: disableComponentGovernance: ${{ parameters.disableComponentGovernance }} variables: - AgentOsName: ${{ parameters.agentOs }} - ASPNETCORE_TEST_LOG_MAXPATH: "200" # Keep test log file name length low enough for artifact zipping - BuildScriptArgs: ${{ parameters.buildArgs }} - _BuildConfig: ${{ parameters.configuration }} - BuildConfiguration: ${{ parameters.configuration }} - BuildDirectory: ${{ parameters.buildDirectory }} - DOTNET_CLI_HOME: $(System.DefaultWorkingDirectory) - DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true - TeamName: AspNetCore - ${{ if and(eq(parameters.installJdk, 'true'), eq(parameters.agentOs, 'Windows')) }}: - JAVA_HOME: $(Agent.BuildDirectory)\.tools\jdk\win-x64 - ${{ if ne(parameters.codeSign, true) }}: - _SignType: '' - LC_ALL: 'en_US.UTF-8' - LANG: 'en_US.UTF-8' - LANGUAGE: 'en_US.UTF-8' # Log environment variables in binary logs to ease debugging - MSBUILDLOGALLENVIRONMENTVARIABLES: true # Rely on task Arcade injects, not auto-injected build step. - skipComponentGovernanceDetection: true - ${{ each variable in parameters.variables }}: # handle a variable list using "name" and "value" properties # example: # - name: [key] # value: [value] - ${{ if ne(variable.name, '') }}: - name: ${{ variable.name }} value: ${{ variable.value }} # handle variable groups - ${{ if ne(variable.group, '') }}: - group: ${{ variable.group }} # handle name/value pairs (converting them into variable list entries) # example: # - [name]: [value] - ${{ if and(eq(variable.name, ''), eq(variable.group, '')) }}: - ${{ each pair in variable }}: - name: ${{ pair.key }} value: ${{ pair.value }} steps: - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: df -h displayName: Disk size - ${{ if eq(parameters.agentOs, 'macOS') }}: - script: sudo xcode-select -s /Applications/Xcode_12.5.1.app/Contents/Developer displayName: Use XCode 12.5.1 - checkout: self clean: true - ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.isAzDOTestingJob, true)) }}: - powershell: ./eng/scripts/InstallProcDump.ps1 displayName: Install ProcDump - powershell: ./eng/scripts/StartDumpCollectionForHangingBuilds.ps1 $(ProcDumpPath)procdump.exe artifacts/dumps/ (Get-Date).AddMinutes(160) dotnet displayName: Start background dump collection - ${{ if eq(parameters.installNodeJs, 'true') }}: - task: NodeTool@0 displayName: Install Node 18.x inputs: versionSpec: 18.x - ${{ if and(eq(parameters.installJdk, 'true'), eq(parameters.agentOs, 'Windows')) }}: - powershell: ./eng/scripts/InstallJdk.ps1 displayName: Install JDK 11 - ${{ if eq(parameters.isAzDOTestingJob, true) }}: - powershell: | Write-Host "##vso[task.setvariable variable=SeleniumProcessTrackingFolder]$(Build.SourcesDirectory)\artifacts\tmp\selenium\" ./eng/scripts/InstallGoogleChrome.ps1 displayName: Install Chrome - ${{ if eq(parameters.agentOs, 'Windows') }}: - powershell: Write-Host "##vso[task.prependpath]$(DOTNET_CLI_HOME)\.dotnet\tools" displayName: Add dotnet tools to path - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: echo "##vso[task.prependpath]$(DOTNET_CLI_HOME)/.dotnet/tools" displayName: Add dotnet tools to path - ${{ parameters.beforeBuild }} # Add COMPlus_* environment variables to build steps. - ${{ if ne(parameters.steps, '')}}: - ${{ each step in parameters.steps }}: # Include all properties e.g. `task: CmdLine@2` or `displayName: Build x64` _except_ a provided `env:`. # Aim here is to avoid having two `env:` properties in the expanded YAML. - ${{ each pair in step }}: ${{ if ne(pair.key, 'env') }}: ${{ pair.key }}: ${{ pair.value }} env: # Include the variables we always want. COMPlus_DbgEnableMiniDump: 1 COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core" DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token) # Expand provided `env:` properties, if any. ${{ if step.env }}: ${{ step.env }} - ${{ if eq(parameters.steps, '')}}: - ${{ if eq(parameters.agentOs, 'Windows') }}: - script: $(BuildDirectory)\build.cmd -ci -nobl -Configuration $(BuildConfiguration) $(BuildScriptArgs) /p:DotNetSignType=$(_SignType) displayName: Run build.cmd env: COMPlus_DbgEnableMiniDump: 1 COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core" DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token) - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: $(BuildDirectory)/build.sh --ci --nobl --configuration $(BuildConfiguration) $(BuildScriptArgs) displayName: Run build.sh env: COMPlus_DbgEnableMiniDump: 1 COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core" DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token) - ${{ parameters.afterBuild }} - ${{ if eq(parameters.agentOs, 'Linux') }}: - script: df -h && du -h --threshold=50MB .. displayName: Disk utilization - ${{ if eq(parameters.agentOs, 'macOS') }}: - script: df -h && du -h -d 3 .. displayName: Disk utilization - ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.isAzDOTestingJob, true)) }}: - powershell: ./eng/scripts/FinishDumpCollectionForHangingBuilds.ps1 artifacts/dumps/ displayName: Finish background dump collection continueOnError: true condition: always() - ${{ if eq(parameters.agentOs, 'Windows') }}: - powershell: eng\scripts\KillProcesses.ps1 displayName: Kill processes continueOnError: true condition: always() - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: eng/scripts/KillProcesses.sh displayName: Kill processes continueOnError: true condition: always() - ${{ each artifact in parameters.artifacts }}: - task: PublishBuildArtifacts@1 displayName: Upload artifacts from ${{ artifact.path }} condition: and(or(succeeded(), eq('${{ artifact.publishOnError }}', 'true')), or(eq(variables['system.pullrequest.isfork'], false), eq('${{ artifact.includeForks }}', 'true'))) continueOnError: true inputs: # Assume runtime variable values are absolute paths already. ${{ if startsWith(artifact.path, '$(') }}: pathToPublish: ${{ artifact.path }} ${{ if not(startsWith(artifact.path, '$(')) }}: pathToPublish: $(Build.SourcesDirectory)/${{ artifact.path }} ${{ if eq(artifact.name, '') }}: artifactName: artifacts-$(AgentOsName)-$(BuildConfiguration) ${{ if ne(artifact.name, '') }}: artifactName: ${{ artifact.name }} artifactType: Container parallel: true - ${{ if eq(parameters.agentOs, 'Windows') }}: - powershell: $(Build.SourcesDirectory)/eng/scripts/UploadCores.ps1 -ProcDumpOutputPath artifacts/dumps/ condition: failed() displayName: Upload cores - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: $(Build.SourcesDirectory)/eng/scripts/upload-cores.sh condition: failed() displayName: Upload cores - ${{ if and(eq(parameters.isAzDOTestingJob, true), ne(parameters.enablePublishTestResults, false)) }}: - task: PublishTestResults@2 displayName: Publish js test results condition: always() inputs: testResultsFormat: JUnit testResultsFiles: '**/artifacts/log/**/*.junit.xml' testRunTitle: $(AgentOsName)-$(BuildConfiguration)-js mergeTestResults: true buildConfiguration: $(BuildConfiguration) buildPlatform: $(AgentOsName) - ${{ if eq(variables['System.TeamProject'], 'internal') }}: - template: /eng/common/templates-official/job/job.yml@self parameters: name: ${{ coalesce(parameters.jobName, parameters.agentOs) }} displayName: ${{ coalesce(parameters.jobDisplayName, parameters.agentOs) }} dependsOn: ${{ parameters.dependsOn }} ${{ if ne(parameters.condition, '') }}: condition: ${{ parameters.condition }} ${{ if ne(parameters.enableRichCodeNavigation, '') }}: enableRichCodeNavigation: true richCodeNavigationLanguage: 'csharp,typescript,java' timeoutInMinutes: ${{ parameters.timeoutInMinutes }} cancelTimeoutInMinutes: ${{ parameters.cancelTimeoutInMinutes }} ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.codeSign, 'true')) }}: enableMicrobuild: true enablePublishBuildAssets: true enablePublishUsingPipelines: ${{ variables._PublishUsingPipelines }} ${{ if and(eq(parameters.isAzDOTestingJob, true), ne(parameters.enablePublishTestResults, false)) }}: enablePublishTestResults: true testResultsFormat: xUnit # Have no vsTest results in any job. mergeTestResults: true testRunTitle: ${{ parameters.testRunTitle }} enableSbom: ${{ parameters.enableSbom }} enableTelemetry: true helixRepo: dotnet/aspnetcore helixType: build.product/ workspace: clean: all # Map friendly OS names to the right queue # See https://github.com/dotnet/arcade/blob/master/Documentation/ChoosingAMachinePool.md pool: ${{ if eq(parameters.agentOs, 'macOS') }}: name: Azure Pipelines image: macOS-11 os: macOS ${{ if eq(parameters.agentOs, 'Linux') }}: name: $(DncEngInternalBuildPool) image: 1es-ubuntu-2004 os: linux ${{ if eq(parameters.agentOs, 'Windows') }}: name: $(DncEngInternalBuildPool) # Visual Studio Enterprise - contains some stuff, like SQL Server and IIS Express, that we use for testing image: 1es-windows-2022 os: windows ${{ if ne(parameters.container, '') }}: container: ${{ parameters.container }} ${{ if ne(parameters.disableComponentGovernance, '') }}: disableComponentGovernance: ${{ parameters.disableComponentGovernance }} variables: - AgentOsName: ${{ parameters.agentOs }} - ASPNETCORE_TEST_LOG_MAXPATH: "200" # Keep test log file name length low enough for artifact zipping - BuildScriptArgs: ${{ parameters.buildArgs }} - _BuildConfig: ${{ parameters.configuration }} - BuildConfiguration: ${{ parameters.configuration }} - BuildDirectory: ${{ parameters.buildDirectory }} - DOTNET_CLI_HOME: $(System.DefaultWorkingDirectory) - DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true - TeamName: AspNetCore - ${{ if and(eq(parameters.installJdk, 'true'), eq(parameters.agentOs, 'Windows')) }}: - JAVA_HOME: $(Agent.BuildDirectory)\.tools\jdk\win-x64 - ${{ if eq(parameters.codeSign, true) }}: - ${{ if notin(variables['Build.Reason'], 'PullRequest') }}: - _SignType: real - ${{ if in(variables['Build.Reason'], 'PullRequest') }}: - _SignType: test - LC_ALL: 'en_US.UTF-8' - LANG: 'en_US.UTF-8' - LANGUAGE: 'en_US.UTF-8' # Log environment variables in binary logs to ease debugging - MSBUILDLOGALLENVIRONMENTVARIABLES: true # Rely on task Arcade injects, not auto-injected build step. - skipComponentGovernanceDetection: true - ${{ each variable in parameters.variables }}: # handle a variable list using "name" and "value" properties # example: # - name: [key] # value: [value] - ${{ if ne(variable.name, '') }}: - name: ${{ variable.name }} value: ${{ variable.value }} # handle variable groups - ${{ if ne(variable.group, '') }}: - group: ${{ variable.group }} # handle name/value pairs (converting them into variable list entries) # example: # - [name]: [value] - ${{ if and(eq(variable.name, ''), eq(variable.group, '')) }}: - ${{ each pair in variable }}: - name: ${{ pair.key }} value: ${{ pair.value }} steps: - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: df -h displayName: Disk size - ${{ if eq(parameters.agentOs, 'macOS') }}: - script: sudo xcode-select -s /Applications/Xcode_12.5.1.app/Contents/Developer displayName: Use XCode 12.5.1 - checkout: self clean: true - ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.isAzDOTestingJob, true)) }}: - powershell: ./eng/scripts/InstallProcDump.ps1 displayName: Install ProcDump - powershell: ./eng/scripts/StartDumpCollectionForHangingBuilds.ps1 $(ProcDumpPath)procdump.exe artifacts/dumps/ (Get-Date).AddMinutes(160) dotnet displayName: Start background dump collection - ${{ if eq(parameters.installNodeJs, 'true') }}: - task: NodeTool@0 displayName: Install Node 18.x inputs: versionSpec: 18.x - ${{ if and(eq(parameters.installJdk, 'true'), eq(parameters.agentOs, 'Windows')) }}: - powershell: ./eng/scripts/InstallJdk.ps1 displayName: Install JDK 11 - ${{ if eq(parameters.isAzDOTestingJob, true) }}: - powershell: | Write-Host "##vso[task.setvariable variable=SeleniumProcessTrackingFolder]$(Build.SourcesDirectory)\artifacts\tmp\selenium\" ./eng/scripts/InstallGoogleChrome.ps1 displayName: Install Chrome - ${{ if eq(parameters.agentOs, 'Windows') }}: - powershell: Write-Host "##vso[task.prependpath]$(DOTNET_CLI_HOME)\.dotnet\tools" displayName: Add dotnet tools to path - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: echo "##vso[task.prependpath]$(DOTNET_CLI_HOME)/.dotnet/tools" displayName: Add dotnet tools to path - ${{ parameters.beforeBuild }} - ${{ if eq(parameters.agentOs, 'Windows') }}: - task: PowerShell@2 displayName: Setup Private Feeds Credentials inputs: filePath: $(Build.SourcesDirectory)/eng/common/SetupNugetSources.ps1 arguments: -ConfigFile $(Build.SourcesDirectory)/NuGet.config -Password $Env:Token env: Token: $(dn-bot-dnceng-artifact-feeds-rw) - ${{ if ne(parameters.agentOs, 'Windows') }}: - task: Bash@3 displayName: Setup Private Feeds Credentials inputs: filePath: $(Build.SourcesDirectory)/eng/common/SetupNugetSources.sh arguments: $(Build.SourcesDirectory)/NuGet.config $Token env: Token: $(dn-bot-dnceng-artifact-feeds-rw) # Add COMPlus_* environment variables to build steps. - ${{ if ne(parameters.steps, '')}}: - ${{ each step in parameters.steps }}: # Include all properties e.g. `task: CmdLine@2` or `displayName: Build x64` _except_ a provided `env:`. # Aim here is to avoid having two `env:` properties in the expanded YAML. - ${{ each pair in step }}: ${{ if ne(pair.key, 'env') }}: ${{ pair.key }}: ${{ pair.value }} env: # Include the variables we always want. COMPlus_DbgEnableMiniDump: 1 COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core" DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token) # Expand provided `env:` properties, if any. ${{ if step.env }}: ${{ step.env }} - ${{ if eq(parameters.steps, '')}}: - ${{ if eq(parameters.agentOs, 'Windows') }}: - script: $(BuildDirectory)\build.cmd -ci -nobl -Configuration $(BuildConfiguration) $(BuildScriptArgs) /p:DotNetSignType=$(_SignType) displayName: Run build.cmd env: COMPlus_DbgEnableMiniDump: 1 COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core" DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token) - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: $(BuildDirectory)/build.sh --ci --nobl --configuration $(BuildConfiguration) $(BuildScriptArgs) displayName: Run build.sh env: COMPlus_DbgEnableMiniDump: 1 COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core" DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token) - ${{ parameters.afterBuild }} - ${{ if eq(parameters.agentOs, 'Linux') }}: - script: df -h && du -h --threshold=50MB .. displayName: Disk utilization - ${{ if eq(parameters.agentOs, 'macOS') }}: - script: df -h && du -h -d 3 .. displayName: Disk utilization - ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.isAzDOTestingJob, true)) }}: - powershell: ./eng/scripts/FinishDumpCollectionForHangingBuilds.ps1 artifacts/dumps/ displayName: Finish background dump collection continueOnError: true condition: always() - ${{ if eq(parameters.agentOs, 'Windows') }}: - powershell: eng\scripts\KillProcesses.ps1 displayName: Kill processes continueOnError: true condition: always() - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: eng/scripts/KillProcesses.sh displayName: Kill processes continueOnError: true condition: always() - ${{ each artifact in parameters.artifacts }}: - task: 1ES.PublishPipelineArtifact@1 displayName: Upload artifacts from ${{ artifact.path }} condition: and(or(succeeded(), eq('${{ artifact.publishOnError }}', 'true')), or(eq(variables['system.pullrequest.isfork'], false), eq('${{ artifact.includeForks }}', 'true'))) continueOnError: true inputs: # Assume runtime variable values are absolute paths already. ${{ if startsWith(artifact.path, '$(') }}: path: ${{ artifact.path }} ${{ if not(startsWith(artifact.path, '$(')) }}: path: $(Build.SourcesDirectory)/${{ artifact.path }} ${{ if eq(artifact.name, '') }}: artifactName: artifacts-$(AgentOsName)-$(BuildConfiguration) ${{ if ne(artifact.name, '') }}: artifactName: ${{ artifact.name }} artifactType: Container parallel: true - ${{ if eq(parameters.agentOs, 'Windows') }}: - powershell: $(Build.SourcesDirectory)/eng/scripts/UploadCores.ps1 -ProcDumpOutputPath artifacts/dumps/ condition: failed() displayName: Upload cores - ${{ if ne(parameters.agentOs, 'Windows') }}: - script: $(Build.SourcesDirectory)/eng/scripts/upload-cores.sh condition: failed() displayName: Upload cores - ${{ if and(eq(parameters.isAzDOTestingJob, true), ne(parameters.enablePublishTestResults, false)) }}: - task: PublishTestResults@2 displayName: Publish js test results condition: always() inputs: testResultsFormat: JUnit testResultsFiles: '**/artifacts/log/**/*.junit.xml' testRunTitle: $(AgentOsName)-$(BuildConfiguration)-js mergeTestResults: true buildConfiguration: $(BuildConfiguration) buildPlatform: $(AgentOsName)
combined_dataset/train/non-malicious/sample_43_60.ps1
sample_43_60.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> Import-Module $PSScriptRoot\AzStackHci.Storage.Helpers.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global Import-LocalizedData -BindingVariable lnTxt -FileName AzStackHci.Storage.Strings.psd1 function Invoke-AzStackHciStorageValidation { <# .SYNOPSIS Perform AzStackHci Storage Validation .DESCRIPTION Perform AzStackHci Storage Validation to check the readiness for the storage subsystem on an exsting HCI stamp to be upgraded to the next generation of HCI stamp. The validation will cover the Storage Space Direct status, storage pool status, capacity for infrastructure volumes, etcs. .EXAMPLE PS C:\> Invoke-AzStackHciStorageValidation -PoolConfigXml $poolxml .INPUTS Inputs (if any) .OUTPUTS Output (if any) .NOTES #> [CmdletBinding()] param ( [Parameter(Mandatory = $true, HelpMessage = "Pool configuration xml from Storage role.")] [XML] $PoolConfigXml, [Parameter(Mandatory = $false, HelpMessage = "Return PSObject result.")] [switch] $PassThru, [Parameter(Mandatory = $false, HelpMessage = "Tests to include.")] [ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers })] [ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers) })] [string[]] $Include, [Parameter(Mandatory = $false, HelpMessage = "Tests to exclude.")] [ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers })] [ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers) })] [string[]] $Exclude, [Parameter(Mandatory = $false, HelpMessage = "Directory path for log and report output")] [string]$OutputPath, [Parameter(Mandatory = $false, HelpMessage = "Remove all previous progress and create a clean report")] [switch]$CleanReport = $false, [Parameter(Mandatory = $false, HelpMessage = "Show only failed results on screen.")] [switch]$ShowFailedOnly ) try { $script:ErrorActionPreference = 'Stop' Set-AzStackHciOutputPath -Path $OutputPath Write-AzStackHciHeader -invocation $MyInvocation -params $PSBoundParameters -PassThru:$PassThru Test-ModuleUpdate -PassThru:$PassThru # Call/Initialise reporting $envcheckerReport = Get-AzStackHciEnvProgress -clean:$CleanReport $envcheckerReport = Add-AzStackHciEnvJob -report $envcheckerReport Import-Module $PSScriptRoot\AzStackHci.Storage.Helpers.psm1 -Force -DisableNameChecking -Global Write-Progress -Id 1 -Activity "Checking AzStackHci Dependancies" -Status "Storage Configuration" -PercentComplete 0 -ErrorAction SilentlyContinue # Get the clustered storage subsystem name (this acts like an assert) $storageSubSystem = Get-StorageSubSystem Cluster* -ErrorAction Ignore if (-not $storageSubSystem) { throw $lnTxt.ErrNoStorageSubsystemFound } Log-Info -Message "StorageSubSystem: `n$($storageSubSystem | ft | Out-String)" # Get cluster nodes $clusterNodes = Get-ClusterNode Log-Info -Message "Cluster Nodes: `n$($clusterNodes | ft | Out-String)" $nodeCount = $clusterNodes.Count # Run validations $TestList = Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers $script:envchktestList = Select-TestList -Include $Include -Exclude $Exclude -TestList $TestList $TotalTestCount = ($script:envchktestList).Count $i = 0 $result = @() $progressParams = @{ Id = 1 Activity = "Checking AzStackHci Storage Configuration" Status = "Testing '$storageSubSystem'" ErrorAction = 'SilentlyContinue' } :noTestsBreak foreach ($test in $script:envchktestList) { $OpMsg = "Checking {0} on {1}" -f $test, $ENV:ComputerName Log-Info -Message $OpMsg Write-Progress @progressParams -CurrentOperation $OpMsg -PercentComplete (($i++ / $TotalTestCount) * 100) $splat = @{ PoolConfigXml = $PoolConfigXml NodeCount = $nodeCount } $Result += Invoke-Expression "$test @splat" } # Feedback results - user scenario Log-Info "Storage Validation" -ConsoleOut:(-not $PassThru) if (-not $PassThru) { $progressParams = @{ Id = 3 Activity = "Formating Results" Status = "Writing Results for '$storageSubSystem'" PercentComplete = 1 ErrorAction = 'SilentlyContinue' } Write-Progress @progressParams Write-AzStackHciResult -Title "${storageSubSystem}:" -Result $result -ShowFailedOnly:$ShowFailedOnly -Seperator ': ' Write-Summary -Result $result -Property1 Detail } else { return $result } } catch { Log-Info -Message "" -ConsoleOut Log-Info -Message "$($_.Exception.Message)" -ConsoleOut -Type Error Log-Info -Message "$($_.ScriptStackTrace)" -ConsoleOut -Type Error $cmdletFailed = $true } finally { $Script:ErrorActionPreference = 'SilentlyContinue' # Write result to telemetry channel foreach ($r in $result) { Write-ETWResult -Result $r } # Write validation result to report object and close out report $envcheckerReport | Add-Member -MemberType NoteProperty -Name 'Storage' -Value $result -Force $envcheckerReport = Close-AzStackHciEnvJob -report $envcheckerReport Write-AzStackHciEnvReport -report $envcheckerReport Write-AzStackHciFooter -invocation $MyInvocation -Failed:$cmdletFailed -PassThru:$PassThru } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCANFTXGPLLkRgdu # D5QKpyfMv5HLkxXJIrcfHM1aNM4Ez6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIK2Qbc5JkRWN1s6B5WOpLj8B # LcwD+VXQr01RNB4E8Bv5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAWmoWJYkXJGB0HMnam+XnbGsHbriDY6UltyDUBqBTAZdu/3KR+XrjWpE # zsA7CwANeKHTEYjtrNt/W1U04mVtk3YvnRf+/0Pa5ciXiBN3Pt4RbgA+KO7Jqea4 # GfvQsNo9DKSCsVfHRtyoHn7CfQU8EQ2ogQA7SS9ZFY5ARStXIbVFuEc1rA+pLS1R # J0rnvrx8jEpjZ4wdHpYqoK4KsRXrPJgzeOF+NzzqBflrn6uDGw3lc3uGJbREhjkH # 0q+gcMSZtMN8aIRQrONeRjCKAdGlbMVCUohO9eCCrqpjJ+zSrzVjqy3qeUuPzaRj # bKer9JQjh0b4uIvM0NSEJbeZsfPWaqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCgRQA3/vHWA9brtw49PvdZAd+bv0diaRHLErH+rWe4wgIGZbqjMwdT # GBMyMDI0MDIxMjE0MDUzMC44MTdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0SLowIhgPMjAyNDAyMTIxNTM1MjJaGA8yMDI0MDIxMzE1MzUyMlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRIugIBADAHAgEAAgIMLTAHAgEAAgIT3zAKAgUA # 6XWaOgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJ4/sip+/qc1E5gdImJu # jnRmqzGk04ZAlwN+eEO5ngxK/thUYULTdSxS+evVNLBNrvTausIyrC455QI209Vi # y9VcMCYz5JMqq4O101HIfzBGX/WVsCS6sqAISzHRf/1uGkbaBAp9bfyOR7hjM6mD # NnjSS1kYcQuu8CzPUcWIgr39MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgVvFvazU/Vin74YF6/tHzmwp9UNCQJkoLGZ2THXtrHs0wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIE3+00phcYLWcmQs1jDY/ypqiHL25D9igsNlQ7ZB44/A # MA0GCSqGSIb3DQEBCwUABIICAKW0XD3reE36cdnvYsxo3AZxOEoXhrcPE7laW5mT # I0kTVdvCA1ymSdNM9YgrN0sBtAe1H7W94omOllH2u/otuAfEo0JLbYa6ePGmQ76z # Hg1V4bGMyq1zGpFDXnH7MvEt5VOe9D4z8tywg1XLlN2lFMXk45MF5IDoFp2WmLc5 # 80wFtAXGGvNkrqZsSRmvoHy5QPTe+9sme+2xgDFEr6VFNzZ+Ia9z1pZZT8taN+gF # 7eCAApzMD0QCBnouhaqhmIRTdpWJb4JsWfIvGlMDJ2+NJIhP9VAh9mKeLeRsFgTs # tdm3cBvrxCCx+EEsyPllqJQko20AmfSPrwNEJr1mDGACUGkp6wg+PxouI7sX2uB+ # qYUqhxeqDnqJV//DUfS4fwYDuMAvviUrGUhPLvjVZMtUdn846R8E2e6ddSrcR3lX # v9BdEDPZ7efGx4RTxjNb1u030ASpF6XcrMh4LQ5Z9p7rv9LLpQD4CVBpqgvCq/75 # 2HxlbgCWGZVN6KXDOnaCfytXHyaRAqDsBRXAYJiZW/F5Qs/hBpcHwEaH3o7HhkF0 # wiT1pGOWUjep7NsNUsBZWLjgnQv2d6vG2K1euGupTpB3n2igFeXxsW+vdxEnMCQo # Tl45FYITLrq664YfOQnnlHvEegTa+xUm//57x9FVhbu5J0MmMFhROjTO3JdQKUhe # 4/HA # SIG # End signature block
combined_dataset/train/non-malicious/Select-UserGroup.ps1
Select-UserGroup.ps1
New-Grid -ControlName SelectUserGroups -Columns Auto,* -Rows 4 { $GetGroups = { $user = Get-QADUuser $this.Text -SizeLimit 1 if($User.LogonName -eq $this.Text -or $User.Email -eq $this.Text) { $this.Foreground = "Black" $Group.ItemsSource = Get-QADGroup -ContainsMember $user $UserName.Text = $user.LogonName $EmailAddress.Text = $user.Email } else { $this.Foreground = "Red" $Group.ItemsSource = @() } } New-Label "Name" New-Textbox -name UserName -minwidth 100 -Column 1 -On_LostFocus $GetGroups New-Label "Email" -Row 1 New-Textbox -name EmailAddress -minwidth 100 -Column 1 -Row 1 -On_LostFocus $GetGroups New-Label "Group" -Row 2 New-Listbox -name Group -Column 1 -Row 2 New-Button "OK" -Row 3 -Column 1 -On_Click { Get-ParentControl | Set-UIValue -Passthru | Close-Control } } -Show
combined_dataset/train/non-malicious/43.ps1
43.ps1
[CmdletBinding(DefaultParameterSetName="NormalRun")] Param( [parameter(Mandatory=$true,ParameterSetName="NormalRun")] [alias("s")] [ValidateScript({ if (!($_.contains("/"))){ $True } else { Throw "Please use the hostname FQDN and not the HTTPS URL. Example: 'scep-contoso.msappproxy.net'" } } )] [string]$server, [parameter(Mandatory=$true,ParameterSetName="NormalRun")] [alias("q")] [ValidateRange(1,31)] [INT]$querysize, [parameter(ParameterSetName="Help")] [alias("h","?","/?")] [switch]$help, [parameter(ParameterSetName="Help")] [alias("u")] [switch]$usage ) function Show-Usage{ Write-Host Write-Host "-help -h Displays the help." Write-Host "-usage -u Displays this usage information." Write-Host "-querysize -q Specify the size of the query string payload to use as a number of kilobytes (i.e. 20 or 25). Maximum value is 31" Write-Host "-server -s Specify NDES server public DNS name in the form FQDN. For example ExternalDNSName.Contoso.com" Write-Host } function Get-NDESURLHelp{ write-host "Validate-NDESUrl will check that requests from devices enrolled in Microsoft Intune will get through all the network protections (such as a reverse proxy) and make it to the NDES server." Write-Host write-host "Since the certificate requests include a payload query string that is longer than what is allowed by default settings in Windows, IIS and some reverse proxy servers, those servers need to be configured to allow long query strings and web requests." write-host "This tool will simulate a SCEP request with a large payload, allowing you to check the IIS logs on the NDES server to ensure that the request is not being blocked anywhere along the way." Write-Host } if($help){ Get-NDESURLHelp break } if($usage){ Show-Usage break } if ((Get-WmiObject -class Win32_OperatingSystem).ProductType -notlike "1"){ if (Test-Path HKLM:SOFTWARE\Microsoft\Cryptography\MSCEP) { Write-Host Write-Host "Error: This appears to be the NDES server. Please run this script from a different machine. An external (guest) connection is best." -BackgroundColor Red write-host "Exiting......................" break } } Write-host Write-host "......................................................." Write-host Write-Host "Trying base NDES URI... " -ForegroundColor Yellow Write-host if (resolve-dnsname $server -ErrorAction SilentlyContinue){ $NDESUrl = "https://$($server)/certsrv/mscep/mscep.dll" $BaseURLstatuscode = try {(Invoke-WebRequest -Uri $NDESUrl).statuscode} catch {$_.Exception.Response.StatusCode.Value__} if ($BaseURLstatuscode -eq "200"){ Write-Warning "$($NDESUrl) returns a status code 200 . This usually signifies an error with the Intune Connector registering itself or not being installed." Write-Host Write-Host "This state will _not_ provide a working NDES infrastructure, although validation of long URI support can continue." Write-Host } elseif ($BaseURLstatuscode -eq "403"){ Write-Host "Success: " -ForegroundColor Green -NoNewline write-host "Proceeding with validation!" } else { Write-Warning "Unexpected Error code! This usually signifies an error with the Intune Connector registering itself or not being installed." Write-Host Write-host "Expected value is a 403. We received a $($BaseURLstatuscode). This state will _not_ provide a working NDES infrastructure, although we can proceed with the validation included in this test" } } else { write-host "Error: Cannot resolve $($server)" -BackgroundColor Red Write-Host Write-Host "Please ensure a DNS record is in place and name resolution is successful" Write-Host Write-Host "Exiting................................................" Write-Host exit } Write-host Write-host "......................................................." Write-host Write-Host "Trying to retrieve CA Capabilities... " -ForegroundColor Yellow Write-host $GetCACaps = "$($NDESUrl)?operation=GetCACaps&message=NDESLongUrlValidatorStep1of3" $CACapsStatuscode = try {(Invoke-WebRequest -Uri $GetCACaps).statuscode} catch {$_.Exception.Response.StatusCode.Value__} if (-not ($CACapsStatuscode -eq "200")){ Write-host "Retrieving the following URL: " -NoNewline Write-Host "$GetCACaps" -ForegroundColor Cyan Write-host write-host "Error: Server returned a $CACapsStatuscode error. " -BackgroundColor Red Write-Host write-host "For a list of IIS error codes, please visit the below link." Write-Host "URL: https://support.microsoft.com/en-gb/help/943891/the-http-status-code-in-iis-7-0--iis-7-5--and-iis-8-0" } else { Write-host "Retrieving the following URL: " -NoNewline Write-Host "$GetCACaps" -ForegroundColor Cyan Write-host $CACaps = (Invoke-WebRequest -Uri $GetCACaps).content if ($CACaps) { Write-Host "Success: " -ForegroundColor Green -NoNewline write-host "CA CApabilities retrieved:" Write-Host write-host $CACaps } else { write-host "Error: Server is not returning CA Capabilities." -BackgroundColor Red Write-Host write-host "PLEASE NOTE: This is not a long URI issue. Please investigate the NDES configuration." Write-Host } } Write-host Write-host "......................................................." Write-host Write-Host "Trying to retrieve CA Certificates... " -ForegroundColor Yellow Write-host $GetCACerts = "$($NDESUrl)?operation=GetCACerts&message=NDESLongUrlValidatorStep2of3" $CACertsStatuscode = try {(Invoke-WebRequest -Uri $GetCACerts).statuscode} catch {$_.Exception.Response.StatusCode.Value__} if (-not ($CACertsStatuscode -eq "200")){ Write-host "Attempting to retrieve certificates from the following URL: " -NoNewline Write-Host "$GetCACerts" -ForegroundColor Cyan Write-host write-host "Error: Server returned a $CACertsStatuscode error. " -BackgroundColor Red Write-Host write-host "For a list of IIS error codes, please visit the below link." Write-Host "URL: https://support.microsoft.com/en-gb/help/943891/the-http-status-code-in-iis-7-0--iis-7-5--and-iis-8-0" } else { Write-host "Attempting to retrieve certificates from the following URI: " -NoNewline Write-Host "$GetCACerts" -ForegroundColor Cyan Write-Host $CACerts = (Invoke-WebRequest -Uri $GetCACerts).content if ($CACerts) { Invoke-WebRequest -Uri $GetCACerts -ContentType "application/x-x509-ca-ra-cert" -OutFile "$env:temp\$server.p7b" Write-Host "Success: " -ForegroundColor Green -NoNewline write-host "certificates retrieved. File written to disk: $env:temp\$server.p7b" } else { write-host "Error: Server is not returning CA certificates." -BackgroundColor Red Write-Host write-host "PLEASE NOTE: This is _not_ a long URI issue. Please investigate the NDES configuration." Write-Host } } Write-host Write-host "......................................................." Write-host Write-Host "Querying URI with simulated SCEP challenge... " -ForegroundColor Yellow Write-host $ChallengeUrlTemp = "$($NDESUrl)?operation=PKIOperation&message=<SCEP CHALLENGE STRING>" Write-host "Retrieving the following URI: " -NoNewline Write-Host "$ChallengeUrlTemp" -ForegroundColor Cyan Write-host Write-Host "Using a query size of $($querysize)KB... " Write-Host $challengeBase = "NDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallenge"; for ($i=1; $i -le $querySize; $i++){ $testChallenge += $challengeBase + ($i + 1) } $LongUrl = "$($NDESUrl)?operation=PKIOperation&message=$($testChallenge)" $LongUrlStatusCode = try {(Invoke-WebRequest -Uri $LongUrl).statuscode} catch {$_.Exception.Response.StatusCode.Value__} if ($LongUrlStatusCode -eq "414"){ write-host "Error: HTTP Error 414. The $($querysize)KB URI is too long. " -BackgroundColor Red Write-Host Write-Host "Please ensure all servers and network devices support long URI's" -ForegroundColor Blue write-host } elseif (-not ($LongUrlStatusCode -eq "200")) { write-host "Error: HTTP Error $($LongUrlStatusCode)" -BackgroundColor Red Write-Host Write-Host "Please check your network configuration." -ForegroundColor Blue -BackgroundColor white write-host write-host "For a list of IIS error codes, please visit the below link." Write-Host "URL: https://support.microsoft.com/en-gb/help/943891/the-http-status-code-in-iis-7-0--iis-7-5--and-iis-8-0" } else { Write-Host "Success: " -ForegroundColor Green -NoNewline write-host "Server accepts a $($querysize)KB URI." } Write-host Write-host "......................................................." Write-host Write-host "End of NDES URI validation" -ForegroundColor Yellow Write-Host write-host "Ending script..." -ForegroundColor Yellow Write-host
combined_dataset/train/non-malicious/sample_19_67.ps1
sample_19_67.ps1
# # Add-AppxDevPackage.ps1 is a PowerShell script designed to install app # packages created by Visual Studio for developers. To run this script from # Explorer, right-click on its icon and choose "Run with PowerShell". # # Visual Studio supplies this script in the folder generated with its # "Prepare Package" command. The same folder will also contain the app # package (a .appx file), the signing certificate (a .cer file), and a # "Dependencies" subfolder containing all the framework packages used by the # app. # # This script simplifies installing these packages by automating the # following functions: # 1. Find the app package and signing certificate in the script directory # 2. Prompt the user to acquire a developer license and to install the # certificate if necessary # 3. Find dependency packages that are applicable to the operating system's # CPU architecture # 4. Install the package along with all applicable dependencies # # All command line parameters are reserved for use internally by the script. # Users should launch this script from Explorer. # # .Link # http://go.microsoft.com/fwlink/?LinkId=243053 param( [switch]$Force = $false, [switch]$GetDeveloperLicense = $false, [switch]$SkipLoggingTelemetry = $false, [string]$CertificatePath = $null ) $ErrorActionPreference = "Stop" # The language resources for this script are placed in the # "Add-AppDevPackage.resources" subfolder alongside the script. Since the # current working directory might not be the directory that contains the # script, we need to create the full path of the resources directory to # pass into Import-LocalizedData $ScriptPath = $null try { $ScriptPath = (Get-Variable MyInvocation).Value.MyCommand.Path $ScriptDir = Split-Path -Parent $ScriptPath } catch {} if (!$ScriptPath) { PrintMessageAndExit $UiStrings.ErrorNoScriptPath $ErrorCodes.NoScriptPath } $LocalizedResourcePath = Join-Path $ScriptDir "Add-AppDevPackage.resources" Import-LocalizedData -BindingVariable UiStrings -BaseDirectory $LocalizedResourcePath $ErrorCodes = Data { ConvertFrom-StringData @' Success = 0 NoScriptPath = 1 NoPackageFound = 2 ManyPackagesFound = 3 NoCertificateFound = 4 ManyCertificatesFound = 5 BadCertificate = 6 PackageUnsigned = 7 CertificateMismatch = 8 ForceElevate = 9 LaunchAdminFailed = 10 GetDeveloperLicenseFailed = 11 InstallCertificateFailed = 12 AddPackageFailed = 13 ForceDeveloperLicense = 14 CertUtilInstallFailed = 17 CertIsCA = 18 BannedEKU = 19 NoBasicConstraints = 20 NoCodeSigningEku = 21 InstallCertificateCancelled = 22 BannedKeyUsage = 23 ExpiredCertificate = 24 '@ } $IMAGE_FILE_MACHINE_i386 = 0x014c $IMAGE_FILE_MACHINE_AMD64 = 0x8664 $IMAGE_FILE_MACHINE_ARM64 = 0xAA64 $IMAGE_FILE_MACHINE_ARM = 0x01c0 $IMAGE_FILE_MACHINE_THUMB = 0x01c2 $IMAGE_FILE_MACHINE_ARMNT = 0x01c4 $MACHINE_ATTRIBUTES_UserEnabled = 0x01 $MACHINE_ATTRIBUTES_KernelEnabled = 0x02 $MACHINE_ATTRIBUTES_Wow64Container = 0x04 # First try to use IsWow64Process2 to determine the OS architecture try { $IsWow64Process2_MethodDefinition = @" [DllImport("kernel32.dll", SetLastError = true)] public static extern bool IsWow64Process2(IntPtr process, out ushort processMachine, out ushort nativeMachine); "@ $Kernel32 = Add-Type -MemberDefinition $IsWow64Process2_MethodDefinition -Name "Kernel32" -Namespace "Win32" -PassThru $Proc = Get-Process -id $pid $processMachine = New-Object uint16 $nativeMachine = New-Object uint16 $Res = $Kernel32::IsWow64Process2($Proc.Handle, [ref] $processMachine, [ref] $nativeMachine) if ($Res -eq $True) { switch ($nativeMachine) { $IMAGE_FILE_MACHINE_i386 { $ProcessorArchitecture = "x86" } $IMAGE_FILE_MACHINE_AMD64 { $ProcessorArchitecture = "amd64" } $IMAGE_FILE_MACHINE_ARM64 { $ProcessorArchitecture = "arm64" } $IMAGE_FILE_MACHINE_ARM { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_THUMB { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_ARMNT { $ProcessorArchitecture = "arm" } } } } catch { # Ignore exception and fall back to using environment variables to determine the OS architecture } $Amd64AppsSupportedOnArm64 = $False if ($null -eq $ProcessorArchitecture) { $ProcessorArchitecture = $Env:Processor_Architecture # Getting $Env:Processor_Architecture on arm64 machines will return x86. So check if the environment # variable "ProgramFiles(Arm)" is also set, if it is we know the actual processor architecture is arm64. # The value will also be x86 on amd64 machines when running the x86 version of PowerShell. if ($ProcessorArchitecture -eq "x86") { if ($null -ne ${Env:ProgramFiles(Arm)}) { $ProcessorArchitecture = "arm64" } elseif ($null -ne ${Env:ProgramFiles(x86)}) { $ProcessorArchitecture = "amd64" } } } elseif ("arm64" -eq $ProcessorArchitecture) { # If we successfully determined the OS to be arm64 with the above call to IsWow64Process2 and we're on Win11+ # we need to check for a special case where amd64 apps are supported as well. if ([Environment]::OSVersion.Version -ge (new-object 'Version' 10,0,22000)) { try { $GetMachineTypeAttributes_MethodDefinition = @" [DllImport("api-ms-win-core-processthreads-l1-1-7.dll", EntryPoint = "GetMachineTypeAttributes", ExactSpelling = true, PreserveSig = false)] public static extern void GetMachineTypeAttributes(ushort Machine, out ushort machineTypeAttributes); "@ $ProcessThreads = Add-Type -MemberDefinition $GetMachineTypeAttributes_MethodDefinition -Name "processthreads_l1_1_7" -Namespace "Win32" -PassThru $machineTypeAttributes = New-Object uint16 $ProcessThreads::GetMachineTypeAttributes($IMAGE_FILE_MACHINE_AMD64, [ref] $machineTypeAttributes) # We're looking for the case where the UserEnabled flag is set if (($machineTypeAttributes -band $MACHINE_ATTRIBUTES_UserEnabled) -ne 0) { $Amd64AppsSupportedOnArm64 = $True } } catch { # Ignore exceptions and maintain assumption that amd64 apps aren't supported on this machine } } } function PrintMessageAndExit($ErrorMessage, $ReturnCode) { Write-Host $ErrorMessage try { # Log telemetry data regarding the use of the script if possible. # There are three ways that this can be disabled: # 1. If the "TelemetryDependencies" folder isn't present. This can be excluded at build time by setting the MSBuild property AppxLogTelemetryFromSideloadingScript to false # 2. If the SkipLoggingTelemetry switch is passed to this script. # 3. If Visual Studio telemetry is disabled via the registry. $TelemetryAssembliesFolder = (Join-Path $PSScriptRoot "TelemetryDependencies") if (!$SkipLoggingTelemetry -And (Test-Path $TelemetryAssembliesFolder)) { $job = Start-Job -FilePath (Join-Path $TelemetryAssembliesFolder "LogSideloadingTelemetry.ps1") -ArgumentList $TelemetryAssembliesFolder, "VS/DesignTools/SideLoadingScript/AddAppDevPackage", $ReturnCode, $ProcessorArchitecture Wait-Job -Job $job -Timeout 60 | Out-Null } } catch { # Ignore telemetry errors } if (!$Force) { Pause } exit $ReturnCode } # # Warns the user about installing certificates, and presents a Yes/No prompt # to confirm the action. The default is set to No. # function ConfirmCertificateInstall { $Answer = $host.UI.PromptForChoice( "", $UiStrings.WarningInstallCert, [System.Management.Automation.Host.ChoiceDescription[]]@($UiStrings.PromptYesString, $UiStrings.PromptNoString), 1) return $Answer -eq 0 } # # Validates whether a file is a valid certificate using CertUtil. # This needs to be done before calling Get-PfxCertificate on the file, otherwise # the user will get a cryptic "Password: " prompt for invalid certs. # function ValidateCertificateFormat($FilePath) { # certutil -verify prints a lot of text that we don't need, so it's redirected to $null here certutil.exe -verify $FilePath > $null if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorBadCertificate -f $FilePath, $LastExitCode) $ErrorCodes.BadCertificate } # Check if certificate is expired $cert = Get-PfxCertificate $FilePath if (($cert.NotBefore -gt (Get-Date)) -or ($cert.NotAfter -lt (Get-Date))) { PrintMessageAndExit ($UiStrings.ErrorExpiredCertificate -f $FilePath) $ErrorCodes.ExpiredCertificate } } # # Verify that the developer certificate meets the following restrictions: # - The certificate must contain a Basic Constraints extension, and its # Certificate Authority (CA) property must be false. # - The certificate's Key Usage extension must be either absent, or set to # only DigitalSignature. # - The certificate must contain an Extended Key Usage (EKU) extension with # Code Signing usage. # - The certificate must NOT contain any other EKU except Code Signing and # Lifetime Signing. # # These restrictions are enforced to decrease security risks that arise from # trusting digital certificates. # function CheckCertificateRestrictions { Set-Variable -Name BasicConstraintsExtensionOid -Value "2.5.29.19" -Option Constant Set-Variable -Name KeyUsageExtensionOid -Value "2.5.29.15" -Option Constant Set-Variable -Name EkuExtensionOid -Value "2.5.29.37" -Option Constant Set-Variable -Name CodeSigningEkuOid -Value "1.3.6.1.5.5.7.3.3" -Option Constant Set-Variable -Name LifetimeSigningEkuOid -Value "1.3.6.1.4.1.311.10.3.13" -Option Constant Set-Variable -Name UwpSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.1" -Option Constant Set-Variable -Name DisposableSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.2" -Option Constant $CertificateExtensions = (Get-PfxCertificate $CertificatePath).Extensions $HasBasicConstraints = $false $HasCodeSigningEku = $false foreach ($Extension in $CertificateExtensions) { # Certificate must contain the Basic Constraints extension if ($Extension.oid.value -eq $BasicConstraintsExtensionOid) { # CA property must be false if ($Extension.CertificateAuthority) { PrintMessageAndExit $UiStrings.ErrorCertIsCA $ErrorCodes.CertIsCA } $HasBasicConstraints = $true } # If key usage is present, it must be set to digital signature elseif ($Extension.oid.value -eq $KeyUsageExtensionOid) { if ($Extension.KeyUsages -ne "DigitalSignature") { PrintMessageAndExit ($UiStrings.ErrorBannedKeyUsage -f $Extension.KeyUsages) $ErrorCodes.BannedKeyUsage } } elseif ($Extension.oid.value -eq $EkuExtensionOid) { # Certificate must contain the Code Signing EKU $EKUs = $Extension.EnhancedKeyUsages.Value if ($EKUs -contains $CodeSigningEkuOid) { $HasCodeSigningEKU = $True } # EKUs other than code signing and lifetime signing are not allowed foreach ($EKU in $EKUs) { if ($EKU -ne $CodeSigningEkuOid -and $EKU -ne $LifetimeSigningEkuOid -and $EKU -ne $UwpSigningEkuOid -and $EKU -ne $DisposableSigningEkuOid) { PrintMessageAndExit ($UiStrings.ErrorBannedEKU -f $EKU) $ErrorCodes.BannedEKU } } } } if (!$HasBasicConstraints) { PrintMessageAndExit $UiStrings.ErrorNoBasicConstraints $ErrorCodes.NoBasicConstraints } if (!$HasCodeSigningEKU) { PrintMessageAndExit $UiStrings.ErrorNoCodeSigningEku $ErrorCodes.NoCodeSigningEku } } # # Performs operations that require administrative privileges: # - Prompt the user to obtain a developer license # - Install the developer certificate (if -Force is not specified, also prompts the user to confirm) # function DoElevatedOperations { if ($GetDeveloperLicense) { Write-Host $UiStrings.GettingDeveloperLicense if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } try { Show-WindowsDeveloperLicenseRegistration } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } } if ($CertificatePath) { Write-Host $UiStrings.InstallingCertificate # Make sure certificate format is valid and usage constraints are followed ValidateCertificateFormat $CertificatePath CheckCertificateRestrictions # If -Force is not specified, warn the user and get consent if ($Force -or (ConfirmCertificateInstall)) { # Add cert to store certutil.exe -addstore TrustedPeople $CertificatePath if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorCertUtilInstallFailed -f $LastExitCode) $ErrorCodes.CertUtilInstallFailed } } else { PrintMessageAndExit $UiStrings.ErrorInstallCertificateCancelled $ErrorCodes.InstallCertificateCancelled } } } # # Checks whether the machine is missing a valid developer license. # function CheckIfNeedDeveloperLicense { $Result = $true try { $Result = (Get-WindowsDeveloperLicense | Where-Object { $_.IsValid } | Measure-Object).Count -eq 0 } catch {} return $Result } # # Launches an elevated process running the current script to perform tasks # that require administrative privileges. This function waits until the # elevated process terminates, and checks whether those tasks were successful. # function LaunchElevated { # Set up command line arguments to the elevated process $RelaunchArgs = '-ExecutionPolicy Unrestricted -file "' + $ScriptPath + '"' if ($Force) { $RelaunchArgs += ' -Force' } if ($NeedDeveloperLicense) { $RelaunchArgs += ' -GetDeveloperLicense' } if ($SkipLoggingTelemetry) { $RelaunchArgs += ' -SkipLoggingTelemetry' } if ($NeedInstallCertificate) { $RelaunchArgs += ' -CertificatePath "' + $DeveloperCertificatePath.FullName + '"' } # Launch the process and wait for it to finish try { $PowerShellExePath = (Get-Process -Id $PID).Path $AdminProcess = Start-Process $PowerShellExePath -Verb RunAs -ArgumentList $RelaunchArgs -PassThru } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorLaunchAdminFailed $ErrorCodes.LaunchAdminFailed } while (!($AdminProcess.HasExited)) { Start-Sleep -Seconds 2 } # Check if all elevated operations were successful if ($NeedDeveloperLicense) { if (CheckIfNeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } else { Write-Host $UiStrings.AcquireLicenseSuccessful } } if ($NeedInstallCertificate) { $Signature = Get-AuthenticodeSignature $DeveloperPackagePath -Verbose if ($Signature.Status -ne "Valid") { PrintMessageAndExit ($UiStrings.ErrorInstallCertificateFailed -f $Signature.Status) $ErrorCodes.InstallCertificateFailed } else { Write-Host $UiStrings.InstallCertificateSuccessful } } } # # Finds all applicable dependency packages according to OS architecture, and # installs the developer package with its dependencies. The expected layout # of dependencies is: # # <current dir> # \Dependencies # <Architecture neutral dependencies>.appx\.msix # \x86 # <x86 dependencies>.appx\.msix # \x64 # <x64 dependencies>.appx\.msix # \arm # <arm dependencies>.appx\.msix # \arm64 # <arm64 dependencies>.appx\.msix # function InstallPackageWithDependencies { $DependencyPackagesDir = (Join-Path $ScriptDir "Dependencies") $DependencyPackages = @() if (Test-Path $DependencyPackagesDir) { # Get architecture-neutral dependencies $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } # Get architecture-specific dependencies if (($ProcessorArchitecture -eq "x86" -or $ProcessorArchitecture -eq "amd64" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "x86"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if ((($ProcessorArchitecture -eq "amd64") -or ($ProcessorArchitecture -eq "arm64" -and $Amd64AppsSupportedOnArm64)) -and (Test-Path (Join-Path $DependencyPackagesDir "x64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } } Write-Host $UiStrings.InstallingPackage $AddPackageSucceeded = $False try { if ($DependencyPackages.FullName.Count -gt 0) { Write-Host $UiStrings.DependenciesFound $DependencyPackages.FullName Add-AppxPackage -Path $DeveloperPackagePath.FullName -DependencyPath $DependencyPackages.FullName -ForceApplicationShutdown } else { Add-AppxPackage -Path $DeveloperPackagePath.FullName -ForceApplicationShutdown } $AddPackageSucceeded = $? } catch { $Error[0] # Dump details about the last error } if (!$AddPackageSucceeded) { if ($NeedInstallCertificate) { PrintMessageAndExit $UiStrings.ErrorAddPackageFailedWithCert $ErrorCodes.AddPackageFailed } else { PrintMessageAndExit $UiStrings.ErrorAddPackageFailed $ErrorCodes.AddPackageFailed } } } # # Main script logic when the user launches the script without parameters. # function DoStandardOperations { # Check for an .appx or .msix file in the script directory $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } if ($PackagePath -eq $null) { $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } } $PackageCount = ($PackagePath | Measure-Object).Count # Check for an .appxbundle or .msixbundle file in the script directory $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.appxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($BundlePath -eq $null) { $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.msixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $BundleCount = ($BundlePath | Measure-Object).Count # Check for an .eappx or .emsix file in the script directory $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.eappx") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedPackagePath -eq $null) { $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.emsix") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedPackageCount = ($EncryptedPackagePath | Measure-Object).Count # Check for an .eappxbundle or .emsixbundle file in the script directory $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.eappxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedBundlePath -eq $null) { $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.emsixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedBundleCount = ($EncryptedBundlePath | Measure-Object).Count $NumberOfPackages = $PackageCount + $EncryptedPackageCount $NumberOfBundles = $BundleCount + $EncryptedBundleCount # There must be at least one package or bundle if ($NumberOfPackages + $NumberOfBundles -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoPackageFound $ErrorCodes.NoPackageFound } # We must have exactly one bundle OR no bundle and exactly one package elseif ($NumberOfBundles -gt 1 -or ($NumberOfBundles -eq 0 -and $NumberOfpackages -gt 1)) { PrintMessageAndExit $UiStrings.ErrorManyPackagesFound $ErrorCodes.ManyPackagesFound } # First attempt to install a bundle or encrypted bundle. If neither exists, fall back to packages and then encrypted packages if ($BundleCount -eq 1) { $DeveloperPackagePath = $BundlePath Write-Host ($UiStrings.BundleFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedBundleCount -eq 1) { $DeveloperPackagePath = $EncryptedBundlePath Write-Host ($UiStrings.EncryptedBundleFound -f $DeveloperPackagePath.FullName) } elseif ($PackageCount -eq 1) { $DeveloperPackagePath = $PackagePath Write-Host ($UiStrings.PackageFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedPackageCount -eq 1) { $DeveloperPackagePath = $EncryptedPackagePath Write-Host ($UiStrings.EncryptedPackageFound -f $DeveloperPackagePath.FullName) } # The package must be signed $PackageSignature = Get-AuthenticodeSignature $DeveloperPackagePath $PackageCertificate = $PackageSignature.SignerCertificate if (!$PackageCertificate) { PrintMessageAndExit $UiStrings.ErrorPackageUnsigned $ErrorCodes.PackageUnsigned } # Test if the package signature is trusted. If not, the corresponding certificate # needs to be present in the current directory and needs to be installed. $NeedInstallCertificate = ($PackageSignature.Status -ne "Valid") if ($NeedInstallCertificate) { # List all .cer files in the script directory $DeveloperCertificatePath = Get-ChildItem (Join-Path $ScriptDir "*.cer") | Where-Object { $_.Mode -NotMatch "d" } $DeveloperCertificateCount = ($DeveloperCertificatePath | Measure-Object).Count # There must be exactly 1 certificate if ($DeveloperCertificateCount -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoCertificateFound $ErrorCodes.NoCertificateFound } elseif ($DeveloperCertificateCount -gt 1) { PrintMessageAndExit $UiStrings.ErrorManyCertificatesFound $ErrorCodes.ManyCertificatesFound } Write-Host ($UiStrings.CertificateFound -f $DeveloperCertificatePath.FullName) # The .cer file must have the format of a valid certificate ValidateCertificateFormat $DeveloperCertificatePath # The package signature must match the certificate file if ($PackageCertificate -ne (Get-PfxCertificate $DeveloperCertificatePath)) { PrintMessageAndExit $UiStrings.ErrorCertificateMismatch $ErrorCodes.CertificateMismatch } } $NeedDeveloperLicense = CheckIfNeedDeveloperLicense # Relaunch the script elevated with the necessary parameters if needed if ($NeedDeveloperLicense -or $NeedInstallCertificate) { Write-Host $UiStrings.ElevateActions if ($NeedDeveloperLicense) { Write-Host $UiStrings.ElevateActionDevLicense } if ($NeedInstallCertificate) { Write-Host $UiStrings.ElevateActionCertificate } $IsAlreadyElevated = ([Security.Principal.WindowsIdentity]::GetCurrent().Groups.Value -contains "S-1-5-32-544") if ($IsAlreadyElevated) { if ($Force -and $NeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } if ($Force -and $NeedInstallCertificate) { Write-Warning $UiStrings.WarningInstallCert } } else { if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceElevate $ErrorCodes.ForceElevate } else { Write-Host $UiStrings.ElevateActionsContinue Pause } } LaunchElevated } InstallPackageWithDependencies } # # Main script entry point # if ($GetDeveloperLicense -or $CertificatePath) { DoElevatedOperations } else { DoStandardOperations PrintMessageAndExit $UiStrings.Success $ErrorCodes.Success } # SIG # Begin signature block # MIImLQYJKoZIhvcNAQcCoIImHjCCJhoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAYh/586NhEPWiO # +3D6/pj3+lXDRXkK9+wCdlGR7safL6CCC3YwggT+MIID5qADAgECAhMzAAAFVskg # Kx90Ml0tAAAAAAVWMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTExWhcNMjQxMDE2MTk1MTExWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCW2kg89zWnssiDG9AFq/sxqkPT43V4MZ6vwu7C4+sly46QJA4UNxSRnGDz9u8f # 18OR1/Ar9guQDqRthrOOktLaol49HZfv8l1DEeB/uguWS0qFIJe+cK6b7grVfl0S # Z7U8yOXu67n52z+QJN+iUxcIk0KWcu/sJZ8KfewKxnNDMDIHHhUHvIjQWhvKxOLC # /TwL0i4wTykXuQwbwIZuuGi7TYA82Q2LkYOLlwOTPOb0eowhcUI7CaXlU30IgoG4 # frY+mtZMZnTx0ga/a36GVNdq6NeBKzlGbLB02/WIP+c5ADDCXsheWpkizJt9aPhz # Yuont+Nx0OhIH04lJFvCqjljAgMBAAGjggF9MIIBeTAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUJt8FhQFwX7g5A/0elDxkjww82dow # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwODY1KzUwMTY1NTAfBgNVHSMEGDAW # gBTm/F97uyIAWORyTrX0IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v # Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0Ff # MjAxMC0wNy0wNi5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEw # LTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBCnZlo # MxjHBVHJEP6d+0t7EDJfNB0h7j9iOX6LQiPMdQAV1xqA6Jgb/VEPSEVs076CAJn3 # KP5Jpr4DOuo12BE2CoCusZDHn+7aP2yxngMGGQcJKz4UfOzDMS9Yr2sl3R6fMP18 # T4Ce5t7IYFK36PI/HfvHO8AzB3T0KhVIifqsSwZ8mEukw/wi4duJYulYxV2lY2kM # Hwv/OKvKAsrTd338HlnuR+z9NZvStNUi1a8sTwcEMrEP8lgtoxaZe0Ypu/Ohn4Pq # TefEVWKQJLU2KFyLDkoamDde0ydAzzHYEqdBQMW0gxWyvJ9fjgF/C2PKQVu/0SMB # hcwo04eFzf/w7pZ/MIIGcDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0B # AQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAG # A1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAw # HhcNMTAwNzA2MjA0MDE3WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA # 6Q5kUHlntcTj/QkATJ6UrPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9 # RJwI6GWTzixVhL99COMuK6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjW # axeUOpPOJj/s5v40mFfVHV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkc # vR3EVWJXcvhnuSUgNN5dpqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YAS # NUwSpr5SW/Wm2uCLC0h31oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZ # M4BqiU2jamZjeJPVMM+VHwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAw # HQYDVR0OBBYEFOb8X3u7IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoA # UwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQY # MBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6 # Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1 # dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0 # dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3J0MIGdBgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9Bggr # BgEFBQcCARYxaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9k # ZWZhdWx0Lmh0bTBABggrBgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABp # AGMAeQBfAFMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA # GnTvV08pe8QWhXi4UNMi/AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1 # b6/lf3mVd+UC1PHr2M1OHhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMh # KeWloWmMIpPMdJjnoUdD8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJ # N2FtB91TGcun1mHCv+KDqw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCq # tq27ckdjF/qm1qKmhuyoEESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW # 77Gcf/wiS0mKbhXjpn92W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14y # jPs3hdHcdYWch8ZaV4XCv90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaX # evfpUk30dwVPhcbYC/GO7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19x # HkCvmGXJIuhCISWKHC1g2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQ # HTiVmx5mMxMnORd4hzbOTsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlac # vyRdUQKdannSF9PawZSOB3slcUSrBmrm1MbfI5qWdcUxghoNMIIaCQIBATCBlTB+ # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9N # aWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEwAhMzAAAFVskgKx90Ml0tAAAA # AAVWMA0GCWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE # MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA/ # 8sllbhmdgHazXDKfJje5ZPISyNOJfdmSfAvZZC8tJDBCBgorBgEEAYI3AgEMMTQw # MqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tMA0GCSqGSIb3DQEBAQUABIIBADM25byC4DvYoSwRbJsIrfa7bN2nPmU1Vgs6 # Ib0OOmBbGTuQgw9PbQVHaWZfyHa3qBwOveKb6JSheEg6YpkcAHMoqeVAqYTuDJoo # nPV5isL+EPA/YskdzmIDr7nCnXSDF/DoeItBOi2N1FExmYKM1sC9EDIclZvOPk5B # 90QjfYZ65l9JUhjxaM0Mx3ZOXbqYmQKKYePywHVz/owQKUAcihyMcY9vt91EU49v # x15JI2Z3TeVSrbmcPf+SMQmYkuSOVOmoUfVWGP7K/YdZ3VcVS0Nk9s4x+ZkUXNau # cORRqHz8UcVXtKlVoM8GsJZ+mAOP712ejsxrVStoFRc14lX+wXKhgheXMIIXkwYK # KwYBBAGCNwMDATGCF4Mwghd/BgkqhkiG9w0BBwKgghdwMIIXbAIBAzEPMA0GCWCG # SAFlAwQCAQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQB # hFkKAwEwMTANBglghkgBZQMEAgEFAAQguGaT2Sm0kGkP5Ssd3NQzrAH7yW9T5XvU # bIa05mYU+VQCBmXOBfaZHBgTMjAyNDAyMjIyMjA3MzguMjgzWjAEgAIB9KCB0aSB # zjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UE # CxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNloIIR7TCCByAwggUIoAMCAQICEzMAAAHr4BhstbbvOO0A # AQAAAeswDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTAwHhcNMjMxMjA2MTg0NTM0WhcNMjUwMzA1MTg0NTM0WjCByzELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFt # ZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAwRVoIdpW4Fd3iadNaKom # hQbmGzXO4UippLbydeTawfwwW6FKMPFjzkz8W5+4HJiDhpsCZHfk8hceyjp868Z6 # Ad4br7/dX2blLoCLCk5wL4NgVP53ze2c5/SpNZqbidu0usVAx+KHRYl+dSAnCpeh # BuHMSoHAwIp4oU/Ma6CVlQEy+6fG2358LHNaYoWZnLyLmBp29U2PbZ6XQoVq/RAE # bgqN04kRozNi6eKYk9pQ+YZ3d1Whk3qTasmpKZAhldPnCvFbvx5CGXb8vs+RC96I # 03RSy+byfSAKIFn91wLt3e0qRWmqHosdHtaueQA/eGcAz/os6i2nbAUd7c46tkX6 # wjS/k5ov42pUbaPyem4eHz4RxE5wwu/E9cn11EHRrZif7rSPwDcYux1fIAD84nfU # 2IzD22KhvMucc/oCP0hco/mirRx1pisxFz7bV8wHHsSdRB+8G7olZN7BKzyvTC4N # V2+oTORyFgNIxAGYShMneYR9lzIm82pG6drNhCUFmrEHOAzGhdRLENQs4ApQ2CGB # uq1IbnXyO5PC/SighLn0WyuZXUWDQKnXa/8kiX7mb9z0t/r7Q+l+qtR+FDpowynY # 6Ft6rOyUTGZh/X5BZDM2+mEs6+nl9S6GJtz6ztSXmuN0mM5Qd08/ODr7lUlezXIn # VbTaomXllqVY32r0fiY/yTkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBR0ngWs1lXM # buKk/TuY09gfqgHq4TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAg3TfL6D3fAvl # VmT9/lvO3P0G3W1itLDrfWeJBDlp4Oypoflg9i5zyUySiBGsZ4jnLfcDICfMkMsE # fFh4Azr28KnarC1GjODa3q7SOhSPa4Y4XmisTTZwWcx2Sw8JZC/bwhA3vUXNHRkl # XeQYNwlpJ1d7r1WrteBeeREk1iATWkEvQqaNjqc93EYAGFX2ixRmwKzXEb0lr0lG # 3iNiA6kcQuMQW0YjUPtah1wwj59IRrF3y/spw2Z3An7Mza5YGU9uF4Ib082DB3F4 # qC1WKP9h5MqMOnSO7lCyWysS1/MB4bIsK4lyAwp4y1bBtBOW0fNkIHLHhIcW1Nnd # UVR3ELZFBO1vc8Wamev4z5mqI2YF0Dt9148Th2GFWvwV3CLrvEjMz44wAG7o8E2s # KWsywb/fey0QdGTmzXJCWMkEKRE0n5Td+o1vs+0f5xsiakWdx7WdZV1tX+sxAgHj # /vXcup5nAq1XDqm0B1+2a/Fj3IIRyQAA5ZuRMT4ecYtbTUZPouhdmvUqU3kJ2Vz+ # dMPiaE8SEkKu7wYo9p4rQLEi2lXjKqD4vjV5U1DWdjXbWxa+iIq/WSvbn2s9xcX7 # w2aN+ubyzqM5kDnv2fqbuL2Ocz5rTYlSHEJxcuyWTomVQyOWyHcEEWotqrhyiepb # VHbItx4zZ4nrhO9n0+HlocbZpzeR2AgwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDUDCCAjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIj # CgEBMAcGBSsOAwIaAxUAgAaJdbtcMMGIFLVKMDJ6mL27pd6ggYMwgYCkfjB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOmBvmYw # IhgPMjAyNDAyMjIxMjM2NTRaGA8yMDI0MDIyMzEyMzY1NFowdzA9BgorBgEEAYRZ # CgQBMS8wLTAKAgUA6YG+ZgIBADAKAgEAAgIiPwIB/zAHAgEAAgITxjAKAgUA6YMP # 5gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6Eg # oQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAKDAuTknIW4P7wZkq7XQb/ # CL35KQ8ew+KqIBnTM1w1ISHNiRESDRGBBgF1Zq1O/1cKoPLxKEc4DsF1uXp1bqf2 # mIHsG7IWxGNlWRtHjoZ9mjPd2kUBSAZnabcrkEUdi47jDWtJLotPyoTokyHldRye # 59Uf3Mzpv2gX09pW7i2nplT8d4Ceh1ojBY9x3bPD5ijbqMxqE/DAGbvlmiZak2/F # Hzvuel+36K1LkfguwGbvGNlpM3B0KfHyJDJrsCcP8HJv6Dr2doVd36cUoIdO8Y/d # 5haILtJwGmfoNqW47dkFApPixAZk4udTjDB07SD+vaTYcqqzn+veOfAx3koImRPY # MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAHr4BhstbbvOO0AAQAAAeswDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ # AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgKrL9Q5m8KwQA4rBRGjEM # iT2gkxqlw3FcInKGsSsDYhAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDO # t2u+X2kD4X/EgQ07ZNg0lICG3Ys17M++odSXYSws+DCBmDCBgKR+MHwxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m # dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHrMCIEIB76 # 35TM3rzf5DJkkCnwCs1wXcg93wzBMjQyBBtOo2FqMA0GCSqGSIb3DQEBCwUABIIC # AJAA7Al7emqQkdWuZjYtC6QBa9pgko2R4TFImGGzA1+4wc41j5PX8Xhv+edXrxRT # w68B6OVzwkGRiT+wz8KbCi1q1TrYmsAvL8f871sBBJJOw3VBK+6XtDf/g2cqGERI # kvfdVI1lACLrI61vsg9ZwvM82NyqG9WnlkPwEnGGJ+TzFp/fmYxyKMykAKaoSs74 # tfqxBE90q4cw6M+ENTvT+9IIH2vC/otV+80uAlmYT5TshsTb7sT3hVoc356s0lxm # pyMVnbMdoX64oYxZt/rT5lN9gljElZj2uPmvoiz3ENV9Sqts5vYTqUpUChrzqKg+ # GrFhCeEDKo9T/ICuspNjO/jL/HZHZuN8Shpxsua9BurusHRbIcg5gPvLsRmoIKsR # wgOl4VKlvpv2FE5YXBxqUUqMur6RDjS0zSc+M4rATeSLPWNcmSeM+2v9jDj7yHB6 # wRmvYYyVnpVEev1e3+JLpB33F2Y72DghUGecj5RYFP0rF6vP978Mp1E2Bae/qiVr # FV/nyhdMZ1JEOg5m7SOuYRVJZAMkqUfd2bAgsznXowbwLLQb7hmQeYq5tiSFIfHc # 0b+dhpVCSJ2asG/93uCWd6E9y4rmriI4IAgD4OtnnbccMZpQtjNL9u3Ijy9Oyobf # aoEeG4DSn6KyDX4ocMfgwaSnp8CnNWKiW5lV9gD4jOom # SIG # End signature block
combined_dataset/train/non-malicious/1427.ps1
1427.ps1
function Test-CUncPath { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Path ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState ([Uri]$Path).IsUnc }
combined_dataset/train/non-malicious/sample_30_85.ps1
sample_30_85.ps1
########################################################### # # 'GCArcService' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest Import-Module "$PSScriptRoot\ServiceHelper.psm1" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName $script:OperationRetryCount = 5 <# .SYNOPSIS Install Guest Configuration Arc Service. .Example Install-GCArcService #> Function Install-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Install-GCArcService" $ServiceType = "GCArc" $gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config' '{ "ServiceType": "GCArc" }' | Out-File $gcConfigPath -Encoding utf8 New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath) Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() # Install GC Service and verify it is installed correctly. Install-ServiceInternal -ServiceType "GCArc" } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Enable and start Guest Configuration Arc Service. .Example Enable-GCArcService #> Function Enable-GCArcService { [CmdletBinding()] Param() Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() Write-Verbose -Message "In Enable-GCArcService" $ServiceType = "GCArc" Start-ServiceInternal -ServiceType $ServiceType } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Uninstall Guest Configuration Arc Service. .Example Uninstall-GCArcService #> Function Uninstall-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Uninstall-GCArcService" $ServiceType = "GCArc" # Unregister GC Service Uninstall-ServiceInternal -ServiceType $ServiceType $guestConfigDataPath = Get-GuestConfigDataPath $configurationPath = Join-Path $guestConfigDataPath 'Configuration' if ((Test-Path -Path $configurationPath) -and (-not (CheckServiceExists($global:GCServiceName)))) { Write-Verbose "Removing GC user data from $configurationPath path ..." Remove-Item $configurationPath -Recurse -Force } } <# .SYNOPSIS Update Guest Configuration service. .Example Update-GCArcService #> Function Update-GCArcService { [CmdletBinding()] Param() Write-Verbose -Message "In Update-GCArcService" } Export-ModuleMember -Function @( 'Install-GCArcService', 'Enable-GCArcService', 'Uninstall-GCArcService', 'Update-GCArcService' ) # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBiMG+twTeJCd4D # inSASyoEH2LgmLtLl98tUNWujwJ94aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL59y+jhL9A0O3Idu+8nZayQ # Zp3eKfjLNeUNRLnJaOGNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArfyQHPzs77au0enSx/VethByLp4Pejw/40RLk/7rfMFKrzN9HdwZ1EXP # +4qnas/UyKwW3bO6NjtQhO0mtPlsJ/08YX0aHbn8H/Ry3mLasA3tWVD549RSSwcc # TCpsaMDGWP8VS0SfyL7I8Tmj36ZK9gIemO0puuda2thRX9UNcUXNBVnmFO3T9WLv # Q5DuNodRWurpIQqLwSqJKnjnMys67VHd5I3KrtIW/olipf/1AX6qLFLFJcRD6+eA # u6TvGVtB89kGtiVOtZtt0mZDluFV5lgs63dwSCAHYVKBJJALuQMkeOWE/u05wFpI # EwtCBFpJR7e/i+92FBg/j2Laxo7j6KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB3EpLQfzyI+kJtuWloGU5+V+jfkBupO6aibcIeNsbrtgIGZc3/lJQo # GBMyMDI0MDIyMDE4MTg0Ny45ODZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ # Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 # tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 # akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq # dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 # EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 # /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 # 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE # blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S # bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ # wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul # IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC # pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn # HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 # ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn # LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi # DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ # uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb # n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe # GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B # 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv # KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 # gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz # cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X5sAjAiGA8yMDI0MDIyMDAwMDgz # NFoYDzIwMjQwMjIxMDAwODM0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpfmwC # AgEAMAcCAQACAh4kMAcCAQACAhOuMAoCBQDpf72CAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAEjBdhxc2Dy1IiI/abmk2E8Is2YgKjvpKrgHVxrmR6uToVLP # +UTfGUj2Wdk6mOU9tYSo2+fynkECZN0DoKjTEGh4CrnkehLBVuWNgWLsCZc4U+fP # nNmgZ2qAoDCCXREnJR9JIJm5UtNXteuMozC7q8xxg/dos4gse4eoUCHByHFAsQF2 # yQH4lw0AL5Ue8QK/wBmQWo0hdzZhEo/AGIWBJd5X4190yduqpmJpj4buYrRtrFQz # bAVLlTIHmz8KofO3bdLsozBU9WK9+/+8a1AXn1SyEt5hLUX4UrzcmTMmM9UIFyLG # wG1hDOrZI6UOtwP+SPLuYv5fTIvLKjn62cj88bgxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB5zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAJXAOKAh+UPGVlaA3+to3j+Nw+054+I3JPCxAB3vkYITCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeEX74F # v0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQg5strNsYbAJScKAE5aG3Lom5LvoS5 # tFxoBQ4e8fINHe0wDQYJKoZIhvcNAQELBQAEggIAXrAN9XD/DGRxxb8l7FSTw7S5 # xkaDtfM2I9wmtA/So3BiEIh64l4ZJ+CGmhX5ax0rvBsHGDdPj0Z3P5aie8kFRwGb # JwsAPbYP+dWCl48EMq2A+/OkkcYaxh5Z/SDPfshChavZn+BWf21YzSldFUpNaFNG # 7mEGNKupEJHNThFHAZWuQHYKEcM62fOsHcyDyjXzWevC/t33Hzqch45rKoAKiqUh # 6RBzOydou5CEDny5xGqfIu9sTOV9j/BRNfZym53U1JkU4S51FRxY7PjdIyeDFdw3 # i5KzZ4/hFUbHrzKtdzLsmZgbGHrY50TOJpH81ls3nMj6BH0lKLxtcGN9p7BYbjup # PuAuPvS+Le7Up3wgnbqlg6GEd2yFGo83hHElZKxfWYq7ydCTuR66my95qXcYUn5X # ZTbt2/bYRoXrIqSZ4x2ENklQDNsdykB5s120Ds5AR0Dw4wQeX/DGMqi4+m26TC5B # Vt8rxdiEmp1WSIcJxlLElqod5JFGDqF0zANOGMZ8fZ7zfQC4dB8yxXH+xoZQqM61 # OyLdDXnCX8iGCpsZm7cgYKXsO0jPFlZcp2U1yu2IXXGFRDV0v8c2+rsUpTUkTpYl # B6uGLfYJKZriK7JnP5i4PHirjRc2iF83C2NqKVmk3F3F8XY3atcAZFSJRWue5XLD # el/ohoyF5Se+wvkKei0= # SIG # End signature block
combined_dataset/train/non-malicious/Email attachments_1.ps1
Email attachments_1.ps1
$file = "MYFILE.TXT" $smtpServer = "MYSMTPSERVER.EMAIL.CO.UK" $msg = new-object Net.Mail.MailMessage $att = new-object Net.Mail.Attachment($file) $smtp = new-object Net.Mail.SmtpClient($smtpServer) $msg.From = "FROMME@EMAIL.CO.UK" $msg.To.Add("TOME@EMAIL.CO.UK") $msg.Subject = "MY SUBJECT" $msg.Body = "MY TEXT FOR THE EMAIL" $msg.Attachments.Add($att) $smtp.Send($msg) $att.Dispose()
combined_dataset/train/non-malicious/1352.ps1
1352.ps1
function Grant-CMsmqMessageQueuePermission { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [string] $Name, [Switch] $Private, [Parameter(Mandatory=$true)] [string] $Username, [Parameter(Mandatory=$true)] [Messaging.MessageQueueAccessRights[]] $AccessRights ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $queueArgs = @{ Name = $Name ; Private = $Private } $queue = Get-CMsmqMessageQueue @queueArgs if( -not $queue ) { Write-Error "MSMQ queue '$Name' not found." return } if( $PSCmdlet.ShouldProcess( ('MSMQ queue ''{0}''' -f $Name), ("granting '{0}' rights to '{1}'" -f $AccessRights,$Username) ) ) { $queue.SetPermissions( $Username, $AccessRights ) } } Set-Alias -Name 'Grant-MsmqMessageQueuePermissions' -Value 'Grant-CMsmqMessageQueuePermission'
combined_dataset/train/non-malicious/New-XVM_14.ps1
New-XVM_14.ps1
#EXAMPLES <# New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR01" -SwitchName "External(192.168.1.0/24)" -VhdType NoVHD New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR02" -SwitchName "External(192.168.1.0/24)" -VhdType ExistingVHD -VhdPath D:\\vhds\\WS2012-TESTSVR02.vhdx New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR03" -SwitchName "External(192.168.1.0/24)" -VhdType NewVHD New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR04" -SwitchName "External(192.168.1.0/24)" -VhdType NewVHD -DiskType Dynamic New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR05" -SwitchName "External(192.168.1.0/24)" -VhdType NewVHD -DiskType Fixed -DiskSize 1GB New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR06" -SwitchName "External(192.168.1.0/24)" -VhdType Differencing -ParentVhdPath 'D:\\vhds\\Windows Server 2012 RC Base.vhdx' New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR07" -SwitchName "External(192.168.1.0/24)" -VhdType NewVHD -Configuration @{"MemoryStartupBytes"=1GB} #> Function New-XVM { [cmdletbinding()] Param ( [Parameter(Mandatory=$false,Position=1)] [string]$ComputerName=$env:COMPUTERNAME, [Parameter(Mandatory=$true,Position=2)] [string]$Name, [Parameter(Mandatory=$true,Position=3)] [string]$SwitchName, [Parameter(Mandatory=$true,Position=4)] [ValidateSet("NoVHD","ExistingVHD","NewVHD","Differencing")] [string]$VhdType, [Parameter(Mandatory=$false,Position=5)] [hashtable]$Configuration ) DynamicParam { Switch ($VhdType) { "ExistingVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $vhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("VhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("VhdPath",$vhdPath) return $paramDictionary } "NewVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskType = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskType", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("DiskType",$diskType) $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskSize = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskSize", [uint64], $attributeCollection) $paramDictionary.Add("DiskSize",$diskSize) return $paramDictionary } "Differencing" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $parentVhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("ParentVhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("ParentVhdPath",$parentVhdPath) return $paramDictionary } } } Begin { Try { $vmHost = Get-VMHost -ComputerName $ComputerName -ErrorAction:Stop } Catch { $PSCmdlet.ThrowTerminatingError($Error[0]) } $defaultVirtualHardDiskPath = $vmHost.VirtualHardDiskPath } Process { $validConfigNames = "MemoryStartupBytes","BootDevice" $configParams = @() Switch ($VhdType) { "NoVHD" { $vhdFilePath = $null } "ExistingVHD" { $vhdFilePath = $vhdPath.Value } "NewVhd" { if (-not $diskType.IsSet) {$diskType.Value = "Dynamic"} if (-not $diskSize.IsSet) {$diskSize.Value = 127GB} $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" Switch ($diskType.Value) { "Fixed" { $vhdFile = New-VHD -ComputerName $ComputerName -Fixed -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } "Dynamic" { $vhdFile = New-VHD -ComputerName $ComputerName -Dynamic -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } } $vhdFilePath = $vhdFile.Path } "Differencing" { $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" $vhdFile = New-VHD -ComputerName $ComputerName -Differencing -ParentPath $parentVhdPath.Value -Path $newVhdPath -ErrorAction Stop $vhdFilePath = $vhdFile.Path } } if ($vhdFilePath -ne $null) { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -VHDPath '$vhdFilePath'" } else { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -NoVHD" } if ($Configuration -ne $null) { foreach ($configName in $Configuration.Keys.GetEnumerator()) { if ($validConfigNames -contains $configName) { $configParams += "-$configName" + " " + $Configuration[$configName] } } $configParams = $configParams -join " " } if ($configParams.Count -eq 0) { $command += " -ErrorAction Stop" } else { $command += " $configParams -ErrorAction Stop" } Try { Invoke-Expression -Command $command } Catch { $PSCmdlet.WriteError($Error[0]) Remove-Item -Path $vhdFile.Path } } End {} }
combined_dataset/train/non-malicious/1867.ps1
1867.ps1
Describe "Out-Host Tests" -tag CI { BeforeAll { $th = New-TestHost $rs = [runspacefactory]::Createrunspace($th) $rs.open() $ps = [powershell]::Create() $ps.Runspace = $rs $ps.Commands.Clear() } AfterEach { $ps.Commands.Clear() } AfterAll { $rs.Close() $rs.Dispose() $ps.Dispose() } It "Out-Host writes to host output" { $stringToWrite = "thing to write" $stringExpected = "::$($stringToWrite):NewLine" $result = $ps.AddScript("Out-Host -inputobject '$stringToWrite'").Invoke() $th.UI.Streams.ConsoleOutput.Count | Should -Be 1 $th.UI.Streams.ConsoleOutput[0] | Should -BeExactly $stringExpected } }
combined_dataset/train/non-malicious/sample_3_31.ps1
sample_3_31.ps1
]Calculated table '%{oii_table/}' must have only one partition with source of type Calculated.ŎZa Direct Lake režim neophodan je Direct Lake izvor podataka. Tabele u Direct Lake režimu moraju biti tipa izvora podataka koji je SQL ili OneLake. Proverite i ispravite definicije izvora podataka za sledeće Direct Lake tabele%{oii_TableNames/}. Posetite stranicu https://go.microsoft.com/fwlink/?linkid=2215281 da biste saznali više.òDirect Lake preko OneLake zahteva važeći OneLake izvor podataka. Proverite i popravite definicije izvora podataka u Direct Lake tabeli %{oii_TableName/}. Posetite stranicu https://go.microsoft.com/fwlink/?linkid=2215281 da biste saznali više.ÈTabelom „%{oii_table/}“ upravlja smernica za osvežavanje, ali nema kolona sa podacima. Verifikujte i ispravite definiciju tabele ili dodavanjem kolone podataka ili uklanjanjem smernice za osvežavanje.çTabela „%{oii_table/}“ nema kolone sa podacima. Komanda MergePartitions nije podržana u takvom scenariju. Verifikujte i popravite definiciju tabele ili tako što ćete dodati kolonu sa podacima ili tako što ćete otpustiti ovu tabelu.ŁPonašanje „DirectQueryOnly“ nije podržano za OneLake izvor podataka. Ovaj semantički model funkcioniše u režimu „Direct Lake on OneLake“ i podržava „DirectLakeOnly“ i „Automatic“. Postavite DirectLake ponašanje na podržanu vrednost. Posetite stranicu https://go.microsoft.com/fwlink/?linkid=2215281 da biste saznali više.üTabela „%{oii_table/}“ nema kolone sa podacima. Nije moguće pokrenuti procesor kodiranja za ovu tabelu. Verifikujte i popravite definiciju tabele ili tako što ćete dodati kolonu sa podacima ili tako što ćete otpustiti/ponovo kreirati ovu tabelu iznova.¥Tabela „%{oii_table/}“ ima kolone sa podacima, ali nijedna kolona podataka nije uključena u aktivnost procesora kodiranja. Verifikujte i ispravite definiciju tabele.ʼnWe cannot process the binding information in the bindingInfoCollection because the type of an existing bindingInfo object cannot be altered. Please revert the type to the original value for the bindingInfo object associated with the resource path '%{oii_path/}'. See https://go.microsoft.com/fwlink/?linkid=2283740 to learn more.ĵNe možemo da obradimo informacije o povezivanju u bindingInfoCollection zato što više objekata bindingInfo ima istu putanju resursa „%{oii_path/}“. Uverite se da svaki objekat bindingInfo upućuje na jedinstvenu putanju resursa. Pogledajte https://go.microsoft.com/fwlink/?linkid=2283740 da biste saznali više.ĩNe možemo da obradimo informacije o povezivanju u bindingInfoCollection zato što više bindingInfo objekata ima isti ID veze „%{connectionId/}“. Uverite se da svaki bindingInfo objekat upućuje na jedinstveni ID veze. Pogledajte https://go.microsoft.com/fwlink/?linkid=2283740 da biste saznali više.ŇNe možemo da obradimo informacije o povezivanju u bindingInfoCollection zato što je ID veze „%{connectionId/}“ povezan sa putanjom resursa „%{oii_path/}“ nevažeći. Uverite se da svaki bindingInfo objekat upućuje na važeći ID veze u GUID formatu. Pogledajte https://go.microsoft.com/fwlink/?linkid=2283740 da biste saznali više.aKonverzija M upita u tabeli „%{oii_table/}“ u izvorni upit je prekinuta zbog previše otkazivanja.
combined_dataset/train/non-malicious/sample_26_27.ps1
sample_26_27.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> function Invoke-EnvironmentValidator { <# .SYNOPSIS Wrapper command to Test Environment Readiness .DESCRIPTION Wrapper command to test environment readiness, run locally on HCI system. .PARAMETER OperationType Type of Operation. .PARAMETER WaitForResult Wait for action plan to complete. #> [CmdletBinding()] Param( [Parameter(Mandatory = $true, ParameterSetName = "AddNode")] [Parameter(Mandatory = $true, ParameterSetName = 'All')] [Parameter(Mandatory = $true, ParameterSetName = "Update")] [ValidateSet('Deploy', 'Upgrade', 'AddNode', 'Update')] [String] $OperationType, [Parameter(Mandatory = $true, ParameterSetName = "AddNode")] [ValidateNotNullOrEmpty()] [String] $Name, [Parameter(Mandatory = $true, ParameterSetName = "AddNode")] [ValidateNotNullOrEmpty()] [String] $HostIpv4, [Parameter(Mandatory = $false, ParameterSetName = "Update")] [ValidateNotNullOrEmpty()] [String] $EnvironmentCheckerResultPath = "$($env:LocalRootFolderPath)\MasLogs\EnvironmentCheckerUpdateResult.json", [Parameter(Mandatory = $false, ParameterSetName = 'All', HelpMessage = 'Wait for action plan to conclude. Shows progress if running on the ECE owning node.')] [switch]$Wait ) $ErrorActionPreference = 'Stop' # Check if we are running Orchestrator as a service or lite $Script:OrchestratorSvc = IsOrchestratorSvc # Check if action plan is running $RunningActionPlans = Get-AzStackHciEnvironmentCheckerActionPlan | Where-Object Status -In 'Running', 'Queued' if ($RunningActionPlans) { throw "Environment Validator action plan in progress" } # Archive Log file ArchiveLogFiles $ActionType = switch ($OperationType) { 'Deploy' { 'EnvironmentValidatorFull' } 'Upgrade' { 'EnvironmentValidatorUpgrade' } 'AddNode' { 'EnvironmentValidatorAddNode' } 'Update' { 'EnvironmentValidatorPreUpdate' } Default {} } Write-Verbose "Starting Environment Validator for $OperationType" # TODO check if Deploy, Upgrade or AddNode ops are running here? $params = @{ RolePath = 'Cloud\Infrastructure\EnvironmentValidator' ActionType = $ActionType } # Add needs a node name and IP, take these from the user if ($ActionType -eq 'EnvironmentValidatorAddNode') { if ([string]::IsNullOrEmpty($Name) -or [string]::IsNullOrEmpty($HostIpv4)) { throw "Parameters missing: Name and HostIpv4 must be supplied when OperationType is AddNode." } $params += @{ runtimeParameters = @{ NodeName = $Name IpAddress = $HostIpv4 } } } # Update needs a path to the result file, take this from the user if ($ActionType -eq 'EnvironmentValidatorPreUpdate') { if ([string]::IsNullOrEmpty($EnvironmentCheckerResultPath)) { throw "Parameters missing: EnvironmentCheckerResultPath must be supplied when OperationType is Update." } $params += @{ runtimeParameters = @{ EnvironmentCheckerResultPath = $EnvironmentCheckerResultPath } } } if ($Script:OrchestratorSvc) { $ActionPlanInstanceId = Invoke-ActionPlanInstance @params 4>$null if (-not $wait) { Write-Verbose "To check progress, open a powershell session to $(GetOrchestratorOwner) and call: 'Get-AzStackHciEnvironmentCheckerProgress -Path $($env:LocalRootFolderPath)\MasLogs\AzStackHciEnvironmentProgress.json'" } } else { Invoke-EceAction @params if (-not $wait) { Write-Verbose "To check progress, call: 'Get-AzStackHciEnvironmentCheckerProgress -Path $($env:LocalRootFolderPath)\MasLogs\AzStackHciEnvironmentProgress.json'" } } Start-Sleep -Seconds 5 for ($i = 0; $i -lt 30; $i++) { $ActionPlan = Get-AzStackHciEnvironmentCheckerActionPlan | Sort-Object LastModifiedDateTime -Descending | Select-Object -First 1 switch ($ActionPlan.Status) { { $_ -in "Failed", "Cancelled" } { throw "$ActionType is $($actionPlan.Status). Please resume please review: `n $($actionPlan.ProgressAsXml)" } { $_ -in "Waiting", "Pending" } { Write-Verbose "$ActionType is currently $($actionPlan.Status)" } { $_ -eq "Running" } { Write-Verbose "$ActionType is currently $($actionPlan.Status)" if ($Wait) { if ($ENV:COMPUTERNAME -eq (GetOrchestratorOwner)) { Get-AzStackHciEnvironmentCheckerProgress | Format-Table Result, StartTime, EndTime, DurationSeconds, Name, Description -AutoSize } } else { break outer } } { $_ -eq 'Completed' } { if ($ENV:COMPUTERNAME -eq (GetOrchestratorOwner)) { Get-AzStackHciEnvironmentCheckerProgress | Format-Table Result, StartTime, EndTime, DurationSeconds, Name, Description -AutoSize } break outer } default { Write-Warning "$ActionType cannot be started due to unknown status of last run" return } } Start-Sleep -Seconds 30 } Write-Verbose "$ActionType $($ActionPlanResult.Status) Action Plan ID: $($ActionPlanInstanceId.Guid)" } function Get-AzStackHciEnvironmentCheckerActionPlan { <# .SYNOPSIS Get all Environment Validator action plan instances #> [CmdletBinding()] param () $validatorLookup = 'EnvironmentValidator*' if (IsOrchestratorSvc) { Get-ActionPlanInstances | Where-Object { $_.ActionTypeName -like $validatorLookup } } else { Get-ActionProgress -ActionType $validatorLookup } } function Get-AzStackHciEnvironmentCheckerProgress { <# .SYNOPSIS Intended for internal-use to retrieve multi-validator invocation progress using action plan #> [CmdletBinding()] param ( [Parameter()] [string] $Path = "$($env:LocalRootFolderPath)\MasLogs\AzStackHciEnvironmentProgress.json" ) Get-Content $Path -ErrorAction SilentlyContinue | ConvertFrom-Json } function ArchiveLogFiles { <# .SYNOPSIS INTERNAL USE ONLY - Archives any supporting files for environment checker. #> [CmdletBinding()] param ( [Parameter()] [string] $Path = "$($env:LocalRootFolderPath)\MASLogs" ) # Archive any logs 'AzStackHciEnvironmentChecker.log', 'AzStackHciEnvironmentProgress.json', 'AzStackHciEnvironmentReport.json', 'AzStackHciEnvironmentReport.xml' | ForEach-Object { Get-ChildItem -Path $Path -Filter $PSITEM -ErrorAction SilentlyContinue | ForEach-Object { Rename-Item -Path $PSITEM.FullName -NewName ($PSITEM.fullname -replace '(\.)', ('_{0}.' -f (Get-Date -Format yyyyMMdd-HHmmss))) } } } function IsOrchestratorSvc { [CmdletBinding()] param () $orchestratorSvc = Get-Service | Where-Object {$_.Name -eq 'ECE Windows Service' -or $_.Name -eq 'Azure Stack HCI Orchestrator Service'} if ($orchestratorSvc) { return $true } else { Import-Module C:\CloudDeployment\ECEngine\EnterpriseCloudEngine.psd1 -Force return $false } } function GetOrchestratorOwner { [CmdletBinding()] param () try { Get-ClusterGroup | Where-Object {$_.Name -eq 'ECE Windows Service Cluster Group' -or $_.Name -eq 'Azure Stack HCI Orchestrator Service Cluster Group'} | Select-Object -expandProperty OwnerNode | Select-Object -ExpandProperty Name } catch { return $null } } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBk2oxvuCmn6Gws # tgkq3ELgsBX3FvXKva+UIFbOAaz5KKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAoMCHoeSxpGnPcWOdsAyn8N # mEmikIKLjknCUIEAQDkUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAokvEmFRMDPNh74S3y4QB6VGARp7XMw6HPRYaEJqM9VlAfw4F809aFZSI # eRAhXSQke8A5e8NwqPl7zmqPHD0qQH1H14Ew88c1F+3IVPQo83iHCVY7TkN9eTtG # K8SA7TIVY6Nzb3BtYrrpNUMEOx+nZ1I1P6GX6B7/LuM+pcRK/4ZjeCXdp/+nN8IJ # cuqEAr+GqIJ8MYOrABbSY1Of2bjiSJ8z85yONyTJjecim4CCAA0dXfpnj4rAkDiK # I7DtHsbEJ3r2OuNUSjJIvx2lyq5Yx/EpeGZSZSpRKnA4vZiSoCeD0M//a3zCuxUW # G54br0RgmeGxIVDOT0cRbs0h6F/3kKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDTPcAuL+fjg4AU1nR4S+ZFmOTa3GN1rp7MIpT3X8q6TQIGZbqeumbd # GBMyMDI0MDIxMjE0MDg1OC4xNTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0RNYwIhgPMjAyNDAyMTIxNTE4NDZaGA8yMDI0MDIxMzE1MTg0NlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XRE1gIBADAKAgEAAgIBRwIB/zAHAgEAAgISkjAK # AgUA6XWWVgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEHMH8eDwQ5UEvYI # N/9Kq6PkMHM1J4YpUps7G5vN9ACEiNOyRzo1u51vINRVtW35RkXd/FwSJxwy2FsB # v/D0WmPV4Zm4NoWqDnB/Dpb4oBYpgmXmXTcFHbPKZldyI3/XMMJxnSLiJ6zmzbCt # mhPIujUMoFKQpSrn7wOflyWjp5aaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgfyxwZp+c+vX70BSPjKMOet7Uu1myB5NwFvo2RVKY9GgwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIDnRr0iTxo7N39RYkJQjNKgSUzMlqo106/A0RY2l # 63UJMA0GCSqGSIb3DQEBCwUABIICAEJWqJwa9lxf7rKfXKE513x7tifI2nZ5dbnQ # KatG+4sEsckAW4lZeM+9MI3UooZd3/6czRMTT8sVooTyA6k5IqRXKjl/EfX5RuBu # AKPSU/cLOgLNK7N053vF/Iub1nzQs9BdwtctWvg9zmY9zXLr6piupUGgUQQMxO5v # MYL+JZSn29k6jtR4RPCKF8+8x1B9PyGA2WElAU6namVq43ljqJ8UbumIHj+vENsA # /kPRMGsRDw5ftTajigJR9YPCtUYwv3afAOmnEihOhArPcEz3YGR+Uwr0jT90UFmd # UZV/oyYLqHyp18q4J+bfSM389wheZek2kKwI5/hVxqqdShh/r3nooVu+ttgRsD7z # z6iIdGgKPHRMu0+Vtjvy+cPvDcJMzmejEteSJXFz4S63+e+1wbnFpeVapVh3xHtt # Bi9U0VUdgTiaDAWLlzxuVriqd6Gr+0xdFql1eQLzS8zaars4KX2CVwCBZKxEfmN0 # HJoJ15poDhvjV5r3OzG+h5NLyHRNEfCRquJtRXdchro76YQBbTxRkew/UN0r68ZO # N//5mRZribDhpvq/2iqQG1T6ElbYcP8K54M37K5dh6rnc0rl+woPFQuQAD9NWPxQ # bNchkQ0W6MDR2zDUZUl7gZH6QO28g4tzzikYYr1ghhtuvg47ckptHk6KturSP+RR # lW8vwN/9 # SIG # End signature block
combined_dataset/train/non-malicious/578.ps1
578.ps1
function Submit-SPOCheckIn { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string]$targetPath ) $targetPath = Join-SPOParts -Separator '/' -Parts $clientContext.Web.ServerRelativeUrl, $targetPath $remotefile = $clientContext.Web.GetFileByServerRelativeUrl($targetPath) $clientContext.Load($remotefile) $clientContext.ExecuteQuery() $remotefile.CheckIn("",[Microsoft.SharePoint.Client.CheckinType]::MajorCheckIn) $clientContext.ExecuteQuery() }
combined_dataset/train/non-malicious/3126.ps1
3126.ps1
function Send-WakeOnLan { [CmdletBinding()] param( [Parameter( Position=0, Mandatory=$true, HelpMessage='MAC-Address of the remote computer which you want to wake up')] [ValidateScript({ if($_ -match "^([0-9A-Fa-f]{2}[:-]){5}([0-9A-Fa-f]{2})|([0-9A-Fa-f]{2}){6}$") { return $true } else { throw "Enter a valid MAC-Address (like 00:00:00:00:00:00)!" } })] [String[]]$MACAddress, [Parameter( Position=1, HelpMessage='Port which is used to send the MagicPacket (Default=7)')] [ValidateRange(1,65535)] [Int32]$Port=7, [Parameter( Position=2, HelpMessage='Send MagicPacket over another Windows computer in a different subnet')] [String]$UseComputer, [Parameter( Position=3, HelpMessage='Credentials to authenticate agains a remote computer')] [System.Management.Automation.PSCredential] [System.Management.Automation.CredentialAttribute()] $Credential ) Begin{ } Process{ [System.Management.Automation.ScriptBlock]$ScriptBlock = { param( $MACAddress, $Port ) foreach($MAC in $MACAddress) { $MACAddr = $MAC.Replace(':','').Replace('-','') $MACAddrBytes = 0,2,4,6,8,10 | ForEach-Object { [System.Convert]::ToByte($MACAddr.Substring($_,2),16) } $MagicPacket = (,[byte]255 * 6) + ($MACAddrBytes * 16) try { $UDPClient = New-Object System.Net.Sockets.UdpClient $UDPClient.Connect(([System.Net.IPAddress]::Broadcast), $Port) [void]$UDPClient.Send($MagicPacket, $MagicPacket.Length) } catch { Write-Error -Message "$($_.Exception.Message)" -Category ConnectionError } } } $LocalAddress = @("127.0.0.1","localhost",".","$($env:COMPUTERNAME)") if([String]::IsNullOrEmpty($UseComputer) -or ($LocalAddress -contains $UseComputer)) { Invoke-Command -ScriptBlock $ScriptBlock -ArgumentList $MACAddress, $Port } else { if(-not(Test-Connection -ComputerName $UseComputer -Count 2 -Quiet)) { Write-Error -Message "$UseComputer is not reachable!" -Category ConnectionError -ErrorAction Stop } try { if($PSBoundParameters['Credential'] -is [PSCredential]) { Invoke-Command -ComputerName $UseComputer -ScriptBlock $ScriptBlock -ArgumentList $MACAddress, $Port -Credential $Credential } else { Invoke-Command -ComputerName $UseComputer -ScriptBlock $ScriptBlock -ArgumentList $MACAddress, $Port } } catch { throw } } } End{ } }
combined_dataset/train/non-malicious/1405.ps1
1405.ps1
function Join-CIisVirtualPath { [CmdletBinding()] param( [Parameter(Mandatory=$true,Position=0)] [string] $Path, [Parameter(Position=1)] [string] $ChildPath ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( $ChildPath ) { $Path = Join-Path -Path $Path -ChildPath $ChildPath } $Path.Replace('\', '/').Trim('/') }
combined_dataset/train/non-malicious/2260.ps1
2260.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer ) Begin { try { Write-Verbose -Message "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug -Message "SiteCode: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine SiteCode" ; break } } Process { $DeviceCollectionFolders = @("Application Management","Client Management","Compliance Management","Limiting Collections","Search Collections","Maintenance Windows","Mobile Device Management","Endpoint Protection","Power Management", "OS Deployment", "Software Updates") foreach ($DeviceCollectionFolder in $DeviceCollectionFolders) { try { $Instance = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_ObjectContainerNode").CreateInstance() $Instance.ObjectType = 5000 $Instance.Name = $DeviceCollectionFolder $Instance.ObjectTypeName = "SMS_Collection_Device" $Instance.ParentContainerNodeID = 0 $Instance.SearchFolder = $false $Instance.SourceSite = $SiteCode $Instance.Put() | Out-Null $ValidateFolderCreation = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_ObjectContainerNode -ComputerName $SiteServer -Filter "Name like '$($DeviceCollectionFolder)'" | Select-Object -ExpandProperty Name if ($ValidateFolderCreation -match $DeviceCollectionFolder) { Write-Output "INFO: Successfully created the '$($DeviceCollectionFolder)' device collection folder" } } catch { Write-Warning -Message $_.Exception.Message } } }
combined_dataset/train/non-malicious/sample_8_56.ps1
sample_8_56.ps1
ConvertFrom-StringData @' id_provisioningmode_activity=Checking Configuration Manager Client Issues id_provisioningmode_status=Detecting if the Client is in Provisioning Mode '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAkkK7vPXwDu7Wn # rb6N/Xm3RC1fII14QHYZDuOhjCsT0KCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBI7mNTxOsqb16SwOnOsE3nY # gB5L1WzmaixJbiMr8RGPMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAdqocj2LoYAfx1+j3rHoDsZvG7Z7J9EUPwt+bqBhilrRs8ow2DDO10TBJ # wCYAMCNbN4KQVrypR2FOUrVQdswuuLmKp0o6JILhpZCIvM/KRE4IKzTv4yVeMEtm # SM9ii230iSgqYA1pPtOsBmihSh0NHiu1EaBvaq/5T58JQoFF/quS7BgYJTQdrVn5 # qUNAYa03ycN8JuwoaX0I8ihtUxFhM2jwDdBJhhNqJRQm3D3dOKfC9MP4XDig+uk2 # V/X2yQ9CWd/DDujub8jxmHbI3QxmwCZWRusTM3oSQX/kJT5nuuWIri2QscIbzX79 # 3tVsq6522hm64saJURfb0RRxE9jSEqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCAqcTn9U1zAau2jaEevM1/q8D3obgwNKC/tOyDqXlm9AIGZus6esnw # GBMyMDI0MTAyODExNDA0My41NzZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT # j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt # gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh # 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY # X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd # F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI # J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc # QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry # 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn # Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5 # olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+ # Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ # I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf # hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI # hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut # Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8 # cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo # riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt # g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A # W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm # Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe # bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w # MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9 # YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0MTAyOTA4MjgwN1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEAAgIIXjAHAgEAAgITcTAK # AgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAZdq+OU23EaUch # wQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2DewxIzsFz1t8ELbs/7V+b+lL # Z25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh84y9kT8c5HUYL5kF2NJiq # gHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e72AvfpKtUZO94WfnvRVAu # 4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpUqnrIVhOqTZE0I5GJiVJy # dAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGEu6OFzH+g6bBiUu/Bsmlo # dM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgb782aEWtMWAS # SSCWBDrCW/1o5Wmw1cKMqAJw+xW7ddgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEAAAH5 # MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkHB7rdMA0GCSqGSIb3DQEB # CwUABIICADilO/4LeqqLQgAVRA8PiyI09AnYENcGsJ6EhPzPTMPhrpbSckVmTG7p # AjVBX8+/J/1qz66c8P1C2e3itAdUIpWsXvJXAC6jsVSaHDXyI8uBVt+4EO9CfWZm # yzlH70kHOtpJ727zYQaqVVGdfQquseLE5fQA3rZEw2M+Pmpe1KIav0P1h+e459GI # gdhGWUqiIm0Yjl0UWQL0BJ9QyFCW/2ZqkSKmhLOxj/HMgzE6XipCCWo/Aw2KyTTl # VSDB+fPhMV+bcIFnC1bDP/W7ZX0TiVPgpI9OTAJ8ZdG/O7wvhMpmjvSpkP12if8E # 3oBrjVqhlebayLCFvl0Xg1NE0crJxOF/kQ0E6YtHnBxZ6HooNHb5es9Xpz63hrGv # eRpiua7PmORpnZtfJ0K9P8PxjeEgvZC+IPTQt5lHRgsjwGz9bYWJmr9b7nACnv7O # s6SuRgwH2kLZPc6fEcx0iQFVgVDNi198Hddl9mskj9djY25+MHvFyhMPmGoEFOD/ # JLfHaUvgqLghKHkcuclksB3Z2kd2ei/o9LTrl24uR4JPCpVxnD4q10yLOMEOY2iu # XurP3Aqe538fj5eNIw8pfeOMqL2a2Wbi7CfZynzn3O25hJ47CxjMFD+2xbppuwLT # iyr0P1o0hbwil2u6kTP2REluWMQ0qPCAUGOLynmcmpTQGpv4/MNj # SIG # End signature block
combined_dataset/train/non-malicious/sample_50_6.ps1
sample_50_6.ps1
Manifest-Version: 1.0 Archiver-Version: Plexus Archiver Built-By: vsts Created-By: Apache Maven Build-Jdk: 11.0.21 Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FlexFunctionDe ployHandler.html SHA-256-Digest: uXPJcuXmM2bAu8SOYO8Imh4iFQADjsP4QepoUGPpO34= Name: jquery/jszip-utils/dist/jszip-utils.js SHA-256-Digest: wG92XzvtRWQ2qIGbTUH7pm5TfYjJDE9G65XWBMlAhuM= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-tree.h tml SHA-256-Digest: Lvu1MkemvsQVWHYUcIddU2Kfzf8nffCMitLDUy22sdY= Name: com/microsoft/azure/toolkit/lib/appservice/function/AzureFunctio ns.html SHA-256-Digest: 7RDKSQw4AB67EbZ8hIZ3UVwrvCPHdIFdOJylKXtxr7g= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding Template.html SHA-256-Digest: Qr+Td+I29JQ0KI+6CZHYVRpQUIZj/T8pBrXOY+eTQHY= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt ils.html SHA-256-Digest: JAe5SGaOjevGLdLkIvYz2GrFtrZ3nJNG0XuuSHEi7Tc= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/Depl oyUtils.html SHA-256-Digest: nyg+T7XMKsHXK78QmeJ7J2kQpjf8rSiYt/+tZRNVXVk= Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer vicePlanDraft.html SHA-256-Digest: C3IguFTesg1Zl+DpEEb85e4mmE3JLO6E/HHcC9VaU/c= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p ackage-summary.html SHA-256-Digest: 00+UuHUFIj0luzpBT+hbhQsuyZVoQ1Jk+IBeC6hhpk0= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AzureF unctionsAdminClient.html SHA-256-Digest: E6M/NmIZ1piPUmoZscSTLELuXlhlZW8bakqgpLQ9J3I= Name: com/microsoft/azure/toolkit/lib/appservice/model/OperatingSystem .html SHA-256-Digest: AztXlGUcjodkL2PLPuJHm8Jg6Ewr7po7D4WFjdLW4wo= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nAnnotation.html SHA-256-Digest: DrZxrphIULKvZAZportDKe6H4yEpwxDZFlAziqW0C3E= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat eMetadata.html SHA-256-Digest: /2hPtIAHn4niY65j0atU6QVOoscFpUUtITERbqJKlXM= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo ymentBuildStatus.html SHA-256-Digest: 2C7NDOlhtJz8Hu+MCaQW5gOOYjEXX28PTwtEZ5eWQ9k= Name: com/microsoft/azure/toolkit/lib/appservice/config/RuntimeConfig. html SHA-256-Digest: coJZ8AbhsHSTXBfq+BI0TXKSXVQr6gBe6OB09XQXCTg= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding .html SHA-256-Digest: GzTBT6LbiTjAAfj9iJxKeQxu8alTJBtLpS6ubPxNX0M= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/BindingEnum.html SHA-256-Digest: S5aNXgdES9qQ9wfbvml6PQLcwaBzmCB1xITQ2vFnbhA= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c lass-use/FunctionConfiguration.html SHA-256-Digest: 6ELBJmxoUbIaYjAs02o8t+dssBxuTH5iWD/q95hCb2A= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy WebAppTask.html SHA-256-Digest: vHh/2UXaEvsDsVY8Br1FqukJROis0rXpOVguln+dZ5A= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p ackage-use.html SHA-256-Digest: POqa2AP+Yg7bj5iPV/fGHjDvRuOXOGSGhuK3QMTNZbk= Name: com/microsoft/azure/toolkit/lib/appservice/config/package-tree.h tml SHA-256-Digest: a1irLhgb0eFLwgiKBMiYIk8Xj3MPa6N0YSfNmc/oVzk= Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServicePlan Config.html SHA-256-Digest: e92K6Ii/JxL8+eC/CFkAT2gBJdo6mOlyHbH2cH0Wq2U= Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/AppS erviceConfig.html SHA-256-Digest: Zix6d8Oiu3IT0XynHJD8evPHLgZur81ahr3LrcLZCew= Name: com/microsoft/azure/toolkit/lib/appservice/model/Runtime.html SHA-256-Digest: OB2yFsUnmZ8FYh2zdvgv7HiGwQVoJ6CpQcbvlKxAPsk= Name: constant-values.html SHA-256-Digest: yt1ywA8E+msXB7UW/CBrU8hSirJGZGMQ6rKaqBUJnqE= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-use.ht ml SHA-256-Digest: ldAxA95Zb3XRDCTFYeidbLcFs+/rhQEtB46jlNRuDDg= Name: com/microsoft/azure/toolkit/lib/legacy/docker/class-use/IDockerC redentialProvider.html SHA-256-Digest: cQrn2BtrbuEU7kq1WGZdSH4wN8m8yfYDHDCsUSYKvH8= Name: stylesheet.css SHA-256-Digest: MeHJ1ecg/OtbZWphNSIpo8tFUFr2xHtJeNy+ynZcs4M= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppBase.htm l SHA-256-Digest: dldCsQCU04Ef6C2O6LNg9dpcxUWuFATekwbrxdTcdFA= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package -summary.html SHA-256-Digest: xH6BwUuSQIn71b+fuD5sAIY1Q34pFkbo7GmKfenJ2LY= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/BindingTemplate.html SHA-256-Digest: f5vRKgrJPShhZrEApIWjJtYEfxR13LnUeOKtImAz4ig= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/package-tree.html SHA-256-Digest: pPEFSR5uCX+OcoXvwBcW00UcIYUadWJQuWr8w3hK6uA= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/IAnnota table.html SHA-256-Digest: HIGPI60kBB4biGuJ/OJHgTYzVuezR16OjJKCQUpN9PE= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/JavaV ersion.html SHA-256-Digest: UP8sOHPvjppUYNkPczIYWKtXpue7gS8NoXDyx4LYs30= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/MSFu nctionDeployHandler.html SHA-256-Digest: FEcyzUbPw7C0u/vhB6gUT3l/0wbzYctOMAUgP10G2WU= Name: deprecated-list.html SHA-256-Digest: UCFt3+iB6yY9j9hMuN8sxE5b1rvvKpmFvgeZ5seb3Mk= Name: member-search-index.zip SHA-256-Digest: l02VZ+S9inu2e+JshPOAVk9dXLFEQAu908uoL0XiYXg= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/ CommandUtils.html SHA-256-Digest: lk4YOfsgDhRikUToEyIcMdentHg7Z9QNMzloOjNLlXA= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo yOptions.html SHA-256-Digest: dWWuKvM4wbMb/EqI+CuR3pey97GToQGX6JjnsXnoF3I= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IFunctionDeplo yHandler.html SHA-256-Digest: vpUG4fJs0BwIBKh6I0JhiA8DManMCEJW3H3TlsUgxOw= Name: jquery/jszip-utils/dist/jszip-utils-ie.min.js SHA-256-Digest: eUSRsihgsqkme2Mn4Zy0XLmZ0pDxZ/fIcgT/wv+H5Fc= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplates.html SHA-256-Digest: 7xQ9BWFTPVxpbiqygXpnbW5VAUcbUgWpPRNoLIMDwXQ= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/LogLe vel.html SHA-256-Digest: F4QgXSvQoY6QyFdiyYwgWqvCFON3xRFtT9LJm2iwIGg= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity .html SHA-256-Digest: 484FSbV4625Ve9wjxhzxt/uUIkp/K5AWxip0V7PUTyA= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer viceKuduClient.KuduService.html SHA-256-Digest: hz2cD3po7P/fMBtnfAG5AeRvePDmZfE1SFSOGCKrslU= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/BindingSerializer.html SHA-256-Digest: iBD6aRzufzaacIwYD9l9MtNDesTWjKaPFRMG6Qpnlbo= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/Binding.html SHA-256-Digest: Sqk+ovl/V/DZyP5rm42z6jA8Ho1WDQeW0PxRv/tdTBE= Name: legal/ASSEMBLY_EXCEPTION SHA-256-Digest: pE63tcr1U0xu9TayHttAtNa6v5G/l9nUVZaGhhiyxvs= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceAppBase.htm l SHA-256-Digest: E1fDXVDnRo6OkjmFKwveq/Dk/9zA6FqSIKFMWa5fS3M= Name: com/microsoft/azure/toolkit/lib/appservice/model/LogLevel.html SHA-256-Digest: liK+2yl3wxT52S1gfVsslvefKOG+vDnAf5IhIy2cTo0= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/ExtendedCustomBinding.html SHA-256-Digest: L9B5ag4k8T6MQMdCVPDW/A10R6gK71fIFcX5wYNE2iU= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplate.Function.html SHA-256-Digest: YVu8Kz8YDgHihWeGDgdEKdL11zgqf3BZknjN9rY0n+Q= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/FTPUploader.html SHA-256-Digest: Gy2YUFVaPRFpnFquxIlRte8YVUdpNXUf3MHpj5q2XPE= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Az ureFunctions.html SHA-256-Digest: sHu7pPPEmFTFK9iynmJSsvLlUgBv93c8aiOUTyXh9QM= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackagerBase.html SHA-256-Digest: SqLoow85EBwUjTpnPn6CBad0+vTKTs6riTWjECC0fik= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package -tree.html SHA-256-Digest: paHaUosh8xxBQXtVVoxIbCC7HlaiZxRbfEX4ULaI8oE= Name: legal/jszip.md SHA-256-Digest: my3h+rowtA0qwC0oFKwpVdz9AWiRCnt6/1QnjJ7hE7E= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Extende dCustomBinding.html SHA-256-Digest: s6ObvtikjUjOa1O/EarctF/vawPpNoywmApzur1nHeE= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDeploymentSlotDraft.html SHA-256-Digest: E9JuxVLyiukC6enB/setux/YEIGUhJx5o7Ru3RTqRZg= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Opera tingSystem.html SHA-256-Digest: joJDRCK+RcpCmfVfBLRl4kqEKVS/tDvX0O5dxhQ6FxU= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient.KuduService.html SHA-256-Digest: rNG1NVkmgvZZ+Rl+eu2wDcdn5Y0WXOuEsjCzOc/z04g= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDeploymentSlotDraft.Config.html SHA-256-Digest: j2itUFQQMbAzvlvxTJaPHkopwmS3/ILg6iaCvXN+3Xk= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionTemplate.Function.html SHA-256-Digest: GGxP5PcSfstQAc8Pb76/zX4ZH8XFSSeAsr4lXpIaldc= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Diagn osticConfig.html SHA-256-Digest: Y7cyqlM+303OHz4KOdcX+2blEqARKiVSKk/1uIdVQ4I= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package -use.html SHA-256-Digest: xtpThfHdu+EGRkuNqYPtVwYf+yikfw23cFVI36xdfnY= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/AnnotationHandler.html SHA-256-Digest: /AlOhoOtTN/Q2jmdkZhluk9fQGhz+JZlquaij/UGNJA= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/package-use.html SHA-256-Digest: 7AA2JQ8oy16sHWPJrudRl1g1Vo6A1s/TFeQ1WVvKbDM= Name: com/microsoft/azure/toolkit/lib/appservice/IDeploymentSlotModule .html SHA-256-Digest: fJ/CpFF2X6NjWXqM4AN4ALMVFyzPaSm02mIy2HTe+CQ= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/DeployUtils.ht ml SHA-256-Digest: 0aiXz7NXzJfASi76S6mHIWH5URbhccEw0Syw/7N/Ks0= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R etry.html SHA-256-Digest: RO0Yj6uBDlzwAqA51cVBA8fi4qanLK0M4sY86r470zk= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlan.h tml SHA-256-Digest: JM/MFB7HuqcUjDaBNe4MzEHnz64AIv5Cij0MgMyFfrM= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppModule.h tml SHA-256-Digest: nHLjP4Dkp8HMjgtl11AZv+7uJHtkhhVhazCXXGTF7R0= Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/AppS ervicePlanConfig.html SHA-256-Digest: 2h0JQGQThtCgy0pO8++2HIB2cpvGgLZihbZenvGSKsk= Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer vicePlan.html SHA-256-Digest: 9c5DJL9WscSpjiNHaObmWftrkGhmrFlP6Mnw6rPnltk= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromZipFunc tionDeployHandler.html SHA-256-Digest: RhJf+kyw1NRQFsIlB7AnXLgXu6QpkDpui9iXAQcpz7M= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-use.ht ml SHA-256-Digest: KLM/N/eL1upaNmo71qwCHLkeyh8244YEHykaYqi1N24= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/FTPF unctionDeployHandler.html SHA-256-Digest: 5zpIuvkigGADUlDMEXRqP8EViX9OT8ul3kP++lkB1rc= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer viceKuduClient.CommandRequest.html SHA-256-Digest: UV0jky4NCtffFWS5XPINl8+PHpF7BLPYWRJXqlLrjF4= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/MSFunctionDepl oyHandler.html SHA-256-Digest: 2kHcXwYj7RPDs6PlvB/GAx8LOjajByyNPaist4897cA= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-tr ee.html SHA-256-Digest: bHxdyvjOCxk4+DWs6DOBq5ENux8HLOTKyL+Tlv2GwfU= Name: com/microsoft/azure/toolkit/lib/appservice/utils/Utils.html SHA-256-Digest: fU6MQ4d5yrFSBIzeBIzLeKc0rABD5JC1Afj6Rrjf48o= Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-summar y.html SHA-256-Digest: YjJ7rIRa98K8+BHs5QaLTlGGWIrUniImHBICpN8j1rE= Name: legal/pako.md SHA-256-Digest: QHDjcrsDi/NcHOhII877usg69zA1eUbcj+270rem5Vw= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-summar y.html SHA-256-Digest: jHY/RkUQS4LtuEIfjJrY8xV8ec8DI6lO214d/Csik4E= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Extende dCustomBinding.html SHA-256-Digest: it6KpISnI2xh/aNw/K9Z2U8Bb1s6qgkd86VZ69rcj/o= Name: com/microsoft/azure/toolkit/lib/appservice/package-tree.html SHA-256-Digest: zXF+P3ve2rzEsC8b0idkgOsJ4aDLoQByxCeKB+5aae4= Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-use.ht ml SHA-256-Digest: IuXJjUNT5hoHaeBjNPa2+3RuFYmfMCFuxmQuSXuw1us= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Enum.html SHA-256-Digest: +iKSFBPX2iOmXRK1oCh/Hdp0Vung8aggrUEkrDuIZM4= Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/Utils .html SHA-256-Digest: N+cBdYrqjuFNEee/kEHSqEcHvexgcuWFQvqvvJKVr0Q= Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer vicePlanModule.html SHA-256-Digest: FDPH9VOO2Nc+CsvuDw26U5xuk1Goa23Fhx4xv/U7W0k= Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-tree.htm l SHA-256-Digest: CFIdw8INjRWunAlOxG4kcWI6UrnOtGAqx9zb73UvZlo= Name: com/microsoft/azure/toolkit/lib/appservice/file/IFileClient.html SHA-256-Digest: e46XQdCODNdztPWPCT0dl60Uk4SDCW/LAMkGNYu69Sw= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanMo dule.html SHA-256-Digest: /FGNvNT0dMwaBOODEmREDzUAWX49P/EKFaZ0cWxsGpc= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppB ase.html SHA-256-Digest: zfKswlPxQyqagzmHwCHrOiic+ecYS1AeFFKk55RpSGA= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package -summary.html SHA-256-Digest: KiNziK8ofctlfWqWL3/01QRFxwPV0vN7Cb2comSqvLM= Name: com/microsoft/azure/toolkit/lib/legacy/function/class-use/Consta nts.html SHA-256-Digest: +mUTM9zCTQwrIDGofesCWA4Pr+SXKXQrCYXMZwJUGJk= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Validat orTemplate.html SHA-256-Digest: awMAcltU9rIZoE3b09ZBIlDK5cK1M4wmhtu8H52k95I= Name: com/microsoft/azure/toolkit/lib/appservice/model/package-tree.ht ml SHA-256-Digest: T74oYoYJabPYb88LKjRU3XzETbD6KwfzilhMS+TXwW4= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployType.html SHA-256-Digest: lRhfvk/mUgLmfFtjKSt0mzAnUsluItlQCsDxmbOQl8I= Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile. html SHA-256-Digest: 1z7IpbOmlijvhjSa8l7Ljhx1m6EEY6UWbezien3MFmc= Name: com/microsoft/azure/toolkit/lib/appservice/file/IProcessClient.h tml SHA-256-Digest: k0jluxdd2kBq1bDsUzgzIA84ox9vjHO1PT6iH+5L+TA= Name: index.html SHA-256-Digest: s8N+ckdqEQeAFP86K9Dv4wwPiRf+t/E8uwwNBCZmdUo= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package -tree.html SHA-256-Digest: mI45vYpeMGqscALojrHh53yaMh60YZ7Ry70or+9Kqhk= Name: com/microsoft/azure/toolkit/lib/appservice/model/JavaVersion.htm l SHA-256-Digest: h8eaPpfYRhwusefGpvCjp7L8KoPEtCnJeuBvZT9+NHU= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/BindingConfiguration.html SHA-256-Digest: G4+3MuwCkgYzim5gdEgPveQFtPe5SaBnCTaS5EEe3Mg= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nAnnotationClass.html SHA-256-Digest: gtaNGL9t43Bc8Wh4QeYtHZ996OUv9tViGYo6NEEZ7yU= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/class-u se/DefaultFunctionProject.html SHA-256-Digest: ayrOKVnoAHeas8wNDeaDiJYIAmXYsIjUfxZzZYTCGl8= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F unctionExtensionVersion.html SHA-256-Digest: RqydAIqCUfJUYVknaE/Y9yq9oC5z52qZqK0Tco8WnEQ= Name: com/microsoft/azure/toolkit/lib/legacy/function/class-use/AzureS torageHelper.html SHA-256-Digest: ASSBG8dcXtVNjHFXxD51Bfj7vTMKxIrXBBAKGVhzed4= Name: jquery-ui.overrides.css SHA-256-Digest: B/EGl0kMvmDh9FP0poteQX0pfC8t1R88vnk+VMPFdk0= Name: com/microsoft/azure/toolkit/lib/appservice/file/package-use.html SHA-256-Digest: ekNnrTqsbvxQfPZpNoLeuvN7c51A9BlKQhBeAihmB/Q= Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceUtils .html SHA-256-Digest: Fy51ycftmEuEaHN2svNFs9lwaQCG1wlSI2q0YST24jg= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployFunctionAp pTask.html SHA-256-Digest: xxc/JYA50su1xtxmKvK/imOStDIz6nn0KpFc5A49/uM= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo yType.html SHA-256-Digest: ELG30PJHgaglDv0umu+F1GiA34RjmyQfgrkXIpyERFY= Name: com/microsoft/azure/toolkit/lib/appservice/model/ProcessInfo.htm l SHA-256-Digest: ubRhYKKn2HHfySajcsLNLPqNWrZ2uXqGcvaR6qG6aZw= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-use.ht ml SHA-256-Digest: JR7Zm5bYDisyPxmfAAFiiz3D/ZhgVjGt/Z7nZz+xBxk= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackager.AzureFunctionPackagerHolder.html SHA-256-Digest: Y8POvBzwz4HFrM4d2DNFlNzRIlRGnIQsRR+bQRb/qvU= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionTemplate.html SHA-256-Digest: 1IOTuS/0Mkjy9LoWCyi4WtHVulWJBAvG0OR7Bwf/dGw= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDeploymentSlot.html SHA-256-Digest: gNDSl2yMD2XB+1VFyNbOaOZJ0niGUZ9wjnTpE9tcHBI= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/FunctionCoreToolsHandlerImpl.html SHA-256-Digest: muh0YCx0SWBKLydGS9lflInXqlpqc0sbjyf/8DjjB9g= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebContainer.ht ml SHA-256-Digest: WEVHdZRE87y0gsPQ6V5AculE/QRBEOP1OmXa8Bo7jaU= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/FunctionCoreToolsHandler.html SHA-256-Digest: Q6/BFRxV/HDnei7te6Bk9n7uymQIhkiIntYHwTXasWY= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/ZIPF unctionDeployHandler.html SHA-256-Digest: l1x1Pz5WsPvjLLjTuA0z0APd7aClPSDRRAucm/cjqqo= Name: jquery/jszip/dist/jszip.js SHA-256-Digest: X43686CAFKYNlMe7xpaBSB7ecqYmMH5AIivzcaptUZI= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/BindingEnum.Direction.html SHA-256-Digest: u+jNewi55BHn5aBteaywzfZc/j9qyKaWyuPodzvgT6I= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Factory.html SHA-256-Digest: nl7gWcrU3AHS9o1pKm0OCwq6Uqidizm6EHDqhLoXES4= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/IFileC lient.html SHA-256-Digest: IRXEj4dCmcxBUUWWI2N8/hMmdIU64rJx4f3HtfvnAZQ= Name: jquery/jquery-ui.min.css SHA-256-Digest: z9VsdYFOjdR0vVO2IrGRUmUMVZXPPIv616hwOYUQXoo= Name: com/microsoft/azure/toolkit/lib/legacy/function/package-use.html SHA-256-Digest: /++MLSCXdQ3gx7P7kGSowkfplBQrRe9MsDyyfzea1Rg= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDeploymentSlot.html SHA-256-Digest: 1ac2XQj1qOIAl418upYaws+flAAuZbBYpQs5EXaz3G8= Name: search.js SHA-256-Digest: lr7xMOs5czMoN8+3p4987/vvCh+p+1wJxNc3R4l87DY= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c lass-use/Retry.html SHA-256-Digest: bztSCzfKLQLNvtlWX6rexWbPe7NUNjpV9ir0SB9awLY= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding sTemplate.html SHA-256-Digest: 7dnTKDZJNnHbIyDGu1RVWos1WlXC/TA7Mg89TGd27yA= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Runti me.html SHA-256-Digest: p+XbF7DLBAuU3INkmaSCM48tPDYrG5Kvvn4aYjxsDNo= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionSettingTemplate.SettingEnum.html SHA-256-Digest: m9PLctkHj3ewyucHw3r8OXuVL8vTXjoNOL4GwsJNtpY= Name: com/microsoft/azure/toolkit/lib/appservice/task/StreamingLogTask .html SHA-256-Digest: 5qqWVgzv52VfwCKtWFXW//2E2lVxtz1IZW1voY1RHog= Name: index-all.html SHA-256-Digest: yf6LqlMlLhmGTi67JVRC0ihPae5TbXZbKAgvH6h+2a0= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppServiceSubscription.html SHA-256-Digest: Bb5s2phMClPhTVlCxCD1phsVWXbd1G+FDFdXvz2Y568= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppServiceS ubscription.html SHA-256-Digest: mW5hmeOCLXpbD9jzsEWfn1OorzoiN33r9iatxyyncd0= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDraft.html SHA-256-Digest: uaNjCxSEj7zJ1RoxzVaToAOB2HfNRAVbVHSmX/niam4= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionApp.html SHA-256-Digest: sPIItbHTqRHAwUlNo/jwNgASIR9gvH1j/Cjmaj4bdz8= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package -summary.html SHA-256-Digest: N2HPdAO6jYh70a8mB20/qB1XDUbnbEbVe50ZlHi+6XY= Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile. Type.html SHA-256-Digest: bRZeGolAApGFy2tWiLuBHz3yc67cib+sU/dEQd+Ob/E= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package -summary.html SHA-256-Digest: zGtrE3miR/blyR4FToJyKq7bpiiTgHOGz4QSmnKgJzE= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact. html SHA-256-Digest: A6Mb4vxmbIDEtb8ztLZuGlQVNxVfNwELjthvNJ9yCk4= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppModule.html SHA-256-Digest: 0BrutdwMVgD+0oyhcI6OIWBZaunVvYHWAQ9OULzzs2Y= Name: com/microsoft/azure/toolkit/lib/appservice/model/TunnelStatus.ht ml SHA-256-Digest: tEhkbvYQMkGUgVQBg3yQE9wyD9EM3ebbEoG4V3PfyYo= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/AzureWebApp.ht ml SHA-256-Digest: OzuUn5EcfUfnGXtz7SV95/dRBb5vjDYYNYH0vAUYD8o= Name: com/microsoft/azure/toolkit/lib/appservice/file/package-summary. html SHA-256-Digest: QMIWqTumLIGQk5LvqBDncE1Yho07oSUkhnU2BHqd9rE= Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-tree.h tml SHA-256-Digest: Ht55RSEudPU+dq3pRYZyAdK8NeOGRyC7fn8i5wQu0NE= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/AzureFunctionPackager.html SHA-256-Digest: W+/aSpfjnwd+nAg54Mf5gOVFiaX2TCvycQSaSFa0yec= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio nCoreToolsHandler.html SHA-256-Digest: hIRWnE3YA7znjsEEO2jl1Bz8L7WKsAdBoTn5VwO6+6Y= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/AnnotationHandlerImpl.html SHA-256-Digest: uRHJ6qJY3A4vsFWmt5rVPi7rV+I2R4U3+8xrTV28vmQ= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/FunctionProject.html SHA-256-Digest: B8+iDQq/XT/l/2ncv+YqYAVlKIh4yf9DXcMtAvkznpU= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDeploymentSlotDraft.Config.html SHA-256-Digest: p0Z2yw4ixwqrmL8vGbAiGub6l4nbJBepFDLe8daxQvw= Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer vicePlanDraft.Config.html SHA-256-Digest: oMzfVAi4VbxQEZfmxLBQ0NtFsDtvXSZ7GGE+1wi92MY= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentType .html SHA-256-Digest: ycMab6asZtiaDdogAs8BT1nz9PPD+RX6/ZMtvXPjKL0= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package -use.html SHA-256-Digest: djRec/p3OgYBiGTqdBpIwUsUW304kuo5l8GtWa4DLrY= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/ FunctionUtils.html SHA-256-Digest: r9YJUAN41rIkphrw24WgUCCO1qMoGQSxPY+NCk3Cz30= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command HandlerImpl.html SHA-256-Digest: ZUvrZn7cbe8KOqMl6s64TJ4d2pdmBJJ01iEFkepejxc= Name: com/microsoft/azure/toolkit/lib/appservice/model/FunctionDeployT ype.html SHA-256-Digest: Tc/DKHENjGr/uE55gR23fL+SP5PLmAzU7YZ2xcTR1KM= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/FlexC onsumptionConfiguration.html SHA-256-Digest: wb3VNbOvNn4/W/mm439ULWd06F4EPEa3yRXwvq4Fqz0= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotModule.html SHA-256-Digest: evn9MZ7AvHnhuuVBaSOdOPMrQjZ1znhAxxtVcL7xH1E= Name: com/microsoft/azure/toolkit/lib/appservice/AzureAppService.html SHA-256-Digest: LG44sorQ6xxQ4foLgAtvuRqIfQwrUPaZeO1ukqZdWxw= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotDraft.html SHA-256-Digest: +ZOxoHoCv7AIMWeSKofK+tpylEqnZ4GGwVq3iU4U7T8= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package -tree.html SHA-256-Digest: 8JBcbHaaqTXrngK/8snMOVqzY7SdlgH4n4tHooXTVUA= Name: jquery/jszip-utils/dist/jszip-utils.min.js SHA-256-Digest: w4cGturSH1Y26pt5KXp5dsWfjB/5JCv2da7l3OOSzpg= Name: com/microsoft/azure/toolkit/lib/appservice/file/package-tree.htm l SHA-256-Digest: 8QEY8J0v2nQqUoJc4d7nCmYsMbeHa7AdfqfdLWoW5EU= Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi le.html SHA-256-Digest: 5wGqhT0Z+HgeEYGWI8wVlsBChaw+pedHepqXLwxZuos= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package -use.html SHA-256-Digest: tW+JbgrIcWIUNsV5rT5cf/8Mv4u+m6m3RNGJifesPac= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/class-use/FTPUploader.html SHA-256-Digest: PSWTLjy8P9JCvZWgKbKHC9r+PvVyq/MHtzWR/WA29i0= Name: com/microsoft/azure/toolkit/lib/appservice/model/DiagnosticConfi g.html SHA-256-Digest: nwbW/D4i68RnKkuis13RB3BVK+IMJBP/Z0B4tQGZHuo= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask .TrackDeploymentStatusTask.html SHA-256-Digest: lP0QGC6lKLem1dEOiy+UjewLQ1vi1cM8ax8FHohMVXc= Name: com/microsoft/azure/toolkit/lib/appservice/model/ErrorEntity.htm l SHA-256-Digest: wLRnDwktCM92z0/B/iz8/xiT4Od/A6TMsMqXUD2iU3s= Name: legal/LICENSE SHA-256-Digest: S5q+vEM4BIp8LcGE6fgA3rNJNmvfKOsjwmd6d7TIdyY= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/IAnnotatable.html SHA-256-Digest: DYU8edYBsMDP9UGo/2HdjPp/mVmxaoGLOhpXOrAVKQI= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/IOne Deploy.html SHA-256-Digest: MslN7xtxUE+Cm2M2XY1Ed7FlPVKU1MeXdf8A0ZswCxw= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackager.html SHA-256-Digest: OI+fCc02zKKqCSejbxcvDsQIf4bzggE9d2RTDvMCJrw= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/IDeployment SlotModule.html SHA-256-Digest: iwL/0eimx7uEWl8zo1JdFdIlYpwxaCSBvWgoMxd5QLU= Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateWe bAppTask.html SHA-256-Digest: LWQeoHOo+6d1nYMPMJbamt7wfGl0YNTQnzoDa2CcIik= Name: legal/ADDITIONAL_LICENSE_INFO SHA-256-Digest: ppvOJ1uno1cK9lecsPVWgs11/t/NSeDo6QIicMRHyRY= Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/Runt imeConfig.html SHA-256-Digest: 243gxh0vKoK4G8D7NHWeUkdUaw1k2FEKD1RMeudeVMs= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/RunF romZipFunctionDeployHandler.html SHA-256-Digest: fHd4EPjP6Qbxr0QxRMLNFbtFMZIzru9u6jGx/swZfik= Name: jquery/jszip/dist/jszip.min.js SHA-256-Digest: yeSlK6wYruTz+Q0F+8pgP1sPW/HOjEXmC7TtOiyy7YY= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/AppSe rviceFile.Type.html SHA-256-Digest: 9bkplwd8Mp53P7SS+jILcy47PY4FehcO9lf9kcyUx6E= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer viceKuduClient.html SHA-256-Digest: 7rnuqQGgvpiaVBsbVCLkzbFFFOHOTwP38DI9qzlWTi4= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/ValidatorTemplate.html SHA-256-Digest: KYDRadletTF6AbeMUoel/62XGfbTuRHT+W4pJvhbAxc= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio nCoreToolsHandlerImpl.html SHA-256-Digest: W0jPbzRAGWQczuctZb/q3RfXlYQF2UdA3AxT1cstHO4= Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/Funct ionCliResolver.html SHA-256-Digest: rzNhQNQuFjW5JfRqwop7RE2bBfAsfQMNxYS4pN8bVE0= Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/Func tionAppConfig.html SHA-256-Digest: X4GzN3bzRO5hnLw7nRitSwU36CyVezhcEJYIkjMobOk= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Publi shingProfile.html SHA-256-Digest: ogrA46ds7GL1CKk2v6SNBMZzhVtPsIcyBOPprccNfMg= Name: com/microsoft/azure/toolkit/lib/appservice/utils/FunctionCliReso lver.html SHA-256-Digest: Lc+77/VK61O6jl4S0O5GipSPqB5o5+SDc2GZZk1F+kI= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeploymentBuild Status.html SHA-256-Digest: KCPErnAjgZ77j3UsbZ+gWwXYMcfpPY0YpXGZg30w2EU= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDeploymentSlotDraft.html SHA-256-Digest: m7JRFiVkbUzl524EOg1QIZ53fyr3IwxJPNX6YH7s8D0= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/BindingsTemplate.html SHA-256-Digest: yrnZ5ADxDbcqpIagXboX+7LKrKArAY8gOam8nolVHi0= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/WebAp pArtifact.html SHA-256-Digest: uUBSoaby7wEL6CMl8WEEBaKLHPSPWo0xVpDq23iCKCg= Name: package-search-index.js SHA-256-Digest: Hg9mEcKSASfFOiJsHPGkYvcCjCXO5++EgcbDnua3eJA= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/IProce ssClient.html SHA-256-Digest: m0fUAIwP/AsQ1U101ppHT10fyazjZN429jao7T49Z9Y= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceA ppBase.html SHA-256-Digest: 1fsnAXQd2jH5Z7v917kfjBRIwalRxTQJzxZRRJnZ6Lg= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplate.html SHA-256-Digest: Ca6gPOynHIIHe1+ucYYfXNYyTUO4la/lkHXD54Iy424= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-su mmary.html SHA-256-Digest: J7FrUFe1FASIS9ohT705RRoLDQAqF+0k8ZIxAhkbKB0= Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-tree.html SHA-256-Digest: U0J65rQo+SKxMch7IRS0JyV7MIUHV+6128LX1cjYcAA= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-summar y.html SHA-256-Digest: AaTZ+/H8bmdrXCBx7f9QfmMmder5+uLExAWoc7uU6W8= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Error Entity.html SHA-256-Digest: wiivvOtob0u3KJ/EJsKSAgW9OHCkbCMC1o+JsxJ2TTk= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Create OrUpdateFunctionAppTask.html SHA-256-Digest: V5sv/VvHhTukJviCi79LG7nbeMbWjPlv+bdsFjfLkzc= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlot.html SHA-256-Digest: 3f/o5E+TQ860jR81mFh6yxqeKOhNCak5vQbxjC4/Lps= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F unctionConfiguration.html SHA-256-Digest: gZxH3LqrsSRF+0yxC0dBToE2wVRTssGQZvc+2dGZ8Hc= Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-use.htm l SHA-256-Digest: V5+ZIin88njHhihc6gQS065JR6bH5MbD0V/Zr91gzME= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Serializer.html SHA-256-Digest: I259nXOpZGkgPiBsq6+rEWVH/5WUBqq4wFwuQzNewBo= Name: com/microsoft/azure/toolkit/lib/legacy/function/AzureStorageHelp er.html SHA-256-Digest: liARORsC30esbbbAMlEBBnY2G0iR0VKVhIGpKzH6B84= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/ DateUtils.html SHA-256-Digest: yE/enA4qyZAoGJHewcAEtOXsDHX1IB1qVQXRMT42gYI= Name: member-search-index.js SHA-256-Digest: pGrvfxRrXULPJB1lxCCbuL47NbWcde0SuZtNT5QyFt8= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/ZIPFunctionDep loyHandler.html SHA-256-Digest: KWljD4gppUJqTB5ThYUkGdB9A7VCJ7jYJiONubKTf1Y= Name: resources/glass.png SHA-256-Digest: YNXwWfEcX2H3f2EqLILSqJ628lsZ1oxRrj4dROrXwco= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Docke rConfiguration.html SHA-256-Digest: xK7eA0q4QrqnA3DEIoEYQM2XpqCZs0hYO64RaL+PS8k= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDraft.Config.html SHA-256-Digest: oJLAnOXIRS8IJs9kR3RPh7MR7EmrxI/BL2WZdUYghJA= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command Handler.html SHA-256-Digest: M+Tva97u+GQ98lMvWOkl8FOsKY3JNxIxCMVYBFuCFFo= Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-tree.ht ml SHA-256-Digest: 2rENZP3nPwzSfa1/cRLB9qAEo8pG+mJeVtEUr5Skixw= Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/AppSe rviceConfigUtils.html SHA-256-Digest: SwzbC6GG1HXksvTWpJzM0suLAPcmLb0sFw4kKVrlGqo= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/AzureFunctionsAnnotationConstants.html SHA-256-Digest: sHA3Lc3/O1XCIs5Cc4h3/NohwnXyLYiY6qh+BKumDZ0= Name: com/microsoft/azure/toolkit/lib/legacy/function/package-summary. html SHA-256-Digest: rSF5b+z8F3UFje7VfYu3QWTaZmD4BZLEQqzDkMA5OHg= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy WebAppTask.TrackDeploymentStatusTask.html SHA-256-Digest: eQnrGJuBC/XQtyvy183K8Lc/5lS2kKVgOJ+M42d5/9k= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/Flex FunctionDeployHandler.html SHA-256-Digest: sjhHG+2KGlQS6/wNG+nZ22GqrDWf7R1gPVtPehQZvbI= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppBase.html SHA-256-Digest: oQboPGBVf+yvEf/ij6yptK7OnWC3wKhgbbtfxMT5vEI= Name: allpackages-index.html SHA-256-Digest: TJ1HZNQ4i5udqmgLpyXCISat6MyyRFSJN+UsbB5w2aQ= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionApp. html SHA-256-Digest: ZtUcbNL6Mx+3GoUmonOnFq1OPqaiBgAFyXyMYrV2Ecc= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceR esourceModule.html SHA-256-Digest: 9nLOg0Vzd+HvK0GcW6GFrp3dVpzz3xwmT9j6NxwAg3E= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionsAnnotationConstants.html SHA-256-Digest: 6ABfo9JRPS9AnueJsiK4NPICjHfvBDiEpqamHjhyB48= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/CommandHandlerImpl.html SHA-256-Digest: XuNiVrM+Aqc6oQM1P1ZiThj/jqsDRsNva1xzwFlHMJg= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppModule.html SHA-256-Digest: Wznj1BBnTVUdDtSnl7raAvMO6vs2m0FirFlFL+YF5wQ= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/CommandUti ls.html SHA-256-Digest: LaE/w8oy+bS36rhGgJrFwS8Pb0cmGxRQMuAjgbMFdg4= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployOptions.h tml SHA-256-Digest: +y+SHgOXkG2F+WwPga1oko7H1VnY5Jkcc099M6kAZ8M= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AzureAppSer vice.html SHA-256-Digest: X/WEDuMNedN9etmQciM3vi7Oxp+dcuPFS9uHjGw7FiE= Name: allclasses.html SHA-256-Digest: KVnJOHwhTgkxCYtYL+PbhstqEiUoct3r0Mi+pn01bCE= Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateFu nctionAppTask.html SHA-256-Digest: P7MuKPK66UYUgDnEZCzevUbZ0qwdqpIE/elWqhyXtRg= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlot.html SHA-256-Digest: r/hEY7UcbxeVX0Yquatb4bUno3BI6U3GmIiGwHGtVoA= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft.Co nfig.html SHA-256-Digest: GB+0UZeuG5489ZGgoBWiFV0K0sj3ErY7HYxy4PDOaA0= Name: com/microsoft/azure/toolkit/lib/appservice/task/package-tree.htm l SHA-256-Digest: QlLfe0wgc/yjyEyKlg7eqmJwkAmV0KbRj9oMx43KF+g= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft.ht ml SHA-256-Digest: 5bARRn68DAVPpZE2UuOvg80NUp4dTzODCYuipHmY88o= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-tree.h tml SHA-256-Digest: BqXmZ+jxqGwaIMPTkNwwLZjK/FsR5LdundHDtYjxcVc= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package -use.html SHA-256-Digest: FamPZzG5rDx248P9WgAhq5lIxtRuoCCL7znO9suuwQg= Name: com/microsoft/azure/toolkit/lib/appservice/function/package-tree .html SHA-256-Digest: 2PFqB0lX8+9LbZaojTmGb6KInlneSDH2CqRSE1OfziY= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/RunF romBlobFunctionDeployHandler.html SHA-256-Digest: xMoe/L9szGpeCYHxqXo+w7xYTnnjPYS/+jlbNCeDvIE= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/package-summary.html SHA-256-Digest: iScnINaxyTA+/Vv2rkYHGTr3tEepxQqHToxNF2tradA= Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd minClient.FunctionsService.html SHA-256-Digest: JJKIE8YqzVkweC9InII0u7MwylhAL2Pq4jN+f6gRaMg= Name: com/microsoft/azure/toolkit/lib/appservice/model/CsmDeploymentSt atus.html SHA-256-Digest: hfEDo/Y8xESoQv3E4I6c7ZmkDmKWrhxKHPixXjLuC6E= Name: com/microsoft/azure/toolkit/lib/appservice/package-summary.html SHA-256-Digest: qJ+NR7XIFh3Kvi+K37mjseb2fzxmZYDCkUJ60RQYPNY= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/IFun ctionDeployHandler.html SHA-256-Digest: Tyhr3rZZ05McUOGhPKEqkW9yusSjxU0z9K1GJf8h72c= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/Azur eWebApp.html SHA-256-Digest: EUQxwD06lLecK6gB89SKs06R8oezGVOp7qYhxZr/CoY= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotDraft.Config.html SHA-256-Digest: kI41KFLZC8wQLHgFrkEyqql+uC/qd7MNdRqdTfYx/9c= Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/AppSe rviceUtils.html SHA-256-Digest: cNMgnYPkho2fY4FpSeOGavpJKIrLniUIg8xJ32ZGZYY= Name: com/microsoft/azure/toolkit/lib/appservice/function/package-use. html SHA-256-Digest: cPua6S6vmJaz56JpKNR19l/jbGh2v6C5yO7WsKeglXc= Name: com/microsoft/azure/toolkit/lib/appservice/model/CommandOutput.h tml SHA-256-Digest: v7P0wBUFMN4rP00WYrcFhcWp3i1Vjn5VkKoCDRa0apA= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppBase.html SHA-256-Digest: xc9/N0DvE+0cRUnMBaxsPJHoYpBPMA9646qpJTn69Es= Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-summary .html SHA-256-Digest: Hm4W6c8H/V7TbXU3LNFN0pM2kXpdDkVz5Ly2/8KCizE= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/FunctionAnnotationClass.html SHA-256-Digest: kSit6P3pdl9qc1KF/kc/6s/ke31NsEq8dMX7LwoR56c= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p ackage-tree.html SHA-256-Digest: vPx9E64v2iuZjJs+/YpgStG6H78W0UJCs7Ufe66k2cU= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/FunctionAnnotation.html SHA-256-Digest: EiwY9izXwRNg+UZbOji7K2368aOpe4qd+/UmPciW6+g= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package -summary.html SHA-256-Digest: jP0mzvzYLPfsQAlDpSFV0SthrX+z13UTr8U5b43nAJA= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/TemplateResources.html SHA-256-Digest: dFrtkxYR2zd/hKAC8ZvPdrU+EOfmGUa8b+94kN893WA= Name: com/microsoft/azure/toolkit/lib/appservice/task/package-use.html SHA-256-Digest: OKKSZ7fO+JhTSZzxJKm0uQWJrlvsSU8qQq4WyBMQ2uY= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package -tree.html SHA-256-Digest: i3GLp5LdteucTU57kz6vxXkOEAlORzDa7zoORBpuQ7k= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nSettingTemplate.SettingEnum.html SHA-256-Digest: wK83rOQoe+V+upKU4tifIw0oE0nf4jevIXh5xyRsHBU= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD raft.Config.html SHA-256-Digest: FiXknxl4YBhDPG/TjbNSfyDQQAfIOy9pzoMJgk/pp/8= Name: jquery/jquery-ui.min.js SHA-256-Digest: psCQRJnx7+7wVkG9KP18c3heYPac6caZ2vZa+LNyBwM= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nSettingTemplate.html SHA-256-Digest: sOT0iomT6YBTiAwVEHAB69jwhIh3WaXF2xxxQ4lsUJs= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c lass-use/RuntimeConfiguration.html SHA-256-Digest: 32N2jOu8eknHp0Bif1hmLhdBpVIiTpm/pRHTZvcGAQU= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-us e.html SHA-256-Digest: Xf8HWMYuQtc46uAu9RbV9/5Nic/xx0ZMXjiSiqnzbd8= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionSettingTemplate.html SHA-256-Digest: WzDHwZhV4eWqZj31Rty8JvAYDaSN8xuslYLpRgiq0Ro= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Prici ngTier.html SHA-256-Digest: CYvVhocEjucxE+IbN2Cp8S7kuy1NreOpC/5NW/wThOk= Name: jquery/jquery-3.6.1.min.js SHA-256-Digest: o88AwQnZB+VDvE9tvIXrMQaPlFFSUTR+nldQm1LuPXQ= Name: com/microsoft/azure/toolkit/lib/appservice/entity/class-use/Func tionEntity.html SHA-256-Digest: xFJZy3iuXQ//Ath/3ySiLq9wMM8pcXLgMbvBKhMIA+Q= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceS erviceSubscription.html SHA-256-Digest: oDn7n4feONL0nQ9a774afRyylz1iXwhxEMfBHDMA7U8= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/AzureFunctionPackager.AzureFunctionPackagerHolder.html SHA-256-Digest: pUtfCt6T7NR6nW8KvK3OqO4R+XP74I4Csk8kTp401XA= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FTPFunctionDep loyHandler.html SHA-256-Digest: rAAVS7LQiLfLGA5Tq6JaOKhN1P6/w9samq+bsIjbQJ4= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/BindingFactory.html SHA-256-Digest: l7QfTpuUQ3XIs4dkY9vwbtounE28iQvFOr3MYsGc5Ok= Name: overview-summary.html SHA-256-Digest: kz3lgBHnkUTUtKWL3/LOT40u6tigqY4jzhGs8Eu8v+M= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDeploymentSlotModule.html SHA-256-Digest: cUH3Twj9r2P1ueQ2B5vBVL5XG8Q3bIFeEYcxKNu57fE= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/WebCo ntainer.html SHA-256-Digest: 20mTvk9szlnO37z88WCjiCBtj2KwORE88OrvwdUfDbs= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDeploymentSlotModule.html SHA-256-Digest: vd8RgQoNexCUHVYlUKejxCarDDfNW7fsJRR6HWj3sRs= Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura tion.html SHA-256-Digest: QM9KkZkdCMaJWjh2al8fh//q9hUjpoo9x0PRkc7w96A= Name: com/microsoft/azure/toolkit/lib/appservice/entity/class-use/Func tionEntity.BindingEntity.html SHA-256-Digest: P/OEJ18yiXLZR2BzV/D9vpMkUpkCaLdIKy4EeNaLlOw= Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-use.html SHA-256-Digest: IVqyrG2Y6ztLA/K+qAIxcn3PZ+Ws94zyU5PxXtHUM5c= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R untimeConfiguration.html SHA-256-Digest: nIyTzH9rD2Cdq0HjkwYAd2OGkJU/5Ui80UdRQt0X3GQ= Name: com/microsoft/azure/toolkit/lib/legacy/function/Constants.html SHA-256-Digest: fDDx9L05UYz4v7sqbi2Mr3AJFfALfkUYTq1IcCT0nXM= Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-use.html SHA-256-Digest: OnP/T7xJ3AZY5onEcHayRnnB0HsZSsuP3/2kF2RoEIg= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/DateUtils. html SHA-256-Digest: QbjdoDjBv0UOjeyJ0/kbjwoiTamYJ/WsG5MkqikPuR8= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebApp.html SHA-256-Digest: Xl0zFJhjA0MI5UsdzjEA7VtRoFht5ZfoWCHA7XszNDE= Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-summary.ht ml SHA-256-Digest: 40XNQPzujlz4czpcSCgqmvFsFp/FLEakfptNPEW5np8= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/CommandHandler.html SHA-256-Digest: RyiL+hjmr8pK94c67vJt6jupQP4veEZtsX2iYPWAzz0= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity .BindingEntity.html SHA-256-Digest: 6qGXeIVD6mZmwNVW5xE3Ee1PcIG9psR6AMuTos8qFUQ= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceResourceMod ule.html SHA-256-Digest: pnooaL7RIhmMkd2uzW2YWUgSIl3XFyyz19BNsTaZx34= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr aft.html SHA-256-Digest: tnLAjuVLmms81Vqu7q6r3nvTIl/IiKJJJhFb/yliRto= Name: allclasses-index.html SHA-256-Digest: ATIMubhFAEGVtTMH2xF5zwhV6kakGd38Y+Qcymh90iI= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IOneDeploy.htm l SHA-256-Digest: PRugqRjzWeIPhTFkdDkk7dnaBUKJb0Zh/0V8PPnEYjA= Name: com/microsoft/azure/toolkit/lib/appservice/model/package-use.htm l SHA-256-Digest: cn/9Llre+9RrAUrgO7H795qhyqRtxV3/HjZWGOShwv8= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDraft.Config.html SHA-256-Digest: q21qMJIonmzAu7v/QcIgpNeICE6KEspXhCsN9Xoh2IA= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/AppServiceUtil s.html SHA-256-Digest: RN1D70hXszJBElFskDy9tBISrVYTP+Gn1nLs2Fma8BU= Name: legal/jqueryUI.md SHA-256-Digest: uwoOievYJN9xRRa/ZLkQHGIIHks3bwD5KaWMCVVb8RE= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/ExtendedCustomBinding.html SHA-256-Digest: 5WLmLtzX+WARmvlF4LzvQVP4t5I896U4SVYKG68OA1g= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Enum.Direction.html SHA-256-Digest: dx3ZO7B1B6l6dec+OkIz4OxsJuMcpA8oQS8chUdl1J0= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient.CommandRequest.html SHA-256-Digest: DjmiG7ESFQ/P697LEZctpuze9hfCJCpxRxSKcefPd7g= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat ionHandlerImpl.html SHA-256-Digest: aUA0EEo0SOn3cZwXDYGRHArpx5GBXMy25fgnQjtLZrg= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Stream ingLogTask.html SHA-256-Digest: SRIW/4OXSvy1VE78ZgkKDSujHNCtRZUTxas0SF3sdR8= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c lass-use/FunctionExtensionVersion.html SHA-256-Digest: 4udaEjGWgVNSx8bNtJ5pQdtmBCccQMMWknpFfjUkXKI= Name: com/microsoft/azure/toolkit/lib/appservice/package-use.html SHA-256-Digest: 1ZcY7TXSVzumS+Fob0KWn02sSTc0APqXJoFgn/1cX38= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Depl oymentType.html SHA-256-Digest: Fde5kZXX0+S8TFPGpyAR+ciuD3WbTzesZNDiZQ7y+2Y= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package -use.html SHA-256-Digest: ncLBYThh0NS+z+/v5nv/cGM54RX/epQgRdV+2KpxYd0= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotModule.html SHA-256-Digest: hAHb3nFqfOJg6rLivDvGOJcM/n6hSd7I6waz89MNQsk= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/KuduD eploymentResult.html SHA-256-Digest: DIrdUMu9oJD9zuyOE25cVCSxwMysXrhGcwdV2w/5f3I= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/TemplateMetadata.html SHA-256-Digest: CBkioSx3PojnguaXN9z0C3Ibn7h7XiKu8lesaIVBJMs= Name: com/microsoft/azure/toolkit/lib/appservice/model/KuduDeploymentR esult.html SHA-256-Digest: Lcd+tlUwv3ERDMhbEUo3B7LMRpTr7gV9BmLEiI3v8sU= Name: script.js SHA-256-Digest: IHTktkz6w6F2GKad5HiS6BAjuXyvd+M8TbkEjfrBoJs= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Dock erImageType.html SHA-256-Digest: jvJLs3joaSAoS+OeVocu7002CQZTnjvHabSfEEkbfto= Name: com/microsoft/azure/toolkit/lib/appservice/model/package-summary .html SHA-256-Digest: iBGvMaU/osyCzgFImXqSuKJ1sakSMWszwYqoJ7qm1yA= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/Default FunctionProject.html SHA-256-Digest: 4L6amkmP0ZUivuP1xu8fxveLnYDLKEoiTh/NZqbDmoQ= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/AzureFunctionPackagerBase.html SHA-256-Digest: uU8zPDgCFbB8R4idEE6xIExsdiFisqF4v+G3IsWS/G8= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionsSer viceSubscription.html SHA-256-Digest: 0j2kWfidfDSFg1aVihPywiWijlQWw85JfKpnrp3Z0ug= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding Configuration.html SHA-256-Digest: ZuvK3DMiRz4grwFIvmdG0pKHbtf1XkYR+PnM7UAvrgU= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package -tree.html SHA-256-Digest: t2lxn58vHQs4KI2+F5ADIMiOppkIKP9sbp+8YDABfbc= Name: resources/x.png SHA-256-Digest: An8O0oMpY0vmRZMuGrfDIb8nuM+vmu0w8sv17kR4lSs= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/CsmDe ploymentStatus.html SHA-256-Digest: nMQx+EBDxebUZsw0/t8txXdKw+J0anNR+qQ4jtn8LZc= Name: com/microsoft/azure/toolkit/lib/legacy/docker/IDockerCredentialP rovider.html SHA-256-Digest: mHZeGRDlM3ybIqGNdFvN12hUSsNOXt1pDLb9OtaaTew= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppM odule.html SHA-256-Digest: /qRVPIhAgZKKYRQIHeuxJiMdo9p5+mhBJsQp2fXhm58= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Tunne lStatus.html SHA-256-Digest: UcxyW12GIEyueIT51RvQNNMUXGeq3V+qxdPdx8zlOBI= Name: serialized-form.html SHA-256-Digest: yr3sXiu8sxY5rikeHnQPAO+PsfnF/+zpyojkqMkGYyc= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/AppSe rviceFile.html SHA-256-Digest: 1qCf9vlW5VywN419/Ngw+cCBsyYRNbZMeeJqu6Bqn4k= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nMethod.html SHA-256-Digest: gq8O4UY66DLFTCAd2T6w6Hdk1QwNiMPa3MC7lx3UqC4= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient.html SHA-256-Digest: 7s9n0dH47atUVi8IkaIkeph5ZdXl9aQqt4NmQjFrHAE= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Proce ssInfo.html SHA-256-Digest: K6Hsjn75aKV7GLmVH1jyzQmTPnorm58Y6HqpwSH3zX8= Name: legal/jquery.md SHA-256-Digest: BxaUNoLGJP0vSbOnGKLtTWOG6HL+dB8cdZVzriRQnT4= Name: help-doc.html SHA-256-Digest: MQNeaNtN0RfDcebgtTu6i6rB5yo8btk+GbhwkarPEWE= Name: jquery/external/jquery/jquery.js SHA-256-Digest: QWo7LDvxbWT2tbbQ97B53yJnYU3WhH/C8ycbRAkjPDc= Name: com/microsoft/azure/toolkit/lib/appservice/model/FlexConsumption Configuration.html SHA-256-Digest: R3bXTP+PhjrGNMZ1MoJ+1F22lEi3r6EWtm+qPNKfvXk= Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceConfi gUtils.html SHA-256-Digest: HHTcGl9c4KEpZohxTDtq8FrzZF99Tlt2sPsn36ctbcU= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionsServiceSubscription.html SHA-256-Digest: dnO/eDOtvjpxIYq+MzimoqIaq045o5l0FuVGzmDmILM= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotDraft.Config.html SHA-256-Digest: HKQmNrytPguuiFyJuv00re15GfGQwTSorrR5v+uGcrk= Name: com/microsoft/azure/toolkit/lib/appservice/task/package-summary. html SHA-256-Digest: KU71nEd9a6M/h+9p5yseGAXpi0bTzwLx3VGO3xocsyU= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy FunctionAppTask.html SHA-256-Digest: +418BcgBsSQq/AiaeRcwhXOVwnSEdP44cfG93oYxanM= Name: com/microsoft/azure/toolkit/lib/appservice/function/package-summ ary.html SHA-256-Digest: FzF9Qb0fkCYxADpv5250EfQXq5820qmfipaeSs1L05k= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD raft.html SHA-256-Digest: glaYlOwq9Z+QUNox2FWxTt99cx25QLa6P+7ufYWZV3M= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentSlot Setting.html SHA-256-Digest: 0O4AaQSnnb8xj8lTFyL7BC+vT6lQ05sDiLPrapmO+CY= Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd minClient.html SHA-256-Digest: fD0PqFrHjWzFcXCrEZgsZ9TkIapCNw17lwFlCzeCjGc= Name: type-search-index.zip SHA-256-Digest: IBG/0sqKLv1yRcEzh9p41ZFk7jI8nz11gPJsCbtHfVQ= Name: element-list SHA-256-Digest: h7C+CF7VrplHJ0Sb/KCfrBLjrCAZWil+FVn+YU290pg= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/AppS erviceUtils.html SHA-256-Digest: VXnIl5zgTpdiMKc9GvUlWwZNnTrykvd8RlssceByGIA= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionTemplates.html SHA-256-Digest: TItpoOGccXl2cZrCYlMohjo+w69U8UD3phihM59bQb0= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AzureF unctionsAdminClient.FunctionsService.html SHA-256-Digest: FjHY4b0QaDSGeLDm1Tb7PAsBUNyDHD3L2h5CrzgxZIg= Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServiceConf ig.html SHA-256-Digest: vO+pEz5NybR039Le/PJD/lpfXrd69/bCQHQfwpZIj3A= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat eResources.html SHA-256-Digest: 9b2ifPN47Vcbs45+GhT1Zl8ld2l5qG6T8VQIARNQLmU= Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-summary. html SHA-256-Digest: zwyvTca7U/ysaaDIr0SgeQHMU7sk3X1wxNGXJq4w8nA= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr aft.Config.html SHA-256-Digest: YK1NkAdTqAr8qVtXseNaeaoDSNFB6KGvidYltVNKh/w= Name: overview-tree.html SHA-256-Digest: VM20v89uXRAk1F2WEEEPY//MEYPm/BLG/DhjJU1puBg= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromBlobFun ctionDeployHandler.html SHA-256-Digest: XkVdyKbQrqCUXkPYzteMBl3dQBxZd36AYIoTYHVBLto= Name: com/microsoft/azure/toolkit/lib/appservice/config/package-summar y.html SHA-256-Digest: G+QMYs28ULfxAiL0TT9jeMDK633xSwR6UUTYTtplb2k= Name: com/microsoft/azure/toolkit/lib/legacy/function/package-tree.htm l SHA-256-Digest: xMBv9ZPFG6oRqNqfJvDeAOe12xkS22pdMyVWw2sg4Bk= Name: com/microsoft/azure/toolkit/lib/appservice/config/FunctionAppCon fig.html SHA-256-Digest: 0icn5ZG2mY/MNipyXhZuGhDYFlpDvRgmYVAUpkAM5gY= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Funct ionDeployType.html SHA-256-Digest: o7Tnce9ewdqQTqUYgnehRvw03B14IanogxXIOu8YPBY= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDraft.html SHA-256-Digest: pEg1gRNonF8R7PL11LpiiTlh0YVmjk6QMCLi+5SrojQ= Name: com/microsoft/azure/toolkit/lib/appservice/config/package-use.ht ml SHA-256-Digest: 2DG/CAsx0fNcYtI/mF2h0YV7uL3B4fZTWW8GGs+51h0= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nProject.html SHA-256-Digest: D0VK1Xlgy0XGCwggEvDbt1VDH6s3gI+ehOWvkVFfO90= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotDraft.html SHA-256-Digest: /PAFBhPvZSD42Ttdf1xJCvR+lZRdHbkwlpR8A1hbZJc= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA pp.html SHA-256-Digest: OvCDXLndFCFwNshe7QI9Do2x+1ATTQot6F4Yc2REAo0= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask .html SHA-256-Digest: TrMBqwZoclZh+6m6DKaTI7QxXa9KZ2g9CDRMFf5q/UE= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat ionHandler.html SHA-256-Digest: 5vx5PgPk5kbe2FFX20lQNvTDVIIP2jVS+vbvSCe7NdQ= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Create OrUpdateWebAppTask.html SHA-256-Digest: ntw86HZrlwW5+BUyx2DAPYSX4uElHd6Q8e9T/utYPHg= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Depl oymentSlotSetting.html SHA-256-Digest: YPhloIugkJApY+pL4zeHdrjQL20/OnXdMBDWpILr4Kw= Name: jquery/jszip-utils/dist/jszip-utils-ie.js SHA-256-Digest: DOhExMICw1LjIQph/AkQA5pwcIRTsNtvKdTalJbycR4= Name: package-search-index.zip SHA-256-Digest: it5YuGRCgCok2H1/B2z7EGJSZaXyENqLfegDdMTJZ2M= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-summar y.html SHA-256-Digest: dWVEbLJdObk6Vx6Knlux8qJRPYAHLXTnKHhE5LLcGbA= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DockerImageTyp e.html SHA-256-Digest: 6b8cvqotKvIJLSBp/tN4Zsu880L38SRNJgC0MICFYGo= Name: com/microsoft/azure/toolkit/lib/appservice/model/PricingTier.htm l SHA-256-Digest: SKEpdibs5kWTxNwE6Ev0xFEcO35ZVfVdUPQGBuiNTlg= Name: type-search-index.js SHA-256-Digest: YUl7zPJtCk3LmX2vY1Ex3OAhJtbe0dCJkF1JiX4LkTk= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/FunctionMethod.html SHA-256-Digest: i4zu3c8YF0w3bCDHZ/ZeYSiBdhnNupJYPHFGuE9R+vw= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-tree.h tml SHA-256-Digest: 9vkdtfs0ZhFUMT3NCAjpzkwQ0tLRljj9LAoWdH8BouI= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Comma ndOutput.html SHA-256-Digest: wFVGVz2GY2eP1DIdkeO/cCpYqBH9SAhaXoJtnDDWbbA= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceServiceSubs cription.html SHA-256-Digest: V0b84HeozWQPW8gH3Wb7rpsspI2AFKJSx7fToB4MiCQ=
combined_dataset/train/non-malicious/3611.ps1
3611.ps1
function Get-BandwidthScheduleName { return getAssetName } function Test-GetNonExistingBandwidthSchedule { $rgname = Get-DeviceResourceGroupName $dfname = Get-DeviceName $bwname = Get-BandwidthScheduleName Assert-ThrowsContains { Get-AzDataBoxEdgeBandwidthSchedule -ResourceGroupName $rgname -DeviceName $dfname -Name $bwname } "not find" } function Test-CreateBandwidthSchedule { $rgname = Get-DeviceResourceGroupName $dfname = Get-DeviceName $bwname = Get-BandwidthScheduleName $bwRateInMbps = 45 $bwStartTime = "11:00:00" $bwStopTime = "13:00:00" $bwDaysOfWeek = "Sunday,Saturday" try { $expected = New-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -DaysOfWeek $bwDaysOfWeek -StartTime $bwStartTime -StopTime $bwStopTime -Bandwidth $bwRateInMbps Assert-AreEqual $expected.Name $bwname } finally { Remove-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname } } function Test-UpdateBandwidthSchedule { $rgname = Get-DeviceResourceGroupName $dfname = Get-DeviceName $bwname = Get-BandwidthScheduleName $bwRateInMbps = 45 $bwStartTime = "14:00:00" $bwStopTime = "15:00:00" $bwDaysOfWeek = "Sunday,Saturday" $bwNewRateInMbps = 95 try { New-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -DaysOfWeek $bwDaysOfWeek -StartTime $bwStartTime -StopTime $bwStopTime -Bandwidth $bwRateInMbps $expected = Set-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -Bandwidth $bwNewRateInMbps Assert-AreEqual $expected.BandwidthSchedule.RateInMbps $bwNewRateInMbps } finally { Remove-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname } } function Test-CreateUnlimitedBandwidthSchedule { $rgname = Get-DeviceResourceGroupName $dfname = Get-DeviceName $bwname = Get-BandwidthScheduleName $bwStartTime = "17:00:00" $bwStopTime = "19:00:00" $bwDaysOfWeek = "Sunday,Saturday" $bwUnlimitedRateInMbps = 0 try { $expected = New-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -DaysOfWeek $bwDaysOfWeek -StartTime $bwStartTime -StopTime $bwStopTime -UnlimitedBandwidth $true Assert-AreEqual $expected.BandwidthSchedule.RateInMbps $bwUnlimitedRateInMbps } finally { Remove-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname } } function Test-RemoveBandwidthSchedule { $rgname = Get-DeviceResourceGroupName $dfname = Get-DeviceName $bwname = Get-BandwidthScheduleName $bwRateInMbps = 45 $bwStartTime = "11:00:00" $bwStopTime = "13:00:00" $bwDaysOfWeek = "Sunday,Saturday" try { $expected = New-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -DaysOfWeek $bwDaysOfWeek -StartTime $bwStartTime -StopTime $bwStopTime -Bandwidth $bwRateInMbps Assert-AreEqual $expected.Name $bwname Remove-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname } finally { Assert-ThrowsContains { Get-AzDataBoxEdgeBandwidthSchedule -ResourceGroupName $rgname -DeviceName $dfname -Name $bwname } "not find" } }
combined_dataset/train/non-malicious/sample_37_71.ps1
sample_37_71.ps1
# # Module manifest for module 'OCI.PSModules.Mysql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Mysql.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ad8c5447-7619-4d20-8318-cfb7688ec98d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Mysql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mysql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIMysqlHeatWaveCluster', 'Get-OCIMysqlBackup', 'Get-OCIMysqlBackupsList', 'Get-OCIMysqlChannel', 'Get-OCIMysqlChannelsList', 'Get-OCIMysqlConfiguration', 'Get-OCIMysqlConfigurationsList', 'Get-OCIMysqlDbSystem', 'Get-OCIMysqlDbSystemsList', 'Get-OCIMysqlHeatWaveCluster', 'Get-OCIMysqlHeatWaveClusterMemoryEstimate', 'Get-OCIMysqlReplica', 'Get-OCIMysqlReplicasList', 'Get-OCIMysqlShapesList', 'Get-OCIMysqlVersionsList', 'Get-OCIMysqlWorkRequest', 'Get-OCIMysqlWorkRequestErrorsList', 'Get-OCIMysqlWorkRequestLogsList', 'Get-OCIMysqlWorkRequestsList', 'Invoke-OCIMysqlResumeChannel', 'Move-OCIMysqlBackupCompartment', 'New-OCIMysqlBackup', 'New-OCIMysqlChannel', 'New-OCIMysqlConfiguration', 'New-OCIMysqlDbSystem', 'New-OCIMysqlHeatWaveClusterMemoryEstimate', 'New-OCIMysqlReplica', 'Remove-OCIMysqlBackup', 'Remove-OCIMysqlChannel', 'Remove-OCIMysqlConfiguration', 'Remove-OCIMysqlDbSystem', 'Remove-OCIMysqlHeatWaveCluster', 'Remove-OCIMysqlReplica', 'Reset-OCIMysqlChannel', 'Restart-OCIMysqlDbSystem', 'Restart-OCIMysqlHeatWaveCluster', 'Start-OCIMysqlDbSystem', 'Start-OCIMysqlHeatWaveCluster', 'Stop-OCIMysqlDbSystem', 'Stop-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlBackup', 'Update-OCIMysqlChannel', 'Update-OCIMysqlConfiguration', 'Update-OCIMysqlDbSystem', 'Update-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlReplica' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mysql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_25_14.ps1
sample_25_14.ps1
ConvertFrom-StringData -StringData @' AdapterNotFound = 找不到指定适配器:{0} InvalidParams = 无效的参数集。请参阅 cmdlet 帮助以查看有效的参数集。 InvalidParamsAdapterAndName = 您无法指定名称和适配器参数。 InvalidParamsConfigAndModule = 您无法指定 Module 和 Configuration 参数。 InvalidModule = {0}:{1} 不是有效的模块名称。请使用以下命令查看有效模块 "Get-IntelEthernetLogConfig -Name "{0}"" InvalidSetting = {0}:{1} 不是有效的设置名称。请使用以下命令查看有效设置:"Get-IntelEthernetSetting -Name "{0}"" InvalidObject = {0} : 不是有效对象。请参阅 cmdlet 帮助,查看有效对象类型。 InvalidSettingValueGeneric = 此设置不能修改,因为指定的值对此设备或设置无效。 InvalidParamsAdapterOrName = 您必须指定名称或适配器参数。 InvalidParamsConfigOrModule = 您必须指定 Module 或 Configuration 参数。 InvalidLevel = {0}:{1} 不是有效的级别名称。请使用以下命令查看每个模块的有效级别 "Get-IntelEthernetLogConfig -Name "{0}" -Module "{2}" | fl" InvalidLevelWildcard = 级别必须与一个日志级别匹配,但通配符字符串可以匹配超过一个。 InvalidDriverLevel = 您只能将驱动程序模块的“级别”设置为“标准”或“详细”。 InvalidSubModule = {0}:{1} 不是有效的子模块值。请阅读此 cmdlet 的完整帮助,以查看支持的子模块值列表。 InvalidCluster = {0} : {1} 不是有效的集群名称。请查阅此 cmdlet 的完整帮助来查看支持的 -Cluster 名称。 FailedToReadCluster = 读取集群 {0} 错误。 LogmanRunning = 记录已运行 {0}。 LogmanFileExists = 文件已存在 {0}。请指定 -Force 覆盖文件或 -Append 添加到已有文件,或选择不同的文件名。 PathIncorrect = 指定的路径不存在或您没有访问它的权限。请指定有效的路径。 NoLogsStarted = 没有开始 {0} 的日志。 OperationFailed = {0}:此设备上 {1} 操作失败。请重试。 NoCmdletSupport = {0}:此设备不支持此 cmdlet 或没有支持它的驱动程序。 NoConfigurationSupport = {0}:此设备不支持 Configuration 参数。 FolderFileNameExits = 已有文件夹的名称与您指定的文件名相同。请指定其它名称。 InvalidConfigurationName = {0}:{1} 不是有效的配置名称。请查阅此 cmdlet 的完整帮助来查看支持的 -Configuration 名称。 GenericFailure = {0}:此设备上 {2} 的 {1} 操作失败。请重试。 NotSupported = 不支持 NotAvailable = 不可用 Unknown = 未知 MiniHelpNotFound = 无法找到该设置的帮助内容。 IdentifyPortDisabledOrLowPower = 无法执行此命令,因为该设备已被禁用,或者处于低功耗状态。 InvalidSettingValue = {0}: {1} 不是 {2} 的有效值。请使用以下命令确定有效值:"Get-IntelEthernetSetting -Name "{0}" -RegistryKeyword "{2}" | fl" WritingDebugDump = 写入调试转储 RegisterCountersSuccess = {0}:已成功注册计数器组。 RegisterCountersFailure = {0}:注册计数器组失败。 UnregisterCountersSuccess = {0}:已成功注销计数器组。 UnregisterCountersFailure = {0}:注销计数器组失败。 InvalidSystemConfigFailure = 此 cmdlet 不支持当前系统配置。 ProfileXmlError = 从 PerformanceProfiles.xml 获取配置文件设置失败。请下载最新安装包,然后重试。 NoProfileSupport = {0}: 当前环境不支持指定的配置文件。请参阅 cmdlet 帮助。 TestSuccess = {0}:已成功运行测试。 TestFailure = {0}:运行测试失败。 TestResultPass = 通过 TestResultFail = 失败 AdapterStartFail = {0}:启动设备失败。 NotStarted = 未开始 InProgress = 正在进行 Done = 完成 MultiplePeers = 多个对等点 Backplane = 背板 QSFP = QSFP QSFPDirectAttach = QSFP+ 直接连接 SFP = SFP SFPDirectAttach = SFP+ 直接连接 SFP28DirectAttach = SFP28 直接连接 Copper = 铜质 CX4Copper = CX4 铜质 CopperT = 铜质-T CopperTX = 铜质-TX SGMII = SGMII Fiber = 光纤 SRFiber = SR 光纤 LRFiber = LR 光纤 KXBackplane = KX/KX4 背板 XAUI = XAUI AOCACC = AOC/ACC BackplaneKR = 背板-KR BackplaneKR1 = 背板-KR1 BackplaneKR2 = 背板-KR2 BackplaneKR2PAM4 = 背板-KR2-PAM4 BackplaneKR4 = 背板-KR4 BackplaneKR4PAM4 = 背板-KR4-PAM4 BackplaneKRPAM4 = 背板-KR-PAM4 BackplaneKRS = 背板-KR-S BackplaneKX = 背板-KX ChiptoChip = 芯片到芯片 DirectAttach = 直接连接 DirectAttachCP2 = 直接连接-CP2 DirectAttachCR = 直接连接-CR DirectAttachCR1 = 直接连接-CR1 DirectAttachCR2 = 直接连接-CR2 DirectAttachCR4 = 直接连接-CR4 DirectAttachCRPAM4 = 直接连接-CR-PAM4 DirectAttachCRS = 直接连接-CR-S FiberDR = 光纤-DR FiberFR = 光纤-FR FiberLR = 光纤-LR FiberLR4 = 光纤-LR4 FiberLX = 光纤-LX FiberSR = 光纤-SR FiberSR2 = 光纤-SR2 FiberSR4 = 光纤-SR4 FiberSX = 光纤-SX FiberX = 光纤-X FullDuplex = 全双工 NotNegotiated = 未协商 Disabled = 禁用 Active = 活动 LinkUp = 链接畅通 LinkUpNotMax = 链接 - 此设备未以其能实现的最大速度链接 LinkDown = 链路断开 NotPresent = 不存在 NegLaneSpeed25 = 2.5 GT/秒 NegLaneSpeed50 = 5.0 GT/秒 NegLaneSpeed80 = 8.0 GT/秒 ISA = ISA EISA = EISA PCMCIA = PCMCIA CardBus = CardBus PCI = PCI PCIX = PCI-X PCIExpress = PCI Express IOSF = IOSF Normal = 正常 OverheatedStopped = 过热,适配器被停止 OverheatedReduced = 过热,链接速度减慢 PortA = A PortB = B PortC = C PortD = D Profile = 配置文件 CustomSettings = 自定义设置 StandardServer = Standard Server WebServer = Web Server StorageServer = Storage Server VirtServer = Virtualization Server (Hyper-V*) LowLatency = Low Latency StorageVirt = Storage + Virtualization Register = 注册 EEPROM = EEPROM MacLoopback = MAC 循环 Interrupt = 中断 FIFO = FIFO RunningTests = 正在运行测试...可能需要几分钟时间。请勿中断。 TestProgress = 正在运行测试第 {0} 部分,共 {1} 部分 - {2} '@
combined_dataset/train/non-malicious/_1.168.1.1.ps1
_1.168.1.1.ps1
function Set-IPAddress { param( [string]$networkinterface =$(read-host "Enter the name of the NIC (ie Local Area Connection)"), [string]$ip = $(read-host "Enter an IP Address (ie 10.10.10.10)"), [string]$mask = $(read-host "Enter the subnet mask (ie 255.255.255.0)"), [string]$gateway = $(read-host "Enter the current name of the NIC you want to rename"), [string]$dns1 = $(read-host "Enter the first DNS Server (ie 10.2.0.28)"), [string]$dns2, [string]$registerDns = "TRUE" ) $dns = $dns1 if($dns2){$dns ="$dns1,$dns2"} $index = (gwmi Win32_NetworkAdapter | where {$_.netconnectionid -eq $networkinterface}).InterfaceIndex $NetInterface = Get-WmiObject Win32_NetworkAdapterConfiguration | where {$_.InterfaceIndex -eq $index} $NetInterface.EnableStatic($ip, $subnetmask) $NetInterface.SetGateways($gateway) $NetInterface.SetDNSServerSearchOrder($dns) $NetInterface.SetDynamicDNSRegistration($registerDns) }
combined_dataset/train/non-malicious/sample_37_81.ps1
sample_37_81.ps1
@{ GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" NestedModules="Microsoft.PowerShell.Commands.Management.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' FunctionsToExport = @() AliasesToExport = @("gcb", "gtz", "scb") CmdletsToExport=@("Add-Content", "Clear-Content", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-ChildItem", "Get-Clipboard", "Set-Clipboard", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Test-Connection", "Remove-ItemProperty", "Rename-ItemProperty", "Resolve-Path", "Set-Content", "Set-ItemProperty", "Get-TimeZone", "Stop-Computer", "Restart-Computer") } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC7VSKADi66xWJM # 6HEA1fH30eG2InNZKlDJZkesFZvWeqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5sRkkqFV4tm2L8Ww9Nazk # vwEuj6sw3rJoUClckmtaMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASw9qPBr2D26c4DJUtEgR1sKtpXKZoemG32esSLn4w3MduZQq0+6+T9xw # VErPr8+5fxrk4TSYNMEaOVNHNZ4DG2PbXpKoZvxTG8ohL/gZxPKzaa7wCMswzCXH # bURyCt+ndFxHrpVQL2Mj1nTf0eyCIzcta7/Y/Nz4gkvC88t8SfTbTqt4e0CqbGuw # R5vkBVdKTVJ6ufdCBCr5IP31ggm6NxcJVBB0xvMK5HZmY2Uw4KSSaL2ATExO/dpe # 9+28PKGF5UMjMpFA2OBL6w2Q9yG6XaxWEgdTqlDtplOpkeROOcZ/FHpmatbhUWBE # 6yGSzrMO83nn2TDas9ByOueXZIyMzKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAA0Xk9ogon3tGAm/+JwVPrmpcx7kI3uReVzIdjAxqClQIGZfxw4esg # GBMyMDI0MDQwOTIzMDkxOS4zMjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOm/UNswIhgPMjAyNDA0MDkxMzMwMDNaGA8yMDI0MDQxMDEzMzAwM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6b9Q2wIBADAHAgEAAgIafjAHAgEAAgIRMzAKAgUA # 6cCiWwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAF1TLo09RllJVBPdJAmY # hDxMj4u4iKFfvBfxZ5CdZ0cZT2ecwVvGjvsitRLgMp24VNJjfO0krTY2lI5tIGv9 # 5MgYhVcaaSiQ3zq7UZfYXNKkHbFk/zmz3ds/Tb1uKnxjFxxyOMsKsC2rwCXgTIYp # crItCpqbnJClYmSe6q/zgV6bMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg7C61CMM3eBvuTubgeGVcCQjzpNVvJ/8eRiiet/KMCzIwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIGp7S/NCvSBFp5jvm90RMPGYMAgx20Oc3b9Hsk0n2AWM # MA0GCSqGSIb3DQEBCwUABIICAGJVc5OirAoizuLVrA731Te3fhPexJ2MGQgIizsA # XhuynJp4BwkhL3pjIxLaOLTBwFIrHzTL6CBvkWXhyKr4d3CUElC1CfLwsUN3MjA/ # wXK3/TYwlElODIym98si/z45TXhK6ExJ5/k5TwfIEi8wX1DeQ0nj7AnFZRgCKcS1 # C5rStZxsC33sbXOdIGlHskbCgfLj/Db5nFPHCJk7F/SDBYoOEPzEvwgwYCRGF3Ah # TSyKaeJK3LNAMUlwU+Pu3ZJk8C5OmvYPmBwpgtHkvvR2fw42uINw27sFs8zSDVJ9 # /4VtFsveL3PsS7w11hpczjD4HzqpxQRVmePBko2q8BvjlLRhdPbR0GC6bo60SY2M # r/vfY2zicsIuxHrD2yBlF8+7PQyEBTljTHJK2SkoRoUwFBfhu3vWRZMkWNRJlGrp # 3/S9E3681zaigjmtP3E9E6Y/P9jp5jXYaUUsLeygx5CpDB/wUiZ1szHPcb7R746N # 5AZdKNpD4Z27f8V/t7RkDbsUbbyzaHzJC48Q5dU9ev/UAqvyLUwOsv/K1cag+OTE # w3owb5218TeZADkK84KzvZDBGK8NQwp/hq5V7VcQWoEsHM+WOHLUTJT1Q3bQLtWn # BKBFfUO145lwAmjQoX9KGAlNIj1JKIVawf+vkyeL7x34njpA8rLdjgMN5pkdDEI9 # Wmnz # SIG # End signature block
combined_dataset/train/non-malicious/sample_31_52.ps1
sample_31_52.ps1
#!powershell # Copyright: (c) 2018, Wojciech Sciesinski <wojciech[at]sciesinski[dot]net> # Copyright: (c) 2017, Daniele Lazzari <lazzari@mailup.com> # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) #Requires -Module Ansible.ModuleUtils.Legacy # win_psmodule (Windows PowerShell modules Additions/Removals/Updates) $params = Parse-Args -arguments $args -supports_check_mode $true $check_mode = Get-AnsibleParam -obj $params -name "_ansible_check_mode" -type "bool" -default $false $name = Get-AnsibleParam -obj $params -name "name" -type "str" -failifempty $true $required_version = Get-AnsibleParam -obj $params -name "required_version" -type "str" $minimum_version = Get-AnsibleParam -obj $params -name "minimum_version" -type "str" $maximum_version = Get-AnsibleParam -obj $params -name "maximum_version" -type "str" $repo = Get-AnsibleParam -obj $params -name "repository" -type "str" $repo_user = Get-AnsibleParam -obj $params -name "username" -type "str" $repo_pass = Get-AnsibleParam -obj $params -name "password" -type "str" $state = Get-AnsibleParam -obj $params -name "state" -type "str" -default "present" -validateset "present", "absent", "latest" $allow_clobber = Get-AnsibleParam -obj $params -name "allow_clobber" -type "bool" -default $false $skip_publisher_check = Get-AnsibleParam -obj $params -name "skip_publisher_check" -type "bool" -default $false $allow_prerelease = Get-AnsibleParam -obj $params -name "allow_prerelease" -type "bool" -default $false $accept_license = Get-AnsibleParam -obj $params -name "accept_license" -type "bool" -default $false $force = Get-AnsibleParam -obj $params -name "force" -type "bool" -default $false $result = @{changed = $false output = "" nuget_changed = $false repository_changed = $false } # Enable TLS1.1/TLS1.2 if they're available but disabled (eg. .NET 4.5) $security_protocols = [System.Net.ServicePointManager]::SecurityProtocol -bor [System.Net.SecurityProtocolType]::SystemDefault if ([System.Net.SecurityProtocolType].GetMember("Tls11").Count -gt 0) { $security_protocols = $security_protocols -bor [System.Net.SecurityProtocolType]::Tls11 } if ([System.Net.SecurityProtocolType].GetMember("Tls12").Count -gt 0) { $security_protocols = $security_protocols -bor [System.Net.SecurityProtocolType]::Tls12 } [System.Net.ServicePointManager]::SecurityProtocol = $security_protocols Function Install-NugetProvider { Param( [Bool]$CheckMode ) $PackageProvider = Get-PackageProvider -ListAvailable | Where-Object { ($_.name -eq 'Nuget') -and ($_.version -ge "2.8.5.201") } if (-not($PackageProvider)) { try { Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force -WhatIf:$CheckMode | Out-Null $result.changed = $true $result.nuget_changed = $true } catch [ System.Exception ] { $ErrorMessage = "Problems adding package provider: $($_.Exception.Message)" Fail-Json $result $ErrorMessage } } } Function Install-PrereqModule { Param( [Switch]$TestInstallationOnly, [bool]$AllowClobber, [Bool]$CheckMode, [bool]$AcceptLicense, [string]$Repository ) # Those are minimum required versions of modules. $PrereqModules = @{ PackageManagement = '1.1.7' PowerShellGet = '1.6.0' } $ExistingPrereqModule = Get-Module -Name @($PrereqModules.Keys) -ListAvailable | Where-Object { $_.Version -ge $PreReqModules[$_.Name] } | Select-Object -ExpandProperty Name -Unique $toInstall = $PrereqModules.Keys | Where-Object { $_ -notin $ExistingPrereqModule } | Select-Object @{N = 'Name'; E = { $_ } }, @{N = 'Version'; E = { $PrereqModules[$_] } } if ($TestInstallationOnly) { -not [bool]$toInstall } elseif ($toInstall) { $result.changed = $true if ($CheckMode) { $result.output = "Skipped check mode run on win_psmodule as the pre-reqs need upgrading" Exit-Json $result } # Need to run this in another process as importing PackageManagement at # the older version is irreversible (you cannot load the same dll at # different versions). Start-Job runs in a new process so it can safely # use the older version to install our pre-reqs. # https://github.com/ansible-collections/community.windows/issues/487 $job = Start-Job -ScriptBlock { $ErrorActionPreference = 'Stop' $Repository = $using:Repository foreach ($info in $using:ToInstall) { $install_params = @{ Name = $info.Name MinimumVersion = $info.Version Force = $true } $installCmd = Get-Command -Name Install-Module if ($installCmd.Parameters.ContainsKey('SkipPublisherCheck')) { $install_params.SkipPublisherCheck = $true } if ($installCmd.Parameters.ContainsKey('AllowClobber')) { $install_params.AllowClobber = $using:AllowClobber } if ($installCmd.Parameters.ContainsKey('AcceptLicense')) { $install_params.AcceptLicense = $using:AcceptLicense } if ($Repository) { $install_params.Repository = $Repository } Install-Module @install_params > $null } } try { $null = $job | Receive-Job -AutoRemoveJob -Wait -ErrorAction Stop } catch { $ErrorMessage = "Problems adding a prerequisite module PackageManagement or PowerShellGet: $($_.Exception.Message)" $result.exception = ($_ | Out-String) + "`r`n" + $_.ScriptStackTrace Fail-Json $result $ErrorMessage } } } Function Get-PsModule { Param( [Parameter(Mandatory = $true)] [String]$Name, [String]$RequiredVersion, [String]$MinimumVersion, [String]$MaximumVersion ) $ExistingModule = @{ Exists = $false Version = "" } $ExistingModules = Get-Module -ListAvailable | Where-Object { ($_.name -eq $Name) } $ExistingModulesCount = $($ExistingModules | Measure-Object).Count if ( $ExistingModulesCount -gt 0 ) { $ExistingModules | Add-Member -MemberType ScriptProperty -Name FullVersion -Value { if ( $null -ne ( $this.PrivateData ) ) { [String]"$($this.Version)-$(($this | Select-Object -ExpandProperty PrivateData).PSData.Prerelease)".TrimEnd('-') } else { [String]"$($this.Version)" } } if ( -not ($RequiredVersion -or $MinimumVersion -or $MaximumVersion) ) { $ReturnedModule = $ExistingModules | Select-Object -First 1 } elseif ( $RequiredVersion ) { $ReturnedModule = $ExistingModules | Where-Object -FilterScript { $_.FullVersion -eq $RequiredVersion } } elseif ( $MinimumVersion -and $MaximumVersion ) { $ReturnedModule = $ExistingModules | Where-Object -FilterScript { $MinimumVersion -le $_.Version -and $MaximumVersion -ge $_.Version } | Select-Object -First 1 } elseif ( $MinimumVersion ) { $ReturnedModule = $ExistingModules | Where-Object -FilterScript { $MinimumVersion -le $_.Version } | Select-Object -First 1 } elseif ( $MaximumVersion ) { $ReturnedModule = $ExistingModules | Where-Object -FilterScript { $MaximumVersion -ge $_.Version } | Select-Object -First 1 } } $ReturnedModuleCount = ($ReturnedModule | Measure-Object).Count if ( $ReturnedModuleCount -eq 1 ) { $ExistingModule.Exists = $true $ExistingModule.Version = $ReturnedModule.FullVersion } $ExistingModule } Function Add-DefinedParameter { Param ( [Parameter(Mandatory = $true)] [Hashtable]$Hashtable, [Parameter(Mandatory = $true)] [String[]]$ParametersNames ) ForEach ($ParameterName in $ParametersNames) { $ParameterVariable = Get-Variable -Name $ParameterName -ErrorAction SilentlyContinue if ( $ParameterVariable.Value -and $Hashtable.Keys -notcontains $ParameterName ) { $Hashtable.Add($ParameterName, $ParameterVariable.Value) } } $Hashtable } Function Install-PsModule { Param( [Parameter(Mandatory = $true)] [String]$Name, [String]$RequiredVersion, [String]$MinimumVersion, [String]$MaximumVersion, [String]$Repository, [System.Management.Automation.PSCredential]$Credential = [System.Management.Automation.PSCredential]::Empty, [Bool]$AllowClobber, [Bool]$SkipPublisherCheck, [Bool]$AllowPrerelease, [Bool]$CheckMode, [Bool]$AcceptLicense, [Bool]$Force ) $getParams = @{ Name = $Name RequiredVersion = $RequiredVersion MinimumVersion = $MinimumVersion MaximumVersion = $MaximumVersion } $ExistingModuleBefore = Get-PsModule @getParams if ( -not $ExistingModuleBefore.Exists ) { try { # Install NuGet provider if needed. Install-NugetProvider -CheckMode $CheckMode $ht = @{ Name = $Name } [String[]]$ParametersNames = @("RequiredVersion", "MinimumVersion", "MaximumVersion", "AllowPrerelease", "Repository", "Credential") $ht = Add-DefinedParameter -Hashtable $ht -ParametersNames $ParametersNames # When module require License Acceptance, or repository is Untrusted. # `-Force` is mandatory to skip interactive prompt $psgetModuleInfo = Find-Module @ht if (($psgetModuleInfo.AdditionalMetadata.requireLicenseAcceptance -eq "True") -or ((Get-PSRepository -Name $psgetModuleInfo.Repository).InstallationPolicy -eq "Untrusted")) { $ht["Force"] = $true } else { $ht["Force"] = $Force } $ht = $ht + @{ WhatIf = $CheckMode AcceptLicense = $AcceptLicense } [String[]]$ParametersNames = @("AllowClobber", "SkipPublisherCheck") $ht = Add-DefinedParameter -Hashtable $ht -ParametersNames $ParametersNames Install-Module @ht -ErrorVariable ErrorDetails | Out-Null $result.changed = $true $result.output = "Module $($Name) installed" } catch [ System.Exception ] { $ErrorMessage = "Problems installing $($Name) module: $($_.Exception.Message)" Fail-Json $result $ErrorMessage } } else { $result.output = "Module $($Name) already present" } } Function Remove-PsModule { Param( [Parameter(Mandatory = $true)] [String]$Name, [String]$RequiredVersion, [String]$MinimumVersion, [String]$MaximumVersion, [Bool]$CheckMode ) # If module is present, uninstalls it. if (Get-Module -ListAvailable | Where-Object { $_.name -eq $Name }) { try { $ht = @{ Name = $Name Confirm = $false Force = $true } $ExistingModuleBefore = Get-PsModule -Name $Name -RequiredVersion $RequiredVersion -MinimumVersion $MinimumVersion -MaximumVersion $MaximumVersion [String[]]$ParametersNames = @("RequiredVersion", "MinimumVersion", "MaximumVersion") $ht = Add-DefinedParameter -Hashtable $ht -ParametersNames $ParametersNames if ( -not ( $RequiredVersion -or $MinimumVersion -or $MaximumVersion ) ) { $ht.Add("AllVersions", $true) } if ( $ExistingModuleBefore.Exists) { # The Force parameter overwrite the WhatIf parameter if ( -not $CheckMode ) { Uninstall-Module @ht -ErrorVariable ErrorDetails | Out-Null } $result.changed = $true $result.output = "Module $($Name) removed" } } catch [ System.Exception ] { $ErrorMessage = "Problems uninstalling $($Name) module: $($_.Exception.Message)" Fail-Json $result $ErrorMessage } } else { $result.output = "Module $($Name) removed" } } Function Find-LatestPsModule { Param( [Parameter(Mandatory = $true)] [String]$Name, [String]$Repository, [System.Management.Automation.PSCredential]$Credential = [System.Management.Automation.PSCredential]::Empty, [Bool]$AllowPrerelease, [Bool]$CheckMode ) try { $ht = @{ Name = $Name } [String[]]$ParametersNames = @("AllowPrerelease", "Repository", "Credential") $ht = Add-DefinedParameter -Hashtable $ht -ParametersNames $ParametersNames $LatestModule = Find-Module @ht $LatestModuleVersion = $LatestModule.Version } catch [ System.Exception ] { $ErrorMessage = "Cant find the module $($Name): $($_.Exception.Message)" Fail-Json $result $ErrorMessage } $LatestModuleVersion } # Check PowerShell version, fail if < 5.0 and required modules are not installed $PsVersion = $PSVersionTable.PSVersion if ($PsVersion.Major -lt 5 ) { $PrereqModulesInstalled = Install-PrereqModule -TestInstallationOnly if ( -not $PrereqModulesInstalled ) { $ErrorMessage = -join @( "Modules PowerShellGet and PackageManagement in versions 1.6.0 and 1.1.7 respectively " "have to be installed before using the win_psmodule." ) Fail-Json $result $ErrorMessage } } if ( $required_version -and ( $minimum_version -or $maximum_version ) ) { $ErrorMessage = "Parameters required_version and minimum/maximum_version are mutually exclusive." Fail-Json $result $ErrorMessage } if ( $allow_prerelease -and ( $minimum_version -or $maximum_version ) ) { $ErrorMessage = "Parameters minimum_version, maximum_version can't be used with the parameter allow_prerelease." Fail-Json $result $ErrorMessage } if ( $allow_prerelease -and $state -eq "absent" ) { $ErrorMessage = "The parameter allow_prerelease can't be used with state set to 'absent'." Fail-Json $result $ErrorMessage } if ( ($state -eq "latest") -and ( $required_version -or $minimum_version -or $maximum_version ) ) { $ErrorMessage = "When the parameter state is equal to 'latest' you can't use any of required_version, minimum_version, maximum_version." Fail-Json $result $ErrorMessage } if ( $repo ) { $RepositoryExists = Get-PSRepository -Name $repo -ErrorAction SilentlyContinue if ( $null -eq $RepositoryExists) { $ErrorMessage = "The repository $repo doesn't exist." Fail-Json $result $ErrorMessage } } if ($repo_user -and $repo_pass ) { $repo_credential = New-Object -TypeName PSCredential ($repo_user, ($repo_pass | ConvertTo-SecureString -AsPlainText -Force)) } if ( ($allow_clobber -or $allow_prerelease -or $skip_publisher_check -or $required_version -or $minimum_version -or $maximum_version -or $accept_license) ) { # Update the PowerShellGet and PackageManagement modules. # It's required to support AllowClobber, AllowPrerelease parameters. # This must occur before PackageManagement or PowerShellGet is imported in # the current process. Install-PrereqModule -AllowClobber $allow_clobber -CheckMode $check_mode -AcceptLicense $accept_license -Repository $repo } Import-Module -Name PackageManagement, PowerShellGet -Force if ($state -eq "present") { if ($name) { $ht = @{ Name = $name RequiredVersion = $required_version MinimumVersion = $minimum_version MaximumVersion = $maximum_version Repository = $repo AllowClobber = $allow_clobber SkipPublisherCheck = $skip_publisher_check AllowPrerelease = $allow_prerelease CheckMode = $check_mode Credential = $repo_credential AcceptLicense = $accept_license Force = $force } Install-PsModule @ht } } elseif ($state -eq "absent") { if ($name) { $ht = @{ Name = $Name CheckMode = $check_mode RequiredVersion = $required_version MinimumVersion = $minimum_version MaximumVersion = $maximum_version } Remove-PsModule @ht } } elseif ( $state -eq "latest") { $ht = @{ Name = $Name AllowPrerelease = $allow_prerelease Repository = $repo CheckMode = $check_mode Credential = $repo_credential } $LatestVersion = Find-LatestPsModule @ht $ExistingModule = Get-PsModule $Name if ( ($LatestVersion.Version -ne $ExistingModule.Version) -or $force ) { $ht = @{ Name = $Name RequiredVersion = $LatestVersion Repository = $repo AllowClobber = $allow_clobber SkipPublisherCheck = $skip_publisher_check AllowPrerelease = $allow_prerelease CheckMode = $check_mode Credential = $repo_credential AcceptLicense = $accept_license Force = $force } Install-PsModule @ht } } Exit-Json $result
combined_dataset/train/non-malicious/1840.ps1
1840.ps1
Describe "CredSSP cmdlet tests" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $powershell = Join-Path $PSHOME "pwsh" $notEnglish = $false $IsToBeSkipped = !$IsWindows; $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() if ( $IsToBeSkipped ) { $PSDefaultParameterValues["it:skip"] = $true } else { if ([System.Globalization.CultureInfo]::CurrentCulture.Name -ne "en-US") { $notEnglish = $true } } } AfterAll { $global:PSDefaultParameterValues = $originalDefaultParameterValues } BeforeEach { if ( ! $IsToBeSkipped ) { $errtxt = "$testdrive/error.txt" Remove-Item $errtxt -Force -ErrorAction SilentlyContinue $donefile = "$testdrive/done" Remove-Item $donefile -Force -ErrorAction SilentlyContinue } } It "Error returned if invalid parameters: <description>" -TestCases @( @{params=@{Role="Client"};Description="Client role, no DelegateComputer"}, @{params=@{Role="Server";DelegateComputer="."};Description="Server role w/ DelegateComputer"} ) { param ($params) { Enable-WSManCredSSP @params } | Should -Throw -ErrorId "System.InvalidOperationException,Microsoft.WSMan.Management.EnableWSManCredSSPCommand" } It "Enable-WSManCredSSP works: <description>" -Skip:($NotEnglish -or $IsToBeSkipped) -TestCases @( @{params=@{Role="Client";DelegateComputer="*"};description="client"}, @{params=@{Role="Server"};description="server"} ) { param ($params) $c = Enable-WSManCredSSP @params -Force $c.CredSSP | Should -Be $true $c = Get-WSManCredSSP if ($params.Role -eq "Client") { $c[0] | Should -Match "The machine is configured to allow delegating fresh credentials to the following target\(s\):wsman/\*" } else { $c[1] | Should -Match "This computer is configured to receive credentials from a remote client computer" } } It "Disable-WSManCredSSP works: <role>" -Skip:($NotEnglish -or $IsToBeSkipped) -TestCases @( @{Role="Client"}, @{Role="Server"} ) { param ($role) Disable-WSManCredSSP -Role $role | Should -BeNullOrEmpty $c = Get-WSManCredSSP if ($role -eq "Client") { $c[0] | Should -Match "The machine is not configured to allow delegating fresh credentials." } else { $c[1] | Should -Match "This computer is not configured to receive credentials from a remote client computer" } } It "Call cmdlet as API" { $credssp = [Microsoft.WSMan.Management.EnableWSManCredSSPCommand]::new() $credssp.Role = "Client" $credssp.Role | Should -BeExactly "Client" $credssp.DelegateComputer = "foo", "bar" $credssp.DelegateComputer -join ',' | Should -Be "foo,bar" $credssp.Force = $true $credssp.Force | Should -Be $true $credssp = [Microsoft.WSMan.Management.DisableWSManCredSSPCommand]::new() $credssp.Role = "Server" $credssp.Role | Should -BeExactly "Server" } } Describe "CredSSP cmdlet error cases tests" -Tags 'Feature' { It "Error returned if runas non-admin: <cmdline>" -Skip:(!$IsWindows) -TestCases @( @{cmdline = "Enable-WSManCredSSP -Role Server -Force"; cmd = "EnableWSManCredSSPCommand"}, @{cmdline = "Disable-WSManCredSSP -Role Server"; cmd = "DisableWSManCredSSPCommand"}, @{cmdline = "Get-WSManCredSSP"; cmd = "GetWSmanCredSSPCommand"} ) { param ($cmdline, $cmd) $scriptBlock = [scriptblock]::Create($cmdline) $scriptBlock | should -Throw -ErrorId "System.InvalidOperationException,Microsoft.WSMan.Management.$cmd" } }
combined_dataset/train/non-malicious/SyntaxHighlighter Brush_2.ps1
SyntaxHighlighter Brush_2.ps1
/** * PowerShell 2.0 Brush for highlighter 2.0 * * SyntaxHighlighter http://alexgorbatchev.com/wiki/SyntaxHighlighter * * @version * 2.1.0 (April 07 2009) * * @copyright * Copyright (C) 2008-2009 Joel Bennett http://HuddledMasses.org/ * * @license * This file is for SyntaxHighlighter. * * SyntaxHighlighter is free software: you can redistribute it and/or modify * it under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation, either version 2 of the License, or * (at your option) any later version. * * SyntaxHighlighter is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with SyntaxHighlighter. If not, see <http://www.gnu.org/licenses/>. */ SyntaxHighlighter.brushes.PowerShell = function() { var keywords ='while validateset validaterange validatepattern validatelength validatecount ' + 'until trap switch return ref process param parameter in if global: '+ 'function foreach for finally filter end elseif else dynamicparam do default ' + 'continue cmdletbinding break begin alias \\\\? % #script #private #local #global '+ 'mandatory parametersetname position valuefrompipeline ' + 'valuefrompipelinebypropertyname valuefromremainingarguments helpmessage '; var operators ='and as band bnot bor bxor casesensitive ccontains ceq cge cgt cle ' + 'clike clt cmatch cne cnotcontains cnotlike cnotmatch contains ' + 'creplace eq exact f file ge gt icontains ieq ige igt ile ilike ilt ' + 'imatch ine inotcontains inotlike inotmatch ireplace is isnot le like ' + 'lt match ne not notcontains notlike notmatch or regex replace wildcard'; var verbs = 'write where wait use update unregister undo trace test tee take suspend ' + 'stop start split sort skip show set send select scroll resume restore ' + 'restart resolve resize reset rename remove register receive read push ' + 'pop ping out new move measure limit join invoke import group get format ' + 'foreach export expand exit enter enable disconnect disable debug cxnew ' + 'copy convertto convertfrom convert connect complete compare clear ' + 'checkpoint aggregate add'; this.regexList = [ { regex: SyntaxHighlighter.regexLib.singleLinePerlComments, css: 'comments' }, // one line comments { regex: new RegExp('@"\\\\n[\\\\s\\\\S]*?\\\\n"@', 'gm'), css: 'string' }, // double quoted here-strings { regex: new RegExp("@'\\\\n[\\\\s\\\\S]*?\\\\n'@", 'gm'), css: 'string' }, // single quoted here-strings { regex: new RegExp('"(?:\\\\$\\\\([^\\\\)]*\\\\)|[^"]|`"|"")*[^`]"','g'), css: 'string' }, // double quoted strings { regex: new RegExp("'(?:[^']|'')*'", 'g'), css: 'string' }, // single quoted strings { regex: new RegExp('[\\\\$|@|@@](?:(?:global|script|private|env):)?[A-Z0-9_]+', 'gi'), css: 'variable' }, // $variables { regex: new RegExp('(?:'+verbs.replace(/ /g, '\\\\b|\\\\b')+')-[a-zA-Z_][a-zA-Z0-9_]*', 'gmi'), css: 'functions' }, // functions and cmdlets { regex: new RegExp(this.getKeywords(keywords), 'gmi'), css: 'keyword' }, // keywords { regex: new RegExp(this.getKeywords(operators.replace(/ /g,' -')), 'gmi'), css: 'value bold' }, // operators { regex: new RegExp('\\\\s+-[a-zA-Z_][a-zA-Z0-9_]*', 'gmi'), css: 'color1' }, // parameters { regex: new RegExp('\\\\[[A-Z_\\\\[][A-Z0-9_. `,\\\\[\\\\]]*\\\\]', 'gi'), css: 'constants' } // .Net [Type]s ]; } SyntaxHighlighter.brushes.PowerShell.prototype = new SyntaxHighlighter.Highlighter(); SyntaxHighlighter.brushes.PowerShell.aliases = ['monad', 'msh', 'powershell', 'PowerShell', 'Powershell', 'posh'];
combined_dataset/train/non-malicious/Invoke-ElevatedCommand.p.ps1
Invoke-ElevatedCommand.p.ps1
##############################################################################\n##\n## Invoke-ElevatedCommand\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nRuns the provided script block under an elevated instance of PowerShell as\nthrough it were a member of a regular pipeline.\n\n.EXAMPLE\n\nPS >Get-Process | Invoke-ElevatedCommand.ps1 {\n $input | Where-Object { $_.Handles -gt 500 } } | Sort Handles\n\n#>\n\nparam(\n ## The script block to invoke elevated\n [Parameter(Mandatory = $true)]\n [ScriptBlock] $Scriptblock,\n\n ## Any input to give the elevated process\n [Parameter(ValueFromPipeline = $true)]\n $InputObject,\n\n ## Switch to enable the user profile\n [switch] $EnableProfile\n)\n\nbegin\n{\n Set-StrictMode -Version Latest\n $inputItems = New-Object System.Collections.ArrayList\n}\n\nprocess\n{\n $null = $inputItems.Add($inputObject)\n}\n\nend\n{\n ## Create some temporary files for streaming input and output\n $outputFile = [IO.Path]::GetTempFileName()\n $inputFile = [IO.Path]::GetTempFileName()\n\n ## Stream the input into the input file\n $inputItems.ToArray() | Export-CliXml -Depth 1 $inputFile\n\n ## Start creating the command line for the elevated PowerShell session\n $commandLine = ""\n if(-not $EnableProfile) { $commandLine += "-NoProfile " }\n\n ## Convert the command into an encoded command for PowerShell\n $commandString = "Set-Location '$($pwd.Path)'; " +\n "`$output = Import-CliXml '$inputFile' | " +\n "& {" + $scriptblock.ToString() + "} 2>&1; " +\n "Export-CliXml -Depth 1 -In `$output '$outputFile'"\n\n $commandBytes = [System.Text.Encoding]::Unicode.GetBytes($commandString)\n $encodedCommand = [Convert]::ToBase64String($commandBytes)\n $commandLine += "-EncodedCommand $encodedCommand"\n\n ## Start the new PowerShell process\n $process = Start-Process -FilePath (Get-Command powershell).Definition `\n -ArgumentList $commandLine -Verb RunAs `\n -WindowStyle Hidden `\n -Passthru\n $process.WaitForExit()\n\n ## Return the output to the user\n if((Get-Item $outputFile).Length -gt 0)\n {\n Import-CliXml $outputFile\n }\n\n ## Clean up\n Remove-Item $outputFile\n Remove-Item $inputFile\n}
combined_dataset/train/non-malicious/sample_66_59.ps1
sample_66_59.ps1
# # Module manifest for module 'OCI.PSModules.Servicecatalog' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Servicecatalog.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a52480f0-e7d7-4302-871e-ae7f3a42fc02' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Servicecatalog Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicecatalog.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIServicecatalog', 'Get-OCIServicecatalogApplicationsList', 'Get-OCIServicecatalogAssociation', 'Get-OCIServicecatalogAssociationsList', 'Get-OCIServicecatalogPrivateApplication', 'Get-OCIServicecatalogPrivateApplicationActionDownloadLogo', 'Get-OCIServicecatalogPrivateApplicationPackage', 'Get-OCIServicecatalogPrivateApplicationPackageActionDownloadConfig', 'Get-OCIServicecatalogPrivateApplicationPackagesList', 'Get-OCIServicecatalogPrivateApplicationsList', 'Get-OCIServicecatalogsList', 'Get-OCIServicecatalogWorkRequest', 'Get-OCIServicecatalogWorkRequestErrorsList', 'Get-OCIServicecatalogWorkRequestLogsList', 'Get-OCIServicecatalogWorkRequestsList', 'Invoke-OCIServicecatalogBulkReplaceServiceCatalogAssociations', 'Move-OCIServicecatalogCompartment', 'Move-OCIServicecatalogPrivateApplicationCompartment', 'New-OCIServicecatalog', 'New-OCIServicecatalogAssociation', 'New-OCIServicecatalogPrivateApplication', 'Remove-OCIServicecatalog', 'Remove-OCIServicecatalogAssociation', 'Remove-OCIServicecatalogPrivateApplication', 'Update-OCIServicecatalog', 'Update-OCIServicecatalogPrivateApplication' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicecatalog' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_52_70.ps1
sample_52_70.ps1
ConvertFrom-StringData @' FailoverClustersModuleRequired=A szükséges PowerShell-modul (FailoverClusters) nem található. A telepítéshez használja a Szerepkörök és szolgáltatások eszközt: Távoli kiszolgálófelügyelet eszközei | Szolgáltatásfelügyeleti eszközök | Feladatátvételi fürtszolgáltatás eszközei | Windows PowerShellhez készült Feladatátvevő fürt modul. '@ # SIG # Begin signature block # MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBkYDeREhmDjoCZ # vHLtyAGeyDOnXhq6VQN0KsUtbcqfwaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAeL # odDGZM7DI4T56SjEj4kX86bF0YG9TJlf3GtdDW4fMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAPy2q0zr4hqLU7NJJKAPcXsLgOW6s7I7ayNuE # SnOwOMDF+1OoDvvViBH5lPrvTrZRhCfwcH1VQvlwwqKRekje6K8WJCqILFJQg2Vo # HGa7E9o6doTnKha8EO3rdsPiAH4BsSwsRvfRlsiiyVA5aTwvCAglMut+lXemMyt9 # yiyGsloICj2vMXicy5jDguap452ADBG5wtHAlxuwDZPt8Myj/Qcm6SOvKE3XXBUn # WcjRzQpekhjV0mT4kGGgYxoWiEwmP93C1RI8wOwwln9gKAtGv1NuYDkHeOtD7GlX # IySl1IGlqA6yoD/2Hw1rtgwKudTMsGp17S8K5q6K/vQwFqceLqGCFygwghckBgor # BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC3pZu4aWjJUUHwhCQWRoD5pHzJqZ8bc2SL # A229A+xGTwIGZa6UAEQkGBMyMDI0MDEyMjIxMzE1Ny42NTRaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHj372b # mhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6k # DWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1N # EXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35 # fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/ # jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQB # P3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2Q # Vd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVs # bH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/c # Mmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIo # jl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ # 3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpb # udALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk1 # 93mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0 # sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlX # JAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiL # iHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ # 7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jms # CwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7es # DQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnq # zkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub # 0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy # 823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE # 7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOlZEnwwIhgPMjAyNDAxMjMwMDEyNDRaGA8yMDI0MDEy # NDAwMTI0NFowczA5BgorBgEEAYRZCgQBMSswKTAKAgUA6VkSfAIBADAGAgEAAgEM # MAcCAQACAhFgMAoCBQDpWmP8AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB # hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA # uFdz42Rko9M3ivrv/uG3QvBrIXgucD09zUgAh5KiQvvTyJhIM6Ky1mxQUGa0HyFw # HfBFnXeb4rzDjWWpQLXjdDMDU9SYh54v43gTXWsr6WQ3XDfxOY9cs749jpwQ4qiV # 39UMOpCiwLQZJk+vL3LlOd/6HO9LSfAvYUbiofCpaPUxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgABAAAB # 4zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBEREP6goX0IMoJzPzaATUmkNu7FtuypItTn/ZIep4v # 3zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9wha4 # MlxBt2Crw12PTHIy5iYqMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwIgQgFu6r6baMtOeWRTRsHtoLRxH0 # nvqB5p6LBtBECvyAHE4wDQYJKoZIhvcNAQELBQAEggIACDaHIWOJ0VAybUJl6xWc # +Noir4d95+Hm5zDyu1dfKdpk+Myt2flx/zZ/OFoTV+MQTkjmKnlhYl1kwQc4CUoq # 39oI/E0v0cTw7zvEl6ljX5Mvv4dw9GgKr9H1bmnSewBk31kukuCxDd1uNYBUMUZU # QeRcMZYXrjAlq0dSe34xDRhoNKbRLkwbtRxDaYIwh9Af/3HR7Lnpd0c+0o9gBO24 # IGDGBab29mPtS3BhWEKgcrwmcBniYnstYeLXdf08H1q9G27jwuuCe8TrJ7oOMz/+ # cXr3Aj5S+6MMvvKHCu5EdzU2UqevtNWI7tLIH2bKLGiEmfJVhmUujRciDJP42Bo1 # sw/QtuXoEvdEQeBk80mJB2BFUCKYoChh18q/vJbOsmYxJ9NUmtAHmbULzze5bm8B # Llp2S9xyjlPtT5eqFZe1rsvcfa3iOds28CUKxJhyZq+k/D7Q/SELoSo1e1H/eyFN # GM0wCU92yDqCUNPr/36MG8KAgbPbSi+kE8xzzfQaKOYVbD+uzUZB9kIG+B5MLoK5 # wazCCTWDQxWPQOMm+KeXfAzIooSRSBa4csAo72zNZGuDqP0Xw6N8NX0ZkHICq1E4 # bTFrlg8HH5wC26z38de8QUjmdafTGCFgb5O9Uc866uHcE/G1NqhuvORopI3VksIL # zDYDXM+bZPrQMztgnrwP4Jw= # SIG # End signature block
combined_dataset/train/non-malicious/Set-ADUserRandomPassword.ps1
Set-ADUserRandomPassword.ps1
###########################################################################" # # NAME: Set-ADUserRandomPassword.ps1 # # AUTHOR: Jan Egil Ring # EMAIL: jan.egil.ring@powershell.no # # COMMENT: This script are used to set a random password for Active Directory users in a specified Organizational Unit. It stores the results in a csv-file. # The background for this script is a school domain needing to set random passwords for new users, and exporting the passwords to a csv-# # file to let the teachers disribute the first-time passwords. # # You have a royalty-free right to use, modify, reproduce, and # distribute this script file in any way you find useful, provided that # you agree that the creator, owner above has no warranty, obligations, # or liability for such use. # # VERSION HISTORY: # 1.0 22.08.2009 - Initial release # ###########################################################################" #Requires: Quest.ActiveRoles.ADManagement #Creating system.random object used to generate random numbers $random = New-Object System.Random #Creating an array to store user information in $CSV = @() #Get users Get-QADUser -SearchRoot "domain.local/MyUserOU" -SizeLimit 0 | ForEach-Object { #Generate a random password for each user $password = "pwd"+($random.Next(1000,9999)) #Set the password for each user Set-QADUser $_ -UserPassword $password #Select what user information we want to export to the csv-file and storing it in a variable $exportdata = Get-QADUser $_ | Select-Object name,samaccountname,company,department #Add the password as a member to $exportdata Add-Member -InputObject $exportdata -MemberType NoteProperty -Name Password -Value $password #Add the user information to the $CSV array $CSV += $exportdata } #Exporting all users to the csv-file $CSV | Export-Csv -Path "C:\\export\\passwordlist.csv" -Encoding unicode -NoTypeInformation
combined_dataset/train/non-malicious/3535.ps1
3535.ps1
$location = "southeastasia" $resourceGroupName = "pstestFSRG1bca8f8e" $vaultName = "PSTestFSRSV1bca8f8e" $fileShareFriendlyName = "pstestfs1bca8f8e" $fileShareName = "AzureFileShare;pstestfs1bca8f8e" $saName = "pstestsa1bca8f8e" $skuName="Standard_LRS" $policyName = "AFSBackupPolicy" function Test-AzureFSContainer { try { $vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName $item = Enable-Protection $vault $fileShareFriendlyName $saName $containers = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered; Assert-True { $containers.FriendlyName -contains $saName } $containers = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName; Assert-True { $containers.FriendlyName -contains $saName } $containers = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -ResourceGroupName $resourceGroupName; Assert-True { $containers.FriendlyName -contains $saName } $containers = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName ` -ResourceGroupName $resourceGroupName; Assert-True { $containers.FriendlyName -contains $saName } } finally { Cleanup-Vault $vault $item $containers } } function Test-AzureFSUnregisterContainer { $vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName $item = Enable-Protection $vault $fileShareFriendlyName $saName $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName Disable-AzRecoveryServicesBackupProtection ` -VaultId $vault.ID ` -Item $item ` -RemoveRecoveryPoints ` -Force; Unregister-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -Container $container $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName Assert-Null $container }
combined_dataset/train/non-malicious/VHDFunctions_1.psm1.ps1
VHDFunctions_1.psm1.ps1
<# Name: VHDFunctions.psm1 Author: Rich Kusak (rkusak@cbcag.edu) Created: 2009-10-23 LastEdit: 2009-11-03 08:57 Included Functions: Dismount-VHD Initialize-VHD Mount-VHD New-VHD Set-VHDBootConfiguration Test-VHD #> <# .SYNOPSIS Dismount a VHD file from the system. .DESCRIPTION This function wraps the consistancy of PowerShell around the Diskpart utility. A Diskpart script is created to automate the dismount (detach) of a VHD file from the system. Optionally, the VHD file can be deleted following detachment. .PARAMETER Path Specifies the full path to the VHD file. .PARAMETER Remove Removes (deletes) the VHD file after dismounting it. .PARAMETER NoConfirm Supresses the delete confirmation prompt. .PARAMETER DiskpartScript Specifies the path location of the Diskpart script file. Default location is $env:SystemDrive This file is deleted at the conclusion of the script. .PARAMETER Rescan Instructs Diskpart to rescan the system for available storage resources. .EXAMPLE Dismount-VHD -Path C:\\test.vhd Dismounts the specified VHD file. .EXAMPLE Dismount-VHD -Path C:\\test.vhd -Remove Dismounts the specified VHD file and then deletes it. .NOTES Name: Dismount-VHD.ps1 Author: Rich Kusak Created: 2009-10-22 LastEdit: 2009-10-26 11:35 #Requires -Version 2.0 #> function Dismount-VHD { [CmdletBinding()] param ( [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)] [string]$Path, [switch]$Remove, [switch]$NoConfirm, [string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt", [switch]$Rescan ) begin { function InvokeDiskpart { Diskpart.exe /s $DiskpartScript } function RemoveVHD { switch ($NoConfirm) { $false { ## Prompt for confirmation to delete the VHD file ## "" ; Write-Warning "Are you sure you want to delete the file ""$Path""?" $Prompt = Read-Host "Type ""YES"" to continue or anything else to break" if ($Prompt -ceq 'YES') { Remove-Item -Path $Path -Force "" ; Write-Host "VHD ""$Path"" deleted!" ; "" } else { "" ; Write-Host "Script terminated without deleting the VHD file." ; "" } } $true { ## Confirmation prompt suppressed ## Remove-Item -Path $Path -Force "" ; Write-Host "VHD ""$Path"" deleted!" ; "" } } } ## Validate Operating System Version ## if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."} } process{ ## DiskPart Script Content ## Here-String statement purposefully not indented ## @" $(if ($Rescan) {'Rescan'}) Select VDisk File="$Path"`nDetach VDisk Exit "@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force InvokeDiskpart } end { if ($Remove) {RemoveVHD} Remove-Item -Path $DiskpartScript -Force ; "" } } Export-ModuleMember -Function Dismount-VHD <# .SYNOPSIS Initialize a VHD by preparing it for use. .DESCRIPTION This function wraps the consistancy of PowerShell around the Diskpart utility. A Diskpart script is created to automate initializing a VHD. The script creates a partition, assigns a drive letter, and formats a mounted VHD. .PARAMETER Path Specifies the full path to the VHD file. .PARAMETER Drive A drive letter to assign to the mounted VHD. If not specified the system will auto assign the next available drive letter. .PARAMETER Label A volume label to assign to the mounted VHD. .PARAMETER DiskpartScript Specifies the path location of the Diskpart script file. Default location is $env:SystemDrive This file is deleted at the conclusion of the script. .PARAMETER Rescan Instructs Diskpart to rescan the system for available storage resources. .EXAMPLE Initialize-VHD C:\\test.vhd X: TestVHD Initializes the VHD at path C:\\test.vhd assign it to drive letter X: and give it the volume label "TestVHD". .NOTES Name: Initialize-VHD Author: Rich Kusak Created: 2009-10-22 LastEdit: 2009-10-26 15:11 #Requires -Version 2.0 #> function Initialize-VHD { [CmdletBinding()] param ( [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)] [string]$Path, [Parameter(Position=1,Mandatory=$false,ValueFromPipeline=$false)] [string]$Drive, [Parameter(Position=2,Mandatory=$false,ValueFromPipeline=$false)] [string]$Label, [Parameter(Position=3,Mandatory=$false,ValueFromPipeline=$false)] [string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt", [switch]$NoConfirm, [switch]$Rescan ) begin { function InvokeDiskpart { Diskpart.exe /s $DiskpartScript } ## Validate Operating System Version ## if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."} ## Validate -Drive parameter ## if ($Drive) { $Reserved = @('A:','B:','C:') $Reserved += (Get-WmiObject win32_LogicalDisk -Property DeviceID | ForEach-Object {$_.DeviceID}) switch ($Drive) { {($_ -notmatch "^[a-z]$") -and ($_ -notmatch "^[a-z]:$")} {throw "The drive letter ""$_"" is invalid."} {$_ -notmatch ":"} {$Drive += ":"} {$Reserved -contains $Drive} {throw "The drive letter ""$_"" is reserved."} } } if (!$NoConfirm) { "" ; Write-Warning "The VHD ""$Path"" is about to initialized. Any existing data will be destroyed!`nAre you sure you want to continue?" ; "" $Prompt = Read-Host "Type ""YES"" to continue or anything else to break" if ($Prompt -cne 'YES') {Write-Host "Function terminated by user."; "" ; break} } } process { ## Diskpart Script Content ## Here-String statement purposefully not indented ## @" $(if ($Rescan) {'Rescan'}) Select VDisk File="$Path" Clean Create Partition Primary Format Quick FS=NTFS $(if ($Label) {"Label=""$Label"""}) $(if ($Drive) {"Assign Letter=$Drive"} else {'Assign'}) Detail VDisk Exit "@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force } end { InvokeDiskpart Remove-Item -Path $DiskpartScript -Force ; "" Write-Host "The VHD ""$Path"" has been successfully initialized." ; "" } } Export-ModuleMember -Function Initialize-VHD <# .SYNOPSIS Mount a VHD to the system. .DESCRIPTION This function wraps the consistancy of PowerShell around the Diskpart utility. A Diskpart script is created to automate mounting (attach) a VHD file to the system. .PARAMETER Path Specifies the full path to the VHD file. .PARAMETER DiskpartScript Specifies the path location of the Diskpart script file. Default location is $env:SystemDrive This file is deleted at the conclusion of the script. .PARAMETER Rescan Instructs Diskpart to rescan the system for available storage resources. .NOTES Name: Mount-VHD.ps1 Author: Rich Kusak Created: 2009-10-22 LastEdit: 2009-10-26 09:25 #Requires -Version 2.0 #> function Mount-VHD { [CmdletBinding()] param ( [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)] [string]$Path, [string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt", [switch]$Rescan ) begin { function InvokeDiskpart { Diskpart.exe /s $DiskpartScript } ## Validate Operating System Version ## if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."} } process{ ## Diskpart Script Content ## Here-String statement purposefully not indented ## @" $(if ($Rescan) {'Rescan'}) Select VDisk File="$Path"`nAttach VDisk Exit "@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force InvokeDiskpart } end { Remove-Item -Path $DiskpartScript -Force ; "" Write-Host "The VHD ""$Path"" has been successfully mounted." ; "" } } Export-ModuleMember -Function Mount-VHD <# .SYNOPSIS Create a new VHD file. .DESCRIPTION This function wraps the consistancy of PowerShell around the Diskpart utility. A Diskpart script is created to automate the creation of the VHD. Optionally, the VHD can be mounted immediately following the creation process. .PARAMETER Path Specifies the full path to the VHD file. .PARAMETER Maximum The maximum space allocated for the VHD to use. .PARAMETER Fixed Creates a fixed disk VHD file. By default a dynamically expanding VHD file is created. .PARAMETER Mount Mount (attach) the VHD to the system making it available to Windows. .PARAMETER Prepare Prepares the VHD for use by partitioning and mounting (attach) the VHD to the system making it available to Windows. .PARAMETER NoConfirm Supresses the maximum validation warning confirmation prompt. .PARAMETER DiskpartScript Specifies the path location of the Diskpart script file. Default location is $env:SystemDrive This file is deleted at the conclusion of the script. .PARAMETER Rescan Instructs Diskpart to rescan the system for available storage resources. .NOTES Name: New-VHD Author: Rich Kusak Created: 2009-05-27 LastEdit: 2009-10-26 10:06 #Requires -Version 2.0 #> function New-VHD { [CmdletBinding()] param ( [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)] [string]$Path, [Parameter(Position=1,Mandatory=$true,ValueFromPipeline=$false)] [int]$Maximum, [switch]$Fixed, [switch]$Mount, [switch]$NoConfirm, [string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt", [switch]$Rescan ) begin { function InvokeDiskpart { Diskpart.exe /s $DiskpartScript } function TestMaximum { ## Validates the -Maximum parameter against the specified disk's available space ## $Drive = Split-Path $Path -Qualifier $LogicalDisk = Get-WmiObject win32_LogicalDisk -Filter "DeviceID = '$Drive'" $FreeSpace = [math]::Truncate(($LogicalDisk.FreeSpace)/1MB) $Percent = [math]::Round(($Maximum/$FreeSpace)*100,0) switch ($Maximum) { {$_ -gt 2088960} {throw "The -Maximum parameter value ""$Maximum"" exceeds the allowable VHD size."} {$_ -ge $FreeSpace -and $Fixed} {throw "The -Maximum parameter value ""$Maximum"" exceeds available disk space."} {$_ -ge $FreeSpace} { "" ; Write-Warning "The VHD maximum size exceeds available disk space." if (!$NoConfirm) { Write-Host "Are you sure you want to continue?" $Prompt = Read-Host "Type ""YES"" to continue or anything else to break" if ($Prompt -cne 'YES') { "" ; Write-Host "Script terminiated by user." ; "" return } } } {$Percent -ge 80} { "" ; Write-Warning "The VHD maximum size is $Percent% of the available disk space." if (!$NoConfirm) { Write-Host "Are you sure you want to continue?" $Prompt = Read-Host "Type ""YES"" to continue or anything else to break" if ($Prompt -cne 'YES') { "" ; Write-Host "Script terminiated by user." ; "" return } } } } ## Validate Operating System Version ## if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."} } } process { TestMaximum ## Diskpart Script Content ## Here-String statement purposefully not indented ## @" $(if ($Rescan) {'Rescan'}) Create VDisk File="$Path" Maximum=$Maximum $(if ($Fixed) {'Type=Fixed'} else {'Type=Expandable'}) $(if ($Mount) {"Select VDisk File=""$Path""`nAttach VDisk"}) Exit "@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force InvokeDiskpart } end { Remove-Item -Path $DiskpartScript -Force ; "" Write-Host "A new VHD has been created at ""$Path""." ; "" if ($Mount) {Write-Host "The VHD has been successfully mounted." ; ""} } } Export-ModuleMember -Function New-VHD <# .SYNOPSIS Set the system boot configuration to boot from a VHD. .DESCRIPTION This function wraps the consistancy of PowerShell around the BCDEdit tool. The Boot Configuration DataStore Editor (BCDEdit) is used to set the necessary boot configuration entry to optionally boot to a VHD during startup. .PARAMETER Path Specifies the full path to the VHD file. .PARAMETER Description Description for the boot configuration entry. .EXAMPLE Set-VHDBootConfiguration .NOTES Name: Set-VHDBootConfiguration Author: Rich Kusak Created: 2009-10-22 LastEdit: 2009-10-26 10:14 #Requires -Version 2.0 #> function Set-VHDBootConfiguration { [CmdletBinding()] param ( [Parameter(Position=0,Mandatory=$true)] [string]$Path, [Parameter(Position=1,Mandatory=$true)] [string]$Description ) begin { if (!(Test-Path -Path $Path -Include "*.vhd")) {throw "The path ""$Path"" is invalid or does not contain a VHD file."} $Drive = Split-Path -Path $Path -Qualifier $UnQualifiedPath = Split-Path -Path $Path -NoQualifier } process { ## Use BCDEdit to set the VHD boot configuration entry ## $Copy = bcdedit /copy '{current}' /d $Description $CLSID = $Copy | ForEach-Object {$_.Remove(0,37).Replace(".","")} bcdedit /set $CLSID device vhd=[$Drive]""$UnQualifiedPath"" bcdedit /set $CLSID osdevice vhd=[$Drive]""$UnQualifiedPath"" bcdedit /set $CLSID detecthal on New-Object PSObject | Add-Member -MemberType NoteProperty -Name 'Identifier' -Value $CLSID -PassThru | } end { Write-Host "The VHD ""$Path"" has been prepared for boot operation." ; "" } } Export-ModuleMember -Function Set-VHDBootConfiguration <# .SYNOPSIS Test a VHD. .DESCRIPTION This script wraps the consistancy of PowerShell around the Diskpart utility. A Diskpart script is created to return the details of the VHD (VDisk). .PARAMETER Path Specifies the full path to the VHD file. .PARAMETER DiskpartScript Specifies the path location of the Diskpart script file. Default location is $env:SystemDrive This file is deleted at the conclusion of the script. .PARAMETER Rescan Instructs Diskpart to rescan the system for available storage resources. .NOTES Name: Test-VHD.ps1 Author: Rich Kusak Created: 2009-10-23 LastEdit: 2009-11-03 08:55 #Requires -Version 2.0 #> function Test-VHD { [CmdletBinding()] param ( [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)] [string]$Path, [Parameter(Position=1,Mandatory=$false,ValueFromPipeline=$false)] [string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt", [switch]$Rescan ) begin { function InvokeDiskpart { Diskpart.exe /s $DiskpartScript } ## Validate Operating System Version ## if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."} ## Validate the -Path parameter ## if (!(Test-Path -Path $Path -Include "*.vhd")) {throw "The path ""$Path"" is not valid or does not contain a VHD file."} } process { @" Select VDisk File="$Path" Detail VDisk "@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force InvokeDiskpart } end { Remove-Item -Path $DiskpartScript -Force ; "" } } Export-ModuleMember -Function Test-VHD
combined_dataset/train/non-malicious/sample_39_58.ps1
sample_39_58.ps1
# # Module manifest for module 'OCI.PSModules.Streaming' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Streaming.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ff4a80d2-3354-4a6a-a142-89663068a2ac' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Streaming Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Streaming.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIStreamingConnectHarness', 'Get-OCIStreamingConnectHarnessesList', 'Get-OCIStreamingGroup', 'Get-OCIStreamingMessages', 'Get-OCIStreamingStream', 'Get-OCIStreamingStreamPool', 'Get-OCIStreamingStreamPoolsList', 'Get-OCIStreamingStreamsList', 'Invoke-OCIStreamingConsumerCommit', 'Invoke-OCIStreamingConsumerHeartbeat', 'Move-OCIStreamingConnectHarnessCompartment', 'Move-OCIStreamingStreamCompartment', 'Move-OCIStreamingStreamPoolCompartment', 'New-OCIStreamingConnectHarness', 'New-OCIStreamingCursor', 'New-OCIStreamingGroupCursor', 'New-OCIStreamingStream', 'New-OCIStreamingStreamPool', 'Remove-OCIStreamingConnectHarness', 'Remove-OCIStreamingStream', 'Remove-OCIStreamingStreamPool', 'Update-OCIStreamingConnectHarness', 'Update-OCIStreamingGroup', 'Update-OCIStreamingStream', 'Update-OCIStreamingStreamPool', 'Write-OCIStreamingMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Streaming' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_10_90.ps1
sample_10_90.ps1
ConvertFrom-StringData @' id_pagedpoold2dsymevent_sd=This Windows Server 2003 may run out of paged pool due to a version of symevent.sys. id_kerneltagtokekb982010_sd=This machine have high usage of kernel memory pool tag Toke possibly caused by the DisableWindowsUpdateAccess user policy. id_kerneltagrxm4setikb2647452_sd=Paged pool leak detected in either the RxM4 or SeTI pool tags possibly due to frequently mapping and disconnecting a network drive id_kerneltagsslckb2585542_sd=This Windows Server 2008 ksecdd driver leaks SslC paged pool id_mpio2k3check_st=A MPIO.SYS with version older than 1.23 was detected and this may cause pool memory leak id_baspnppleakcheck_st=Non paged pool memory leak detected due to Broadcom Advanced Server Program driver id_aladdindevicedriverscheck_st=Memory leak and Event ID 333 or 2019 due to Aladdin Knowledge Systems Device Drivers '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCAoLaAUl4STC9E # wzV+jBj3U4whvESfs4lXwx8H52ivCaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ1+d5yDNgAZKoVZfh4Apfvw # mjLb7ltxI6GdLTMTvv/dMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAFQ+tdHqRtaqt5YmROkDp58ivPrYxNGR4mZEzg9N6gV8uGeQ44MHAFz+i # kxmtLC+Yv4q0Dve6YpTpcCT90d8hcg0MxNP8/LDFuiG2n1V562GJ7zH2KC+aVfku # sHsYzervWWBymn1Crrp/dOH9+jEfSkrVWRQSm/cI4Nhub25QRmB8HI5lrTKOD0Cj # vK+/4O9DvIDwrpj+Rb0MyvyhxM4aWhyfN9+L1ZubtYg5HfmqRnfK7t96iSe4CyT5 # LG/EW8WzPNTzNsXTkNM14GsI9fPdF6VIbODdb8aRcJstdQMPl9vcOhxZYydIBVAc # 78AA05Kx8oCki8ffWBP36Ri1MLcPQqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCFGIe00fl9WiDkK389ADzm+OOz/PHNP0i8FB1J8ROEjwIGZxp9zsoX # GBMyMDI0MTAyODExNDA0Mi41NDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw # N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP # AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0 # ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA # AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4 # fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6 # IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR # AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCw8ACvTjcii+17sely4Y0ktn2DmOf/EWrOfK+pH52y # fzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a # AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAcN5dBX01U2ZX/NXoTvnk # A65TUBywOSsD0YMFLTMaKrqWXK7oKC1fAjICvm0cMbUZ26OPuwJJ7Tgsyj06n49M # L+r++Oox8aaY4n3SUXSTx4yW4y1J9LTOu42npcB8IqZPado0iUVlkrkZNIuSUorU # 5rK39i6Eg/kRu0VMrRKb30qw1bZsIywaL+jbcPhF1SMf/mJZQYuI2pEzGPQmhqoT # fnYDDk8st4NlgHDhGGfmglRZ141WTdImUTD9iC0T2XNFmURuE4aVvqaeE5P9LfKy # k6+rmVQz6to2S0vfpWMf7++2U/uR519W228o26qSQ07bozh9fEGsq/jbKEgOapDL # VyTFGxtkRydnHn6/+YlNg/DwkFnct3xizsx1J8mUXnO/ExKRkLPiViHd4Tlmp+eV # /gvlASz56SLjCPlwnwgOU+exUjgpG78g950WWGTyLudaTAWLHFy4YtRaKgTfGNCP # zyC77MUGldDUbToBTyOipqCtjhihCPlp5QH0izrG9iEC8V9I96wWStXIF83FeCMr # nUHHQACaXNRPUGVgDE2gfozCmVJgDWd6tOz2ryZjm54tOIilk6OsnebWaHCxDPgT # G4BclD35T59MO45QKoC9C3UKDmWv/5QojR1wvlcANTs2FzJy271sGkosFUk2wDB/ # wANNaysRw7kx/x6wbM3WuVw= # SIG # End signature block
combined_dataset/train/non-malicious/556.ps1
556.ps1
function Add-SPOPrincipalToGroup { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string]$username, [Parameter(Mandatory=$true, Position=1)] [string]$groupname ) process { Write-Host "Adding principal with username $username to group $groupname" -foregroundcolor black -backgroundcolor yellow $principal = Get-SPOPrincipal -username $username $group = Get-SPOGroup -name $groupname $userExists = $group.Users.GetById($principal.Id) $clientContext.Load($userExists) try { $clientContext.ExecuteQuery() Write-Host "Principal already added to the group" -foregroundcolor black -backgroundcolor yellow } catch { $addedPrincipal = $group.Users.AddUser($principal) $clientContext.Load($addedPrincipal) $clientContext.ExecuteQuery() Write-Host "Succesfully added principal to the group" -foregroundcolor black -backgroundcolor green } } }
combined_dataset/train/non-malicious/sample_4_15.ps1
sample_4_15.ps1
# # Module manifest for module 'OCI.PSModules.Aidocument' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aidocument.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '48b9296a-b4a7-43bb-8d59-3eaf832baf2a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aidocument Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aidocument.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIAidocumentModelLock', 'Add-OCIAidocumentProjectLock', 'Get-OCIAidocumentModel', 'Get-OCIAidocumentModelsList', 'Get-OCIAidocumentProcessorJob', 'Get-OCIAidocumentProject', 'Get-OCIAidocumentProjectsList', 'Get-OCIAidocumentWorkRequest', 'Get-OCIAidocumentWorkRequestErrorsList', 'Get-OCIAidocumentWorkRequestLogsList', 'Get-OCIAidocumentWorkRequestsList', 'Invoke-OCIAidocumentAnalyzeDocument', 'Invoke-OCIAidocumentPatchModel', 'Move-OCIAidocumentModelCompartment', 'Move-OCIAidocumentProjectCompartment', 'New-OCIAidocumentModel', 'New-OCIAidocumentProcessorJob', 'New-OCIAidocumentProject', 'Remove-OCIAidocumentModel', 'Remove-OCIAidocumentModelLock', 'Remove-OCIAidocumentProject', 'Remove-OCIAidocumentProjectLock', 'Stop-OCIAidocumentProcessorJob', 'Stop-OCIAidocumentWorkRequest', 'Update-OCIAidocumentModel', 'Update-OCIAidocumentProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aidocument' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3622.ps1
3622.ps1
function Test-GetAzureLogAllParameters { $correlation = '/subscriptions/a93fb07c-6c93-40be-bf3b-4f0deba10f4b/resourceGroups/Default-Web-EastUS/providers/microsoft.insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNjcmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2ViLUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBjLTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NjA5MjE5ODU0NzQ1NDI0' $rgname = 'Default-Web-EastUS' $rname = '/subscriptions/a93fb07c-6c93-40be-bf3b-4f0deba10f4b/resourceGroups/Default-Web-EastUS/providers/microsoft.insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d' $rpname = 'microsoft.insights' try { Write-Verbose " ****** Get ActivityLog records by corrrelationId " $actual = Get-AzLog -CorrelationId $correlation -starttime 2015-03-02T18:00:00Z -endtime 2015-03-02T20:00:00Z -detailedOutput Assert-AreEqual 2 $actual.Count Write-Verbose " ****** Get ActivityLog records by resource group " $actual = Get-AzLog -ResourceGroup $rgname -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z Assert-AreEqual 2 $actual.Count Write-Verbose " ****** Get ActivityLog records by resource Id" $actual = Get-AzLog -ResourceId $rname -startTime 2015-03-03T15:42:50Z -endTime 2015-03-03T16:42:50Z Assert-AreEqual 2 $actual.Count Write-Verbose " ****** Get ActivityLog records by resource provider" $actual = Get-AzLog -ResourceProvider $rpname -startTime 2015-03-03T15:42:50Z -endTime 2015-03-03T16:42:50Z Assert-AreEqual 2 $actual.Count Write-Verbose " ****** Get ActivityLog records by subscription Id" $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z Assert-AreEqual 1 $actual.Count } finally { } } function Test-GetAzureSubscriptionIdLogMaxEvents { try { { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z Assert-AreEqual 7 $actual.Count } { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents -3 Assert-AreEqual 7 $actual.Count } { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 0 Assert-AreEqual 7 $actual.Count } { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 3 Assert-AreEqual 3 $actual.Count } } finally { } } function Test-GetAzureSubscriptionIdLogPaged { try { { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z Assert-AreEqual 8 $actual.Count } { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 7 Assert-AreEqual 7 $actual.Count } { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 6 Assert-AreEqual 6 $actual.Count } { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 3 Assert-AreEqual 3 $actual.Count } { $actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 15 Assert-AreEqual 8 $actual.Count } } finally { } }
combined_dataset/train/non-malicious/sample_20_69.ps1
sample_20_69.ps1
# # Module manifest for module 'DscInstall' # # Generated by: Zia Jalali # # Generated on: 07/31/2017 # @{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Heartbeat.psm1' # Version number of this module. ModuleVersion = '1.1' # ID used to uniquely identify this module GUID = '3740b029-0ed3-4ae6-bd82-883ab79c843b' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2017 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'This module is used to sent GCAgent heartbeat.' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @('') # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module FunctionsToExport = @('Send-Heartbeat','Test-AutomationDscRegistration','Test-ChangeTrackingEnabled') # Cmdlets to export from this module # CmdletsToExport = @('') # Variables to export from this module # VariablesToExport = '*' # Aliases to export from this module # AliasesToExport = @('') # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess # PrivateData = '' # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoOAYJKoZIhvcNAQcCoIIoKTCCKCUCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBUINAHFnbW6Hcl # JQEkuvQOXlkiQdLKkGiMcqRZFtayjKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5 # R+AeS+5FX2Y0Vji3cfWGWrVlu/I1PL1DdMvYwOwqMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEABQQ3Qoiom4V7+k/KISwM9vn7rO7Lw5lgqdpL # TUULtoeZOC1gp0g2YiBR7AlgAnSn4S3TcxYvjG6fCpAtxSFfCRptsTyfF5jA+FuZ # bmWMRktCPFRwhojBjttjGc1ObFnEnq6UPPlwPTNuOIEO8ufUZKuoa4WTvxF2y+Kx # rGuW6MwFZ0eeZzG2gn+fzgrEaoHamLsa96nqgy5ogXo4dcx2c/w4XbE30RdDSJBX # zuMA0fS7V0z5/afeKb/RCfYxd68PdA7cj5FFThnYYAmA/XZmJMapDIw4DkojRURS # /UfbRQ19JVpYcS4febL/U66iKLim/Wk6X1I0WCT83wHsr1djeKGCF5MwghePBgor # BgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDUo7f6f6uY5fHWpNBSPDxPLd0xpcJhzrfE # kb1+5q21IQIGZc3/lJGeGBIyMDI0MDIyMDE4MTg0MS4xNFowBIACAfSggdGkgc4w # gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT # HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg # VFNTIEVTTjo5MjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEeowggcgMIIFCKADAgECAhMzAAAB5y6PL5MLTxvpAAEA # AAHnMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIzMTIwNjE4NDUxOVoXDTI1MDMwNTE4NDUxOVowgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5MjAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMJXny/gi5Drn1c8zUO1pYy/ # 38dFQLmR2IQXz1gE/r9GfuSOoyRnkRJ6Z/kSWLgIu1BVJ59GkXWPtLkssqKwxY4Z # FotxpVsZN9yYjW8xEnW3MzAI0igKr+/LxYfxB1XUH8Bvmwr5D3Ii/MbDjtN9c8Tx # GWtq7Ar976dafAy3TrRqQRmIknPVWHUuFJgpqI/1nbcRmYYRMJaKCQpty4CeG+Hf # Ksxrz24F9p4dBkQcZCp2yQzjwQFxZJZ2mJJIGIDHKEdSRuSeX08/O0H9JTHNFmNT # NYeD1t/WapnRwiIBYLQSMrs42GVB8pJEdUsos0+mXf/5QvheNzRi92pzzyA4tSv/ # zhP3/Ermvza6W9GnYDz9qv1wbhbvrnS4poDFECaAviEqAhfn/RogCxvKok5ro4gZ # IX1r4N9eXUulA80pHv3axwXu2MPlarAi6J9L1hSIcy9EuOMqTRJIJX+alcLQGg+S # Tlqx/GuslsKwl48dI4RuWknNGbNo/o4xfBFytvtNcVA6xOQq6qRa+9gg+9XMLrxQ # z4yyQs+V3V6p044wrtJtt/a0ZJl/f6I7BZAxxZcH2DDmArcAhgrTxaQkm7LM+p+K # 2C5t1EKZiv0JWw065b7AcNgaFyIkMXYuSuOQVSNRxdIgl31/ayxiK1n0K6sZXvgF # Bx+vGO+TUvyO+03ua6UjAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUz/7gmICfNjh2 # kR/9mWuHUrvej1gwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAHSh8NuT6WVaLVwL # qex+J7km2nT2jpvoBEKm+0M+rYoU/6GL5Q00/ssZyIq5ySpcKYFMUiF8F4ZLG+Tr # JyiR1CvfzXmkQ5phZOce9DT7yErLzqvUXit8G7igcHlxPLTxPiiGsb85gb8H+A2f # PQ6Xq/u7+oSPPjzNdnpmXEobJnAqYplZoF3YNgTDMql0uQHGzoDp6dZlHSNj6rkV # 1tXjmCEZMqBKvkQIA6csPieMnB+MirSZFlbANlChe0lJpUdK7aUdAvdgcQWKS6dt # RMl818EMsvsa/6xOZGINmTLk4DGgsbaBpN+6IVt+mZJ89yCXkI5TN8xCfOkp9fr4 # WQjRBA2+4+lawNTyxH66eLZWYOjuuaomuibiKGBU10tox81Sq8EvlmJIrXOZoQsE # n1r5g6MTmmZJqtbmwZufuJWQXZb0lAg4fq0ZYsUlLkezfrNqGSgeHyIP3rct4aNm # qQW6wppRbvbIyP/LFN4YQM6givfmTBfGvVS77OS6vbL4W41jShmOmnOn3kBbWV6E # /TFo76gFXVd+9oK6v8Hk9UCnbHOuiwwRRwDCkmmKj5Vh8i58aPuZ5dwZBhYDxSav # wroC6j4mWPwh4VLqVK8qGpCmZ0HMAwao85Aq3U7DdlfF6Eru8CKKbdmIAuUzQrnj # qTSxmvF1k+CmbPs7zD2Acu7JkBB7MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCA00wggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj # YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUw # LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB # ATAHBgUrDgMCGgMVALNyBOcZqxLB792u75w97U0X+/BDoIGDMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpfmwCMCIY # DzIwMjQwMjIwMDAwODM0WhgPMjAyNDAyMjEwMDA4MzRaMHQwOgYKKwYBBAGEWQoE # ATEsMCowCgIFAOl+bAICAQAwBwIBAAICHiQwBwIBAAICE64wCgIFAOl/vYICAQAw # NgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgC # AQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEASMF2HFzYPLUiIj9puaTYTwizZiAq # O+kquAdXGuZHq5OhUs/5RN8ZSPZZ2TqY5T21hKjb5/KeQQJk3QOgqNMQaHgKueR6 # EsFW5Y2BYuwJlzhT58+c2aBnaoCgMIJdESclH0kgmblS01e164yjMLurzHGD92iz # iCx7h6hQIcHIcUCxAXbJAfiXDQAvlR7xAr/AGZBajSF3NmESj8AYhYEl3lfjX3TJ # 26qmYmmPhu5itG2sVDNsBUuVMgebPwqh87dt0uyjMFT1Yr37/7xrUBefVLIS3mEt # RfhSvNyZMyYz1QgXIsbAbWEM6tkjpQ63A/5I8u5i/l9Mi8sqOfrZyPzxuDGCBA0w # ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5y6P # L5MLTxvpAAEAAAHnMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYL # KoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEINW9tgbobHcwESueUOeUxvDWU37f # KcZk7xq3aT9v8WHQMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg5TZdDXZq # hv0N4MVcz1QUd4RfvgW/QAG9AwbuoLnWc60wgZgwgYCkfjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB5zAiBCDmy2s2xhsA # lJwoATlobcuibku+hLm0XGgFDh7x8g0d7TANBgkqhkiG9w0BAQsFAASCAgAcD5qh # 2JSAAU3FKyxU5oJ9Md5PGrPaCY5BX3VpJfT7zhIp8gH9m9YHnTtfwgFPqQTmHMtI # Ma1502odswYosuhCVDlYrR7kxT/wN650nqzxWGl+qGpdB4eFyAhLPLKZ0P4hMARP # VD9iyDtHr1G5pHwAIWovqMBgpxpOXOPsVHD8jSQjB3NJEJHvdd/0R5lfoLCVDyaN # D2OxUB7i7woKNUoMAnd0u8FIwG/J7F8LIx0jgVY9OC8JsQgrKuO0kXVW7a6WUsJo # WPRUyzaXeBNWOZ7OBobyF0I+vBJyIxW56z+mTkJ0UpAuMDyU0sfHxWfvCytw25U1 # OnczChztjwCLJJ6BFNrit/FNxJoVE1TikfbjCAuTydKbVZqszpvAHTA9yaHbthYe # j1QQ40XXo/CdasoHwvTxITGM+GTjUcbablT7zNmfIF+RAkauCcthkyo/pFSryyaD # UnCz+XnpL/5XIK1dAp1wv2RoGy3wSKXh4BJqG2GLRx65GLlV4daFfvPue4uvyiFM # 2uwuCpFAZQYsk7SXsS5A37Btjo2J5Ytjl25pkNAycOlY4gZNjB2J7jcbyEZOc3nH # dCiZ8rPb9yjkyTs6odAaWnUDNdMFSaOyd7d0zZkKBJibkmv9OmzzTuWGyMj/OltE # 6JstNRtNaUbCiDOjjV0Mkim/6AUHa2dle4iDTw== # SIG # End signature block
combined_dataset/train/non-malicious/sample_5_26.ps1
sample_5_26.ps1
ConvertFrom-StringData @' id_ctsnps=Network Policy Server (NPS) id_ctsnpsdescription=Collects information about Network Policy Server (NPS) [RADIUS/IAS]. '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCyj/dbKsENrkLU # fhRtbHpyROqit768vPACKs2jr/gVB6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFm+7pUjkEbH9AseyBlVYExo # pl5wNMFxI7lRCava2htDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAIdrnHzRUxxXWVVHfzW3FzhJGQKlFKVHYZYGf90MJeECUEjM8bDxQrc4H # eHLRuGqgdcbJdrEUfzHud09yfLJdIW0HmjsKsR2rCgXaflUwvMnCpdl+DeAf6zNm # F8KinQwYjFdaHgsfigL72nSWp8ec9nUDSlLQUQYPji/Kprlf4dPzMmXLz+N6Y4Z4 # D1fL+xzhsmBs2DrGlTHHLFlwKrr0oLmF+WIQkRRXyMLFD+H7m3Y2t/q8sVtRwciP # o3tZVVFV2MrLBB6kFPx0QfJUYGM6E8yBWjzsqGqtp+qtPKUprD/LphEuDDEvbYMk # +U6Nl2qD3kX80HORQe0yyPZfD7rni6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAHfccqtqJpm7QD4rABvjZ/ddsgq4JaA2HqWrp3e9SEoAIGZxqGn6w9 # GBMyMDI0MTAyODExNDA0Mi43NzFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smiIDAiGA8yMDI0MTAyODA1Mzk0 # NFoYDzIwMjQxMDI5MDUzOTQ0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaIg # AgEAMAcCAQACAikmMAcCAQACAhNdMAoCBQDqyvOgAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAFmckdUeifZt8BprZ3zxv8eo/W1geDvTCg+AfBgsP5eubV4p # W8eAaVQPjzjVseXEjtLErgpcesWIgWtwjTBdGPVhCatB3NRfg/awbJSa7tZm4sDy # cdvhoeYBZ3BqswvkYUxhhKUbAnZYYibg+H6YnGrog3UF4G0KdCndtoLOLZfqFPkL # DzGpuEBwwuEfDjxgLz2GfRP0jeSHOA0d2f5CnwY3Tij2x/Thsl/+cvbZ4a/Eqb8p # D8brFUdxFlOHbW3UMTLvz863JdgDarmdvyz/z5x1qIsWwKHlydHqbGF6reb09z9d # EdUNok4tjGHZW5O/uOd7Y340oWdSzkS012Nnz8UxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAtRYBYDLpXqoYQ1/GwLvxSIGrDZD8CzCjHaNo6scJO4jCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsS # DrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJHwmHNb0a877pzs9GGBhooAWbWEx # ml1o498sDW/Bg5wwDQYJKoZIhvcNAQELBQAEggIAOseTm2ltJDGUz7uu1IWp+yLB # WXX2ZzIQsAsHy5LFge8xdjMdJRS9ua27q+KL7b2IUYlQG6ByJO/2pvr2YBXmW/LC # ih1nYahGDfx8H8/hdA+Ju4pqQqTH6ypzXE/QTxTRZa3nFNNNNZBTzjRkQ8ws/+YU # Nyi4cqqRl8ih+FOS/x6X7JoC7tCSgwuRI9IHfoPUt+meJjRCVb4pc8C+SLgNTRbV # waeG30lZocSzrPwhbiraLi6cghDNKvq+X0E//fSiJhgIdMGdJBdBN3tskJpmlBza # sbhy4kwCP/dEFvA0t6f4nMQQi4vKc7zgPb7pjbFXj7W0TEOOyuisbu39rwcmX9ee # lqg6S5boymy2F5bazT4RqdiQ6py8HC1Oa5bHo9m6smeMBRK6RhzY2K8UHikrT4mQ # QidgebSW7y/Y0T5z33npdPpKEW8J5XDPO82aTV4ty/xm79OJKduw35zB+A4Nu0OQ # 2NsDhKdkgQwRQqhmIU2FNNg5ue1FsLq/1pl6k2fJki9gV1AJTVFXp7zcTl0BEwJ/ # d+HxO1E7c5gHZqGgkMDf8a8JStscKPHVl8DBJgKReDZZq26tvPe1I4frBVB+Wxis # H9Fet+09Lo0vYxBmsZX6SIqQs34xlmhLCN5LKp3nOFdPgiV5afjhNSwsYRePgKa4 # k0p/3qkxAuDkZyxIlxI= # SIG # End signature block
combined_dataset/train/non-malicious/sample_3_44.ps1
sample_3_44.ps1
#************************************************ # TS_SurfacePro3DetectFirmwareVersions.ps1 # Version 1.0.09.19.14: Created and tested SurfacePro3 scripts from Sep12-19 # Date: 2014 # Author: bbenson # Description: SurfacePro3DetectFirmwareVersions # # Rule GUID: 34F6567E-7B92-4C37-B1CA-5DE6E66D4881 # # Files: # TS_SurfacePro3DetectFirmwareVersions.ps1 # RC_SurfacePro3DetectFirmwareVersions.xml # Include.xml # # Output files: # none # # Called from: Networking and Setup Diagnostics #************************************************ Import-LocalizedData -BindingVariable RegKeyCheck Write-DiagProgress -Activity $RegKeyCheck.ID_SurfacePro3DetectFirmwareVersions -Status $RegKeyCheck.ID_SurfacePro3DetectFirmwareVersionsDesc $RootCauseDetected = $false $HasIssue = $false $RootCauseName = "RC_SurfacePro3DetectFirmwareVersions" #$PublicContent Title: "Surface Pro 3, Surface Pro 2, and Surface Pro firmware and driver packs" $PublicContent = "http://www.microsoft.com/en-us/download/details.aspx?id=38826" #InternalContent Title: "2961421 - Surface: How to check firmware versions" $InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2961421" $Verbosity = "Error" $Visibility = "4" $SupportTopicsID = "8041" $InformationCollected = new-object PSObject #******************** #Functions #******************** $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber $sku = $((Get-CimInstance win32_operatingsystem).OperatingSystemSKU) Function isOSVersionAffected { if ($bn -eq 9600) { return $true } else { return $false } } Function isSurfacePro3 { # Check for: "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\BIOS"; SystemSKU = Surface_Pro_3 $regkeyBIOS = "HKLM:\HARDWARE\DESCRIPTION\System\BIOS" If (test-path $regkeyBIOS) { $regvalueSystemSKUReg = Get-ItemProperty -path $regkeyBIOS -name "SystemSKU" -ErrorAction SilentlyContinue $regvalueSystemSKU = $regvalueSystemSKUReg.SystemSKU if ($regvalueSystemSKU -eq "Surface_Pro_3") { return $true } else { return $false } } } #******************** #Detection Logic and Alert Evaluation #******************** if ((isOSVersionAffected) -and (isSurfacePro3)) { # Using this method to detect the firmware version: # Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{512B1F42-CCD2-403B-8118-2F54353A1226}" Filename = "SamFirmware.3.9.350.0.cap" # Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{52D9DA80-3D55-47E4-A9ED-D538A9B88146}" Filename = "ECFirmware.38.6.50.0.cap" # Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{5A2D987B-CB39-42FE-A4CF-D5D0ABAE3A08}" Filename = "UEFI.3.10.250.0.cap" # Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{E5FFF56F-D160-4365-9E21-22B06F6746DD}" Filename = "TouchFirmware.426.27.66.0.cap" # # This method shows the correct driver if the driver is rolled back, but this is not needed since firmware cannot be rolled back. # HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\UEFI\RES_{GUID}\0\Device Parameters # $regkeySamFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{512B1F42-CCD2-403B-8118-2F54353A1226}" If (test-path $regkeySamFirmware) { $regvalueSamFirmwareFilename = Get-ItemProperty -path $regkeySamFirmware -name "Filename" -ErrorAction SilentlyContinue if ($null -ne $regvalueSamFirmwareFilename) { $regvalueSamFirmwareFilename = $regvalueSamFirmwareFilename.Filename $regvalueSamFirmwareFileNameLatest = "SamFirmware.3.9.350.0.cap" } $regvalueSamFirmwareVersion = Get-ItemProperty -path $regkeySamFirmware -name "Version" -ErrorAction SilentlyContinue if ($null -ne $regvalueSamFirmwareVersion) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro System Aggregator Firmware" -value " " $regvalueSamFirmwareVersion = $regvalueSamFirmwareVersion.Version if ($regvalueSamFirmwareVersion -lt 50922320) # Hex 0x03090350 { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Installed Version" -value $regvalueSamFirmwareFileName add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Recommended Version" -value $regvalueSamFirmwareFileNameLatest } else { add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Version: No Action Needed" -value $regvalueSamFirmwareFileName } } } $regkeyECFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{52D9DA80-3D55-47E4-A9ED-D538A9B88146}" If (test-path $regkeyECFirmware) { $regvalueECFirmwareFileName = Get-ItemProperty -path $regkeyECFirmware -name "Filename" -ErrorAction SilentlyContinue if ($null -ne $regvalueECFirmwareFileName) { $regvalueECFirmwareFileName = $regvalueECFirmwareFileName.Filename $regvalueECFirmwareFileNameLatest = "ECFirmware.38.6.50.0" } $regvalueECFirmwareVersion = Get-ItemProperty -path $regkeyECFirmware -name "Version" -ErrorAction SilentlyContinue if ($null -ne $regvalueECFirmwareVersion) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro Embedded Controller Firmware" -value " " $regvalueECFirmwareVersion = $regvalueECFirmwareVersion.Version if ($regvalueECFirmwareVersion -lt 3671632) # Hex 0x00380650 { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Installed Version" -value $regvalueECFirmwareFileName add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Recommended Version" -value $regvalueECFirmwareFileNameLatest } else { add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Version: No Action Needed" -value $regvalueECFirmwareFileName } } } $regkeyUEFI = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{5A2D987B-CB39-42FE-A4CF-D5D0ABAE3A08}" If (test-path $regkeyUEFI) { $regvalueUEFIFileName = Get-ItemProperty -path $regkeyUEFI -name "Filename" -ErrorAction SilentlyContinue if ($null -ne $regvalueUEFIFileName) { $regvalueUEFIFileName = $regvalueUEFIFileName.Filename $regvalueUEFIFileNameLatest = "UEFI.3.10.250.0.cap" } $regvalueUEFIVersion = Get-ItemProperty -path $regkeyUEFI -name "Version" -ErrorAction SilentlyContinue if ($null -ne $regvalueUEFIVersion) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro UEFI" -value " " $regvalueUEFIVersion = $regvalueUEFIVersion.Version if ($regvalueUEFIVersion -lt 50987258) # Hex 0x030a00fa { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Installed Version" -value $regvalueUEFIFileName add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Recommended Version" -value $regvalueUEFIFileNameLatest } else { add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Version: No Action Needed" -value $regvalueUEFIFileName } } } $regkeyTouchFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{E5FFF56F-D160-4365-9E21-22B06F6746DD}" If (test-path $regkeyTouchFirmware) { $regvalueTouchFirmwareFileName = Get-ItemProperty -path $regkeyTouchFirmware -name "Filename" -ErrorAction SilentlyContinue if ($null -ne $regvalueTouchFirmwareFileName) { $regvalueTouchFirmwareFileName = $regvalueTouchFirmwareFileName.Filename $regvalueTouchFirmwareFileNameLatest = "TouchFirmware.426.27.66.0" } $regvalueTouchFirmwareVersion = Get-ItemProperty -path $regkeyTouchFirmware -name "Version" -ErrorAction SilentlyContinue if ($null -ne $regvalueTouchFirmwareVersion) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro Touch Controller Firmware" -value " " $regvalueTouchFirmwareVersion = $regvalueTouchFirmwareVersion.Version if ($regvalueTouchFirmwareVersion -lt 27925314) # Hex 0x01aa1b42 { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Installed Version:" -value $regvalueTouchFirmwareFileName add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Recommended Version" -value $regvalueTouchFirmwareFileNameLatest } else { add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Version: No Action Needed" -value $regvalueTouchFirmwareFileName } } } if ($RootCauseDetected -eq $true) { "[info] RootCauseDetected: Completing RootCause" | WriteTo-StdOut # Completing the Root Cause Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InternalContentURL $InternalContent -Verbosity $Verbosity -InformationCollected $InformationCollected -Visibility $Visibility -SupportTopicsID $SupportTopicsID -MessageVersion 1 } else { Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB10HRFrv8HjhoX # gsRZ5WnZzTq8vDo3ZWsTdcl0N9SmHKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFzW # iMZmK36RHn34ITp+dpSCjzKsm6UyyzflaB7FrpOGMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAiMIJtLQjS/0BIq5AMQVvgGSufD6p29eTtyj5 # nRxyuY6sd7fbmPfqSD9SJ8UDGBeawEjmqQm4bKjkYOGL1UwSUE3bD/K6Ha6ZJcB8 # sA3ZX9pDsqHnG0EG6KziBeMLFsCaw+sn4kcY2JsmIp6bdH5JkIBUz1uzl3qGGKGh # i4VvOpzK2TyQGHa0foj8n66/yx62Z6kS+P4gMwA679272DVjVVnoNy3VK/1l2vjT # 47881DXeMwHhfytwxQEXJFf7x+HQjmIKwytBhz6EmHSJjsO52hi724dgrcOpVsWb # N7S+INy1JLhS6DTzIGOPvbogGhwzazzGZi2gdeVMi4PwyCnBoKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCnlDISA3V/ssXwt4PRuitDHhoNLozWEyQm # Ds7o9T+wQQIGZwfbtoTeGBMyMDI0MTAxNzAwMjMyMS41NThaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB # AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4 # Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J # b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi # fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl # VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd # WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys # CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw # gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc # wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU # olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x # wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g # MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0 # SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl # 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY # BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6 # RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv # bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes # bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs # DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT # GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P # Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud # AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh # 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF # fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpCpTAi # GA8yMDI0MTAxNjEzNDgyMVoYDzIwMjQxMDE3MTM0ODIxWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqukKlAgEAMAcCAQACAiN6MAcCAQACAhLtMAoCBQDqu5QlAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALueh93AsDBR/6jYYP7JNJhCnD+7 # lN7vdzsTZ56si44qRlK4A+3ofSQkHtD52C+GP3RfAlzafJZ7KuJ5BDtn9CyMKzbR # IYVMIEoqc0I9LeqIfi+/IG92a2fwejvWwH/qkEKCW/rH/Ha3uRJfH0Ei0iBuGwPn # k8UAMjijQ3qKeViG5PHEijdeoJRYuteeUnE0OJ7kVZwESbahv/lDsUyuuT19nLcR # tAkabXvSz9iDtIJB1pNNv2VXBamRajj8j6h8gE3YowAKFVX/RLi0oTiDz0tDDvmy # wVNRQm5Ce2n9jw9A0AMkL/pjoxSbdVE4v40oKzFNlZOLGLpht2YxA0tvs50xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGz # RfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDTuL5Ly0WJb3ReHKiloZDvAl0t # Vi+RjZqxPh1BnmqaGDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5h # S7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQg2p7xTclT # wP12eNS3owWPsEw4nI7JxJ5YVVxDQJJRrKgwDQYJKoZIhvcNAQELBQAEggIATWCz # ptLrQ8aFcoXTkAqgFRehJTbpnrDtQqHEyjh3LjrLHEpY03I6RQIaNyifvsmcwcF+ # mjk0+4TH0gk4TvtJmrL7EEEJJ+97cx8GDBO9pronksmcwv+BlVb2GUvSOXkPZR03 # gRSNuvWuS7ztcYS5YogMZRB+96TAgB9PVoo7Bm22WuS/b4rlruhrzc04lemkVG0G # LZ+IY0zzosdiQqRc//iSFUNoHKqA8BP3KJAZZORr73q2ShVUUyoHcQgP8WaRlfbP # Oy+EUte5QsYQ1MeReKM6GwJz0eKGWv+od8OxjULtwx9UVoi/kkscvF8IjdBUgdln # 6v33iqo1UxJP1YXG2+s/wnKHmIhbJ7EmtD0c5al5kZACpW1dwsao0n9g4CKIKznz # aKBwFAl4BXM/xBECoutk6Igsym6OJnviU9zVjS1AaUgvXb9EyDpjSlwPqSWyG9t7 # s3qxwBFEHw+6fCSpcYC2MFemltpz1KzEffuaTv1tEDz15AvsyxpK8DlcmYiZqo5f # cXCpOvqH/pWgJDqtTPI12XrHTQIGc0BQL0mEUFaXHrqQEy7aevBJoCI99Kwap3GS # 5zmIf+vRgLDyIPXsMtEWFMeJynaCcu5D2wDcFdNmsVuBFSHLnCNV9J2s/l8e4w6Q # mMGexaE6YuWodBBYJ8i6KXoNz0r8aFFLO7Y/4vg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_52_40.ps1
sample_52_40.ps1
# # Module manifest for module 'OCI.PSModules.Dataintegration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataintegration.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '769e2e00-1fe3-46af-a9e9-c24a01403239' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataintegration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataintegration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataintegrationApplication', 'Get-OCIDataintegrationApplicationDetailedDescription', 'Get-OCIDataintegrationApplicationsList', 'Get-OCIDataintegrationCompositeState', 'Get-OCIDataintegrationConnection', 'Get-OCIDataintegrationConnectionsList', 'Get-OCIDataintegrationConnectionValidation', 'Get-OCIDataintegrationConnectionValidationsList', 'Get-OCIDataintegrationCopyObjectRequest', 'Get-OCIDataintegrationCopyObjectRequestsList', 'Get-OCIDataintegrationCountStatistic', 'Get-OCIDataintegrationDataAsset', 'Get-OCIDataintegrationDataAssetsList', 'Get-OCIDataintegrationDataEntitiesList', 'Get-OCIDataintegrationDataEntity', 'Get-OCIDataintegrationDataFlow', 'Get-OCIDataintegrationDataFlowsList', 'Get-OCIDataintegrationDataFlowValidation', 'Get-OCIDataintegrationDataFlowValidationsList', 'Get-OCIDataintegrationDependentObject', 'Get-OCIDataintegrationDependentObjectsList', 'Get-OCIDataintegrationDisApplication', 'Get-OCIDataintegrationDisApplicationDetailedDescription', 'Get-OCIDataintegrationDisApplicationsList', 'Get-OCIDataintegrationDisApplicationTaskRunLineagesList', 'Get-OCIDataintegrationExportRequest', 'Get-OCIDataintegrationExportRequestsList', 'Get-OCIDataintegrationExternalPublication', 'Get-OCIDataintegrationExternalPublicationsList', 'Get-OCIDataintegrationExternalPublicationValidation', 'Get-OCIDataintegrationExternalPublicationValidationsList', 'Get-OCIDataintegrationFolder', 'Get-OCIDataintegrationFoldersList', 'Get-OCIDataintegrationFunctionLibrariesList', 'Get-OCIDataintegrationFunctionLibrary', 'Get-OCIDataintegrationImportRequest', 'Get-OCIDataintegrationImportRequestsList', 'Get-OCIDataintegrationPatch', 'Get-OCIDataintegrationPatchChangesList', 'Get-OCIDataintegrationPatchesList', 'Get-OCIDataintegrationPipeline', 'Get-OCIDataintegrationPipelinesList', 'Get-OCIDataintegrationPipelineValidation', 'Get-OCIDataintegrationPipelineValidationsList', 'Get-OCIDataintegrationProject', 'Get-OCIDataintegrationProjectsList', 'Get-OCIDataintegrationPublishedObject', 'Get-OCIDataintegrationPublishedObjectsList', 'Get-OCIDataintegrationReference', 'Get-OCIDataintegrationReferencesList', 'Get-OCIDataintegrationRuntimeOperator', 'Get-OCIDataintegrationRuntimeOperatorsList', 'Get-OCIDataintegrationRuntimePipeline', 'Get-OCIDataintegrationRuntimePipelinesList', 'Get-OCIDataintegrationSchedule', 'Get-OCIDataintegrationSchedulesList', 'Get-OCIDataintegrationSchema', 'Get-OCIDataintegrationSchemasList', 'Get-OCIDataintegrationTask', 'Get-OCIDataintegrationTaskRun', 'Get-OCIDataintegrationTaskRunLineagesList', 'Get-OCIDataintegrationTaskRunLogsList', 'Get-OCIDataintegrationTaskRunsList', 'Get-OCIDataintegrationTaskSchedule', 'Get-OCIDataintegrationTaskSchedulesList', 'Get-OCIDataintegrationTasksList', 'Get-OCIDataintegrationTaskValidation', 'Get-OCIDataintegrationTaskValidationsList', 'Get-OCIDataintegrationTemplate', 'Get-OCIDataintegrationTemplatesList', 'Get-OCIDataintegrationUserDefinedFunction', 'Get-OCIDataintegrationUserDefinedFunctionsList', 'Get-OCIDataintegrationUserDefinedFunctionValidation', 'Get-OCIDataintegrationUserDefinedFunctionValidationsList', 'Get-OCIDataintegrationWorkRequest', 'Get-OCIDataintegrationWorkRequestErrorsList', 'Get-OCIDataintegrationWorkRequestLogsList', 'Get-OCIDataintegrationWorkRequestsList', 'Get-OCIDataintegrationWorkspace', 'Get-OCIDataintegrationWorkspacesList', 'Move-OCIDataintegrationCompartment', 'Move-OCIDataintegrationDisApplicationCompartment', 'New-OCIDataintegrationApplication', 'New-OCIDataintegrationApplicationDetailedDescription', 'New-OCIDataintegrationConnection', 'New-OCIDataintegrationConnectionValidation', 'New-OCIDataintegrationCopyObjectRequest', 'New-OCIDataintegrationDataAsset', 'New-OCIDataintegrationDataFlow', 'New-OCIDataintegrationDataFlowValidation', 'New-OCIDataintegrationDisApplication', 'New-OCIDataintegrationDisApplicationDetailedDescription', 'New-OCIDataintegrationEntityShape', 'New-OCIDataintegrationExportRequest', 'New-OCIDataintegrationExternalPublication', 'New-OCIDataintegrationExternalPublicationValidation', 'New-OCIDataintegrationFolder', 'New-OCIDataintegrationFunctionLibrary', 'New-OCIDataintegrationImportRequest', 'New-OCIDataintegrationPatch', 'New-OCIDataintegrationPipeline', 'New-OCIDataintegrationPipelineValidation', 'New-OCIDataintegrationProject', 'New-OCIDataintegrationSchedule', 'New-OCIDataintegrationTask', 'New-OCIDataintegrationTaskRun', 'New-OCIDataintegrationTaskSchedule', 'New-OCIDataintegrationTaskValidation', 'New-OCIDataintegrationUserDefinedFunction', 'New-OCIDataintegrationUserDefinedFunctionValidation', 'New-OCIDataintegrationWorkspace', 'Remove-OCIDataintegrationApplication', 'Remove-OCIDataintegrationApplicationDetailedDescription', 'Remove-OCIDataintegrationConnection', 'Remove-OCIDataintegrationConnectionValidation', 'Remove-OCIDataintegrationCopyObjectRequest', 'Remove-OCIDataintegrationDataAsset', 'Remove-OCIDataintegrationDataFlow', 'Remove-OCIDataintegrationDataFlowValidation', 'Remove-OCIDataintegrationDisApplication', 'Remove-OCIDataintegrationDisApplicationDetailedDescription', 'Remove-OCIDataintegrationExportRequest', 'Remove-OCIDataintegrationExternalPublication', 'Remove-OCIDataintegrationExternalPublicationValidation', 'Remove-OCIDataintegrationFolder', 'Remove-OCIDataintegrationFunctionLibrary', 'Remove-OCIDataintegrationImportRequest', 'Remove-OCIDataintegrationPatch', 'Remove-OCIDataintegrationPipeline', 'Remove-OCIDataintegrationPipelineValidation', 'Remove-OCIDataintegrationProject', 'Remove-OCIDataintegrationSchedule', 'Remove-OCIDataintegrationTask', 'Remove-OCIDataintegrationTaskRun', 'Remove-OCIDataintegrationTaskSchedule', 'Remove-OCIDataintegrationTaskValidation', 'Remove-OCIDataintegrationUserDefinedFunction', 'Remove-OCIDataintegrationUserDefinedFunctionValidation', 'Remove-OCIDataintegrationWorkspace', 'Start-OCIDataintegrationWorkspace', 'Stop-OCIDataintegrationWorkspace', 'Update-OCIDataintegrationApplication', 'Update-OCIDataintegrationApplicationDetailedDescription', 'Update-OCIDataintegrationConnection', 'Update-OCIDataintegrationCopyObjectRequest', 'Update-OCIDataintegrationDataAsset', 'Update-OCIDataintegrationDataFlow', 'Update-OCIDataintegrationDisApplication', 'Update-OCIDataintegrationDisApplicationDetailedDescription', 'Update-OCIDataintegrationExportRequest', 'Update-OCIDataintegrationExternalPublication', 'Update-OCIDataintegrationFolder', 'Update-OCIDataintegrationFunctionLibrary', 'Update-OCIDataintegrationImportRequest', 'Update-OCIDataintegrationPipeline', 'Update-OCIDataintegrationProject', 'Update-OCIDataintegrationReference', 'Update-OCIDataintegrationSchedule', 'Update-OCIDataintegrationTask', 'Update-OCIDataintegrationTaskRun', 'Update-OCIDataintegrationTaskSchedule', 'Update-OCIDataintegrationUserDefinedFunction', 'Update-OCIDataintegrationWorkspace' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataintegration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_29_12.ps1
sample_29_12.ps1
# # Module manifest for module 'OCI.PSModules.Resourcemanager' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Resourcemanager.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '73e0f641-602c-4457-9e79-f05b84ced282' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Resourcemanager Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcemanager.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIResourcemanagerConfigurationSourceProvider', 'Get-OCIResourcemanagerConfigurationSourceProvidersList', 'Get-OCIResourcemanagerJob', 'Get-OCIResourcemanagerJobAssociatedResourcesList', 'Get-OCIResourcemanagerJobDetailedLogContent', 'Get-OCIResourcemanagerJobLogs', 'Get-OCIResourcemanagerJobLogsContent', 'Get-OCIResourcemanagerJobOutputsList', 'Get-OCIResourcemanagerJobsList', 'Get-OCIResourcemanagerJobTfConfig', 'Get-OCIResourcemanagerJobTfPlan', 'Get-OCIResourcemanagerJobTfState', 'Get-OCIResourcemanagerPrivateEndpoint', 'Get-OCIResourcemanagerPrivateEndpointsList', 'Get-OCIResourcemanagerReachableIp', 'Get-OCIResourcemanagerResourceDiscoveryServicesList', 'Get-OCIResourcemanagerStack', 'Get-OCIResourcemanagerStackAssociatedResourcesList', 'Get-OCIResourcemanagerStackResourceDriftDetailsList', 'Get-OCIResourcemanagerStacksList', 'Get-OCIResourcemanagerStackTfConfig', 'Get-OCIResourcemanagerStackTfState', 'Get-OCIResourcemanagerTemplate', 'Get-OCIResourcemanagerTemplateCategoriesList', 'Get-OCIResourcemanagerTemplateLogo', 'Get-OCIResourcemanagerTemplatesList', 'Get-OCIResourcemanagerTemplateTfConfig', 'Get-OCIResourcemanagerTerraformVersionsList', 'Get-OCIResourcemanagerWorkRequest', 'Get-OCIResourcemanagerWorkRequestErrorsList', 'Get-OCIResourcemanagerWorkRequestLogsList', 'Get-OCIResourcemanagerWorkRequestsList', 'Invoke-OCIResourcemanagerDetectStackDrift', 'Move-OCIResourcemanagerConfigurationSourceProviderCompartment', 'Move-OCIResourcemanagerPrivateEndpointCompartment', 'Move-OCIResourcemanagerStackCompartment', 'Move-OCIResourcemanagerTemplateCompartment', 'New-OCIResourcemanagerConfigurationSourceProvider', 'New-OCIResourcemanagerJob', 'New-OCIResourcemanagerPrivateEndpoint', 'New-OCIResourcemanagerStack', 'New-OCIResourcemanagerTemplate', 'Remove-OCIResourcemanagerConfigurationSourceProvider', 'Remove-OCIResourcemanagerPrivateEndpoint', 'Remove-OCIResourcemanagerStack', 'Remove-OCIResourcemanagerTemplate', 'Stop-OCIResourcemanagerJob', 'Update-OCIResourcemanagerConfigurationSourceProvider', 'Update-OCIResourcemanagerJob', 'Update-OCIResourcemanagerPrivateEndpoint', 'Update-OCIResourcemanagerStack', 'Update-OCIResourcemanagerTemplate' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcemanager' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_55_18.ps1
sample_55_18.ps1
function PSConsoleHostReadLine { Microsoft.PowerShell.Core\Set-StrictMode -Off [Microsoft.PowerShell.PSConsoleReadLine]::ReadLine($host.Runspace, $ExecutionContext) } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD/yRWgb1v9cAF2 # Fgsa5s1DKnPsG+9RpMttigLBfuGUKqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAt9WRKOrJpbVifN0+CNmTKO # 6Uw1noM98dTqLXTOiQBqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALx3TiQNsp+DXTqDmzrFVZrasYU1QQYl5rthDgHrxOjfq5v+SZ8pqADyq # s/+q1kjL5OAnUuAo9nYXCr8kIGJ8GoVXC4rVaahNjuQfSvcVsbPIYXgIW1WubN4E # CObN+03qwygkl7TP/bZMheBOrLagW/geh1QFPQlQMliQubNKA+MCHGltwz1pt4PM # bwas5Uj8Rdt1CBrkihFgh1U7Gtfn9V7ONq3g1FKuxK9rXjI0KQNh69XVu8wLYHy6 # PJLWzXIETIw6DiJaySkV9Wfo6+Z9DCuHE/rDGbSLw+fD1BTph8pPIetHuPOQc6Yx # jcTY3Pvs3LxP7ViNtJ3xthJs/Gkj56GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD0VJ/jqzHCYxkTO1Zn3fZoNDzBb10pWkIvOhji+U/1gAIGZmrksMRW # GBMyMDI0MDcxMTIxMjQzNC40NzZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ # Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 # tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 # akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq # dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 # EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 # /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 # 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE # blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S # bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ # wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul # IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC # pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn # HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 # ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn # LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi # DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ # uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb # n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe # GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B # 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv # KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 # gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz # cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6jpK4DAiGA8yMDI0MDcxMTEyMTMy # MFoYDzIwMjQwNzEyMTIxMzIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqOkrg # AgEAMAoCAQACAhPNAgH/MAcCAQACAhU8MAoCBQDqO5xgAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBACBnRqYczTDGn2DNLC92/HW4J7iO0wy6k6f086j0UWeY # cKjyBzr8qONV7U7U+2YXsh7Iwoz3Mdwq72bsyspGY/Qbn/Qu/R6yGiuc8lJo/1sQ # MnfhbsPFHYg5eSWXAzzjGoexPhP+QtCPUFq/9G1qDP7pNTdR8nNTjMi0an5N/8LJ # YvVC3M5BFLYDKpeqMG2XVbLRNRfRYikBLYwQ2eRkj++VeR9gGF4rsx0RDzXXwuek # CFq7VWJYez8+6WwtwE7UsxAqkKS4BNojp6wawVQJ8dVjDO+a2h3wfktFXSzSvOpW # d/+3Nvt0jBGBxiHyu2EbTGbuIxIRexAnBNKNuc5g2q4xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB # 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCsRPNBFISZr2FMvLlMjcTU0PgsMreKCJdxR2Z3lk7r # bTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE # X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgx8FBQVZ1ON/YKQ3E0c9NQYID # RYVXpX6utybo891g/2EwDQYJKoZIhvcNAQELBQAEggIALyNjXSoD2fE8G7iT9lRR # rvEeZ4Tbl8oxMvLRgNfySV+7m1XQm+5RzGdOjxWXMeDXhEri4Kckp20Yl+lBQnxP # AJvhyny0EPkvZl9NYo1giVNf+mTJzDYItl2uQH7YNKZcSz9iZtuhL6BGwXbOq+Jw # uefTzNc/7OP1/aI0UaNzWqJhdN/QWNa8mD/H1Tx7Xd8VXAhrsQA1GbW77ykOYrr4 # 7gZj0K8qjLE0GxRf/sx6rqQK3M8Va7Y7KI1xbybLg/PG4qtf0RznY9lgvRkfMupz # dAqSNxat02/f6v/e89gQmxGxF74NGI14nUZq3t+4yZwlaQ28yd4lGCnjTCqrK0me # RWe0iB0D4TmqPs0tltn4qBbPdjNriI1mr5UcAXNQ54dswoqrixDBelYcmXy6Buou # OeT8NKTcRbx2gU8kTfpIiYY3Er9aKh0cGBv2JZos56ilJbDXMHD/IIiBcsWxMGwc # QkPrwixI/1UgbgRaV5jjj1kIUex5aFG8rxPwS8pAs+j4CIYvEhQ03XLbl2iiDkic # EP15KFyzpWeoKebE3F8jcmFi5fzc/Gh1o0/NDIFUW44WOOq4tGS6tYex44Et8fBO # Ts8IOKsxKGGWasw7Gd4PuJFEuC13O0KS5+orYzlu+S3C1ZL7vvw75X9E/Dequ/z5 # CwTc4fv14hkWDihkatXyJDY= # SIG # End signature block
combined_dataset/train/non-malicious/2690.ps1
2690.ps1
function Register-ProcessModuleTrace { [CmdletBinding()] Param () if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')) { throw 'You must run this cmdlet from an elevated PowerShell session.' } $ModuleLoadedAction = { $Event = $EventArgs.NewEvent $ModuleInfo = @{ TimeCreated = [DateTime]::FromFileTime($Event.TIME_CREATED) ProcessId = $Event.ProcessId FileName = $Event.FileName ImageBase = $Event.ImageBase ImageSize = $Event.ImageSize } $ModuleObject = New-Object PSObject -Property $ModuleInfo $ModuleObject.PSObject.TypeNames[0] = 'LOADED_MODULE' $ModuleObject } Register-WmiEvent 'Win32_ModuleLoadTrace' -SourceIdentifier 'ModuleLoaded' -Action $ModuleLoadedAction } function Get-ProcessModuleTrace { $Events = Get-EventSubscriber -SourceIdentifier 'ModuleLoaded' -ErrorVariable NoEventRegistered -ErrorAction SilentlyContinue if ($NoEventRegistered) { throw 'You must execute Register-ProcessModuleTrace before you can retrieve a loaded module list' } $Events.Action.Output } function Unregister-ProcessModuleTrace { Unregister-Event -SourceIdentifier 'ModuleLoaded' }
combined_dataset/train/non-malicious/2811.ps1
2811.ps1
if (Get-Command logparser.exe) { $lpquery = @" SELECT COUNT(ImagePath, LaunchString, Publisher) as ct, ImagePath, LaunchString FROM *autorunsc.tsv WHERE (ImagePath not like 'File not found%') GROUP BY ImagePath, LaunchString ORDER BY ct ASC "@ & logparser -stats:off -i:csv -dtlines:0 -fixedsep:on -rtp:-1 "$lpquery" } else { $ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName) "${ScriptName} requires logparser.exe in the path." }
combined_dataset/train/non-malicious/1612.ps1
1612.ps1
function Get-PrinterClients { Param ( [string]$comp = $env:COMPUTERNAME ) if (!$comp) { throw 'No comp.' } $ping = New-Object System.Net.NetworkInformation.Ping try { $result = $ping.Send($comp) } catch { $result = $null } if ($result.Status -eq 'Success') { $reg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('Users', $comp) [string[]]$users = $reg.GetSubKeyNames() | ? {$_ -match '-\d{5}$'} foreach ($user in $users) { try { $printers = $reg.OpenSubKey("$user\printers\connections").GetSubKeyNames() } catch { $printers = '-' } if ($printers -ne '-') { $printers = @($printers | % {$_.Substring(2).Replace(',', '\').ToUpper()} | select -Unique) -join '; ' } [pscustomobject]@{ Computer = $comp IP = $result.Address.ToString() User = ([System.Security.Principal.SecurityIdentifier]($user)).Translate([System.Security.Principal.NTAccount]).Value Printer = $printers } } } else { [pscustomobject]@{ Computer = $comp IP = '-' User = '-' Printer = '-' } } }
combined_dataset/train/non-malicious/Get-Parameter function.ps1
Get-Parameter function.ps1
function Get-Parameters { param([string]$CommandName, [switch]$IncludeCommon) try { $command = get-command $commandname $parameters = (new-object System.Management.Automation.CommandMetaData $command, $includecommon).Parameters $parameters.getenumerator() # unroll dictionary } catch { write-warning "Could not find command or obtain parameters for $commandname" } }
combined_dataset/train/non-malicious/2353.ps1
2353.ps1
$error.PSBase.Clear() $aRegRoots = @('HKCU\Software','HKLM\System','HKLM\Software'); $aGpos = Get-Gpo -All; $aUniqueSettings = @(); $aUniqueDups = @(); function findRegValues($sName,$sId,$sKeyPath,$aKeyPathHistory = $null) { $aPath = Get-GPRegistryValue -GUID $sId -Key $sKeyPath -ErrorAction 'silentlycontinue' $aKeyPathHistory = @(); foreach ($oKeyPath in $aPath) { if ($oKeyPath) { if (Test-Member $oKeyPath Value) { if ($aKeyPathHistory -notcontains $oKeyPath.FullKeyPath) { $o = New-Object System.Object; $o | Add-Member -type NoteProperty -Name 'GUID' -Value $sId; $o | Add-Member -type NoteProperty -Name 'Name' -Value $sName; $o | Add-Member -type NoteProperty -Name 'Key' -Value $sKeyPath; $o | Add-Member -type NoteProperty -Name 'Value' -Value $oKeyPath.Value; if ($aUniqueSettings -notcontains "$sKeyPath|$($oKeyPath.Value)") { $aUniqueSettings += "$sKeyPath|$($oKeyPath.Value)"; } elseif ($aUniqueDups -notcontains "$sKeyPath|$($oKeyPath.Value)") { "$sName|$sKeyPath|$($oKeyPath.Value)"; $aUniqueDups += "$sKeyPath|$($oKeyPath.Value)"; } } } elseif (Test-Member $oKeyPath FullKeyPath) { $aKeyPathHistory += $oKeyPath.FullKeyPath; findRegValues $sName $sId $oKeyPath.FullKeyPath $aKeyPathHistory } } } } $aRegValues = @(); foreach ($oGpo in $aGpos) { $sGuid = $oGpo.Id; $sName = $oGpo.DisplayName; foreach ($sRegRoot in $aRegRoots) { findRegValues $sName $sGuid $sRegRoot } }
combined_dataset/train/non-malicious/sample_32_2.ps1
sample_32_2.ps1
# # Module manifest for module 'OCI.PSModules.Streaming' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Streaming.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ff4a80d2-3354-4a6a-a142-89663068a2ac' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Streaming Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Streaming.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIStreamingConnectHarness', 'Get-OCIStreamingConnectHarnessesList', 'Get-OCIStreamingGroup', 'Get-OCIStreamingMessages', 'Get-OCIStreamingStream', 'Get-OCIStreamingStreamPool', 'Get-OCIStreamingStreamPoolsList', 'Get-OCIStreamingStreamsList', 'Invoke-OCIStreamingConsumerCommit', 'Invoke-OCIStreamingConsumerHeartbeat', 'Move-OCIStreamingConnectHarnessCompartment', 'Move-OCIStreamingStreamCompartment', 'Move-OCIStreamingStreamPoolCompartment', 'New-OCIStreamingConnectHarness', 'New-OCIStreamingCursor', 'New-OCIStreamingGroupCursor', 'New-OCIStreamingStream', 'New-OCIStreamingStreamPool', 'Remove-OCIStreamingConnectHarness', 'Remove-OCIStreamingStream', 'Remove-OCIStreamingStreamPool', 'Update-OCIStreamingConnectHarness', 'Update-OCIStreamingGroup', 'Update-OCIStreamingStream', 'Update-OCIStreamingStreamPool', 'Write-OCIStreamingMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Streaming' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3905.ps1
3905.ps1
function Test-JobScheduleCRUD { $context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext $jsId1 = "jobSchedule1" $jsId2 = "jobSchedule2" try { $jobSpec1 = New-Object Microsoft.Azure.Commands.Batch.Models.PSJobSpecification $jobSpec1.PoolInformation = New-Object Microsoft.Azure.Commands.Batch.Models.PSPoolInformation $jobSpec1.PoolInformation.PoolId = "testPool" $schedule1 = New-Object Microsoft.Azure.Commands.Batch.Models.PSSchedule New-AzBatchJobSchedule -Id $jsId1 -JobSpecification $jobSpec1 -Schedule $schedule1 -BatchContext $context $jobSpec2 = New-Object Microsoft.Azure.Commands.Batch.Models.PSJobSpecification $jobSpec2.PoolInformation = New-Object Microsoft.Azure.Commands.Batch.Models.PSPoolInformation $jobSpec2.PoolInformation.PoolId = "testPool2" $schedule2 = New-Object Microsoft.Azure.Commands.Batch.Models.PSSchedule $schedule2.DoNotRunUntil = New-Object System.DateTime -ArgumentList @(2020, 01, 01, 12, 30, 0) New-AzBatchJobSchedule -Id $jsId2 -JobSpecification $jobSpec2 -Schedule $schedule2 -BatchContext $context $jobSchedules = Get-AzBatchJobSchedule -Filter "id eq '$jsId1' or id eq '$jsId2'" -BatchContext $context $jobSchedule1 = $jobSchedules | Where-Object { $_.Id -eq $jsId1 } $jobSchedule2 = $jobSchedules | Where-Object { $_.Id -eq $jsId2 } Assert-NotNull $jobSchedule1 Assert-NotNull $jobSchedule2 $jobSchedule2.Schedule.DoNotRunUntil = $newDoNotRunUntil = New-Object System.DateTime -ArgumentList @(2025, 01, 01, 12, 30, 0) $jobSchedule2 | Set-AzBatchJobSchedule -BatchContext $context $updatedJobSchedule = Get-AzBatchJobSchedule -Id $jsId2 -BatchContext $context Assert-AreEqual $newDoNotRunUntil $updatedJobSchedule.Schedule.DoNotRunUntil } finally { Remove-AzBatchJobSchedule -Id $jsId1 -Force -BatchContext $context Remove-AzBatchJobSchedule -Id $jsId2 -Force -BatchContext $context foreach ($js in Get-AzBatchJobSchedule -BatchContext $context) { Assert-True { ($js.Id -ne $jsId1 -and $js.Id -ne $jsId2) -or ($js.State.ToString().ToLower() -eq 'deleting') } } } } function Test-DisableEnableTerminateJobSchedule { param([string]$jobScheduleId) $context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext Disable-AzBatchJobSchedule $jobScheduleId -BatchContext $context $jobSchedule = Get-AzBatchJobSchedule $jobScheduleId -BatchContext $context Assert-AreEqual 'Disabled' $jobSchedule.State $jobSchedule | Enable-AzBatchJobSchedule -BatchContext $context $jobSchedule = Get-AzBatchJobSchedule -Filter "id eq '$jobScheduleId'" -BatchContext $context Assert-AreEqual 'Active' $jobSchedule.State $jobSchedule | Stop-AzBatchJobSchedule -BatchContext $context $jobSchedule = Get-AzBatchJobSchedule $jobScheduleId -BatchContext $context Assert-True { ($jobSchedule.State.ToString().ToLower() -eq 'terminating') -or ($jobSchedule.State.ToString().ToLower() -eq 'completed') } }
combined_dataset/train/non-malicious/LibraryChart_4.ps1
LibraryChart_4.ps1
# --------------------------------------------------------------------------- ### <Script> ### <Author> ### Chad Miller ### </Author> ### <Description> ### Defines functions for wokring with Microsoft Chart Control for .NET 3.5 Framework ### Pipe output of Powershell command to Out-Chart function and specify chart type ### Chart will display in form or save to image file ### Real-time charts are supported by passing in a script block ### My thanks to Richard MacDonald for his wonderful post on Charting with PowerShell ### http://blogs.technet.com/richard_macdonald/archive/2009/04/28/3231887.aspx ### Note: Requires NET Framework 3.5 and Microsoft Chart Controls for Microsoft .NET Framework 3.5 ### </Description> ### <Usage> ### . ./LibraryChart.ps1 ### -------------------------- EXAMPLE 1 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' ### ### This command will produce a default column chart ### ### -------------------------- EXAMPLE 2 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -filename 'c:\\users\\u00\\documents\\process.png' ### This command will output the chart to a file ### ### -------------------------- EXAMPLE 3 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -chartType 'Pie' ### ### This command will produce a pie chart ### ### -------------------------- EXAMPLE 4 -------------------------- ### out-chart -xField 'name' -yField 'WS' -scriptBlock {Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 1} -chartType 'line' ### ### This command will produce a real-time line chart ### ### </Usage> ### </Script> # -------------------------------------------------------------------------- [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms.DataVisualization") ####################### function New-Chart { param ([int]$width,[int]$height,[int]$left,[int]$top,$chartTitle) # create chart object $global:Chart = New-object System.Windows.Forms.DataVisualization.Charting.Chart $global:Chart.Width = $width $global:Chart.Height = $height $global:Chart.Left = $left $global:Chart.Top = $top # create a chartarea to draw on and add to chart $chartArea = New-Object System.Windows.Forms.DataVisualization.Charting.ChartArea $global:chart.ChartAreas.Add($chartArea) if ($chartTitle) { [void]$global:Chart.Title.Add($chartTitle) } # change chart area colour $global:Chart.BackColor = [System.Drawing.Color]::Transparent } #New-Chart ####################### function New-BarColumnChart { param ([hashtable]$ht, $chartType='Column', $chartTitle,$xTitle,$yTitle, [int]$width,[int]$height,[int]$left,[int]$top,[bool]$asc) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle $chart.ChartAreas[0].AxisX.Title = $xTitle $chart.ChartAreas[0].AxisY.Title = $yTitle [void]$global:Chart.Series.Add("Data") $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::$chartType if ($asc) { $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Ascending, "Y") } else { $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, "Y") } $global:Chart.Series["Data"]["DrawingStyle"] = "Cylinder" $global:chart.Series["Data"].IsValueShownAsLabel = $true $global:chart.Series["Data"]["LabelStyle"] = "Top" } #New-BarColumnChart ####################### function New-LineChart { param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle [void]$global:Chart.Series.Add("Data") # $global:Chart.Series["Data"].Points.AddXY($(get-date), $($ht.Values)) $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys,$ht.Values) #$global:Chart.Series["Data"].XValueType = [System.Windows.Forms.DataVisualization.Charting.ChartValueType]::Time #$global:Chart.chartAreas[0].AxisX.LabelStyle.Format = "hh:mm:ss" #$global:Chart.chartAreas[0].AxisX.LabelStyle.Interval = 1 #$global:Chart.chartAreas[0].AxisX.LabelStyle.IntervalType = [System.Windows.Forms.DataVisualization.Charting.DateTimeIntervalType]::Seconds $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Line #$global:chart.Series["Data"].IsValueShownAsLabel = $false } #New-LineChart ####################### function New-PieChart { param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle [void]$global:Chart.Series.Add("Data") $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Pie $global:Chart.Series["Data"]["PieLabelStyle"] = "Outside" $global:Chart.Series["Data"]["PieLineColor"] = "Black" #$global:chart.Series["Data"].IsValueShownAsLabel = $true #$global:chart.series["Data"].Label = "#PERCENT{P1}" #$legend = New-object System.Windows.Forms.DataVisualization.Charting.Legend #$global:Chart.Legends.Add($legend) #$Legend.Name = "Default" } #New-PieChart ####################### function Remove-Points { param($name='Data',[int]$maxPoints=200) while ( $global:chart.Series["$name"].Points.Count > $maxPoints ) { $global:chart.Series["$name"].Points.RemoveAT(0) } } #Add-Series ####################### function Out-Form { param($interval,$scriptBlock,$xField,$yField) # display the chart on a form $global:Chart.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right -bor [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Left $Form = New-Object Windows.Forms.Form $Form.Text = 'PowerCharts' $Form.Width = 600 $Form.Height = 600 $Form.controls.add($global:Chart) if ($scriptBlock -is [ScriptBlock]) { if (!($xField -or $yField)) { throw 'xField and yField required with scriptBlock parameter.' } $timer = New-Object System.Windows.Forms.Timer $timer.Interval = $interval $timer.add_Tick({ $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField if ($global:Chart.Series["Data"].ChartTypeName -eq 'Line') { Remove-Points $ht | foreach { $global:Chart.Series["Data"].Points.AddXY($($_.Keys), $($_.Values)) } } else { $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) } $global:chart.ResetAutoValues() $global:chart.Invalidate() }) $timer.Enabled = $true $timer.Start() } $Form.Add_Shown({$Form.Activate()}) $Form.ShowDialog() } #Out-Form ####################### function Out-ImageFile { param($fileName,$fileformat) $global:Chart.SaveImage($fileName,$fileformat) } ####################### ### ConvertTo-Hashtable function based on code by Jeffery Snover ### http://blogs.msdn.com/powershell/archive/2008/11/23/poshboard-and-convertto-hashtable.aspx ####################### function ConvertTo-Hashtable { param([string]$key, $value) Begin { $hash = @{} } Process { $thisKey = $_.$Key $hash.$thisKey = $_.$Value } End { Write-Output $hash } } #ConvertTo-Hashtable ####################### function Out-Chart { param( $xField=$(throw 'Out-Chart:xField is required'), $yField=$(throw 'Out-Chart:yField is required'), $chartType='Column',$chartTitle, [int]$width=500, [int]$height=400, [int]$left=40, [int]$top=30, $filename, $fileformat='png', [int]$interval=1000, $scriptBlock, [switch]$asc ) Begin { $ht = @{} } Process { if ($_) { $thisKey = $_.$xField $ht.$thisKey = $_.$yField } } End { if ($scriptBlock) { $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField } switch ($chartType) { 'Bar' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)} 'Column' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)} 'Pie' {New-PieChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top } 'Line' {New-LineChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top } } if ($filename) { Out-ImageFile $filename $fileformat } elseif ($scriptBlock ) { Out-Form $interval $scriptBlock $xField $yField } else { Out-Form } } } #Out-Chart
combined_dataset/train/non-malicious/sample_21_49.ps1
sample_21_49.ps1
# PowerShell Scripting Best Practices This document is intended as guidance for how all PowerShell scripts should be written for security, functionality, and consistency. To help enforce these rules during your dev process, consider using [PSScriptAnalyzer](https://github.com/PowerShell/PSScriptAnalyzer). Each of the sections below contains the rule code for enabling the corresponding check in PSScriptAnalyzer where one exists. Additionally, the analyzer is built in as a linter in the [PowerShell VSCode extension](https://marketplace.visualstudio.com/items?itemName=ms-vscode.PowerShell). We have created a [settings file](/eng/common/PSScriptAnalyzer.psd1) to be used with this linter. ## Do not use Invoke-Expression or script blocks built with string concatenation *PSScriptAnalyzer Rule: AvoidUsingInvokeExpression* Invoke-Expression and non-parameterized script blocks are both vulnerable to injection. ### Invoke-Expression injection Invoke-Expression executes a specified string, which is vulnerable to injection attacks. As an example: ```powershell $function = "Write-Host" $argument = "hello; Write-Host injected" Invoke-Expression "$function $argument" ``` will return: ```console hello injected ``` While the following script: ```powershell $function = "Write-Host" $argument = "hello; Write-Host injected" & $function $argument ``` will return: ```console hello; Write-Host injected ``` as would be expected. In general, this guidance can be summarized as **don't use Invoke-Expression**. ### Script-block injection Similarly, the following script block is also vulnerable to injection. ```powershell $UserInputVar = "hello; Write-Host injected" $DynamicScript = "Write-Host $UserInputVar" $ScriptBlock = [ScriptBlock]::Create($DynamicScript) Invoke-Command $ScriptBlock ``` This returns: ```console hello injected ``` While this script: ```powershell $UserInputVar = "hello; Write-Host injected" [ScriptBlock]$ScriptBlock = { Param($SafeUserInput) Write-Host $SafeUserInput } Invoke-Command -ScriptBlock $ScriptBlock -ArgumentList @($UserInputVar) ``` correctly outputs: ```console hello; Write-Host injected ``` In general, this guidance can be summarized as **don't use [ScriptBlock]::Create**. ## Prefix script and executable calls with & When a script/executable is prefixed with an ampersand (`&`), the command which follows can be in quotation marks or include variables. This is not the case when the ampersand is not included. Thus, we recommend always including an ampersand. ## Check $LASTEXITCODE after calling Relatedly, `$LASTEXITCODE` should always be checked after running an executable to ensure that the script fails (or at least responds appropriately) to the executable failing. Combining this with the previous piece of advice, the way to call `git add .` from a script would be: ```powershell & git add . if ($LASTEXITCODE -ne 0) { # behavior in case of error } ``` To set it in a PowerShell script, e.g. to ensure a known value at the start of a script, reference the variable in the global scope. ```powershell $global:LASTEXITCODE = 0 ``` ## Set StrictMode and ErrorActionPreference at the top of every file Scripts should always include the following just below the parameter definition block: ```powershell Set-StrictMode -Version 2.0 $ErrorActionPreference = "Stop" ``` This will ensure PowerShell uses the proper version and that encountered errors cause the script to fail. ## Do not use aliases in scripts *PSScriptAnalyzer Rule: AvoidUsingCmdletAliases* Cmdlet aliases (such as `ls` for `Get-ChildItem` and `echo` for `Write-Output`) are not universal across all machines and all installs of PowerShell. Furthermore, aliases can cause confusion as the cmdlets frequently behave entirely differently from the commands the aliases are named for, e.g. cmd's `dir` vs. `Get-ChildItem` or bash's `wget` and `curl` vs. `Invoke-WebRequest`. Always use the actual cmdlet name. To determine what cmdlet an alias points to, simply run: **Exceptions**: `%` and `?` are aliases for `ForEach-Object` and `Where-Object`, respectively. These aliases can be left in code and warnings related to them can be ignored. ```powershell Get-Alias $alias ``` e.g. ```powershell Get-Alias ls ``` returns: ```console CommandType Name Version Source ----------- ---- ------- ------ Alias ls -> Get-ChildItem ``` ## Use CIM cmdlets rather than WMI ones *PSScriptAnalyzer Rule: AvoidUsingWMICmdlet* PowerShell recommends avoiding all the WMI cmdlets (`Get-WmiObject`, `Remove-WmiObject`, `Invoke-WmiObject`, `Register-WmiEvent`, `Set-WmiInstance`) and instead using the CIM ones (respectively, `Get-CimInstance`, `Remove-CimInstance`, `Invoke-CimMethod`, `Register-CimIndicationEvent`, `Set-CimInstance`). ## Disable positional binding for your parameters *PSScriptAnalyzer Rule: AvoidUsingPositionalParameters* Positional parameters cause problems for code maintenance, as adding new parameters later down the line can break previous invocations. Instead, parameters should always be called explicitly. Setting: ```powershell [CmdletBinding(PositionalBinding=$false)] ``` will force this behavior. *Note: This rule will check for the usage of positional parameters rather than forcing binding to turn them off.* <!-- Begin Generated Content: Doc Feedback --> <sub>Was this helpful? [![Yes](https://helix.dot.net/f/ip/5?p=Documentation%5CPolicy%5CPowershellBestPractices.md)](https://helix.dot.net/f/p/5?p=Documentation%5CPolicy%5CPowershellBestPractices.md) [![No](https://helix.dot.net/f/in)](https://helix.dot.net/f/n/5?p=Documentation%5CPolicy%5CPowershellBestPractices.md)</sub> <!-- End Generated Content-->
combined_dataset/train/non-malicious/Function Run-Script.ps1
Function Run-Script.ps1
function Run-Script { if ($psISE.CurrentFile.DisplayName.StartsWith("Untitled")) { return } $script = $psISE.CurrentFile.DisplayName $psISE.CurrentFile.Save() $logfile = "$env:programfiles\\Sea Star Development\\" + "Script Monitor Service\\ScriptMon.txt" #Change to suit. if (!(Test-Path env:\\JobCount)) { $env:JobCount = 1 #This will work across multi Tab sessions. } $number = $env:JobCount.PadLeft(4,'0') $startTime = Get-Date -Format "dd/MM/yyyy HH:mm:ss" $tag = "$startTime [$script] start. --> PSE $($myInvocation.Line)" if (Test-Path $logfile) { $tag | Out-File $logfile -encoding 'Default' -Append } "$startTime [$script] started." Write-EventLog -Logname Scripts -Source Monitor -EntryType Information -EventID 2 -Category 002 -Message "Script Job: $script (PSE$number) started." Invoke-Command -Scriptblock { & "$pwd\\$script" } $endTime = Get-Date -Format "dd/MM/yyyy HH:mm:ss" $tag = "$endTime [$script] ended. --> PSE $($myInvocation.Line)" if (Test-Path $logfile) { $tag | Out-File $logfile -encoding 'Default' -Append } "$endTime [$script] ended." Write-Eventlog -Logname Scripts -Source Monitor -EntryType Information -EventID 1 -Category 001 -Message "Script Job: $script (PSE$number) ended." $env:JobCount = [int]$env:JobCount+1 } $psISE.CurrentPowerShellTab.AddOnsMenu.Submenus.Add("Run Script",{Run-Script}, "Alt+R") | Out-Null
combined_dataset/train/non-malicious/sample_59_4.ps1
sample_59_4.ps1
# # Module manifest for module 'OCI.PSModules.Nosql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Nosql.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6350988d-a08e-4817-bfff-d79172f60809' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Nosql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Nosql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINosqlIndex', 'Get-OCINosqlIndexesList', 'Get-OCINosqlRow', 'Get-OCINosqlTable', 'Get-OCINosqlTablesList', 'Get-OCINosqlTableUsageList', 'Get-OCINosqlWorkRequest', 'Get-OCINosqlWorkRequestErrorsList', 'Get-OCINosqlWorkRequestLogsList', 'Get-OCINosqlWorkRequestsList', 'Invoke-OCINosqlPrepareStatement', 'Invoke-OCINosqlQuery', 'Invoke-OCINosqlSummarizeStatement', 'Move-OCINosqlTableCompartment', 'New-OCINosqlIndex', 'New-OCINosqlReplica', 'New-OCINosqlTable', 'Remove-OCINosqlIndex', 'Remove-OCINosqlReplica', 'Remove-OCINosqlRow', 'Remove-OCINosqlTable', 'Remove-OCINosqlWorkRequest', 'Update-OCINosqlRow', 'Update-OCINosqlTable' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Nosql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-NetworkStatistics_1.ps1
Get-NetworkStatistics_1.ps1
function Get-NetworkStatistics { [OutputType('System.Management.Automation.PSObject')] [CmdletBinding(DefaultParameterSetName='name')] param( [Parameter(Position=0,ValueFromPipeline=$true,ParameterSetName='port')] [System.String]$Port='*', [Parameter(Position=0,ValueFromPipeline=$true,ParameterSetName='name')] [System.String]$ProcessName='*', [Parameter(Position=0,ValueFromPipeline=$true,ParameterSetName='address')] [System.String]$Address='*', [Parameter()] [ValidateSet('*','tcp','udp')] [System.String]$Protocol='*', [Parameter()] [ValidateSet('*','Closed','CloseWait','Closing','DeleteTcb','Established','FinWait1','FinWait2','LastAck','Listen','SynReceived','SynSent','TimeWait','Unknown')] [System.String]$State='*' ) begin { $properties = 'Protocol','LocalAddress','LocalPort' $properties += 'RemoteAddress','RemotePort','State','ProcessName','PID' } process { netstat -ano | Select-String -Pattern '\\s+(TCP|UDP)' | ForEach-Object { $item = $_.line.split(' ',[System.StringSplitOptions]::RemoveEmptyEntries) if($item[1] -notmatch '^\\[::') { if (($la = $item[1] -as [ipaddress]).AddressFamily -eq 'InterNetworkV6') { $localAddress = $la.IPAddressToString $localPort = $item[1].split('\\]:')[-1] } else { $localAddress = $item[1].split(':')[0] $localPort = $item[1].split(':')[-1] } if (($ra = $item[2] -as [ipaddress]).AddressFamily -eq 'InterNetworkV6') { $remoteAddress = $ra.IPAddressToString $remotePort = $item[2].split('\\]:')[-1] } else { $remoteAddress = $item[2].split(':')[0] $remotePort = $item[2].split(':')[-1] } $procId = $item[-1] $procName = (Get-Process -Id $item[-1] -ErrorAction SilentlyContinue).Name $proto = $item[0] $status = if($item[0] -eq 'tcp') {$item[3]} else {$null} $pso = New-Object -TypeName PSObject -Property @{ PID = $procId ProcessName = $procName Protocol = $proto LocalAddress = $localAddress LocalPort = $localPort RemoteAddress =$remoteAddress RemotePort = $remotePort State = $status } | Select-Object -Property $properties if($PSCmdlet.ParameterSetName -eq 'port') { if($pso.RemotePort -like $Port -or $pso.LocalPort -like $Port) { if($pso.Protocol -like $Protocol -and $pso.State -like $State) { $pso } } } if($PSCmdlet.ParameterSetName -eq 'address') { if($pso.RemoteAddress -like $Address -or $pso.LocalAddress -like $Address) { if($pso.Protocol -like $Protocol -and $pso.State -like $State) { $pso } } } if($PSCmdlet.ParameterSetName -eq 'name') { if($pso.ProcessName -like $ProcessName) { if($pso.Protocol -like $Protocol -and $pso.State -like $State) { $pso } } } } } } <# .SYNOPSIS Displays the current TCP/IP connections. .DESCRIPTION Displays active TCP connections and includes the process ID (PID) and Name for each connection. If the port is not yet established, the port number is shown as an asterisk (*). .PARAMETER ProcessName Gets connections by the name of the process. The default value is '*'. .PARAMETER Port The port number of the local computer or remote computer. The default value is '*'. .PARAMETER Address Gets connections by the IP address of the connection, local or remote. Wildcard is supported. The default value is '*'. .PARAMETER Protocol The name of the protocol (TCP or UDP). The default value is '*' (all) .PARAMETER State Indicates the state of a TCP connection. The possible states are as follows: Closed - The TCP connection is closed. CloseWait - The local endpoint of the TCP connection is waiting for a connection termination request from the local user. Closing - The local endpoint of the TCP connection is waiting for an acknowledgement of the connection termination request sent previously. DeleteTcb - The transmission control buffer (TCB) for the TCP connection is being deleted. Established - The TCP handshake is complete. The connection has been established and data can be sent. FinWait1 - The local endpoint of the TCP connection is waiting for a connection termination request from the remote endpoint or for an acknowledgement of the connection termination request sent previously. FinWait2 - The local endpoint of the TCP connection is waiting for a connection termination request from the remote endpoint. LastAck - The local endpoint of the TCP connection is waiting for the final acknowledgement of the connection termination request sent previously. Listen - The local endpoint of the TCP connection is listening for a connection request from any remote endpoint. SynReceived - The local endpoint of the TCP connection has sent and received a connection request and is waiting for an acknowledgment. SynSent - The local endpoint of the TCP connection has sent the remote endpoint a segment header with the synchronize (SYN) control bit set and is waiting for a matching connection request. TimeWait - The local endpoint of the TCP connection is waiting for enough time to pass to ensure that the remote endpoint received the acknowledgement of its connection termination request. Unknown - The TCP connection state is unknown. Values are based on the TcpState Enumeration: http://msdn.microsoft.com/en-us/library/system.net.networkinformation.tcpstate%28VS.85%29.aspx .EXAMPLE Get-NetworkStatistics .EXAMPLE Get-NetworkStatistics iexplore .EXAMPLE Get-NetworkStatistics -ProcessName md* -Protocol tcp .EXAMPLE Get-NetworkStatistics -Address 192* -State LISTENING .EXAMPLE Get-NetworkStatistics -State LISTENING -Protocol tcp .OUTPUTS System.Management.Automation.PSObject .NOTES Author: Shay Levy Blog : http://PowerShay.com #> } help Get-NetworkStatistics
combined_dataset/train/non-malicious/320.ps1
320.ps1
function Register-PSFMessageTransform { [CmdletBinding(PositionalBinding = $false, HelpUri = 'https://psframework.org/documentation/commands/PSFramework/Register-PSFMessageTransform')] Param ( [Parameter(Mandatory = $true, ParameterSetName = "Target")] [string] $TargetType, [Parameter(Mandatory = $true, ParameterSetName = "Exception")] [string] $ExceptionType, [Parameter(Mandatory = $true)] [ScriptBlock] $ScriptBlock, [Parameter(Mandatory = $true, ParameterSetName = "TargetFilter")] [string] $TargetTypeFilter, [Parameter(Mandatory = $true, ParameterSetName = "ExceptionFilter")] [string] $ExceptionTypeFilter, [Parameter(ParameterSetName = "TargetFilter")] [Parameter(ParameterSetName = "ExceptionFilter")] $FunctionNameFilter = "*", [Parameter(ParameterSetName = "TargetFilter")] [Parameter(ParameterSetName = "ExceptionFilter")] $ModuleNameFilter = "*" ) process { if ($TargetType) { [PSFramework.Message.MessageHost]::TargetTransforms[$TargetType.ToLower()] = $ScriptBlock } if ($ExceptionType) { [PSFramework.Message.MessageHost]::ExceptionTransforms[$ExceptionType.ToLower()] = $ScriptBlock } if ($TargetTypeFilter) { $condition = New-Object PSFramework.Message.TransformCondition($TargetTypeFilter, $ModuleNameFilter, $FunctionNameFilter, $ScriptBlock, "Target") [PSFramework.Message.MessageHost]::TargetTransformList.Add($condition) } if ($ExceptionTypeFilter) { $condition = New-Object PSFramework.Message.TransformCondition($ExceptionTypeFilter, $ModuleNameFilter, $FunctionNameFilter, $ScriptBlock, "Exception") [PSFramework.Message.MessageHost]::ExceptionTransformList.Add($condition) } } }
combined_dataset/train/non-malicious/sample_23_59.ps1
sample_23_59.ps1
[CmdletBinding()] param ( [Parameter(Mandatory, ValueFromPipeline,ValueFromPipelineByPropertyName)] [Alias("Fullname")] [String]$FileName ) return git log -n 1 --pretty=format:%H -- $filename # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBY5f7atEYJoP+P # 1W8bv1kCXB/5O06VW6Kx8a57PSq6zKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHqdefsAKcUsqvI3yE8phrg6 # +vateu8qeo9iTj5QZ7RDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAngXTjHgt+bbZ/plDmnttdtRYn4S0o1OZH8lMwmuUYsAteqCePoApI+nd # uvQkXcwRrTmYDbQQ2gu+txz3nEGYG+zUw8RUn6ZP2nlWyyyW7Un0imSWFardI2g3 # q2T1WhFR6V8T9KGGuF9wRSso8vnmKVIWpzEEVWZDUg2g5/myYzaVQRy4RmvCyOgD # E1LD0w4XlIIObDSKE1vriSIyxRDL3g3vsWBzVjoc3p+Di5+ecv3jH3xCkX8j6hn0 # PUWioEp7x+B2zTrKm0UXyplVzLDsIFHT6+2mvmtjbi48WiyIzK3RC5U6tL/73wxJ # Mi6h84CdoaUwMylSXi7SqP9xOeGub6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDWkqk9GdurjfGxLr5CYBAjOdkr5jPmrnOoMR/7Kjhx5AIGZc33zOcA # GBMyMDI0MDIyMjE4NTc0Mi43ODdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6YGwKDAiGA8yMDI0MDIyMjExMzYw # OFoYDzIwMjQwMjIzMTEzNjA4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpgbAo # AgEAMAoCAQACAgfpAgH/MAcCAQACAhP0MAoCBQDpgwGoAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBACVgoHN2u3KVKNn7Th7hv+GE8f0uORP/w3FTlsQtK8jC # 3uZt28h81kH8huCtviaVzgDg8v2kv3TCypfejz574GszBNgIhKtlKU6ISl4PQAMY # iXs1uhadGqNnzC1YsqTVGj67h7kxWgVKOGMTQ6O/TuhfLdbNUH8uCxLSGa1w+C4r # lq8FV+SZgfr4iz7eRURfmQAbj3RNju0ETAoUaiNNEYW2qoRiaMARApTmom1zITji # 6LsQdz2zhrz0/Y9/9jTWo2Gr9JqEwEuGJ8o9p7ieevPEUd9z+ySj0rsJGjSb1DU7 # RX7Be3FSB69LPyDCMU7J0lHqy4hlKzaHhT8MgCfTPoUxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB # 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDrj9PyGA0/fnjWudLX0/ReFYuoj9HSIjfigjefLz1w # NTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4 # riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgYo9pmXWo2BHY4PZcjTibHKUG # eweMMf0J5uuyTrB7PlowDQYJKoZIhvcNAQELBQAEggIAm1+Byh12MrkgdPcW/oYj # nvekQ9Mt6X2A5ZcXon1zVTQW6D46NY/2ymKx3Y4ucCkFuXls7955AjjPiTLdgCvv # 8IP4MKY/H+YBRWhXOVJBlwY3VBGv97RZrB2ErAoleq/wn8v6GEfwr/rzNky7yT+A # C3XusakJycVceTXEaqV3soCpqd5MZncWUeoGJLH7tS1tfJhjhUlrO17j9QnnBZW/ # zQDxU+HzdnDxO0YI7QMVEp2X/rqSLu+rV5KfkzsTQfJIdL4nN+FlxRCP8lZctjGb # K6n/T6G1aTeFb+9Sxm7azs+y+0Fq5KgXutY7TvO5BiFxZ+weVFOvFhOr7v8PypYj # wkuYt41AWH5nHPIoIExY+Q2cih+jFqGgpTElKK85u8V+5ANIvB8U43YB3w0NBeCC # 10aVxpJ2JMyUipVtuOjURdI/9pu3Rsp3AqXuXAYaiJqNvK7XTmccHhudTeGy5Ap2 # xy9N4GUHJJOpyo6KwF9y59YIhzmqSCNCae1rTjFD8VEqTi3fj3G1dibfBllIyy6Q # UOlShBnQYnUg9qDOWrvnyzjcu6r9eiAypH1KqBlSUg25f79AoojMaJ1dxwSXL39n # APVBTBKToGJD2GT18rx3BJ8iqY62RqW4oimt/vaCzSxLb2XYftjvsHXHZRjt6x2v # ugl6a2GtzlTBEbl0yHONVj0= # SIG # End signature block
combined_dataset/train/non-malicious/4070.ps1
4070.ps1
Clear-Host $Global:OS $Global:RelativePath $FileLoc = "C:\Program Files\Autodesk\Revit 2013\Program\" $DLL_01 = "RS.Common.ClientServer.Proxy" $DLL_02 = "DataStorageClient" $DLL_03 = "DesktopMFC" $DLL_04 = "FamilyDB" $DLL_05 = "GeomUtil" $DLL_06 = "Graphics" $DLL_07 = "GrphOGS3" $DLL_08 = "CommandServiceClient" $DLL_09 = "RS.Common.ClientServer.Proxy" Function GetRelativePath{ $Global:RelativePath=(split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\" Write-Host $Global:RelativePath } Function GetOSArchitecture{ $Global:OS=Get-WMIObject win32_operatingsystem } GetRelativePath GetOSArchitecture If ($Global:OS.OSArchitecture -eq "64-bit"){ If ((Test-Path -Path $FileLoc$DLL_01".dll") -eq $true){ Copy-Item -Path $FileLoc$DLL_01".dll" -Destination $FileLoc$DLL_01".orig" -Force Remove-Item -Path $FileLoc$DLL_01".dll" -Force Copy-Item -Path $Global:RelativePath$DLL_01".dll" -Destination $FileLoc -Force } If ((Test-Path -Path $FileLoc$DLL_02".dll") -eq $true){ Copy-Item -Path $FileLoc$DLL_02".dll" -Destination $FileLoc$DLL_02".orig" -Force Remove-Item -Path $FileLoc$DLL_02".dll" -Force Copy-Item -Path $Global:RelativePath$DLL_02".dll" -Destination $FileLoc -Force } If ((Test-Path -Path $FileLoc$DLL_03".dll") -eq $true){ Copy-Item -Path $FileLoc$DLL_03".dll" -Destination $FileLoc$DLL_03".orig" -Force Remove-Item -Path $FileLoc$DLL_03".dll" -Force Copy-Item -Path $Global:RelativePath$DLL_03".dll" -Destination $FileLoc -Force } If ((Test-Path -Path $FileLoc$DLL_04".dll") -eq $true){ Copy-Item -Path $FileLoc$DLL_04".dll" -Destination $FileLoc$DLL_04".orig" -Force Remove-Item -Path $FileLoc$DLL_04".dll" -Force Copy-Item -Path $Global:RelativePath$DLL_04".dll" -Destination $FileLoc -Force } If ((Test-Path -Path $FileLoc$DLL_05".dll") -eq $true){ Copy-Item -Path $FileLoc$DLL_05".dll" -Destination $FileLoc$DLL_05".orig" -Force Remove-Item -Path $FileLoc$DLL_05".dll" -Force Copy-Item -Path $Global:RelativePath$DLL_05".dll" -Destination $FileLoc -Force } If ((Test-Path -Path $FileLoc$DLL_06".dll") -eq $true){ Copy-Item -Path $FileLoc$DLL_06".dll" -Destination $FileLoc$DLL_06".orig" -Force Remove-Item -Path $FileLoc$DLL_06".dll" -Force Copy-Item -Path $Global:RelativePath$DLL_06".dll" -Destination $FileLoc -Force } If ((Test-Path -Path $FileLoc$DLL_07".dll") -eq $true){ Copy-Item -Path $FileLoc$DLL_07".dll" -Destination $FileLoc$DLL_07".orig" -Force Remove-Item -Path $FileLoc$DLL_07".dll" -Force Copy-Item -Path $Global:RelativePath$DLL_07".dll" -Destination $FileLoc -Force } If ((Test-Path -Path $FileLoc"RevitServerToolCommand\"$DLL_08".dll") -eq $true){ Copy-Item -Path $FileLoc"RevitServerToolCommand\"$DLL_08".dll" -Destination $FileLoc"RevitServerToolCommand\"$DLL_08".orig" -Force Remove-Item -Path $FileLoc"RevitServerToolCommand\"$DLL_08".dll" -Force Copy-Item -Path $Global:RelativePath"RevitServerToolCommand\"$DLL_08".dll" -Destination $FileLoc"RevitServerToolCommand\" -Force } If ((Test-Path -Path $FileLoc"RevitServerToolCommand\"$DLL_09".dll") -eq $true){ Copy-Item -Path $FileLoc"RevitServerToolCommand\"$DLL_09".dll" -Destination $FileLoc"RevitServerToolCommand\"$DLL_09".orig" -Force Remove-Item -Path $FileLoc"RevitServerToolCommand\"$DLL_09".dll" -Force Copy-Item -Path $Global:RelativePath"RevitServerToolCommand\"$DLL_09".dll" -Destination $FileLoc"RevitServerToolCommand\" -Force } } Remove-Variable -Name DLL_01 Remove-Variable -Name DLL_02 Remove-Variable -Name DLL_03 Remove-Variable -Name DLL_04 Remove-Variable -Name DLL_05 Remove-Variable -Name DLL_06 Remove-Variable -Name DLL_07 Remove-Variable -Name DLL_08 Remove-Variable -Name DLL_09 Remove-Variable -Name FileLoc Remove-Variable -Name OS Remove-Variable -Name RelativePath
combined_dataset/train/non-malicious/Copy-History.ps1
Copy-History.ps1
##############################################################################\n##\n## Copy-History\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nCopy selected commands from the history buffer into the clipboard as a script.\n\n.EXAMPLE\n\nCopy-History\nCopies the entire contents of the history buffer into the clipboard.\n\n.EXAMPLE\n\nCopy-History -5\nCopies the last five commands into the clipboard.\n\n.EXAMPLE\n\nCopy-History 2,5,8,4\nCopies commands 2,5,8, and 4.\n\n.EXAMPLE\n\nCopy-History (1..10+5+6)\nCopies commands 1 through 10, then 5, then 6, using PowerShell's array\nslicing syntax.\n\n#>\n\nparam(\n ## The range of history IDs to copy\n [int[]] $Range\n)\n\nSet-StrictMode -Version Latest\n\n$history = @()\n\n## If they haven't specified a range, assume it's everything\nif((-not $range) -or ($range.Count -eq 0))\n{\n $history = @(Get-History -Count ([Int16]::MaxValue))\n}\n## If it's a negative number, copy only that many\nelseif(($range.Count -eq 1) -and ($range[0] -lt 0))\n{\n $count = [Math]::Abs($range[0])\n $history = (Get-History -Count $count)\n}\n## Otherwise, go through each history ID in the given range\n## and add it to our history list.\nelse\n{\n foreach($commandId in $range)\n {\n if($commandId -eq -1) { $history += Get-History -Count 1 }\n else { $history += Get-History -Id $commandId }\n }\n}\n\n## Finally, export the history to the clipboard.\n$history | Foreach-Object { $_.CommandLine } | clip.exe
combined_dataset/train/non-malicious/Send-MailMessage.ps1
Send-MailMessage.ps1
##############################################################################\n##\n## Send-MailMessage\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n## Illustrate the techniques used to send an email in PowerShell.\n## In version two, use the Send-MailMessage cmdlet.\n##\n## Example:\n##\n## PS >$body = @"\n## >> Hi from another satisfied customer of The PowerShell Cookbook!\n## >> "@\n## >>\n## PS >$to = "guide_feedback@leeholmes.com"\n## PS >$subject = "Thanks for all of the scripts."\n## PS >$mailHost = "mail.leeholmes.com"\n## PS >Send-MailMessage $to $subject $body $mailHost\n##\n##############################################################################\n\nparam(\n ## The recipient of the mail message\n [string[]] $To = $(throw "Please specify the destination mail address"),\n\n ## The subjecty of the message\n [string] $Subject = "<No Subject>",\n\n ## The body of the message\n [string] $Body = $(throw "Please specify the message content"),\n\n ## The SMTP host that will transmit the message\n [string] $SmtpHost = $(throw "Please specify a mail server."),\n\n ## The sender of the message\n [string] $From = "$($env:UserName)@example.com"\n)\n\n## Create the mail message\n$email = New-Object System.Net.Mail.MailMessage\n\n## Populate its fields\nforeach($mailTo in $to)\n{\n $email.To.Add($mailTo)\n}\n\n$email.From = $from\n$email.Subject = $subject\n$email.Body = $body\n\n## Send the mail\n$client = New-Object System.Net.Mail.SmtpClient $smtpHost\n$client.UseDefaultCredentials = $true\n$client.Send($email)
combined_dataset/train/non-malicious/sample_23_62.ps1
sample_23_62.ps1
# # Module manifest for module 'OCI.PSModules.Loganalytics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loganalytics.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a190d2eb-8d34-45b0-836a-ba4f1b2e1914' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loganalytics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loganalytics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCILoganalyticsEntityAssociation', 'Add-OCILoganalyticsSourceEventTypes', 'Confirm-OCILoganalyticsAssociationParameters', 'Confirm-OCILoganalyticsEndpoint', 'Confirm-OCILoganalyticsFile', 'Confirm-OCILoganalyticsLabelCondition', 'Confirm-OCILoganalyticsSource', 'Confirm-OCILoganalyticsSourceExtendedFieldDetails', 'Confirm-OCILoganalyticsSourceMapping', 'Disable-OCILoganalyticsArchiving', 'Disable-OCILoganalyticsAutoAssociation', 'Disable-OCILoganalyticsIngestTimeRule', 'Disable-OCILoganalyticsSourceEventTypes', 'Enable-OCILoganalyticsArchiving', 'Enable-OCILoganalyticsAutoAssociation', 'Enable-OCILoganalyticsIngestTimeRule', 'Enable-OCILoganalyticsSourceEventTypes', 'Export-OCILoganalyticsCustomContent', 'Export-OCILoganalyticsQueryResult', 'Get-OCILoganalyticsAssociableEntitiesList', 'Get-OCILoganalyticsAssociatedEntitiesList', 'Get-OCILoganalyticsAssociationSummary', 'Get-OCILoganalyticsAutoAssociationsList', 'Get-OCILoganalyticsCategoriesList', 'Get-OCILoganalyticsCategory', 'Get-OCILoganalyticsColumnNames', 'Get-OCILoganalyticsConfigWorkRequest', 'Get-OCILoganalyticsConfigWorkRequestsList', 'Get-OCILoganalyticsEffectivePropertiesList', 'Get-OCILoganalyticsEmBridge', 'Get-OCILoganalyticsEmBridgesList', 'Get-OCILoganalyticsEmBridgeSummary', 'Get-OCILoganalyticsEncryptionKeyInfoList', 'Get-OCILoganalyticsEntitiesList', 'Get-OCILoganalyticsEntitiesSummary', 'Get-OCILoganalyticsEntity', 'Get-OCILoganalyticsEntityAssociationsList', 'Get-OCILoganalyticsEntitySourceAssociationsList', 'Get-OCILoganalyticsEntityTopologyList', 'Get-OCILoganalyticsEntityType', 'Get-OCILoganalyticsEntityTypesList', 'Get-OCILoganalyticsField', 'Get-OCILoganalyticsFieldsList', 'Get-OCILoganalyticsFieldsSummary', 'Get-OCILoganalyticsIngestTimeRule', 'Get-OCILoganalyticsIngestTimeRulesList', 'Get-OCILoganalyticsLabel', 'Get-OCILoganalyticsLabelPrioritiesList', 'Get-OCILoganalyticsLabelsList', 'Get-OCILoganalyticsLabelSourceDetailsList', 'Get-OCILoganalyticsLabelSummary', 'Get-OCILoganalyticsLogGroup', 'Get-OCILoganalyticsLogGroupsList', 'Get-OCILoganalyticsLogGroupsSummary', 'Get-OCILoganalyticsLogSetsCount', 'Get-OCILoganalyticsLogSetsList', 'Get-OCILoganalyticsLookup', 'Get-OCILoganalyticsLookupsList', 'Get-OCILoganalyticsLookupSummary', 'Get-OCILoganalyticsMetaSourceTypesList', 'Get-OCILoganalyticsNamespace', 'Get-OCILoganalyticsNamespacesList', 'Get-OCILoganalyticsObjectCollectionRule', 'Get-OCILoganalyticsObjectCollectionRulesList', 'Get-OCILoganalyticsOverlappingRecallsList', 'Get-OCILoganalyticsParser', 'Get-OCILoganalyticsParserFunctionsList', 'Get-OCILoganalyticsParserMetaPluginsList', 'Get-OCILoganalyticsParsersList', 'Get-OCILoganalyticsParserSummary', 'Get-OCILoganalyticsPreferences', 'Get-OCILoganalyticsPropertiesMetadataList', 'Get-OCILoganalyticsQueryResult', 'Get-OCILoganalyticsQueryWorkRequest', 'Get-OCILoganalyticsQueryWorkRequestsList', 'Get-OCILoganalyticsRecallCount', 'Get-OCILoganalyticsRecalledDataList', 'Get-OCILoganalyticsRecalledDataSize', 'Get-OCILoganalyticsResourceCategoriesList', 'Get-OCILoganalyticsRulesList', 'Get-OCILoganalyticsRulesSummary', 'Get-OCILoganalyticsScheduledTask', 'Get-OCILoganalyticsScheduledTasksList', 'Get-OCILoganalyticsSource', 'Get-OCILoganalyticsSourceAssociationsList', 'Get-OCILoganalyticsSourceEventTypesList', 'Get-OCILoganalyticsSourceExtendedFieldDefinitionsList', 'Get-OCILoganalyticsSourceLabelOperatorsList', 'Get-OCILoganalyticsSourceMetaFunctionsList', 'Get-OCILoganalyticsSourcePatternsList', 'Get-OCILoganalyticsSourcesList', 'Get-OCILoganalyticsSourceSummary', 'Get-OCILoganalyticsStorage', 'Get-OCILoganalyticsStorageUsage', 'Get-OCILoganalyticsStorageWorkRequest', 'Get-OCILoganalyticsStorageWorkRequestErrorsList', 'Get-OCILoganalyticsStorageWorkRequestsList', 'Get-OCILoganalyticsSupportedCharEncodingsList', 'Get-OCILoganalyticsSupportedTimezonesList', 'Get-OCILoganalyticsUnprocessedDataBucket', 'Get-OCILoganalyticsUpload', 'Get-OCILoganalyticsUploadFilesList', 'Get-OCILoganalyticsUploadsList', 'Get-OCILoganalyticsUploadWarningsList', 'Get-OCILoganalyticsWarningsList', 'Get-OCILoganalyticsWorkRequest', 'Get-OCILoganalyticsWorkRequestErrorsList', 'Get-OCILoganalyticsWorkRequestLogsList', 'Get-OCILoganalyticsWorkRequestsList', 'Import-OCILoganalyticsCustomContent', 'Invoke-OCILoganalyticsAppendLookupData', 'Invoke-OCILoganalyticsAssignEncryptionKey', 'Invoke-OCILoganalyticsBatchGetBasicInfo', 'Invoke-OCILoganalyticsClean', 'Invoke-OCILoganalyticsCompareContent', 'Invoke-OCILoganalyticsEstimatePurgeDataSize', 'Invoke-OCILoganalyticsEstimateRecallDataSize', 'Invoke-OCILoganalyticsEstimateReleaseDataSize', 'Invoke-OCILoganalyticsExtractStructuredLogFieldPaths', 'Invoke-OCILoganalyticsExtractStructuredLogHeaderPaths', 'Invoke-OCILoganalyticsFilter', 'Invoke-OCILoganalyticsOffboardNamespace', 'Invoke-OCILoganalyticsOnboardNamespace', 'Invoke-OCILoganalyticsParseQuery', 'Invoke-OCILoganalyticsPauseScheduledTask', 'Invoke-OCILoganalyticsPurgeStorageData', 'Invoke-OCILoganalyticsQuery', 'Invoke-OCILoganalyticsRecallArchivedData', 'Invoke-OCILoganalyticsReleaseRecalledData', 'Invoke-OCILoganalyticsResumeScheduledTask', 'Invoke-OCILoganalyticsRun', 'Invoke-OCILoganalyticsSetUnprocessedDataBucket', 'Invoke-OCILoganalyticsSuggest', 'Invoke-OCILoganalyticsSuppressWarning', 'Invoke-OCILoganalyticsTestParser', 'Invoke-OCILoganalyticsUnsuppressWarning', 'Invoke-OCILoganalyticsUpsertAssociations', 'Invoke-OCILoganalyticsUpsertField', 'Invoke-OCILoganalyticsUpsertLabel', 'Invoke-OCILoganalyticsUpsertParser', 'Invoke-OCILoganalyticsUpsertSource', 'Invoke-OCILoganalyticsVerify', 'Move-OCILoganalyticsEmBridgeCompartment', 'Move-OCILoganalyticsEntityCompartment', 'Move-OCILoganalyticsIngestTimeRuleCompartment', 'Move-OCILoganalyticsLogGroupCompartment', 'Move-OCILoganalyticsObjectCollectionRuleCompartment', 'Move-OCILoganalyticsScheduledTaskCompartment', 'New-OCILoganalyticsEmBridge', 'New-OCILoganalyticsEntity', 'New-OCILoganalyticsEntityType', 'New-OCILoganalyticsIngestTimeRule', 'New-OCILoganalyticsLogGroup', 'New-OCILoganalyticsObjectCollectionRule', 'New-OCILoganalyticsScheduledTask', 'Register-OCILoganalyticsLookup', 'Remove-OCILoganalyticsAssociations', 'Remove-OCILoganalyticsEmBridge', 'Remove-OCILoganalyticsEntity', 'Remove-OCILoganalyticsEntityAssociations', 'Remove-OCILoganalyticsEntityType', 'Remove-OCILoganalyticsField', 'Remove-OCILoganalyticsIngestTimeRule', 'Remove-OCILoganalyticsLabel', 'Remove-OCILoganalyticsLogGroup', 'Remove-OCILoganalyticsLookup', 'Remove-OCILoganalyticsObjectCollectionRule', 'Remove-OCILoganalyticsParser', 'Remove-OCILoganalyticsPreferences', 'Remove-OCILoganalyticsResourceCategories', 'Remove-OCILoganalyticsScheduledTask', 'Remove-OCILoganalyticsSource', 'Remove-OCILoganalyticsSourceEventTypes', 'Remove-OCILoganalyticsUpload', 'Remove-OCILoganalyticsUploadFile', 'Remove-OCILoganalyticsUploadWarning', 'Stop-OCILoganalyticsQueryWorkRequest', 'Update-OCILoganalyticsEmBridge', 'Update-OCILoganalyticsEntity', 'Update-OCILoganalyticsEntityType', 'Update-OCILoganalyticsIngestTimeRule', 'Update-OCILoganalyticsLogGroup', 'Update-OCILoganalyticsLookup', 'Update-OCILoganalyticsLookupData', 'Update-OCILoganalyticsObjectCollectionRule', 'Update-OCILoganalyticsPreferences', 'Update-OCILoganalyticsResourceCategories', 'Update-OCILoganalyticsScheduledTask', 'Update-OCILoganalyticsStorage', 'Write-OCILoganalyticsDiscoveryData', 'Write-OCILoganalyticsLogEventsFile', 'Write-OCILoganalyticsLogFile', 'Write-OCILoganalyticsQueryWorkRequestBackground' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loganalytics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Solarized (Dark) Theme.ps1
Solarized (Dark) Theme.ps1
<?xml version="1.0" encoding="utf-16"?> <StorableColorTheme xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <Keys> <string>ErrorForegroundColor</string> <string>ErrorBackgroundColor</string> <string>WarningForegroundColor</string> <string>WarningBackgroundColor</string> <string>VerboseForegroundColor</string> <string>VerboseBackgroundColor</string> <string>DebugForegroundColor</string> <string>DebugBackgroundColor</string> <string>OutputPaneBackgroundColor</string> <string>OutputPaneTextBackgroundColor</string> <string>OutputPaneForegroundColor</string> <string>CommandPaneBackgroundColor</string> <string>ScriptPaneBackgroundColor</string> <string>ScriptPaneForegroundColor</string> <string>TokenColors\\Attribute</string> <string>TokenColors\\Command</string> <string>TokenColors\\CommandArgument</string> <string>TokenColors\\CommandParameter</string> <string>TokenColors\\Comment</string> <string>TokenColors\\GroupEnd</string> <string>TokenColors\\GroupStart</string> <string>TokenColors\\Keyword</string> <string>TokenColors\\LineContinuation</string> <string>TokenColors\\LoopLabel</string> <string>TokenColors\\Member</string> <string>TokenColors\\NewLine</string> <string>TokenColors\\Number</string> <string>TokenColors\\Operator</string> <string>TokenColors\\Position</string> <string>TokenColors\\StatementSeparator</string> <string>TokenColors\\String</string> <string>TokenColors\\Type</string> <string>TokenColors\\Unknown</string> <string>TokenColors\\Variable</string> <string>ConsoleTokenColors\\Attribute</string> <string>ConsoleTokenColors\\Command</string> <string>ConsoleTokenColors\\CommandArgument</string> <string>ConsoleTokenColors\\CommandParameter</string> <string>ConsoleTokenColors\\Comment</string> <string>ConsoleTokenColors\\GroupEnd</string> <string>ConsoleTokenColors\\GroupStart</string> <string>ConsoleTokenColors\\Keyword</string> <string>ConsoleTokenColors\\LineContinuation</string> <string>ConsoleTokenColors\\LoopLabel</string> <string>ConsoleTokenColors\\Member</string> <string>ConsoleTokenColors\\NewLine</string> <string>ConsoleTokenColors\\Number</string> <string>ConsoleTokenColors\\Operator</string> <string>ConsoleTokenColors\\Position</string> <string>ConsoleTokenColors\\StatementSeparator</string> <string>ConsoleTokenColors\\String</string> <string>ConsoleTokenColors\\Type</string> <string>ConsoleTokenColors\\Unknown</string> <string>ConsoleTokenColors\\Variable</string> <string>XmlTokenColors\\Comment</string> <string>XmlTokenColors\\CommentDelimiter</string> <string>XmlTokenColors\\ElementName</string> <string>XmlTokenColors\\MarkupExtension</string> <string>XmlTokenColors\\Attribute</string> <string>XmlTokenColors\\Quote</string> <string>XmlTokenColors\\QuotedString</string> <string>XmlTokenColors\\Tag</string> <string>XmlTokenColors\\Text</string> <string>XmlTokenColors\\CharacterData</string> </Keys> <Values> <Color> <A>255</A> <R>220</R> <G>50</G> <B>47</B> <ScA>1</ScA> <ScR>0.715693533</ScR> <ScG>0.0318960324</ScG> <ScB>0.02842604</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>43</G> <B>54</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.024157634</ScG> <ScB>0.0368894525</ScB> </Color> <Color> <A>255</A> <R>203</R> <G>75</G> <B>22</B> <ScA>1</ScA> <ScR>0.5972018</ScR> <ScG>0.0703601</ScG> <ScB>0.008023193</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>43</G> <B>54</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.024157634</ScG> <ScB>0.0368894525</ScB> </Color> <Color> <A>255</A> <R>38</R> <G>139</G> <B>210</B> <ScA>1</ScA> <ScR>0.0193823632</ScR> <ScG>0.258182883</ScG> <ScB>0.6444797</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>43</G> <B>54</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.024157634</ScG> <ScB>0.0368894525</ScB> </Color> <Color> <A>255</A> <R>133</R> <G>153</G> <B>0</B> <ScA>1</ScA> <ScR>0.23455061</ScR> <ScG>0.3185468</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>43</G> <B>54</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.024157634</ScG> <ScB>0.0368894525</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>43</G> <B>54</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.024157634</ScG> <ScB>0.0368894525</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>43</G> <B>54</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.024157634</ScG> <ScB>0.0368894525</ScB> </Color> <Color> <A>255</A> <R>131</R> <G>148</G> <B>150</B> <ScA>1</ScA> <ScR>0.2269659</ScR> <ScG>0.2961383</ScG> <ScB>0.304987341</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>43</G> <B>54</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.024157634</ScG> <ScB>0.0368894525</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>43</G> <B>54</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.024157634</ScG> <ScB>0.0368894525</ScB> </Color> <Color> <A>255</A> <R>131</R> <G>148</G> <B>150</B> <ScA>1</ScA> <ScR>0.2269659</ScR> <ScG>0.2961383</ScG> <ScB>0.304987341</ScB> </Color> <Color> <A>255</A> <R>131</R> <G>148</G> <B>150</B> <ScA>1</ScA> <ScR>0.2269659</ScR> <ScG>0.2961383</ScG> <ScB>0.304987341</ScB> </Color> <Color> <A>255</A> <R>181</R> <G>137</G> <B>0</B> <ScA>1</ScA> <ScR>0.462077022</ScR> <ScG>0.2501583</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>108</R> <G>113</G> <B>196</B> <ScA>1</ScA> <ScR>0.149959788</ScR> <ScG>0.1651322</ScG> <ScB>0.55201143</ScB> </Color> <Color> <A>255</A> <R>133</R> <G>153</G> <B>0</B> <ScA>1</ScA> <ScR>0.23455061</ScR> <ScG>0.3185468</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>88</R> <G>110</G> <B>117</B> <ScA>1</ScA> <ScR>0.0975873545</ScR> <ScG>0.155926466</ScG> <ScB>0.177888423</ScB> </Color> <Color> <A>255</A> <R>220</R> <G>50</G> <B>47</B> <ScA>1</ScA> <ScR>0.715693533</ScR> <ScG>0.0318960324</ScG> <ScB>0.02842604</ScB> </Color> <Color> <A>255</A> <R>220</R> <G>50</G> <B>47</B> <ScA>1</ScA> <ScR>0.715693533</ScR> <ScG>0.0318960324</ScG> <ScB>0.02842604</ScB> </Color> <Color> <A>255</A> <R>147</R> <G>161</G> <B>161</B> <ScA>1</ScA> <ScR>0.291770667</ScR> <ScG>0.356400162</ScG> <ScB>0.356400162</ScB> </Color> <Color> <A>255</A> <R>147</R> <G>161</G> <B>161</B> <ScA>1</ScA> <ScR>0.291770667</ScR> <ScG>0.356400162</ScG> <ScB>0.356400162</ScB> </Color> <Color> <A>255</A> <R>224</R> <G>255</G> <B>255</B> <ScA>1</ScA> <ScR>0.745404243</ScR> <ScG>1</ScG> <ScB>1</ScB> </Color> <Color> <A>255</A> <R>131</R> <G>148</G> <B>150</B> <ScA>1</ScA> <ScR>0.2269659</ScR> <ScG>0.2961383</ScG> <ScB>0.304987341</ScB> </Color> <Color> <A>255</A> <R>255</R> <G>255</G> <B>255</B> <ScA>1</ScA> <ScR>1</ScR> <ScG>1</ScG> <ScB>1</ScB> </Color> <Color> <A>255</A> <R>220</R> <G>50</G> <B>47</B> <ScA>1</ScA> <ScR>0.715693533</ScR> <ScG>0.0318960324</ScG> <ScB>0.02842604</ScB> </Color> <Color> <A>255</A> <R>211</R> <G>211</G> <B>211</B> <ScA>1</ScA> <ScR>0.651405632</ScR> <ScG>0.651405632</ScG> <ScB>0.651405632</ScB> </Color> <Color> <A>255</A> <R>220</R> <G>50</G> <B>47</B> <ScA>1</ScA> <ScR>0.715693533</ScR> <ScG>0.0318960324</ScG> <ScB>0.02842604</ScB> </Color> <Color> <A>255</A> <R>147</R> <G>161</G> <B>161</B> <ScA>1</ScA> <ScR>0.291770667</ScR> <ScG>0.356400162</ScG> <ScB>0.356400162</ScB> </Color> <Color> <A>255</A> <R>42</R> <G>161</G> <B>152</B> <ScA>1</ScA> <ScR>0.0231533684</ScR> <ScG>0.356400162</ScG> <ScB>0.313988745</ScB> </Color> <Color> <A>255</A> <R>203</R> <G>75</G> <B>22</B> <ScA>1</ScA> <ScR>0.5972018</ScR> <ScG>0.0703601</ScG> <ScB>0.008023193</ScB> </Color> <Color> <A>255</A> <R>131</R> <G>148</G> <B>150</B> <ScA>1</ScA> <ScR>0.2269659</ScR> <ScG>0.2961383</ScG> <ScB>0.304987341</ScB> </Color> <Color> <A>255</A> <R>38</R> <G>139</G> <B>210</B> <ScA>1</ScA> <ScR>0.0193823632</ScR> <ScG>0.258182883</ScG> <ScB>0.6444797</ScB> </Color> <Color> <A>255</A> <R>176</R> <G>196</G> <B>222</B> <ScA>1</ScA> <ScR>0.434153676</ScR> <ScG>0.55201143</ScG> <ScB>0.730460763</ScB> </Color> <Color> <A>255</A> <R>224</R> <G>255</G> <B>255</B> <ScA>1</ScA> <ScR>0.745404243</ScR> <ScG>1</ScG> <ScB>1</ScB> </Color> <Color> <A>255</A> <R>238</R> <G>130</G> <B>238</B> <ScA>1</ScA> <ScR>0.8549926</ScR> <ScG>0.223227978</ScG> <ScB>0.8549926</ScB> </Color> <Color> <A>255</A> <R>255</R> <G>228</G> <B>181</B> <ScA>1</ScA> <ScR>1</ScR> <ScG>0.7758222</ScG> <ScB>0.462077022</ScB> </Color> <Color> <A>255</A> <R>152</R> <G>251</G> <B>152</B> <ScA>1</ScA> <ScR>0.313988745</ScR> <ScG>0.9646863</ScG> <ScB>0.313988745</ScB> </Color> <Color> <A>255</A> <R>245</R> <G>245</G> <B>245</B> <ScA>1</ScA> <ScR>0.913098633</ScR> <ScG>0.913098633</ScG> <ScB>0.913098633</ScB> </Color> <Color> <A>255</A> <R>245</R> <G>245</G> <B>245</B> <ScA>1</ScA> <ScR>0.913098633</ScR> <ScG>0.913098633</ScG> <ScB>0.913098633</ScB> </Color> <Color> <A>255</A> <R>224</R> <G>255</G> <B>255</B> <ScA>1</ScA> <ScR>0.745404243</ScR> <ScG>1</ScG> <ScB>1</ScB> </Color> <Color> <A>255</A> <R>245</R> <G>245</G> <B>245</B> <ScA>1</ScA> <ScR>0.913098633</ScR> <ScG>0.913098633</ScG> <ScB>0.913098633</ScB> </Color> <Color> <A>255</A> <R>224</R> <G>255</G> <B>255</B> <ScA>1</ScA> <ScR>0.745404243</ScR> <ScG>1</ScG> <ScB>1</ScB> </Color> <Color> <A>255</A> <R>245</R> <G>245</G> <B>245</B> <ScA>1</ScA> <ScR>0.913098633</ScR> <ScG>0.913098633</ScG> <ScB>0.913098633</ScB> </Color> <Color> <A>255</A> <R>245</R> <G>245</G> <B>245</B> <ScA>1</ScA> <ScR>0.913098633</ScR> <ScG>0.913098633</ScG> <ScB>0.913098633</ScB> </Color> <Color> <A>255</A> <R>255</R> <G>228</G> <B>196</B> <ScA>1</ScA> <ScR>1</ScR> <ScG>0.7758222</ScG> <ScB>0.55201143</ScB> </Color> <Color> <A>255</A> <R>211</R> <G>211</G> <B>211</B> <ScA>1</ScA> <ScR>0.651405632</ScR> <ScG>0.651405632</ScG> <ScB>0.651405632</ScB> </Color> <Color> <A>255</A> <R>245</R> <G>245</G> <B>245</B> <ScA>1</ScA> <ScR>0.913098633</ScR> <ScG>0.913098633</ScG> <ScB>0.913098633</ScB> </Color> <Color> <A>255</A> <R>245</R> <G>245</G> <B>245</B> <ScA>1</ScA> <ScR>0.913098633</ScR> <ScG>0.913098633</ScG> <ScB>0.913098633</ScB> </Color> <Color> <A>255</A> <R>219</R> <G>112</G> <B>147</B> <ScA>1</ScA> <ScR>0.7083758</ScR> <ScG>0.162029386</ScG> <ScB>0.291770667</ScB> </Color> <Color> <A>255</A> <R>143</R> <G>188</G> <B>143</B> <ScA>1</ScA> <ScR>0.274677336</ScR> <ScG>0.5028865</ScG> <ScB>0.274677336</ScB> </Color> <Color> <A>255</A> <R>245</R> <G>245</G> <B>245</B> <ScA>1</ScA> <ScR>0.913098633</ScR> <ScG>0.913098633</ScG> <ScB>0.913098633</ScB> </Color> <Color> <A>255</A> <R>255</R> <G>69</G> <B>0</B> <ScA>1</ScA> <ScR>1</ScR> <ScG>0.0595112443</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>100</G> <B>0</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.127437681</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>128</G> <B>0</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0.215860531</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>139</R> <G>0</G> <B>0</B> <ScA>1</ScA> <ScR>0.258182883</ScR> <ScG>0</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>255</R> <G>140</G> <B>0</B> <ScA>1</ScA> <ScR>1</ScR> <ScG>0.2622507</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>255</R> <G>0</G> <B>0</B> <ScA>1</ScA> <ScR>1</ScR> <ScG>0</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>0</G> <B>255</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0</ScG> <ScB>1</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>0</G> <B>139</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0</ScG> <ScB>0.258182883</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>0</G> <B>139</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0</ScG> <ScB>0.258182883</ScB> </Color> <Color> <A>255</A> <R>0</R> <G>0</G> <B>0</B> <ScA>1</ScA> <ScR>0</ScR> <ScG>0</ScG> <ScB>0</ScB> </Color> <Color> <A>255</A> <R>128</R> <G>128</G> <B>128</B> <ScA>1</ScA> <ScR>0.215860531</ScR> <ScG>0.215860531</ScG> <ScB>0.215860531</ScB> </Color> </Values> @@ <Name>Solarized (Dark)</Name> <FontFamily>Consolas</FontFamily> <FontSize>14</FontSize> </StorableColorTheme>
combined_dataset/train/non-malicious/Split-Job.ps1
Split-Job.ps1
#requires -version 1.0 ################################################################################ ## Run commands in multiple concurrent pipelines ## by Arnoud Jansveld - www.jansveld.net/powershell ## ## Basic "drop in" usage examples: ## - Functions that accept pipelined input: ## Without Split-Job: ## Get-Content hosts.txt | MyFunction | Export-Csv results.csv ## With Split-Job: ## Get-Content hosts.txt | Split-Job {MyFunction} | Export-Csv results.csv ## - Functions that do not accept pipelined input (use foreach): ## Without Split-Job: ## Get-Content hosts.txt |% { .\\MyScript.ps1 -ComputerName $_ } | Export-Csv results.csv ## With Split-Job: ## Get-Content hosts.txt | Split-Job {%{ .\\MyScript.ps1 -ComputerName $_ }} | Export-Csv results.csv ## ## Example with an imported function: ## function Test-WebServer ($ComputerName) { ## $WebRequest = [System.Net.WebRequest]::Create("http://$ComputerName") ## $WebRequest.GetResponse() ## } ## Get-Content hosts.txt | Split-Job {%{Test-WebServer $_ }} -Function Test-WebServer | Export-Csv results.csv ## ## Version History ## 1.0 First version posted on poshcode.org ## Additional runspace error checking and cleanup ## 0.93 Improve error handling: errors originating in the Scriptblock now ## have more meaningful output ## Show additional info in the progress bar (thanks Stephen Mills) ## Add SnapIn parameter: imports (registered) PowerShell snapins ## Add Function parameter: imports functions ## Add SplitJobRunSpace variable; allows scripts to test if they are ## running in a runspace ## 0.92 Add UseProfile switch: imports the PS profile ## Add Variable parameter: imports variables ## Add Alias parameter: imports aliases ## Restart pipeline if it stops due to an error ## Set the current path in each runspace to that of the calling process ## 0.91 Revert to v 0.8 input syntax for the script block ## Add error handling for empty input queue ## 0.9 Add logic to distinguish between scriptblocks and cmdlets or scripts: ## if a ScriptBlock is specified, a foreach {} wrapper is added ## 0.8 Adds a progress bar ## 0.7 Stop adding runspaces if the queue is already empty ## 0.6 First version. Inspired by Gaurhoth's New-TaskPool script ################################################################################ function Split-Job { param ( $Scriptblock = $(throw 'You must specify a command or script block!'), [int]$MaxPipelines=10, [switch]$UseProfile, [string[]]$Variable, [string[]]$Function = @(), [string[]]$Alias = @(), [string[]]$SnapIn ) function Init ($InputQueue){ # Create the shared thread-safe queue and fill it with the input objects $Queue = [Collections.Queue]::Synchronized([Collections.Queue]@($InputQueue)) $QueueLength = $Queue.Count # Do not create more runspaces than input objects if ($MaxPipelines -gt $QueueLength) {$MaxPipelines = $QueueLength} # Create the script to be run by each runspace $Script = "Set-Location '$PWD'; " $Script += { $SplitJobQueue = $($Input) & { trap {continue} while ($SplitJobQueue.Count) {$SplitJobQueue.Dequeue()} } | }.ToString() + $Scriptblock # Create an array to keep track of the set of pipelines $Pipelines = New-Object System.Collections.ArrayList # Collect the functions and aliases to import $ImportItems = ($Function -replace '^','Function:') + ($Alias -replace '^','Alias:') | Get-Item | select PSPath, Definition $stopwatch = New-Object System.Diagnostics.Stopwatch $stopwatch.Start() } function Add-Pipeline { # This creates a new runspace and starts an asynchronous pipeline with our script. # It will automatically start processing objects from the shared queue. $Runspace = [System.Management.Automation.Runspaces.RunspaceFactory]::CreateRunspace($Host) $Runspace.Open() if (!$?) {throw "Could not open runspace!"} $Runspace.SessionStateProxy.SetVariable('SplitJobRunSpace', $True) function CreatePipeline { param ($Data, $Scriptblock) $Pipeline = $Runspace.CreatePipeline($Scriptblock) if ($Data) { $Null = $Pipeline.Input.Write($Data, $True) $Pipeline.Input.Close() } $Null = $Pipeline.Invoke() $Pipeline.Dispose() } # Optionally import profile, variables, functions and aliases from the main runspace if ($UseProfile) { CreatePipeline -Script "`$PROFILE = '$PROFILE'; . `$PROFILE" } if ($Variable) { foreach ($var in (Get-Variable $Variable -Scope 2)) { trap {continue} $Runspace.SessionStateProxy.SetVariable($var.Name, $var.Value) } } if ($ImportItems) { CreatePipeline $ImportItems { foreach ($item in $Input) {New-Item -Path $item.PSPath -Value $item.Definition} } } if ($SnapIn) { CreatePipeline (Get-PSSnapin $Snapin -Registered) {$Input | Add-PSSnapin} } $Pipeline = $Runspace.CreatePipeline($Script) $Null = $Pipeline.Input.Write($Queue) $Pipeline.Input.Close() $Pipeline.InvokeAsync() $Null = $Pipelines.Add($Pipeline) } function Remove-Pipeline ($Pipeline) { # Remove a pipeline and runspace when it is done $Runspace = $Pipeline.RunSpace $Pipeline.Dispose() $Runspace.Close() $Runspace.Dispose() $Pipelines.Remove($Pipeline) } # Main # Initialize the queue from the pipeline . Init $Input # Start the pipelines while ($Pipelines.Count -lt $MaxPipelines -and $Queue.Count) {Add-Pipeline} # Loop through the runspaces and pass their output to the main pipeline while ($Pipelines.Count) { # Show progress if (($stopwatch.ElapsedMilliseconds - $LastUpdate) -gt 1000) { $Completed = $QueueLength - $Queue.Count - $Pipelines.count $LastUpdate = $stopwatch.ElapsedMilliseconds $SecondsRemaining = $(if ($Completed) { (($Queue.Count + $Pipelines.Count)*$LastUpdate/1000/$Completed) } else {-1}) Write-Progress 'Split-Job' ("Queues: $($Pipelines.Count) Total: $($QueueLength) " + "Completed: $Completed Pending: $($Queue.Count)") ` -PercentComplete ([Math]::Max((100 - [Int]($Queue.Count + $Pipelines.Count)/$QueueLength*100),0)) ` -CurrentOperation "Next item: $(trap {continue}; if ($Queue.Count) {$Queue.Peek()})" ` -SecondsRemaining $SecondsRemaining } foreach ($Pipeline in @($Pipelines)) { if ( -not $Pipeline.Output.EndOfPipeline -or -not $Pipeline.Error.EndOfPipeline ) { $Pipeline.Output.NonBlockingRead() $Pipeline.Error.NonBlockingRead() | Out-Default } else { # Pipeline has stopped; if there was an error show info and restart it if ($Pipeline.PipelineStateInfo.State -eq 'Failed') { $Pipeline.PipelineStateInfo.Reason.ErrorRecord | Add-Member NoteProperty writeErrorStream $True -PassThru | Out-Default # Restart the runspace if ($Queue.Count -lt $QueueLength) {Add-Pipeline} } Remove-Pipeline $Pipeline } } Start-Sleep -Milliseconds 100 } }
combined_dataset/train/non-malicious/sample_19_89.ps1
sample_19_89.ps1
ConvertFrom-StringData @' id_systemservicediagnostic_sqlconnect=Connect to a Sql Server Instance id_systemservicediagnostic_sqlconnectdesc=Trying to connect to Sql Server id_axsqldataengine=Running SQL Query against Sql Server: %Server% id_axsqldataenginedesc=Checking sql configuration : %DC_Name% id_axsqlrulesengine=Running SQL Query against Sql Server: %Server% id_axsqlrulesenginedesc=Checking for root cause : %RC_Name% id_getnetbiosname=Confirming NetBIOS name id_getnetbiosnamestatus=Testing NetBIOS name: %ComputerName% for connectivity id_sqlrulesengine=Running SQL Query against Sql Server: %Server% id_sqlrulesenginedesc=Checking for sql data for inconsistencies : %RC_Name% '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDta5/fYBH+BwUw # NIxSXFGkUfrg7jADY4Pz+0vjuSIorqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH1rhX/Evf2NyjfEfQCCc1Rb # GWIwdVJfB81TfKShSTr/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALZDvfk/CdB9QZE2LhDHRmYFQb22IGjJAgL9uwlGs14KJ80rrYfYW2UAw # mU5+ap1dh1Q6fV70xx8zVqeOgOv3qxT40L6LpNwpIyNKAI754WmVwT/PuQX5PDKX # 9n9DSZgdSqJ5Rx4ajS85XHRNE5CQBUNibz+z2BRpPJTDjeQ5tc1XTvjFskATZRMG # 6xr2agaPplzxaeAcjLkoJzkBKf4OmWLj8UFalgYOWcKgvLCQMaG/mrhqmDd45wX5 # CUNzp47CnezMe8P4PUN5EV6D1oSpdz4wDR4xb0Q8WdY/bI/1xH3qW0Sg/jGZnZqB # JgcJ//3QORac2QtgjRd38J3Lw8+tS6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAXBCAkK0iKmJxXsiWUeLNrj/mDjHl7Hqxhe6SCfG/ttgIGZxp9zsnj # GBMyMDI0MTAyODExNDAzOC4wMTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw # N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP # AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0 # ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA # AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4 # fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6 # IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR # AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDKK+u5YAQpeq/twN/PY1KxKo+wzSBSRFOOXgb7hCgw # 0TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a # AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAecSn5cCfS3CzsQzr1o+F # JW5HTBzuta+bJvHz4nhdS9ER0R6pq8h29e4LDKR2QkbN+UcjoIB9Xkjo+DpEwlTS # P7vEpSjsjZ4LsxDi3KTeIHHxpUcRnZ5YWK7kxxoI3xDi9/HGmnXdaEBkfBrZ0hau # Q/rfxpgJccB/B3BWWwCuQ7LLgiALadWhFTlcHJYXRFCF9MtcTk1AfyvdISHdVS/X # JnMW5Ob3rCZuAj+MfJ8iYQ96L9EaVsA8rvFHzrrnN8NTTStBcEsujQzFl64nRvSZ # F2VGf/lo46kNIDCG8HGVAFugIbzQb/JRelGuB1nWWy5Y5/t0MJA/5uQsE0LMSY1q # GYd0wMdaJ1elT8XGRkim4VU4cFy7xn2lz1KFM2fUHx1FDaDeH5pUlAq1hY4nLNDJ # 71Tuedyzmuu0IqFXqZgAE3lW5ruUjgjUeTa8WQL9y2xxUGAvX0f3gXDqC5smLQv1 # hB+Wo0SLhuD79Pe3zpQ3O5Bw2WLZqxcPxzdERH2yLlpsKJDA5MuNQoKlfH+zrfr7 # RvIMe2/CAmE3MVZ32rvwzj7W+pooLQ4rlVjLeaNW5ihEnBTCYoLlA1zjpvAYIvB3 # wEla09oFeYOap90/IWVmQYU3I66RxIGguvPxxYI58KhZomJtcuTkNXbHGa+O1nuZ # XJ8XFXwCs2dor/bSFLTMBT4= # SIG # End signature block
combined_dataset/train/non-malicious/sample_16_84.ps1
sample_16_84.ps1
Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.PortableUtilities.psm1 -Force -DisableNameChecking -Global Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1 function Test-ModuleUpdate { <# .SYNOPSIS Checks PSGallery for updated module. .DESCRIPTION Checks PSGallery for updated module and gives user 10 seconds to cancel cmdlet and prints update instructions to screen #> param([switch]$PassThru) try { if (-not $PassThru) { $thisVersion = (Get-PSCallStack | Where-Object Command -like 'Invoke-AzstackHci*Validation').InvocationInfo.MyCommand.Version Log-Info ("Looking for module updates for AzStackHci.EnvironmentChecker greater than {0}" -f [system.string]$thisVersion) $ModuleOnline = Find-Module -Name AzStackHci.EnvironmentChecker -Repository PSGallery -ErrorAction SilentlyContinue if ([system.version]$($ModuleOnline.Version -replace ('-preview', '')) -gt $thisVersion) { Log-Info ($lTxt.UpdateToVersion -f $ModuleOnline.Version, $ModuleOnline.Name) -ConsoleOut Start-Sleep -Seconds 10 } else { Log-Info ($lTxt.CurrentVersion -f 'AzStackHci.EnvironmentChecker', [system.string]$thisVersion) } } } catch { Log-Info ($lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message) -Type Error } } function Test-Count { [CmdletBinding()] param ( [CimInstance[]] $CimData, [int] $minimum, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique $instanceId = "Machine: $serverName, Class: $ClassName" if ($CimData.Count -lt $minimum) { $status = 'FAILURE' $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum Log-Info $detail -Type Warning } else { $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum $status = 'SUCCESS' } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Count' -f $ValidatorName, $className Title = 'Test {0} Count' -f $className DisplayName = 'Test {0} Count {1}' -f $className, $serverName Severity = $Severity Description = 'Checking {0} count' -f $className Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' TargetResourceID = $instanceId TargetResourceName = $instanceId TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$ClassName Count" Resource = $CimData.count Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } catch { throw $_ } } function Test-InstanceCountByGroup { <# .SYNOPSIS Test if count matches across groups #> [CmdletBinding()] param ( [CimInstance[]] $CimData, [string[]] $GroupProperty, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { $GroupValues = $cimData | Group-Object -Property $groupProperty | Select-Object -ExpandProperty Name $nodeCount = @($cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique).count foreach ($GroupValue in $GroupValues) { foreach ($group in $GroupProperty) { $gData = $CimData | Where-Object $Group -eq $GroupValue if ($gData.CimSystemProperties.SystemName.Count -eq 1) { $serverName = $gData.CimSystemProperties.SystemName } else { $serverName = 'AllServers' } $className = $gData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $groupData = $gData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } } $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique # The count of InstanceCounts must equal the number of servers to ensure each server has at least 1 instance # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, but SVR3 could have 5 disks of type A. # There should be only 1 unique InstanceCount from all values to ensure each server has the same instance count # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, SVR3 has 6 disks of type A. $Status = if ($groupData.InstanceCount.Count -ne $nodeCount -or $groupDataCount.Count -gt 1 ) { 'FAILURE' } else { 'SUCCESS' } $groupDataString = ($groupData | ForEach-Object { "{0}: {1} x {2}" -f $_.Name, $GroupValue, $_.InstanceCount }) -join ', ' $dtl = $lTxt.CountByGroup -f $className, $group, $groupDataString if ($status -eq 'SUCCESS') { Log-Info $dtl } else { Log-Info $dtl -Type Warning } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Instance_Count_ByGroup' -f $ValidatorName, $className Title = 'Test {0} Properties' -f $className DisplayName = 'Test {0} Properties {1}' -f $className, $ServerName Severity = $Severity Description = 'Checking all servers have same {0} instance count by group' -f $className Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' TargetResourceID = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue" TargetResourceName = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue" TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = $serverName Resource = $ClassName Detail = $dtl Status = $Status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } } catch { throw $_ } } function Test-GroupProperty { <# .SYNOPSIS Test if properties match across groups #> [CmdletBinding()] param ( [CimInstance[]] $CimData, [string[]] $GroupProperty, [string[]] $MatchProperty, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { # Group by name and compare properties within each group $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $ServerName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique $groupedData = @($CimData | Group-Object -Property $groupProperty) $returnResult = @() if ($serverName.Count -gt 1) { $serverName = 'AllServers' } $returnResult += foreach ($group in $groupedData) { $instanceId = "Machine: {0}, Class: {1} Group: {2}" -f $ServerName, $className, $group.Name $groupName = $group.Name $detail = $null if ($group.Count -gt 1) { foreach ($propertyName in $matchProperty) { # Using Select-Object -Unique to get unique values because Get-Unique doesn't work with null and empty values if (($group.Group.$propertyName | Select-Object -Unique).Count -gt 1) { $status = 'FAILURE' $detail = $lTxt.MismatchProp -f $className, $propertyName, ("'{0}'" -f ($group.Group.$propertyName -join "', '")) Log-Info -Message $detail -Type Warning } else { $detail = $lTxt.MatchProp -f $className, $propertyName, ($group.Group.$propertyName -join ', ') $status = 'SUCCESS' } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Group_Consistency' -f $ValidatorName, $className Title = 'Test {0} Grouped by {1} has consistent {2} property values' -f $className, $groupName, $propertyName DisplayName = 'Test {0} Grouped by {1} has consistent {2} property values {3}' -f $className, $groupName, $propertyName, $ServerName Severity = $Severity Description = 'Checking {0} Grouped by {1} for consistent {2} property' -f $className, $groupName, $propertyName Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' TargetResourceID = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue, Property: $propertyName" TargetResourceName = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue, Property: $propertyName" TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$serverName, $ClassName, $groupName, $propertName" Resource = ($group.Group.$propertyName -join "', '") Detail = $detail Status = $Status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } } $returnResult } catch { throw $_ } } function Test-InstanceCount { <# .SYNOPSIS Test if instance count matches across instances #> [CmdletBinding()] param ( [Parameter()] [CimInstance[]] $CimData, [Parameter()] [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity, [Parameter()] [string] $NamePostFix ) if ($CimData.CimSystemProperties.SystemName.Count -eq 1) { $serverName = $CimData.CimSystemProperties.SystemName } else { $serverName = 'AllServers' } $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $InstanceId = "Machine: $ServerName, Class: $ClassName" $groupData = $cimData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } } $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique $status = if ($groupDataCount.Count -gt 1) { 'FAILURE' } else { 'SUCCESS' } $groupDataString = ($groupData | ForEach-Object { "{0}: {1}" -f $_.Name, $_.InstanceCount }) -join ',' if ($NamePostFix) { $Name = 'AzStackHci_{0}_Test_{1}_{2}_Instance_Count' -f $ValidatorName, $className, $NamePostFix $Description = 'Checking all servers have same {0} {1} instance count' -f $className, $NamePostFix $dtl = $lTxt.InstanceCount -f $ClassName, "($NamePostFix) ", $groupDataString } else { $Name = 'AzStackHci_{0}_Test_{1}_Instance_Count' -f $ValidatorName, $className $Description = 'Checking all servers have same {0} instance count' -f $className $dtl = $lTxt.InstanceCount -f $ClassName, $NamePostFix, $groupDataString } if ($Status -eq 'SUCCESS') { Log-Info $dtl } else { Log-Info $dtl -Type Warning } $params = @{ Name = $Name Title = 'Test {0} Properties' -f $className DisplayName = 'Test {0} Properties {1}' -f $className, $serverName Severity = $Severity Description = $Description Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' TargetResourceID = $InstanceId TargetResourceName = $InstanceId TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = $serverName Resource = $ClassName Detail = $dtl Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } function Test-PropertySync { <# .SYNOPSIS Test if properties match across instances #> [CmdletBinding()] param ( [Parameter()] [CimInstance[]] $CimData, [Parameter()] [string[]] $MatchProperty, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { $returnResult = @() $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique if ($serverName.Count -gt 1) { $serverName = 'AllServers' $returnResult += Test-InstanceCount -CimData $CimData -Severity $Severity -ValidatorName $ValidatorName } $instanceId = "Machine: $ServerName, Class: $ClassName, Instance: All" $returnResult += if ($CimData.Count -gt 1) { foreach ($propertyName in $matchProperty) { # Using Select-Object -Unique to get unique values because Get-Unique doesn't work with null and empty values if (($CimData.$propertyName | Select-Object -Unique).Count -gt 1) { $status = 'FAILURE' $detail = $lTxt.MismatchProp -f $className, $propertyName, ("'{0}'" -f ($CimData.$propertyName -join "', '")) Log-Info -Message $detail -Type Warning } else { $detail = $lTxt.MatchProp -f $className, $propertyName, ($CimData.$propertyName -join ',') $status = 'SUCCESS' } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Property_{2}_Consistency' -f $ValidatorName, $className, $propertyName Title = 'Test {0} Property {1}' -f $className, $propertyName DisplayName = 'Test {0} Property {1} {2}' -f $className, $propertyName, $ServerName Severity = $Severity Description = 'Checking all {0} for consistent {1} property' -f $className, $propertyName Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' TargetResourceID = $InstanceId TargetResourceName = $InstanceId TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$className`: $propertyName" Resource = $CimData.$propertyName -join ',' Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } return $returnResult } catch { throw $_ } } function Test-DesiredProperty { <# .SYNOPSIS Test if properties have required value #> [cmdletbinding()] param ( [CimInstance[]] $cimData, [hashtable] $desiredPropertyValue, [string] $InstanceIdStr, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { # Test properties $returnResult = @() $returnResult += foreach ($instance in $cimData) { $serverName = $instance.CimSystemProperties.ServerName | Sort-Object | Get-Unique $className = $instance.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $sb = ([scriptblock]::Create($InstanceIdStr)) $instanceId = Invoke-Command -ScriptBlock $sb Log-Info -Message ($lTxt.Test -f $className, $instanceId) foreach ($propertyName in $desiredPropertyValue.Keys) { $detail = $null $passed = $false $hint = $null $diagProp = $null $desiredPropertyValueCheck = $null $desiredPropertyValueCheck = if ($desiredPropertyValue.$propertyName -is [hashtable]) { $desiredPropertyValue.$propertyName.Value } else { $desiredPropertyValue.$propertyName } $instancePropertyValue = $instance.$propertyName | Select-Object -First 1 if ($instancePropertyValue -notin $desiredPropertyValueCheck) { # Try to add additional diagnostic property if ($desiredPropertyValue.$propertyName.DiagnosticProperty) { $diagProp = ' ({0}: {1})' -f $desiredPropertyValue.$propertyName.DiagnosticProperty, ($instance.$($desiredPropertyValue.$propertyName.DiagnosticProperty) | Select-Object -First 1) } $status = 'FAILURE' $hint = if ($desiredPropertyValue.$propertyName.hint) { ' ({0})' -f $desiredPropertyValue.$propertyName.hint } $detail = $lTxt.UnexProp -f $className, $propertyName, $instancePropertyValue, ($desiredPropertyValueCheck -join ','), $hint, $diagProp Log-Info -Message $detail -Type Warning } else { $status = 'SUCCESS' $detail = $lTxt.Prop -f $className, $propertyName, $instancePropertyValue, ($desiredPropertyValueCheck -join ','), $hint } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Instance_Property_{2}' -f $ValidatorName, $className, $propertyName Title = 'Test {0} Property {1}' -f $className, $propertyName DisplayName = 'Test {0} Property {1} {2}' -f $className, $propertyName, $ServerName Severity = $Severity Description = 'Checking {0} for property {1} has desired value' -f $className, $propertyName Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' TargetResourceID = $InstanceId TargetResourceName = $InstanceId TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$className`: $propertyName" Resource = if ($hint) { "$($instancePropertyValue)$hint" } else { $instancePropertyValue } Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } return $returnResult } catch { throw $_ } } function Get-TestCount { param ( [Parameter()] [string] $ModuleName, [Parameter()] [string] $CommandPrefix ) try { $command = Get-Command -Name $CommandPrefix* -Module $ModuleName if ($command) { return $command.Count } else { return 1 } } catch { return 1 } } function Test-CimData { param ( $Data, $ClassName ) $systemNames = $Data.ComputerName | Sort-Object | Get-Unique $testResult = foreach ($systemName in $systemNames) { $sData = $Data.CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } if ($sData.count -eq 0) { $params = @{ Name = 'AzStackHci_Hardware_Test_{0}' -f $className Title = "Test $ClassName API" DisplayName = "Test $ClassName API $systemName" Severity = 'CRITICAL' Description = "Checking $ClassName has CIM data" Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' TargetResourceID = "Machine: $systemName, Class: $ClassName" TargetResourceName = "Machine: $systemName, Class: $ClassName" TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = 'FAILURE' AdditionalData = @{ Source = $systemName Resource = 'Null' Detail = "Unable to retrieve data for $ClassName on $systemName" Status = 'FAILURE' TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } return $testResult } function Get-DeploymentData { [cmdletbinding()] param ($Path) try { $Json = Get-Content -Path $Path | ConvertFrom-Json $DeploymentData = $json.ScaleUnits[0].DeploymentData if ([string]::IsNullOrEmpty($DeploymentData)) { Log-Info $lTxt.InvalidDeploymentData -Type Warning return $null } return $DeploymentData } catch { throw $_ } } function Get-TestListByFunction { <# .SYNOPSIS Retrieve list of tests for a given validator .DESCRIPTION Tests should be prefixed with Test- and reside in a "helpers" module #> [CmdletBinding()] param ( [Parameter()] [string] $prefix = 'Test-*', [Parameter()] [string] $ModuleName ) try { $script:envchktestList = Get-Command -Name $prefix -Module $ModuleName | Select-Object -ExpandProperty Name Write-Debug -Message "Retrieving list of tests for $($validator.Command): $($script:envchktestList -join ',')" -verbose return $script:envchktestList } catch { Write-Debug -Message "Failed to retrieve test list. Error $($_.exception)" -Verbose } } function Select-TestList { <# .SYNOPSIS Filter Testlist by Include, Exclude and File based exclusions .DESCRIPTION Include replaces complete list, exclude is applied and file based exclusions are removed by regex. #> [CmdletBinding()] param ( [Parameter()] [string[]] $TestList, [Parameter()] [string[]] $Include, [Parameter()] [string[]] $Exclude, [Parameter()] [string] $FilePath = "$PsScriptRoot\ExcludeTests.txt" ) try { $returnList = @($TestList) if ($include) { $returnList = $Include Log-Info "Setting tests to $($include -join ',')" } if ($exclude) { Log-Info "Removing tests $($exclude -join ',')" $returnList = $returnList | Select-String -Pattern $exclude -NotMatch } if ($returnList.count -eq 0) { throw "No tests to perform after filtering" } if (Test-Path -Path $FilePath) { $fileExclusion = Get-Content -Path $FilePath Log-Info "Reading exclusion file $FilePath" -ConsoleOut Log-Info "Applying file exclusions: $($fileExclusion -join ',')" -ConsoleOut $returnList = $returnList | Select-String -Pattern $fileExclusion -NotMatch } Log-Info "Test list: $($returnList -join ',')" if ($returnList.Count -eq 0) { Log-Info -Message "No tests to run." -ConsoleOut -Type Warning break noTestsBreak } return $returnList } catch { Log-Info "Failed to filter test list. Error: $($_.exception)" -Type Warning } } function Set-TrustedHosts { [CmdletBinding()] param ( [Parameter()] [string[]] $Nodes ) $trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value foreach ($node in $nodes) { if ('*' -notin $TrustedHosts -and ($node -notin $TrustedHosts.Split(','))) { Log-Info "Adding $node to TrustedHosts" Set-Item WSMan:\localhost\Client\TrustedHosts -Value $node -Concatenate -Force } else { Log-Info "TrustedHosts already matches $node. Continuing." } } } function Get-IsProxyEnabled { $line1, $line2, $line3, $JsonLines = netsh winhttp show advproxy $proxy = $JsonLines | ConvertFrom-Json Log-Info "Proxy Enabled: $([bool]$proxy.Proxy)" Log-Info "Proxy Output:" Log-Info "$($proxy | Format-Table | Out-String)" [bool]$proxy.Proxy } Export-ModuleMember -Function Get-DeploymentData Export-ModuleMember -Function Get-IsProxyEnabled Export-ModuleMember -Function Get-TestCount Export-ModuleMember -Function Get-TestListByFunction Export-ModuleMember -Function Select-TestList Export-ModuleMember -Function Set-TrustedHosts Export-ModuleMember -Function Test-Count Export-ModuleMember -Function Test-DesiredProperty Export-ModuleMember -Function Test-GroupProperty Export-ModuleMember -Function Test-InstanceCount Export-ModuleMember -Function Test-InstanceCountByGroup Export-ModuleMember -Function Test-ModuleUpdate Export-ModuleMember -Function Test-PropertySync Export-ModuleMember -Function Test-CimData # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBxszN/uRP9VGCf # XPshud2YHCM/38ebil+kQIkVogeaKaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGtFXFdC6Dh86wKbh6jj4FwH # niH/tZz6hpzE2OiJ3zo8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAtJZp0XjOxYPeHIZ18GLsCcOBlejkiEoWYaKVCCN9Bv8f6zpx3zOoSYPF # nQaTY88cnqiXpX3gyrBFyLa5P9/s8MoaylbvmowUG7Io8n7STZatdxL/+TGCdpO9 # b+GSE95QOX6mMqv+ri+A17NMVyX2TiDWcWLSXMJqyQrMgati1OPo6K6VYPiX541C # 3ed2bS8kvcTaL1EuJLyIubPy7HVV3ZunfEF4qdvjSt+KRJrKKV7j7hLKJ9/v/DD+ # P9xojl2KoBklLtiiZvySCuCIuJTunXBmNk7qsd5PRZOPlsX9/UW2oCAsG4xe9FLg # VvXOFvf1wG4WjU4ay4bReGYN+Bf0UKGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAFyfFfji+davNI6GfDjDFXae3wHKRr/+pBxRh/qbtv3gIGZbwTH47L # GBIyMDI0MDIxMjE0MDkxMi40OVowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # Ee0wggcgMIIFCKADAgECAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUy # MloXDTI1MDMwNTE4NDUyMlowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOFBd0TRbNcbvDN4L1IZ0fp5XB0aUXpiClTvB44UGSlb # 3K4SYlIMTUAMHH/QNO5EFqmVIPwJHVCrJCbFEMP8J28PJ5kUBxnqXb6eUyyyZnIL # xM+3UZNYBS3cZdRTqDQXS0isU0uCh8KM6+bcbSPjzZW60pLjBlPps1WcFWwKGvYC # OZVsYM3/pCz8SpqQvlzCkZ6XW17tQ7Xd1TBo+M7LRaLWpg2ZHyLtPWW6PYl0V19m # Ew/KrKr80Odm441JuPwUznEoGhqvXatqALz/UJdovU4xcHAZpGglNi2SyL2eO6rj # AORwDCK0JnkG1DY2o9nSUuJAHs7XQGb3Okdaf3HX8eZ0CfiSgxYpQPAfmx3/MO7i # +LzzsVbGbniSRY2+TwV5DtlnRDmCoYpbiDqt69XYh0DEGhtZ2iurC/OovvRZ2yAN # T8/lzQvy9giyRQll50IYczaEciw1HLD0QWhKiUMz7IJ52TPr3vzuzycinnmJwt8O # grDmFqTkboxYXp3vW1w3NX36/1FAoxrpTB/Kq6t513mypdYJe/76F6TgDXlbJshz # q59PSKVrMphm8O+hqzCCM/RJ4tbua+ZzDQUQvMXX+5ZpcSUsc5ciWJ4oXaL9jNDp # TnQr11uGcxoNwlKwbSFctFPL8tBuw4PSHDsW4rSebOi1LH/l+j2Dt8LOgWOTe0MT # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU+jlbyj3zSQx9FVBtrpPfgfB6UtowHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAJZ9wmbavBe0+LviSbo8oCSeL34Fai2r5C0M # aB5PkXeujs+whQ0pGRTK24aojy2EvclytvTfHoM6mlgkQD6lvqjao+MV107VMuq9 # Jetib46AIsv7v7cWZGZ+RG7yse+mtpvQ7X3ANu6SA7wjk6LVF6AwmXy3mT9S0TRZ # vfMCU4ecKMsZLM/8Ojem3CFeiSTTYi8PtJkQFs9ugZu3DgsIexPakVqSkY4GH4hJ # QxcF/zfkK5U1913DGbIa81LPITISTmHVWHu2nA/vPusn4eyI/ix2oGOPoC+im5/i # vFQB+sRtXpqPy3AWztZUc2IiCsc2dr/nmTKsAb1i3X0I++RTDFgrS5m8+XZYLf2d # 9zSM5OOK8Luz8hSjMTi1/Lck2TJDVw229l+2JfePkO354s564YOO+Em9gwgSSmRX # rxcs0fv5kF9hr4+Z9FhqgUUcIkoShFJnc9sMk8GISFn3K7Ex12gwxDX1OTJ+2i3o # TPReFKbCNgGrf0O8EVaGXIMYGGtTca14NaJV31gZIHZafG4UzLl9sArqjw9bPxBE # yKm1ccrccMGvbBZYRyuuBxO4dkglOp6k2hiXH1VEW+P+8JdoAVyaRbWeTtUT6jBp # evlEmOvIOr25uTIOrWZ2sX+B5pEAtdw1lt81ciSFfNcDprwKJqZxBb8OCYsmmJVA # 2uJlgIcgMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw # ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIwk # bi+DSO4w5WfYG4oAJS8/zQW6oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpdGieMCIYDzIwMjQwMjEyMDk1MTI2 # WhgPMjAyNDAyMTMwOTUxMjZaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl0aJ4C # AQAwCgIBAAICAycCAf8wBwIBAAICE0UwCgIFAOl1uh4CAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAp+/l2FheQDp58+u0asxsyjcoAimX1jdXtozY1s4DQk2/ # JqExdIM75yVGWpx7azlccnay46basqOwcmIs0IAjgBjA8OqUg64ewuFsHcWTuHK1 # 0ZdDTC7celDqTs4kpOOwd6bg1rkDbM8q85Dmdj99ifSpw+ilCDu/v8UwD6ANU31w # 1SiNnS0TnFitkmeQ9Ji+XRZTrDjwzKrbFR6p5LDbZl48JT69XKVyjcicocMuyrmw # 2lg2aWWPD031ub4IEjrjDjyAqx48+0Zlvh0PuAvm8CbgW9k7yk0cFSXA8RzkC/Pz # Yz8XiTpISbnNFqE/yknhZp56rbfpsK5KbBY4XB4nxTGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHo # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIHVHunnbxSu45pEKq24eKpY0WHtLaJnex9DaetjFRtJn # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKtLaxNUChCCCQdHn2k2qKB7T # F8lPYndTxbVJzwf46x0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAiBCBQR3531uywld80wg1/bwn8A/9g # vTRfKFLBW0P7SDcXoTANBgkqhkiG9w0BAQsFAASCAgBbqYsNPzmhpvDlVp0rZ0eM # cgnZUB8lyKj5De2SaoY9FVHy//0G0Mer1LAgK3OJmAFYfkDUwQgljJpLvmyxcmM9 # oSydd06Sk709odyBrgYp1i8oIDHt5Fzq825vtP5hkTBij/yH/0okeqvwaNLYvffc # u93H7Cez7ggUYbatk0d9tzqyz2pIuJHjLU0F5bKNpfP2AC08v7jccGo5S5cnhpJP # kLzr/do3lPCaIRpmc1z+0o9Sf2+qhROXBWewKshGlxHZKLu/qHYGs6mZBUQcG1Nj # XHpbLN0csNaTHgZZqtpZz1Gdb7qkAR27/l/t5tIvJ9EKRhtoafHn2QifbNpW52e+ # aHG+abJTHdCGOnD0Nw8lDsnjn9AueeLn7HaPA1DL0z82WRBAHP8RYdOc1gXXcsJV # bJN6igMofDJliYrQKQLkKbGbYDDLG+VoK3wOTWrjW2kJsZ+pefswUvMw4/mX+qRq # WtpjPajV2+JLYWk8GUwWLRoZzW02W38LLIsIaXBi3a+IPte2fyciAk+12a5JxOu1 # AnJqc0ESoFW6mI8RzUT0pb1gjOZozCMUJzyuesjjuDaNkjj1OZmF43up17UcFZSa # k4cYwvgJIqX/Nrb7nlhrK6Wf/4qWSdJvcoPxYIJBDi+NTQxZKTputksirv1qrh7E # A9BGrwBFhJgPnknnrZgp7w== # SIG # End signature block
combined_dataset/train/non-malicious/788.ps1
788.ps1
 function Register-EditorCommand { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$Name, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$DisplayName, [Parameter( Mandatory=$true, ParameterSetName="Function")] [ValidateNotNullOrEmpty()] [string]$Function, [Parameter( Mandatory=$true, ParameterSetName="ScriptBlock")] [ValidateNotNullOrEmpty()] [ScriptBlock]$ScriptBlock, [switch]$SuppressOutput ) Process { $commandArgs = @($Name, $DisplayName, $SuppressOutput.IsPresent) if ($ScriptBlock -ne $null) { Write-Verbose "Registering command '$Name' which executes a ScriptBlock" $commandArgs += $ScriptBlock } else { Write-Verbose "Registering command '$Name' which executes a function" $commandArgs += $Function } $editorCommand = New-Object Microsoft.PowerShell.EditorServices.Services.PowerShellContext.EditorCommand -ArgumentList $commandArgs if ($psEditor.RegisterCommand($editorCommand)) { Write-Verbose "Registered new command '$Name'" } else { Write-Verbose "Updated existing command '$Name'" } } } function Unregister-EditorCommand { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$Name ) Process { Write-Verbose "Unregistering command '$Name'" $psEditor.UnregisterCommand($Name); } } function New-EditorFile { [CmdletBinding()] param( [Parameter()] [String[]] [ValidateNotNullOrEmpty()] $Path, [Parameter(ValueFromPipeline=$true)] $Value, [Parameter()] [switch] $Force ) begin { $valueList = @() } process { $valueList += $Value } end { if ($Path) { foreach ($fileName in $Path) { if (-not (Test-Path $fileName) -or $Force) { New-Item -Path $fileName -ItemType File | Out-Null if ($Path.Count -gt 1) { $preview = $false } else { $preview = $true } if (!([System.IO.Path]::IsPathRooted($fileName))) { $fileName = $ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath($fileName) } $psEditor.Workspace.OpenFile($fileName, $preview) $psEditor.GetEditorContext().CurrentFile.InsertText(($valueList | Out-String)) } else { $PSCmdlet.WriteError( ( New-Object -TypeName System.Management.Automation.ErrorRecord -ArgumentList @( [System.IO.IOException]"The file '$fileName' already exists.", 'NewEditorFileIOError', [System.Management.Automation.ErrorCategory]::WriteError, $fileName) ) ) } } } else { $psEditor.Workspace.NewFile() $psEditor.GetEditorContext().CurrentFile.InsertText(($valueList | Out-String)) } } } function Open-EditorFile { [CmdletBinding()] param( [Parameter(Mandatory=$true, ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] $Path ) begin { $Paths = @() } process { $Paths += $Path } end { if ($Paths.Count -gt 1) { $preview = $false } else { $preview = $true } Get-ChildItem $Paths -File | ForEach-Object { $psEditor.Workspace.OpenFile($_.FullName, $preview) } } } Set-Alias psedit Open-EditorFile -Scope Global Export-ModuleMember -Function Open-EditorFile,New-EditorFile
combined_dataset/train/non-malicious/Queue Checker.ps1
Queue Checker.ps1
foreach ($ExchangServer in (Get-ExchangeServer | Where { $_.isHubTransportServer -eq $True})) {Get-queue -Server $ExchangeServer}
combined_dataset/train/non-malicious/Script Listing.ps1
Script Listing.ps1
$pathToScripts = "C:\\Scripts\\*" foreach($itm in get-childitem $pathToScripts -include *.ps1 -recurse) {"{0,-25}{1,0}" -f ((" " + $itm.name) -replace ".ps1",""), ((get-content $itm | where {$_ -like "*Purpose:*"}) -replace "# Purpose: ","")}
combined_dataset/train/non-malicious/Twitbrain cheat.ps1
Twitbrain cheat.ps1
#Twitbrain Cheat PowerShell script #Description: PowerShell script to beat everyone at the Twitter twitbrain game # For more info follow @twitbrain at www.twitter.com #Change the Twitter Username and Password in the script. #Author: Stefan Stranger #Website: http://tinyurl.com/sstranger #Date: 03/07/2009 #Version: 0.1 #Function Publish-Tweet from James O'Neills blog (http://blogs.technet.com/jamesone/archive/2009/02/16/how-to-drive-twitter-or-other-web-tools-with-powershell.aspx) [System.Reflection.Assembly]::LoadWithPartialName(”System.Web") | Out-Null Function Publish-Tweet([string] $TweetText) { [System.Net.ServicePointManager]::Expect100Continue = $false $request = [System.Net.WebRequest]::Create("http://twitter.com/statuses/update.xml") $Username = "username" $Password = "password" $request.Credentials = new-object System.Net.NetworkCredential($Username, $Password) $request.Method = "POST" $request.ContentType = "application/x-www-form-urlencoded" write-progress "Tweeting" "Posting status update" -cu $tweetText $formdata = [System.Text.Encoding]::UTF8.GetBytes( "status=" + $tweetText ) $requestStream = $request.GetRequestStream() $requestStream.Write($formdata, 0, $formdata.Length) $requestStream.Close() $response = $request.GetResponse() write-host $response.statuscode $reader = new-object System.IO.StreamReader($response.GetResponseStream()) $reader.ReadToEnd() $reader.Close() } Function Waiting() { #Change $a if you want to wait longer or shorter for ($a=15; $a -gt 1; $a--) { Write-Progress -Activity "Waiting for next poll" ` -SecondsRemaining $a -Status "Please wait." Start-Sleep 1 } } Write-Host "You are going to cheat;-)" $strResponse = Read-Host "Are you sure you want to continue? (Y/N)" if ($strResponse -eq 'N') { Write-host "Maybe a good choice. It has to be a fair competition ;-)" break } #infinite loop #Quit script by using Ctrl-C for (;;) { #Retrieve sum from Twitbrain website Write-host "Get calculation from Twitbrain website" $ws = New-Object net.WebClient #Download Twitbrain website $html = $ws.DownloadString("http://ajaxorized.com/twitbrain") #Save website content to temporarily file. $currentdir = [Environment]::CurrentDirectory=(Get-Location -PSProvider FileSystem).ProviderPath $html | Set-Content "$currentdir\\Twitbrain.html" $twitbrainpage = Get-Content "$currentdir\\Twitbrain.html" | out-string #Search for calculation string in web page $calc = [regex]::match($twitbrainpage,'(?<=\\<div class="challenge"\\>).+(?=\\</div> <p class="challenge-answer">)',"singleline").value.trim() #search/replace $calc = $calc -replace "\\*times\\*","*" $calc = $calc -replace "\\+plus\\+","+" $calc = $calc -replace "\\-minus\\-","-" #Do the math on the sum $result = invoke-expression $calc #Create tweet to post to twitter $tweet = "@twitbrain " + $result #Post to Twitter #Check if result has not been posted earlier. $oldresult = Get-Content "$currentdir\\oldresult.txt" if ($result -eq $oldresult) { write-host "No new Twitbrain question is published yet" } else { Write-host "What is the result of the next question?" Write-host $calc Publish-Tweet $tweet write-host "Tweet publised" #Write old result to text file $oldresult = $result Write-host "Save oldresult to text file" $oldresult > "$currentdir\\oldresult.txt" } #Wait 15 seconds #Call Waiting Function Waiting }
combined_dataset/train/non-malicious/496.ps1
496.ps1
function Get-MSI{ $msiUtilSignature = @' /// <summary> /// The HRESULT error code for success. /// </summary> private const int ErrorSuccess = 0; /// <summary> /// The HRESULT error code that indicates there is more /// data available to retrieve. /// </summary> private const int ErrorMoreData = 234; /// <summary> /// The HRESULT error code that indicates there is /// no more data available. /// </summary> private const int ErrorNoMoreItems = 259; /// <summary> /// The expected length of a GUID. /// </summary> private const int GuidLength = 39; /// <summary> /// Gets an array of the installed MSI products. /// </summary> public Product[] Products { get { return new ProductEnumeratorWrapper(default(Product)).ToArray(); } } /** * http://msdn.microsoft.com/en-us/library/aa370101(VS.85).aspx */ [DllImport(@"msi.dll", CharSet = CharSet.Auto)] [return: MarshalAs(UnmanagedType.U4)] private static extern int MsiEnumProducts( [MarshalAs(UnmanagedType.U4)] int iProductIndex, [Out] StringBuilder lpProductBuf); /** * http://msdn.microsoft.com/en-us/library/aa370130(VS.85).aspx */ [DllImport(@"msi.dll", CharSet = CharSet.Auto)] [return: MarshalAs(UnmanagedType.U4)] private static extern int MsiGetProductInfo( string szProduct, string szProperty, [Out] StringBuilder lpValueBuf, [MarshalAs(UnmanagedType.U4)] [In] [Out] ref int pcchValueBuf); /// <summary> /// An MSI product. /// </summary> public struct Product { /// <summary> /// Gets or sets the product's unique GUID. /// </summary> public string ProductCode { get; internal set; } /// <summary> /// Gets the product's name. /// </summary> public string ProductName { get; internal set; } /// <summary> /// Gets the path to the product's local package. /// </summary> public FileInfo LocalPackage { get; internal set; } /// <summary> /// Gets the product's version. /// </summary> public string ProductVersion { get; internal set; } /// <summary> /// Gets the product's install date. /// </summary> public DateTime InstallDate { get; internal set; } } private class ProductEnumeratorWrapper : IEnumerable<Product> { private Product data; public ProductEnumeratorWrapper(Product data) { this.data = data; } public IEnumerator<Product> GetEnumerator() { return new ProductEnumerator(this); } IEnumerator IEnumerable.GetEnumerator() { return GetEnumerator(); } private class ProductEnumerator : IEnumerator<Product> { /// <summary> /// A format provider used to format DateTime objects. /// </summary> private static readonly IFormatProvider DateTimeFormatProvider = CultureInfo.CreateSpecificCulture("en-US"); /// <summary> /// The enumerator's wrapper. /// </summary> private readonly ProductEnumeratorWrapper wrapper; /// <summary> /// The index. /// </summary> private int i; public ProductEnumerator(ProductEnumeratorWrapper wrapper) { this.wrapper = wrapper; } public Product Current { get { return this.wrapper.data; } } object IEnumerator.Current { get { return this.wrapper.data; } } public bool MoveNext() { var buffer = new StringBuilder(GuidLength); var hresult = MsiEnumProducts(this.i++, buffer); this.wrapper.data.ProductCode = buffer.ToString(); switch (hresult) { case ErrorSuccess: { try { this.wrapper.data.InstallDate = DateTime.ParseExact( GetProperty(@"InstallDate"), "yyyyMMdd", DateTimeFormatProvider); } catch { this.wrapper.data.InstallDate = DateTime.MinValue; } try { this.wrapper.data.LocalPackage = new FileInfo(GetProperty(@"LocalPackage")); } catch { this.wrapper.data.LocalPackage = null; } try { this.wrapper.data.ProductName = GetProperty(@"InstalledProductName"); } catch { this.wrapper.data.ProductName = null; } try { this.wrapper.data.ProductVersion = GetProperty(@"VersionString"); } catch { this.wrapper.data.ProductVersion = null; } return true; } case ErrorNoMoreItems: { return false; } default: { // throw new Win32Exception(hresult); return true; } } } public void Reset() { this.i = 0; } public void Dispose() { // Do nothing } /// <summary> /// Gets an MSI property. /// </summary> /// <param name="name">The name of the property to get.</param> /// <returns>The property's value.</returns> /// <remarks> /// For more information on available properties please see: /// http://msdn.microsoft.com/en-us/library/aa370130(VS.85).aspx /// </remarks> private string GetProperty(string name) { var size = 0; var hresult = MsiGetProductInfo( this.wrapper.data.ProductCode, name, null, ref size); if (hresult == ErrorSuccess || hresult == ErrorMoreData) { var buffer = new StringBuilder(++size); hresult = MsiGetProductInfo( this.wrapper.data.ProductCode, name, buffer, ref size); if (hresult == ErrorSuccess) { return buffer.ToString(); } } throw new Win32Exception(hresult); } } } '@; $msiUtilType = Add-Type ` -MemberDefinition $msiUtilSignature ` -Name "MsiUtil" ` -Namespace "Win32Native" ` -Language CSharpVersion3 ` -UsingNamespace System.Linq, ` System.IO, ` System.Collections, ` System.Collections.Generic, ` System.ComponentModel, ` System.Globalization, ` System.Text ` -PassThru; $msiUtil = New-Object -TypeName "Win32Native.MsiUtil"; $msiUtil.Products }
combined_dataset/train/non-malicious/sample_49_97.ps1
sample_49_97.ps1
@{ GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" NestedModules="Microsoft.PowerShell.Commands.Management.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' FunctionsToExport = @() AliasesToExport = @("gcb", "gin", "gtz", "scb", "stz") CmdletsToExport=@("Add-Content", "Clear-Content", "Get-Clipboard", "Set-Clipboard", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-ChildItem", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Test-Connection", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Remove-ItemProperty", "Rename-ItemProperty", "Resolve-Path", "Get-Service", "Stop-Service", "Start-Service", "Suspend-Service", "Resume-Service", "Restart-Service", "Set-Service", "New-Service", "Remove-Service", "Set-Content", "Set-ItemProperty", "Restart-Computer", "Stop-Computer", "Rename-Computer", "Get-ComputerInfo", "Get-TimeZone", "Set-TimeZone", "Get-HotFix", "Clear-RecycleBin") } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOkUHfBYP8n8JI # rFMR/Pi6BPlAC/b/pz0LBmd3yrLJC6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG8CgBXFFJ/2vAtXu5Tg5Csn # XsYj0AU0agFGmPJaSF8WMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhTwmeh7FqR3IjpVHA5jOcGI+Fuly0MIyGP2pc8iTuUdXVGzGztPC31Tv # RrO3IzkFD8VhiMUDNi4hb6gE3IhKotFyzJtlqWdyg2xqy7jvr+hHW+crDnhOKmsB # zVoVZegu1of4bN3IIj5CKSGZct2hTDPpKSJzneudofpq7YK97iH5qkMLAug12YGv # /0ZoJbys1ZR74+t2ObyvywPl9azGfskZhVcFpd4c03V9RQaN3j8t+W33U7oMbfWc # PlUlyPuy5I5T2zTqbIalHFPdiGB4yBlGrfOMVb/O7MDUOiMaMOwIWgFQIaCoMvs7 # vvQfcH56BJFqZtr0oepjT2ZumcLxAaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA+3ajIHt8H5i2S1S94bYU4WUvSvP0HLGYqasUWRAH43QIGZbqfZ72O # GBMyMDI0MDIxNDIxMDAyNy41NjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl3kJMwIhgPMjAyNDAyMTUwMzE4NDNaGA8yMDI0MDIxNjAzMTg0M1owdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XeQkwIBADAKAgEAAgICsgIB/zAHAgEAAgISVDAK # AgUA6XjiEwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABYIlfTD6DvNgZdf # NbQtUqWNr0qC08R6BMCkSGgggx8ePLM7APkzZmeHhPYzrpniefTFS1U4/hVJm3kD # YEAx7M6OQ9L5TcnXJ9DdefXYD7A4GvVOmGoajCpKAXU9gyxvsxRX4BnlXPJDjXEq # 6U/sr3rAWmM2VjGeMma9CTy6czjpMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgfydLoUwUShN2PXZyEs5IV40NZB2P6R756hNifQxaxGAwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIKaaEoOXEjjHeAD99MmoMlDVtIg/PdqddyY0aIfg # 87njMA0GCSqGSIb3DQEBCwUABIICADhsHXEs5YWiX5KPDoEsBlhH30geHSCLmq+m # HZwvQMPPIQygt0lC8CilfVmz4wGb9DBxMQ73poTZjV1Chgw7Z/me73Zz52eZAopc # ueWFqVr6cpUImvRHn0vTDQPGiuT8K+FPABRpZtQqAUpKwYsdxRA89DLzru/fVem2 # uq+yM3z05aLGMn7pzVha+XxDuob+4VXzJQQrWzVLzeMQVA7bowlolexHTATzmSBr # k5vUCZIt5q5ZIwcjgBNiQDNWxi/33uRuThFVKszQDUmaX0jpU6Qd7lIfqQZkZ6mM # YzaMypt7rxv3iPqIKcH+8OHu9KZe/MnS9YsAmEwrNf87kXyUNFvpjswWDuM2Hrr0 # VHCd5NXASxKozhN9UecdQzqq7/9H3t94bRslN+P2h0z2oWoXdXHWL1byBFYAbD4P # 9D2eVTAPWffAl0wiXDSWhgY2xvrGAr/QQIdOqNGkVEeRfXD5b3eBI3vash8vEv7Z # X7Suw4RXBYVX+GlVqYREZ9uhM1qaXKmMQdTBWuTBuTY2M3ELo4Wj4ZmGdL0MDEbM # 8Mbd8YT0I3P3kXvoNTGzrZb0XppHw/WmborjC58/Wi72q+ydgNTLXZX/+qZnS24t # E3X/GhwT0IYLteDsIFRTOzCMS6mWikBo8gfYNlZ2+FYFUpFWaiiFrkHCD1X+nmX/ # maicCT7N # SIG # End signature block
combined_dataset/train/non-malicious/1516.ps1
1516.ps1
function Assert-FileContains { [CmdletBinding()] param( [Parameter(Position=0)] [string] $Path, [Parameter(Position=1)] [string] $Needle, [Parameter(Position=2)] $Message ) Set-StrictMode -Version 'Latest' Write-Debug -Message "Checking if '$Path' contains expected content." $actualContents = Get-Content -Path $Path -Raw if( $actualContents -eq $null ) { Fail ('File ''{0}'' is empty and does not contain ''{1}''. {2}' -f $Path,$Needle,$Message) return } Write-Debug -Message "Actual:`n$actualContents" Write-Debug -Message "Expected:`n$Needle" if( $actualContents -notmatch ([Text.RegularExpressions.Regex]::Escape($Needle)) ) { Fail ("File '{0}' does not contain '{1}'. {2}" -f $Path,$Needle,$Message) } }
combined_dataset/train/non-malicious/Get-Sequence.ps1
Get-Sequence.ps1
## Get-Sequence ## Optionless implementation of seq for PowerShell ############################################################################ ## Most of the options don't apply because they convert the numbers to text ## which isn't something a PowerShell Seq wants to do :) ############################################################################ ## Usage: ## seq $LAST ## seq $FIRST $LAST ## seq $FIRST $INTERVAL $LAST ############################################################################ function Get-Sequence{ switch($args.Count){ 1 {[int]$first=0; [int]$inc=1; [int]$last=$args[0]} 2 {[int]$first=$args[0]; [int]$inc=1; [int]$last=$args[1]} 3 {[int]$first=$args[0]; [int]$inc=$args[1]; [int]$last=$args[2]} } if($inc-gt0){ while($first-le$last){$first;$first+=$inc} } else { while($first-ge$last){$first;$first+=$inc} } } ## Set the default alias New-Alias seq Get-Sequence ############################################################################ ############################################################################ ## EXAMPLE SCRIPT: ## Original Bash Script using Gnome's Notify-Send for libnotify # s=.o0O0o.o0O0o.o0O0o.o0O0o.o0O0o.o0O0o.o0;n(){ for x in `seq $1 $2 $3`;do notify-send ${s:0:x}; done };while :;do n 1 2 39;n 39 -2 1;done ## PowerShell Script using Send-Notice for Growl ## BUT, if you don't have Growl and Send-Notice, just use this instead: New-Alias Send-Notice Write-Progress ## And then you can: (note that in the sample there's no end case, you have to CTRL+C) # $s=".o0O0o.o0O0o.o0O0o.o0O0o.o0O0o.o0O0o.o0";function n{$ofs="";foreach($x in $(seq @args)){Send-Notice "Working" "$($s[0..$x])"}}while(1){n 1 2 39;n 39 -2 1}
combined_dataset/train/non-malicious/sample_57_23.ps1
sample_57_23.ps1
<# .SYNOPSIS Powershell script to collect data about Geneva Metrics (AKA MDM, AKA Geneva Hot Path) data publication. .DESCRIPTION This script performs several operations for troubleshooting issues related to MetricsExtension such as: - Collection of metric traffic. - Collectio of information about the environment such as OS, processes running. - Collection of certificates. - Collection of logs. - Test connection to Frontends where we emit the metrics. .EXAMPLE ./mdmDataCollection.ps1 -SkipAdminCheck -MetricCollectionDurationSec 60 -Table2CsvPath "C:/table2csv.exe" .EXAMPLE ./mdmDataCollection.ps1 -SkipCollectionTsfLogs -SkipCollectionCertificates .EXAMPLE ./mdmDataCollection.ps1 -LogicalDisks "C: D:" .EXAMPLE ./mdmDataCollection.ps1 -MetricCollectionSizeMaxMB 100 -MetricCollectionDurationSec 60 -TimeOutSecondsSearchFiles -1 .EXAMPLE ./mdmDataCollection.ps1 -OutputDirectory "C:\dev" #> param ( # If this switch is specified, the output of all commands will be showed in the output. [Parameter(Mandatory=$false)] [switch]$DebugMdmDataCollection = $false, # The arguments passed for the execution of table2csv.exe. # Default value: "-tail 150000" [Parameter(Mandatory=$false)] [string]$Table2CsvParameters = "-tail 150000", # It specifies the time we will be spent collecting the traffic of metrics in seconds. # Default value: 190 [Parameter(Mandatory=$false)] [int]$MetricCollectionDurationSec = 190, # It specifies the maximum size in MB that will be stored from the collection of the metrics. # Default value: 500 [Parameter(Mandatory=$false)] [int]$MetricCollectionSizeMaxMB = 500, # If this switch is specified, the check of admin permissions will be skipped [Parameter(Mandatory=$false)] [switch]$SkipAdminCheck = $false, # It specifies the path for cpprestutil.exe [Parameter(Mandatory=$false)] [string]$CppRestUtilPathParam = $null, # It specifies the path for table2csv.exe [Parameter(Mandatory=$false)] [string]$Table2CsvPathParam = $null, # The script needs to search files in the environment, this operation can be really long if your disk is not indexed. # This parameter allows you to set a TimeOut in the search. If you don't want to have TimeOut, pass the value -1. # Default value: 3600 [Parameter(Mandatory=$false)] [int]$TimeOutSecondsSearchFiles = 3600, # It specifies the disks where we are going to search the files in the script. # Example for only searching in C: and D:, "C: D:". Use a whitespace as separator. [Parameter(Mandatory=$false)] [string]$LogicalDisksParam = $null, # If this switch is specified, the collection of tsf logs will be skipped. [Parameter(Mandatory=$false)] [switch]$SkipCollectionTsfLogs = $false, # If this switch is specified, the collection of certificates will be skipped. [Parameter(Mandatory=$false)] [switch]$SkipCollectionCertificates = $false, # It specifies in which directory the output is going to be stored. [Parameter(Mandatory=$false)] [string]$OutputDirectory = "..", # This is only used for tests purposes, please don't use it [Parameter(Mandatory=$false)] [switch]$ImportFunctions = $false ) $ScriptVersion = "1.14" $MeFrontendUrls = @( "global.prod.microsoftmetrics.com" "global.metrics.nsatc.net" "azglobal.metrics.nsatc.net" ) $Ports = @( "80" "443" ) $MeStamps = @( "https://global.prod.microsoftmetrics.com" "https://azglobal-red.prod.microsoftmetrics.com" "https://azglobal-black.prod.microsoftmetrics.com" "https://global.metrics.nsatc.net" "https://azglobal-red.azglobal.metrics.nsatc.net" "https://azglobal-black.azglobal.metrics.nsatc.net" "https://global.metrics.azure.microsoft.scloud" "https://global.metrics.azure.eaglex.ic.gov" "https://13.90.249.229" "https://40.77.24.27" "https://[2a01:111:f100:2000::a83e:33d6]" "https://[2603:1030:7::155]" ) $StampPaths = @( "/public/lb-probe" "/public/monitoringAccount/MetricTeamInternalMetrics/acls" ) $ExcludedEnvironmentVariables = @( "_NT_SYMBOL_PATH" ) $ExcludedTokenFiles = @( "AuthToken-MSI.json", "AuthToken-Application.json", "AuthToken-GIG.json", "AuthToken-HOBO.json", "AuthToken-AMCS.json" ) function Main { Set-UTF8-Encoding Confirm-Admin-Permissions $mdmDataCollectionOutput = Get-MdmDataCollectionOutput $compressedDataOutput = Get-CompressedDataOutput $mdmDataCollectionOutput Show-Starting-Message Get-Logical-Disks $logicalDisks = Get-Content -Path .\LogicalDisks.txt $metricsExtensionPath = Get-File-Version "MetricsExtension.Native.exe" ".\MetricsExtensionProcesses.txt" "MetricsExtensionVersions.txt" $cppRestUtil = Search-CppRestUtil $metricsExtensionPath Test-ME-Stamps $mdmDataCollectionOutput $cppRestUtil Get-Etw-Session-And-IfxMetrics-At-Start Get-OS-And-Processes-Information Get-Local-Time-Information Get-Difference-Time-Server-And-Agent $cppRestUtil Get-Certificates Get-HTTP-Proxy-Configuration Get-Environment-Variables Get-Open-Sockets-And-Owning-Processes Test-Frontend-Urls Get-Application-Event-Logs Get-Raw-And-Aggregated-Metrics $commandLineArguments = Get-Command-Line-Arguments Get-Cached-Config $commandLineArguments Copy-Autopilot-Logs Get-Autopilot-Ini $monAgentHostPath = Get-File-Version "MonAgentHost.exe" ".\MonAgentHostProcesses.txt" "MonAgentHostVersions.txt" Get-Tsf-Logs $logicalDisks $mdmDataCollectionOutput $monAgentHostPath Get-Etw-Session-And-IfxMetrics-At-End Compress-Output $compressedDataOutput $mdmDataCollectionOutput Show-Ending-Message } function Set-UTF8-Encoding { [void](chcp 65001) } function Confirm-Admin-Permissions { if ($SkipAdminCheck) { Write-Warning "Administrative permissions check skipped due to SkipAdminCheck being set." } elseif(-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole( [Security.Principal.WindowsBuiltInRole] "Administrator")) { $errorMessage = "ERROR: This script has to be run with administrative permissions.`n" $errorMessage += "If you believe you have received this message due to an error, you can`n" $errorMessage += "skip this check by passing the command line parameter SkipAdminCheck." Write-Error $errorMessage break } } function Get-MdmDataCollectionOutput { $folderSuffix = [DateTime]::UtcNow.ToString('yyyy_MM_dd_hh_mm_ss') $randomNumber = Get-Random $mdmDataCollectionOutput = "MdmDataCollectionOutput" + $folderSuffix + "_random_" + $randomNumber [void](Remove-Directory-If-It-Exists $mdmDataCollectionOutput) [void](mkdir $mdmDataCollectionOutput) [void](Set-Location $mdmDataCollectionOutput) return $mdmDataCollectionOutput } function Get-CompressedDataOutput([String]$mdmDataCollectionOutput) { $compressedDataOutput = $mdmDataCollectionOutput + ".zip" return $compressedDataOutput } function Remove-Directory-If-It-Exists([String]$directory) { if (Test-Path -Path $directory) { Write-Output "File $directory already exists deleting it before proceeding..." try { Invoke-Command "Remove-Item -LiteralPath $directory -Force -Recurse" } catch { Write-Error "Failed to delete the file ${directory}: $_. Aborting..." } } } function Show-Starting-Message { $date = Get-Date Write-Output "Begin - MDM Data Collection Script - $date" Write-Output "Script version $ScriptVersion" Write-Output "Collecting general information..." Write-Output "MdmDataCollection script version $ScriptVersion" > AboutCollectionScript.txt } function Get-Logical-Disks { Write-Output "Collecting information about logical disks" if (-Not [string]::IsNullOrEmpty($LogicalDisksParam)) { $LogicalDisksParam = $LogicalDisksParam.Replace(" ", "`n") $LogicalDisksParam >> LogicalDisks.txt } else { $logicalDisks = Get-WmiObject -Class Win32_LogicalDisk foreach ($logicalDisk in $logicalDisks) { $logicalDisk.DeviceID >> LogicalDisks.txt } } } function Get-File-Version([String]$processName, [String]$inputFile, [String]$outputFile) { Write-Host "Searching the process: $processName" wmic PROCESS WHERE "(Name='${processName}')" GET ExecutablePath /FORMAT:list | findstr "=" > $inputFile if ([String]::IsNullOrWhiteSpace((Get-content $inputFile))) { Write-Warning "The process $processName is not running" "The process $processName is not running" > $outputFile return } foreach ($process in Get-Content -Path $inputFile) { $executablePath = $process $prefix = "ExecutablePath=" if ($executablePath.StartsWith($prefix)) { $executablePath = $executablePath.Substring($prefix.Length) } if ([String]::IsNullOrEmpty($executablePath)) { Write-Warning "The process $processName path is not valid or it is empty. Version can not be dumped." "The process $processName path is not valid or it is empty. Version can not be dumped." > $outputFile return } Write-Output "$executablePath" >> $outputFile (Get-Item $executablePath).VersionInfo | format-list >> $outputFile } return $executablePath } function Search-CppRestUtil ([String]$metricsExtensionPath) { if ((-Not [string]::IsNullOrEmpty($CppRestUtilPathParam)) -and (Test-Path -Path $CppRestUtilPathParam)) { return $CppRestUtilPathParam } if (Test-Path -Path "..\CppRestUtil\CppRestUtil.exe") { return "..\CppRestUtil\CppRestUtil.exe" } if ($metricsExtensionPath.Contains("MetricsExtension\MetricsExtension.Native.exe")) { # MetricsExtension NuGet setup $possibleLocationCppRestUtil = $metricsExtensionPath.Replace("MetricsExtension\MetricsExtension.Native","CppRestUtil\CppRestUtil") if (Test-Path -Path $possibleLocationCppRestUtil) { return $possibleLocationCppRestUtil } # Monitoring Agent setup $possibleLocationCppRestUtil = $metricsExtensionPath.Replace("MetricsExtension.Native","CppRestUtil") if (Test-Path -Path $possibleLocationCppRestUtil) { return $possibleLocationCppRestUtil } } $warningMessage = "CppRestUtil was not found in the environment. Instead of CppRestUtil, internal Powershell tools will be used." $warningMessage += "Check more information in the following link: https://eng.ms/docs/cloud-ai-platform/azure-edge-platform-aep/aep-health-standards/observability/mdm/geneva-metrics-mdm/docs/tsg/customer-side/actions/winhttp-escalation#powershell-way" Write-Warning $warningMessage return [string]::Empty } function Get-Etw-Session-And-IfxMetrics-At-Start { tasklist /M IfxMetrics.dll /FO CSV > ProcessLoadingIfxMetrics_At_Start.csv logman NativeMetricsExtension_Provider -ets > MetricsExtensionEtwSessionAtStart.txt logman -ets > EtwSessions.txt } function Get-OS-And-Processes-Information { Get-WmiObject -Class Win32_OperatingSystem | Select-Object Caption, SystemDrive, Version > OS.txt Get-WmiObject -Class Win32_Process | Export-Csv -Path "AllProcesses.csv" -NoTypeInformation } function Get-Local-Time-Information { Write-Output "Collecting time from ME client and server" Get-Date > DateTimeLocal.txt Get-TimeZone > TimeZoneInfo.txt } function Get-Difference-Time-Server-And-Agent([String]$cppRestUtil) { if ([string]::IsNullOrEmpty($cppRestUtil)) { Write-Warning "CppRestUtil.exe is not found. MdmDataCollection will not able to check if there is a difference of time between the server and the agent" return } $serverDate = Invoke-Expression "& '$cppRestUtil' https://global.prod.microsoftmetrics.com/public/lb-probe" | findstr /C:"Date" $serverDate > DateTimeServer.txt $serverDate = $serverDate.TrimStart("Date: ") $serverDate = Get-Date -Date "${serverDate}" $serverDateUtc = $serverDate.ToUniversalTime() $localDateUtc = [DateTime]::UtcNow $deltaMinutes = ($localDateUtc - $serverDateUtc).TotalMinutes if (($deltaMinutes -ge 1) -OR ($deltaMinutes -le -5)) { "ERROR: There is a difference of ${deltaMinutes} minutes between ME client time and server time." > TimeDifferenceError.txt Write-Error "ERROR: There is a difference of ${deltaMinutes} minutes between ME client time and server time." } } function Get-Certificates { if ($SkipCollectionCertificates) { Write-Warning "SkipCollectionCertificates has been set, skipping the collection of certificates." } else { certutil -silent -v -gmt -store "My" > Certificates_On_LocalMachine_My.txt certutil -user -v -gmt -silent -store "My" > Certificates_On_User_My.txt } } function Get-HTTP-Proxy-Configuration { netsh winhttp dump > WinHttp_Config.txt } function Get-Environment-Variables { Get-ChildItem env: | Where-Object -Value $ExcludedEnvironmentVariables -NotIn -Property Name > EnvironmentVariables.txt } function Test-ME-Stamps([String]$mdmDataCollectionOutput, [String]$cppRestUtil) { Write-Output "Testing several MetricsExtension global endpoints" foreach ($meStamp in $MeStamps) { foreach ($stampPath in $StampPaths) { Test-Connection-To-URL $cppRestUtil $meStamp$stampPath >> .\CppRestUtilResults.txt } } } function Get-Open-Sockets-And-Owning-Processes { Write-Output "Listing open sockets and owning processes" netstat -abno > ListeningSockets.txt } function Test-Frontend-Urls { foreach ($meFrontendUrl in $MeFrontendUrls) { foreach ($port in $Ports) { $solvedDNS = Resolve-DnsName -Name $meFrontendUrl Write-Output "Running IPv4 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt Test-NetConnection $solvedDNS.IP4Address -port ${port} -InformationLevel "Detailed" 1>> GlobalStamp_TCPPing.txt 2>&1 Write-Output "Finished running IPv4 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt Write-Output "Running IPv6 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt Test-NetConnection $solvedDNS.IP6Address -port ${port} -InformationLevel "Detailed" 1>> GlobalStamp_TCPPing.txt 2>&1 Write-Output "Finished running IPv6 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt } } } function Get-Application-Event-Logs { Write-Output "Collecting application event logs for Level Error and EventID 1000 happened within last one hour..." Write-Output "Collecting application event logs for Level Error and EventID 1000 happened within last one hour..." > ApplicationErrorLog.txt wevtutil qe Application /q:"*[System[Level=2 and EventID=1000 and TimeCreated[timediff(@SystemTime) <= 3600000]]]" /f:text /rd:true >> ApplicationErrorLog.txt } function Get-Raw-And-Aggregated-Metrics { Set-MdmInputOutputProviders-File Write-Output "Collecting raw and aggregated metrics, please DO NOT press CTRL+C" Invoke-Command "logman start MdmDataCollection -max ${MetricCollectionSizeMaxMB} -pf mdmInputOutputProviders.txt -o mdmRaw.etl -ets" timeout ${MetricCollectionDurationSec} /nobreak Invoke-Command "logman stop MdmDataCollection -ets" Invoke-Command "Remove-Item mdmInputOutputProviders.txt" logman -ets | findstr /i IfxViewerSession > IfxConsumerSessions.txt foreach ($ifxConsumerSession in Get-Content -Path .\IfxConsumerSessions.txt) { Invoke-Command "logman stop $ifxConsumerSession -ets" } } function Set-MdmInputOutputProviders-File { $content = @( "{edc24920-e004-40f6-a8e1-0e6e48f39d84}" "{2f23a2a9-0de7-4cb4-a778-fbdf5c1e7372}" ) $pathMdmInputOutputProviders = (Get-Item -Path ".\" -Verbose).FullName | Join-Path -ChildPath 'mdmInputOutputProviders.txt' [IO.File]::WriteAllLines($pathMdmInputOutputProviders, $content) } function Search-Files-Job([Object[]]$fileNames, [Object[]]$logicalDisks, [String]$outputFile, [String]$currentPath) { $searchFilesFunc = $(Get-Command Search-Files).Definition $invokeCommandFunc = $(Get-Command Invoke-Command).Definition $scriptBlock = { param($fileNames, $logicalDisks, $outputFile, $currentPath) Set-Location $currentPath Invoke-Expression "function Search-Files {$using:searchFilesFunc}" Invoke-Expression "function Invoke-Command {$using:invokeCommandFunc}" Search-Files -fileNames $fileNames -logicalDisks $logicalDisks -outputFile $outputFile } $job = Start-Job -ArgumentList $fileNames, $logicalDisks, $outputFile, $currentPath -ScriptBlock $scriptBlock $job | Wait-Job -Timeout $TimeOutSecondsSearchFiles if ($job.State -ne "Completed") { Write-Warning "$fileNames were searched but they took more than $TimeOutSecondsSearchFiles seconds, aborting this search..." } } function Search-Files([Object[]]$fileNames, [Object[]]$logicalDisks, [String]$outputFile) { foreach($logicalDisk in $logicalDisks) { foreach($fileName in $fileNames) { try { Write-Output "cmd /c dir /s/b ${logicalDisk}\${fileName}" cmd /c "dir /s/b ${logicalDisk}\${fileName} > lastDir.txt 2>>dirFailures.txt" } catch { "ERROR: cmd /c dir /s/b ${logicalDisk}\${fileName} failed: $_" >> dirFailures.txt Write-Error "ERROR: cmd /c dir /s/b ${logicalDisk}\${fileName} failed: $_" } Invoke-Command "Get-Content .\lastDir.txt" Get-Content .\lastDir.txt >> $outputFile } } } function Get-Command-Line-Arguments { $errorMessage = "CommandLineArguments from MetricsExtension.Native.exe were not found." try { $commandLineArguments = (Get-WmiObject Win32_Process -Filter "Name='MetricsExtension.Native.exe'").CommandLine if (-Not [string]::IsNullOrEmpty($commandLineArguments)) { $commandLineArguments > CommandLineArgumentsME.txt return $commandLineArguments } } catch { $errorMessage += " Exception: $_" Write-Error $errorMessage } $errorMessage > CommandLineArgumentsME.txt return [string]::Empty } function Get-Cached-Config([String]$commandLineArguments) { $dataDirectories = Get-Data-Directories $commandLineArguments $counter = 1 foreach ($dataDirectory in $dataDirectories) { if (Test-Path -Path $dataDirectory) { Invoke-Command "New-Item -ItemType Directory -Path .\MetricsExtensionCachedConfig_$counter" Get-ChildItem -Path $dataDirectory -Recurse | Where-Object { $ExcludedTokenFiles -notcontains $_.Name } | ForEach-Object { Invoke-Command "Copy-Item -Path $($_.FullName) -Destination '.\MetricsExtensionCachedConfig_$counter' -Force" } $counter++ } } } function Get-Data-Directories([String]$commandLineArguments) { # As there could be several ME processes running at the same time, we will collect the data directories of all of them $dataDirectories = @() # Try to use the -DataDirectory parameter if (-Not [string]::IsNullOrEmpty($commandLineArguments)) { $commandLineArgumentsArray = $commandLineArguments.Split(" ") for ($i = 1; $i -lt $commandLineArgumentsArray.Count; $i++) { $arg = $commandLineArgumentsArray[$i] if ($arg -eq "-DataDirectory") { $i++ $dataDirectory = $commandLineArgumentsArray[$i] $dataDirectory = $dataDirectory.Replace('"', '') if ($dataDirectory[-1] -ne '\') { $dataDirectory += '\' } $dataDirectories += $dataDirectory } } } # Try to get the path from env var MONITORING_DATA_DIR if (Test-Path env:MONITORING_DATA_DIR) { $dataDirectories += $env:MONITORING_DATA_DIR + '\MetricsExtensionData\' } # Try to get the path from env var DiagnosticStore if (Test-Path env:DiagnosticStore) { $dataDirectories += $env:DiagnosticStore + '\MetricsExtensionData\' } # Get the path from TEMP dir $dataDirectories += $env:TEMP + '\MetricsExtensionData\' return $dataDirectories } function Copy-Autopilot-Logs { if (Test-Path -Path D:\Data\logs\local) { Write-Output "Copying autopilot logs..." Invoke-Command "mkdir .\GenevaMetricsExtensionLogs" Invoke-Command "Copy-Item -Path (Get-ChildItem D:\Data\logs\local\GenevaMetricsExtension_*.log) -Destination GenevaMetricsExtensionLogs" Invoke-Command "mkdir .\GenevaMetricsExtensionHostLogs" Invoke-Command "Copy-Item -Path (Get-ChildItem D:\Data\logs\local\GenevaMetricsExtensionHost_*.log) -Destination GenevaMetricsExtensionHostLogs" Invoke-Command "mkdir .\APPKIMetricsExtensionLogs" Invoke-Command "Copy-Item -Path (Get-ChildItem D:\Data\logs\local\APPKI_MetricsExtension.Native_*.log) -Destination APPKIMetricsExtensionLogs" } else { Write-Warning "No autopilot logs were found. If this machine is not an Autopilot machine, this is not an issue." } } function Get-Autopilot-Ini { if (Test-Path -Path D:\app\autopilot.ini) { Write-Output "Attempting to collect autopilot.ini..." Write-Output "Attempting to collect autopilot.ini..." > CollectAutopilotLogs.txt Invoke-Command "xcopy /C D:\app\autopilot.ini >> CollectAutopilotLogs.txt" } else { Write-Warning "D:\app\autopilot.ini was not found. If this machine is not an Autopilot machine, this is not an issue." } } function Convert-Tsf-Logs-To-Csv([String]$table2csv) { $tsfCounter = 0 foreach ($tsfLog in Get-Content -Path .\TsfLogs.txt) { try { Write-Output "$table2csv $Table2CsvParameters $tsfLog" Write-Output "Waiting for Table2Csv to complete..." Write-Output "${table2csv} ${Table2CsvParameters} ${tsfLog}" >> Table2CsvLogs.txt Invoke-Expression "& '${table2csv}' ${Table2CsvParameters} '${tsfLog}'" >> Table2CsvLogs.txt } catch { "ERROR: Command {$table2csv $Table2CsvParameters '$tsfLog'} Failed: $_" >> Table2CsvLogs.txt Write-Error "ERROR: Command {$table2csv $Table2CsvParameters '$tsfLog'} Failed: $_" } $tsfCounter++ $csvFullPath = $tsfLog.Replace("tsf","csv") $tsfLogFileName = Split-Path $tsfLog -Leaf $csvLogFileName = $tsfLogFileName.Replace(".tsf", "_${tsfCounter}.csv") try { Write-Output "Copy-Item '${csvFullPath}' ${csvLogFileName}" Invoke-Command "Copy-Item '${csvFullPath}' .\${csvLogFileName} 2>> CsvCopyErrors.txt" } catch { "ERROR: Command {failed to copy ${csvFullPath} to .\${csvLogFileName}}: $_" >> CsvCopyErrors.txt Write-Error "ERROR: Command {failed to copy ${csvFullPath} to .\${csvLogFileName}}: $_" } } } function Get-Etw-Session-And-IfxMetrics-At-End { tasklist /M IfxMetrics.dll /FO CSV > ProcessLoadingIfxMetrics_At_End.csv logman NativeMetricsExtension_Provider -ets > MetricsExtensionEtwSessionAtEnd.txt } function Compress-Output([String]$compressedDataOutput, [String]$mdmDataCollectionOutput) { Write-Output "Compressing MDM Data Collection Output ..." try { Invoke-Command "Compress-Archive -Force -Path .\* -DestinationPath '$OutputDirectory\$compressedDataOutput'" Invoke-Command "Set-Location .." Invoke-Command "Remove-Item -r -Force $mdmDataCollectionOutput" Write-Output "Done -^> MDM Data ready at $OutputDirectory\$compressedDataOutput" } catch { Write-Error "ERROR: MDM Data Collection Output has not been compressed: $_" } } function Show-Ending-Message { $date = Get-Date Write-Output "End - MDM Data Collection Script - $date" } function Invoke-Command([String]$command) { $output = Invoke-Expression $command if ($DebugMdmDataCollection) { Write-Output $output } } function Test-Connection-To-URL([String]$cppRestUtil, [String]$url) { try { if ([String]::IsNullOrEmpty($cppRestUtil)) { [System.Net.ServicePointManager]::ServerCertificateValidationCallback = { $true } Write-Output "(New-Object System.IO.StreamReader ((([System.Net.WebRequest]::Create($url)).GetResponse()).GetResponseStream())).ReadToEnd()" (New-Object System.IO.StreamReader ((([System.Net.WebRequest]::Create($url)).GetResponse()).GetResponseStream())).ReadToEnd() } else { Write-Output "'$cppRestUtil' --json $url" Invoke-Expression "& '$cppRestUtil' --json $url" } } catch { "Request to $url failed." } Write-Output "" } function Search-Table2csv([String]$monAgentHostPath) { if ((-Not [string]::IsNullOrEmpty($Table2CsvPathParam)) -and (Test-Path -Path $Table2CsvPathParam)) { return $Table2CsvPathParam } if (-Not [string]::IsNullOrEmpty($monAgentHostPath) -And $monAgentHostPath.Contains("MonAgentHost.exe")) { $table2CsvPath = $monAgentHostPath.Replace("MonAgentHost.exe","table2csv.exe") if (Test-Path -Path $table2CsvPath) { return $table2CsvPath } } return [string]::Empty } function Get-Tsf-Logs([Object[]]$logicalDisks, [String]$mdmDataCollectionOutput, [String]$monAgentHostPath) { if ($SkipCollectionTsfLogs) { Write-Warning "SkipCollectionTsfLogs has been set, skipping the collection of tsf logs." } else { $fileNames = @( "MaMetricsExtensionEtw.tsf" "MAEventTable.tsf" "LocallyAggregatedMdmMetricsV1.tsf" ) $table2csv = Search-Table2csv $monAgentHostPath if ([string]::IsNullOrEmpty($table2csv)) { $warningMessage = "table2csv.exe was not found. Tsf logs will not be collected." $warningMessage += "Please take in account this scenario is useful only if you are using MonitoringAgent" Write-Warning $warningMessage } else { Search-Files-Job $fileNames $logicalDisks "TsfLogs.txt" "$PSScriptRoot\$mdmDataCollectionOutput" Convert-Tsf-Logs-To-Csv $table2csv } } } if (-Not $ImportFunctions) { Main } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAf453hMGvX6qs/ # kRLxVTV0iRZYxWyiZRNYWcZa7FihoqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJmDilnUdFVM/mSoBzBQARSq # JdYmLn7LieFin/hMZCrWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAyXb3WLWzcs6ePF5IyLfF3chF6fLuns6MuSpKEuFcDpEbsKBFhFakY84l # o67uv8QMBuGeNDw50Gou6B8v0kC7G+Y8q8M9b7lvAijdLK3sVF3TRd1nGqn30Xa3 # j4Rps23kbHRXACp6ihB5BeX7gHbN9KfdZEm+M+dq6M4oz+cuhXxmeM7+iFj1ugIc # 5rA8xwQ0rZ74r6uEU96PJOu3GG9xJa8nWTt/AOU123PvNOcn1km2Bv6Dt9/VJUc6 # jXL6R6clFVQsdGKjQtsQR5nSStuyfD8NnAWIVv60BdZZFkA9nO4SA7BQAqWa1XFg # NxYZTq1iUC6/vbqHBs+9jxV111wGg6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDknmjXLkuiJGGcgDAlXZ5ZadOzx8gBafNoyS8ic4bgfQIGZjOr2eQx # GBMyMDI0MDUxNzA1NTcxNi4zNTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnxRrEwIhgPMjAyNDA1MTcxMTAwMDFaGA8yMDI0MDUxODExMDAwMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fFGsQIBADAHAgEAAgIQoTAHAgEAAgIRfzAKAgUA # 6fKYMQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANXdzpf8/io4zOiKiTax # XY8qzkXim67t/1ceRJi+CTWs1Nt8Wjb64X94T474eIQI8a9jT4HxCCHbUz311XWz # lYHCInjrO9QlnEZ9iYJ5RyBZSpkMuDKv76ITEhBgy0hhiF5S2YorDgYyyACynN+u # qfZ5Amkh6ADEXHQyQfOHyvw5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg0uJ5XvhiCTW3NtgmBKkjx8DeaOfrdgfjQeitult4DvYwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj # ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X # HZXUraobAAEAAAHdMCIEIMRyq4W5rYgLXwCWg5DNV5op7iq8OppDtdhxB6InIlBq # MA0GCSqGSIb3DQEBCwUABIICAH+eeeQtaCybvBh15fKdrbLM7WupHBpIOK76VpP+ # W9HKYHZQSDWQhNM4i/RMQ4XldKdNOzaKn4gAiUM5C75zhkB1IyHvkH6jMPaP4YF8 # FQ+p6rSycdquvzp8JIU4id2WIq1QfrGhpP2sb01k5izKwLkKos71S5InZ8qwDKc7 # Ca4cF8jp1Pa8wSW+DIpea/LmDsy+eN7KA1piU6Saua2y4NduIbfTuyAcYu3Y0WE3 # DzUOP5j7r2YOw0VJfiCXowdMvUGxQAbZ4YrbQIbD3Fc2AEdHAG2OvXMGp5Y8h7+N # yFDEiokAzDzElvHa9ELtEAVmO0Ey30CPfuL6wb/EOX+UFNv4+wm+koMtlWgSpQqT # b89UYj74wvB/ljBNCj5XGYAWIFqzkcT4CBqMLBhgKw9b094uEkjt0TOHNUET6bQt # hSLLepve2HTEnc3E4DxiJkp1Cr2g4cybCqiGGrbJ0YY22hdhTQhR0bS6zAEzsFiB # 46ledm4Zf6AVENKJOMVTrpt9iGqHPDcctd1wn3O/A07DtBwuFht3voc1tZkQdPfQ # mDw+1PlC7AFD/0H+2z1qBxEwQXkBY/13aSqjPCprKjP1iKaCXdITjW3Zeuum3pgu # YyHRNCNzlZ8VJGWZ+VIij0/4fe4dyjSBHvgc2t+edgXua/X3I8WZ6nz7kxjttTYV # Ol8s # SIG # End signature block
combined_dataset/train/non-malicious/sample_30_84.ps1
sample_30_84.ps1
steps: - task: NodeTool@0 inputs: versionSource: fromFile versionFilePath: .nvmrc nodejsMirror: https://github.com/joaomoreno/node-mirror/releases/download - task: SFP.build-tasks.esrpclient-tools-task.EsrpClientTool@2 displayName: "Use EsrpClient" - task: AzureKeyVault@1 displayName: "Azure Key Vault: Get Secrets" inputs: azureSubscription: "vscode-builds-subscription" KeyVaultName: vscode-build-secrets SecretsFilter: "github-distro-mixin-password,esrp-aad-username,esrp-aad-password" - task: AzureKeyVault@1 displayName: "Azure Key Vault: Get Secrets" inputs: azureSubscription: "vscode-builds-subscription" KeyVaultName: vscode-build-packages SecretsFilter: "vscode-esrp,c24324f7-e65f-4c45-8702-ed2d4c35df99" # allow-any-unicode-next-line - pwsh: Write-Host "##vso[build.addbuildtag]🚀" displayName: Add build tag - pwsh: node build/npm/setupBuildYarnrc displayName: Prepare build dependencies - pwsh: yarn workingDirectory: build displayName: Install build dependencies - download: current patterns: "**/artifacts_processed_*.txt" displayName: Download all artifacts_processed text files - task: AzureCLI@2 displayName: Fetch secrets inputs: azureSubscription: "vscode-builds-subscription" scriptType: pscore scriptLocation: inlineScript addSpnToEnvironment: true inlineScript: | Write-Host "##vso[task.setvariable variable=AZURE_TENANT_ID]$env:tenantId" Write-Host "##vso[task.setvariable variable=AZURE_CLIENT_ID]$env:servicePrincipalId" Write-Host "##vso[task.setvariable variable=AZURE_CLIENT_SECRET;issecret=true]$env:servicePrincipalKey" - pwsh: | . build/azure-pipelines/win32/exec.ps1 if (Test-Path "$(Pipeline.Workspace)/artifacts_processed_*/artifacts_processed_*.txt") { Write-Host "Artifacts already processed so a build must have already been created." return } $VERSION = node -p "require('./package.json').version" Write-Host "Creating build with version: $VERSION" exec { node build/azure-pipelines/common/createBuild.js $VERSION } env: AZURE_TENANT_ID: "$(AZURE_TENANT_ID)" AZURE_CLIENT_ID: "$(AZURE_CLIENT_ID)" AZURE_CLIENT_SECRET: "$(AZURE_CLIENT_SECRET)" displayName: Create build if it hasn't been created before - pwsh: | $ErrorActionPreference = "Stop" $CertCollection = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2Collection $AuthCertBytes = [System.Convert]::FromBase64String("$(vscode-esrp)") $CertCollection.Import($AuthCertBytes, $null, [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable -bxor [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet) $RequestSigningCertIndex = $CertCollection.Count $RequestSigningCertBytes = [System.Convert]::FromBase64String("$(c24324f7-e65f-4c45-8702-ed2d4c35df99)") $CertCollection.Import($RequestSigningCertBytes, $null, [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable -bxor [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet) $CertStore = New-Object System.Security.Cryptography.X509Certificates.X509Store("My","LocalMachine") $CertStore.Open("ReadWrite") $CertStore.AddRange($CertCollection) $CertStore.Close() $AuthCertSubjectName = $CertCollection[0].Subject $RequestSigningCertSubjectName = $CertCollection[$RequestSigningCertIndex].Subject Write-Host "##vso[task.setvariable variable=RELEASE_AUTH_CERT_SUBJECT_NAME]$AuthCertSubjectName" Write-Host "##vso[task.setvariable variable=RELEASE_REQUEST_SIGNING_CERT_SUBJECT_NAME]$RequestSigningCertSubjectName" displayName: Import certificates - pwsh: node build/azure-pipelines/common/publish.js env: GITHUB_TOKEN: "$(github-distro-mixin-password)" AZURE_TENANT_ID: "$(AZURE_TENANT_ID)" AZURE_CLIENT_ID: "$(AZURE_CLIENT_ID)" AZURE_CLIENT_SECRET: "$(AZURE_CLIENT_SECRET)" SYSTEM_ACCESSTOKEN: $(System.AccessToken) RELEASE_TENANT_ID: "$(PRSS_RELEASE_TENANT_ID)" RELEASE_CLIENT_ID: "$(PRSS_RELEASE_CLIENT_ID)" RELEASE_AUTH_CERT_SUBJECT_NAME: "$(RELEASE_AUTH_CERT_SUBJECT_NAME)" RELEASE_REQUEST_SIGNING_CERT_SUBJECT_NAME: "$(RELEASE_REQUEST_SIGNING_CERT_SUBJECT_NAME)" PROVISION_TENANT_ID: "$(PRSS_PROVISION_TENANT_ID)" PROVISION_AAD_USERNAME: "$(esrp-aad-username)" PROVISION_AAD_PASSWORD: "$(esrp-aad-password)" displayName: Process artifacts retryCountOnTaskFailure: 3 - task: 1ES.PublishPipelineArtifact@1 inputs: targetPath: $(Pipeline.Workspace)/artifacts_processed_$(System.StageAttempt)/artifacts_processed_$(System.StageAttempt).txt artifactName: artifacts_processed_$(System.StageAttempt) sbomEnabled: false displayName: Publish the artifacts processed for this stage attempt condition: always() - pwsh: | $ErrorActionPreference = 'Stop' # Determine which stages we need to watch $stages = @( if ($env:VSCODE_BUILD_STAGE_WINDOWS -eq 'True') { 'Windows' } if ($env:VSCODE_BUILD_STAGE_LINUX -eq 'True') { 'Linux' } if ($env:VSCODE_BUILD_STAGE_LINUX_LEGACY_SERVER -eq 'True') { 'LinuxLegacyServer' } if ($env:VSCODE_BUILD_STAGE_ALPINE -eq 'True') { 'Alpine' } if ($env:VSCODE_BUILD_STAGE_MACOS -eq 'True') { 'macOS' } if ($env:VSCODE_BUILD_STAGE_WEB -eq 'True') { 'Web' } ) Write-Host "Stages to check: $stages" # Get the timeline and see if it says the other stage completed $timeline = Invoke-RestMethod "$($env:BUILDS_API_URL)timeline?api-version=6.0" -Headers @{ Authorization = "Bearer $env:SYSTEM_ACCESSTOKEN" } -MaximumRetryCount 5 -RetryIntervalSec 1 $failedStages = @() foreach ($stage in $stages) { $didStageFail = $timeline.records | Where-Object { $_.name -eq $stage -and $_.type -eq 'stage' -and $_.result -ne 'succeeded' -and $_.result -ne 'succeededWithIssues' } if($didStageFail) { $failedStages += $stage Write-Host "'$stage' failed!" Write-Host $didStageFail } else { Write-Host "'$stage' did not fail." } } if ($failedStages.Length) { throw "Failed stages: $($failedStages -join ', '). This stage will now fail so that it is easier to retry failed jobs." } env: SYSTEM_ACCESSTOKEN: $(System.AccessToken) displayName: Determine if stage should succeed
combined_dataset/train/non-malicious/1603.ps1
1603.ps1
function Take-Ownership { param ( [String]$Folder, [switch]$Everyone, [switch]$ThisItemOnly, [switch]$File, [switch]$Revoke ) if ( !$file -and !($Folder.EndsWith('\')) ) { $Folder += '\' } if ($Folder -match ' ') { $Folder = '"' + $Folder + '"' } if ($Everyone) { if ($Revoke) { if (!$ThisItemOnly) { SubInACL.exe /SUBDIRECTORIES $Folder /REVOKE=Everyone } SubInACL.exe /FILE $Folder /REVOKE=Everyone } else { SubInACL.exe /FILE $Folder /GRANT=Everyone=F if (!$ThisItemOnly) { SubInACL.exe /SUBDIRECTORIES $Folder /GRANT=Everyone=F } } } else { if ($Revoke) { if (!$ThisItemOnly) { SubInACL.exe /SUBDIRECTORIES $Folder /REVOKE=Administrators } SubInACL.exe /FILE $Folder /REVOKE=Administrators } else { SubInACL.exe /FILE $Folder /GRANT=Administrators=F if (!$ThisItemOnly) { SubInACL.exe /SUBDIRECTORIES $Folder /GRANT=Administrators=F } } } }
combined_dataset/train/non-malicious/Read-HostWithPrompt.ps1
Read-HostWithPrompt.ps1
#############################################################################\n##\n## Read-HostWithPrompt\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nRead user input, with choices restricted to the list of options you\nprovide.\n\n.EXAMPLE\n\nPS >$caption = "Please specify a task"\nPS >$message = "Specify a task to run"\nPS >$option = "&Clean Temporary Files","&Defragment Hard Drive"\nPS >$helptext = "Clean the temporary files from the computer",\n>> "Run the defragment task"\n>>\nPS >$default = 1\nPS >Read-HostWithPrompt $caption $message $option $helptext $default\n\nPlease specify a task\nSpecify a task to run\n[C] Clean Temporary Files [D] Defragment Hard Drive [?] Help\n(default is "D"):?\nC - Clean the temporary files from the computer\nD - Run the defragment task\n[C] Clean Temporary Files [D] Defragment Hard Drive [?] Help\n(default is "D"):C\n0\n\n#>\n\nparam(\n ## The caption for the prompt\n $Caption = $null,\n\n ## The message to display in the prompt\n $Message = $null,\n\n ## Options to provide in the prompt\n [Parameter(Mandatory = $true)]\n $Pption,\n\n ## Any help text to provide\n $HelpText = $null,\n\n ## The default choice\n $Default = 0\n)\n\nSet-StrictMode -Version Latest\n\n## Create the list of choices\n$choices = New-GenericObject `\n Collections.ObjectModel.Collection `\n Management.Automation.Host.ChoiceDescription\n\n## Go through each of the options, and add them to the choice collection\nfor($counter = 0; $counter -lt $option.Length; $counter++)\n{\n $choice = New-Object Management.Automation.Host.ChoiceDescription `\n $option[$counter]\n\n if($helpText -and $helpText[$counter])\n {\n $choice.HelpMessage = $helpText[$counter]\n }\n\n $choices.Add($choice)\n}\n\n## Prompt for the choice, returning the item the user selected\n$host.UI.PromptForChoice($caption, $message, $choices, $default)
combined_dataset/train/non-malicious/1617.ps1
1617.ps1
function global:Get-LoggedOnUser { [CmdletBinding()] Param ( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [String[]]$ComputerName ) Begin { Write-Host "`n Checking Users . . . " $i = 0 } Process { $ComputerName | Foreach-object { $Computer = $_ try { $processinfo = @(Get-WmiObject -class win32_process -ComputerName $Computer -EA "Stop") if ($processinfo) { $processinfo | Foreach-Object {$_.GetOwner().User} | Where-Object {$_ -ne "NETWORK SERVICE" -and $_ -ne "LOCAL SERVICE" -and $_ -ne "SYSTEM"} | Sort-Object -Unique | ForEach-Object { New-Object psobject -Property @{Computer=$Computer;LoggedOn=$_} } | Select-Object Computer,LoggedOn } } catch { "Cannot find any processes running on $computer" | Out-Host } } } End { } }
combined_dataset/train/non-malicious/Set-Computername_3.ps1
Set-Computername_3.ps1
function Set-ComputerName { param( [switch]$help, [string]$originalPCName=$(read-host "Please specify the current name of the computer"), [string]$computerName=$(read-host "Please specify the new name of the computer")) $usage = "set-ComputerName -originalPCname CurrentName -computername AnewName" if ($help) {Write-Host $usage;break} @@ $computer = Get-WmiObject Win32_ComputerSystem -computername $originalPCName $computer.Rename($computerName) }
combined_dataset/train/non-malicious/sample_42_12.ps1
sample_42_12.ps1
# Localized 04/14/2024 08:54 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=是(&Y) PromptNoString=否(&N) BundleFound=找到下列資源存放區: {0} PackageFound=找到封裝: {0} EncryptedBundleFound=找到加密的套件組合: {0} EncryptedPackageFound=找到加密的套件: {0} CertificateFound=找到憑證: {0} DependenciesFound=找到相依性封裝: GettingDeveloperLicense=正在取得開發人員授權... InstallingCertificate=正在安裝憑證... InstallingPackage=\n正在安裝應用程式... AcquireLicenseSuccessful=已成功取得開發人員授權。 InstallCertificateSuccessful=已成功安裝憑證。 Success=\n成功: 已成功安裝您的應用程式。 WarningInstallCert=\n您即將安裝數位憑證到您電腦的「受信任的人」憑證存放區。這會帶來嚴重的安全性風險,請務必在您信任這個數位憑證的建立者的情況下才執行這個動作。\n\n使用完這個應用程式之後,您應該手動移除相關的數位憑證。有關執行這個動作的指示,請參閱: http://go.microsoft.com/fwlink/?LinkId=243053\n\n您確定要繼續嗎?\n\n ElevateActions=\n安裝這個應用程式之前,必須執行下列動作: ElevateActionDevLicense=\t- 取得開發人員授權 ElevateActionCertificate=\t- 安裝簽署憑證 ElevateActionsContinue=必須有系統管理員認證才能繼續。請接受 UAC 提示,並在系統要求時提供您的系統管理員密碼。 ErrorForceElevate=您必須提供系統管理員認證才能繼續。請在不含 -Force 參數的情況下執行這個指令碼,或從更高權限的 PowerShell 視窗執行。 ErrorForceDeveloperLicense=必須透過使用者互動才能取得開發人員授權。請在不含 -Force 參數的情況下執行指令碼。 ErrorLaunchAdminFailed=錯誤: 無法以系統管理員身分啟動新處理序。 ErrorNoScriptPath=錯誤: 您必須從檔案啟動這個指令碼。 ErrorNoPackageFound=錯誤: 在指令碼目錄中找不到任何封裝或資源存放區。請確定您要安裝的封裝或資源存放區是放在與這個指令碼相同的目錄中。 ErrorManyPackagesFound=錯誤: 在指令碼目錄中找到多個封裝或資源存放區。請確定您只將要安裝的封裝或資源存放區放在與這個指令碼相同的目錄中。 ErrorPackageUnsigned=錯誤: 封裝或資源存放區未經數位簽署,或其簽章已損毀。 ErrorNoCertificateFound=錯誤: 在指令碼目錄中找不到任何憑證。請確定用來簽署要安裝之封裝或資源存放區的憑證是放在與這個指令碼相同的目錄中。 ErrorManyCertificatesFound=錯誤: 在指令碼目錄中找到多個憑證。請確定您只將用來簽署要安裝之封裝或資源存放區的憑證放在與這個指令碼相同的目錄中。 ErrorBadCertificate=錯誤: 檔案 "{0}" 不是有效的數位憑證。CertUtil 傳回錯誤碼 {1}。 ErrorExpiredCertificate=錯誤: 開發人員憑證 "{0}" 已過期。一個可能的原因是系統時鐘未設為正確的日期和時間。如果系統設定正確,請連絡應用程式擁有者,用有效的憑證重新建立封裝或資源存放區。 ErrorCertificateMismatch=錯誤: 這個憑證與用來簽署封裝或資源存放區的憑證不符。 ErrorCertIsCA=錯誤: 憑證不可以是憑證授權單位。 ErrorBannedKeyUsage=錯誤: 憑證不可以有下列金鑰使用方法: {0}。金鑰使用方法必須是未指定或等於 "DigitalSignature"。 ErrorBannedEKU=錯誤: 憑證不可以有下列擴充金鑰使用方法: {0}。只允許「程式碼簽署」和「永久簽署」EKU。 ErrorNoBasicConstraints=錯誤: 憑證遺漏基本限制延伸。 ErrorNoCodeSigningEku=錯誤: 憑證遺漏程式碼簽署的擴充金鑰使用方法。 ErrorInstallCertificateCancelled=錯誤: 已取消安裝憑證。 ErrorCertUtilInstallFailed=錯誤: 無法安裝憑證。CertUtil 傳回錯誤碼 {0}。 ErrorGetDeveloperLicenseFailed=錯誤: 無法取得開發人員授權。如需詳細資訊,請參閱 http://go.microsoft.com/fwlink/?LinkID=252740。 ErrorInstallCertificateFailed=錯誤: 無法安裝憑證。狀態: {0}。如需詳細資訊,請參閱 http://go.microsoft.com/fwlink/?LinkID=252740。 ErrorAddPackageFailed=錯誤: 無法安裝應用程式。 ErrorAddPackageFailedWithCert=錯誤: 無法安裝應用程式。為了確保安全性,請考慮解除安裝簽署憑證,直到您可以安裝應用程式為止。如需執行此動作的指示,請參閱:\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@
combined_dataset/train/non-malicious/sample_11_7.ps1
sample_11_7.ps1
ConvertFrom-StringData @' id_virtualization=Virtualization Information id_virtualizationobtaining=Obtaining Information about Virtualization Environment id_virtualizationoutput=Virtualization Information Output '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBS8q0KncuLXFV/ # PBEBqbmLcB1mcikGQvYIh0WwMWCVk6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICyyR/ZLIG+GmjOk5pxnXdt+ # cscjwSOENqHG+jlNwmBHMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALkTV1uqkKEdDXhLugmTbPuKFgtofgd2Blr8DRowIW76p5VzZMWFJAC/E # t74HBlB2pFK0Bt22bD9NmRjNJppIshKP9JicVN5ROM920QSFbz9tTy7XQlRfoVSm # SpfLp8KVxImJkkxWifi2WT7g6TgQQr3Zm5a/Wa1NLvy8bwFmgcRxL/sjyP8KvZNo # dkuBmDKZgmjxPtOobMlMLumfEy0oANCGhpQYuaj+ONRXlbfbhsdj6JMahUAnbW0Y # 2qg0tyW0K8bgmlbn2eLNXkZ71kiQts7ZpGhSDKVXdMb3shWZMf0R8P+nZZRK2zHB # TPAiQmbK8nslNbidaThOkx8Z27hq/qGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA1mRyEOi1+RYcS3SUgNoMBNtrZnfE0cwa5eCJQJVhEPwIGZutwxmXm # GBMyMDI0MTAyODExNDA0Mi4zNTlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe # CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq # U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf # Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp # ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw # UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF # acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi # vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8 # /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I # vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM # SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92 # BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo # PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT # FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A # Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW # /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy # tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h # 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ # lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr # 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU # PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t # iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ # 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx # f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK # AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz # tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0 # teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey # h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ # N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI # Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl # FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgKdfHqpXYT/O+ # 0Ti9IgpOMnD94M9j+K/qcyuHiJXKCHYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB # MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB # CwUABIICAIwKceh/eVtJasKzYK4RPWnzeN5q6JdIp6KIYDQRFUeEAY6JP6FDgjmb # EUBTqT2TrBrWBDUfn+yzI0KK5JqbcoQikXUEtWtmZPJSOisjXabMxSjkGy7t+qdM # OIgLISQX0zMO1LVSA0Ly/iDm99ijO/2To5CSckX74HpWMVGvgmBS5rYtsgJB3Xzt # z0heJDUht3lAa/WWms6JbMVS3WC5XNTZcbaHmFuhdEpE8TGpEtpL9cjv8IHMuue2 # Ys2mRqGY/r+jMOsMvkERLtRLD3fMjnz00noQmbnZrtqjDmsNNcYDH4Cmqs+Y0Ju8 # y5RLAdyNds6tz2WX3ilZ6gxfYrT5kleUO6hwOMVipMS/e5sWvZivQbLmdscoGNfd # oN+/dKWMjkGwp77MeYR9Dne5EBOv38yC3w6R2bcDtBRwVWpHB3q65Nn4NzVL2lof # oiI6tng3DHcXW3mrDXzeZK+czSmgNjG4Tm4fSVVwoNYp7HxHQjkcx7rew9fV+g+R # DhXulvK7XTJ7kkS6lZuqn0i5FpbeQgl2eErrjqDIahW2SNCgm6Eo7ZvTJt+tO+Np # aHMZvBJ8HPAl3vK02PqphE72q4oR3xcmaWNLLM5K/BDbNZdFuc3oun92hfaUdp2t # wvbAvIs3Y/+g4p0I1WqldOlXiYkHK+8KuImHPOtZtQEqrULj7y11 # SIG # End signature block
combined_dataset/train/non-malicious/sample_61_94.ps1
sample_61_94.ps1
# clickup-pretty-tasks README ClickUp Pretty Tasks displays tasks description and status right in the code where they are mentioned. ## Features - Decorate task links with task status + details ![image](https://github.com/everix-io/vscode-extensions/raw/HEAD/Media/demoscreen.png) - Run commands: - Get ClickUp Task Details by Internal ID - Open ClickUp Task Details by Internal ID - Get ClickUp Task Details by Custom ID - Open ClickUp Task Details by Custom ID ## Configuration Use command `ClickUp Pretty Tasks: Configure ClickUp` to configure clickup authorisation token and Team ID. Follow the [official guide](https://clickup.com/api/developer-portal/authentication/) to obtain a Personal token: ### Getting personal token - Link to get personal token: https://app.clickup.com/settings/apps (press `Generate` if you don't have it yet) ### Getting Team ID: Option 1 Go to any task of your clickup, look at the URL like `https://app.clickup.com/t/9999999999/XXX-1123`. Here `9999999999` is your Team ID. ### Getting Team ID: Option 2 You can get Team ID with `curl`: ```sh curl -H "Authorization: YOUR_API_KEY" https://api.clickup.com/api/v2/team ``` Or using PowerShell: ```pwsh Invoke-RestMethod -Uri "https://api.clickup.com/api/v2/team" -Method Get -Headers @{"Authorization"="YOUR_API_KEY"} | ConvertTo-Json ``` It should give you JSON with your teams for each of which you can see ID (`teams/id`: ```json { "teams": [ { "id": "9999999999", "name": "YOUR COMPANY", ... } ] } ```
combined_dataset/train/non-malicious/Get-NICSettings.ps1
Get-NICSettings.ps1
# Get-NICSettings by Hugo Peeters of www.peetersonline.nl ######################################################### $serverName = Read-Host "Enter server name" $NicConfig = Get-WmiObject -Class Win32_NetworkAdapterConfiguration -ComputerName $serverName $myCol = @() ForEach ($Nic in $NicConfig) { If ($Nic.IPAddress -ne $null) { $myObj = "" | Select-Object Description, DHCPEnabled, IPAddress, IPSubnet, DefaultIPGateway, DNSServers, WINSServers, NICModel, SpeedDuplex $myObj.Description = $Nic.Description $myObj.DHCPEnabled = $Nic.DHCPEnabled $myObj.IPAddress = $Nic.IPAddress $myObj.IPSubnet = $Nic.IPSubnet $myObj.DefaultIPGateway = $Nic.DefaultIPGateway $myObj.DNSServers = $Nic.DNSServerSearchOrder $myObj.WINSServers = $Nic.WINSPrimaryServer,$Nic.WINSSecondaryServer $registry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine, $serverName) $baseKey = $registry.OpenSubKey("SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}") $subKeyNames = $baseKey.GetSubKeyNames() ForEach ($subKeyName in $subKeyNames) { $subKey = $baseKey.OpenSubKey("$subKeyName") $ID = $subKey.GetValue("NetCfgInstanceId") If ($ID -eq $Nic.SettingId) { $componentID = $subKey.GetValue("ComponentID") If ($componentID -match "ven_14e4") { $myObj.NICModel = "Broadcom" $requestedMediaType = $subKey.GetValue("RequestedMediaType") $enum = $subKey.OpenSubKey("Ndi\\Params\\RequestedMediaType\\Enum") $myObj.SpeedDuplex = $enum.GetValue("$requestedMediaType") } ElseIf ($componentID -match "ven_8086") { $myObj.NICModel = "Intel" $SD = $subKey.GetValue("SpeedDuplex") $enum = $subKey.OpenSubKey("Ndi\\Params\\SpeedDuplex\\Enum") $myObj.SpeedDuplex = $enum.GetValue("$SD") } ElseIf ($componentID -match "b06bdrv") { $myObj.NICModel = "HP" $SD = $subKey.GetValue("req_medium") $enum = $subKey.OpenSubKey("Ndi\\Params\\req_medium\\Enum") $myObj.SpeedDuplex = $enum.GetValue("$SD") } Else { $myObj.NICModel = "unknown" $myObj.SpeedDuplex = "unknown" } } } $myCol += $myObj } } $myCol
combined_dataset/train/non-malicious/play-note(s)_1.ps1
play-note(s)_1.ps1
function Play-Note([string]$note,[int] $duration = 5) { if (!($note -match '(\\d+)')) { $note+='4' };[void]($note -match '([A-G#]{1,2})(\\d+)') [console]::Beep((440 * [math]::Pow([math]::pow(2,(1/12)), (([int] $matches[2]) - 4)* 12 + $( switch($matches[1]) { 'A' { 0 } 'A#' { 1 } 'Bb' { 1 } 'B' { 2 } 'C' { 3 } 'C#' { 4 } 'Db' { 4 } 'D' { 5 } 'D#' { 6 } 'Eb' { 6 } 'E' { 7 } 'F' { 8 } 'F#' { 9 } 'Gb' { 9 } 'G' { 10 } 'G#' { 11 } 'Ab' { 11 } }))),$duration * 100 ) } function Speak-words ([string]$words,[bool]$pause = $true) { $flag = 1 if ($pause) {$flag = 2} $voice = new-Object -com SAPI.spvoice $voice.speak($words, [int] $flag) # 2 means wait until speaking is finished to continue } function Play-Notes { $defaultduration = 5;if($args[0] -is [int]) {$defaultduration = $args[0]} for($i = 0;$i -lt $args.length;$i++) { $duration = $defaultduration if ($i -lt $args.length-1) { if ($args[$i+1] -is [int]) {$duration = $args[$i+1] } } if ($args[$i] -is [string]) { if ($args[$i].startswith("!")) { speak-words $args[$i].replace('!','') } else { play-note $args[$i] $duration } } } } play-notes A B C 20 E 10 B 10 play-notes A B C 20 E 10 B 10 play-notes F5 2 E5 2 D5 2 C5 2 B5 2 A5 2 G 4 F5 2 E5 2 D5 2 C5 2 B5 2 A5 2 G 4 play-notes 2 F5 E5 D5 C5 B5 A5 G 4 F5 E5 D5 C5 B5 A5 G 4 play-notes 4 F5 E5 D5 C5 B5 A5 G F5 E5 D5 C5 B5 A5 G play-notes "!here we go now" Db5 Db Eb Gb Ab "C#" 6 !YEAH play-notes A "!$([datetime]::now)" C
combined_dataset/train/non-malicious/sample_57_76.ps1
sample_57_76.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$false)] [switch] $KeepFabricData, [Parameter(Mandatory=$false)] [string] $LogPath, [Parameter(Mandatory=$false)] [string] $FabricDataRoot ) function DeletePath([string] $pathToDelete) { if (([string]::IsNullOrEmpty($pathToDelete)) -or (!(Test-Path $pathToDelete))) { return } Write-Host "Deleting $pathToDelete" Remove-Item $pathToDelete -Recurse -Force 2> $null if (Test-Path $pathToDelete) { Write-Warning "$pathToDelete still exists. Delete manually." } } $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if (!$IsAdmin) { Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } # Get registry keys $FabricRegKeyPath = "HKLM:\SOFTWARE\Microsoft\Service Fabric" Get-ItemProperty -Path $FabricRegKeyPath -ErrorAction Ignore | Out-Null if ($?) { $FabricRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricRoot").FabricRoot $FabricCodePath = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricCodePath").FabricCodePath $FabricDataRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricDataRoot").FabricDataRoot $FabricBinRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricBinRoot").FabricBinRoot } else { Write-Host "Registry key is already removed." } $gacDirectories = @( "$env:SystemRoot\Microsoft.NET\assembly\GAC_64\System.Fabric", "$env:SystemRoot\Microsoft.NET\assembly\GAC_64\System.Fabric.Strings", "$env:SystemRoot\Microsoft.NET\assembly\GAC_MSIL\System.Fabric.Management.ServiceModel", "$env:SystemRoot\Microsoft.NET\assembly\GAC_MSIL\System.Fabric.Strings" ) # Stop services Get-Service FabricHostSvc -ErrorAction Ignore | Out-Null if ($?) { Write-Host "Stopping FabricHostSvc." Stop-Service FabricHostSvc } else { Write-Host "FabricHostSvc is already removed." } Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null if ($?) { Write-Host "Stopping FabricInstallerSvc." Stop-Service FabricInstallerSvc } else { $FabricInstallerSvcAbsent = $true Write-Host "FabricInstallerSvc is already removed." } # Try determine file locations if registry key deleted if (!(Test-Path variable:FabricRoot) ` -or [string]::IsNullOrEmpty($FabricRoot) ` -or !(Test-Path $FabricRoot)) { $AttemptedFabricRootPath = Join-Path $env:ProgramFiles "Microsoft Service Fabric" if (Test-Path $AttemptedFabricRootPath) { Write-Host "FabricRoot autodetermined at '$AttemptedFabricRootPath'." $FabricRoot = $AttemptedFabricRootPath $AttemptedFabricCodePath = Join-Path $FabricRoot "bin\Fabric\Fabric.Code" if (Test-Path $AttemptedFabricCodePath) { Write-Host "FabricCodePath autodetermined at '$AttemptedFabricCodePath'." $FabricCodePath = $AttemptedFabricCodePath } else { Write-Host "FabricCodePath not present." } } else { Write-Host "FabricRoot not present." } } if ([string]::IsNullOrEmpty($LogPath)) { $LogPath = Join-Path $env:TEMP -ChildPath "FabricSetupLog.Uninstall.log" } # Uninstall Fabric if ((Test-Path variable:FabricCodePath) ` -and ![string]::IsNullOrEmpty($FabricCodePath)) { $fabricSetupPath = Join-Path $FabricCodePath -ChildPath "FabricSetup.exe" if (Test-Path $fabricSetupPath) { $arguments = "/operation:uninstall" if ($KeepFabricData.IsPresent) { $arguments += " /deleteData:false"; } Write-Host "FabricSetup uninstall running..." $command = "`"$fabricSetupPath`" $arguments && exit 0 || exit 1" $setupOutput = cmd.exe /c $command > "$LogPath" if ($LASTEXITCODE -eq 1) { Write-Error "FabricSetup ran into an issue. Find log at $LogPath." if ($setupOutput -is [System.Array]) { $setupOutput = $setupOutput | Out-String } Write-Error $setupOutput } else { Write-Host "FabricSetup uninstall Completed. Find log at $LogPath." } } else { Write-Host "FabricSetup.exe is no longer in FabricCodePath. Uninstall may have already run." } } else { Write-Host "Fabric is already uninstalled." } if (!(Test-Path variable:FabricInstallerSvcAbsent) ` -or !$FabricInstallerSvcAbsent) { Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null if ($?) { Write-Host "Deleting FabricInstallerSvc" $service = Get-WmiObject -Class Win32_Service -Filter "Name='FabricInstallerSvc'" $service.delete() | Out-Null Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null if ($?) { Write-Warning "FabricInstallerSvc is still present. May need to reboot to complete uninstallation." } } else { Write-Host "FabricInstallerSvc is already removed." } } # Delete cluster data & bits if ((Test-Path variable:FabricDataRoot) ` -and (!$KeepFabricData.IsPresent)) { DeletePath($FabricDataRoot) } if (Test-Path variable:FabricBinRoot) { DeletePath($FabricBinRoot) } if (Test-Path variable:FabricRoot) { DeletePath($FabricRoot) } foreach ($gacDirectory in $gacDirectories) { DeletePath($gacDirectory) } # SIG # Begin signature block # MIInlgYJKoZIhvcNAQcCoIInhzCCJ4MCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDGxr3nS3N8GQF+ # XH1ApgppgVuwoWyOxB+AQBJ52EpooaCCDXYwggX0MIID3KADAgECAhMzAAACURR2 # zMWFg24LAAAAAAJRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMjU5WhcNMjIwOTAxMTgzMjU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDBIpXR3b1IYAMunV9ZYBVYsaA7S64mqacKy/OJUf0Lr/LW/tWlJDzJH9nFAhs0 # zzSdQQcLhShOSTUxtlwZD9dnfIcx4pZgu0VHkqQw2dVc8Ob21GBo5sVrXgEAQxZo # rlEuAl20KpSIFLUBwoZFGFSQNSMcqPudXOw+Mhvn6rXYv/pjXIjgBntn6p1f+0+C # 2NXuFrIwjJIJd0erGefwMg//VqUTcRaj6SiCXSY6kjO1J9P8oaRQBHIOFEfLlXQ3 # a1ATlM7evCUvg3iBprpL+j1JMAUVv+87NRApprPyV75U/FKLlO2ioDbb69e3S725 # XQLW+/nJM4ihVQ0BHadh74/lAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUMLgM7NX5EnpPfK5uU6FPvn2g/Ekw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzQ2NzU5NjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIVJlff+Fp0ylEJhmvap # NVv1bYLSWf58OqRRIDnXbHQ+FobsOwL83/ncPC3xl8ySR5uK/af4ZDy7DcDw0yEd # mKbRLzHIfcztZVSrlsg0GKwZuaB2MEI1VizNCoZlN+HlFZa4DNm3J0LhTWrZjVR0 # M6V57cFW0GsV4NlqmtelT9JFEae7PomwgAV9xOScz8HzvbZeERcoSRp9eRsQwOw7 # 8XeCLeglqjUnz9gFM7RliCYP58Fgphtkht9LNEcErLOVW17m6/Dj75zg/IS+//6G # FEK2oXnw5EIIWZraFHqSaee+NMgOw/R6bwB8qLv5ClOJEpGKA3XPJvS9YgOpF920 # Vu4Afqa5Rv5UJKrsxA7HOiuH4TwpkP3XQ801YLMp4LavXnvqNkX5lhFcITvb01GQ # lcC5h+XfCv0L4hUum/QrFLavQXJ/vtirCnte5Bediqmjx3lswaTRbr/j+KX833A1 # l9NIJmdGFcVLXp1en3IWG/fjLIuP7BqPPaN7A1tzhWxL+xx9yw5vQiT1Yn14YGmw # OzBYYLX0H9dKRLWMxMXGvo0PWEuXzYyrdDQExPf66Fq/EiRpZv2EYl2gbl9fxc3s # qoIkyNlL1BCrvmzunkwt4cwvqWremUtqTJ2B53MbBHlf4RfvKz9NVuh5KHdr82AS # MMjU4C8KNTqzgisqQdCy8unTMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGXYwghlyAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAJRFHbMxYWDbgsAAAAAAlEwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPafaxS0meyHyGv8CYqifvdv # zTOFuUDbfJYMAs2IIO2QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAqxNQyy5XfVwZVY5EHlk/eTHIMo9aB30cyrtLG9U46SEpHobxules7pgM # YdAhCNYV62C9/jZ4Jjx0/7iqopc+z4RoXfu8605epZSMIzN/JynVTQLr6x3zZM1w # ZwDeEfO/8G5EDP0VJuFv3sWEji2x0ePcz7KR2iKM4mu9IMXJhTTEmEGthCa/e8Y4 # hRDJc/ucZMLq4K4yausfg1tD2Tt2eV32WSBgBzC/ofPUp3cNoO69YHFY7xlPtqL7 # zBeWqkDN0VZYZewQMASBSvTgxLOX5Ok1++lmbc/jsMXwJJ5okMAPIiih3o52JUxx # Mf7iQ2EK0QZHaGYzM6l7xHD39Bc3aKGCFwAwghb8BgorBgEEAYI3AwMBMYIW7DCC # FugGCSqGSIb3DQEHAqCCFtkwghbVAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCi7dP0TEmRTnFw/aGiQodxiInUOu0yTG/7KXsFBVW+OQIGYoKQ3GrV # GBMyMDIyMDUyMzEyNTg1My4wMThaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo0OUJDLUUz # N0EtMjMzQzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EVcwggcMMIIE9KADAgECAhMzAAABlwPPWZxriXg/AAEAAAGXMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIxMTIwMjE5MDUx # NFoXDTIzMDIyODE5MDUxNFowgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjQ5QkMtRTM3QS0yMzNDMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA7QBK6kpBTfPwnv3LKx1VnL9YkozUwKzyhDKij1E6WCV/ # EwWZfPCza6cOGxKT4pjvhLXJYuUQaGRInqPks2FJ29PpyhFmhGILm4Kfh0xWYg/O # S5Xe5pNl4PdSjAxNsjHjiB9gx6U7J+adC39Ag5XzxORzsKT+f77FMTXg1jFus7Er # ilOvWi+znMpN+lTMgioxzTC+u1ZmTCQTu219b2FUoTr0KmVJMQqQkd7M5sR09PbO # p4cC3jQs+5zJ1OzxIjRlcUmLvldBE6aRaSu0x3BmADGt0mGY0MRsgznOydtJBLne # rc+QK0kcxuO6rHA3z2Kr9fmpHsfNcN/eRPtZHOLrpH59AnirQA7puz6ka20TA+8M # hZ19hb8msrRo9LmirjFxSbGfsH3ZNEbLj3lh7Vc+DEQhMH2K9XPiU5Jkt5/6bx6/ # 2/Od3aNvC6Dx3s5N3UsW54kKI1twU2CS5q1Hov5+ARyuZk0/DbsRus6D97fB1ZoQ # lv/4trBcMVRz7MkOrHa8bP4WqbD0ebLYtiExvx4HuEnh+0p3veNjh3gP0+7DkiVw # IYcfVclIhFFGsfnSiFexruu646uUla+VTUuG3bjqS7FhI3hh6THov/98XfHcWeNh # vxA5K+fi+1BcSLgQKvq/HYj/w/Mkf3bu73OERisNaacaaOCR/TJ2H3fs1A7lIHEC # AwEAAaOCATYwggEyMB0GA1UdDgQWBBRtzwHPKOswbpZVC9Gxvt1+vRUAYDAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC # AQAESNhh0iTtMx57IXLfh4LuHbD1NG9MlLA1wYQHQBnR9U/rg3qt3Nx6e7+QuEKM # EhKqdLf3g5RR4R/oZL5vEJVWUfISH/oSWdzqrShqcmT4Oxzc2CBs0UtnyopVDm4W # 2Cumo3quykYPpBoGdeirvDdd153AwsJkIMgm/8sxJKbIBeT82tnrUngNmNo8u7l1 # uE0hsMAq1bivQ63fQInr+VqYJvYT0W/0PW7pA3qh4ocNjiX6Z8d9kjx8L7uBPI/H # sxifCj/8mFRvpVBYOyqP7Y5di5ZAnjTDSHMZNUFPHt+nhFXUcHjXPRRHCMqqJg4D # 63X6b0V0R87Q93ipwGIXBMzOMQNItJORekHtHlLi3bg6Lnpjs0aCo5/RlHCjNkSD # g+xV7qYea37L/OKTNjqmH3pNAa3BvP/rDQiGEYvgAbVHEIQz7WMWSYsWeUPFZI36 # mCjgUY6V538CkQtDwM8BDiAcy+quO8epykiP0H32yqwDh852BeWm1etF+Pkw/t8X # O3Q+diFu7Ggiqjdemj4VfpRsm2tTN9HnAewrrb0XwY8QE2tp0hRdN2b0UiSxMmB4 # hNyKKXVaDLOFCdiLnsfpD0rjOH8jbECZObaWWLn9eEvDr+QNQPvS4r47L9Aa8Lr1 # Hr47VwJ5E2gCEnvYwIRDzpJhMRi0KijYN43yT6XSGR4N9jCCB3EwggVZoAMCAQIC # EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS # b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX # DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC # 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG # Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP # 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P # XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361 # VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB # Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9 # X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e # wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw # wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr # 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e # FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj # BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n # FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw # PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j # cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH # hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF # BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl # ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf # ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC # j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu # 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/ # GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D # YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO # xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO # Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I # 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0 # zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM # mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT # TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLOMIICNwIBATCB+KGB0KSBzTCByjEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj # cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF # U046NDlCQy1FMzdBLTIzM0MxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAGFA0rCNmEk0zU12DYNGMU3B1mPRoIGD # MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF # BQACBQDmNaDsMCIYDzIwMjIwNTIzMTM1ODA0WhgPMjAyMjA1MjQxMzU4MDRaMHcw # PQYKKwYBBAGEWQoEATEvMC0wCgIFAOY1oOwCAQAwCgIBAAICAZsCAf8wBwIBAAIC # EkIwCgIFAOY28mwCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAK # MAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQBtDklvnad6 # q7xgrn7P5KhuWqzkiJ3SisJbkHWtGxw3pT8ScDwxN4fbiImPlPNNisRQDnSDVGvF # y2KkYDnGsJManBoKx4snrnU7oEKcMfWRpqKjuq8xtBcdjWFW1mniAExNPyCI0azg # opBAlAi+4ol0PkPnpelatXO5mci2dcF61zGCBA0wggQJAgEBMIGTMHwxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m # dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABlwPPWZxriXg/AAEAAAGXMA0GCWCG # SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZI # hvcNAQkEMSIEIMPvoj+9INaP2GOlSWMuaxbxEaBjx3Gz9zPLBbBqdpBVMIH6Bgsq # hkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgW3vaGxCVejj+BAzFSfMxfHQ+bxxkqCw8 # LkMY/QZ4pr8wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAIT # MwAAAZcDz1mca4l4PwABAAABlzAiBCDjwReENklOx/Uovtrdj8M0bmyas5fYdKQ+ # 2/gHS2UZGTANBgkqhkiG9w0BAQsFAASCAgCtzZJPrOp+2ps4B9FDGMbCEaqwh4Mb # zW95pZhuq6MuxNvsXuASRbjpfUK9YvB2vSGGjTR5sFjbnd0tAK2ynoI1BW7pLgLj # DXoBoW+iLeqyz6ggxAyrO7/mkxajSHy9hG8uIKGsD64/yOIFO3p0jJ7jYVIumIyp # dmi7xLS6W6iQtCXDxQFAWrxGfFO8w2HG2Rxf2qP+t3Yn6Ml2hg6NfTYsXLk8/C9m # OfbJxigT+xsAKVrdY1BmixMRcARVtpCc6hoSz67ip3tnfWOVzNVrSWuOJ44nle5H # 7h156vYXD3lr9A8epV1RP6ROb1pW/ntF65/tdb6jozpq/gN4jPZkut2r99EL42HX # qq4fCrd9TYQfncExxQMHhiqip/K3Frx7vxyoIcdDr20tgc/57wJLgp0EfFPNTDT7 # SP1VE5d7rps2/xnfUMv/Lz79Fmk64YO1NeIdGPU1MMuGaBBBJr681WgbVhn/RPpt # WhnCKG9FVkILJZ1jiVTIL5WqL5bIhehCBUKi9cG17Rmlbj3FqbFQLHT9pdjBjAiu # eTuR93I2UisKkXsI4wvzfGtREW65/8YXMGVh4f5IMlVxq15Om6e0OvVzhlFVF05N # 46VLfmR19u0GAmo0/wx+c+dIWIhCbCFCbwN1jJOfbhvCR/NMBpLmbO8KBjMm1yQS # HgYE6SXpQmTwDw== # SIG # End signature block
combined_dataset/train/non-malicious/3089.ps1
3089.ps1
function Verify-AssertionFailed { param ( [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [ScriptBlock]$ScriptBlock ) $assertionExceptionThrown = $false $err = $null try { $null = & $ScriptBlock } catch [Exception] { $assertionExceptionThrown = ($_.FullyQualifiedErrorId -eq 'PesterAssertionFailed') $err = $_ $err } if (-not $assertionExceptionThrown) { $result = if ($null -eq $err) { "no assertion failure error was thrown!" } else { "other error was thrown! $($err | Format-List -Force * | Out-String)" } throw [Exception]"Expected the script block { $ScriptBlock } to fail in Pester assertion, but $result" } }
combined_dataset/train/non-malicious/sample_0_7.ps1
sample_0_7.ps1
<# .SYNOPSIS Simplify data collection and diagnostics for troubleshooting Microsoft Remote Desktop (RDP/RDS/AVD/W365) related issues and a convenient method for submitting and following quick & easy action plans. .DESCRIPTION This script is designed to gather information to assist Microsoft Customer Support Services (CSS) in troubleshooting issues you may be experiencing with Microsoft Remote Desktop solutions. The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names and user names. The script will save the collected data in a subfolder and compress the results into a ZIP file. Neither the folder nor the ZIP file are automatically sent to Microsoft. You can send the ZIP file to Microsoft CSS using a secure file transfer tool. Please discuss this with your support professional and address any concerns you may have. Find our privacy statement here: https://privacy.microsoft.com/en-US/privacystatement Run 'Get-Help .\MSRD-Collect.ps1 -Full' for more details. USAGE SUMMARY: Run the script on Windows source or target machines as required by the scenario you're investigating. The script has multiple module (.psm1) files located in a "Modules" folder. This folder, along with its underlying .psm1 files, must remain in the same folder as the main MSRD-Collect.ps1 file for the script to function correctly. Download the MSRD-Collect.zip package from the official public download location (https://aka.ms/MSRD-Collect) and extract all files from it, not just the MSRD-Collect.ps1. The script will import the necessary module(s) dynamically when specific data is being invoked. Manual import of the modules is not required. When launched without any command line parameters, the script will start in GUI mode where you can select one or more data collection or diagnostics scenarios. If you prefer to run the script without a GUI or to automate data collection/diagnostics, use command line parameters. Diagnostics will run regardless if other data collection scenarios have been selected. For more information see the MSRD-Collect-ReadMe.txt file. .NOTES Author : Robert Klemencz (Microsoft CSS) Requires : At least PowerShell version 5.1 and to be run elevated Version : See: $global:msrdVersion .LINK Download: https://aka.ms/MSRD-Collect Feedback: https://aka.ms/MSRD-Collect-Feedback .PARAMETER Machine Indicates the context/environment in which the machine is used. This is a mandatory parameter when not using the GUI. Based on the provided value, only data specific to that context/environment will be collected. Available values are: isAVD : Azure Virtual Desktop isRDS : Remote Desktop Services or direct (non-AVD/non-W365) RDP connection isW365 : Windows 365 Cloud PC .PARAMETER Role Indicates the role of the machine in the given context/environment. This is a mandatory parameter when not using the GUI. Based on the provided value, only data specific to that role will be collected. Available values are: isSource : Source machine from where you connect to other machines using a Remote Desktop client isTarget : Target machine to which you connect to or a server with any RDS role installed .PARAMETER Core Collect general data for troubleshooting AVD/RDS/W365 issues. Diagnostics will run at the end. .PARAMETER Profiles Collect Core + specific data for troubleshooting 'User Profiles' issues. Diagnostics will run at the end. .PARAMETER Activation Collect Core + specific data for troubleshooting 'OS Licensing/Activation' issues. Diagnostics will run at the end. .PARAMETER MSRA Collect Core + specific data for troubleshooting 'Remote Assistance/Quick Assist/Remote Help' issues. Diagnostics will run at the end. .PARAMETER SCard Collect Core + specific data for troubleshooting 'Smart Card' issues. Diagnostics will run at the end. .PARAMETER IME Collect Core + specific data for troubleshooting 'Input Method' issues. Diagnostics will run at the end. .PARAMETER Teams Collect Core + specific data for troubleshooting 'Teams Media Optimization' issues. Diagnostics will run at the end. (AVD/W365 only) .PARAMETER MSIXAA [Deprecated, use 'AppAttach' instead] Collect Core + specific data for troubleshooting 'App Attach' issues. Diagnostics will run at the end. (AVD ony) .PARAMETER AppAttach Collect Core + specific data for troubleshooting 'App Attach' issues. Diagnostics will run at the end. (AVD only) .PARAMETER HCI Collect Core + specific data for troubleshooting 'Azure Stack HCI' issues. Diagnostics will run at the end. (AVD only) .PARAMETER DumpPID Collect Core + a process dump based on the provided PID. Diagnostics will run at the end. .PARAMETER NetTrace Collect a network trace. .PARAMETER DiagOnly Skip collecting troubleshooting data (even if any other parameters are specificed) and only perform diagnostics. .PARAMETER AcceptEula Silently accept the Microsoft Diagnostic Tools End User License Agreement. .PARAMETER AcceptNotice Silently accept the Important Notice message displayed when the script is launched. .PARAMETER OutputDir ​​​​​​Specify an existing directory where to store the collected files. By default, the script will store the collected data under "C:\MS_DATA". .PARAMETER UserContext Specify the username in whose context some of the data (e.g. RDClientAutoTrace, Teams settings) will be collected. By default, the script will use the admin's username who launched it. .PARAMETER AzureEnv Override the value returned by the automatic Azure environment detection and use the specified Azure environment for performing Azure endpoint checks during data collection/diagnostics. Available values are: "All", "AzureChinaCloud", "AzureGermanCloud", "AzurePublicCloud", "AzureUSGovernmentCloud", "N/A". .PARAMETER SkipAutoUpdate Skip the automatic update check on launch for the current instance of the script (can be used for both GUI and command line mode). .PARAMETER LiteMode The script will open with a "Lite Mode" UI, regardless of the Config\MSRDC-Config.json settings. .PARAMETER AssistMode The script will read out loud some of the key information and steps performed during data collection/diagnostics. .PARAMETER SilentMode Verbose output (detailed steps or encountered errors) will not be displayed during data collection. .OUTPUTS By default, all collected data are stored in a subfolder under C:\MS_DATA. You can change this location by using the "-OutputDir" command line parameter or from the "Advanced Mode" UI. #> param ([ValidateSet('isAVD', 'isRDS', 'isW365')][string]$Machine, [ValidateSet('isSource', 'isTarget')][string]$Role, [switch]$Core, [switch]$Profiles, [switch]$Activation, [switch]$MSRA, [switch]$SCard, [switch]$IME, [switch]$Teams, [switch]$MSIXAA, [switch]$AppAttach, [switch]$HCI, [int]$DumpPID, [switch]$DiagOnly, [switch]$NetTrace, [switch]$AcceptEula, [switch]$AcceptNotice, [switch]$SkipAutoUpdate, [switch]$LiteMode, [switch]$AudioAssistMode, [switch]$SilentMode, [ValidateScript({ if (Test-Path $_ -PathType Container) { $true } else { throw "Invalid folder path. '$_' does not exist or is not a valid folder." } })][string]$OutputDir, [ValidateScript({ $profilePath = Join-Path (Split-Path $env:USERPROFILE) $_ if (Test-Path -Path $profilePath -PathType Container) { $true } else { throw "Invalid username. A local profile folder for user '$_' does not exist or could not be accessed." } })][string]$UserContext, [ValidateSet('All', 'AzureChinaCloud', 'AzureGermanCloud', 'AzurePublicCloud', 'AzureUSGovernmentCloud', 'N/A')][string]$AzureEnv) # Check if the current user is an administrator if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')) { Write-Warning "This script needs to be run as Administrator" Exit 1 } # Check if the script is running in PowerShell ISE if ($host.Name -eq "Windows PowerShell ISE Host") { Write-Warning "Running MSRD-Collect in PowerShell ISE is not supported. Please run it from a regular elevated PowerShell console." Exit 1 } # Check PS Version If($PSVersionTable.PSVersion.Major -le 4) { Write-Warning "MSRD-Collect requires at least PowerShell version 5.1, but you are currently using PowerShell version $($PSVersionTable.PSVersion.Major).$($PSVersionTable.PSVersion.Minor).`nPlease update your PowerShell version to version 5.1 or higher!`nSee: https://learn.microsoft.com/en-us/powershell/scripting/install/installing-powershell-on-windows?view=powershell-5.1`n`n" Exit 1 } # Limiting scenarios for command line if (($Role -eq "isSource") -and ($Profiles -or $Activation -or $IME -or $AppAttach -or $HCI)) { Write-Warning "Machine role 'isSource' only supports the following scenarios: -Core, -MSRA, -SCard, -Teams, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } if ($Role -eq "isTarget") { if (($Machine -eq "isRDS") -and ($Teams -or $AppAttach -or $HCI)) { Write-Warning "Machine type 'isRDS' with machine role 'isTarget' only supports the following scenarios: -Core, -Profiles, -Activation, -MSRA, -SCard, -IME, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } elseif (($Machine -eq "isW365") -and ($AppAttach -or $HCI)) { Write-Warning "Machine type 'isW365' with machine role 'isTarget' only supports the following scenarios: -Core, -Profiles, -Activation, -MSRA, -SCard, -IME, -Teams, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } } if ($DiagOnly) { if ($Core -or $Profiles -or $Activation -or $AppAttach -or $MSRA -or $IME -or $HCI -or $Teams -or $SCard -or $NetTrace -or $DumpPID) { Write-Warning "Scenario 'DiagOnly' has been specified together with other scenarios. All scenarios will be ignored and only Diagnostics will run." } } # Deprecated / will be removed in a future version if ($MSIXAA) { Write-Warning "The command line parameter '-MSIXAA' is deprecated and has been replaced by '-AppAttach'. Run the script again using the '-AppAttach' command line parameter." Exit 1 } # Check if the required subfolders exist in the script folder if (-not (Test-Path -Path "$PSScriptRoot\Modules" -PathType Container)) { Write-Warning "The 'Modules' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } if (-not (Test-Path -Path "$PSScriptRoot\Config" -PathType Container)) { Write-Warning "The 'Config' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } if (-not (Test-Path -Path "$PSScriptRoot\Config\Localization" -PathType Container)) { Write-Warning "The 'Config\Localization' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } ### Global variables $global:msrdCollecting = $False $global:msrdConsoleColor = $host.ui.RawUI.ForegroundColor $global:msrdDiagnosing = $False $global:msrdFQDN = [System.Net.Dns]::GetHostByName($env:computerName).HostName $global:msrdGUI = $false $global:msrdLiveDiag = $false $global:msrdOSVer = (Get-CimInstance Win32_OperatingSystem).Caption $global:msrdProgress = 0 $global:msrdScriptpath = $PSScriptRoot $global:msrdTSSinUse = $MyInvocation.PSCommandPath -like "*TSS_UEX.psm1" $global:msrdVersion = "240927.0" $global:msrdVersioncheck = $false if ($PSSenderInfo) { $global:msrdCmdLine = "n/a" } else { $global:msrdCmdLine = $MyInvocation.Line } #for selfupdate restart #warn if outdated version $msrdcVer = $global:msrdVersion.SubString(0,6) $dateMSRDCver = [datetime]::ParseExact($msrdcVer, "yyMMdd", $null) $DiffDate = ((Get-Date) - $dateMSRDCver) If($DiffDate.Days -gt 90){ Write-Warning "This version of MSRD-Collect is over 90 days old. A newer version may be available. Use the script's AutoUpdate functionality or manually download the latest version from: https://aka.ms/MSRD-Collect" } if (-not $global:msrdTSSinUse) { #Unlock module files if valid $fileNamesToUnblock = @( "MSRDC-Activation.psm1", "MSRDC-Core.psm1", "MSRDC-Diagnostics.psm1", "MSRDC-FwFunctions.psm1", "MSRDC-FwGUI.psm1", "MSRDC-FwGUILite.psm1", "MSRDC-FwHtml.psm1", "MSRDC-HCI.psm1", "MSRDC-IME.psm1", "MSRDC-AppAttach.psm1", "MSRDC-MSRA.psm1", "MSRDC-Profiles.psm1", "MSRDC-SCard.psm1", "MSRDC-Teams.psm1", "MSRDC-Tracing.psm1", "MSRDC-WU.psm1" ) if (Test-Path -Path "$global:msrdScriptpath\Modules") { Get-ChildItem -Path $global:msrdScriptpath\Modules\MSRDC*.psm1 -Recurse | ForEach-Object { if ($_.Name -in $fileNamesToUnblock) { Try { Unblock-File $_.FullName -Confirm:$false -ErrorAction Stop } Catch { Write-Warning "Failed to unblock file: $($_.FullName) - $($_.Exception.Message)" } } } } else { Write-Warning "The 'Modules' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } } if ($global:msrdTSSinUse) { # Check if the included tools are available and valid $global:msrdToolsFolder = "$global:ScriptFolder\BIN" if (Test-Path -Path "$global:msrdToolsFolder\avdnettest.exe") { $global:avdnettestpath = "$global:msrdToolsFolder\avdnettest.exe" } else { $global:avdnettestpath = "" } if (Test-Path -Path "$global:msrdToolsFolder\procdump.exe") { $global:msrdProcDumpExe = "$global:msrdToolsFolder\procdump.exe" } else { $global:msrdProcDumpExe = "" } if (Test-Path -Path "$global:msrdToolsFolder\psping.exe") { $global:msrdPsPingExe = "$global:msrdToolsFolder\psping.exe" } else { $global:msrdPsPingExe = "" } } else { $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\avdnettest.exe") { $global:avdnettestpath = "$global:msrdToolsFolder\avdnettest.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\avdnettest.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:avdnettestpath = "$tssToolsFolder\avdnettest.exe" } else { $global:avdnettestpath = "" } } $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\procdump.exe") { $global:msrdProcDumpExe = "$global:msrdToolsFolder\procdump.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\procdump.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:msrdProcDumpExe = "$tssToolsFolder\procdump.exe" } else { $global:msrdProcDumpExe = "" } } $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\psping.exe") { $global:msrdPsPingExe = "$global:msrdToolsFolder\psping.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\psping.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:msrdPsPingExe = "$tssToolsFolder\psping.exe" } else { $global:msrdPsPingExe = "" } } } # Azure Environment if ($AzureEnv) { $global:msrdAzureEnv = $AzureEnv } # Read config file $global:msrdConfigFile = "$global:msrdScriptpath\Config\MSRDC-Config.json" if (Test-Path -Path $global:msrdConfigFile) { try { $global:msrdConfig = Get-Content $global:msrdConfigFile | ConvertFrom-Json } catch { Write-Warning "Could not read the Config\MSRDC-Config.json file. Make sure that the file exists and that it is not corrupted. Exiting." Exit 1 } } else { Write-Warning "Could not find the Config\MSRDC-Config.json file. Make sure that the file exists and that it is not corrupted. Exiting." Exit 1 } if ($global:msrdProcDumpExe -eq "") { $global:msrdProcDumpVer = "1.0" } else { if ($global:msrdConfig.ProcDumpVersion -match "\d{2}\.\d{1}$") { $global:msrdProcDumpVer = $global:msrdConfig.ProcDumpVersion } else { Write-Warning "Unsupported value found for 'ProcDumpVersion' in Config\MSRDC-Config.json. The value has to be of format XY.Z, where X, Y and Z are numbers (e.g. 11.0). Exiting." Exit 1 } } if ($global:msrdPsPingExe -eq "") { $global:msrdPsPingVer = "1.0" } else { if ($global:msrdConfig.PsPingVersion -match "\d{1}\.\d{2}$") { $global:msrdPsPingVer = $global:msrdConfig.PsPingVersion } else { Write-Warning "Unsupported value found for 'PsPingVersion' in Config\MSRDC-Config.json. The value has to be of format X.YZ, where X, Y and Z are numbers (e.g. 2.12). Exiting." Exit 1 } } if (@(0, 1) -notcontains $global:msrdConfig.ShowConsoleWindow) { Write-Warning "Missing or unsupported value for 'ShowConsoleWindow' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.MaximizeWindow) { Write-Warning "Missing or unsupported value for 'MaximizeWindow' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@("Prod","Insider") -notcontains $global:msrdConfig.DevLevel) { Write-Warning "Missing or unsupported value for 'DevLevel' in Config\MSRDC-Config.json. Supported values are Prod or Insider. Exiting." Exit 1 } if (@("AR","CN","CS","DE","EN","ES","FR","HI","HU","NL","IT","JP","PT","RO","TR") -contains $global:msrdConfig.UILanguage) { $global:msrdLangID = $global:msrdConfig.UILanguage } else { Write-Warning "Unsupported value found for 'UILanguage' in Config\MSRDC-Config.json. Supported values are AR, CN, CS, DE, EN, ES, FR, HI, HU, NL, IT, JP, PT, RO or TR. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.PlaySounds) { Write-Warning "Missing or unsupported value for 'PlaySounds' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(10, 12, 14, 16) -contains $global:msrdConfig.PsBoxFont) { $global:msrdPsBoxFont = $global:msrdConfig.PsBoxFont } else { Write-Warning "Unsupported value found for 'PsBoxFont' in Config\MSRDC-Config.json. Supported values are 10, 12, 14 or 16. Exiting." Exit 1 } if (-not $global:msrdTSSinUse) { if ($LiteMode) { $msrdGUILite = 1 } else { if (@(0, 1) -contains $global:msrdConfig.UILiteMode) { $msrdGUILite = $global:msrdConfig.UILiteMode } else { Write-Warning "Unsupported value found for 'UILiteMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } if ($AudioAssistMode) { $global:msrdAudioAssistMode = 1 } else { if (@(0, 1) -contains $global:msrdConfig.AudioAssistMode) { $global:msrdAudioAssistMode = $global:msrdConfig.AudioAssistMode } else { Write-Warning "Unsupported value found for 'AudioAssistMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } } # Silent mode init if (-not $global:msrdTSSinUse) { if ($global:msrdAudioAssistMode -eq 1) { $global:msrdSilentMode = 0 } else { if ($SilentMode) { $global:msrdSilentMode = 1 } else { if (@(0, 1) -contains $global:msrdConfig.SilentMode) { $global:msrdSilentMode = $global:msrdConfig.SilentMode } else { Write-Warning "Unsupported value found for 'SilentMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } } } # Check if auto update check should be performed if ($SkipAutoUpdate) { $global:msrdConfig.AutomaticVersionCheck = 0 "SkipAutoUpdate switch specified, automatic update check on script launch will be skipped" } else { if (@(0, 1) -notcontains $global:msrdConfig.AutomaticVersionCheck) { Write-Warning "Missing or unsupported value for 'AutomaticVersionCheck' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.ScriptSelfUpdate) { Write-Warning "Missing or unsupported value for 'ScriptSelfUpdate' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } function msrdVerifyToolsSignature { Param ($filepath) try { $signature = Get-AuthenticodeSignature -FilePath $filepath -ErrorAction SilentlyContinue $cert = $signature.SignerCertificate $issuer = $cert.Issuer if ($signature.Status -ne "Valid") { Write-Warning "'$filepath' does not have a valid signature. Stopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) { Write-Warning "'$filepath' does not have a valid signature. Stopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } } catch { Write-Warning "Failed to verify the signature of '$filepath'. Reason: $($_.Exception.Message)`nStopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } } # Localization init $localizationFilePath = Join-Path $global:msrdScriptpath "Config\Localization\MSRDC-Fw$($global:msrdLangID).xml" if (Test-Path -Path $localizationFilePath) { try { [xml] $global:msrdLangText = Get-Content -Path $localizationFilePath -Encoding UTF8 -ErrorAction Stop # Create a hashtable to store the mappings $global:msrdTextHashtable = @{} # Populate the hashtable foreach ($langNode in $global:msrdLangText.LangV1.lang) { $textID = $langNode.id $message = $langNode."#text" if ($message -like "*&amp;*") { $message = $message.replace("&amp;", "&") } $global:msrdTextHashtable[$textID] = $message } } catch { Write-Warning "Could not read the Config\Localization\MSRDC-Fw$($global:msrdLangID).xml file: $_. Make sure that the file exists and that it is not corrupted." Exit 1 } } else { Write-Warning "Could not find the Config\Localization\MSRDC-Fw$($global:msrdLangID).xml file. Make sure that the file exists and that it is not corrupted." Exit 1 } # Output folder init If ($OutputDir) { $global:msrdLogRoot = $OutputDir } else { if ($global:msrdTSSinUse) { $global:msrdLogRoot = $global:LogFolder } else { $global:msrdLogRoot = "C:\MS_DATA" } } # User context init if ($UserContext) { $global:msrdUserprof = $UserContext } else { $global:msrdUserprof = $env:USERNAME } [void][System.Reflection.Assembly]::Load('System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a') [void][System.Reflection.Assembly]::Load('System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089') # Main functions init Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwFunctions" -DisableNameChecking -Force -Scope Global if (@(0, 1) -notcontains $global:msrdConfig.IsRestarting) { Write-Warning "Missing or unsupported value for 'IsRestarting' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if ($global:msrdConfig.IsRestarting -eq 1) { msrdUpdateConfigFile -configFile "Config\MSRDC-Config.json" -key "IsRestarting" -value 0 } else { if ($global:avdnettestpath -ne "") { msrdVerifyToolsSignature $global:avdnettestpath } if ($global:msrdProcDumpExe -ne "") { msrdVerifyToolsSignature $global:msrdProcDumpExe } if ($global:msrdPsPingExe -ne "") { msrdVerifyToolsSignature $global:msrdPsPingExe } } # Check if the current account is domain vs local account try { # Get the current user's SID $userSID = [System.Security.Principal.WindowsIdentity]::GetCurrent().User.Value # Get the list of local users' SIDs $localUserSIDs = Get-CimInstance -ClassName Win32_UserAccount -Filter "LocalAccount=True" | Select-Object -ExpandProperty SID # Check if the user's SID matches any of the local user SIDs $isLocalUser = $localUserSIDs -contains $userSID if ($isLocalUser) { $global:msrdAccountLevel = "Local Account" Write-Warning "$(msrdGetLocalizedText "localAdminStart")`n" } else { $global:msrdAccountLevel = "Domain Account" } } catch { $global:msrdAccountLevel = "Local Account" Write-Warning "Failed to determine account type: $($_.Exception.InnerException.Message)Defaulting to 'Local Account'. If you need to collect Domain related information, make sure that the user running the script is a Domain User with Admin rights." } # EULA function msrdShowEULAPopup($mode) { $EULA = New-Object -TypeName System.Windows.Forms.Form $richTextBox1 = New-Object System.Windows.Forms.RichTextBox $btnAcknowledge = New-Object System.Windows.Forms.Button $btnCancel = New-Object System.Windows.Forms.Button $EULA.SuspendLayout() $EULA.Name = "EULA" $EULA.Text = "Microsoft Diagnostic Tools End User License Agreement" $richTextBox1.Anchor = [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right $richTextBox1.Location = New-Object System.Drawing.Point(12,12) $richTextBox1.Name = "richTextBox1" $richTextBox1.ScrollBars = [System.Windows.Forms.RichTextBoxScrollBars]::Vertical $richTextBox1.Size = New-Object System.Drawing.Size(776, 397) $richTextBox1.TabIndex = 0 $richTextBox1.ReadOnly=$True $richTextBox1.Add_LinkClicked({Start-Process -FilePath $_.LinkText}) $richTextBox1.Rtf = @" {\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fswiss\fprq2\fcharset0 Segoe UI;}{\f1\fnil\fcharset0 Calibri;}{\f2\fnil\fcharset0 Microsoft Sans Serif;}} {\colortbl ;\red0\green0\blue255;} {\*\generator Riched20 10.0.19041}{\*\mmathPr\mdispDef1\mwrapIndent1440 }\viewkind4\uc1 \pard\widctlpar\f0\fs19\lang1033 MICROSOFT SOFTWARE LICENSE TERMS\par Microsoft Diagnostic Scripts and Utilities\par \par {\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15 0100090000035000000000002700000000000400000003010800050000000b0200000000050000 000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00 010001000000000001000100000000002800000001000000010000000100010000000000000000 000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300 00000000 }These license terms are an agreement between you and Microsoft Corporation (or one of its affiliates). IF YOU COMPLY WITH THESE LICENSE TERMS, YOU HAVE THE RIGHTS BELOW. BY USING THE SOFTWARE, YOU ACCEPT THESE TERMS.\par {\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15 0100090000035000000000002700000000000400000003010800050000000b0200000000050000 000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00 010001000000000001000100000000002800000001000000010000000100010000000000000000 000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300 00000000 }\par \pard {\pntext\f0 1.\tab}{\*\pn\pnlvlbody\pnf0\pnindent0\pnstart1\pndec{\pntxta.}} \fi-360\li360 INSTALLATION AND USE RIGHTS. Subject to the terms and restrictions set forth in this license, Microsoft Corporation (\ldblquote Microsoft\rdblquote ) grants you (\ldblquote Customer\rdblquote or \ldblquote you\rdblquote ) a non-exclusive, non-assignable, fully paid-up license to use and reproduce the script or utility provided under this license (the "Software"), solely for Customer\rquote s internal business purposes, to help Microsoft troubleshoot issues with one or more Microsoft products, provided that such license to the Software does not include any rights to other Microsoft technologies (such as products or services). \ldblquote Use\rdblquote means to copy, install, execute, access, display, run or otherwise interact with the Software. \par \pard\widctlpar\par \pard\widctlpar\li360 You may not sublicense the Software or any use of it through distribution, network access, or otherwise. Microsoft reserves all other rights not expressly granted herein, whether by implication, estoppel or otherwise. You may not reverse engineer, decompile or disassemble the Software, or otherwise attempt to derive the source code for the Software, except and to the extent required by third party licensing terms governing use of certain open source components that may be included in the Software, or remove, minimize, block, or modify any notices of Microsoft or its suppliers in the Software. Neither you nor your representatives may use the Software provided hereunder: (i) in a way prohibited by law, regulation, governmental order or decree; (ii) to violate the rights of others; (iii) to try to gain unauthorized access to or disrupt any service, device, data, account or network; (iv) to distribute spam or malware; (v) in a way that could harm Microsoft\rquote s IT systems or impair anyone else\rquote s use of them; (vi) in any application or situation where use of the Software could lead to the death or serious bodily injury of any person, or to physical or environmental damage; or (vii) to assist, encourage or enable anyone to do any of the above.\par \par \pard\widctlpar\fi-360\li360 2.\tab DATA. Customer owns all rights to data that it may elect to share with Microsoft through using the Software. You can learn more about data collection and use in the help documentation and the privacy statement at {{\field{\*\fldinst{HYPERLINK https://aka.ms/privacy }}{\fldrslt{https://aka.ms/privacy\ul0\cf0}}}}\f0\fs19 . Your use of the Software operates as your consent to these practices.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 3.\tab FEEDBACK. If you give feedback about the Software to Microsoft, you grant to Microsoft, without charge, the right to use, share and commercialize your feedback in any way and for any purpose.\~ You will not provide any feedback that is subject to a license that would require Microsoft to license its software or documentation to third parties due to Microsoft including your feedback in such software or documentation. \par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 4.\tab EXPORT RESTRICTIONS. Customer must comply with all domestic and international export laws and regulations that apply to the Software, which include restrictions on destinations, end users, and end use. For further information on export restrictions, visit {{\field{\*\fldinst{HYPERLINK https://aka.ms/exporting }}{\fldrslt{https://aka.ms/exporting\ul0\cf0}}}}\f0\fs19 .\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360\qj 5.\tab REPRESENTATIONS AND WARRANTIES. Customer will comply with all applicable laws under this agreement, including in the delivery and use of all data. Customer or a designee agreeing to these terms on behalf of an entity represents and warrants that it (i) has the full power and authority to enter into and perform its obligations under this agreement, (ii) has full power and authority to bind its affiliates or organization to the terms of this agreement, and (iii) will secure the permission of the other party prior to providing any source code in a manner that would subject the other party\rquote s intellectual property to any other license terms or require the other party to distribute source code to any of its technologies.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360\qj 6.\tab DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED \ldblquote AS IS,\rdblquote WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL MICROSOFT OR ITS LICENSORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\par \pard\widctlpar\qj\par \pard\widctlpar\fi-360\li360\qj 7.\tab LIMITATION ON AND EXCLUSION OF DAMAGES. IF YOU HAVE ANY BASIS FOR RECOVERING DAMAGES DESPITE THE PRECEDING DISCLAIMER OF WARRANTY, YOU CAN RECOVER FROM MICROSOFT AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO U.S. $5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT, OR INCIDENTAL DAMAGES. This limitation applies to (i) anything related to the Software, services, content (including code) on third party Internet sites, or third party applications; and (ii) claims for breach of contract, warranty, guarantee, or condition; strict liability, negligence, or other tort; or any other claim; in each case to the extent permitted by applicable law. It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your state, province, or country may not allow the exclusion or limitation of incidental, consequential, or other damages.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 8.\tab BINDING ARBITRATION AND CLASS ACTION WAIVER. This section applies if you live in (or, if a business, your principal place of business is in) the United States. If you and Microsoft have a dispute, you and Microsoft agree to try for 60 days to resolve it informally. If you and Microsoft can\rquote t, you and Microsoft agree to binding individual arbitration before the American Arbitration Association under the Federal Arbitration Act (\ldblquote FAA\rdblquote ), and not to sue in court in front of a judge or jury. Instead, a neutral arbitrator will decide. Class action lawsuits, class-wide arbitrations, private attorney-general actions, and any other proceeding where someone acts in a representative capacity are not allowed; nor is combining individual proceedings without the consent of all parties. The complete Arbitration Agreement contains more terms and is at {{\field{\*\fldinst{HYPERLINK https://aka.ms/arb-agreement-4 }}{\fldrslt{https://aka.ms/arb-agreement-4\ul0\cf0}}}}\f0\fs19 . You and Microsoft agree to these terms. \par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 9.\tab LAW AND VENUE. If U.S. federal jurisdiction exists, you and Microsoft consent to exclusive jurisdiction and venue in the federal court in King County, Washington for all disputes heard in court (excluding arbitration). If not, you and Microsoft consent to exclusive jurisdiction and venue in the Superior Court of King County, Washington for all disputes heard in court (excluding arbitration).\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 10.\tab ENTIRE AGREEMENT. This agreement, and any other terms Microsoft may provide for supplements, updates, or third-party applications, is the entire agreement for the software.\par \pard\sa200\sl276\slmult1\f1\fs22\lang9\par \pard\f2\fs17\lang2057\par } "@ $richTextBox1.BackColor = [System.Drawing.Color]::White $btnAcknowledge.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right $btnAcknowledge.Location = New-Object System.Drawing.Point(544, 415) $btnAcknowledge.Name = "btnAcknowledge"; $btnAcknowledge.Size = New-Object System.Drawing.Size(119, 23) $btnAcknowledge.TabIndex = 1 $btnAcknowledge.Text = "Accept" $btnAcknowledge.UseVisualStyleBackColor = $True $btnAcknowledge.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::Yes}) $btnCancel.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right $btnCancel.Location = New-Object System.Drawing.Point(669, 415) $btnCancel.Name = "btnCancel" $btnCancel.Size = New-Object System.Drawing.Size(119, 23) $btnCancel.TabIndex = 2 if($mode -ne 0) { $btnCancel.Text = "Close" } else { $btnCancel.Text = "Decline" } $btnCancel.UseVisualStyleBackColor = $True $btnCancel.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::No}) $EULA.AutoScaleDimensions = New-Object System.Drawing.SizeF(6.0, 13.0) $EULA.AutoScaleMode = [System.Windows.Forms.AutoScaleMode]::Font $EULA.ClientSize = New-Object System.Drawing.Size(800, 450) $EULA.Controls.Add($btnCancel) $EULA.Controls.Add($richTextBox1) if($mode -ne 0) { $EULA.AcceptButton=$btnCancel } else { $EULA.Controls.Add($btnAcknowledge) $EULA.AcceptButton=$btnAcknowledge $EULA.CancelButton=$btnCancel } $EULA.ResumeLayout($false) $EULA.Size = New-Object System.Drawing.Size(800, 650) Return ($EULA.ShowDialog()) } function msrdShowEULAIfNeeded($toolName, $mode) { $eulaRegPath = "HKCU:Software\Microsoft\CESDiagnosticTools" $eulaAccepted = "No" $eulaValue = $toolName + " EULA Accepted" if(Test-Path $eulaRegPath) { $eulaRegKey = Get-Item $eulaRegPath $eulaAccepted = $eulaRegKey.GetValue($eulaValue, "No") } else { $eulaRegKey = New-Item $eulaRegPath } if($mode -eq 2) # silent accept { $eulaAccepted = "Yes" $ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force } else { if($eulaAccepted -eq "No") { $eulaAccepted = msrdShowEULAPopup($mode) if($eulaAccepted -eq [System.Windows.Forms.DialogResult]::Yes) { $eulaAccepted = "Yes" $ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force } } } return $eulaAccepted } function msrdCleanUpandExit { if (($null -ne $global:msrdTempCommandErrorFile) -and (Test-Path -Path $global:msrdTempCommandErrorFile)) { Remove-Item -Path $global:msrdTempCommandErrorFile -Force -ErrorAction SilentlyContinue } if ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($false) | Out-Null } if ($global:msrdForm) { $global:msrdForm.Close() } Exit } # This function disable quick edit mode. If the mode is enabled, console output will hang when key input or strings are selected. # So disable the quick edit mode during running script and re-enable it after script is finished. $QuickEditCode=@" using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; using System.Runtime.InteropServices; public static class msrdDisableConsoleQuickEdit { const uint ENABLE_QUICK_EDIT = 0x0040; // STD_INPUT_HANDLE (DWORD): -10 is the standard input device. const int STD_INPUT_HANDLE = -10; [DllImport("kernel32.dll", SetLastError = true)] static extern IntPtr GetStdHandle(int nStdHandle); [DllImport("kernel32.dll")] static extern bool GetConsoleMode(IntPtr hConsoleHandle, out uint lpMode); [DllImport("kernel32.dll")] static extern bool SetConsoleMode(IntPtr hConsoleHandle, uint dwMode); public static bool SetQuickEdit(bool SetEnabled) { IntPtr consoleHandle = GetStdHandle(STD_INPUT_HANDLE); // get current console mode uint consoleMode; if (!GetConsoleMode(consoleHandle, out consoleMode)) { // ERROR: Unable to get console mode. return false; } // Clear the quick edit bit in the mode flags if (SetEnabled) { consoleMode &= ~ENABLE_QUICK_EDIT; } else { consoleMode |= ENABLE_QUICK_EDIT; } // set the new mode if (!SetConsoleMode(consoleHandle, consoleMode)) { // ERROR: Unable to set console mode return false; } return true; } } "@ Try { Add-Type -TypeDefinition $QuickEditCode -Language CSharp -ErrorAction Stop | Out-Null $global:fQuickEditCodeExist = $True } Catch { $global:fQuickEditCodeExist = $False } #region ##### MAIN ##### [System.Windows.Forms.Application]::EnableVisualStyles() # Disabling quick edit mode as somethimes this causes the script stop working until enter key is pressed. If ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($True) | Out-Null } $notice = "========= Microsoft CSS Diagnostics Script =========`n This Data Collection is for troubleshooting reported issues for the given scenarios. Once you have started this script please wait until all data has been collected.`n`n ============= IMPORTANT NOTICE =============`n This script is designed to collect information that will help Microsoft Customer Support Services (CSS) troubleshoot an issue you may be experiencing with Microsoft Remote Desktop solutions.`n The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses; PC names; and user names.`n The script will save the collected data in a folder (default C:\MS_DATA) and also compress the results into a ZIP file. This folder and its contents or the ZIP file are not automatically sent to Microsoft.`n You can send the ZIP file to Microsoft CSS using a secure file transfer tool - Please discuss this with your support professional and also any concerns you may have.`n Find our privacy statement at: https://privacy.microsoft.com/en-US/privacystatement`n " if (!($global:msrdTSSinUse)) { if ($AcceptEula) { "$(msrdGetLocalizedText "eulaSilentOK")" $eulaAccepted = msrdShowEULAIfNeeded "MSRD-Collect" 2 } else { $eulaAccepted = msrdShowEULAIfNeeded "MSRD-Collect" 0 if ($eulaAccepted -ne "Yes") { "$(msrdGetLocalizedText "eulaNotOK")" msrdCleanUpandExit } "$(msrdGetLocalizedText "eulaOK")" } if ($AcceptNotice) { "$(msrdGetLocalizedText "noticeSilentOK")`n" } else { $wshell = New-Object -ComObject Wscript.Shell $answer = $wshell.Popup("$notice",0,"Are you sure you want to continue?",4+32) if ($answer -eq 7) { Write-Warning "$(msrdGetLocalizedText "notApproved")`n" msrdCleanUpandExit } "$(msrdGetLocalizedText "noticeOK")`n" } } if ($Core -or $Profiles -or $Activation -or $AppAttach -or $MSRA -or $IME -or $HCI -or $Teams -or $SCard -or $DiagOnly -or $NetTrace -or $DumpPID) { if ($Machine) { if ($Role) { switch($Machine) { 'isRDS' { $global:msrdRDS = $true; $global:msrdAVD = $false; $global:msrdW365 = $false } 'isAVD' { $global:msrdRDS = $false; $global:msrdAVD = $true; $global:msrdW365 = $false } 'isW365' { $global:msrdRDS = $false; $global:msrdAVD = $false; $global:msrdW365 = $true } } switch($Role) { 'isSource' { $global:msrdSource = $true; $global:msrdTarget = $false } 'isTarget' { $global:msrdSource = $false; $global:msrdTarget = $true } } msrdInitFolders msrdCheckAzVM -azEnvCmdLineInputValue $AzureEnv # checking for Azure Environment and deployment details if applicable if ($global:avdnettestpath -eq "") { msrdLogMessage $LogLevel.Warning "$(msrdGetLocalizedText 'avdnettestNotFound')`n" } #if avdnettest.exe is missing if (-not $global:msrdTSSinUse) { if ($global:msrdConfig.DevLevel -eq "Insider") { msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "starting") - v$msrdVersion (INSIDER Build - For Testing Purposes Only !)`n" -Color "Cyan" } else { msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "starting") - v$msrdVersion`n" -Color "Cyan" } if ($global:msrdConfig.AutomaticVersionCheck -eq 1) { if ($global:msrdConfig.ScriptSelfUpdate -eq 1) { msrdCheckVersion ($msrdVersion) -selfUpdate } else { msrdCheckVersion ($msrdVersion) } } else { msrdLogMessage $LogLevel.Normal "INFO: Automatic update check on script launch is Disabled" } } if ($UserContext) { msrdLogMessage $LogLevel.Info "INFO: UserContext switch has been specified with value: $UserContext`n" } if ($PSSenderInfo) { msrdLogMessage $LogLevel.Info "INFO: The script is running in a remote PowerShell session" -Color "Yellow" msrdLogMessage $LogLevel.Info "INFO: ConnectedUser: $($PSSenderInfo.ConnectedUser)" -Color "Yellow" msrdLogMessage $LogLevel.Info "INFO: RunAsUser: $($PSSenderInfo.RunAsUser)" -Color "Yellow" } msrdInitScript $varsNO = @(,$false * 1) msrdInitScenarioVars $dumpProc = $false $pidProc = "" $global:onlyDiag = $false $vCore = @(,$true * 12) if ($Profiles) { $vProfiles = @(,$true * 5) } if ($Activation) { $vActivation = @(,$true * 3) } if ($MSRA) { $vMSRA = @(,$true * 7) } if ($SCard) { $vSCard = @(,$true * 3) } if ($IME) { $vIME = @(,$true * 3) } if ($Teams) { $vTeams = @(,$true * 4) } if ($AppAttach) { $vAppAttach = @(,$true * 1) } if ($HCI) { $vHCI = @(,$true * 1) } if ($DumpPID) { $pidProc = $DumpPID; $dumpProc = $true } if ($DiagOnly) { $vCore = $varsNO; $global:onlyDiag = $true } if (-not $DiagOnly) { #data collection $parameters = @{ varsCore = $vCore varsProfiles = $vProfiles varsActivation = $vActivation varsMSRA = $vMSRA varsSCard = $vSCard varsIME = $vIME varsTeams = $vTeams varsMSIXAA = $vAppAttach varsHCI = $vHCI traceNet = $NetTrace dumpProc = $dumpProc pidProc = $pidProc } msrdCollectData @parameters } $varsSystem = @(,$true * 13) $varsAVDRDS = @(,$true * 11) $varsInfra = @(,$true * 10) $varsAD = @(,$true * 2) $varsNET = @(,$true * 8) $varsLogSec = @(,$true * 3) $varsIssues = @(,$true * 2) $varsOther = @(,$true * 4) #diagnostics $parameters = @{ varsSystem = $varsSystem varsAVDRDS = $varsAVDRDS varsInfra = $varsInfra varsAD = $varsAD varsNET = $varsNET varsLogSec = $varsLogSec varsIssues = $varsIssues varsOther = $varsOther } msrdCollectDataDiag @parameters msrdArchiveData -varsCore $vCore } else { Write-Warning "Include the '-Role' parameter to indicate the role of the machine in the selected remote desktop solution, or run the script without any parameters (= GUI mode).`nSupported values for the '-Role' parameter: 'isSource', 'isTarget'.`nSee MSRD-Collect-ReadMe.txt for more details.`nExiting..." Exit } } else { Write-Warning "Include the '-Machine' parameter to indicate the type of environment from where data should be collected, or run the script without any parameters (= GUI mode).`nSupported values for the '-Machine' parameter: 'isAVD', 'isRDS', 'isW365'.`nSee MSRD-Collect-ReadMe.txt for more details.`nExiting..." Exit } } else { if (-not $global:msrdTSSinUse) { $code = @" using System; using System.Runtime.InteropServices; namespace System { public class IconExtractor { public static System.Drawing.Icon Extract(string file, int number, bool largeIcon) { IntPtr large; IntPtr small; ExtractIconEx(file, number, out large, out small, 1); try { // Create a copy of the icon to avoid handle ownership issues var extractedIcon = (System.Drawing.Icon)System.Drawing.Icon.FromHandle(largeIcon ? large : small).Clone(); // Release the handles obtained from ExtractIconEx DestroyIcon(large); DestroyIcon(small); return extractedIcon; } catch { return null; } } [DllImport("Shell32.dll", EntryPoint = "ExtractIconExW", CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)] private static extern int ExtractIconEx(string sFile, int iIndex, out IntPtr piLargeVersion, out IntPtr piSmallVersion, int amountIcons); [DllImport("user32.dll", CharSet = CharSet.Auto)] private static extern bool DestroyIcon(IntPtr handle); } } "@ if ($PSVersionTable.PSVersion.Major -eq 5) { Add-Type -TypeDefinition $code -ReferencedAssemblies System.Drawing } else { Add-Type -TypeDefinition $code -ReferencedAssemblies System.Drawing.Common,System.Drawing } Add-Type -AssemblyName System.Windows.Forms $global:msrdRDS = $false; $global:msrdAVD = $false; $global:msrdW365 = $false $global:msrdSource = $false; $global:msrdTarget = $false #Load dlls into context of the current console session Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport("Kernel32.dll")] public static extern IntPtr GetConsoleWindow(); [DllImport("user32.dll")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' if ($msrdGUILite -eq 1) { Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwGUILite" -DisableNameChecking -Force msrdAVDCollectGUILite } else { Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwGUI" -DisableNameChecking -Force msrdAVDCollectGUI } } } #endregion ##### MAIN ##### # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvqUVrqWvbD8+y # R67SmiOMgtmq14/fjT8TkOxO4kgwxKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIAI # NdxzMqdzRM+29jesbvOZVU4baugOPkqM0ZslvlF5MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAgs2I88YzVjEvWKWiIRalOuzVS8T52SeLoqa5 # /QezLZy7XgZXxUmdGubMigwYxj6XbUMhTfmUGJTvgLHNjlevmOb+Z1ablPI1siLM # qpb+F7d7p0vQpL4RkzaHqJV2Xzs6KlB3tF8wZu5heEBRByP023VPZ2MrIWnUW4hX # D6pFz5HnuDE3LnWxFbQY3M9Lx77abG3LX7qsFl7OqZx2LkBvwzZpEhUHIJIP3mxf # 88ago7+SwAyQKsKNjww8ASing6zranWvJt+ZsixRpTARhpCxQF4SM0VRt8WOLGVT # +ycvrTcNDnlVNQtl4eLa22NAgtYNgLD/Oy5o1qRSI3RDR3hdZKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCWGh4P/Rv1Iu9tqi6xRWcoB6OF5pGpsb9p # 0JAIbnvH7gIGZutwxlurGBMyMDI0MTAyODExMzcyMC44MTJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF # WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP # AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF # s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX # ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL # Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN # gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m # r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB # BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp # vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr # OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI # +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP # Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri # LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi # mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV # liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ # dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L # tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u # EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US # LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq # 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu # 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100 # DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0 # MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA # AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b # zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC # K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga # wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46 # vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW # YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQghvctgGIJHoazCU/LeJhZ+uexznli1PUlbKwjSwAD/NQwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq # Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC # AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf # HyoaMA0GCSqGSIb3DQEBCwUABIICAIdZC7yNE32Daw7Sna+otV1SQi/TcMLAzm5z # JeZcx2aUh8kRn2rHc+U97le6PIAHAriJzw1p3KCEgtWduCIaVINFMXC9og93D4c+ # Klp17xSKgh/aOskPgQc4MRxpi4bpUHIyIUM+w9ZNZwZZZLJpbr2hsWiIPaQcEf+O # FHjnlur2X/L+S/P8lHLtwuCOpQpDy2aQIgQzo+xUP429nuXOIl1xHts+G5k4r2NU # QX+961/5i8tuEYtW1Z/eRlzHQlZ3F2pFTQ487pfsm8Wx95IcF19TdrvqL3tEEa3K # fmAC/WJfYhdWQH8/Z0fuuUkfMtmXweozme2fbOKoUfc06s5QKt9IvQDOgoFRKLeH # OOD9b5XcRtIbDXn+XJ9O4cPG16oZ1vDUWqmxddBT5F5qxUvqRhfjjE/SP68FAyxM # c8atLNW/NfHL7YSY/fCFlleEwze4jU9hJqaUPcA0TTsHLmRbaXlR/YMNX8O6Innz # +wclepB3AlSSBQ2kLuMKsD9HV2d/su486ldX9rK+3zCLQH2Eal27cODrwYedDVvF # qVvpNgrZXnUq+b63TbGcSqyr/hVSssQxc0IHgQaaltcXlbQlK0FiHr9MmQDD9p5a # 6d4sNQETnZe2ru57frqZSwPy4w8uuFb+/XG2Yd+Nx7/3Hpzfeuc1C1Fi54T4wsts # IEpGSzH+ # SIG # End signature block
combined_dataset/train/non-malicious/sample_52_22.ps1
sample_52_22.ps1
# # Module manifest for module 'OCI.PSModules.Aianomalydetection' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aianomalydetection.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a3b1179d-3494-46fe-b212-09c2eaebfa09' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aianomalydetection Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aianomalydetection.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAianomalydetectionAiPrivateEndpoint', 'Get-OCIAianomalydetectionAiPrivateEndpointsList', 'Get-OCIAianomalydetectionDataAsset', 'Get-OCIAianomalydetectionDataAssetsList', 'Get-OCIAianomalydetectionDetectAnomalyJob', 'Get-OCIAianomalydetectionDetectAnomalyJobsList', 'Get-OCIAianomalydetectionModel', 'Get-OCIAianomalydetectionModelsList', 'Get-OCIAianomalydetectionProject', 'Get-OCIAianomalydetectionProjectsList', 'Get-OCIAianomalydetectionWorkRequest', 'Get-OCIAianomalydetectionWorkRequestErrorsList', 'Get-OCIAianomalydetectionWorkRequestLogsList', 'Get-OCIAianomalydetectionWorkRequestsList', 'Invoke-OCIAianomalydetectionDetectAnomalies', 'Move-OCIAianomalydetectionAiPrivateEndpointCompartment', 'Move-OCIAianomalydetectionDataAssetCompartment', 'Move-OCIAianomalydetectionDetectAnomalyJobCompartment', 'Move-OCIAianomalydetectionModelCompartment', 'Move-OCIAianomalydetectionProjectCompartment', 'New-OCIAianomalydetectionAiPrivateEndpoint', 'New-OCIAianomalydetectionDataAsset', 'New-OCIAianomalydetectionDetectAnomalyJob', 'New-OCIAianomalydetectionModel', 'New-OCIAianomalydetectionProject', 'Remove-OCIAianomalydetectionAiPrivateEndpoint', 'Remove-OCIAianomalydetectionDataAsset', 'Remove-OCIAianomalydetectionDetectAnomalyJob', 'Remove-OCIAianomalydetectionModel', 'Remove-OCIAianomalydetectionProject', 'Stop-OCIAianomalydetectionWorkRequest', 'Update-OCIAianomalydetectionAiPrivateEndpoint', 'Update-OCIAianomalydetectionDataAsset', 'Update-OCIAianomalydetectionDetectAnomalyJob', 'Update-OCIAianomalydetectionModel', 'Update-OCIAianomalydetectionProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aianomalydetection' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }