full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/4431.ps1
4431.ps1
function Find-RoleCapability { [CmdletBinding(HelpUri = 'https://go.microsoft.com/fwlink/?LinkId=718029')] [outputtype('PSCustomObject[]')] Param ( [Parameter(Position = 0)] [ValidateNotNullOrEmpty()] [string[]] $Name, [Parameter()] [ValidateNotNullOrEmpty()] [string] $ModuleName, [Parameter()] [ValidateNotNull()] [string] $MinimumVersion, [Parameter()] [ValidateNotNull()] [string] $MaximumVersion, [Parameter()] [ValidateNotNull()] [string] $RequiredVersion, [Parameter()] [switch] $AllVersions, [Parameter()] [switch] $AllowPrerelease, [Parameter()] [ValidateNotNull()] [string[]] $Tag, [Parameter()] [ValidateNotNull()] [string] $Filter, [Parameter(ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Uri] $Proxy, [Parameter(ValueFromPipelineByPropertyName=$true)] [PSCredential] $ProxyCredential, [Parameter()] [ValidateNotNullOrEmpty()] [string[]] $Repository ) Process { $PSBoundParameters['Includes'] = 'RoleCapability' if($PSBoundParameters.ContainsKey('Name')) { $PSBoundParameters['RoleCapability'] = $Name $null = $PSBoundParameters.Remove('Name') } if($PSBoundParameters.ContainsKey('ModuleName')) { $PSBoundParameters['Name'] = $ModuleName $null = $PSBoundParameters.Remove('ModuleName') } PowerShellGet\Find-Module @PSBoundParameters | Microsoft.PowerShell.Core\ForEach-Object { $psgetModuleInfo = $_ $psgetModuleInfo.Includes.RoleCapability | Microsoft.PowerShell.Core\ForEach-Object { if($Name -and ($Name -notcontains $_)) { return } $psgetRoleCapabilityInfo = Microsoft.PowerShell.Utility\New-Object PSCustomObject -Property ([ordered]@{ Name = $_ Version = $psgetModuleInfo.Version ModuleName = $psgetModuleInfo.Name Repository = $psgetModuleInfo.Repository PSGetModuleInfo = $psgetModuleInfo }) $psgetRoleCapabilityInfo.PSTypeNames.Insert(0, 'Microsoft.PowerShell.Commands.PSGetRoleCapabilityInfo') $psgetRoleCapabilityInfo } } } }
combined_dataset/train/non-malicious/sample_22_37.ps1
sample_22_37.ps1
# # Module manifest for module 'OCI.PSModules.Onesubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Onesubscription.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '22bf5ba6-749f-401c-8b99-0cf5afbd2958' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Onesubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Onesubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOnesubscriptionAggregatedComputedUsagesList', 'Get-OCIOnesubscriptionBillingSchedulesList', 'Get-OCIOnesubscriptionCommitment', 'Get-OCIOnesubscriptionCommitmentsList', 'Get-OCIOnesubscriptionComputedUsage', 'Get-OCIOnesubscriptionComputedUsagesList', 'Get-OCIOnesubscriptionInvoicelineComputedUsagesList', 'Get-OCIOnesubscriptionInvoicesList', 'Get-OCIOnesubscriptionOrganizationSubscriptionsList', 'Get-OCIOnesubscriptionRateCardsList', 'Get-OCIOnesubscriptionSubscribedService', 'Get-OCIOnesubscriptionSubscribedServicesList', 'Get-OCIOnesubscriptionSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Onesubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_60_51.ps1
sample_60_51.ps1
# # Module manifest for module 'OCI.PSModules.Datalabelingservicedataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datalabelingservicedataplane.dll' # Version number of this module. ModuleVersion = '88.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c7f9095b-be8f-42bb-88ca-422eca4176a1' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datalabelingservicedataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datalabelingservicedataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDatalabelingservicedataplaneAnnotation', 'Get-OCIDatalabelingservicedataplaneAnnotationsList', 'Get-OCIDatalabelingservicedataplaneDataset', 'Get-OCIDatalabelingservicedataplaneRecord', 'Get-OCIDatalabelingservicedataplaneRecordContent', 'Get-OCIDatalabelingservicedataplaneRecordPreviewContent', 'Get-OCIDatalabelingservicedataplaneRecordsList', 'Invoke-OCIDatalabelingservicedataplaneSummarizeAnnotationAnalytics', 'Invoke-OCIDatalabelingservicedataplaneSummarizeRecordAnalytics', 'New-OCIDatalabelingservicedataplaneAnnotation', 'New-OCIDatalabelingservicedataplaneRecord', 'Remove-OCIDatalabelingservicedataplaneAnnotation', 'Remove-OCIDatalabelingservicedataplaneRecord', 'Update-OCIDatalabelingservicedataplaneAnnotation', 'Update-OCIDatalabelingservicedataplaneRecord' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datalabelingservicedataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Findup_10.ps1
Findup_10.ps1
using System; using System.Collections; using System.Collections.Generic; using System.Text; using System.Security.Cryptography; using System.Runtime.InteropServices; using Microsoft.Win32; using System.IO; namespace Findup { public class FileInfoExt { public FileInfoExt(FileInfo fi) { FI = fi; } public byte[] SHA512_1st1K = new byte[64]; public byte[] SHA512_All = new byte[64]; public FileInfo FI { get; private set; } public bool Checked { get; set; } public bool SHA512_1st1KSet { get; set; } public bool SHA512_AllSet { get; set; } } class Recurse // Add FileInfoExt objects of files matching filenames, file specifications (E.G. *.txt), and in directories in pathRec, to returnList { public void Recursive(string[] pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfoExt> returnList) { foreach (string d in pathRec) { Recursive(d, searchPattern, recursiveFlag, returnList); } return; } public void Recursive(string pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfoExt> returnList) { if (File.Exists(pathRec)) { try { returnList.Add(new FileInfoExt(new FileInfo(pathRec))); } catch (Exception e) { Console.WriteLine("Add file error: " + e.Message); } } else if (Directory.Exists(pathRec)) { try { DirectoryInfo Dir = new DirectoryInfo(pathRec); foreach (FileInfo addf in (Dir.GetFiles(searchPattern))) { returnList.Add(new FileInfoExt(addf)); } } catch (Exception e) { Console.WriteLine("Add files from Directory error: " + e.Message); } if (recursiveFlag == true) { try { foreach (string d in (Directory.GetDirectories(pathRec))) { Recursive(d, searchPattern, recursiveFlag, returnList); } } catch (Exception e) { Console.WriteLine("Add Directory error: " + e.Message); } } } else { try { string filePart = Path.GetFileName(pathRec); string dirPart = Path.GetDirectoryName(pathRec); if (filePart.IndexOfAny(new char[] { '?', '*' }) >= 0) { if ((dirPart == null) || (dirPart == "")) dirPart = Directory.GetCurrentDirectory(); if (Directory.Exists(dirPart)) { Recursive(dirPart, filePart, recursiveFlag, returnList); } else { Console.WriteLine("Invalid file path, directory path, file specification, or program option specified: " + pathRec); } } else { Console.WriteLine("Invalid file path, directory path, file specification, or program option specified: " + pathRec); } } catch (Exception e) { Console.WriteLine("Parse error on: " + pathRec); Console.WriteLine("Make sure you don't end a directory with a \\\\ when using quotes. The console arg parser doesn't accept that."); Console.WriteLine("Exception: " + e.Message); return; } } return; } } class Findup { public static void Main(string[] args) { Console.WriteLine("Findup.exe v1.0 - use -help for usage information. Created in 2010 by James Gentile."); Console.WriteLine(" "); string[] paths = new string[0]; System.Boolean recurse = false; System.Boolean delete = false; System.Boolean noprompt = false; System.Boolean b4b = false; List<FileInfoExt> fs = new List<FileInfoExt>(); long bytesInDupes = 0; // bytes in all the duplicates long numOfDupes = 0; // number of duplicate files found. long bytesRec = 0; // number of bytes recovered. long delFiles = 0; // number of files deleted. int c = 0; int i = 0; string deleteConfirm; for (i = 0; i < args.Length; i++) { if ((System.String.Compare(args[i], "-help", true) == 0) || (System.String.Compare(args[i], "-h", true) == 0)) { Console.WriteLine("Usage: findup.exe <file/directory #1> <file/directory #2> ... <file/directory #N> [-recurse] [-delete] [-noprompt]"); Console.WriteLine(" "); Console.WriteLine("Options: -help - displays this help infomration."); Console.WriteLine(" -recurse - recurses through subdirectories."); Console.WriteLine(" -delete - deletes duplicates with confirmation prompt."); Console.WriteLine(" -noprompt - when used with -delete option, deletes files without confirmation prompt."); Console.WriteLine(" -b4b - do a byte-for-byte comparison, instead of SHA-512 hashing. Might be much slower, but most secure."); Console.WriteLine(" "); Console.WriteLine("Examples: findup.exe c:\\\\finances -recurse"); Console.WriteLine(" findup.exe c:\\\\users\\\\alice\\\\plan.txt d:\\\\data -recurse -delete -noprompt"); Console.WriteLine(" findup.exe c:\\\\data .\\\\*.txt c:\\\\reports\\\\quarter.doc -recurse -b4b"); Console.WriteLine(" "); return; } if (System.String.Compare(args[i], "-recurse", true) == 0) { recurse = true; continue; } if (System.String.Compare(args[i], "-delete", true) == 0) { delete = true; continue; } if (System.String.Compare(args[i], "-noprompt", true) == 0) { noprompt = true; continue; } if (System.String.Compare(args[i], "-b4b", true) == 0) { b4b = true; continue; } Array.Resize(ref paths, paths.Length + 1); paths[c] = args[i]; c++; } if (paths.Length == 0) { Console.WriteLine("No files specified, try findup.exe -help"); return; } Recurse recurseMe = new Recurse(); recurseMe.Recursive(paths, "*.*", recurse, fs); if (fs.Count < 2) { Console.WriteLine("Findup.exe needs at least 2 files to compare. try findup.exe -help"); return; } RNGCryptoServiceProvider rng = new RNGCryptoServiceProvider(); rng.GetBytes(salt); // get 512-bit SHA-512 salt. for (i = 0; i < fs.Count; i++) { if (fs[i].Checked == true) // If file was already matched, then skip to next. continue; for (c = i + 1; c < fs.Count; c++) { if (fs[c].Checked == true) // skip already matched inner loop files. continue; if (fs[i].FI.Length != fs[c].FI.Length) // If file size matches, then check hash. continue; if (System.String.Compare(fs[i].FI.FullName, fs[c].FI.FullName, true) == 0) // don't count the same file as a match. continue; if (fs[i].SHA512_1st1KSet == false) // check/hash first 1K first. if (Compute1KHash(fs[i]) == false) continue; if (fs[c].SHA512_1st1KSet == false) if (Compute1KHash(fs[c]) == false) continue; if (CompareHash(fs[i].SHA512_1st1K, fs[c].SHA512_1st1K) == false) // if the 1st 1K has the same hash.. continue; if (b4b == true) // byte for byte comparison specified? { if (B4b(fs[i].FI.FullName, fs[c].FI.FullName) == false) // call the byte for byte comparison function continue; } else if (fs[i].FI.Length > 1024) // skip hashing the file again if < 1024 bytes. { if (fs[i].SHA512_AllSet == false) // check/hash the rest of the files. if (ComputeFullHash(fs[i]) == false) continue; if (fs[c].SHA512_AllSet == false) if (ComputeFullHash(fs[c]) == false) continue; if (CompareHash(fs[i].SHA512_All, fs[c].SHA512_All) == false) continue; } Console.WriteLine("Match : " + fs[i].FI.FullName); Console.WriteLine("with : " + fs[c].FI.FullName); fs[c].Checked = true; // do not check or match against this file again. numOfDupes++; // increase count of matches. bytesInDupes += fs[c].FI.Length; // accumulate number of bytes in duplicates. if (delete != true) // if delete is specified, try to delete the duplicate file. continue; if (noprompt == false) { Console.Write("Delete the duplicate file <Y/n>?"); deleteConfirm = Console.ReadLine(); if ((deleteConfirm[0] != 'Y') && (deleteConfirm[0] != 'y')) continue; } try { File.Delete(fs[c].FI.FullName); Console.WriteLine("Deleted: " + fs[c].FI.FullName); bytesRec += fs[c].FI.Length; delFiles++; } catch (Exception e) { Console.WriteLine("File delete error: " + e.Message); } } } Console.WriteLine(" "); Console.WriteLine("Files checked : {0:N0}", fs.Count); Console.WriteLine("Duplicate files : {0:N0}", numOfDupes); Console.WriteLine("Duplicate bytes : {0:N0}", bytesInDupes); Console.WriteLine("Duplicates deleted : {0:N0}", delFiles); Console.WriteLine("Recovered bytes : {0:N0}", bytesRec); return; } private static Boolean B4b(string path1, string path2) { try { using (var stream = File.OpenRead(path1)) { using (var stream2 = File.OpenRead(path2)) { System.Boolean EOF = false; do { var length = stream.Read(largeBuf, 0, largeBuf.Length); var length2 = stream2.Read(largeBuf2, 0, largeBuf2.Length); if (length != length2) return false; if (length != largeBuf.Length) EOF = true; int i = 0; while (i < length) { if (largeBuf[i] != largeBuf2[i]) return false; i++; } } while (EOF == false); } } return true; } catch (Exception e) { Console.WriteLine("Byte for Byte comparison failed: " + e.Message); return false; } } private static Boolean CompareHash(byte[] hash1, byte[] hash2) { int i = 0; while (i < hash1.Length) { if (hash1[i] != hash2[i]) return false; i++; } return true ; } private static readonly byte[] readBuf = new byte[1024]; private static readonly byte[] largeBuf = new byte[64*200]; private static readonly byte[] largeBuf2 = new byte[64*200]; private static readonly byte[] salt = new byte[64]; private static byte[] hash = new byte[64]; private static bool Compute1KHash(FileInfoExt path) { try { using (var stream = File.OpenRead(path.FI.FullName)) { var length = stream.Read(readBuf, 0, readBuf.Length); var _SHA512 = SHA512.Create(); _SHA512.TransformBlock(salt, 0, salt.Length, salt, 0); _SHA512.TransformFinalBlock(readBuf, 0, length); path.SHA512_1st1K = _SHA512.Hash; path.SHA512_1st1KSet = true; return true; } } catch (Exception e) { Console.WriteLine("Hash Error: " + e.Message); return false; } } private static bool ComputeFullHash(FileInfoExt path) { try { var _SHA512 = SHA512.Create(); _SHA512.TransformBlock(salt, 0, salt.Length, salt, 0); using (var stream = File.OpenRead(path.FI.FullName)) { while (true) { var length = stream.Read(largeBuf, 0, largeBuf.Length); if (stream.Position < stream.Length) _SHA512.TransformBlock(largeBuf, 0, length, largeBuf, 0); else { _SHA512.TransformFinalBlock(largeBuf, 0, length); break; } } } path.SHA512_All = _SHA512.Hash; path.SHA512_AllSet = true; return true; } catch (Exception e) { Console.WriteLine("Hash error: " + e.Message); return false; } } } }
combined_dataset/train/non-malicious/3442.ps1
3442.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$False, Position=0)] [String]$Folder ) function SyncVersion([string]$FilePath) { $FolderPath = [System.IO.Path]::GetDirectoryName($FilePath) Write-Output "Folder Path: $FolderPath" $matches = ([regex]::matches((Get-Content $FilePath), "ModuleVersion = '([\d\.]+)'")) $packageVersion = $matches.Groups[1].Value Write-Output "Updating AssemblyInfo.cs inside of $FilePath to $packageVersion" $assemblyInfos = Get-ChildItem -Path $FolderPath -Filter AssemblyInfo.cs -Recurse ForEach ($assemblyInfo in $assemblyInfos) { $content = Get-Content $assemblyInfo.FullName $content = $content -replace "\[assembly: AssemblyVersion\([\w\`"\.]+\)\]", "[assembly: AssemblyVersion(`"$packageVersion`")]" $content = $content -replace "\[assembly: AssemblyFileVersion\([\w\`"\.]+\)\]", "[assembly: AssemblyFileVersion(`"$packageVersion`")]" Write-Output "Updating assembly version in " $assemblyInfo.FullName Set-Content -Path $assemblyInfo.FullName -Value $content -Encoding UTF8 } } if (!$Folder) { $Folder = "$PSScriptRoot\..\src" } $modules = Get-ChildItem -Path $Folder -Filter *.psd1 -Recurse -Exclude *.dll-help.psd1 | Where {!$_.Directory.FullName.Contains("Test\")} ForEach ($module in $modules) { SyncVersion $module.FullName }
combined_dataset/train/non-malicious/sample_16_78.ps1
sample_16_78.ps1
# # Module manifest for module 'OCI.PSModules.Cloudbridge' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudbridge.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '23fab747-5070-4685-94b0-d91859b2fd98' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudbridge Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudbridge.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgent', 'Get-OCICloudbridgeAgentDependenciesList', 'Get-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgentsList', 'Get-OCICloudbridgeApplianceImagesList', 'Get-OCICloudbridgeAsset', 'Get-OCICloudbridgeAssetsList', 'Get-OCICloudbridgeAssetSource', 'Get-OCICloudbridgeAssetSourceConnectionsList', 'Get-OCICloudbridgeAssetSourcesList', 'Get-OCICloudbridgeDiscoverySchedule', 'Get-OCICloudbridgeDiscoverySchedulesList', 'Get-OCICloudbridgeEnvironment', 'Get-OCICloudbridgeEnvironmentsList', 'Get-OCICloudbridgeHistoricalMetricsList', 'Get-OCICloudbridgeInventoriesList', 'Get-OCICloudbridgeInventory', 'Get-OCICloudbridgePlugin', 'Get-OCICloudbridgeWorkRequest', 'Get-OCICloudbridgeWorkRequestErrorsList', 'Get-OCICloudbridgeWorkRequestLogsList', 'Get-OCICloudbridgeWorkRequestsList', 'Import-OCICloudbridgeInventory', 'Invoke-OCICloudbridgeAnalyzeAssets', 'Invoke-OCICloudbridgeRefreshAssetSource', 'Invoke-OCICloudbridgeSubmitHistoricalMetrics', 'Move-OCICloudbridgeAgentCompartment', 'Move-OCICloudbridgeAgentDependencyCompartment', 'Move-OCICloudbridgeAssetCompartment', 'Move-OCICloudbridgeAssetSourceCompartment', 'Move-OCICloudbridgeAssetTags', 'Move-OCICloudbridgeDiscoveryScheduleCompartment', 'Move-OCICloudbridgeEnvironmentCompartment', 'New-OCICloudbridgeAgent', 'New-OCICloudbridgeAgentDependency', 'New-OCICloudbridgeAsset', 'New-OCICloudbridgeAssetSource', 'New-OCICloudbridgeDiscoverySchedule', 'New-OCICloudbridgeEnvironment', 'New-OCICloudbridgeInventory', 'Remove-OCICloudbridgeAgent', 'Remove-OCICloudbridgeAgentDependency', 'Remove-OCICloudbridgeAsset', 'Remove-OCICloudbridgeAssetSource', 'Remove-OCICloudbridgeDiscoverySchedule', 'Remove-OCICloudbridgeEnvironment', 'Remove-OCICloudbridgeInventory', 'Stop-OCICloudbridgeWorkRequest', 'Update-OCICloudbridgeAgent', 'Update-OCICloudbridgeAgentDependency', 'Update-OCICloudbridgeAsset', 'Update-OCICloudbridgeAssetSource', 'Update-OCICloudbridgeDiscoverySchedule', 'Update-OCICloudbridgeEnvironment', 'Update-OCICloudbridgeInventory', 'Update-OCICloudbridgePlugin' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudbridge' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1401.ps1
1401.ps1
if( -not (Get-Command -Name 'Get-WindowsFeature*' | Where-Object { $_.ModuleName -ne 'Carbon' }) ) { function Get-CWindowsFeature { [CmdletBinding()] param( [Parameter()] [string] $Name ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState Write-Warning -Message ('Get-CWindowsFeature is obsolete and will be removed in a future major version of Carbon.') if( -not (Assert-WindowsFeatureFunctionsSupported) ) { return } if( $useOCSetup ) { Get-WmiObject -Class Win32_OptionalFeature | Where-Object { if( $Name ) { return ($_.Name -like $Name) } else { return $true } } | ForEach-Object { $properties = @{ Installed = ($_.InstallState -eq 1); Name = $_.Name; DisplayName = $_.Caption; } New-Object PsObject -Property $properties } } elseif( $useServerManager ) { servermanagercmd.exe -query | Where-Object { if( $Name ) { return ($_ -match ('\[{0}\]$' -f [Text.RegularExpressions.Regex]::Escape($Name))) } else { return $true } } | Where-Object { $_ -match '\[(X| )\] ([^[]+) \[(.+)\]' } | ForEach-Object { $properties = @{ Installed = ($matches[1] -eq 'X'); Name = $matches[3] DisplayName = $matches[2]; } New-Object PsObject -Property $properties } } else { Write-Error $supportNotFoundErrorMessage } } Set-Alias -Name 'Get-WindowsFeature' -Value 'Get-CWindowsFeature' }
combined_dataset/train/non-malicious/Powershell iTunes.ps1
Powershell iTunes.ps1
# #***************************************************************** # # Powershell iTunes v1 $Rev: 752 $ # (c) 2004-2010 Thomas Maurer. All rights reserved. # created by Thomas Maurer # # http://www.thomasmaurer.ch # http://www.thomasmaurer.ch/projects # # last Update by $Author: tmaurer $ on $Date: 2010-11-23 11:52:27 +0100 (Di, 23 Nov 2010) $ # # Version 1.0.0.0 # #***************************************************************** # # Welcome Write-Host " " -BackgroundColor Black -ForegroundColor White Write-Host " ____ __ ____ " -BackgroundColor Black -ForegroundColor White Write-Host " / __ \\____ _ _____ __________/ /_ ___ / / / " -BackgroundColor Black -ForegroundColor White Write-Host " / /_/ / __ \\ | /| / / _ \\/ ___/ ___/ __ \\/ _ \\/ / / " -BackgroundColor Black -ForegroundColor White Write-Host " / ____/ /_/ / |/ |/ / __/ / (__ ) / / / __/ / / " -BackgroundColor Black -ForegroundColor White Write-Host "/_/ \\____/|__/|__/\\___/_/ /____/_/ /_/\\___/_/_/ " -BackgroundColor Black -ForegroundColor White Write-Host " " -BackgroundColor Black -ForegroundColor White Write-Host " _ ______ " -BackgroundColor Black -ForegroundColor White Write-Host " (_)_ __/_ ______ ___ _____ " -BackgroundColor Black -ForegroundColor White Write-Host " / / / / / / / / __ \\/ _ \\/ ___/ " -BackgroundColor Black -ForegroundColor White Write-Host " / / / / / /_/ / / / / __(__ ) " -BackgroundColor Black -ForegroundColor White Write-Host "/_/ /_/ \\__,_/_/ /_/\\___/____/ " -BackgroundColor Black -ForegroundColor White Write-Host " " -BackgroundColor Black -ForegroundColor White Write-Host "******************************************************************" -BackgroundColor Black -ForegroundColor White Write-Host " " -BackgroundColor Black -ForegroundColor White Write-Host " Welcome to the Powershell iTunes " -BackgroundColor Black -ForegroundColor White Write-Host " " -BackgroundColor Black -ForegroundColor White Write-Host " (c) 2010 Thomas Maurer www.thomasmaurer.ch/projects " -BackgroundColor Black -ForegroundColor White Write-Host " " -BackgroundColor Black -ForegroundColor White Write-Host "******************************************************************" -BackgroundColor Black -ForegroundColor White Write-Host " " -BackgroundColor Black -ForegroundColor White Write-Host " for Help use the Get-PSiTunesHelp " -BackgroundColor Black -ForegroundColor White Write-Host " " -BackgroundColor Black -ForegroundColor White # Add ComObjects to $iTunes $iTunes = New-Object -ComObject iTunes.Application # Function to start itunes function Start-iTunes { process { $iTunesRunning = Get-Process | Where-Object {$_.ProcessName -eq "iTunes"} if(!$iTunesRunning) { $iTunes = New-Object -ComObject iTunes.Application Write-Host "(PS iTunes): iTunes started" -BackgroundColor Black -ForegroundColor green } else { Write-Host "(PS iTunes): iTunes allready running" -BackgroundColor Black -ForegroundColor red } } } # Function to close itunes function Close-iTunes { process { $iTunesRunning = Get-Process | Where-Object {$_.ProcessName -eq "iTunes"} if(!$iTunesRunning) { Write-Host "(PS iTunes): iTunes not running" -BackgroundColor Black -ForegroundColor red } else { Stop-Process $iTunesRunning.Id Write-Host "(PS iTunes): iTunes closed" -BackgroundColor Black -ForegroundColor red } } } # Function to play a song function Play-Track { process { if ($iTunes.Playerstate -eq "0"){ $iTunes.Play() Write-Host "(PS iTunes): Now playing:" $iTunes.CurrentTrack.Name "from" $iTunes.CurrentTrack.Artist -BackgroundColor Black -ForegroundColor green } else { Write-Host "(PS iTunes): Already playing Track:" $iTunes.CurrentTrack.Name "from" $iTunes.CurrentTrack.Artist -BackgroundColor Black -ForegroundColor red } } } # Function to stop a song function Pause-Track { process { if ($iTunes.Playerstate -eq "1"){ $iTunes.Pause() Write-Host "(PS iTunes): iTunes paused" -BackgroundColor Black -ForegroundColor Red } else { Write-Host "(PS iTunes): Not playing any track" -BackgroundColor Black -ForegroundColor red } } } # Function to resume a song function Resume-Track { process { if ($iTunes.Playerstate -eq "0"){ $iTunes.Play() Write-Host "(PS iTunes): Now playing:" $iTunes.CurrentTrack.Name "from" $iTunes.CurrentTrack.Artist -BackgroundColor Black -ForegroundColor green } else { Write-Host "(PS iTunes): Already playing Track:" $iTunes.CurrentTrack.Name "from" $iTunes.CurrentTrack.Artist -BackgroundColor Black -ForegroundColor red } } } # Function to go a song back function Back-Track { process { $iTunes.BackTrack() Write-Host "(PS iTunes): Now playing:" $iTunes.CurrentTrack.Name "from" $iTunes.CurrentTrack.Artist -BackgroundColor Black -ForegroundColor green } } # Function to go to the next function Next-Track { process { $iTunes.NextTrack() Write-Host "(PS iTunes): Now playing:" $iTunes.CurrentTrack.Name "from" $iTunes.CurrentTrack.Artist -BackgroundColor Black -ForegroundColor green } } # Function to get infos about the current track function Get-CurrentTrack { process { Write-Host "(PS iTunes): Currently playing:" $iTunes.CurrentTrack.Name "from" $iTunes.CurrentTrack.Artist -BackgroundColor Black -ForegroundColor White } } # Function to mute itunes function Mute-iTunes { process { if($itunes.Mute -eq $false) { $itunes.Mute = $true Write-Host "(PS iTunes): iTunes muted" -BackgroundColor Black -ForegroundColor Red } else { Write-Host "(PS iTunes): iTunes already muted" -BackgroundColor Black -ForegroundColor red } } } # Function to unmute itunes function Unmute-iTunes { process { if($itunes.Mute -eq $true) { $itunes.Mute = $false Write-Host "(PS iTunes): iTunes unmuted" -BackgroundColor Black -ForegroundColor green } else { Write-Host "(PS iTunes): iTunes already unmuted" -BackgroundColor Black -ForegroundColor red } } } # Function to set iTunes volume up function Set-VolumeUP { process { if($iTunes.SoundVolume -lt 100) { $iTunes.SoundVolume = $iTunes.SoundVolume + 2 Write-Host "(PS iTunes): iTunes Volume" $iTunes.SoundVolume -BackgroundColor Black -ForegroundColor green } else { Write-Host "(PS iTunes): iTunes Volume is already 100%" -BackgroundColor Black -ForegroundColor red } } } # Function to set iTunes volume down function Set-VolumeDown { process { if($iTunes.SoundVolume -gt 0) { $iTunes.SoundVolume = $iTunes.SoundVolume - 2 Write-Host "(PS iTunes): iTunes Volume" $iTunes.SoundVolume -BackgroundColor Black -ForegroundColor red } else { Write-Host "(PS iTunes): iTunes Volume is already 0%" -BackgroundColor Black -ForegroundColor red } } } # Function to set iTunes function Set-Volume { param ( [int]$Volume ) process { if($Volume -ge 0 -and $Volume -le 100) { $iTunes.SoundVolume = $Volume Write-Host "(PS iTunes): iTunes Volume" $iTunes.SoundVolume -BackgroundColor Black -ForegroundColor green } else { Write-Host "(PS iTunes): Volume has to be 0-100" -BackgroundColor Black -ForegroundColor red } } } # Function to show the Version of iTunes function Show-iTunesVersion { process { Write-Host "(PS iTunes): iTunes Version" $iTunes.version -BackgroundColor Black -ForegroundColor White } } # Function to show the Version of iTunes function get-PSiTunesHelp { process { Write-Host " " Write-Host " Powershell iTunes Help" Write-Host " " Write-Host "********************************************************" Write-Host " " Write-Host " Commands" Write-Host " " Write-Host " Start-iTunes Starts iTunes" Write-Host " Close-iTunes Closes iTunes" Write-Host " Play-Track Plays a iTunes Track" Write-Host " Pause-Track Pauses a iTunes Track" Write-Host " Resume-Track Resumes a iTunes Track" Write-Host " Back-Track Go to the last iTunes Track" Write-Host " Next-Track Plays next iTunes Track" Write-Host " Mute-Track Mutes iTunes" Write-Host " Unmute-Track Unmutes iTunes" Write-Host " Show-iTunesVersion Shows iTunes Version" Write-Host " Set-VolumeDown Set Volume Down" Write-Host " Set-VolumeUp Set Volume Up" Write-Host " Set-Volume Set iTunes Volume (0-100)" } }
combined_dataset/train/non-malicious/MoveExch2010SP1Archives.ps1
MoveExch2010SP1Archives.ps1
#================================================================================= # MoveArchives.ps1 # # THIS CODE AND INFORMATION ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY # KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A # PARTICULAR PURPOSE. # # Description: # # # This Script Written By: David Pekmez (http://unifiedit.wordpress.com/) # # Version: 1 # Last Updated: 29/07/2010 #================================================================================= #======================================= # Parameter definition #======================================= Param( [string] $User, [string] $ArchiveDatabase ) If([String]::IsNullOrEmpty($User)) { $User = Ĺ*ĺ } #========================================================================== # Function that returns true if the incoming argument is a help request #========================================================================== function IsHelpRequest { param($argument) return ($argument -eq "-?" -or $argument -eq "-help"); } #=================================================================== # Function that displays the help related to this script following # the same format provided by get-help or <cmdletcall> -? #=================================================================== function Usage { @" NAME: MoveArchives.ps1 SYNOPSIS: Move User's Archive to another Database Exchange 2010 SP1 Requiered SYNTAX: MoveArchives.ps1 `t[-User <UserName>] `t[-ArchiveDatabase <ArchiveDatabaseName>] PARAMETERS: -User (optional) The Username you want the archive to be moved. If not used, all users archives will be moved to the target Database. -ArchiveDatabase (required) The Target Database Name where the archive will be moved -------------------------- EXAMPLE 1 -------------------------- .\\MoveArchives.ps1 -User dpekmez -ArchiveDatabase ArchiveDB1 -------------------------- EXAMPLE 2 -------------------------- .\\MoveArchives.ps1 -ArchiveDatabase ArchiveDB1 "@ } #======================================= # Check for Usage Statement Request #======================================= $args | foreach { if (IsHelpRequest $_) { Usage; exit; } } #============================================== # Function that validates the script parameters #============================================== function ValidateParams { $validInputs = $true $errorString = "" if ($ArchiveDatabase -eq "") { $validInputs = $false $errorString += "`nMissing Parameter: The -ArchiveDatabase parameter is required. Please pass in the desired Target Database Name." } if (!$validInputs) { Write-error "$errorString" } return $validInputs } #============================================== # Move Request #============================================== Get-Mailbox -identity $User | where { $_.ArchiveDatabase -ne $null } | New-MoveRequest -ArchiveTargetDatabase $ArchiveDatabase ľArchiveOnly
combined_dataset/train/non-malicious/4058.ps1
4058.ps1
param( [string]$buildCorePowershellUrl = "https://opbuildstorageprod.blob.core.windows.net/opps1container/.openpublishing.buildcore.ps1", [string]$parameters ) $errorActionPreference = 'Stop' echo "download build core script to local with source url: $buildCorePowershellUrl" $repositoryRoot = Split-Path -Parent $MyInvocation.MyCommand.Definition $buildCorePowershellDestination = "$repositoryRoot\.openpublishing.buildcore.ps1" Invoke-WebRequest $buildCorePowershellUrl -OutFile "$buildCorePowershellDestination" echo "run build core script with parameters: $parameters" & "$buildCorePowershellDestination" "$parameters" exit $LASTEXITCODE
combined_dataset/train/non-malicious/2187.ps1
2187.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed.")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Select the Discovery Method component that the containers will be added to.")] [ValidateNotNullOrEmpty()] [ValidateSet("SMS_AD_USER_DISCOVERY_AGENT", "SMS_AD_SYSTEM_DISCOVERY_AGENT")] [string]$ComponentName, [parameter(Mandatory=$true, HelpMessage="Specify a path to the CSV file containing distinguished names of the OU's that will be added.")] [ValidatePattern("^(?:[\w]\:|\\)(\\[a-z_\-\s0-9\.]+)+\.(csv)$")] [ValidateScript({ if ((Split-Path -Path $_ -Leaf).IndexOfAny([IO.Path]::GetInvalidFileNameChars()) -ge 0) { Write-Warning -Message "$(Split-Path -Path $_ -Leaf) contains invalid characters" ; break } else { if (-not(Test-Path -Path (Split-Path -Path $_) -PathType Container -ErrorAction SilentlyContinue)) { Write-Warning -Message "Unable to locate part of or the whole specified path" ; break } elseif (Test-Path -Path (Split-Path -Path $_) -PathType Container -ErrorAction SilentlyContinue) { return $true } else { Write-Warning -Message "Unhandled error" ; break } } })] [string]$Path, [parameter(Mandatory=$false, HelpMessage="Show a progressbar displaying the current operation.")] [switch]$ShowProgress ) Begin { try { Write-Verbose -Message "Determining Site Code for Site server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Verbose -Message "Site Code: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine Site Code" ; break } try { Write-Verbose -Message "Importing data from specified CSV: $($Path)" $ContainerData = Import-Csv -Path $Path -Delimiter ";" -ErrorAction Stop $ContainerDataCount = ($ContainerData | Measure-Object).Count if (-join($ContainerData | Get-Member -MemberType NoteProperty | Select-Object -ExpandProperty Name) -notlike "DistinguishedNameGroupRecursive") { Write-Warning -Message "Unsupported headers found in CSV file" ; exit } } catch [System.Exception] { Write-Warning -Message "$($_.Exception.Message). Line: $($_.InvocationInfo.ScriptLineNumber)" ; break } $OptionTable = @{ Yes = 0 No = 1 Included = 0 Excluded = 1 } } Process { if ($PSBoundParameters["ShowProgress"]) { $ProgressCount = 0 } try { $DiscoveryContainerList = New-Object -TypeName System.Collections.ArrayList $DiscoveryComponent = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_SCI_Component -ComputerName $SiteServer -Filter "ComponentName like '$($ComponentName)'" -ErrorAction Stop $DiscoveryPropListADContainer = $DiscoveryComponent.PropLists | Where-Object { $_.PropertyListName -like "AD Containers" } if ($DiscoveryPropListADContainer -ne $null) { $DiscoveryContainerList.AddRange(@($DiscoveryPropListADContainer.Values)) | Out-Null } } catch [System.Exception] { Write-Verbose -Message "Unable to determine existing discovery method component properties" ; break } foreach ($ContainerItem in $ContainerData) { if ($ContainerItem.DistinguishedName -notmatch "LDAP://") { Write-Verbose -Message "Amending current item to include LDAP protocol prefix: $($ContainerItem.DistinguishedName)" $ContainerItem.DistinguishedName = "LDAP://" + $ContainerItem.DistinguishedName } if ($PSBoundParameters["ShowProgress"]) { $ProgressCount++ Write-Progress -Activity "Importing $($ComponentName) containers" -Id 1 -Status "Current container: $($ContainerItem.DistinguishedName)" -PercentComplete (($ProgressCount / $ContainerDataCount) * 100) } if ($ContainerItem.DistinguishedName -notin $DiscoveryContainerList) { Write-Verbose -Message "Adding container item: $($ContainerItem.DistinguishedName)" $DiscoveryContainerList.AddRange(@($ContainerItem.DistinguishedName, $OptionTable[$ContainerItem.Recursive], $OptionTable[$ContainerItem.Group])) | Out-Null } else { Write-Verbose -Message "Detected duplicate container object: $($ContainerItem.DistinguishedName)" } } $ErrorActionPreference = "Stop" Write-Verbose -Message "Attempting to save changes made to the $($ComponentName) component PropList" try { $DiscoveryPropListADContainer.Values = $DiscoveryContainerList $DiscoveryComponent.PropLists = $DiscoveryPropListADContainer $DiscoveryComponent.Put() | Out-Null Write-Verbose -Message "Successfully saved changes to $($ComponentName) component" } catch [System.Exception] { Write-Verbose -Message "Unable to save changes made to $($ComponentName) component" ; break } Write-Verbose -Message "Restarting the SMS_SITE_COMPONENT_MANAGER service" try { Get-Service -ComputerName $SiteServer -Name "SMS_SITE_COMPONENT_MANAGER" -ErrorAction Stop | Restart-Service -Force -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message "$($_.Exception.Message). Line: $($_.InvocationInfo.ScriptLineNumber)" ; break } }
combined_dataset/train/non-malicious/sample_29_92.ps1
sample_29_92.ps1
# # Module manifest for module 'OCI.PSModules.Identitydataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identitydataplane.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0db2e619-5a8a-4c35-906a-750fbc5977b8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identitydataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'New-OCIIdentitydataplaneScopedAccessToken', 'New-OCIIdentitydataplaneUserSecurityToken' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_22_75.ps1
sample_22_75.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> function Save-ComputerLogsBeforeRemoval { [CmdletBinding()] Param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters]$Parameters, [Parameter(Mandatory = $true)] [string]$ComputerName ) # Log collection should never produce a failure during PNU, so setting ErrorActionPreference to SilentlyContinue for the scope of this function. $ErrorActionPreference = "SilentlyContinue" $hoursOfLogsToPreserve = 12 # TODO(mlawindi): Cluster Awareness(PnU): Extend this beyond the first cluster and set of cluster nodes # Address when SaveLogsBeforeImageBasedUpdate interface is enabled $clusterName = Get-ManagementClusterName $Parameters $diagnosticsShare = Get-SharePath $Parameters $Parameters.Roles.TraceCollector.PublicConfiguration.PublicInfo.Shares.Share.Path $clusterName $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name $computerTypeSubdirectory = "VirtualMachines" if ($ComputerName -in $hostNames) { $computerTypeSubdirectory = "BareMetal" } $oldComputerLogPath = Join-Path $diagnosticsShare -ChildPath $computerTypeSubdirectory | Join-Path -ChildPath "$($ComputerName).old" # Remove logs from the last update run if they exist to avoid consuming more disk space. try { if (Test-Path $oldComputerLogPath) { Trace-Execution "Attempting to clean up old log directory at $oldComputerLogPath." Remove-Item $oldComputerLogPath -Force -Recurse -ErrorAction "Stop" } } catch { Trace-Execution "An error occurred trying to clean up old log directory: $_" } Trace-Execution "Saving last $hoursOfLogsToPreserve hours of logs for machine $ComputerName to $oldComputerLogPath." try { $azsLogsParams = @{ "OutputPath" = $oldComputerLogPath "FilterByLogType" = "File", "WindowsEvent" "FilterByNode" = $ComputerName "FromDate" = $($(Get-Date).Subtract([System.TimeSpan]::FromHours($hoursOfLogsToPreserve))) } Trace-Execution "Get-AzureStackLog params:`r`n$($azsLogsParams | Out-String)" # ErrorAction SilentlyContinue to allow Get-AzureStackLog operate on a best-effort basis and continue past failures. Get-AzureStackLog @azsLogsParams -ErrorAction "SilentlyContinue" } catch { Trace-Execution "An error occurred attempting to collect Azure Stack logs for computer $ComputerName. Exception: $_" } } Export-ModuleMember -Function Save-ComputerLogsBeforeRemoval # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAEKj1B/KK/1Q50 # 2icB/2RhHYa6vONX/KZ3Zkj1ApztEKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICMAGFJaEsnFm2b+q//dm5nw # iev8aRbKAlZtVg3DCUnxMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAOXcMnrpcdzpLch45Rv0Cgx9JdfVm5GUDZxrP0PC0PfDbOka+oUKMzwVh # c5koWiN/hFxB2EtROBjhUvwKFogbFwg99fgzEDQz0WE3KwR1Huy2KfQTU+InsBsY # 4RCC6SdD+x+c9Hta//PyzF1g+KUhdfSjbxqBoO+LckS63pxZn6FOljn8FUNeGJtG # agiPuDKaHn+LvRVjyE62qWwscAAxOCKU0KMLDvlOYuv9V2F4rrqYgOBDIamuQORV # WIHqdQyZ2olawy+ebDLchHUknP9zNM3ij9RSmca5BzAB6/c2KxWNwVvIhsWnFCce # wJOGvpn/xA0F37I0JKNXxefQU0bHm6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBugChqfufmWw9033vxnW0shD5hmTHrjTwsPCrTp1l5kQIGZbwTMZQx # GBMyMDI0MDIxMjE0MDkzMi42MDhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRonDAiGA8yMDI0MDIxMjA5NTEy # NFoYDzIwMjQwMjEzMDk1MTI0WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGic # AgEAMAoCAQACAi25AgH/MAcCAQACAhP/MAoCBQDpdbocAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAASftcYBxtr7TQmkO4iaT7LFK821xWe4VkfDOWfGQc96 # qr+JcYMwx22MFjftVksWCEOwBuWHPwyUw9sf7HQuO4cfVEuT/XY3v/yTmkYTcJDM # z+jqQlfL10NSA+xhfSWBivngEnhpIcl9AwgFkYjVgfvCGlepaKPjdC6gkifsn+m4 # pb6z0KYwm5QQyHL0q/TLFOvflZ4jxvvDzPfcYrzf4nYW2gNkZi41w3OFsHki7i3k # n4vJ/pa9he806yPAPweDsVJFLztBu2bFxcK/+atySWeiFQiFEGhXgxNFOySaObmn # baPqE9x/GNhFJMOqeWfdVXqGnYViNGny5ngDEV++BZ8xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB # 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAm2K/8/nGJUqxtON1Rm8NP0sTj+r95w9egDScM5H4C # sTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4 # riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgS+67CHncZlcUOvz3AOcCQPNA # +J3lmsnx17MOi5maof0wDQYJKoZIhvcNAQELBQAEggIASdIWoV9tI4QR7EiMV6vt # glwXYtjY1Yq+Mc8VVExXoVAwdKGMn9o69M3fPiLY8CMk1uDhLsUW+LO6OMKW32yi # xkoQ2eket7Rsi7R6RIbFN3Ns4clAIybIMVxOlKpMW1b67VipuQC7dkMXhywA757/ # 1dOtcSbyATpkx4ogCN5dXrP+IjEnhvNvbfr06X1RpQ33h5zmJhA898OhmKmkM7IT # 6xiyTu6fR0Ez8A4rdm8CsC6KMTjYgOQujc04IrHHP/jKnDOoVIx5W2gWDseskWpS # f7FbBq0frgEUpx42fXH/9DdcVzV23H3gPSbv8VYylnLpGcZSPTcnW6AZur24XVaq # XwxFmngdeSbLmU6sNoKngDdF1NbN9SG57yxXSEbXCksrLKYc9+OnmI5zAuUrH4nF # PojtmZruvbK+4XDNc0uwCBvwqjswh/Ylef5chAvQkg31CkorQqLFfbvybRj3QGal # /ANuY8eXwE8bH3Jf+5Poy7mLfleXRF1My0DKOLGsSKuT46GVNaiL6+L5BFCBOSKv # 5kAzvaVnoW0WP4Tp5R5BTxzyd/GlXqFMxi36SY7ABBqTK+JgKZ5JBuj4pL/WFHO3 # ua/IS2F74XqoedGONcCKGx74Rl1Q7h5wxqufFSdKktoB1aQvoGltchxi7UvE6KOb # YS9zjhDcrrMIsrpm+B7SaeQ= # SIG # End signature block
combined_dataset/train/non-malicious/sample_54_4.ps1
sample_54_4.ps1
# # Module manifest for module 'OCI.PSModules.Datascience' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datascience.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e310e88b-80a4-4419-8054-2984936bf580' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datascience Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datascience.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIDatascienceModel', 'Enable-OCIDatascienceModelDeployment', 'Enable-OCIDatascienceNotebookSession', 'Export-OCIDatascienceModelArtifact', 'Get-OCIDatascienceFastLaunchJobConfigsList', 'Get-OCIDatascienceJob', 'Get-OCIDatascienceJobArtifactContent', 'Get-OCIDatascienceJobRun', 'Get-OCIDatascienceJobRunsList', 'Get-OCIDatascienceJobShapesList', 'Get-OCIDatascienceJobsList', 'Get-OCIDatascienceModel', 'Get-OCIDatascienceModelArtifactContent', 'Get-OCIDatascienceModelDeployment', 'Get-OCIDatascienceModelDeploymentShapesList', 'Get-OCIDatascienceModelDeploymentsList', 'Get-OCIDatascienceModelProvenance', 'Get-OCIDatascienceModelsList', 'Get-OCIDatascienceModelVersionSet', 'Get-OCIDatascienceModelVersionSetsList', 'Get-OCIDatascienceNotebookSession', 'Get-OCIDatascienceNotebookSessionShapesList', 'Get-OCIDatascienceNotebookSessionsList', 'Get-OCIDatasciencePipeline', 'Get-OCIDatasciencePipelineRun', 'Get-OCIDatasciencePipelineRunsList', 'Get-OCIDatasciencePipelinesList', 'Get-OCIDatasciencePrivateEndpoint', 'Get-OCIDatasciencePrivateEndpointsList', 'Get-OCIDatascienceProject', 'Get-OCIDatascienceProjectsList', 'Get-OCIDatascienceStepArtifactContent', 'Get-OCIDatascienceWorkRequest', 'Get-OCIDatascienceWorkRequestErrorsList', 'Get-OCIDatascienceWorkRequestLogsList', 'Get-OCIDatascienceWorkRequestsList', 'Import-OCIDatascienceModelArtifact', 'Invoke-OCIDatascienceDeactivateModel', 'Invoke-OCIDatascienceDeactivateModelDeployment', 'Invoke-OCIDatascienceDeactivateNotebookSession', 'Invoke-OCIDatascienceHeadJobArtifact', 'Invoke-OCIDatascienceHeadModelArtifact', 'Invoke-OCIDatascienceHeadStepArtifact', 'Move-OCIDatascienceJobCompartment', 'Move-OCIDatascienceJobRunCompartment', 'Move-OCIDatascienceModelCompartment', 'Move-OCIDatascienceModelDeploymentCompartment', 'Move-OCIDatascienceModelVersionSetCompartment', 'Move-OCIDatascienceNotebookSessionCompartment', 'Move-OCIDatasciencePipelineCompartment', 'Move-OCIDatasciencePipelineRunCompartment', 'Move-OCIDatasciencePrivateEndpointCompartment', 'Move-OCIDatascienceProjectCompartment', 'New-OCIDatascienceJob', 'New-OCIDatascienceJobArtifact', 'New-OCIDatascienceJobRun', 'New-OCIDatascienceModel', 'New-OCIDatascienceModelArtifact', 'New-OCIDatascienceModelDeployment', 'New-OCIDatascienceModelProvenance', 'New-OCIDatascienceModelVersionSet', 'New-OCIDatascienceNotebookSession', 'New-OCIDatasciencePipeline', 'New-OCIDatasciencePipelineRun', 'New-OCIDatasciencePrivateEndpoint', 'New-OCIDatascienceProject', 'New-OCIDatascienceStepArtifact', 'Remove-OCIDatascienceJob', 'Remove-OCIDatascienceJobRun', 'Remove-OCIDatascienceModel', 'Remove-OCIDatascienceModelDeployment', 'Remove-OCIDatascienceModelVersionSet', 'Remove-OCIDatascienceNotebookSession', 'Remove-OCIDatasciencePipeline', 'Remove-OCIDatasciencePipelineRun', 'Remove-OCIDatasciencePrivateEndpoint', 'Remove-OCIDatascienceProject', 'Stop-OCIDatascienceJobRun', 'Stop-OCIDatasciencePipelineRun', 'Stop-OCIDatascienceWorkRequest', 'Update-OCIDatascienceJob', 'Update-OCIDatascienceJobRun', 'Update-OCIDatascienceModel', 'Update-OCIDatascienceModelDeployment', 'Update-OCIDatascienceModelProvenance', 'Update-OCIDatascienceModelVersionSet', 'Update-OCIDatascienceNotebookSession', 'Update-OCIDatasciencePipeline', 'Update-OCIDatasciencePipelineRun', 'Update-OCIDatasciencePrivateEndpoint', 'Update-OCIDatascienceProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datascience' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_2_78.ps1
sample_2_78.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2022 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope = "function")] param() #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Register-IntelEthernetRDMACounterSet { [CmdletBinding(DefaultParameterSetName = 'ByAdapter')] Param( [parameter(Mandatory = $false, ParameterSetName = 'ByName')] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true, ParameterSetName = 'ByAdapter')] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null ) Begin { $AdapterName = $Name $script:WarningMessagesRegister = @() $script:ErrorMessagesRegister = @() $bIceaRegistered = $false $bIcebRegistered = $false $bIavfRegistered = $false $BeforePreference = $global:ErrorActionPreference GetIntelEthernetDevices @('iavf') @('ixw') $script:SupportedAdapters = @(GetSupportedAdaptersByDriver @("icea", "iceb", "iavf")) } Process { $PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapter ([ref]$script:ErrorMessagesRegister) $AdapterNames = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesRegister)) foreach ($a in $AdapterNames) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:WarningMessagesRegister += $TmpStatusMsg } $strDriverName = ($script:SupportedAdapters.Where({ $_.Name -eq $a })).Service if ([string]::IsNullOrEmpty($strDriverName)) { $script:ErrorMessagesRegister += $Messages.RegisterCountersFailure -f $a continue } if (($bIceaRegistered -and $strDriverName -eq 'icea') -or ($bIcebRegistered -and $strDriverName -eq 'iceb') -or ($bIavfRegistered -and $strDriverName -eq 'iavf')) { Write-Host ($Messages.RegisterCountersSuccess -f $a) continue } $strOSSpecificDriverName = GetOSSpecificDriverName $strDriverName $strDriverStoreFolderPath = GetDriverInfParentFolder $strOSSpecificDriverName "Register" if ([string]::IsNullOrEmpty($strOSSpecificDriverName) -or [string]::IsNullOrEmpty($strDriverStoreFolderPath)) { $script:ErrorMessagesRegister += $Messages.InvalidSystemConfigFailure break } $strManifestName = "manifest_" + $strOSSpecificDriverName + ".man" $strManifestPath = $strDriverStoreFolderPath + "\" + $strManifestName try { $global:ErrorActionPreference = "Stop" [System.Environment]::SetEnvironmentVariable($strDriverName + "InstallDir", $strDriverStoreFolderPath, [System.EnvironmentVariableTarget]::Machine) $strLodctrPath = [System.Environment]::SystemDirectory + "\lodctr.exe" & "$strLodctrPath" "/m:`"$strManifestPath`"" | Out-Null } catch { Write-Verbose "LASTEXITCODE: $LASTEXITCODE" try { # If SetEnvironmentVariable caused error, this will error again. [System.Environment]::SetEnvironmentVariable($strDriverName + "InstallDir", '', [System.EnvironmentVariableTarget]::Machine) } catch { Write-Verbose "LASTEXITCODE: $LASTEXITCODE" } $script:ErrorMessagesRegister += $Messages.RegisterCountersFailure -f $a continue } $ERROR_SUCCESS = 0 if ($ERROR_SUCCESS -ne $LASTEXITCODE) { $script:ErrorMessagesRegister += $Messages.RegisterCountersFailure -f $a [System.Environment]::SetEnvironmentVariable($strDriverName + "InstallDir", '', [System.EnvironmentVariableTarget]::Machine) Write-Verbose "LASTEXITCODE: $LASTEXITCODE" continue } if ($strDriverName -eq 'icea') { $bIceaRegistered = $true } elseif ($strDriverName -eq 'iceb') { $bIcebRegistered = $true } elseif ($strDriverName -eq 'iavf') { $bIavfRegistered = $true } Write-Host ($Messages.RegisterCountersSuccess -f $a) } } End { $global:ErrorActionPreference = $BeforePreference foreach ($WarningMessage in $script:WarningMessagesRegister) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesRegister) { Write-Error $ErrorMessage } } } #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Unregister-IntelEthernetRDMACounterSet { [CmdletBinding(DefaultParameterSetName = 'ByAdapter')] Param( [parameter(Mandatory = $false, ParameterSetName = 'ByName')] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true, ParameterSetName = 'ByAdapter')] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null ) Begin { $AdapterName = $Name $script:WarningMessagesUnregister = @() $script:ErrorMessagesUnregister = @() $bIceaUnregistered = $false $bIcebUnregistered = $false $bIavfUnregistered = $false $BeforePreference = $global:ErrorActionPreference GetIntelEthernetDevices @('iavf') @('ixw') $script:SupportedAdapters = @(GetSupportedAdaptersByDriver @("icea", "iceb", "iavf")) } Process { $PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapter ([ref]$script:ErrorMessagesUnregister) $AdapterNames = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesUnregister)) foreach ($a in $AdapterNames) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:WarningMessagesUnregister += $TmpStatusMsg } $strDriverName = ($script:SupportedAdapters.Where({ $_.Name -eq $a })).Service if ([string]::IsNullOrEmpty($strDriverName)) { $script:ErrorMessagesUnregister += $Messages.UnregisterCountersFailure -f $a continue } if (($bIceaUnregistered -and $strDriverName -eq 'icea') -or ($bIcebUnregistered -and $strDriverName -eq 'iceb') -or ($bIavfUnregistered -and $strDriverName -eq 'iavf')) { Write-Host ($Messages.UnregisterCountersSuccess -f $a) continue } try { $global:ErrorActionPreference = "Stop" [Environment]::SetEnvironmentVariable($strDriverName + 'InstallDir', '', [System.EnvironmentVariableTarget]::Machine) $strUnlodctrPath = [System.Environment]::SystemDirectory + "\unlodctr.exe" & "$strUnlodctrPath" "/p:Intel-$strDriverName" | Out-Null } catch { $script:ErrorMessagesUnregister += $Messages.UnregisterCountersFailure -f $a Write-Verbose "LASTEXITCODE: $LASTEXITCODE" continue } $ERROR_SUCCESS = 0 $ERROR_UNREGISTER_REPEAT = 259 if ($ERROR_SUCCESS -ne $LASTEXITCODE -and $ERROR_UNREGISTER_REPEAT -ne $LASTEXITCODE) { $script:ErrorMessagesUnregister += $Messages.UnregisterCountersFailure -f $a Write-Verbose "LASTEXITCODE: $LASTEXITCODE" continue } if ($strDriverName -eq 'icea') { $bIceaUnregistered = $true } elseif ($strDriverName -eq 'iceb') { $bIcebUnregistered = $true } elseif ($strDriverName -eq 'iavf') { $bIavfUnregistered = $true } Write-Host ($Messages.UnregisterCountersSuccess -f $a) } } End { $global:ErrorActionPreference = $BeforePreference foreach ($WarningMessage in $script:WarningMessagesUnregister) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesUnregister) { Write-Error $ErrorMessage } } } # SIG # Begin signature block # MIIocAYJKoZIhvcNAQcCoIIoYTCCKF0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBgg8Vs3sxfDTul # pKocUGJuYh3y3hcEkkcFExdJZEDeuaCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1DCCFdACAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEINPqkXZTuiT9A4VZmmiYGf5O # rgzvOLX7ak1fK6iFMaFBMA0GCSqGSIb3DQEBAQUABIIBgCjvWxWynhpqhIRn1o7Q # 5eDz2Acybym1UAk6umryt+YbPhNiaPcXBTeKoEWNwZ3dUQCC/DZmtXLAdbNTDXsO # VM3rz6kDpxlgdYuQqFlp7OxeqrpMKQ9sCfstWAmrsFcMeOj3aLG6ci9XtcxOLKYV # dbhUnAmmMkeg33FrFvdM69KKRWsXlAhH1UR/uulF4SE+Tvq7iLM1vsKvtF4FW6K1 # HwkGBeoAHbB4TeQfkU9aKtYX2pEFfO3hArSdz7gMczZAiEZm70CnT+hcMA/HHYRU # PqDQ48XAKGx+ARJ5u6F2o6AaVOOqGkbT1xQqAJb00cAImw1irts2Nl+Gi91+BkF7 # 4V5lt/SnCAFCBX5nQrxP8lpTUDEfmFdxlBVpxYU6P91xrSaJvlYrt6n1DBU+QVCI # G0ZO349l8PD6Htp3pExhb/0PRrT6JtJsR5XjRfLKpSmlZxWzLKDXj08HfnrmB//c # zUiCS4GOhoItQ8dJeyjT2JBBeGLuASFrSQtvwVAHAgnHS6GCE04wghNKBgorBgEE # AYI3AwMBMYITOjCCEzYGCSqGSIb3DQEHAqCCEycwghMjAgEDMQ8wDQYJYIZIAWUD # BAICBQAwge8GCyqGSIb3DQEJEAEEoIHfBIHcMIHZAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIIFKR+lp1eDhWt4Krh6tT5aEWW9diHbWwqMnPSg38Dud # AhRH9l6CFgPV5S0Pwn39ZoYUTHj/whgPMjAyNDAzMTgxODIxMTZaoG6kbDBqMQsw # CQYDVQQGEwJHQjETMBEGA1UECBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGln # byBMaW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNp # Z25lciAjNKCCDekwggb1MIIE3aADAgECAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCSqG # SIb3DQEBDAUAMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNo # ZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRl # ZDElMCMGA1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMzA1 # MDMwMDAwMDBaFw0zNDA4MDIyMzU5NTlaMGoxCzAJBgNVBAYTAkdCMRMwEQYDVQQI # EwpNYW5jaGVzdGVyMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAqBgNVBAMM # I1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICM0MIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEApJMoUkvPJ4d2pCkcmTjA5w7U0RzsaMsBZOSK # zXewcWWCvJ/8i7u7lZj7JRGOWogJZhEUWLK6Ilvm9jLxXS3AeqIO4OBWZO2h5YEg # ciBkQWzHwwj6831d7yGawn7XLMO6EZge/NMgCEKzX79/iFgyqzCz2Ix6lkoZE1ys # /Oer6RwWLrCwOJVKz4VQq2cDJaG7OOkPb6lampEoEzW5H/M94STIa7GZ6A3vu03l # PYxUA5HQ/C3PVTM4egkcB9Ei4GOGp7790oNzEhSbmkwJRr00vOFLUHty4Fv9Gbsf # PGoZe267LUQqvjxMzKyKBJPGV4agczYrgZf6G5t+iIfYUnmJ/m53N9e7UJ/6GCVP # E/JefKmxIFopq6NCh3fg9EwCSN1YpVOmo6DtGZZlFSnF7TMwJeaWg4Ga9mBmkFgH # gM1Cdaz7tJHQxd0BQGq2qBDu9o16t551r9OlSxihDJ9XsF4lR5F0zXUS0Zxv5F4N # m+x1Ju7+0/WSL1KF6NpEUSqizADKh2ZDoxsA76K1lp1irScL8htKycOUQjeIIISo # h67DuiNye/hU7/hrJ7CF9adDhdgrOXTbWncC0aT69c2cPcwfrlHQe2zYHS0RQlNx # dMLlNaotUhLZJc/w09CRQxLXMn2YbON3Qcj/HyRU726txj5Ve/Fchzpk8WBLBU/v # uS/sCRMCAwEAAaOCAYIwggF+MB8GA1UdIwQYMBaAFBqh+GEZIA/DQXdFKI7RNV8G # EgRVMB0GA1UdDgQWBBQDDzHIkSqTvWPz0V1NpDQP0pUBGDAOBgNVHQ8BAf8EBAMC # BsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBKBgNVHSAE # QzBBMDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3Rp # Z28uY29tL0NQUzAIBgZngQwBBAIwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDovL2Ny # bC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3JsMHQGCCsG # AQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdvLmNvbS9T # ZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdodHRwOi8v # b2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEATJtlWPrgec/vFcMy # bd4zket3WOLrvctKPHXefpRtwyLHBJXfZWlhEwz2DJ71iSBewYfHAyTKx6XwJt/4 # +DFlDeDrbVFXpoyEUghGHCrC3vLaikXzvvf2LsR+7fjtaL96VkjpYeWaOXe8vrqR # ZIh1/12FFjQn0inL/+0t2v++kwzsbaINzMPxbr0hkRojAFKtl9RieCqEeajXPawh # j3DDJHk6l/ENo6NbU9irALpY+zWAT18ocWwZXsKDcpCu4MbY8pn76rSSZXwHfDVE # Ha1YGGti+95sxAqpbNMhRnDcL411TCPCQdB6ljvDS93NkiZ0dlw3oJoknk5fTtOP # D+UTT1lEZUtDZM9I+GdnuU2/zA2xOjDQoT1IrXpl5Ozf4AHwsypKOazBpPmpfTXQ # MkCgsRkqGCGyyH0FcRpLJzaq4Jgcg3Xnx35LhEPNQ/uQl3YqEqxAwXBbmQpA+oBt # lGF7yG65yGdnJFxQjQEg3gf3AdT4LhHNnYPl+MolHEQ9J+WwhkcqCxuEdn17aE+N # t/cTtO2gLe5zD9kQup2ZLHzXdR+PEMSU5n4k5ZVKiIwn1oVmHfmuZHaR6Ej+yFUK # 7SnDH944psAU+zI9+KmDYjbIw74Ahxyr+kpCHIkD3PVcfHDZXXhO7p9eIOYJanwr # CKNI9RX8BE/fzSEceuX1jhrUuUAwggbsMIIE1KADAgECAhAwD2+s3WaYdHypRjan # eC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3 # IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VS # VFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0 # aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5NTlaMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77NawHbWGgSl # zkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavVcRB5h/RG # Ks3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc1zjxFrJw # 06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQhe5cBlK9/ # gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzIjDzTFKKc # vSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4wZytGtzWv # lr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5VC0m7kUa # Om/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmTIBxKlyx3 # GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuoRsDJ8qb/ # fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdprt9v3GEBX # c/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVBeqeDAgMB # AAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNmyzAdBgNV # HQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGGMBIGA1Ud # EwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0gBAowCDAG # BgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNv # bS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEF # BQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9V # U0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29j # c3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNdFuG1U4GR # dd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9Aw63T4uRW # +VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbhRGdtj7BD # EA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4OZOTlJux # 3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhvWiVwYoFz # Y16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JHHfBd1qFz # VwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJLnfE5Xkze # SD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMftpmWJvQ8 # eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/poUGd/rG4 # oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq/eww2vGn # L8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWiAoa6Ke60 # WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQsMIIEKAIBATCBkTB9MQswCQYDVQQGEwJH # QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3Jk # MRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNB # IFRpbWUgU3RhbXBpbmcgQ0ECEDlMJeF8oG0nqGXiO9kdItQwDQYJYIZIAWUDBAIC # BQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUx # DxcNMjQwMzE4MTgyMTE2WjA/BgkqhkiG9w0BCQQxMgQwHIKbP0HlJD/sxGjxYgPM # Ai1XDH8CHtGwAGxcwGIQ4Yl6MiXYgvJ1XT9AnvKA98nZMIHtBgsqhkiG9w0BCRAC # DDGB3TCB2jCB1zAWBBSuYq91Cgy9R9ZGH3Vo4ryM58pPlDCBvAQUAtZbleKDcMFX # AJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpO # ZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVT # RVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmlj # YXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3DQEBAQUA # BIICAAo3Gaxu98CW6p56hLg+5Mno/1yr7jGqoAkEaZekV85jqXuA0FmEB4+AE1PB # PWrHBNTKpdyso0/2hVRMc7YTQvZwjks9ehDMRzeaZiqsnPQf3ITY/ULsIyXYyHuj # KTdF4e7p7jF+akb3gAUbRUa6hlutsmgKp/+DwLUgiOqruGiZzkIyVudUujwilJWI # 5MqFrS3LgxkddYfFWxbtACTEE8KmR4pumoVByDhFSAHSHT6djKMk0h+giJCOHgO6 # 6DLfDIHMhyN0SLyga64bpbwayaWi0d2x95vMNjq6wC8R2csMZVD2NuV74rX8iTx+ # tlpAiVKOt5jqTOCizIVFHapAoT3BsyWZAZXG3GF0w5eJrbLthENfUuihbjJB8XSP # VuxAr28F8JAmx4OxK5Aka6q+k120vFCbdj571PHRf2T6u6LouV4GyB2QV/b07n5l # +daj5mCDQ41pcX7r+fql8sVqDi0ue1dgperHSgdEF8Ulvb+pjACWxzY8rjxDSLOF # L3FnU+PyXGPbOMfuShHD9k6VVXSRMqN+5d9uLJP+qWWqML2BmG8GotDjEoKX4aMO # gYtBqCsmIisbrZi8CBE0Hl6CUcgl/HrBEu8FD5xRriUK4XaaqkIArqnovXsOvx1b # malVIXDNYSdqj0fLOMT7TkynFeMRfI1aUF1bLm82SySsd9W9 # SIG # End signature block
combined_dataset/train/non-malicious/Search cmdlet help_1.ps1
Search cmdlet help_1.ps1
function Search-Help($term) { Get-Command | Where { Get-Help -full -ea SilentlyContinue $_ | Out-String | Select-String $term } }
combined_dataset/train/non-malicious/sample_60_97.ps1
sample_60_97.ps1
<UserControl x:Class="Avast.Net.Console.Network.Views.PasswordSettingsView" xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" xmlns:groupbox="clr-namespace:Groupbox;assembly=Groupbox" xmlns:ViewModels="clr-namespace:Avast.Net.Console.Network.ViewModels" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:d="http://schemas.microsoft.com/expression/blend/2008" xmlns:utils="clr-namespace:Avast.Net.Console.Infrastructure.Utilities;assembly=Avast.Net.Console.Infrastructure" mc:Ignorable="d" d:DataContext="{d:DesignInstance Type=ViewModels:PasswordSettingsViewModel, IsDesignTimeCreatable=False}"> <ScrollViewer VerticalScrollBarVisibility="Auto" BorderBrush="{x:Null}"> <Grid x:Name="LayoutRoot"> <Grid.RowDefinitions> <RowDefinition Height="Auto"/> <RowDefinition Height="Auto"/> <RowDefinition Height="Auto"/> </Grid.RowDefinitions> <StackPanel Grid.Row="0"> <TextBlock Style="{StaticResource TitleStyle}" Text="{Binding Path=L0228, Source={StaticResource Resources},Converter={StaticResource stringToUppercaseLocalizedStringConverter}}"/> <TextBlock Style="{StaticResource CaptionStyle}" Text="{Binding Path=L0229, Source={StaticResource Resources}}" /> </StackPanel> <StackPanel Grid.Row="1" Margin="0,30,0,0"> <CheckBox Margin="10,10,0,0" Content="{Binding Path=L0230, Source={StaticResource Resources}}" IsChecked="{Binding ProtectWithPassword, Mode=TwoWay}" /> <Grid Margin="40,20,0,70"> <Grid.RowDefinitions> <RowDefinition Height="Auto"/> <RowDefinition Height="Auto"/> </Grid.RowDefinitions> <Grid.ColumnDefinitions> <ColumnDefinition Width="Auto" MinWidth="150"/> <ColumnDefinition Width="*"/> </Grid.ColumnDefinitions> <TextBlock Grid.Row="0" Grid.Column="0" Margin="0,3,10,3" HorizontalAlignment="Left" VerticalAlignment="Top" x:Name="lblPassword" Text="{Binding Path=L0231, Source={StaticResource Resources}}" TextWrapping="Wrap"/> <PasswordBox Grid.Row="0" Grid.Column="1" Margin="0,3,10,3" HorizontalAlignment="Left" VerticalAlignment="Top" Width="250" Style="{StaticResource PasswordBoxStyle}" AutomationProperties.LabeledBy="{Binding ElementName=lblPassword}" Password="{Binding Path=EnteredPassword, Mode=TwoWay, ValidatesOnNotifyDataErrors=True}" IsEnabled="{Binding ProtectWithPassword}" utils:PasswordBoxHelper.UpdateSourceOnChange="True" /> <TextBlock Grid.Row="1" Grid.Column="0" Margin="0,3,10,3" HorizontalAlignment="Left" VerticalAlignment="Top" x:Name="lblPasswordRetype" Text="{Binding Path=L0233, Source={StaticResource Resources}}" TextWrapping="Wrap"/> <PasswordBox Password="{Binding Path=ReenteredPassword, Mode=TwoWay, ValidatesOnNotifyDataErrors=True}" Grid.Row="1" Grid.Column="1" Margin="0,3,10,3" AutomationProperties.LabeledBy="{Binding ElementName=lblPasswordRetype}" utils:PasswordBoxHelper.UpdateSourceOnChange="True" HorizontalAlignment="Left" VerticalAlignment="Top" Width="250" Style="{StaticResource PasswordBoxStyle}" IsEnabled="{Binding ProtectWithPassword}"/> </Grid> </StackPanel> <groupbox:GroupBox Grid.Row="2" Height="Auto" Style="{StaticResource GroupBoxStyle}" Header="{Binding Path=L0234, Source={StaticResource Resources}}" IsEnabled="{Binding ProtectWithPassword}"> <StackPanel> <CheckBox Margin="10,10,0,0" Style="{StaticResource CheckBoxStyle}" Content="{Binding Path=L0235, Source={StaticResource Resources}}" IsChecked="{Binding ProgramAccessProtected, Mode=TwoWay}" /> <CheckBox Margin="10,10,0,0" Style="{StaticResource CheckBoxStyle}" Content="{Binding Path=L0236, Source={StaticResource Resources}}" IsChecked="{Binding ProgramSettingsProtected, Mode=TwoWay}" /> <CheckBox Margin="10,10,0,0" Style="{StaticResource CheckBoxStyle}" Content="{Binding Path=L0237, Source={StaticResource Resources}}" IsChecked="{Binding ProtectionControlProtected, Mode=TwoWay}" /> <CheckBox Margin="10,10,0,0" Style="{StaticResource CheckBoxStyle}" Content="{Binding Path=L0238, Source={StaticResource Resources}}" IsChecked="{Binding ProtectionSettingsProtected, Mode=TwoWay}" /> <CheckBox Margin="10,10,0,0" Style="{StaticResource CheckBoxStyle}" Content="{Binding Path=L0239, Source={StaticResource Resources}}" IsChecked="{Binding ScanControlProtected, Mode=TwoWay}" /> <CheckBox Margin="10,10,0,0" Style="{StaticResource CheckBoxStyle}" Content="{Binding Path=L0240, Source={StaticResource Resources}}" IsChecked="{Binding ScanSettingsProtected, Mode=TwoWay}" /> <CheckBox Margin="10,10,0,0" Style="{StaticResource CheckBoxStyle}" Content="{Binding Path=L0241, Source={StaticResource Resources}}" IsChecked="{Binding UpdateControlProtected, Mode=TwoWay}" /> <CheckBox Margin="10,10,0,10" Style="{StaticResource CheckBoxStyle}" Content="{Binding Path=L0242, Source={StaticResource Resources}}" IsChecked="{Binding VirusChestProtected, Mode=TwoWay}"/> </StackPanel> </groupbox:GroupBox> </Grid> </ScrollViewer> </UserControl>
combined_dataset/train/non-malicious/sample_28_2.ps1
sample_28_2.ps1
# # Module manifest for module 'OCI.PSModules.Computecloudatcustomer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Computecloudatcustomer.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5ad07485-5877-44d1-87e8-7e7611e4c92b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Computecloudatcustomer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Computecloudatcustomer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIComputecloudatcustomerCccInfrastructure', 'Get-OCIComputecloudatcustomerCccInfrastructuresList', 'Get-OCIComputecloudatcustomerCccUpgradeSchedule', 'Get-OCIComputecloudatcustomerCccUpgradeSchedulesList', 'Move-OCIComputecloudatcustomerCccInfrastructureCompartment', 'Move-OCIComputecloudatcustomerCccUpgradeScheduleCompartment', 'New-OCIComputecloudatcustomerCccInfrastructure', 'New-OCIComputecloudatcustomerCccUpgradeSchedule', 'Remove-OCIComputecloudatcustomerCccInfrastructure', 'Remove-OCIComputecloudatcustomerCccUpgradeSchedule', 'Update-OCIComputecloudatcustomerCccInfrastructure', 'Update-OCIComputecloudatcustomerCccUpgradeSchedule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Computecloudatcustomer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/dc580007-f61d-477a-a409-395481ffb01a.ps1
dc580007-f61d-477a-a409-395481ffb01a.ps1
CREATE LOGIN [vCenter_Owner] WITH PASSWORD=N'KVx$!|mhQ^', CHECK_EXPIRATION=OFF, CHECK_POLICY=OFF GO --Modify Drive and size to match your environment CREATE DATABASE [vCenter] ON PRIMARY ( NAME = N'vCenter', FILENAME = N'S:\\Data\\vCenter.mdf' , SIZE = 100MB , MAXSIZE = UNLIMITED, FILEGROWTH = 10%) LOG ON ( NAME = N'vCenter_log', FILENAME = N'T:\\Logs\\vCenter.ldf' , SIZE = 10MB , MAXSIZE = 2048GB , FILEGROWTH = 10%) GO use vCenter GO CREATE USER [vCenter_Owner] FOR LOGIN [vCenter_Owner] WITH DEFAULT_SCHEMA=[dbo] GO sp_addrolemember db_owner, [vCenter_Owner] GO use msdb CREATE USER [vCenter_Owner] FOR LOGIN [vCenter_Owner] WITH DEFAULT_SCHEMA=[dbo] GO sp_addrolemember db_owner, [vCenter_Owner] GO --After vCenter installation completes, remove the vCenter login from msdb. use msdb drop user [vCenter_Owner]
combined_dataset/train/non-malicious/4337.ps1
4337.ps1
function Validate-ModuleCommandAlreadyAvailable { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [PSModuleInfo] $CurrentModuleInfo, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $InstallLocation, [Parameter()] [Switch] $AllowClobber, [Parameter()] [Switch] $IsUpdateOperation ) if($CurrentModuleInfo.ExportedCommands.Keys.Count -and -not $AllowClobber -and -not $IsUpdateOperation) { if(Test-ModuleSxSVersionSupport) { $InstallLocation = Microsoft.PowerShell.Management\Split-Path -Path $InstallLocation } $InstalledModuleInfo = Test-ModuleInstalled -Name $CurrentModuleInfo.Name if(-not $InstalledModuleInfo -or -not $InstalledModuleInfo.ModuleBase.StartsWith($InstallLocation, [System.StringComparison]::OrdinalIgnoreCase)) { $CommandNames = $CurrentModuleInfo.ExportedCommands.Values.Name $CommandNameHash = @{} $CommandNames | % { $CommandNameHash[$_] = 1 } $AvailableCommands = Microsoft.PowerShell.Core\Get-Command ` -ErrorAction Ignore ` -WarningAction SilentlyContinue | Microsoft.PowerShell.Core\Where-Object { ($CommandNameHash.ContainsKey($_.Name)) -and ($_.ModuleName -ne $script:PSModuleProviderName) -and ($_.ModuleName -ne 'PSModule') -and ($_.ModuleName -ne $CurrentModuleInfo.Name) } if($AvailableCommands) { $AvailableCommandsList = ($AvailableCommands.Name | Microsoft.PowerShell.Utility\Select-Object -Unique -ErrorAction Ignore) -join "," $message = $LocalizedData.ModuleCommandAlreadyAvailable -f ($AvailableCommandsList, $CurrentModuleInfo.Name) ThrowError -ExceptionName 'System.InvalidOperationException' ` -ExceptionMessage $message ` -ErrorId 'CommandAlreadyAvailable' ` -CallerPSCmdlet $PSCmdlet ` -ErrorCategory InvalidOperation return $false } } } return $true }
combined_dataset/train/non-malicious/3952.ps1
3952.ps1
function Test-ListAzureFirewallFqdnTag { $alwaysPresentTag = "WindowsUpdate" $availableFqdnTags = Get-AzFirewallFqdnTag Assert-True { $availableFqdnTags.Count -gt 0 } Assert-AreEqual 1 $availableFqdnTags.Where({$_.FqdnTagName -eq $alwaysPresentTag}).Count }
combined_dataset/train/non-malicious/FTP upload_2.ps1
FTP upload_2.ps1
$File = "D:\\Dev\\somefilename.zip" $ftp = "ftp://username:password@example.com/pub/incoming/somefilename.zip" "ftp url: $ftp" $webclient = New-Object System.Net.WebClient $uri = New-Object System.Uri($ftp) "Uploading $File..." $webclient.UploadFile($uri, $File)
combined_dataset/train/non-malicious/sample_29_65.ps1
sample_29_65.ps1
# # Module manifest for module 'OCI.PSModules.Workrequests' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Workrequests.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'bfd147d7-2910-4621-842b-b948c79cda01' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Workrequests Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Workrequests.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWorkrequestsList', 'Get-OCIWorkrequestsWorkRequest', 'Get-OCIWorkrequestsWorkRequestErrorsList', 'Get-OCIWorkrequestsWorkRequestLogsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Workrequests' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_55_2.ps1
sample_55_2.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# PowerShell Diagnostics Module This module contains a set of wrapper scripts that enable a user to use ETW tracing in Windows PowerShell. #> $script:Logman="$env:windir\system32\logman.exe" $script:wsmanlogfile = "$env:windir\system32\wsmtraces.log" $script:wsmprovfile = "$env:windir\system32\wsmtraceproviders.txt" $script:wsmsession = "wsmlog" $script:pssession = "PSTrace" $script:psprovidername="Microsoft-Windows-PowerShell" $script:wsmprovidername = "Microsoft-Windows-WinRM" $script:oplog = "/Operational" $script:analyticlog="/Analytic" $script:debuglog="/Debug" $script:wevtutil="$env:windir\system32\wevtutil.exe" $script:slparam = "sl" $script:glparam = "gl" function Start-Trace { Param( [Parameter(Mandatory=$true, Position=0)] [string] $SessionName, [Parameter(Position=1)] [ValidateNotNullOrEmpty()] [string] $OutputFilePath, [Parameter(Position=2)] [ValidateNotNullOrEmpty()] [string] $ProviderFilePath, [Parameter()] [Switch] $ETS, [Parameter()] [ValidateSet("bin", "bincirc", "csv", "tsv", "sql")] $Format, [Parameter()] [int] $MinBuffers=0, [Parameter()] [int] $MaxBuffers=256, [Parameter()] [int] $BufferSizeInKB = 0, [Parameter()] [int] $MaxLogFileSizeInMB=0 ) Process { $executestring = " start $SessionName" if ($ETS) { $executestring += " -ets" } if ($null -ne $OutputFilePath) { $executestring += " -o ""$OutputFilePath""" } if ($null -ne $ProviderFilePath) { $executestring += " -pf ""$ProviderFilePath""" } if ($null -ne $Format) { $executestring += " -f $Format" } if ($MinBuffers -ne 0 -or $MaxBuffers -ne 256) { $executestring += " -nb $MinBuffers $MaxBuffers" } if ($BufferSizeInKB -ne 0) { $executestring += " -bs $BufferSizeInKB" } if ($MaxLogFileSizeInMB -ne 0) { $executestring += " -max $MaxLogFileSizeInMB" } & $script:Logman $executestring.Split(" ") } } function Stop-Trace { param( [Parameter(Mandatory=$true, Position=0)] $SessionName, [Parameter()] [switch] $ETS ) Process { if ($ETS) { & $script:Logman update $SessionName -ets & $script:Logman stop $SessionName -ets } else { & $script:Logman update $SessionName & $script:Logman stop $SessionName } } } function Enable-WSManTrace { # winrm "{04c6e16d-b99f-4a3a-9b3e-b8325bbc781e} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii # winrsmgr "{c0a36be8-a515-4cfa-b2b6-2676366efff7} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WinrsExe "{f1cab2c0-8beb-4fa2-90e1-8f17e0acdd5d} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WinrsCmd "{03992646-3dfe-4477-80e3-85936ace7abb} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # IPMIPrv "{651d672b-e11f-41b7-add3-c2f6a4023672} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append #IpmiDrv "{D5C6A3E9-FA9C-434e-9653-165B4FC869E4} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WSManProvHost "{6e1b64d7-d3be-4651-90fb-3583af89d7f1} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # Event Forwarding "{6FCDF39A-EF67-483D-A661-76D715C6B008} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append Start-Trace -SessionName $script:wsmsession -ETS -OutputFilePath $script:wsmanlogfile -Format bincirc -MinBuffers 16 -MaxBuffers 256 -BufferSizeInKB 64 -MaxLogFileSizeInMB 256 -ProviderFilePath $script:wsmprovfile } function Disable-WSManTrace { Stop-Trace $script:wsmsession -ETS } function Enable-PSWSManCombinedTrace { param ( [switch] $DoNotOverwriteExistingTrace ) $provfile = [io.path]::GetTempFilename() $traceFileName = [string][Guid]::NewGuid() if ($DoNotOverwriteExistingTrace) { $fileName = [string][guid]::newguid() $logfile = $PSHOME + "\\Traces\\PSTrace_$fileName.etl" } else { $logfile = $PSHOME + "\\Traces\\PSTrace.etl" } "Microsoft-Windows-PowerShell 0 5" | Out-File $provfile -Encoding ascii "Microsoft-Windows-WinRM 0 5" | Out-File $provfile -Encoding ascii -Append if (!(Test-Path $PSHOME\Traces)) { New-Item -ItemType Directory -Force $PSHOME\Traces | Out-Null } if (Test-Path $logfile) { Remove-Item -Force $logfile | Out-Null } Start-Trace -SessionName $script:pssession -OutputFilePath $logfile -ProviderFilePath $provfile -ETS Remove-Item $provfile -Force -ea 0 } function Disable-PSWSManCombinedTrace { Stop-Trace -SessionName $script:pssession -ETS } function Set-LogProperties { param( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true)] [Microsoft.PowerShell.Diagnostics.LogDetails] $LogDetails, [switch] $Force ) Process { if ($LogDetails.AutoBackup -and !$LogDetails.Retention) { throw (New-Object System.InvalidOperationException) } $enabled = $LogDetails.Enabled.ToString() $retention = $LogDetails.Retention.ToString() $autobackup = $LogDetails.AutoBackup.ToString() $maxLogSize = $LogDetails.MaxLogSize.ToString() $osVersion = [Version] (Get-CimInstance Win32_OperatingSystem).Version if (($LogDetails.Type -eq "Analytic") -or ($LogDetails.Type -eq "Debug")) { if ($LogDetails.Enabled) { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled } } else { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ms:$MaxLogSize } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ms:$MaxLogSize } } } else { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ab:$AutoBackup -ms:$MaxLogSize } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ab:$AutoBackup -ms:$MaxLogSize } } } } function ConvertTo-Bool([string]$value) { if ($value -ieq "true") { return $true } else { return $false } } function Get-LogProperties { param( [Parameter(Mandatory=$true, ValueFromPipeline=$true, Position=0)] $Name ) Process { $details = & $script:wevtutil $script:glparam $Name $indexes = @(1,2,8,9,10) $value = @() foreach($index in $indexes) { $value += @(($details[$index].SubString($details[$index].IndexOf(":")+1)).Trim()) } $enabled = ConvertTo-Bool $value[0] $retention = ConvertTo-Bool $value[2] $autobackup = ConvertTo-Bool $value[3] New-Object Microsoft.PowerShell.Diagnostics.LogDetails $Name, $enabled, $value[1], $retention, $autobackup, $value[4] } } function Enable-PSTrace { param( [switch] $Force, [switch] $AnalyticOnly ) $Properties = Get-LogProperties ($script:psprovidername + $script:analyticlog) if (!$Properties.Enabled) { $Properties.Enabled = $true if ($Force) { Set-LogProperties $Properties -Force } else { Set-LogProperties $Properties } } if (!$AnalyticOnly) { $Properties = Get-LogProperties ($script:psprovidername + $script:debuglog) if (!$Properties.Enabled) { $Properties.Enabled = $true if ($Force) { Set-LogProperties $Properties -Force } else { Set-LogProperties $Properties } } } } function Disable-PSTrace { param( [switch] $AnalyticOnly ) $Properties = Get-LogProperties ($script:psprovidername + $script:analyticlog) if ($Properties.Enabled) { $Properties.Enabled = $false Set-LogProperties $Properties } if (!$AnalyticOnly) { $Properties = Get-LogProperties ($script:psprovidername + $script:debuglog) if ($Properties.Enabled) { $Properties.Enabled = $false Set-LogProperties $Properties } } } Add-Type @" using System; namespace Microsoft.PowerShell.Diagnostics { public class LogDetails { public string Name { get { return name; } } private string name; public bool Enabled { get { return enabled; } set { enabled = value; } } private bool enabled; public string Type { get { return type; } } private string type; public bool Retention { get { return retention; } set { retention = value; } } private bool retention; public bool AutoBackup { get { return autoBackup; } set { autoBackup = value; } } private bool autoBackup; public int MaxLogSize { get { return maxLogSize; } set { maxLogSize = value; } } private int maxLogSize; public LogDetails(string name, bool enabled, string type, bool retention, bool autoBackup, int maxLogSize) { this.name = name; this.enabled = enabled; this.type = type; this.retention = retention; this.autoBackup = autoBackup; this.maxLogSize = maxLogSize; } } } "@ if (Get-Command logman.exe -Type Application -ErrorAction SilentlyContinue) { Export-ModuleMember Disable-PSTrace, Disable-PSWSManCombinedTrace, Disable-WSManTrace, Enable-PSTrace, Enable-PSWSManCombinedTrace, Enable-WSManTrace, Get-LogProperties, Set-LogProperties, Start-Trace, Stop-Trace } else { # Currently we only support these cmdlets as logman.exe is not available on systems like Nano and IoT Export-ModuleMember Disable-PSTrace, Enable-PSTrace, Get-LogProperties, Set-LogProperties } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBzuFp8c8UN6ilP # /hSmUPDtAUbo8uWTs6wUbaR/ZpM1B6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEgd # 441WP1jGfFhxRg3sMtiUC5JDLIMXuzkPYRsZdTzgMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAgYT4iAc/tWDSKcBNA8n8QfsAA/QmX2YItLro # dSPFGnGO07gKqB6M+8qnNBLslUFObd0DuL17G7ZccmQAUpYCg6nJzPQq5csrzNu4 # OpkZ/n9+CHV2K6EoMMowogdDE4oMfl6LdXiUP7ajDUybVUTL47KdN0RVPutNEmJr # c3z0hkky4R5BIG/9xZP78U6QE7j3d0ZKRiTP1oyvU0Xbv+x4oDEOgq5VK6yeGBU0 # aezqqqv+audiD8Q6kPzZ3pvLAlO/ihUZV3c+bvnfjEM4rBVAgbEHYnsQdOKNqPyf # i9zg1zHqSOekPwJfGz4oFE/fCbwZwEHCt7lFaYdD7kcN0YQDcqGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAFzypqVtJfDuu2f0ssvHeMPAQEEkBUiqgV # Pz26adYj0gIGZldeK47xGBMyMDI0MDYxNzIyMTQzMS43MzlaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM # wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI # syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra # GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn # iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF # LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl # BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7 # rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg # 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db # USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f # dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV # PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph # jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g # 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT # MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz # /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d # h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW # zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1 # qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h # sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q # wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06 # 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0 # bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf # SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOoa500wIhgPMjAyNDA2MTgwMDQ4MTNaGA8yMDI0MDYx # OTAwNDgxM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6hrnTQIBADAHAgEAAgII # 3TAHAgEAAgIT8TAKAgUA6hw4zQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AEuEswOYwjGdGE7G7Ap9rq0FFtt6l2vrgfI9N0vfe8sUxXyos1YIPKQ+NxFhPLK/ # WFhWnCm/QmCHxYW0f7GWioATBin3IY1VDfW1PXvMiM0A5jKNLmkP1g/rcyYvE966 # wyZp2tOIVhEhcNtO0xR8Sq/XLEVu1ldvO8y6KMbwKGPEMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA # AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgsK7/mvDy9I315cJUe9v8Kp+KN/bXYl6plXbRS/7b # R7gwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0 # Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEILVWkPU9t0xSylXE/SVBh9og # XjAmoqNWY3bXRBM1bO+QMA0GCSqGSIb3DQEBCwUABIICAFusxzaSy3unjc6HSwiz # n9RC87jUCXzek7wpA54mYaMJ9FC/iSnZ3VPAh/vGuyP5F58kGOzZ003HT1quZsJ6 # mV5ubEQhei1LH0LqlXmywIXBn0lnbhCaLWSP/1SVDBzc3eY6cDXCDZZKYsWqfzLA # C+Ul8F/7yXx8lMIZN+5axvlYw/K+vPcU2uTiv7w5rClxxpJkSf+axNT9ZT2/XtfZ # JL4vGeNr9zBHFfLND9DfzXIEd5OTZUk6PP/z7Ba/K2c7zU1eoxPE9HAHYV+eZNon # uhw5DN8+WdVcpUeXq/57F//txIdBe3DI6sgCLZLRh7PiYcSnCKWauXewPmAQFjbp # DtoGd0999Qf9tGUowTINvzgMAgF4Wo26l3CiHBgVkVsXfBGpCTvLfXmNiV3BjE1Q # fOo8BjVwX9nsUbc44Oxp7mE/P16kmvc23R6iH4cHWqRaxmZtHLEuJEdp8bmhpeei # f97S+NlAiIT/VJw7jNPrmPQ8s0VQYfmoC0CsBoJ7hjfAr7OJ8KKw2n5YQFRMod/X # fTpX2n8Fnh1oWzaCUqPKg5wc7+uVAGhqNR/YbNXZ7jLR/6ivJfKQiZlM2F9XAAuL # jU61NZbCMi8f7d4x69Vus+Sx1DlvzyH2qGUkZzRSHgic6vF91sonrhDzkDZuWpQO # 1udPCVnNMnqmHFJFvLl90vki # SIG # End signature block
combined_dataset/train/non-malicious/Get-WmiNamespace.ps1
Get-WmiNamespace.ps1
# In order to enumerate all the WMI namespaces, you must first connect to the "root" namespace, # query for all the "__NAMESPACE" instances, and for each instance recursively repeat this process. # You can use the computerName parameter of Get-WmiNamespace to list the WMI namespaces on the remote computer. function Get-WmiNamespace { param ( [string]$rootns = "root", [string]$computerName = ".", $credential ) if ($credential -is [String] ) { $credential = Get-Credential $credential } if ($credential -eq $null) { gwmi -class __namespace -namespace $rootns -computerName $computerName | where {$_.name} | foreach { $ns = "{0}\\{1}" -f $rootns,$_.name $ns Get-WmiNamespace -rootns $ns -computer $computerName } } else { gwmi -class __namespace -namespace $rootns -computerName $computerName -credential $credential | where {$_.name} | foreach { $ns = "{0}\\{1}" -f $rootns,$_.name $ns Get-WmiNamespace -rootns $ns -computer $computerName -credential $credential } } }
combined_dataset/train/non-malicious/Delete Files per folder.ps1
Delete Files per folder.ps1
<# .SYNOPSIS Deletes files in directory based on age measured in days .DESCRIPTION Delete files in folder with use of regular filter, either recursive or not. .PARAMETER DelFilter Provide a filter like "*.txt" or "mylogs*" .PARAMETER DelPath The directory where files are to be deleted from, use the Recurse switch to delete from subfolder as well .EXAMPLE Remove-Files -delpath "C:\\temp" -delfilter "Whatever-*" -fileage "30" -LogPath "C:\\temp" .NOTES Instead of simply using a gci -Path -Filter -Recurse | Remove-Item I wanted a clean output per folder Enable debug mode, to write delete actions to the log file without actually deleting the files #> Param( $DelPath = $(throw "Provide path to delete files from"), $DelFilter = $(throw "Provide a filter like *.txt or mylogs*"), [int] $FileAge = $(throw "number of days to keep, set it to 0 for all files"), $LogPath = $($Env:windir), [switch] $Recurse, [switch] $Debug ) #named parameters "Path: {0}" -f $DelPath "DelFilter: {0}" -f $DelFilter "Age: {0}" -f $FileAge "LogPath: {0}" -f $LogPath #begin log action $LogFile = $LogPath + "\\DelFiles" + ".log" $global:FileCount = 0 # function as one place to set output action Function WriteLog ($Output){ Write-output $Output | Out-File -Append -FilePath $LogFile } # delete files in every parsed folder Function DeleteFiles ($DelFolder){ foreach ($Item in Get-ChildItem -Force -Path $DelFolder -Filter $DelFilter){ if ($Item.CreationTime -lt ($(Get-Date).AddDays(-$FileAge))){ #if -debug parameter is used only log action, no delete action if (-not $Debug) { Remove-Item $Item.FullName} #delete log action WriteLog "`t $Item" $global:FileCount = $global:FileCount +1 } } } # actual script execution WriteLog "Deleting file(s) older than $FileAge day(s) at $DelPath" $Date = Get-Date WriteLog "Begin of operation at: $Date" # file delete action WriteLog $Delpath DeleteFiles $Delpath if ($Recurse){ foreach ($Folder in (gci -Path $DelPath -recurse:$Recurse | ?{$_.PSIsContainer})){ # create array first to report if only one or no item $NrFiles = @(Get-ChildItem -Force -Path $Folder.Fullname -Filter $DelFilter).count if ( $NrFiles -gt 0){ WriteLog $Folder.Fullname DeleteFiles $Folder.Fullname } } } # end log action WriteLog "$global:FileCount file(s) deleted successfully" $Date = Get-Date WriteLog "End of operation at: $Date"
combined_dataset/train/non-malicious/667.ps1
667.ps1
$reportServerUri = if ($env:PesterServerUrl -eq $null) { 'http://localhost/reportserver' } else { $env:PesterServerUrl } Function Set-FolderReportDataSource { param ( [string] $NewFolderPath ) $tempProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri $localResourcesPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\emptyReport.rdl' $null = Write-RsCatalogItem -Path $localResourcesPath -RsFolder $NewFolderPath -Proxy $tempProxy $report = (Get-RsFolderContent -RsFolder $NewFolderPath -Proxy $tempProxy)| Where-Object TypeName -eq 'Report' $localResourcesPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\UnDataset.rsd' $null = Write-RsCatalogItem -Path $localResourcesPath -RsFolder $NewFolderPath -Proxy $tempProxy $dataSet = (Get-RsFolderContent -RsFolder $NewFolderPath -Proxy $tempProxy) | Where-Object TypeName -eq 'DataSet' $DataSetPath = $NewFolderPath + '/UnDataSet' $newRSDSName = "DataSource" $newRSDSExtension = "SQL" $newRSDSConnectionString = "Initial Catalog=DB; Data Source=Instance" $newRSDSCredentialRetrieval = "Store" $Pass = ConvertTo-SecureString -String "123" -AsPlainText -Force $newRSDSCredential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList "sql", $Pass $null = New-RsDataSource -RsFolder $NewFolderPath -Name $newRSDSName -Extension $newRSDSExtension -ConnectionString $newRSDSConnectionString -CredentialRetrieval $newRSDSCredentialRetrieval -DatasourceCredentials $newRSDSCredential -Proxy $tempProxy $DataSourcePath = "$NewFolderPath/$newRSDSName" $RsDataSet = Get-RsItemReference -Path $report.Path -Proxy $tempProxy | Where-Object ReferenceType -eq 'DataSet' $RsDataSource = Get-RsItemReference -Path $report.Path -Proxy $tempProxy | Where-Object ReferenceType -eq 'DataSource' $RsDataSetSource = Get-RsItemReference -Path $DataSetPath -Proxy $tempProxy | Where-Object ReferenceType -eq 'DataSource' $null = Set-RsDataSourceReference -Path $DataSetPath -DataSourceName $RsDataSetSource.Name -DataSourcePath $DataSourcePath -Proxy $tempProxy $null = Set-RsDataSourceReference -Path $report.Path -DataSourceName $RsDataSource.Name -DataSourcePath $DataSourcePath -Proxy $tempProxy $null = Set-RsDataSetReference -Path $report.Path -DataSetName $RsDataSet.Name -DataSetPath $dataSet.Path -Proxy $tempProxy return $report } Describe "Update-RsSubscription" { $folderPath = '' $newReport = $null BeforeEach { $folderName = 'SutGetRsItemReference_MinParameters' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName -ReportServerUri $reportServerUri $folderPath = '/' + $folderName $newReport = Set-FolderReportDataSource($folderPath) New-RsSubscription -ReportServerUri $reportServerUri -RsItem $newReport.Path -DeliveryMethod FileShare -Schedule (New-RsScheduleXml) -FileSharePath '\\unc\path' -Filename 'Report' -FileWriteMode Overwrite -RenderFormat PDF } AfterEach { Remove-RsCatalogItem -RsFolder $folderPath -ReportServerUri $reportServerUri -Confirm:$false } Context "Set-RsSubscription with Proxy parameter" { BeforeEach { Grant-RsSystemRole -Identity 'LOCAL' -RoleName 'System User' -ReportServerUri $reportServerUri Grant-RsCatalogItemRole -Identity 'LOCAL' -RoleName 'Browser' -Path $newReport.path -ReportServerUri $reportServerUri } AfterEach { Revoke-RsSystemAccess -Identity 'local' -ReportServerUri $reportServerUri } It "Updates subscription owner" { $rsProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Get-RsSubscription -Path $newReport.Path -Proxy $rsProxy | Set-RsSubscription -Owner "LOCAL" -Proxy $rsProxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -Proxy $rsProxy @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false $reportSubscriptions.Owner | Should be "\LOCAL" } It "Updates StartDateTime parameter" { $rsProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Get-RsSubscription -Path $newReport.Path -Proxy $rsProxy | Set-RsSubscription -StartDateTime "1/1/1999 6AM" -Proxy $rsProxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -Proxy $rsProxy @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false [xml]$XMLMatch = $reportSubscriptions.MatchData $XMLMatch.ScheduleDefinition.StartDateTime.InnerText | Should be (Get-Date -Year 1999 -Month 1 -Day 1 -Hour 6 -Minute 0 -Second 0 -Millisecond 0 -Format 'yyyy-MM-ddTHH:mm:ss.fffzzz') } It "Updates EndDate parameter" { $rsProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Get-RsSubscription -Path $newReport.Path -Proxy $rsProxy | Set-RsSubscription -EndDate 1/1/2999 -Proxy $rsProxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -Proxy $rsProxy @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false [xml]$XMLMatch = $reportSubscriptions.MatchData $XMLMatch.ScheduleDefinition.EndDate.InnerText | Should be "2999-01-01" } It "Updates StartDateTime and EndDate parameter" { $rsProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Get-RsSubscription -Path $newReport.Path -Proxy $rsProxy | Set-RsSubscription -StartDateTime "1/1/2000 2PM" -EndDate 2/1/2999 -Proxy $rsProxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -Proxy $rsProxy @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false [xml]$XMLMatch = $reportSubscriptions.MatchData $XMLMatch.ScheduleDefinition.StartDateTime.InnerText | Should be (Get-Date -Year 2000 -Month 1 -Day 1 -Hour 14 -Minute 0 -Second 0 -Millisecond 0 -Format 'yyyy-MM-ddTHH:mm:ss.fffzzz') $XMLMatch.ScheduleDefinition.EndDate.InnerText | Should Be "2999-02-01" } } Context "Set-RsSubscription with ReportServerUri parameter" { BeforeEach { Grant-RsSystemRole -Identity 'LOCAL' -RoleName 'System User' -ReportServerUri $reportServerUri Grant-RsCatalogItemRole -Identity 'LOCAL' -RoleName 'Browser' -Path $newReport.path -ReportServerUri $reportServerUri } AfterEach { Revoke-RsSystemAccess -Identity 'local' -ReportServerUri $reportServerUri } It "Updates subscription owner" { Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri | Set-RsSubscription -Owner "LOCAL" -ReportServerUri $reportServerUri $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false $reportSubscriptions.Owner | Should be "\LOCAL" } It "Updates StartDateTime parameter" { $rsProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri | Set-RsSubscription -StartDateTime "1/1/1999 6AM" -ReportServerUri $reportServerUri $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false [xml]$XMLMatch = $reportSubscriptions.MatchData $XMLMatch.ScheduleDefinition.StartDateTime.InnerText | Should be (Get-Date -Year 1999 -Month 1 -Day 1 -Hour 6 -Minute 0 -Second 0 -Millisecond 0 -Format 'yyyy-MM-ddTHH:mm:ss.fffzzz') } It "Updates EndDate parameter" { $rsProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri | Set-RsSubscription -EndDate 1/1/2999 -ReportServerUri $reportServerUri $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false [xml]$XMLMatch = $reportSubscriptions.MatchData $XMLMatch.ScheduleDefinition.EndDate.InnerText | Should be "2999-01-01" } It "Updates StartDateTime and EndDate parameter" { $rsProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri | Set-RsSubscription -StartDateTime "1/1/2000 2PM" -EndDate 2/1/2999 -ReportServerUri $reportServerUri $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false [xml]$XMLMatch = $reportSubscriptions.MatchData $XMLMatch.ScheduleDefinition.StartDateTime.InnerText | Should be (Get-Date -Year 2000 -Month 1 -Day 1 -Hour 14 -Minute 0 -Second 0 -Millisecond 0 -Format 'yyyy-MM-ddTHH:mm:ss.fffzzz') $XMLMatch.ScheduleDefinition.EndDate.InnerText | Should Be "2999-02-01" } } }
combined_dataset/train/non-malicious/Out-Posh.ps1
Out-Posh.ps1
# Personally, I use this as a script (just save in your path as Out-Posh.ps1, and delete all but the middle line (that starts with "end") function out-posh { end { New-BootsWindow { $input } -inline } }
combined_dataset/train/non-malicious/sample_40_8.ps1
sample_40_8.ps1
# # Module manifest for module 'OCI.PSModules.Usageapi' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Usageapi.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'fdfc4635-1080-4383-bc06-feef14dcb718' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Usageapi Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Usageapi.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIUsageapiCustomTable', 'Get-OCIUsageapiCustomTablesList', 'Get-OCIUsageapiEmailRecipientsGroup', 'Get-OCIUsageapiEmailRecipientsGroupsList', 'Get-OCIUsageapiQueriesList', 'Get-OCIUsageapiQuery', 'Get-OCIUsageapiSchedule', 'Get-OCIUsageapiScheduledRun', 'Get-OCIUsageapiScheduledRunsList', 'Get-OCIUsageapiSchedulesList', 'Get-OCIUsageapiUsageCarbonEmissionsQueriesList', 'Get-OCIUsageapiUsageCarbonEmissionsQuery', 'Invoke-OCIUsageapiRequestAverageCarbonEmission', 'Invoke-OCIUsageapiRequestCleanEnergyUsage', 'Invoke-OCIUsageapiRequestSummarizedConfigurations', 'Invoke-OCIUsageapiRequestSummarizedUsages', 'Invoke-OCIUsageapiRequestUsageCarbonEmissionConfig', 'Invoke-OCIUsageapiRequestUsageCarbonEmissions', 'New-OCIUsageapiCustomTable', 'New-OCIUsageapiEmailRecipientsGroup', 'New-OCIUsageapiQuery', 'New-OCIUsageapiSchedule', 'New-OCIUsageapiUsageCarbonEmissionsQuery', 'Remove-OCIUsageapiCustomTable', 'Remove-OCIUsageapiEmailRecipientsGroup', 'Remove-OCIUsageapiQuery', 'Remove-OCIUsageapiSchedule', 'Remove-OCIUsageapiUsageCarbonEmissionsQuery', 'Update-OCIUsageapiCustomTable', 'Update-OCIUsageapiEmailRecipientsGroup', 'Update-OCIUsageapiQuery', 'Update-OCIUsageapiSchedule', 'Update-OCIUsageapiUsageCarbonEmissionsQuery' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Usageapi' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_67_31.ps1
sample_67_31.ps1
@{ GUID = 'A51E6D9E-BC14-41A7-98A8-888195641250' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @('MSFT_MpPerformanceRecording.psm1') FormatsToProcess = @('MSFT_MpPerformanceReport.Format.ps1xml') CompatiblePSEditions = @('Desktop', 'Core') FunctionsToExport = @( 'New-MpPerformanceRecording', 'Get-MpPerformanceReport' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '5.1' } # SIG # Begin signature block # MIImAQYJKoZIhvcNAQcCoIIl8jCCJe4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC5QoGq9EV41ZN5 # fnwNlxKx8aIBP8W7y/AxkQ4SrJmPcKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa # BDCCGgACAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEICjaAYW6dpF96OECCa1j0HmEWEEdofGluuKSKwAnvISeMEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEALzIUfydds/lAn8wg+foVEOxU # P04PWhoHTYiyOeWsFk1kXQCK1+MBcg+UbtfgO2LPZB6vWWmD0/q9ShL4G8vA3xfI # uN8Wt9DWThKG1b9xBm3x1nPo5Ey3Bd5XGhmZf37/Bj7HOoCSKb+2osiQS6WTUb8+ # j/ifuMLxJcyqF2hOPiogTcslwIDBgc/4oD49TXkCnbefTIX12ceUuhV4mZ0V+X97 # uS2vhmkTW3jOuv88DmujL24NrbM+FBTq44smIE4d6iqPmeI/sVgrvKZEGEhiSotk # MJLDzNr0IQBqjOHsjHx26H9kKHEwmoA97gluyYer2M4H/TKM77+mCcyJnCn0b6GC # F5MwghePBgorBgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCABZ4Dgpg/f9krqiUcXw8tT # y7jhnvCveoTuPnxZ2P5U2AIGZpVdxFbvGBMyMDI0MDcxNzIxMzUzNi41NjJaMASA # AgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL # Ex5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHpMIIHIDCCBQigAwIBAgITMwAAAecu # jy+TC08b6QABAAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNy # b3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBF # U046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ # 659XPM1DtaWMv9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1 # j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9y # IvzGw47TfXPE8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCW # igkKbcuAnhvh3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9P # PztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0 # Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0a # IAsbyqJOa6OIGSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0S # SCV/mpXC0BoPkk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqk # WvvYIPvVzC68UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK # 08WkJJuyzPqfitgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ss # YitZ9CurGV74BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYE # FM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw # KDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww # CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0 # ofDbk+llWi1cC6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmB # TFIhfBeGSxvk6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4o # hrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A # 6enWZR0jY+q5FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2l # HQL3YHEFikunbUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5CO # UzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvB # L5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahko # Hh8iD963LeGjZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZ # jppzp95AW1lehP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7 # meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAi # im3ZiALlM0K546k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMA # AAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 # IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMw # MDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0G # CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3u # nAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1 # jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT # fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+ # jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c # +gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+ # cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C6 # 26p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV # 2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoS # CtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxS # UV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJp # xq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkr # BgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A # XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI # KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9S # ZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIE # DB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNV # HSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVo # dHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29D # ZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAC # hj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1 # dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwEx # JFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts # 0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I # dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS # EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMu # LGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT9 # 9kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2z # AVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6Ile # T53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6l # MVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbh # IurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3u # gm2lBRDBcQZqELQdVTNYs6FwZvKhggNMMIICNAIBATCB+aGB0aSBzjCByzELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z # b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA # AgUA6kJ/EDAiGA8yMDI0MDcxNzE3MzQwOFoYDzIwMjQwNzE4MTczNDA4WjBzMDkG # CisGAQQBhFkKBAExKzApMAoCBQDqQn8QAgEAMAYCAQACAQ8wBwIBAAICEw0wCgIF # AOpD0JACAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC # AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAUr/iyKZLzOpw7GAQ # xlvrLomgEII71zh8801wjBJIIJ88aC1ybrSPD6HtO/New2Tu78k5Hly3Vxx0g+4a # Uax8R/HhfdfAShlb+uQMPcXrzqBDAzSA/aSFmt0d/bsh1EaMVzhyBnIfNoirf0Bs # cxAIHGA4Ap/tGt9fSHvV+/7SliMfOAck1qpUe42JrfSzFHETiniCIE/xUs0dqLkK # jMSQhVfw53BoFWpExg27x/y2qaV9g93xwRsQRH56CNsTQ1ekC4y/zCDAmJGGULIb # zO4ceatAQjJVu4pMu6cZSmfLttgYCs9HiFQUv3WyuVfqH4YJh7fC8La/xLaTKxjO # 5+FaFzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # AhMzAAAB5y6PL5MLTxvpAAEAAAHnMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG # 9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIJ843U5VJ5kGNWQC # ovKO2OKSJ4a+ncKr212sVP1P7ey0MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCB # vQQg5TZdDXZqhv0N4MVcz1QUd4RfvgW/QAG9AwbuoLnWc60wgZgwgYCkfjB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB5zAi # BCBcsTdOTgy/BInPwYBNuLxXJgUKE7MRRAdtWKjt2UYTmTANBgkqhkiG9w0BAQsF # AASCAgAa/6CnMArzqE23qdUiP7WpyvUgif2vo58nPJ1QY6TZvcBj7ZDxlMcse8Wq # bn7khcmdCkRNvWxsVCcA6sUwuhcrHecHjcwP5ZEQKSSVh7VNzdqVd2bIYtanEyBN # W2JBPUg/Xl5uaiBysSS9LHokssiK9YvcYfGKtQ7BQFi3WkTfYP1iDMsgI3s5MwCp # C5LVXEQyEqGX4A32MJoCpIfGPKrHwEjWNwaM5QI7ncU6gbftSoUHhj5eySD4CwwA # +YE5k86xskmOS0zuKjP1oJdJYOhhKkgZW3CxfH8s+HsbVceUjj6vhR6pZf7k85w6 # gH6Ppmrc9VoiaZe1EYsrsDBQi9Xtxa4y/6ls1cEfel0RkfiaO0/qHUN83bCgd0xx # JfXVmAamGG/Rjeh5hH+yxmVaTIl+Ed3yKKOeVTeyimRu/+ESEGH8Sc8eZyCiiXkK # XNrdy2q7itRmfKjV5oFDjoELZJpxE+SkRTq+/HCKTCY0mO2DLrjFVZbB50SZU+2+ # jJNqnpBWhlH4GJh2t1pmElTirVfhed+tJpSznRQAbIvvx1nGncej47MSAfY59u6Z # 1mKN1rQYwS+UG7mBVNETzyG50cL5k4vFtXh7QofW/FaV0+m4880/uorwyZSsdrsJ # LGHXYcN7YoFjRxuj7+QMkbYoa6PItNYmccUEj826w5ZQLR7AMQ== # SIG # End signature block
combined_dataset/train/non-malicious/Reset Time Sync Setting.ps1
Reset Time Sync Setting.ps1
######################################################## # Created by Brian English # Brian.English@charlottefl.com # eddiephoenix@gmail.com # # for Charlotte County Government # No warranty suggested or implied ######################################################## # Purpose: Cycle through all VMs on a Virtualcenter Server # and update the 'SyncTimeWithHost' to either true or false ######################################################## # Notes: VMware Tools must be installed on guest vm ######################################################## ################# $prodhost = "virtualcenter" $devhost = "virtualtest" ################# #$SavedEA=$Global:ErrorActionPreference #$Global:ErrorActionPreference="SilentlyContinue" ############# ########### # "1 Prod Hosts" "2 Dev Hosts" $hosts = read-host "What hosts to copy to" switch($hosts) { "1"{$hosts = $prodhost} "2"{$hosts = $devhost} } get-esx $hosts $swtch = read-host "Sync time to host yes/no" switch($swtch) { "yes"{$swtch = $true} "no"{$swtch = $false} } $vms = Get-VM foreach($vm in $vms) { $view = get-view $vm.ID $config = $view.config $tools = $config.tools $spec = new-object VMware.Vim.VirtualMachineConfigSpec $spec.tools = $tools $spec.tools.SyncTimeWithHost = $swtch @@ #this line executes the update to VMTools @@ $rslt = $view.ReconfigVM_task($spec) write-host ($vm.name + " " + $tools.SyncTimeWithHost) }
combined_dataset/train/non-malicious/Calculate HA Capaicty.ps1
Calculate HA Capaicty.ps1
### Written by Mark A. Weaver ## Date: 7/27/2008 ## Version: 1.0 ## Blog site: blog.vmweaver.com ## ## Call this function and pass in -ServerName <VC Server Name> -ClusterName <ClusterName> ## Output should be an object containing the information ## ## Feel free to modify as needed to suit your needs, but please keep this header ## ## Thanks -- Mark function Get-HACapacity( [string]$ServerName, [string]$ClusterName) { if (($ServerName -ne "") -and ($ClusterName -ne "")) { # These booleans tell me if I am using the VMware default memory and cpu reservations for the cluster. $DASMemDefault = $True $DASCPUDefault = $True # The following numbers are derived from VMware published numbers for memory overhead. # I have dropped them into arrays using the number of vCPUs as an index to get the correct constant. # This is why you will notice only [1], [2], and [4] have non-zero values # These constants are used later on when calculating Memory Reserve. $MemConst32 = 0, 3.262, 5.769059, 0, 6.77933 $MemConst64 = 0, 3.2678, 5.79251, 0, 6.82622 $MemBase32 = 0, 87.56, 108.73, 0, 146.75 $MemBase64 = 0, 107.54, 146.41, 0, 219.82 # Initialize some Variables $MaxMemRes = 0 $MacNumCPU = 0 $MaxCPUResVM = "" $VMCount = 0 # define default memory and cpu reservation $DASMinMHz = 256 $DASMinMemory = 256 $viServerName = $ServerName $viClusterName = $ClusterName # Connect to the VirtualCenter Server and get some info $viServer = Connect-VIServer $viServerName $viCluster = get-cluster $viClusterName $viHosts = get-vmhost -location $viCluster $viClusterV = get-view $viCluster.ID # Get the "Resources" Resource Pool from the cluster. # This gives us the Reservation Pools for Memory and CPU $viResGroup = Get-ResourcePool -Name "Resources" -Location $viCluster $viCPURes = $viResGroup.CpuReservationMHz $viMemRes = $viResGroup.MemReservationMB $viHostCount = $viClusterV.Summary.NumHosts # Get HA cluster configuration information $viHostFailures = $viClusterV.Configuration.DasConfig.FailoverLevel # Get a list of options that may be configured at the clusters level # We are looking for whether or not the default memory and cpu # reservations have been overridden $viDASOptions = $viClusterV.Configuration.DASConfig.Option $viVMs = get-vm -Location $viCluster # Is Adminisssion Control enabled on the cluster? $viClusterControl = $viClusterV.Configuration.DASConfig.AdmissionControlEnabled # See if das.vmMemoryMinMB key is defined and grab its value # See if das.vmCpuMinMHZ key is defined and grab its value if ($viDASoptions.Count -ne 0) { foreach ($viDASOption in $viDASOptions) { if ($viDASOption.Key -eq "das.vmMemoryMinMB") { $DASMemDefault = $False $DASMinMemory = $viDASOption.Value } if ($viDASOption.Key -eq "das.vmCpuMinMHz") { $DASCPUDefault = $False $DASMinMHz = $viDASOption.Value } } } # Let's go through every VM and see what the maximum CPU and Memory reservation is. # We will also get a count of powered on VMs. # When we hit a maximum reservation, save the machine name that set that maximum foreach ($viVM in $viVMs) { $NumCPU = $viVm.NumCPU $VMMem = $viVm.MemoryMB $MemRes = 0 if ($viVM.PowerState -eq "PoweredOn") { $VMCount += 1 } # Get the VM-view and determine if the current guest CPU or memory reservations configured $vmView = get-view $viVM.ID $vmViewCPURes = $vmView.ResourceConfig.CpuAllocation.Reservation $vmViewMemRes = $vmView.ResourceConfig.MemoryAllocation.Reservation # If no reservations are set at the VM level, calculate the memory reservation. if ($vmViewMemRes -eq 0) { if ($VMMem -le 256) { $MemRes = $MemConst64[$NumCpu] + $MemBase64[$NumCPU] } else { if ((($viVM.Guest.OSFullName | Select-String "64-bit").Matches.Count) -ge 1) { $MemRes = ($VMMem / 256) * $MemConst64[$NumCPU] + $MemBase64[$NumCPU] } else { $MemRes = ($VMMem / 256) * $MemConst32[$NumCPU] + $MemBase32[$NumCPU] } } $MemRes += $DASMinMemory } else { $MemRes = $vmViewMemRes } #Figure out if the current VM holds the highest reservation so far if ($vmViewCPURes -gt $DASMinMHz) { $DASMinMHz = $vmViewCPURes $MaxCPUResVM = $viVM.Name } if ($MemRes -gt $MaxMemRes) { $MaxMemRes = $MemRes $MaxMemResVM = $viVM.Name } if ($NumCPU -gt $MaxNumCPU) { $MaxNumCPU = $NumCPU $MaxCPUNumVM = $viVM.Name } } if ($MaxCPUResVM -eq "") { $MaxCPUResVM = $MaxCPUNumVM } $MaxCPURes = $MaxNumCPU * $DASMinMHz # Calculate the VM Capacity for the cluster based on memory and cpu reservations. $ClusterVMCapacityMEM = [Math]::Truncate(((($viMemRes / $MaxMemRes) * ( $viHostCount - $viHostFailures )) / $viHostCount)) $ClusterVMCapacityCPU = [Math]::Truncate(((($viCPURes / $MaxCPURes) * ( $viHostCount - $viHostFailures )) / $viHostCount)) if ($ClusterVMCapacityMEM -lt $ClusterVMCapacityCPU) { $ClusterVMCapacity = $ClusterVMCapacityMEM } else { $ClusterVMCapacity = $ClusterVMCapacityCPU } # Create an object to return $CPUObj = New-Object System.Object $CPUObj | Add-Member -type NoteProperty -name ClusterCPURes -value $viCPURes $CPUObj | Add-Member -type NoteProperty -name DefaultCPURes -value $DASCPUDefault $CPUObj | Add-Member -type NoteProperty -name MinCPURes -value $DASMinMHz $CPUObj | Add-Member -type NoteProperty -name MaxCPUNumVM -value $MaxCPUNumVM $CPUObj | Add-Member -type NoteProperty -name MaxCPURes -value $MaxCPURes $CPUObj | Add-Member -type NoteProperty -name MaxCPUResVM -value $MaxCPUResVM $CPUObj | Add-Member -type NoteProperty -name MaxCPUs -value $MaxNumCPU $CPUObj | Add-Member -type NoteProperty -name VMCapacityCPU -value $ClusterVMCapacityCPU $MemObj = New-Object System.Object $MemObj | Add-Member -type NoteProperty -name ClusterMemRes -value $viMemRes $MemObj | Add-Member -type NoteProperty -name DefaultMemRes -value $DASMemDefault $MemObj | Add-Member -type NoteProperty -name MinMemRes -value $DASMinMemory $MemObj | Add-Member -type NoteProperty -name MaxMemRes -value $MaxMemRes $MemObj | Add-Member -type NoteProperty -name MaxMemResVM -value $MaxMemResVM $MemObj | Add-Member -type NoteProperty -name VMCapacityMem -value $ClusterVMCapacityMEM $OutObj = New-Object System.Object $OutObj | Add-Member -type NoteProperty -name AdmissionControl -value $viClusterControl $OutObj | Add-Member -type NoteProperty -name CPU -value $CPUObj $OutObj | Add-Member -type NoteProperty -name FailoverHosts -value $viHostFailures $OutObj | Add-Member -type NoteProperty -name HostCount -value $viHostCount $OutObj | Add-Member -type NoteProperty -name Memory -value $MemObj $OutObj | Add-Member -type NoteProperty -name RunningVMs -value $VMCount $OutObj | Add-Member -type NoteProperty -name VIServer -value $viServerName $OutObj | Add-Member -type NoteProperty -name VICluster -value $viClusterName $OutObj | Add-Member -type NoteProperty -name VMCapacity -value $ClusterVMCapacity return($outObj) } else { # Write usage info Write-Host ("") Write-Host ("-------------------------------------") Write-Host ("Get-HACapacity.ps1 Usage:") Write-Host( "You must specify the following parameters: ") Write-Host (" '-ServerName <servername>' where <servername> is the name of the VirtualCenter Server") Write-Host(" '-ClusterName <clustername>' where <clustername> is the name of the cluster to query") Write-Host ("") } }
combined_dataset/train/non-malicious/ServicePWChgReset_1.ps1
ServicePWChgReset_1.ps1
# ============================================================================================== # # NAME: ServicePWChgReset.ps1 # # AUTHOR: Saehrig, Steven # DATE : 8/26/2008 @@# Requires - Quest ActiveRoles Snapin @@# COMMENT: Please read comments on each section! # 1st - Search Domain computers for matching name and import into array. # 2nd - Export matching hosts from array to text file. (comment out after text file created) # 3rd - Create CSV file of all Matching Critera with full service detail. ( so you have record of modified # services) # 4th - Create text file of all matching services with limited info # 5th - Change password on matching services # 6th - Restart services if running if not running skip restart. (with console feedback) # # I would like to Thank Halr9000 and glnsize from powershellcomunity.org for there guidance during this # script creation. I would not have been able to complete this without them and i would have been spending # alot of time manually updating every service. Granted if they actually wrote this it would be much nicer :). # But hey everyone has to start somewhere. # ============================================================================================== #discover Servers for Host.txt file function func_Forest() { [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Domains | ForEach-Object { Get-QADComputer -Service $_.Name -SizeLimit 0 -ErrorAction SilentlyContinue ` | Add-Member -Name 'DomainName' -MemberType NoteProperty -Value $_.Name -PassThru } } #initialize Array for Output $Array = @() #This should be run once to fill the host file then commented out. #Fill Array func_forest | where { $_.Name -like 'jxr*' } | Sort-Object -property "Name" |? { $array += $_.name} $file = $array | Out-File -FilePath c:\\txt\\host.txt -Append #Variables $StartName = "username" $csvlocation = "c:\\txt\\service.csv" $txtlocation = "c:\\txt\\service.txt" $computer = gc c:\\txt\\host.txt $password = "password" $service = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname} #exports discovered services for documentation of modified services $service | Export-Csv $csvlocation #Function Declarations function exporttxt { #This function exports the services to a text file in limited data fields. foreach ($i in $service) { ($i | FT systemname, Displayname, State, Startname, Status | Out-File -Append -FilePath $txtlocation ) } } function changepw { #This function will change the password to the variable assigned above. foreach ($i in $service) { (Write-Host -ForegroundColor "Yellow" "Changing password on" $i.SystemName "Service Name"$i.Name) ($i.Change($Null,$Null,$Null,$Null,$Null,$Null,$Null,$password)) (Write-Host -ForegroundColor "green" "Password Successfully Changed on" $i.SystemName "Service Name"$i.Name) } } function restartsvc { #This function will restart the service for the new password to take effect. $s = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname} foreach ($i in $s) { if ($i.State -eq "running") { Write-Host -ForegroundColor "Yellow" "Service name" $i.SystemName "Service name"$i.Name "is" $i.state $i.StopService() Sleep -Seconds 20 #allow time for service to stop. $b = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname} Write-Host -ForegroundColor "RED" "Service name" $b.SystemName "Service name" $b.Name "is" $b.state $i.StartService() $c = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname} Write-Host -ForegroundColor "Green" "Server name" $c.SystemName "Service name" $c.Name "is" $c.state } elseif ($i.State -eq "Stopped") { Write-Host -ForegroundColor "RED" "Service name" $i.SystemName "Service name" $i.Name $i.state "Service will not be Started" } } } #Execute exporttxt changepw | out-null restartsvc | out-null
combined_dataset/train/non-malicious/3274.ps1
3274.ps1
class SlackConnection : Connection { [System.Net.WebSockets.ClientWebSocket]$WebSocket [pscustomobject]$LoginData [string]$UserName [string]$Domain [string]$WebSocketUrl [bool]$Connected [object]$ReceiveJob = $null SlackConnection() { $this.WebSocket = New-Object System.Net.WebSockets.ClientWebSocket $this.WebSocket.Options.KeepAliveInterval = 5 } [void]Connect() { if ($null -eq $this.ReceiveJob -or $this.ReceiveJob.State -ne 'Running') { $this.LogDebug('Connecting to Slack Real Time API') $this.RtmConnect() $this.StartReceiveJob() } else { $this.LogDebug([LogSeverity]::Warning, 'Receive job is already running') } } [void]RtmConnect() { $token = $this.Config.Credential.GetNetworkCredential().Password $url = "https://slack.com/api/rtm.start?token=$($token)&pretty=1" try { $r = Invoke-RestMethod -Uri $url -Method Get -Verbose:$false $this.LoginData = $r if ($r.ok) { $this.LogInfo('Successfully authenticated to Slack Real Time API') $this.WebSocketUrl = $r.url $this.Domain = $r.team.domain $this.UserName = $r.self.name } else { throw $r } } catch { $this.LogInfo([LogSeverity]::Error, 'Error connecting to Slack Real Time API', [ExceptionFormatter]::Summarize($_)) } } [void]StartReceiveJob() { $recv = { [cmdletbinding()] param( [parameter(mandatory)] $url ) Write-Verbose "[SlackBackend:ReceiveJob] Connecting to websocket at [$($url)]" [System.Net.WebSockets.ClientWebSocket]$webSocket = New-Object System.Net.WebSockets.ClientWebSocket $cts = New-Object System.Threading.CancellationTokenSource $task = $webSocket.ConnectAsync($url, $cts.Token) do { Start-Sleep -Milliseconds 100 } until ($task.IsCompleted) $buffer = [System.Net.WebSockets.WebSocket]::CreateClientBuffer(1024,1024) $ct = New-Object System.Threading.CancellationToken $taskResult = $null while ($webSocket.State -eq [System.Net.WebSockets.WebSocketState]::Open) { $jsonResult = "" do { $taskResult = $webSocket.ReceiveAsync($buffer, $ct) while (-not $taskResult.IsCompleted) { Start-Sleep -Milliseconds 100 } $jsonResult += [System.Text.Encoding]::UTF8.GetString($buffer, 0, $taskResult.Result.Count) } until ( $taskResult.Result.EndOfMessage ) if (-not [string]::IsNullOrEmpty($jsonResult)) { $jsonResult } } $socketStatus = [pscustomobject]@{ State = $webSocket.State CloseStatus = $webSocket.CloseStatus CloseStatusDescription = $webSocket.CloseStatusDescription } $socketStatusStr = ($socketStatus | Format-List | Out-String).Trim() Write-Warning -Message "Websocket state is [$($webSocket.State.ToString())].`n$socketStatusStr" } try { $this.ReceiveJob = Start-Job -Name ReceiveRtmMessages -ScriptBlock $recv -ArgumentList $this.WebSocketUrl -ErrorAction Stop -Verbose $this.Connected = $true $this.Status = [ConnectionStatus]::Connected $this.LogInfo("Started websocket receive job [$($this.ReceiveJob.Id)]") } catch { $this.LogInfo([LogSeverity]::Error, "$($_.Exception.Message)", [ExceptionFormatter]::Summarize($_)) } } [string[]]ReadReceiveJob() { $infoStream = $this.ReceiveJob.ChildJobs[0].Information.ReadAll() $warningStream = $this.ReceiveJob.ChildJobs[0].Warning.ReadAll() $errStream = $this.ReceiveJob.ChildJobs[0].Error.ReadAll() $verboseStream = $this.ReceiveJob.ChildJobs[0].Verbose.ReadAll() $debugStream = $this.ReceiveJob.ChildJobs[0].Debug.ReadAll() foreach ($item in $infoStream) { $this.LogInfo($item.ToString()) } foreach ($item in $warningStream) { $this.LogInfo([LogSeverity]::Warning, $item.ToString()) } foreach ($item in $errStream) { $this.LogInfo([LogSeverity]::Error, $item.ToString()) } foreach ($item in $verboseStream) { $this.LogVerbose($item.ToString()) } foreach ($item in $debugStream) { $this.LogVerbose($item.ToString()) } if ($this.ReceiveJob.State -ne 'Running') { $this.LogInfo([LogSeverity]::Warning, "Receive job state is [$($this.ReceiveJob.State)]. Attempting to reconnect...") Start-Sleep -Seconds 5 $this.Connect() } if ($this.ReceiveJob.HasMoreData) { [string[]]$jobResult = $this.ReceiveJob.ChildJobs[0].Output.ReadAll() return $jobResult } else { return $null } } [void]Disconnect() { $this.LogInfo('Closing websocket') if ($this.ReceiveJob) { $this.LogInfo("Stopping receive job [$($this.ReceiveJob.Id)]") $this.ReceiveJob | Stop-Job -Confirm:$false -PassThru | Remove-Job -Force -ErrorAction SilentlyContinue } $this.Connected = $false $this.Status = [ConnectionStatus]::Disconnected } }
combined_dataset/train/non-malicious/305.ps1
305.ps1
function Get-PSFDynamicContentObject { [OutputType([PSFramework.Utility.DynamicContentObject])] [CmdletBinding(HelpUri = 'https://psframework.org/documentation/commands/PSFramework/Get-PSFDynamicContentObject')] Param ( [Parameter(Mandatory = $true)] [string[]] $Name ) begin { } process { foreach ($item in $Name) { [PSFramework.Utility.DynamicContentObject]::Get($Name) } } end { } }
combined_dataset/train/non-malicious/2.ps1
2.ps1
$global:GitPromptSettings = [PoshGitPromptSettings]::new() $global:GitPromptValues = [PoshGitPromptValues]::new() $s = $global:GitPromptSettings if ($Host.UI.RawUI.BackgroundColor -eq [ConsoleColor]::DarkMagenta) { $s.LocalDefaultStatusSymbol.ForegroundColor = 'Green' $s.LocalWorkingStatusSymbol.ForegroundColor = 'Red' $s.BeforeIndex.ForegroundColor = 'Green' $s.IndexColor.ForegroundColor = 'Green' $s.WorkingColor.ForegroundColor = 'Red' } function New-GitPromptSettings { [PoshGitPromptSettings]::new() } function Write-Prompt { [CmdletBinding(DefaultParameterSetName="Default")] param( [Parameter(Mandatory, Position=0)] $Object, [Parameter(ParameterSetName="Default")] $ForegroundColor = $null, [Parameter(ParameterSetName="Default")] $BackgroundColor = $null, [Parameter(ParameterSetName="CellColor")] [ValidateNotNull()] [PoshGitCellColor] $Color, [Parameter(ValueFromPipeline = $true)] [System.Text.StringBuilder] $StringBuilder ) if (!$Object -or (($Object -is [PoshGitTextSpan]) -and !$Object.Text)) { return $(if ($StringBuilder) { $StringBuilder } else { "" }) } if ($PSCmdlet.ParameterSetName -eq "CellColor") { $bgColor = $Color.BackgroundColor $fgColor = $Color.ForegroundColor } else { $bgColor = $BackgroundColor $fgColor = $ForegroundColor } $s = $global:GitPromptSettings if ($s) { if ($null -eq $fgColor) { $fgColor = $s.DefaultColor.ForegroundColor } if ($null -eq $bgColor) { $bgColor = $s.DefaultColor.BackgroundColor } if ($s.AnsiConsole) { if ($Object -is [PoshGitTextSpan]) { $str = $Object.ToAnsiString() } else { $reset = [System.Collections.Generic.List[string]]::new() $e = [char]27 + "[" $fg = $fgColor if (($null -ne $fg) -and !(Test-VirtualTerminalSequece $fg)) { $fg = Get-ForegroundVirtualTerminalSequence $fg $reset.Add('39') } $bg = $bgColor if (($null -ne $bg) -and !(Test-VirtualTerminalSequece $bg)) { $bg = Get-BackgroundVirtualTerminalSequence $bg $reset.Add('49') } $str = "${Object}" if (Test-VirtualTerminalSequece $str -Force) { $reset.Clear() $reset.Add('0') } $str = "${fg}${bg}" + $str if ($reset.Count -gt 0) { $str += "${e}$($reset -join ';')m" } } return $(if ($StringBuilder) { $StringBuilder.Append($str) } else { $str }) } } if ($Object -is [PoshGitTextSpan]) { $bgColor = $Object.BackgroundColor $fgColor = $Object.ForegroundColor $Object = $Object.Text } $writeHostParams = @{ Object = $Object; NoNewLine = $true; } if ($bgColor -and ($bgColor -ge 0) -and ($bgColor -le 15)) { $writeHostParams.BackgroundColor = $bgColor } if ($fgColor -and ($fgColor -ge 0) -and ($fgColor -le 15)) { $writeHostParams.ForegroundColor = $fgColor } Write-Host @writeHostParams return $(if ($StringBuilder) { $StringBuilder } else { "" }) } function Write-GitStatus { param( [Parameter(Position = 0)] $Status ) $s = $global:GitPromptSettings if (!$Status -or !$s) { return } $sb = [System.Text.StringBuilder]::new(150) if (!$s.DefaultPromptWriteStatusFirst) { $sb | Write-Prompt $s.PathStatusSeparator.Expand() > $null } $sb | Write-Prompt $s.BeforeStatus > $null $sb | Write-GitBranchName $Status -NoLeadingSpace > $null $sb | Write-GitBranchStatus $Status > $null if ($s.EnableFileStatus -and $Status.HasIndex) { $sb | Write-Prompt $s.BeforeIndex > $null $sb | Write-GitIndexStatus $Status > $null if ($Status.HasWorking) { $sb | Write-Prompt $s.DelimStatus > $null } } if ($s.EnableFileStatus -and $Status.HasWorking) { $sb | Write-GitWorkingDirStatus $Status > $null } $sb | Write-GitWorkingDirStatusSummary $Status > $null if ($s.EnableStashStatus -and ($Status.StashCount -gt 0)) { $sb | Write-GitStashCount $Status > $null } $sb | Write-Prompt $s.AfterStatus > $null if ($s.DefaultPromptWriteStatusFirst) { $sb | Write-Prompt $s.PathStatusSeparator.Expand() > $null } if ($sb.Length -gt 0) { $sb.ToString() } } function Format-GitBranchName { param( [Parameter(Position=0)] [string] $BranchName ) $s = $global:GitPromptSettings if (!$s -or !$BranchName) { return "$BranchName" } $res = $BranchName if (($s.BranchNameLimit -gt 0) -and ($BranchName.Length -gt $s.BranchNameLimit)) { $res = "{0}{1}" -f $BranchName.Substring(0, $s.BranchNameLimit), $s.TruncatedBranchSuffix } $res } function Get-GitBranchStatusColor { param( [Parameter(Position = 0)] $Status ) $s = $global:GitPromptSettings if (!$s) { return [PoshGitTextSpan]::new() } $branchStatusTextSpan = [PoshGitTextSpan]::new($s.BranchColor) if (($Status.BehindBy -ge 1) -and ($Status.AheadBy -ge 1)) { $branchStatusTextSpan = [PoshGitTextSpan]::new($s.BranchBehindAndAheadStatusSymbol) } elseif ($Status.BehindBy -ge 1) { $branchStatusTextSpan = [PoshGitTextSpan]::new($s.BranchBehindStatusSymbol) } elseif ($Status.AheadBy -ge 1) { $branchStatusTextSpan = [PoshGitTextSpan]::new($s.BranchAheadStatusSymbol) } $branchStatusTextSpan.Text = '' $branchStatusTextSpan } function Write-GitBranchName { param( [Parameter(Position = 0)] $Status, [Parameter(ValueFromPipeline = $true)] [System.Text.StringBuilder] $StringBuilder, [Parameter()] [switch] $NoLeadingSpace ) $s = $global:GitPromptSettings if (!$Status -or !$s) { return $(if ($StringBuilder) { $StringBuilder } else { "" }) } $str = "" $branchNameTextSpan = Get-GitBranchStatusColor $Status $branchNameTextSpan.Text = Format-GitBranchName $Status.Branch if (!$NoLeadingSpace) { $branchNameTextSpan.Text = " " + $branchNameTextSpan.Text } if ($StringBuilder) { $StringBuilder | Write-Prompt $branchNameTextSpan > $null } else { $str = Write-Prompt $branchNameTextSpan } return $(if ($StringBuilder) { $StringBuilder } else { $str }) } function Write-GitBranchStatus { param( [Parameter(Position = 0)] $Status, [Parameter(ValueFromPipeline = $true)] [System.Text.StringBuilder] $StringBuilder, [Parameter()] [switch] $NoLeadingSpace ) $s = $global:GitPromptSettings if (!$Status -or !$s) { return $(if ($StringBuilder) { $StringBuilder } else { "" }) } $branchStatusTextSpan = Get-GitBranchStatusColor $Status if (!$Status.Upstream) { $branchStatusTextSpan.Text = $s.BranchUntrackedText } elseif ($Status.UpstreamGone -eq $true) { $branchStatusTextSpan.Text = $s.BranchGoneStatusSymbol.Text } elseif (($Status.BehindBy -eq 0) -and ($Status.AheadBy -eq 0)) { $branchStatusTextSpan.Text = $s.BranchIdenticalStatusSymbol.Text } elseif (($Status.BehindBy -ge 1) -and ($Status.AheadBy -ge 1)) { if ($s.BranchBehindAndAheadDisplay -eq "Full") { $branchStatusTextSpan.Text = ("{0}{1} {2}{3}" -f $s.BranchBehindStatusSymbol.Text, $Status.BehindBy, $s.BranchAheadStatusSymbol.Text, $status.AheadBy) } elseif ($s.BranchBehindAndAheadDisplay -eq "Compact") { $branchStatusTextSpan.Text = ("{0}{1}{2}" -f $Status.BehindBy, $s.BranchBehindAndAheadStatusSymbol.Text, $Status.AheadBy) } else { $branchStatusTextSpan.Text = $s.BranchBehindAndAheadStatusSymbol.Text } } elseif ($Status.BehindBy -ge 1) { if (($s.BranchBehindAndAheadDisplay -eq "Full") -Or ($s.BranchBehindAndAheadDisplay -eq "Compact")) { $branchStatusTextSpan.Text = ("{0}{1}" -f $s.BranchBehindStatusSymbol.Text, $Status.BehindBy) } else { $branchStatusTextSpan.Text = $s.BranchBehindStatusSymbol.Text } } elseif ($Status.AheadBy -ge 1) { if (($s.BranchBehindAndAheadDisplay -eq "Full") -or ($s.BranchBehindAndAheadDisplay -eq "Compact")) { $branchStatusTextSpan.Text = ("{0}{1}" -f $s.BranchAheadStatusSymbol.Text, $Status.AheadBy) } else { $branchStatusTextSpan.Text = $s.BranchAheadStatusSymbol.Text } } else { $branchStatusTextSpan.Text = "?" } $str = "" if ($branchStatusTextSpan.Text) { $textSpan = [PoshGitTextSpan]::new($branchStatusTextSpan) if (!$NoLeadingSpace) { $textSpan.Text = " " + $branchStatusTextSpan.Text } if ($StringBuilder) { $StringBuilder | Write-Prompt $textSpan > $null } else { $str = Write-Prompt $textSpan } } return $(if ($StringBuilder) { $StringBuilder } else { $str }) } function Write-GitIndexStatus { param( [Parameter(Position = 0)] $Status, [Parameter(ValueFromPipeline = $true)] [System.Text.StringBuilder] $StringBuilder, [Parameter()] [switch] $NoLeadingSpace ) $s = $global:GitPromptSettings if (!$Status -or !$s) { return $(if ($StringBuilder) { $StringBuilder } else { "" }) } $str = "" if ($Status.HasIndex) { if ($s.ShowStatusWhenZero -or $Status.Index.Added) { $indexStatusText = " " if ($NoLeadingSpace) { $indexStatusText = "" $NoLeadingSpace = $false } $indexStatusText += "$($s.FileAddedText)$($Status.Index.Added.Count)" if ($StringBuilder) { $StringBuilder | Write-Prompt $indexStatusText -Color $s.IndexColor > $null } else { $str += Write-Prompt $indexStatusText -Color $s.IndexColor } } if ($s.ShowStatusWhenZero -or $status.Index.Modified) { $indexStatusText = " " if ($NoLeadingSpace) { $indexStatusText = "" $NoLeadingSpace = $false } $indexStatusText += "$($s.FileModifiedText)$($status.Index.Modified.Count)" if ($StringBuilder) { $StringBuilder | Write-Prompt $indexStatusText -Color $s.IndexColor > $null } else { $str += Write-Prompt $indexStatusText -Color $s.IndexColor } } if ($s.ShowStatusWhenZero -or $Status.Index.Deleted) { $indexStatusText = " " if ($NoLeadingSpace) { $indexStatusText = "" $NoLeadingSpace = $false } $indexStatusText += "$($s.FileRemovedText)$($Status.Index.Deleted.Count)" if ($StringBuilder) { $StringBuilder | Write-Prompt $indexStatusText -Color $s.IndexColor > $null } else { $str += Write-Prompt $indexStatusText -Color $s.IndexColor } } if ($Status.Index.Unmerged) { $indexStatusText = " " if ($NoLeadingSpace) { $indexStatusText = "" $NoLeadingSpace = $false } $indexStatusText += "$($s.FileConflictedText)$($Status.Index.Unmerged.Count)" if ($StringBuilder) { $StringBuilder | Write-Prompt $indexStatusText -Color $s.IndexColor > $null } else { $str += Write-Prompt $indexStatusText -Color $s.IndexColor } } } return $(if ($StringBuilder) { $StringBuilder } else { $str }) } function Write-GitWorkingDirStatus { param( [Parameter(Position = 0)] $Status, [Parameter(ValueFromPipeline = $true)] [System.Text.StringBuilder] $StringBuilder, [Parameter()] [switch] $NoLeadingSpace ) $s = $global:GitPromptSettings if (!$Status -or !$s) { return $(if ($StringBuilder) { $StringBuilder } else { "" }) } $str = "" if ($Status.HasWorking) { if ($s.ShowStatusWhenZero -or $Status.Working.Added) { $workingStatusText = " " if ($NoLeadingSpace) { $workingStatusText = "" $NoLeadingSpace = $false } $workingStatusText += "$($s.FileAddedText)$($Status.Working.Added.Count)" if ($StringBuilder) { $StringBuilder | Write-Prompt $workingStatusText -Color $s.WorkingColor > $null } else { $str += Write-Prompt $workingStatusText -Color $s.WorkingColor } } if ($s.ShowStatusWhenZero -or $Status.Working.Modified) { $workingStatusText = " " if ($NoLeadingSpace) { $workingStatusText = "" $NoLeadingSpace = $false } $workingStatusText += "$($s.FileModifiedText)$($Status.Working.Modified.Count)" if ($StringBuilder) { $StringBuilder | Write-Prompt $workingStatusText -Color $s.WorkingColor > $null } else { $str += Write-Prompt $workingStatusText -Color $s.WorkingColor } } if ($s.ShowStatusWhenZero -or $Status.Working.Deleted) { $workingStatusText = " " if ($NoLeadingSpace) { $workingStatusText = "" $NoLeadingSpace = $false } $workingStatusText += "$($s.FileRemovedText)$($Status.Working.Deleted.Count)" if ($StringBuilder) { $StringBuilder | Write-Prompt $workingStatusText -Color $s.WorkingColor > $null } else { $str += Write-Prompt $workingStatusText -Color $s.WorkingColor } } if ($Status.Working.Unmerged) { $workingStatusText = " " if ($NoLeadingSpace) { $workingStatusText = "" $NoLeadingSpace = $false } $workingStatusText += "$($s.FileConflictedText)$($Status.Working.Unmerged.Count)" if ($StringBuilder) { $StringBuilder | Write-Prompt $workingStatusText -Color $s.WorkingColor > $null } else { $str += Write-Prompt $workingStatusText -Color $s.WorkingColor } } } return $(if ($StringBuilder) { $StringBuilder } else { $str }) } function Write-GitWorkingDirStatusSummary { param( [Parameter(Position = 0)] $Status, [Parameter(ValueFromPipeline = $true)] [System.Text.StringBuilder] $StringBuilder, [Parameter()] [switch] $NoLeadingSpace ) $s = $global:GitPromptSettings if (!$Status -or !$s) { return $(if ($StringBuilder) { $StringBuilder } else { "" }) } $str = "" $localStatusSymbol = $s.LocalDefaultStatusSymbol if ($Status.HasWorking) { $localStatusSymbol = $s.LocalWorkingStatusSymbol } elseif ($Status.HasIndex) { $localStatusSymbol = $s.LocalStagedStatusSymbol } if ($localStatusSymbol.Text) { $textSpan = [PoshGitTextSpan]::new($localStatusSymbol) if (!$NoLeadingSpace) { $textSpan.Text = " " + $localStatusSymbol.Text } if ($StringBuilder) { $StringBuilder | Write-Prompt $textSpan > $null } else { $str += Write-Prompt $textSpan } } return $(if ($StringBuilder) { $StringBuilder } else { $str }) } function Write-GitStashCount { param( [Parameter(Position = 0)] $Status, [Parameter(ValueFromPipeline = $true)] [System.Text.StringBuilder] $StringBuilder ) $s = $global:GitPromptSettings if (!$Status -or !$s) { return $(if ($StringBuilder) { $StringBuilder } else { "" }) } $str = "" if ($Status.StashCount -gt 0) { $stashText = "$($Status.StashCount)" if ($StringBuilder) { $StringBuilder | Write-Prompt $s.BeforeStash > $null $StringBuilder | Write-Prompt $stashText -Color $s.StashColor > $null $StringBuilder | Write-Prompt $s.AfterStash > $null } else { $str += Write-Prompt $s.BeforeStash $str += Write-Prompt $stashText -Color $s.StashColor $str += Write-Prompt $s.AfterStash } } return $(if ($StringBuilder) { $StringBuilder } else { $str }) } if (!(Test-Path Variable:Global:VcsPromptStatuses)) { $global:VcsPromptStatuses = @() } function Global:Write-VcsStatus { Set-ConsoleMode -ANSI $OFS = "" $sb = [System.Text.StringBuilder]::new(256) foreach ($promptStatus in $global:VcsPromptStatuses) { [void]$sb.Append("$(& $promptStatus)") } if ($sb.Length -gt 0) { $sb.ToString() } } $PoshGitVcsPrompt = { try { $global:GitStatus = Get-GitStatus Write-GitStatus $GitStatus } catch { $s = $global:GitPromptSettings if ($s) { $errorText = "PoshGitVcsPrompt error: $_" $sb = [System.Text.StringBuilder]::new() if (!$s.DefaultPromptWriteStatusFirst) { $sb | Write-Prompt $s.PathStatusSeparator.Expand() > $null } $sb | Write-Prompt $s.BeforeStatus > $null $sb | Write-Prompt $errorText -Color $s.ErrorColor > $null if ($s.Debug) { if (!$s.AnsiConsole) { Write-Host } Write-Verbose "PoshGitVcsPrompt error details: $($_ | Format-List * -Force | Out-String)" -Verbose } $sb | Write-Prompt $s.AfterStatus > $null if ($sb.Length -gt 0) { $sb.ToString() } } } } $global:VcsPromptStatuses += $PoshGitVcsPrompt
combined_dataset/train/non-malicious/WIMM Emulator Launcher.ps1
WIMM Emulator Launcher.ps1
## ## Start-WimmEmulator.ps1 ## ## Starts the WIMM emulator - must be placed in the add-ons\\addon_wimm_one_7\\tools ## directory along with the rest of the WIMM tools. ## ## http://dev.wimm.com/ if(-not $env:ANDROID_SDK_DIR) { $env:ANDROID_SDK_DIR = Resolve-Path (Join-Path $psscriptRoot ..\\..\\..) } if(-not (Test-Path "$env:HOMEPATH\\.android\\avd\\WIMMOne.ini")) { Write-Verbose "Creating WIMMOne avd" & "$env:ANDROID_SDK_DIR\\tools\\android.bat" create avd -s WIMMOne -n WIMMOne -t "WIMM Labs, Inc.:WIMM One Add-On:7" -c 9M --force } $certPath = Join-Path $env:ANDROID_SDK_DIR "add-ons\\addon_wimm_one_7\\credentials" $certFile = dir "$certPath\\*.pfx" | Select -Last 1 if(-not $certFile) { throw "You must have a PFX certificate file installed at $certPath" } Write-Verbose "CertFile is $($certFile.FullName)" $id = dir "$env:ANDROID_SDK_DIR\\add-ons\\addon_wimm_one_7\\credentials\\*.id" | Select -Last 1 if(-not $id) { throw "You must have an ID file installed at $certPath" } $id = $id | Get-Content Write-Verbose "ID is $id" $imagePath = "$env:HOMEPATH\\.android\\avd\\WIMMOne.avd\\env.img" $otpPath= "$env:HOMEPATH\\.android\\avd\\WIMMOne.avd\\otp.img" $imagePath,$otpPath | Foreach-Object { if(-not (Test-Path $_)) { $bytes = [byte[]] (Get-Content (Join-Path $psscriptRoot nand.dat) -Encoding Byte) Set-Content $_ ($bytes * 1024) -Encoding Byte } } & $env:ANDROID_SDK_DIR\\tools\\emulator.exe -avd WIMMOne -prop dev.id=$id -qemu -nand "env,size=0x40000,file=$imagePath" -nand "otp,size=0x40000,file=$otpPath" & $env:ANDROID_SDK_DIR\\platform-tools\\adb.exe -e wait-for-device push "$($certFile.FullName)" /data/misc/nv/cert.pfx
combined_dataset/train/non-malicious/sample_43_57.ps1
sample_43_57.ps1
# # Module manifest for module 'OCI.PSModules.Cims' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cims.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '368f2b49-11f4-438a-ad66-755a6282f6fd' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cims Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cims.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCICimsUser', 'Get-OCICimsCsiNumber', 'Get-OCICimsIncident', 'Get-OCICimsIncidentResourceTypesList', 'Get-OCICimsIncidentsList', 'Get-OCICimsStatus', 'New-OCICimsIncident', 'Update-OCICimsIncident' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cims' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_19_90.ps1
sample_19_90.ps1
# # Module manifest for module 'OCI.PSModules.Cloudguard' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '416303ec-c9d6-4a65-8413-14973e520be8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudguard Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudguardCompartment', 'Get-OCICloudguardConditionMetadataType', 'Get-OCICloudguardConditionMetadataTypesList', 'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule', 'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource', 'Get-OCICloudguardDataSourceEventsList', 'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector', 'Get-OCICloudguardDetectorRecipe', 'Get-OCICloudguardDetectorRecipeDetectorRule', 'Get-OCICloudguardDetectorRecipeDetectorRulesList', 'Get-OCICloudguardDetectorRecipesList', 'Get-OCICloudguardDetectorRule', 'Get-OCICloudguardDetectorRulesList', 'Get-OCICloudguardDetectorsList', 'Get-OCICloudguardImpactedResourcesList', 'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList', 'Get-OCICloudguardManagedListTypesList', 'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem', 'Get-OCICloudguardProblemEndpointsList', 'Get-OCICloudguardProblemEntitiesList', 'Get-OCICloudguardProblemHistoriesList', 'Get-OCICloudguardProblemsList', 'Get-OCICloudguardRecommendationsList', 'Get-OCICloudguardResourceProfile', 'Get-OCICloudguardResourceProfileEndpointsList', 'Get-OCICloudguardResourceProfileImpactedResourcesList', 'Get-OCICloudguardResourceProfilesList', 'Get-OCICloudguardResourceTypesList', 'Get-OCICloudguardResponderActivitiesList', 'Get-OCICloudguardResponderExecution', 'Get-OCICloudguardResponderExecutionsList', 'Get-OCICloudguardResponderRecipe', 'Get-OCICloudguardResponderRecipeResponderRule', 'Get-OCICloudguardResponderRecipeResponderRulesList', 'Get-OCICloudguardResponderRecipesList', 'Get-OCICloudguardResponderRule', 'Get-OCICloudguardResponderRulesList', 'Get-OCICloudguardSecurityPoliciesList', 'Get-OCICloudguardSecurityPolicy', 'Get-OCICloudguardSecurityRecipe', 'Get-OCICloudguardSecurityRecipesList', 'Get-OCICloudguardSecurityZone', 'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting', 'Get-OCICloudguardSightingEndpointsList', 'Get-OCICloudguardSightingImpactedResourcesList', 'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList', 'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe', 'Get-OCICloudguardTargetDetectorRecipeDetectorRule', 'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList', 'Get-OCICloudguardTargetDetectorRecipesList', 'Get-OCICloudguardTargetResponderRecipe', 'Get-OCICloudguardTargetResponderRecipeResponderRule', 'Get-OCICloudguardTargetResponderRecipeResponderRulesList', 'Get-OCICloudguardTargetResponderRecipesList', 'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList', 'Get-OCICloudguardWorkRequest', 'Get-OCICloudguardWorkRequestErrorsList', 'Get-OCICloudguardWorkRequestLogsList', 'Get-OCICloudguardWorkRequestsList', 'Invoke-OCICloudguardExecuteResponderExecution', 'Invoke-OCICloudguardRequestRiskScores', 'Invoke-OCICloudguardRequestSecurityScores', 'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend', 'Invoke-OCICloudguardRequestSummarizedActivityProblems', 'Invoke-OCICloudguardRequestSummarizedProblems', 'Invoke-OCICloudguardRequestSummarizedResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedRiskScores', 'Invoke-OCICloudguardRequestSummarizedSecurityScores', 'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendProblems', 'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores', 'Invoke-OCICloudguardSkipBulkResponderExecution', 'Invoke-OCICloudguardSkipResponderExecution', 'Invoke-OCICloudguardTriggerResponder', 'Move-OCICloudguardDataSourceCompartment', 'Move-OCICloudguardDetectorRecipeCompartment', 'Move-OCICloudguardManagedListCompartment', 'Move-OCICloudguardResponderRecipeCompartment', 'Move-OCICloudguardSecurityRecipeCompartment', 'Move-OCICloudguardSecurityZoneCompartment', 'New-OCICloudguardDataMaskRule', 'New-OCICloudguardDataSource', 'New-OCICloudguardDetectorRecipe', 'New-OCICloudguardDetectorRecipeDetectorRule', 'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe', 'New-OCICloudguardSecurityRecipe', 'New-OCICloudguardSecurityZone', 'New-OCICloudguardTarget', 'New-OCICloudguardTargetDetectorRecipe', 'New-OCICloudguardTargetResponderRecipe', 'Remove-OCICloudguardCompartment', 'Remove-OCICloudguardDataMaskRule', 'Remove-OCICloudguardDataSource', 'Remove-OCICloudguardDetectorRecipe', 'Remove-OCICloudguardDetectorRecipeDetectorRule', 'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource', 'Remove-OCICloudguardManagedList', 'Remove-OCICloudguardResponderRecipe', 'Remove-OCICloudguardSecurityRecipe', 'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget', 'Remove-OCICloudguardTargetDetectorRecipe', 'Remove-OCICloudguardTargetResponderRecipe', 'Stop-OCICloudguardWorkRequest', 'Update-OCICloudguardBulkProblemStatus', 'Update-OCICloudguardConfiguration', 'Update-OCICloudguardDataMaskRule', 'Update-OCICloudguardDataSource', 'Update-OCICloudguardDetectorRecipe', 'Update-OCICloudguardDetectorRecipeDetectorRule', 'Update-OCICloudguardManagedList', 'Update-OCICloudguardProblemStatus', 'Update-OCICloudguardResponderRecipe', 'Update-OCICloudguardResponderRecipeResponderRule', 'Update-OCICloudguardSecurityRecipe', 'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget', 'Update-OCICloudguardTargetDetectorRecipe', 'Update-OCICloudguardTargetDetectorRecipeDetectorRule', 'Update-OCICloudguardTargetResponderRecipe', 'Update-OCICloudguardTargetResponderRecipeResponderRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1371.ps1
1371.ps1
function Install-CDirectory { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Path ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not (Test-Path -Path $Path -PathType Container) ) { New-Item -Path $Path -ItemType 'Directory' | Out-String | Write-Verbose } }
combined_dataset/train/non-malicious/458.ps1
458.ps1
Set-PSFConfig -Module PSFramework -Name 'Serialization.WorkingDirectory' -Value $script:path_typedata -Initialize -Validation "string" -Description "The folder in which registered type extension files are placed before import. Relevant for Register-PSFTypeSerializationData."
combined_dataset/train/non-malicious/131.ps1
131.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-ManagedAppPolicy(){ [cmdletbinding()] param ( $Name ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/managedAppPolicies" try { if($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") } } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("ManagedAppProtection") -or ($_.'@odata.type').contains("InformationProtectionPolicy") } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-ManagedAppProtection(){ [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $id, [Parameter(Mandatory=$true)] [ValidateSet("Android","iOS","WIP_WE","WIP_MDM")] $OS ) $graphApiVersion = "Beta" try { if($id -eq "" -or $id -eq $null){ write-host "No Managed App Policy id specified, please provide a policy id..." -f Red break } else { if($OS -eq "" -or $OS -eq $null){ write-host "No OS parameter specified, please provide an OS. Supported value are Android,iOS,WIP_WE,WIP_MDM..." -f Red Write-Host break } elseif($OS -eq "Android"){ $Resource = "deviceAppManagement/androidManagedAppProtections('$id')/?`$expand=apps" $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get } elseif($OS -eq "iOS"){ $Resource = "deviceAppManagement/iosManagedAppProtections('$id')/?`$expand=apps" $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get } elseif($OS -eq "WIP_WE"){ $Resource = "deviceAppManagement/windowsInformationProtectionPolicies('$id')?`$expand=protectedAppLockerFiles,exemptAppLockerFiles,assignments" $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get } elseif($OS -eq "WIP_MDM"){ $Resource = "deviceAppManagement/mdmWindowsInformationProtectionPolicies('$id')?`$expand=protectedAppLockerFiles,exemptAppLockerFiles,assignments" $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Export-JSONData(){ param ( $JSON, $ExportPath ) try { if($JSON -eq "" -or $JSON -eq $null){ write-host "No JSON specified, please specify valid JSON..." -f Red } elseif(!$ExportPath){ write-host "No export path parameter set, please provide a path to export the file" -f Red } elseif(!(Test-Path $ExportPath)){ write-host "$ExportPath doesn't exist, can't export JSON Data" -f Red } else { $JSON1 = ConvertTo-Json $JSON -Depth 5 $JSON_Convert = $JSON1 | ConvertFrom-Json $displayName = $JSON_Convert.displayName $DisplayName = $DisplayName -replace '\<|\>|:|"|/|\\|\||\?|\*', "_" $Properties = ($JSON_Convert | Get-Member | ? { $_.MemberType -eq "NoteProperty" }).Name $FileName_JSON = "$DisplayName" + "_" + $(get-date -f dd-MM-yyyy-H-mm-ss) + ".json" write-host "Export Path:" "$ExportPath" $JSON1 | Set-Content -LiteralPath "$ExportPath\$FileName_JSON" write-host "JSON created in $ExportPath\$FileName_JSON..." -f cyan } } catch { $_.Exception } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $ExportPath = Read-Host -Prompt "Please specify a path to export the policy data to e.g. C:\IntuneOutput" if(!(Test-Path "$ExportPath")){ Write-Host Write-Host "Path '$ExportPath' doesn't exist, do you want to create this directory? Y or N?" -ForegroundColor Yellow $Confirm = read-host if($Confirm -eq "y" -or $Confirm -eq "Y"){ new-item -ItemType Directory -Path "$ExportPath" | Out-Null Write-Host } else { Write-Host "Creation of directory path was cancelled..." -ForegroundColor Red Write-Host break } } Write-Host write-host "Running query against Microsoft Graph for App Protection Policies" -f Yellow $ManagedAppPolicies = Get-ManagedAppPolicy | ? { ($_.'@odata.type').contains("ManagedAppProtection") } write-host if($ManagedAppPolicies){ foreach($ManagedAppPolicy in $ManagedAppPolicies){ write-host "Managed App Policy:"$ManagedAppPolicy.displayName -f Cyan if($ManagedAppPolicy.'@odata.type' -eq " $AppProtectionPolicy = Get-ManagedAppProtection -id $ManagedAppPolicy.id -OS "Android" $AppProtectionPolicy | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value " $AppProtectionPolicy Export-JSONData -JSON $AppProtectionPolicy -ExportPath "$ExportPath" } elseif($ManagedAppPolicy.'@odata.type' -eq " $AppProtectionPolicy = Get-ManagedAppProtection -id $ManagedAppPolicy.id -OS "iOS" $AppProtectionPolicy | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value " $AppProtectionPolicy Export-JSONData -JSON $AppProtectionPolicy -ExportPath "$ExportPath" } Write-Host } }
combined_dataset/train/non-malicious/Test-Help.ps1
Test-Help.ps1
function Test-Help { <# .Synopsis Test-Help -Function Get-USB .Description Test-Help was written to get information why that !@##$%#$%# help is not working ;) For now works only if v2 comments are used (starting with < # and ending with # > ) Using fancy regex that probably could be shorter, more elegant and so long and so forth... ;) .Example Test-Help -Function Test-Help If you want to find mistakes made by other - try to find yours first. ;) .Link Not yet implemented .Parameter Function Name of the function to be tested. #> param ([string]$Function) try { $Definition = (Get-Command -CommandType function -Name $function -ErrorAction Stop).definition -split '\\n' $regKey = [regex]'^\\s*\\.(?<KEY>\\w+)($|\\s*($|(?<PARAM>[\\w-]+))($|\\s*(?<ERROR>\\S*)$))' $regComStart = [regex]'^\\s*<#\\s*$' $regComEnd = [regex]'^\\s*#>\\s*$' $IsComment = $false $KEYS = @('SYNOPSIS','DESCRIPTION','EXAMPLE','INPUTS','OUTPUTS','NOTES','LINK','COMPONENT','ROLE','FUNCTIONALITY') $EXTKEYS = @('PARAMETER','FORWARDHELPTARGETNAME','FORWARDHELPCATEGORY','REMOTEHELPRUNSPACE','EXTERNALHELP') foreach ($line in $Definition) { $line = $line -replace '\\r', '' $invocation = "Line : $line Function : $function" if ($IsComment) { if ($RegKey.IsMatch($line)) { # should contain keyword $RegKey.Match($line) | ForEach-Object { $Key = $_.Groups['KEY'].Value $Par = $_.Groups['PARAM'].Value $Err = $_.Groups['ERROR'].Value } if (![string]::IsNullOrEmpty($Err)) { Write-Host -ForegroundColor Cyan "Unexpected token - not more than two: $Err $invocation" continue } if ($KEYS -contains $Key) { if (![string]::IsNullOrEmpty($Par)) { Write-Host -ForegroundColor Yellow "Unexpected token - keyword without additional parameters: $Par $invocation" continue } } else { if ($EXTKEYS -contains $Key) { if ([string]::IsNullOrEmpty($Par)) { Write-Host -ForegroundColor Magenta "Missing token - $Key should be followed by something, $invocation" } } else { # Looks like spelling mistake... Write-Host -ForegroundColor Green "Key probably with spelling mistake: $Key $invocation" } } } else { if ($RegComEnd.IsMatch($line)) { $IsComment = $false } } } else { if ($RegComStart.IsMatch($line)) { $IsComment = $true } } } } catch { Write-Host -ForegroundColor Red "Error: $_ " } }
combined_dataset/train/non-malicious/694.ps1
694.ps1
function Get-FileExtension { param( [Parameter(Mandatory=$True)] [string]$TypeName ) switch ($TypeName) { 'Report' { return '.rdl' } 'DataSource' { return '.rsds' } 'DataSet' { return '.rsd' } 'MobileReport' { return '.rsmobile' } 'PowerBIReport' { return '.pbix' } 'ExcelWorkbook' { return '' } 'Resource' { return '' } 'Kpi' { return '.kpi' } default { throw 'Unsupported item type! We only support items which are of type Report, DataSet, DataSource, Mobile Report or Power BI Report' } } }
combined_dataset/train/non-malicious/1973.ps1
1973.ps1
Describe "Get-Date DRT Unit Tests" -Tags "CI" { It "Get-Date with all parameters returns proper results" { $date = [datetime]::Now + ([timespan]::new(0,0,30)) $result = Get-Date -Date $date -Year 1973 -Month 2 -Day 22 -Hour 15 -Minute 40 -Second 10 -Millisecond 200 $result | Should -BeOfType Datetime $result.Year | Should -Be 1973 $result.Month| Should -Be 2 $result.Day | Should -Be 22 $result.Hour | Should -Be 15 $result.Minute | Should -Be 40 $result.Second | Should -Be 10 $result.Millisecond | Should -Be 200 } It "using -displayhint produces the correct output" { $d = Get-date -Date:"Jan 1, 2020" -DisplayHint Date | Out-String $d.Trim() | Should -Be "Wednesday, January 1, 2020" } It "using -format produces the correct output" { Get-date -Date:"Jan 1, 2020" -Format:"MMM-dd-yy" | Should -Be "Jan-01-20" } It "using -uformat %s produces the correct output" { $seconds = Get-date -Date:"Jan 1, 2020Z" -UFormat:"%s" $seconds | Should -Be "1577836800" if ($isLinux) { $dateString = "01/01/2020 UTC" if ( (Get-PlatformInfo) -eq "alpine" ) { $dateString = "2020-01-01" } $expected = date --date=${dateString} +%s $seconds | Should -Be $expected } } It "using -uformat 'ymdH' produces the correct output" { Get-date -Date 0030-01-01T00:00:00 -uformat %y/%m/%d-%H | Should -Be "30/01/01-00" } It "using -uformat 'aAbBcCdDehHIkljmMpr' produces the correct output" { Get-date -Date 1/1/0030 -uformat "%a%A%b%B%c%C%d%D%e%h%H%I%k%l%j%m%M%p%r" | Should -Be "TueTuesdayJanJanuaryTue 01 Jan 0030 00:00:0000101/01/30 1Jan0012 0120010100AM12:00:00 AM" } It "using -uformat 'sStTuUVwWxXyYZ' produces the correct output" { Get-date -Date 1/1/0030 -uformat %S%T%u%U%w%W%x%X%y%Y%% | Should -Be "0000:00:00202001/01/3000:00:00300030%" } It "using -uformat 'V' produces the correct output" -TestCases @( @{date="2005-01-01"; week = "53"}, @{date="2005-01-02"; week = "53"}, @{date="2005-12-31"; week = "52"}, @{date="2006-01-01"; week = "52"}, @{date="2006-01-02"; week = "01"}, @{date="2006-12-31"; week = "52"}, @{date="2007-01-01"; week = "01"}, @{date="2007-12-30"; week = "52"}, @{date="2007-12-31"; week = "01"}, @{date="2008-01-01"; week = "01"}, @{date="2008-12-28"; week = "52"}, @{date="2008-12-29"; week = "01"}, @{date="2008-12-30"; week = "01"}, @{date="2008-12-31"; week = "01"}, @{date="2009-01-01"; week = "01"}, @{date="2009-12-31"; week = "53"}, @{date="2010-01-01"; week = "53"}, @{date="2010-01-02"; week = "53"}, @{date="2010-01-03"; week = "53"}, @{date="2010-01-04"; week = "01"} ) { param($date, $week) Get-date -Date $date -uformat %V | Should -BeExactly $week } It "Passing '<name>' to -uformat produces a descriptive error" -TestCases @( @{ name = "`$null" ; value = $null } @{ name = "empty string"; value = "" } ) { param($value) { Get-date -Date 1/1/1970 -uformat $value -ErrorAction Stop } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.GetDateCommand" } It "Get-date works with pipeline input" { $x = new-object System.Management.Automation.PSObject $x | add-member NoteProperty Date ([DateTime]::Now) $y = @($x,$x) ($y | Get-date).Length | Should -Be 2 } It "the LastWriteTime alias works with pipeline input" { $folder = "GetDateTest" $pathString = Join-Path -Path $TestDrive -ChildPath $folder New-Item -Path $TestDrive -Name $folder -ItemType directory -Force for($i = 0; $i -lt 10; $i++) { $temp = [guid]::NewGuid() $pathString2 = Join-Path -Path $pathString -ChildPath $temp New-Item -Path $pathString -Name $temp -ItemType file -Force for($j = 0; $j -lt 100; $j++) { Add-Content -Path $pathString2 -Value $j } } $result1 = get-childitem -path $pathString | get-date $result2 = get-childitem -path $pathString | get-date $result1.Length | Should -Be 10 $result1.Length -eq $result2.Length | Should -BeTrue for($i = 0; $i -lt $result1.Length; $i++) { $result1[$i] -eq $result2[$i] | Should -BeTrue } Get-ChildItem -Path $pathString | Remove-Item Remove-Item -Path $pathString -Force -Recurse } } Describe "Get-Date" -Tags "CI" { It "-Format FileDate works" { Get-date -Date 0030-01-01T01:02:03.0004 -Format FileDate | Should -Be "00300101" } It "-Format FileDateTime works" { Get-date -Date 0030-01-01T01:02:03.0004 -Format FileDateTime | Should -Be "00300101T0102030004" } It "-Format FileDateTimeUniversal works" { Get-date -Date 0030-01-01T01:02:03.0004z -Format FileDateTimeUniversal | Should -Be "00300101T0102030004Z" } It "-Format FileDateTimeUniversal works" { Get-date -Date 0030-01-01T01:02:03.0004z -Format FileDateUniversal | Should -Be "00300101Z" } It "Should have colons when ToString method is used" { (Get-Date).ToString().Contains(":") | Should -BeTrue (Get-Date -DisplayHint Time).ToString().Contains(":") | Should -BeTrue (Get-Date -DisplayHint Date).ToString().Contains(":") | Should -BeTrue } It "Should be able to use the format flag" { (Get-Date -Format d).Contains("/") | Should -BeTrue (Get-Date -Format D).Contains(",") | Should -BeTrue (Get-Date -Format f).Contains(",") -and (Get-Date -Format f).Contains(":") | Should -BeTrue (Get-Date -Format F).Contains(",") -and (Get-Date -Format F).Contains(":") | Should -BeTrue (Get-Date -Format g).Contains("/") -and (Get-Date -Format g).Contains(":") | Should -BeTrue (Get-Date -Format G).Contains("/") -and (Get-Date -Format G).Contains(":") | Should -BeTrue (Get-Date -Format m).Contains(",") -or ` (Get-Date -Format m).Contains(":") -or ` (Get-Date -Format m).Contains("/") | Should -BeFalse } It "Should check that Get-Date can return the correct datetime from the system time" { $timeDifference = $(Get-Date).Subtract([System.DateTime]::Now) $timeDifference.Days | Should -Be 0 $timeDifference.Hours | Should -Be 0 $timeDifference.Minutes | Should -Be 0 $timeDifference.Milliseconds | Should -BeLessThan 1 $timeDifference.Ticks | Should -BeLessThan 10000 } } Describe "Get-Date -UFormat tests" -Tags "CI" { BeforeAll { $date1 = Get-date -Date "2030-4-5 1:2:3.09" $date2 = Get-date -Date "2030-4-15 13:2:3" $date3 = Get-date -Date "2030-4-15 21:2:3" $shortDay1 = [System.Globalization.CultureInfo]::CurrentCulture.DateTimeFormat.AbbreviatedDayNames[5] $fullDay1 = [System.Globalization.CultureInfo]::CurrentCulture.DateTimeFormat.DayNames[5] $shortMonth1 = [System.Globalization.CultureInfo]::CurrentCulture.DateTimeFormat.AbbreviatedMonthNames[3] $fullMonth1 = [System.Globalization.CultureInfo]::CurrentCulture.DateTimeFormat.MonthNames[3] $fullDate1 = $date1.ToString("$([System.Globalization.CultureInfo]::CurrentCulture.DateTimeFormat.ShortDatePattern)") $fullTime1 = $date1.ToString("$([System.Globalization.CultureInfo]::CurrentCulture.DateTimeFormat.LongTimePattern)") $amUpper1 = [System.Globalization.CultureInfo]::CurrentCulture.DateTimeFormat.AMDesignator $amLower1 = [System.Globalization.CultureInfo]::CurrentCulture.DateTimeFormat.AMDesignator.ToLower() $timeZone1 = [String]::Format("{0:+00;-00}", [Timezone]::CurrentTimeZone.GetUtcOffset( $date1 ).Hours) } It "Get-Date -UFormat <format>" -TestCases @( @{ date = $date1; format = "%a"; result = $shortDay1 } @{ date = $date1; format = "%A"; result = $fullDay1 } @{ date = $date1; format = "%b"; result = $shortMonth1 } @{ date = $date1; format = "%B"; result = $fullMonth1 } @{ date = $date1; format = "%c"; result = "$shortDay1 05 $shortMonth1 2030 01:02:03" } @{ date = $date1; format = "%C"; result = "20" } @{ date = $date1; format = "%d"; result = "05" } @{ date = $date1; format = "%D"; result = "04/05/30" } @{ date = $date1; format = "%e"; result = " 5" } @{ date = $date2; format = "%e"; result = "15" } @{ date = $date1; format = "%F"; result = "2030-04-05" } @{ date = $date1; format = "%h"; result = $shortMonth1 } @{ date = $date1; format = "%H"; result = "01" } @{ date = $date2; format = "%H"; result = "13" } @{ date = $date1; format = "%I"; result = "01" } @{ date = $date2; format = "%I"; result = "01" } @{ date = $date1; format = "%j"; result = "095" } @{ date = $date1; format = "%k"; result = " 1" } @{ date = $date2; format = "%k"; result = "13" } @{ date = $date1; format = "%l"; result = " 1" } @{ date = $date2; format = "%l"; result = " 1" } @{ date = $date1; format = "%m"; result = "04" } @{ date = $date1; format = "%M"; result = "02" } @{ date = $date1; format = "%p"; result = $amUpper1 } @{ date = $date1; format = "%r"; result = "01:02:03 AM" } @{ date = $date3; format = "%r"; result = "09:02:03 PM" } @{ date = $date1; format = "%R"; result = "01:02" } @{ date = $date3; format = "%R"; result = "21:02" } @{ date = $date1; format = "%S"; result = "03" } @{ date = $date1; format = "%T"; result = "01:02:03" } @{ date = $date1; format = "%u"; result = "5" } @{ date = $date1; format = "%U"; result = "13" } @{ date = $date1; format = "%W"; result = "13" } @{ date = $date1; format = "%x"; result = "04/05/30" } @{ date = $date1; format = "%y"; result = "30" } @{ date = $date1; format = "%Y"; result = "2030" } @{ date = $date1; format = "%Z"; result = $timeZone1 } ) { param($date, $format, $result) Get-Date -Date $date -UFormat $format | Should -BeExactly $result } }
combined_dataset/train/non-malicious/369.ps1
369.ps1
function Import-PSFLocalizedString { [PSFramework.PSFCore.NoJeaCommand()] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string] $Path, [Parameter(Mandatory = $true)] [string] $Module, [PsfValidateSet(TabCompletion = 'PSFramework-LanguageNames', NoResults = 'Continue')] [string] $Language = 'en-US' ) begin { try { $resolvedPath = Resolve-PSFPath -Path $Path -Provider FileSystem } catch { Stop-PSFFunction -Message "Failed to resolve path: $Path" -EnableException $true -Cmdlet $PSCmdlet -ErrorRecord $_ } } process { foreach ($pathItem in $resolvedPath) { $data = Import-PSFPowerShellDataFile -Path $pathItem foreach ($key in $data.Keys) { [PSFramework.Localization.LocalizationHost]::Write($Module, $key, $Language, $data[$key]) } } } }
combined_dataset/train/non-malicious/3329.ps1
3329.ps1
function Update-GroupDescription { [PoshBot.BotCommand( Permissions = 'manage-groups' )] [cmdletbinding()] param( [parameter(Mandatory)] $Bot, [parameter(Mandatory, Position = 0)] [string]$Name, [parameter(Mandatory, Position = 1)] [string]$Description ) if ($g = $Bot.RoleManager.GetGroup($Name)) { try { $Bot.RoleManager.UpdateGroupDescription($Name, $Description) New-PoshBotCardResponse -Type Normal -Text "Group [$Name] description is now [$Description]" -ThumbnailUrl $thumb.success } catch { New-PoshBotCardResponse -Type Error -Text "Failed to update group [$Name]" -ThumbnailUrl $thumb.error } } else { New-PoshBotCardResponse -Type Warning -Text "Group [$Name] not found :(" -Title 'Rut row' -ThumbnailUrl $thumb.rutrow } }
combined_dataset/train/non-malicious/2294.ps1
2294.ps1
$vCenterServer = "server.contoso.com" try { if(-not (Get-PSSnapin VMware.VimAutomation.Core -ErrorAction SilentlyContinue)) { Add-PSSnapin VMware.VimAutomation.Core -ErrorAction Stop } Set-PowerCLIConfiguration -DefaultVIServerMode Single -InvalidCertificateAction Ignore -Confirm:$false -ErrorAction Stop Connect-VIServer -Server $vCenterServer -ErrorAction Stop $VirtualMachine = Get-VM -Name "Win7Ref" -ErrorAction Stop Get-HardDisk -VM $VirtualMachine -ErrorAction Stop | Remove-HardDisk -Confirm:$false -ErrorAction Stop $VirtualMachine | New-HardDisk -CapacityGB "60" -Confirm:$false -ErrorAction Stop Disconnect-VIServer -Server $vCenterServer -Confirm:$false -ErrorAction Stop $Success = "True" } catch [System.Exception] { $Success = "False" }
combined_dataset/train/non-malicious/Get-FeedInfo.ps1
Get-FeedInfo.ps1
function Get-FeedInfo([string[]]$feeds) { # $feeds is an array of rss/atom URLs $blogs=@(); $broken=@(); $feeds = $feeds | sort -unique {$_} foreach($feed in $feeds){ try { $xml = Get-WebPageContent $feed; } catch { $broken += $feed $xml = $null } if($xml.html.rss) { $xml = $xml.html; write-warning $feed } if($xml.rss) { $blogs += New-Object PSObject -Property @{ title= $xml.rss.channel.title link = $xml.rss.channel.link | ? { $_ -is [string] } feed = $feed } } elseif($xml.feed) { $blogs += New-Object PSObject -Property @{ title= $xml.feed.title.'#text' link = $xml.feed.link |? {$_.rel -eq 'alternate' } | select -expand href feed = $feed } } else { $broken += $feed $blogs += New-Object PSObject -Property @{ feed = $feed } } } Write-Output $blogs, $broken }
combined_dataset/train/non-malicious/New-XML 2.ps1
New-XML 2.ps1
#requires -version 2.0 #### NOTE: you can revert this to work in PowerShell 1.0 by just removing the [Parameter(...)] lines #### BUT YOU WILL HAVE TO pass the $Version $Encoding $Standalone parameters EACH TIME #### UNLESS you remove them, and switch back to a hardcoded XDeclaration ... or something. #################################################################################################### #### I still have to add documentation comments to these, but in the meantime ... ### please see the samples at the bottom to understand how to use them :) #### $xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators") $xlinq = [Reflection.Assembly]::Load("System.Xml.Linq, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089") $xlinq.GetTypes() | ? { $_.IsPublic -and !$_.IsSerializable -and $_.Name -ne "Extensions" -and !$xlr8r::Get[$_.Name] } | % { $xlr8r::Add( $_.Name, $_.FullName ) } function New-Xml { Param( [Parameter(Mandatory = $true, Position = 0)] [System.Xml.Linq.XName]$root , [Parameter(Mandatory = $false)] [string]$Version = "1.0" , [Parameter(Mandatory = $false)] [string]$Encoding = "UTF-8" , [Parameter(Mandatory = $false)] [string]$Standalone = "yes" , [Parameter(Position=99, Mandatory = $false, ValueFromRemainingArguments=$true)] [PSObject[]]$args ) BEGIN { if(![string]::IsNullOrEmpty( $root.NamespaceName )) { Function New-XmlDefaultElement { Param([System.Xml.Linq.XName]$tag) if([string]::IsNullOrEmpty( $tag.NamespaceName )) { $tag = $($root.Namespace) + $tag } New-XmlElement $tag @args } Set-Alias xe New-XmlDefaultElement } } PROCESS { #New-Object XDocument (New-Object XDeclaration "1.0", "UTF-8", "yes"),( New-Object XDocument (New-Object XDeclaration $Version, $Encoding, $standalone),( New-Object XElement $( $root # foreach($ns in $namespace){ # $name,$url = $ns -split ":",2 # New-Object XAttribute ([XNamespace]::Xmlns + $name),$url # } while($args) { $attrib, $value, $args = $args if($attrib -is [ScriptBlock]) { &$attrib } elseif ( $value -is [ScriptBlock] -and "-Content".StartsWith($attrib)) { &$value } elseif ( $value -is [XNamespace]) { New-XmlAttribute ([XNamespace]::Xmlns + $attrib.TrimStart("-")) $value } else { New-XmlAttribute $attrib.TrimStart("-") $value } } )) } END { Set-Alias xe New-XmlElement } } function New-XmlAttribute { Param($name,$value) New-Object XAttribute $name,$value } Set-Alias xa New-XmlAttribute function New-XmlElement { Param([System.Xml.Linq.XName]$tag) Write-Verbose $($args | %{ $_ | Out-String } | Out-String) New-Object XElement $( $tag while($args) { $attrib, $value, $args = $args if($attrib -is [ScriptBlock]) { &$attrib } elseif ( $value -is [ScriptBlock] -and "-Content".StartsWith($attrib)) { &$value } elseif ( $value -is [XNamespace]) { New-Object XAttribute ([XNamespace]::Xmlns + $attrib.TrimStart("-")),$value } else { New-Object XAttribute $attrib.TrimStart("-"), $value } } ) } Set-Alias xe New-XmlElement #################################################################################################### ###### EXAMPLE SCRIPT: NOTE the `: in the http`: is only there for PoshCode, you can just use http: # [XNamespace]$dc = "http`://purl.org/dc/elements/1.1" # # $xml = New-Xml rss -dc $dc -version "2.0" { # xe channel { # xe title {"Test RSS Feed"} # xe link {"http`://HuddledMasses.org"} # xe description {"An RSS Feed generated simply to demonstrate my XML DSL"} # xe ($dc + "language") {"en"} # xe ($dc + "creator") {"Jaykul@HuddledMasses.org"} # xe ($dc + "rights") {"Copyright 2009, CC-BY"} # xe ($dc + "date") {(Get-Date -f u) -replace " ","T"} # xe item { # xe title {"The First Item"} # xe link {"http`://huddledmasses.org/new-site-new-layout-lost-posts/"} # xe guid -isPermaLink true {"http`://huddledmasses.org/new-site-new-layout-lost-posts/"} # xe description {"Ema Lazarus' Poem"} # xe pubDate {(Get-Date 10/31/2003 -f u) -replace " ","T"} # } # } # } # # $xml.Declaration.ToString() ## I can't find a way to have this included in the $xml.ToString() # $xml.ToString() # ####### OUTPUT: (NOTE: I added the space in the http: to paste it on PoshCode -- those aren't in the output) # <?xml version="1.0" encoding="UTF-8" standalone="yes"?> # <rss xmlns:dc="http ://purl.org/dc/elements/1.1" version="2.0"> # <channel> # <title>Test RSS Feed</title> # <link>http ://HuddledMasses.org</link> # <description>An RSS Feed generated simply to demonstrate my XML DSL</description> # <dc:language>en</dc:language> # <dc:creator>Jaykul@HuddledMasses.org</dc:creator> # <dc:rights>Copyright 2009, CC-BY</dc:rights> # <dc:date>2009-07-26T00:50:08Z</dc:date> # <item> # <title>The First Item</title> # <link>http ://huddledmasses.org/new-site-new-layout-lost-posts/</link> # <guid isPermaLink="true">http ://huddledmasses.org/new-site-new-layout-lost-posts/</guid> # <description>Ema Lazarus' Poem</description> # <pubDate>2003-10-31T00:00:00Z</pubDate> # </item> # </channel> # </rss> #################################################################################################### ###### ANOTHER EXAMPLE SCRIPT, this time with a default namespace ## IMPORTANT! ## NOTE that I use the "xe" shortcut which is redefined when you specify a namespace ## ## for the root element, so that all child elements (by default) inherit that. ## ## You can still control the prefixes by passing the namespace as a parameter ## ## e.g.: -atom $atom ###### The `: in the http`: is still only there for PoshCode, you can just use http: ... #################################################################################################### # # [XNamespace]$atom="http`://www.w3.org/2005/Atom" # [XNamespace]$dc = "http`://purl.org/dc/elements/1.1" # # New-Xml ($atom + "feed") -Encoding "UTF-16" -$([XNamespace]::Xml +'lang') "en-US" -dc $dc { # xe title {"Test First Entry"} # xe link {"http`://HuddledMasses.org"} # xe updated {(Get-Date -f u) -replace " ","T"} # xe author { # xe name {"Joel Bennett"} # xe uri {"http`://HuddledMasses.org"} # } # xe id {"http`://huddledmasses.org/" } # # xe entry { # xe title {"Test First Entry"} # xe link {"http`://HuddledMasses.org/new-site-new-layout-lost-posts/" } # xe id {"http`://huddledmasses.org/new-site-new-layout-lost-posts/" } # xe updated {(Get-Date 10/31/2003 -f u) -replace " ","T"} # xe summary {"Ema Lazarus' Poem"} # xe link -rel license -href "http://creativecommons.org/licenses/by/3.0/" -title "CC By-Attribution" # xe ($dc + "rights") {"Copyright 2009, Some rights reserved (licensed under the Creative Commons Attribution 3.0 Unported license)"} # xe category -scheme "http://huddledmasses.org/tag/" -term "huddled-masses" # } # } | % { $_.Declaration.ToString(); $_.ToString() } # ####### OUTPUT: (NOTE: I added the spaces again to the http: to paste it on PoshCode) # <?xml version="1.0" encoding="UTF-16" standalone="yes"?> # <feed xml:lang="en-US" xmlns="http ://www.w3.org/2005/Atom"> # <title>Test First Entry</title> # <link>http ://HuddledMasses.org</link> # <updated>2009-07-29T17:25:49Z</updated> # <author> # <name>Joel Bennett</name> # <uri>http ://HuddledMasses.org</uri> # </author> # <id>http ://huddledmasses.org/</id> # <entry> # <title>Test First Entry</title> # <link>http ://HuddledMasses.org/new-site-new-layout-lost-posts/</link> # <id>http ://huddledmasses.org/new-site-new-layout-lost-posts/</id> # <updated>2003-10-31T00:00:00Z</updated> # <summary>Ema Lazarus' Poem</summary> # <link rel="license" href="http ://creativecommons.org/licenses/by/3.0/" title="CC By-Attribution" /> # <dc:rights>Copyright 2009, Some rights reserved (licensed under the Creative Commons Attribution 3.0 Unported license)</dc:rights> # <category scheme="http ://huddledmasses.org/tag/" term="huddled-masses" /> # </entry> # </feed> # #
combined_dataset/train/non-malicious/sample_28_27.ps1
sample_28_27.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.ManagedServices.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.ManagedServices.Module]::Instance # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = $PSScriptRoot $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # endregion # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAiMKXEN78KIA37 # +FO7TfFFMMVYFkpd2WlCj+Eorty9qaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBbBE4/4BCer2fVW3JRU/NOW # XzEdddeEXNU1/eNMH/KSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAvhJTdhVUJh+lfYi5wxfOi8lcHGHduL79nq0tSiNnDUa+RGxChp5+8x0 # w5RStuKAiBOdvp27wy6M4aETCVbB2f/htc5QVX3rOiHJrUm6x4x/xzdg7rRA1MUd # m1E5xeiP4HBCOT3hkMwwv1QTY+RzW1Td6BJzyNVQo09ZO2xOGKoWwA4BIsLEX7ia # YnHS9BSP0qKYhEc8zRMgGfvkAazqQ7RRlC6VX1NvY+w7/eaxJPli0BmJ4n7s1wdQ # 7NKBGwL10IiOXAaD7YVB6tJGKaUTxiSZufW41EXOJC9Rf6y0nX1+TGNpS+rTHpt4 # Huskx+swhTgRBSsIuKT9g1NhrWqBjaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAGCJhldW/obQbujZbR1A9Kjvp4EJg/KWqa0HXR5NjTnwIGZiAgthQK # GBMyMDI0MDQyMzEzMTUxNi45ODVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK # AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+ # h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx # G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje # 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgSX4tpFRahtDpEd3cCE78ewgzoC4sYzBuYq067UOprr0wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me # BeYsMA0GCSqGSIb3DQEBCwUABIICAIyKWggwDT68n5TIhxLL5lvMZzIGMc6VYDSU # L0Eh8Tuxrna4OgI7/DF2NwXYMT942K3f/opQTEy7PvMeG+7F7EAzPLR+yk4985R5 # 0vmv/43xjNtBmCLbaUpRFlQ1s6hoITMBt/HxNwNaaUzx7+ML2y/LEnqb8EDGM9yp # SNdHXCD3c8GvVpx2mq/uiAe5IFzmaOT0VHNLnjisXqvQ/aSfFxCK6E5rFDPyi/9A # cb5Hw1JasI+birQP5PTXzfHvnmhecZX69L90tYopSwhwMghwXpCo2nN68dBqk839 # 2xCM/yoX+Ft9xuBV4iL9JGUucW5j70oWJMND6O6Qd69xMa9jGUK7VtxcY19B3Kt4 # zjCJZghZGsDXho/g1UaBgNTAchHK/o83s2act8GQDJjq3qrGT6YJHw4FcF4ubDYW # 2CJvnZMitviDZyMJ/72rtELUt51yE9qIaxsUVIQ0n7zEVlIXZ1jgr7rPmdHdFZuQ # aha00FJFH1LYG+x0NDNa2+8UdeRQ5/SuirTI563e2GyeK9EBwbNS3pO1MDzC6u/X # 16uKIAN/f3RvgHXlMuTjnMq4vtRhUveFD/gxaiODU1tMNWw9w7j2EG3U05JJz0I5 # iXCx/PfVwDPmE+qnkOEyI/bLs0ofeJc8SktUHD1tSRwGbgw1XypQQNAMqkOlGxgW # GiruanOg # SIG # End signature block
combined_dataset/train/non-malicious/2973.ps1
2973.ps1
param($Thumbprint) $ErrorActionPreference = 'Stop' $cert = Get-ChildItem Cert:\CurrentUser\My | Where-Object Thumbprint -eq $Thumbprint if ($null -eq $cert) { throw "No certificate was found." } if (@($cert).Length -gt 1) { throw "More than one cerfificate with the given thumbprint was found." } "Signing Files" $files = Get-ChildItem -Recurse -ErrorAction SilentlyContinue | Where-Object { $_.Extension -in ".ps1", ".psm1", ".psd1", ".ps1xml", ".dll" } | Select-Object -ExpandProperty FullName $incorrectSignatures = Get-AuthenticodeSignature -FilePath $files | Where-Object { "Valid", "NotSigned" -notcontains $_.Status } if ($incorrectSignatures) { throw "There are items in the repository that are signed but their signature is invalid, review:`n$($incorrectSignatures | Out-String)`n" } $filesToSign = $files | Where-Object { "NotSigned" -eq (Get-AuthenticodeSignature -FilePath $_ ).Status } if (-not @($filesToSign)) { return "There are no files to sign, all the files in the repository are already signed." } $results = $filesToSign | ForEach-Object { $r = Set-AuthenticodeSignature $_ -Certificate $cert -TimestampServer 'http://timestamp.digicert.com' -ErrorAction Stop $r | Out-String | Write-Host $r } $failed = $results | Where-Object { $_.Status -ne "Valid" } if ($failed) { throw "Failed signing $($failed.Path -join "`n")" }
combined_dataset/train/non-malicious/sample_50_59.ps1
sample_50_59.ps1
# # Module manifest for module 'OCI.PSModules.Psql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Psql.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4e5ce5bb-7b1e-43a9-bd4b-3697eb32c070' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Psql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Psql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIPsqlBackup', 'Get-OCIPsqlBackupsList', 'Get-OCIPsqlConfiguration', 'Get-OCIPsqlConfigurationsList', 'Get-OCIPsqlConnectionDetails', 'Get-OCIPsqlDbSystem', 'Get-OCIPsqlDbSystemsList', 'Get-OCIPsqlDefaultConfiguration', 'Get-OCIPsqlDefaultConfigurationsList', 'Get-OCIPsqlPrimaryDbInstance', 'Get-OCIPsqlShapesList', 'Get-OCIPsqlWorkRequest', 'Get-OCIPsqlWorkRequestErrorsList', 'Get-OCIPsqlWorkRequestLogsList', 'Get-OCIPsqlWorkRequestsList', 'Invoke-OCIPsqlFailoverDbSystem', 'Invoke-OCIPsqlPatchDbSystem', 'Move-OCIPsqlBackupCompartment', 'Move-OCIPsqlConfigurationCompartment', 'Move-OCIPsqlDbSystemCompartment', 'New-OCIPsqlBackup', 'New-OCIPsqlConfiguration', 'New-OCIPsqlDbSystem', 'Remove-OCIPsqlBackup', 'Remove-OCIPsqlConfiguration', 'Remove-OCIPsqlDbSystem', 'Reset-OCIPsqlMasterUserPassword', 'Restart-OCIPsqlDbInstanceInDbSystem', 'Restore-OCIPsqlDbSystem', 'Update-OCIPsqlBackup', 'Update-OCIPsqlConfiguration', 'Update-OCIPsqlDbSystem', 'Update-OCIPsqlDbSystemDbInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Psql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Impersonation.ps1
Impersonation.ps1
$global:ImpContextStack = new-object System.Collections.Generic.Stack[System.Security.Principal.WindowsImpersonationContext]\n$global:IdStack = new-object System.Collections.Generic.Stack[System.Security.Principal.WindowsIdentity]\n\n\n$global:UserToysClass = Add-Type -Namespace Huddled -Name UserToys -MemberDefinition @"\n // http://msdn.microsoft.com/en-us/library/aa378184.aspx\n [DllImport("advapi32.dll", SetLastError = true)]\n public static extern bool LogonUser(string lpszUsername, string lpszDomain, string lpszPassword, int dwLogonType, int dwLogonProvider, ref IntPtr phToken);\n\n // http://msdn.microsoft.com/en-us/library/aa379317.aspx\n [DllImport("advapi32.dll", SetLastError=true)]\n public static extern bool RevertToSelf();\n"@ -passthru\n\n\nfunction Push-ImpersonationContext {\n[CmdletBinding(DefaultParameterSetName="Credential")]\nParam(\n[Parameter(Position=0,Mandatory=$true,ParameterSetName="Credential")]\n[System.Management.Automation.PSCredential]$Credential, \n[Parameter(Position=0,Mandatory=$true,ParameterSetName="Password")]\n[string]$name,\n[Parameter(Position=1,Mandatory=$true,ParameterSetName="Password")]\n$password = (Read-Host "Password" -AsSecureString),\n[Parameter(Position=2,Mandatory=$false,ParameterSetName="Password")]\n[string]$domain\n)\nif(!$Credential) {\n if($password -is [string]) {\n $secure = New-Object System.Security.SecureString\n $password.GetEnumerator() | %{ $secure.AppendChar( $_ ) }\n $password = $secure\n }\n if($domain) {\n $user = "${name}@${domain}"\n }\n $Credential = new-object System.Management.Automation.PSCredential $user, $password\n}\n\n Write-Verbose ([Security.Principal.WindowsIdentity]::GetCurrent() | Format-Table Name, Token, User, Groups -Auto | Out-String)\n\n [IntPtr]$userToken = [Security.Principal.WindowsIdentity]::GetCurrent().Token\n if(!$UserToysClass::LogonUser( \n $Credential.GetNetworkCredential().UserName, \n $Credential.GetNetworkCredential().Domain, \n $Credential.GetNetworkCredential().Password, 9, 0, [ref]$userToken)\n ) {\n throw (new-object System.ComponentModel.Win32Exception( [System.Runtime.InteropServices.Marshal]::GetLastWin32Error() ) )\n }\n\n $identity = New-Object Security.Principal.WindowsIdentity $userToken\n $global:IdStack.Push( $identity )\n \n $context = $Identity.Impersonate()\n $global:ImpContextStack.Push( $context )\n\n Write-Verbose ([Security.Principal.WindowsIdentity]::GetCurrent() | Format-Table Name, Token, User, Groups -Auto | Out-String)\n \n return $global:ImpContextStack.Peek()\n}\n\n\nfunction Pop-ImpersonationContext {\n $context = $global:ImpContextStack.Pop()\n $context.Undo();\n $context.Dispose();\n}\n\nfunction Get-ImpersonationContext {\n Write-Host "There are $($global:ImpContextStack.Count) contexts on the stack"\n $global:ImpContextStack.Peek()\n}
combined_dataset/train/non-malicious/11a7b312-21b4-4faa-8224-35bea9db7f89.ps1
11a7b312-21b4-4faa-8224-35bea9db7f89.ps1
param( [Parameter(Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$true)] [alias("Name","ComputerName")] $Computer = @($env:computername), [string] $NTDomain = ($env:UserDomain), [string[]] $LocalGroups = @("Administrators"), [string[]] $Identities, # can be domain user or group [switch] $Output, [switch] $Add, [switch] $Remove ) begin{ $Global:objReport = @() # list current members in defined group Function ListMembers ($Group){ $members = $Group.psbase.invoke("Members") | %{$_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)} return $members } } process{ if (Test-Connection -ComputerName $Computer -Count 1 -Quiet -EA "Stop"){ foreach ($Group in $LocalGroups){ try{ $tmpComputer = [ADSI]("WinNT://" + $Computer + ",computer") $tmpGroup = $tmpComputer.psbase.children.find($Group) foreach ($User in $(ListMembers $tmpGroup)){ $objOutput = New-Object PSObject -Property @{ Machinename = [string]$Computer GroupName = $Group UserName = $User Action = "Existing" }#end object $Global:objReport+= $objoutput } if ($Identities){ foreach ($User in $Identities){ $Action = "none" If ($Add){ $tmpGroup.Add("WinNT://" + $NTDomain + "/" + $User) $Action = "Added" } If ($Remove){ $tmpGroup.Remove("WinNT://" + $NTDomain + "/" + $User) $Action = "Removed" } $objOutput = New-Object PSObject -Property @{ Machinename = [string]$Computer GroupName = $Group UserName = $User Action = $Action }#end object $Global:objReport+= $objoutput } } } catch{ $continue = $False $objOutput = New-Object PSObject -Property @{ Machinename = [string]$Computer GroupName = $Group UserName = $User Action = $Error[0].Exception.InnerException.Message.ToString().Trim() }#end object $Global:objReport+= $objoutput } } } } end{ $Global:objReport }
combined_dataset/train/non-malicious/3295.ps1
3295.ps1
function Get-PoshBot { [OutputType([PSCustomObject])] [cmdletbinding()] param( [parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [int[]]$Id = @() ) process { if ($Id.Count -gt 0) { foreach ($item in $Id) { if ($b = $script:botTracker.$item) { [pscustomobject][ordered]@{ Id = $item Name = $b.Name State = (Get-Job -Id $b.jobId).State InstanceId = $b.InstanceId Config = $b.Config } } } } else { $script:botTracker.GetEnumerator() | ForEach-Object { [pscustomobject][ordered]@{ Id = $_.Value.JobId Name = $_.Value.Name State = (Get-Job -Id $_.Value.JobId).State InstanceId = $_.Value.InstanceId Config = $_.Value.Config } } } } } Export-ModuleMember -Function 'Get-PoshBot'
combined_dataset/train/non-malicious/sample_29_43.ps1
sample_29_43.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module -Name "$PSScriptRoot\..\..\Common\Helpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\StorageHelpers.psm1" -Force Import-Module -Name "$PSScriptRoot\DscHelper.psm1" Import-Module -Name "$PSScriptRoot\JeaHelper.psm1" <# .Synopsis Generates DSC configuration document(s) for the target node(s), as specified by the Role configuration. Returns the list of the JEA endpoints captured in the configuration. #> function New-JustEnoughAdministrationConfiguration { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$true)] [IO.DirectoryInfo] $ModulesRootPath, [Parameter(Mandatory=$false)] [IO.DirectoryInfo] $MofOutputPath=$null, [Parameter(Mandatory=$false)] [string] $TargetComputerName = 'localhost', [string[]] $TargetImageRole = $Parameters.Configuration.Role.Id, [string[]] $SourceImageRole ) $ErrorActionPreference = 'Stop' if ($MofOutputPath -eq $null) { $MofOutputPath = Join-Path $ModulesRootPath "DSCConfigs\ConfigureJustEnoughAdministration" } Trace-Execution "$($MyInvocation.InvocationName) : BEGIN on $($env:COMPUTERNAME) as $($env:USERDOMAIN)\$($env:USERNAME)" $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $securityInfo = $cloudRole.PublicInfo.SecurityInfo $domainRole = $Parameters.Roles["Domain"].PublicConfiguration $domainName = $domainRole.PublicInfo.DomainConfiguration.DomainName # Get all the roles that have JEA information $RolesToConfigure = $Parameters.Roles.GetEnumerator() | Where-Object { $Parameters.Roles[$_.Name].PublicConfiguration.PublicInfo.JEA } | Foreach-Object { $_.Name } if ($SourceImageRole) { Trace-Execution "Getting list of JEA endpoints defined under the following roles: $($SourceImageRole -join ', ')." $RolesToConfigure = $RolesToConfigure | where { $_ -in $SourceImageRole } } $endpoints = @() foreach($role in $RolesToConfigure) { $configuration = $Parameters.Roles[$role].PublicConfiguration.PublicInfo.JEA.Endpoints.Endpoint # Loop through all the endpoints defined foreach($endpoint in $configuration) { if (!$endpoint.TargetRoles) { if (-not ($TargetImageRole -contains $role)) { continue } } else { $applicable = $endpoint.TargetRoles.TargetRole | Where-Object { $TargetImageRole -contains $_.Id } if (!$applicable) { continue } } $runAsGmsa = $endpoint.RunAsGmsa -and ($endpoint.RunAsGmsa -eq "True") $runAsVirtualAccount = $endpoint.RunAsVirtualAccount -and ($endpoint.RunAsVirtualAccount -eq "True") if ( -not ($runAsGmsa -or $runAsVirtualAccount) ) { Trace-Error "Can not create JEA endpoint '$($endpoint.Name)' since it was marked in configuration as non-GMSA and non-virtual account. This is not currently supported." return } Trace-Execution "Creating JEA Endpoint $($endpoint.Name) for Role $($TargetImageRole -join ', ')" # Define transportation options $transportOption = $null if ($endpoint.TransportOptions) { $transportOption = @{} $endpoint.TransportOptions.GetEnumerator() | foreach { if ([Microsoft.PowerShell.Commands.WSManConfigurationOption].GetProperties().Name.Contains($_.Name)) { $transportOption[$_.Name] = $_.Value } else { throw "Transport Option '$($_.Name)' for JEA endpoint not valid for WSManConfigurationOption" } } $endpoint | Add-Member -MemberType NoteProperty -Name "TransportOption" -Value $transportOption -Force } # Path to the Powershell Modules folder $modulePath = Join-Path $ModulesRootPath "Program Files\WindowsPowerShell\Modules\" # Path where the psrc file will be stored $rcPath = Join-Path $modulePath "JEA\RoleCapabilities" # Create the folder where the RC files will be stored New-Item -Path $rcPath -ItemType Directory -Force | Out-Null $deployLatestVersion = -not($endpoint.AllVersions -and $endpoint.AllVersions -eq "True") # This flag checks if the endpoint gathers its rolecapability configuration from a nuget. # If there is no rc nuget dependency, then conduct the custom configuration $psrcFromNuget = $false $endpointVersion = "" $sourceVersionExtensionList = @() # If the endpoint has nuget defined, copy the contents inside the nuget to the right location. if($endpoint.Nugets) { $clusterName = Get-ManagementClusterName $Parameters $nugets = $endpoint.Nugets.Nuget foreach($nuget in $nugets) { $nugetName = $nuget.Name Trace-Execution "EndpointName: $($endpoint.Name) , NugetName: $nugetName" # Get nuget store location on the library share $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration $libraryShareNugetStorePath = Get-SharePath $Parameters $virtualMachinesRole.PublicInfo.LibraryShareNugetStoreFolder.Path $clusterName $buildLocally = $Parameters.Context.ExecutionContext.BuildVhdLocally -and [bool]::Parse($Parameters.Context.ExecutionContext.BuildVhdLocally) # Use the NuGet store on the file share, unless explicitly told not to (BuildVhdLocally) or the file share is not reachable. $useLibrarySharePath = -not $buildLocally -and (Test-Path $libraryShareNugetStorePath) Trace-Execution "useLibrarySharePath: $useLibrarySharePath" # Collect all versions of the JEA endpoint nugets to support upgrading from an unknown stamp version $getNugetVersionsParams = @{ NugetName = $NugetName MostRecent = $deployLatestVersion } if($useLibrarySharePath) { $getNugetVersionsParams.NugetStorePath = $libraryShareNugetStorePath } $versionList = Get-NugetVersions @getNugetVersionsParams # If version is required, but none are found, throw if ($endpoint.RequiresVersion -and ($versionList.Count -eq 0)) { Trace-Error "Requires version was specified, but no versions were found for endpoint '$($endpoint.Name)'" } # Loop through the list of versions and copy the content and PSRC(if applicable) to the right location foreach($nugetVersion in $versionList) { if ($nuget.PackagedModules -and $nuget.PackagedModules.Path) { # Temporary location where the JEA module source code will be extracted $tempPath = Join-Path -Path ([System.IO.Path]::GetTempPath()) -ChildPath ([System.IO.Path]::GetRandomFileName()) New-Item -Path $tempPath -ItemType Directory -Force | Out-Null try { # Unpack the scripts for the JEA endpoint at a temporary location Trace-Execution "Expand nuget: $nugetName with content from: $($nuget.PackagedModules.Path) to : $tempPath " $expandNugetContentParams = @{ NugetName = $NugetName SourcePath = $nuget.PackagedModules.Path DestinationPath = $tempPath Version = $nugetVersion } if($useLibrarySharePath) { $expandNugetContentParams.NugetStorePath = $libraryShareNugetStorePath } Expand-NugetContent @expandNugetContentParams # Define what the module path will look like and if the path does not exist, create it $targetModulePath = $modulePath if($nuget.PackagedModules.Destination) { $targetModulePath = Join-Path $modulePath $nuget.PackagedModules.Destination if ((Test-Path -Path $targetModulePath) -eq $false) { $null = New-Item -Path $targetModulePath -ItemType Directory -Force } } # Copy content from the temporary path to the target path $copy = @{ Path = "$tempPath\*"; Destination = "$targetModulePath\"; Recurse = $true; Force = $true} if ($nuget.PackagedModules.Filter) { $copy["Filter"] = $nuget.PackagedModules.Filter } Trace-Execution "Copying content from $tempPath to $targetModulePath" try { Copy-Item @copy } catch [System.IO.IOException] { Trace-Execution "I/O exception ignored during copying of existing JEA modules, potentially due to module already being loaded" } } catch { # Printing error message here as Remove-Item occasionally throws errors that mask the original issue. Trace-Execution ($_ | Format-List *) throw } finally { Remove-Item -Recurse $tempPath -Force -ErrorAction SilentlyContinue if (Test-Path $tempPath) { Remove-Item -Recurse $tempPath -Force -ErrorAction Stop } } } # If the RoleCapability is present and has a path value, psrc files will be picked up from the nuget if ($nuget.RoleCapability -and $nuget.RoleCapability.Path) { Trace-Execution "Role Capability for the endpoint is defined in the nuget with path: $($nuget.RoleCapability.Path)" # Recurse over all available versions of the target package # There may be multiple RC files within the nuget, each representing a versioned endpoint. # The customer config will only define one broad endpoint, so need to expand the endpoints # to register by the versioned names. $tempPath = Join-Path -Path ([System.IO.Path]::GetTempPath()) -ChildPath ([System.IO.Path]::GetRandomFileName()) New-Item -Path $tempPath -ItemType Directory -Force | Out-Null $psrcFromNuget = $true try { $expandNugetContentParams = @{ NugetName = $NugetName SourcePath = $nuget.RoleCapability.Path DestinationPath = $tempPath Version = $nugetVersion } if($useLibrarySharePath) { $expandNugetContentParams.NugetStorePath = $libraryShareNugetStorePath } Expand-NugetContent @expandNugetContentParams # Copy each RC file for each whitelist foreach($whiteList in $endpoint.WhiteList) { $copy = @{ Path = "$tempPath\*"; Filter = "$($whiteList.Name)*"; Destination = $rcPath; Recurse = $true; Force = $true } Trace-Execution "Copying content from: $tempPath to: $rcPath with whitelist name: $($whiteList.Name)" Copy-Item @copy Trace-Execution "Get version for the endpoint:$($endpoint.Name)" # If the version is not set yet, pick up the RC file with the name as (endpointName + Version) if ($whiteList.Name -like "$($endpoint.Name)*") { $rcFile = Get-ChildItem -Path $rcPath -Filter "$($whiteList.Name)*" foreach ($whitelistFile in $rcFile) { $roleCapabilityName = [System.IO.Path]::GetFileNameWithoutExtension($whitelistFile.FullName) $endpointVersion = $roleCapabilityName.Substring($whitelist.Name.Length, $roleCapabilityName.Length - $whitelist.Name.Length) if (-not($sourceVersionExtensionList -contains $endpointVersion)) { $sourceVersionExtensionList += $endpointVersion } } } } } catch { # Printing error message here as Remove-Item occasionally throws errors that mask the original issue. Trace-Execution ($_ | Format-List *) throw } finally { Remove-Item -Recurse $tempPath -Force -ErrorAction SilentlyContinue if (Test-Path $tempPath) { Remove-Item -Recurse $tempPath -Force -ErrorAction Stop } } } } } } # Nuget expansion completed # No versions were found, so ensure that at least the non-versioned endpoint is created if([string]::IsNullOrEmpty($endpointVersion)) { $sourceVersionExtensionList = @("") } # As we are done with Nuget expansion, if the PSRC file was not picked up from the nuget, create it. if(-not $psrcFromNuget) { # Simple endpoint from configuration definition, with no versions # Loop through all the whitelists and generate the PSRC files at the desired location. foreach($whiteList in $endpoint.Whitelist) { $RCParams = Get-RoleCapabilityParams($whitelist) Trace-Execution "Role Capabilities for endpoint '$($endpoint.Name)': " Trace-Execution ($RCParams | ConvertTo-Json -depth 3) New-Item -Path $rcPath -ItemType Directory -Force | Out-Null New-PSRoleCapabilityFile -Path "$rcPath\$($whitelist.Name).psrc" @RCParams } } foreach ($endpointVersion in $sourceVersionExtensionList) { # Gather information needed to create the PSSC file and also for registration of JEA endpoint. # Clone the endpoint $e = $endpoint.Clone() # Session configuration $sessionConfigurationArgs = @{ SessionConfig = $endpoint.SessionConfiguration; Endpointname = $endpoint.Name; } # If version was found add it to the name of the endpoint as it will be a versioned endpoint if([string]::IsNullOrEmpty($endpointVersion) -eq $false) { $e.Name = $endpoint.Name + $endpointVersion $sessionConfigurationArgs["Endpointname"] = $e.Name $sessionConfigurationArgs["VersionExtension"] = $endpointVersion } # RunAs accounts if ($runAsGmsa) { $RunAsAccountUser = "$domainName\$($endpoint.RunAsAccountID)" $sessionConfigurationArgs["RunAsAccountUser"] = $RunAsAccountUser $sessionConfigurationArgs["RunAsGmsa"] = $true $e | Add-Member -MemberType NoteProperty -Name "RunAsAccountUser" -Value $RunAsAccountUser -Force } elseif($runAsVirtualAccount) { Trace-Execution "[$($endpoint.Name)] will run under virtual admin account" $e | Add-Member -MemberType NoteProperty -Name "RunAsVirtualAccount" -Value $true -Force $sessionConfigurationArgs["RunAsVirtualAccount"] = $true } else { Trace-Warning "Endpoint $($endpoint.Name) still using non-GMSA credential." $RunAsAccountUser = $securityInfo.DomainUsers.User | ? Role -EQ $endpoint.RunAsAccountID $RunAsAccountCredential = $Parameters.GetCredential($RunAsAccountUser.Credential) Trace-Execution "'Run-As' AccountUser when invoking commands in JEA: $($RunAsAccountCredential.UserName)" # Adding the NoteProperty. This won't get included if endpoint.Clone() is called $e | Add-Member -MemberType NoteProperty -Name "RunAsCredential" -Value $RunAsAccountCredential -Force } $scParams = Get-SessionConfigurationParams @sessionConfigurationArgs $e | Add-Member -MemberType NoteProperty -Name "RoleDefinitions" -Value $scParams.RoleDefinitions -Force if($scParams.TranscriptDirectory) { $e | Add-Member -MemberType NoteProperty -Name "TranscriptDirectory" -Value $scParams.TranscriptDirectory -Force } if($scParams.SessionType) { $e | Add-Member -MemberType NoteProperty -Name "SessionType" -Value $scParams.SessionType -Force } if($scParams.LanguageMode) { $e | Add-Member -MemberType NoteProperty -Name "LanguageMode" -Value $scParams.LanguageMode -Force } $endpoints += $e } } } # If no endpoints are defined, move on. if ($endpoints.Count -eq 0) { Trace-Execution "No endpoints to deploy for role [$TargetImageRole]" return; } # DSC is slow to import at module parse time. Defer import of all DSC configurations until runtime. Import-Module "$PSScriptRoot\JustEnoughAdministrationDSCconfig.psm1" -DisableNameChecking $dscEncryptionCert = GetDscEncryptionCert $ConfigData= @{ AllNodes = @( @{ NodeName = $TargetComputerName CertificateFile = "$env:temp\DscEncryptionPublicKey.cer" ThumbPrint = $dscEncryptionCert.ThumbPrint }; ); } Remove-Item "$MofOutputPath\$TargetComputerName.mof" -Force -ErrorAction SilentlyContinue Trace-Execution "Generating JustEnoughAdministration endpoint MOFs" ConfigureJustEnoughAdministration -ConfigurationData $ConfigData -Endpoints $endpoints -OutputPath $MofOutputPath | Out-Null Trace-Execution "$($MyInvocation.InvocationName) : END on $($env:COMPUTERNAME) as $($env:USERDOMAIN)\$($env:USERNAME)" Trace-Execution "Created configuration for the following endpoints:$([System.Environment]::NewLine)$($endpoints.Name -join [System.Environment]::NewLine)" return $endpoints.Name } Export-ModuleMember New-JustEnoughAdministrationConfiguration # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAgTLD9qWhZhYai # w6RQfdfB1A6Taqh++u2bnWhpsriAO6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKTmW5fBbjaIi8OqGC1G0w2w # OYWhLi3uKL5LB2ng9oiVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAuG6nAn08fjWuEc/GKsffeTd3QVIBqB+cM3x99w6XAvCR11z4/0hLfoP4 # hUke9icE54+MTkbNLZ4iRksypPqBavt3ZyJfAaQ8A9nkeKiXs937A+QdyrI+sQEY # lIFp9sJY9hupPR5LITuUuXhKhdPPYtZFxM8lapGE8YMFQjw2agBQR5jsVXFDH9FQ # E35mPs6LshLYlFGWhbOpzshIdyMNqZbIcwQT6BEtuQ/Ob5LJb6PtWAKQcHlxQYsC # Pt4zRkgoZq0SXvKJpG26Zi1q6v1iipMvdhatpGDcQSee5sgKLgDuanYLTX21NuRR # kXYOCLMfPVlZD3bqzTRo5/PEOPowj6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA9jjZC5NO417O4o6ozsnz3NkJMvtIFTR0lqiIIE9i3UAIGZbqk0RXn # GBMyMDI0MDIxMjE0MDUzMC4yNTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA # 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/ # fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly # OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc # Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgWnc8K3gCgGcUfyvmO+Rek1afwJtm/ac73nbLH6b10F0wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao # MA0GCSqGSIb3DQEBCwUABIICAKXPIGYIE6qQVxsUfLpOe1Pt1yb37jK5esSg0I2g # gbdFUMxoxGFzX0iez68oLoh+c7tCOuNB2bq8uJPmOSkjKojTjLvTVJcxd7yyM0tJ # XBZgCt0IhcHPe6uLVtnRjLzzqPV2BxaL3BM9qrOfZlL2xbG1orI8EcUBt2QTF3an # sd1COUjGwkN1zGRbPodJgcSi1KM4tDJjwyQBXp/FZboyadjqgqIsxIpmzBotjXnO # b8NqE3UzKVNUHifAlJMmYn9+63XNzY/uwplM3IUA6ZM1WrPh/Dah38lnHlh1hrCl # pjXPVnuGRHInq9tKN3CSqIuFlpOVA7MKRc5urKB9Fmcr532iUGouCZf18xNMLnfD # EbOEnuhV1JGSrUGB/gR58EYJAbUCa2Lw2iOung3lRv5rHnr5WjBURRBnkO7aeC5I # P10lOrQg5+nKURetQ4+6bT4tchFvQCUXbiUJ669KVFIhqv/pK1Gd323q4lHi3Eeg # KQLs79cxRejy5LnRFk3sMgXkWcj3N19OT0VpwjXqoBHTYUHidu/xwPGSY/0YMd05 # 6mFmaN/UHKsH1Dy+h0+t6e0JQNLmIxrWzX9PQnqKQoCgGCpTxwfUuykQ45V9KqXJ # Lanu+mWtSuxrw6bAXComhsJzwftBoZumO/Lesq4AlUi8M7HMxUlMcBS7a6uiBjYl # R9wf # SIG # End signature block
combined_dataset/train/non-malicious/3485.ps1
3485.ps1
function Generate-Name([string] $prefix="hdi-ps-test"){ return getAssetName($prefix) } function Generate-StorageAccountName([string] $prefix="psstorage"){ return getAssetName($prefix) } function Create-Cluster{ param( [string] $clusterName="hdi-ps-test", [string] $location="West US", [string] $resourceGroupName="group-ps-test", [string] $clusterType="Spark", [string] $storageAccountName="storagepstest" ) $clusterName=Generate-Name($clusterName) $resourceGroupName=Generate-Name($resourceGroupName) $resourceGroup=New-AzResourceGroup -Name $resourceGroupName -Location $location $storageAccountName=Generate-StorageAccountName($storageAccountName) $storageAccount= New-AzStorageAccount -ResourceGroupName $resourceGroupName -Location $location -Name $storageAccountName -TypeString "Standard_RAGRS" $storageAccountKey=Get-AzStorageAccountKey -ResourceGroupName $resourceGroupName -Name $storageAccountName $storageAccountKey=$storageAccountKey[0].Value $httpUser="admin" $textPassword= "YourPw!00953" $httpPassword=ConvertTo-SecureString $textPassword -AsPlainText -Force $sshUser="sshuser" $sshPassword=$httpPassword $httpCredential=New-Object System.Management.Automation.PSCredential($httpUser, $httpPassword) $sshCredential=New-Object System.Management.Automation.PSCredential($sshUser, $sshPassword) $clusterSizeInNodes=2 $cluster=New-AzHDInsightCluster -Location $location -ResourceGroupName $resourceGroup.ResourceGroupName -ClusterName $clusterName ` -ClusterSizeInNodes $clusterSizeInNodes -ClusterType $clusterType -DefaultStorageAccountName $storageAccountName ` -DefaultStorageAccountKey $storageAccountKey -HttpCredential $httpCredential -SshCredential $sshCredential return $cluster } function Assert-Tags($tags1, $tags2) { if($tags1.count -ne $tags2.count) { throw "Tag size not equal. Tag1: $tags1.count Tag2: $tags2.count" } foreach($key in $tags1.Keys) { if($tags1[$key] -ne $tags2[$key]) { throw "Tag content not equal. Key:$key Tags1:" + $tags1[$key] + "Tags2:" + $tags2[$key] } } } function Assert-CompressionTypes($types1, $types2) { if($types1.Count -ne $types1.Count) { throw "Array size not equal. Types1: $types1.count Types2: $types2.count" } foreach($value1 in $types1) { $found = $false foreach($value2 in $types2) { if($value1.CompareTo($value2) -eq 0) { $found = $true break } } if(-Not($found)) { throw "Compression content not equal. " + $value1 + " cannot be found in second array" } } }
combined_dataset/train/non-malicious/1939.ps1
1939.ps1
$ps = Join-Path -Path $PsHome -ChildPath "pwsh" Describe "Set-PSBreakpoint DRT Unit Tests" -Tags "CI" { $scriptFileName = Join-Path $TestDrive -ChildPath breakpointTestScript.ps1 $scriptFileNameBug = Join-Path -Path $TestDrive -ChildPath SetPSBreakpointTests.ExposeBug154112.ps1 $contents = @" function Hello { `$greeting = 'Hello, world!' write-host `$greeting } function Goodbye { `$message = 'Good bye, cruel world!' write-host `$message } Hello Goodbye `$table = @{} return "@ $contentsBug = @" set-psbreakpoint -variable foo set-psbreakpoint -command foo "@ $contents > $scriptFileName $contentsBug > $scriptFileNameBug It "Should be able to set psbreakpoints for -Line" { $brk = Set-PSBreakpoint -Line 13 -Script $scriptFileName $brk.Line | Should -Be 13 Remove-PSBreakPoint -Id $brk.Id } It "Should be able to set psbreakpoints for -Line and -column" { $brk = set-psbreakpoint -line 13 -column 1 -script $scriptFileName $brk.Line | Should -Be 13 $brk.Column | Should -Be 1 Remove-PSBreakPoint -Id $brk.Id } It "Should be able to set psbreakpoints for -Line and -action" { $brk = set-psbreakpoint -line 13 -action {{ break; }} -script $scriptFileName $brk.Line | Should -Be 13 $brk.Action | Should -Match "break" Remove-PSBreakPoint -Id $brk.Id } It "Should be able to set psbreakpoints for -Line, -column and -action" { $brk = set-psbreakpoint -line 13 -column 1 -action {{ break; }} -script $scriptFileName $brk.Line | Should -Be 13 $brk.Column | Should -Be 1 $brk.Action | Should -Match "break" Remove-PSBreakPoint -Id $brk.Id } It "-script and -line can take multiple items" { $brk = Set-PSBreakpoint -line 11,12,13 -column 1 -script $scriptFileName,$scriptFileName $brk.Line | Should -BeIn 11,12,13 $brk.Column | Should -BeIn 1 Remove-PSBreakPoint -Id $brk.Id } It "-script and -line are positional" { $brk = Set-PSBreakpoint $scriptFileName 13 $brk.Line | Should -Be 13 Remove-PSBreakPoint -Id $brk.Id } It "-script, -line and -column are positional" { $brk = Set-PSBreakpoint $scriptFileName 13 1 $brk.Line | Should -Be 13 $brk.Column | Should -Be 1 Remove-PSBreakPoint -Id $brk.Id } It "Should throw Exception when missing mandatory parameter -line" -Pending { $output = & $ps -noninteractive -command "sbp -column 1 -script $scriptFileName" [system.string]::Join(" ", $output) | Should -Match "MissingMandatoryParameter,Microsoft.PowerShell.Commands.SetPSBreakpointCommand" } It "Should throw Exception when missing mandatory parameter" -Pending { $output = & $ps -noprofile -noninteractive -command "sbp -line 1" [system.string]::Join(" ", $output) | Should -Match "MissingMandatoryParameter,Microsoft.PowerShell.Commands.SetPSBreakpointCommand" } It "Should be able to set psbreakpoints for -command" { $brk = set-psbreakpoint -command "write-host" $brk.Command | Should -BeExactly "write-host" Remove-PSBreakPoint -Id $brk.Id } It "Should be able to set psbreakpoints for -command, -script" { $brk = set-psbreakpoint -command "write-host" -script $scriptFileName $brk.Command | Should -BeExactly "write-host" Remove-PSBreakPoint -Id $brk.Id } It "Should be able to set psbreakpoints for -command, -action and -script" { $brk = set-psbreakpoint -command "write-host" -action {{ break; }} -script $scriptFileName $brk.Action | Should -Match "break" Remove-PSBreakPoint -Id $brk.Id } It "-Command can take multiple items" { $brk = set-psbreakpoint -command write-host,Hello $brk.Command | Should -Be write-host,Hello Remove-PSBreakPoint -Id $brk.Id } It "-Script is positional" { $brk = set-psbreakpoint -command "Hello" $scriptFileName $brk.Command | Should -BeExactly "Hello" Remove-PSBreakPoint -Id $brk.Id $brk = set-psbreakpoint $scriptFileName -command "Hello" $brk.Command | Should -BeExactly "Hello" Remove-PSBreakPoint -Id $brk.Id } It "Should be able to set breakpoints on functions" { $brk = set-psbreakpoint -command Hello,Goodbye -script $scriptFileName $brk.Command | Should -Be Hello,Goodbye Remove-PSBreakPoint -Id $brk.Id } It "Should be throw Exception when Column number less than 1" { { set-psbreakpoint -line 1 -column -1 -script $scriptFileName } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.SetPSBreakpointCommand" } It "Should be throw Exception when Line number less than 1" { $ErrorActionPreference = "Stop" { set-psbreakpoint -line -1 -script $scriptFileName } | Should -Throw -ErrorId "SetPSBreakpoint:LineLessThanOne,Microsoft.PowerShell.Commands.SetPSBreakpointCommand" $ErrorActionPreference = "SilentlyContinue" } It "Remove implicit script from 'set-psbreakpoint -script'" { & $ps -noprofile $scriptFileNameBug $breakpoint = Get-PSBreakpoint -Script $scriptFileNameBug $breakpoint | Should -BeNullOrEmpty } It "Fail to set psbreakpoints when script is a file of wrong type" { $tempFile = [System.IO.Path]::GetTempFileName() $ErrorActionPreference = "Stop" { Set-PSBreakpoint -Script $tempFile -Line 1 } | Should -Throw $ErrorActionPreference = "SilentlyContinue" Remove-Item $tempFile -Force } It "Fail to set psbreakpoints when script file does not exist" { $ErrorActionPreference = "Stop" ${script.ps1} = 10 { Set-PSBreakpoint -Script variable:\script.ps1 -Line 1 } | Should -Throw $ErrorActionPreference = "SilentlyContinue" } Remove-Item -Path $scriptFileName -Force Remove-Item -Path $scriptFileNameBug -Force } Describe "Set-PSBreakpoint" -Tags "CI" { $testScript = Join-Path -Path $PSScriptRoot -ChildPath psbreakpointtestscript.ps1 "`$var = 1 " > $testScript It "Should be able to set a psbreakpoint on a line" { $lineNumber = 1 $brk = Set-PSBreakpoint -Line $lineNumber -Script $testScript $brk.Line | Should -Be $lineNumber Remove-PSBreakPoint -Id $brk.Id } It "Should throw when a string is entered for a line number" { { $lineNumber = "one" Set-PSBreakpoint -Line $lineNumber -Script $testScript } | Should -Throw } It "Should be able to set a psbreakpoint on a Command" { $command = "theCommand" $brk = Set-PSBreakpoint -Command $command -Script $testScript $brk.Command | Should -Be $command Remove-PSBreakPoint -Id $brk.Id } It "Should be able to set a psbreakpoint on a variable" { $var = "theVariable" $brk = Set-PSBreakpoint -Command $var -Script $testScript $brk.Command | Should -Be $var Remove-PSBreakPoint -Id $brk.Id } Remove-Item -Path $testScript }
combined_dataset/train/non-malicious/3202.ps1
3202.ps1
function New-SqlConnection { [cmdletbinding()] [OutputType([System.Data.SqlClient.SQLConnection])] param( [Parameter( Position=0, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false, HelpMessage='SQL Server Instance required...' )] [Alias( 'Instance', 'Instances', 'ComputerName', 'Server', 'Servers' )] [ValidateNotNullOrEmpty()] [string[]] $ServerInstance, [Parameter( Position=1, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false)] [string] $Database, [Parameter( Position=2, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [System.Management.Automation.PSCredential] $Credential, [Parameter( Position=3, Mandatory=$false, ValueFromRemainingArguments=$false)] [switch] $Encrypt, [Parameter( Position=4, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [Int32] $ConnectionTimeout=15, [Parameter( Position=5, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [bool] $Open = $True ) Process { foreach($SQLInstance in $ServerInstance) { Write-Verbose "Querying ServerInstance '$SQLInstance'" if ($Credential) { $ConnectionString = "Server={0};Database={1};User ID={2};Password={3};Trusted_Connection=False;Connect Timeout={4};Encrypt={5}" -f $SQLInstance,$Database,$Credential.UserName,$Credential.GetNetworkCredential().Password,$ConnectionTimeout,$Encrypt } else { $ConnectionString = "Server={0};Database={1};Integrated Security=True;Connect Timeout={2};Encrypt={3}" -f $SQLInstance,$Database,$ConnectionTimeout,$Encrypt } $conn = New-Object System.Data.SqlClient.SQLConnection $conn.ConnectionString = $ConnectionString Write-Debug "ConnectionString $ConnectionString" if ($PSBoundParameters.Verbose) { $conn.FireInfoMessageEventOnUserErrors=$true $handler = [System.Data.SqlClient.SqlInfoMessageEventHandler] { Write-Verbose "$($_)" } $conn.add_InfoMessage($handler) } if($Open) { Try { $conn.Open() } Catch { Write-Error $_ continue } } write-Verbose "Created SQLConnection:`n$($Conn | Out-String)" $Conn } } }
combined_dataset/train/non-malicious/73cbcdc1-9397-4ed2-99e3-b043b8c53905.ps1
73cbcdc1-9397-4ed2-99e3-b043b8c53905.ps1
# 1. Create a simple customizations spec: $custSpec = New-OSCustomizationSpec -Type NonPersistent -OSType Windows -OrgName “My Organization” -FullName “MyVM” -Domain “MyDomain” –DomainAdminUsername “user” –DomainAdminPassword “password” # 2. Modify the default network customization settings: $custSpec | Get-OSCustomizationNicMapping | Set-OSCustomizationNicMapping -IpMode UseStaticIP -IpAddress 192.168.121.228 -SubnetMask 255.255.248.0 -Dns 192.168.108.1 -DefaultGateway 192.168.108.1 # 3. Deploy a VM from a template using the newly created customization: New-VM -Name “MyNewVM” -Template $template -VMHost $vmHost -OSCustomizationSpec $custSpec
combined_dataset/train/non-malicious/723.ps1
723.ps1
function Get-RsFolderContent { [cmdletbinding()] param( [Alias('ItemPath', 'Path')] [Parameter(Mandatory = $True, ValueFromPipeline = $true)] [string[]] $RsFolder, [switch] $Recurse, [string] $ReportServerUri, [Alias('ReportServerCredentials')] [System.Management.Automation.PSCredential] $Credential, $Proxy ) Begin { $Proxy = New-RsWebServiceProxyHelper -BoundParameters $PSBoundParameters } Process { foreach ($item in $RsFolder) { try { $Proxy.ListChildren($Item, $Recurse) } catch { throw } } } } New-Alias -Name "Get-RsCatalogItems" -Value Get-RsFolderContent -Scope Global New-Alias -Name "Get-RsChildItem" -Value Get-RsFolderContent -Scope Global New-Alias -Name "rsdir" -Value Get-RsFolderContent -Scope Global
combined_dataset/train/non-malicious/sample_0_16.ps1
sample_0_16.ps1
#************************************************ # DC_WinHTTP-Component.ps1 # Version 1.0 # Version 1.1: Moved $sectionDescription to the correct location. # Date: 2009-2014 # Author: Boyd Benson (bbenson@microsoft.com) # Description: Collects information about WinHTTP. # Called from: Main Networking Diag, PKI Interactive Diag, WebClient Interactive Diag #******************************************************* Trap [Exception] { # Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ "[info]: Exception occurred." | WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut $Error.Clear() continue # later use return to return the exception message to an object: return $Script:ExceptionMessage } Import-LocalizedData -BindingVariable ScriptVariable Write-DiagProgress -Activity $ScriptVariable.ID_CTSWinHTTP -Status $ScriptVariable.ID_CTSWinHTTPDescription $sectionDescription = "WinHTTP" #os version $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber function RunNetSH ([string]$NetSHCommandToExecute="") { Write-DiagProgress -Activity $ScriptVariable.ID_CTSWinHTTP -Status "netsh $NetSHCommandToExecute" $NetSHCommandToExecuteLength = $NetSHCommandToExecute.Length + 6 "`n`n`n" + "-" * ($NetSHCommandToExecuteLength) + "`r`n" + "netsh $NetSHCommandToExecute" + "`r`n" + "-" * ($NetSHCommandToExecuteLength) | Out-File -FilePath $OutputFile -append $CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFile " RunCmD -commandToRun $CommandToExecute -CollectFiles $false } #WV, WS2008+ if ($bn -gt 6000) { #----------Netsh $OutputFile = $ComputerName + "_WinHTTP_netsh_proxy-settings.txt" RunNetSH -NetSHCommandToExecute "winhttp show proxy" CollectFiles -filesToCollect $OutputFile -fileDescription "WinHTTP proxy settings" -SectionDescription $sectionDescription } else #XP, WS2003 { #----------ProxyCfg $OutputFile = $ComputerName + "_WinHTTP_proxycfg.txt" $CommandToExecute = "cmd.exe /c proxycfg.exe >> $OutputFile" RunCmD -commandToRun $CommandToExecute -CollectFiles $false CollectFiles -filesToCollect $OutputFile -fileDescription "WinHTTP-proxy-settings_proxycfg" -SectionDescription $sectionDescription } #----------Registry $OutputFile= $Computername + "_WinHTTP_reg_output.TXT" $CurrentVersionKeys = "HKLM\System\CurrentControlSet\Services\WinHttpAutoProxySvc" RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "WinHTTP registry output" -SectionDescription $sectionDescription # Commented this out from the reg output for WinHTTP: "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" # Look at the InternetExplorer registry output file. # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvLbAQ2H2qUV38 # tyrfvWMWSoCueRzxL9AgQ1aRDjuYc6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEO8GJEXri0oGH6N7X+6Oo/j # OrUvS1PwhDxCAJgqyniDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAd0Fd16Mcw8DA0EA5wZVgxPxrXvaltC8T9j1ToPLmTPu0iDiprQy1uzHg # SHsvlVSbu699VIIwTKX7ofdmAGKuQQv8Oymx66zFaO4ns40kH9/mktD9voxb9Iwm # yCEeJS7R7mAzTOHVST6cj3GTo/xzhyAeXlQeHak+jHcTJ8MDTvApMHDkz3uZ3Td2 # t036USB/jTx132y+qM6CCcY5AcAcAhNxKWQMAHLhTjoeqxSFFmUaX4MgGP7zscNi # 0iXd+lxz7LXwWhZdScI0bV8CTFj1fvWICm8Xk/Y+hkpjbnOUD9CHUB9tMgWvN0/A # si5XjJfFfnno7elydX8VjBiYPovOh6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBkd2DTrvBFl/HkOeCX1csonXwr+Qui5TDGOm3gj8pliwIGZus6esox # GBMyMDI0MTAyODExNDA0Ni40MDVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT # j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt # gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh # 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY # X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd # F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI # J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc # QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry # 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn # Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5 # olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+ # Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ # I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf # hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI # hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut # Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8 # cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo # riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt # g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A # W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm # Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe # bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w # MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9 # YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0MTAyOTA4MjgwN1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEAAgIIXjAHAgEAAgITcTAK # AgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAZdq+OU23EaUch # wQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2DewxIzsFz1t8ELbs/7V+b+lL # Z25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh84y9kT8c5HUYL5kF2NJiq # gHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e72AvfpKtUZO94WfnvRVAu # 4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpUqnrIVhOqTZE0I5GJiVJy # dAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGEu6OFzH+g6bBiUu/Bsmlo # dM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgLn4NX4pcD37N # keXLdlHORX0LtrWDA7bd0KDZoKCvp3MwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEAAAH5 # MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkHB7rdMA0GCSqGSIb3DQEB # CwUABIICAFy7ohPs0eboBHbZWtSh6tr2np1RcU41fwKQuORzFPG/3L3vdwOOeri/ # GM/AHt0a7w71+hAJ6lQV27AuuaHKA6Z7weaQOc8a9U8/gqOiD2Lov0eVuUEXdcxD # s/lIyTtENvQ2CeQAdgv0X+x4fkdUZmFRKIPWac6Q7MIV1av3DO3k6ZFS+AiVFiQJ # mI5bzXYW3NRcnNeAhZ84uzUO6Kr6fvlV1d1uePtgfzBsGFD2B+QWfa89F+Dp70iz # Ejwbo6WPpWxwjVsLMXqlsblcCp9IhxCA/qE4qLmiCl2rQfs2RosB24pgVUuzBBdB # dyGMQzLMI6PMDyxqNf8rPGwfilMMfBuCR0t/VswRBnOm9iCElFECLwrFklmZJAV9 # TMAOy8g/pizT5Y2CKyHQRNzho88nnT3iXA9QxMTtmQnq3V3LicSSxWEAZJ8dobSd # krNebbFUtmkVlIu7hpIVNvPPtxFtGMI58X4sTOWtoYhc4hOFBBuchmQD9kejuvmh # KBD6fsJlB65AKE6XkowP5XnTxfDnuGXhK2jI3ymoBm9KJ2qdoFUJWytc0X9GpvIx # hXc2+xGsWl9KV07MlRwEAfqIXP2cI4VLwFR+B3YgQ67j8mxzbezqPXsOJAWT4MKb # p7/lHgDE3JI9fgU/fAgD67bc7ZPAb8tIvsYpTcqiNKnfCH3l3bZI # SIG # End signature block
combined_dataset/train/non-malicious/2174.ps1
2174.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, ParameterSetName="Single", HelpMessage="Site server where the SMS Provider is installed")] [parameter(ParameterSetName="All")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer, [parameter(Mandatory=$true, ParameterSetName="Single", HelpMessage="Specify a single or set of apps you'd like to create")] [ValidateNotNullOrEmpty()] [ValidateSet("Word","Excel","PowerPoint","OneDrive","Outlook","OneNote","OfficeMobile")] [string[]]$AppName, [parameter(Mandatory=$true, ParameterSetName="All", HelpMessage="Create an application for all of the Microsoft Office apps")] [ValidateNotNullOrEmpty()] [switch]$All ) Begin { try { Write-Verbose -Message "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug -Message "SiteCode: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine SiteCode" ; break } try { $SiteDrive = $SiteCode + ":" Import-Module -Name ConfigurationManager -ErrorAction Stop -Verbose:$false } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { try { Import-Module (Join-Path -Path (($env:SMS_ADMIN_UI_PATH).Substring(0,$env:SMS_ADMIN_UI_PATH.Length-5)) -ChildPath "\ConfigurationManager.psd1") -Force -ErrorAction Stop -Verbose:$false if ((Get-PSDrive $SiteCode -ErrorAction SilentlyContinue -Verbose:$false | Measure-Object).Count -ne 1) { New-PSDrive -Name $SiteCode -PSProvider "AdminUI.PS.Provider\CMSite" -Root $SiteServer -ErrorAction Stop -Verbose:$false } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "$($_.Exception.Message) $($_.InvocationInfo.ScriptLineNumber)" ; break } } $AppLinksTable = @{ "AndroidWord" = "https://play.google.com/store/apps/details?id=com.microsoft.office.word&hl=en" "iOSWord" = "https://itunes.apple.com/us/app/microsoft-word/id586447913?mt=8" "AndroidExcel" = "https://play.google.com/store/apps/details?id=com.microsoft.office.excel&hl=en" "iOSExcel" = "https://itunes.apple.com/us/app/microsoft-excel/id586683407?mt=8" "AndroidPowerPoint" = "https://play.google.com/store/apps/details?id=com.microsoft.office.powerpoint&hl=en" "iOSPowerPoint" = "https://itunes.apple.com/us/app/microsoft-powerpoint/id586449534?mt=8" "AndroidOneDrive" = "https://play.google.com/store/apps/details?id=com.microsoft.skydrive&hl=en" "iOSOneDrive" = "https://itunes.apple.com/us/app/onedrive-cloud-storage-for/id477537958?mt=8" "AndroidOutlook" = "https://play.google.com/store/apps/details?id=com.microsoft.office.outlook&hl=en" "iOSOutlook" = "https://itunes.apple.com/us/app/microsoft-outlook/id951937596?mt=8" "AndroidOfficeMobile" = "https://play.google.com/store/apps/details?id=com.microsoft.office.officehub&hl=en" "iOSOneNote" = "https://itunes.apple.com/us/app/microsoft-onenote-lists-handwriting/id410395246?mt=8" } $AppNameTable = @{ "Word" = "Word" "Excel" = "Excel" "PowerPoint" = "PowerPoint" "OneDrive" = "OneDrive" "Outlook" = "Outlook" "OneNote" = "OneNote" "OfficeMobile" = "Office Mobile" } Set-Location -Path $SiteDrive -ErrorAction Stop -Verbose:$false } Process { if ($All) { $AppName = @("Word","Excel","PowerPoint","OneDrive","Outlook","OneNote","OfficeMobile") } foreach ($App in $AppName) { Write-Verbose -Message "Determining store links for app '$($App)'" $AppLinks = $AppLinksTable.GetEnumerator() | Where-Object { $_.Key -match $App } $AndroidAppLink = $AppLinks | Where-Object { $_.Key -match "Android" } | Select-Object -ExpandProperty Value $iOSAppLink = $AppLinks | Where-Object { $_.Key -match "iOS" } | Select-Object -ExpandProperty Value $ApplicationName = $AppNameTable.GetEnumerator() | Where-Object { $_.Key -eq $App } | Select-Object -ExpandProperty Value try { $ApplicationName = "Microsoft " + $ApplicationName $ApplicationPublisher = "Microsoft" $ApplicationArguments = @{ Name = $ApplicationName Publisher = $ApplicationPublisher ReleaseDate = (Get-Date) LocalizedApplicationName = $ApplicationName ErrorAction = "Stop" Verbose = $false } Write-Verbose -Message "Starting to create application '$($ApplicationName)' with deployment types" New-CMApplication @ApplicationArguments | Out-Null Write-Verbose -Message "Successfully created application '$($ApplicationName)'" if ($AndroidAppLink -ne $null) { $DeploymentTypeName = $ApplicationName + " - App Package for Android from Google Play" $AndroidDeploymentTypeArguments = @{ ApplicationName = $ApplicationName DeploymentTypeName = $DeploymentTypeName AndroidGooglePlayInstaller = $true InstallationFileLocation = $AndroidAppLink ErrorAction = "Stop" Verbose = $false } Add-CMDeploymentType @AndroidDeploymentTypeArguments Write-Verbose -Message "Successfully created Android deployment type '$($DeploymentTypeName)' for application '$($ApplicationName)'" } if ($iOSAppLink -ne $null) { $DeploymentTypeName = $ApplicationName + " - App Package for iOS from App Store" $iOSDeploymentTypeArguments = @{ ApplicationName = $ApplicationName DeploymentTypeName = $DeploymentTypeName IosAppStoreInstaller = $true InstallationFileLocation = $iOSAppLink ErrorAction = "Stop" Verbose = $false } Add-CMDeploymentType @iOSDeploymentTypeArguments Write-Verbose -Message "Successfully created iOS deployment type '$($DeploymentTypeName)' for application '$($ApplicationName)'" } } catch [System.Exception] { Write-Warning -Message $_.Exception.Message } } } End { Set-Location -Path $PSScriptRoot }
combined_dataset/train/non-malicious/1367.ps1
1367.ps1
function ConvertTo-CInheritanceFlag { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [Carbon.Security.ContainerInheritanceFlags] [Alias('ContainerInheritanceFlags')] $ContainerInheritanceFlag ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $Flags = [Security.AccessControl.InheritanceFlags] $map = @{ 'Container' = $Flags::None; 'SubContainers' = $Flags::ContainerInherit; 'Leaves' = $Flags::ObjectInherit; 'ChildContainers' = $Flags::ContainerInherit; 'ChildLeaves' = $Flags::ObjectInherit; 'ContainerAndSubContainers' = $Flags::ContainerInherit; 'ContainerAndLeaves' = $Flags::ObjectInherit; 'SubContainersAndLeaves' = ($Flags::ContainerInherit -bor $Flags::ObjectInherit); 'ContainerAndChildContainers' = $Flags::ContainerInherit; 'ContainerAndChildLeaves' = $Flags::ObjectInherit; 'ContainerAndChildContainersAndChildLeaves' = ($Flags::ContainerInherit -bor $Flags::ObjectInherit); 'ContainerAndSubContainersAndLeaves' = ($Flags::ContainerInherit -bor $Flags::ObjectInherit); 'ChildContainersAndChildLeaves' = ($Flags::ContainerInherit -bor $Flags::ObjectInherit); } $key = $ContainerInheritanceFlag.ToString() if( $map.ContainsKey( $key) ) { return $map[$key] } Write-Error ('Unknown Carbon.Security.ContainerInheritanceFlags enumeration value {0}.' -f $ContainerInheritanceFlag) } Set-Alias -Name 'ConvertTo-InheritanceFlags' -Value 'ConvertTo-CInheritanceFlag'
combined_dataset/train/non-malicious/sample_0_19.ps1
sample_0_19.ps1
@{ GUID = "A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author = "PowerShell" CompanyName = "Microsoft Corporation" Copyright = "Copyright (c) Microsoft Corporation." ModuleVersion = "7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion = "3.0" FunctionsToExport = @() CmdletsToExport = "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage" AliasesToExport = @() NestedModules = "Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWNhoZaJT5e8B1 # Q5H12dpK/1OtcJflTmkUj5T5DHeB1KCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII6raYMkfTa+0mZhw9hnCu1d # zwZDXcInd9yxKhuSWdG7MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAcSY2M36DPhx3ZSwPbWOQsZPOhWDCMg1czUOgnK/2pUNGyYgR6VcvFRib # 35rHXvwvj0BU2kzD6b/q4YREjNyBHeBSM5lD+NGb74k9bO8NbDKQ2eUr/xvoNtCr # THwrOnCsq7/B2qJfYaptVCWDkkiTF5sh7hsKzITC+pTT1x2Wog3UtTgsH67Sj1kY # j35e3DVPIGopgQQ/rjVGMQcMLHlNawYMW/i2iXs46Wt5Ns5jfdN0KqoEtCr386yS # x+ZeGCWeSK/0AQPakW216cJs7xo7I3jFHEQ6ixP9DGw1J45knHSxP0/fPmlXbljk # FMwvfzq+CYrgQHBQ0jp176J65foLs6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDRcqYLfGMzX91Dl5/K5Da/y9SM2INaoRIheu6dEgM0HAIGZwf/oHmE # GBMyMDI0MTAxNjE1MjgzMy45ODFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rm93DAiGA8yMDI0MTAxNjA0MjE0 # OFoYDzIwMjQxMDE3MDQyMTQ4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqub3c # AgEAMAoCAQACAhWPAgH/MAcCAQACAhNyMAoCBQDquw9cAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBACbJPRmIdE3WH1e57OYJ8eFfsWWTi/YXUdV83U5CZtOS # AT6Fp/tIe3Npo2sHXIHAV7q5+deIIsTzIppKrue349SQ7W2wwNggNLY+MMJpRyT7 # Z5w/WpEgAzZCZQMOzH9TrEs1QQiNQxMNip/ArKuiZydCnN2lpno6WR8AFUB4sBDI # r/lyChJEjnNFXJZv1n2yX3o9vKtBiCQLrdf/M+1MhxBX3eTDKBsmIleEC7Vwmu/W # BmiYgoraqVWsojYgmuUo2M+OGVOTyamb1Tq3BZll3I1vcySiHyHMHQfZM3cN1Mw/ # eMNII+HFu/eW1ZN6PlO+Z1enQzzQ3CfW1MCcEEoK6rYxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCEhPDMN+n6iKM3D5APTAhygj4BUybp6cmF5i5eeT/o # ajCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQg63C7e/ZiDyhwIXuZIZxhp/gw # jbHP1Li08qLFXSPFeH4wDQYJKoZIhvcNAQELBQAEggIALAkaaOwEFnyorE1qn1jq # bCKMFyq//Dud3aq4H5AEUnlANQ4oym9G7p8vXhgmYoAJQt/LXmrpPVYGb5LIJ+Mo # W4zXZ8JpcU2CFVExPoke1sMwZBkWvpT5YxBrQt1MDVB5KxXzMkTQBQQxlnjVycBA # XfwO46HXYVEuNU38ljONCfsMEp4O52Z2M/H9nHyhpgniopb5Mofd3xrrE89a+VgK # ivRaVockUegOvCfGSCLiYnvZcRKkHGmJxreWVU0gaUUj3bbmrINcpo3fwyC1Eig1 # Mu5zc1cHrRhBEtnv6Jc5zBZc7UqLdCHYuZq/lnU2OGFo6Wl+bR+Lehc92uDWBJfo # 8Dmul1sQz87Np9P+uIbJpc+z6unRNnLLqiFT8IZSHOBxJSu670Ez0mtO3bLb8KWN # CraTzIgQm0UGHjJLJyoyJFYCBv3Xi0lFTnC7TiQLcGiCQSxU+BiZkoEl23aQ+KPP # bWJ1WyjaEwtLOS7jUPMs/1xhzPvCZ3zKN+hjRDn0aiHzC2sR6TWdzcguKMzWdb4X # wm+2ONyeVbkE+gZt9Gs3ysQiWy35Vamt/aAj5v5bVzRVASPsVurRotRz0kde2uBJ # vcdXI6g6e4ubU7ccwjSLroZueJS0nTNk3Upo/qIbVtHk5EMW17Wx92ImgxJIkXXt # JDA59zg9Qop1yFIK65McnWU= # SIG # End signature block
combined_dataset/train/non-malicious/2051.ps1
2051.ps1
try { $defaultParamValues = $PSdefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = ![System.Management.Automation.Platform]::IsWindowsDesktop Describe 'Basic COM Tests' -Tags "CI" { BeforeAll { $null = New-Item -Path $TESTDRIVE/file1 -ItemType File $null = New-Item -Path $TESTDRIVE/file2 -ItemType File $null = New-Item -Path $TESTDRIVE/file3 -ItemType File } It "Should enumerate files from a folder" { $shell = New-Object -ComObject "Shell.Application" $folder = $shell.Namespace("$TESTDRIVE") $items = $folder.Items() $items.Count | Should -Be 3 $items | Measure-Object | ForEach-Object Count | Should -Be $items.Count $names = $items | ForEach-Object { $_.Name } $names -join "," | Should -Be "file1,file2,file3" } It "Should enumerate IEnumVariant interface object without exception" { $shell = New-Object -ComObject "Shell.Application" $folder = $shell.Namespace("$TESTDRIVE") $items = $folder.Items() $enumVariant = $items._NewEnum() $items.Count | Should -Be 3 $enumVariant | Measure-Object | ForEach-Object Count | Should -Be $items.Count } It "Should enumerate drives" { $fileSystem = New-Object -ComObject scripting.filesystemobject $drives = $fileSystem.Drives $drives | Measure-Object | ForEach-Object Count | Should -Be $drives.Count $element = $drives | Select-Object -First 1 [System.Object]::ReferenceEquals($element, $drives) | Should -BeFalse $element | Should -Be $drives.Item($element.DriveLetter) } It "ToString() should return method paramter names" { $shell = New-Object -ComObject "Shell.Application" $fullSignature = $shell.AddToRecent.ToString() $fullSignature | Should -BeExactly "void AddToRecent (Variant varFile, string bstrCategory)" } } Describe 'GetMember/SetMember/InvokeMember binders should have more restricted rule for COM object' -Tags "CI" { BeforeAll { if ([System.Management.Automation.Platform]::IsWindowsDesktop) { $null = New-Item -Path $TESTDRIVE/bar -ItemType Directory -Force $shell = New-Object -ComObject "Shell.Application" $folder = $shell.Namespace("$TESTDRIVE") $item = $folder.Items().Item(0) $item = [psobject]::AsPSObject($item) $str = Add-Member -InputObject "abc" -MemberType NoteProperty -Name Name -Value "Hello" -PassThru $str = Add-Member -InputObject $str -MemberType ScriptMethod -Name Windows -Value { "Windows" } -PassThru } } It "GetMember binder should differentiate PSObject that wraps COM object from other PSObjects" { $entry1 = ($item, "bar") $entry2 = ($str, "Hello") foreach ($pair in ($entry1, $entry2, $entry2, $entry1, $entry1, $entry2)) { $pair[0].Name | Should -Be $pair[1] } } It "SetMember binder should differentiate PSObject that wraps COM object from other PSObjects" { $entry1 = ($item, "foo") $entry2 = ($str, "World") foreach ($pair in ($entry1, $entry2)) { $pair[0].Name = $pair[1] $pair[0].Name | Should -Be $pair[1] } } It "InvokeMember binder should differentiate PSObject that wraps COM object from other PSObjects" { $shell | ForEach-Object { $_.Windows() } > $null $str.Windows() | Should -Be "Windows" } } } finally { $global:PSdefaultParameterValues = $defaultParamValues }
combined_dataset/train/non-malicious/sample_38_36.ps1
sample_38_36.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for AzureFunctionEventSubscriptionDestination. .Description Create an in-memory object for AzureFunctionEventSubscriptionDestination. .Outputs Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.AzureFunctionEventSubscriptionDestination .Link https://learn.microsoft.com/powershell/module/Az.EventGrid/new-azeventgridazurefunctioneventsubscriptiondestinationobject #> function New-AzEventGridAzureFunctionEventSubscriptionDestinationObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.AzureFunctionEventSubscriptionDestination')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="Delivery attribute details.")] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.IDeliveryAttributeMapping[]] $DeliveryAttributeMapping, [Parameter(HelpMessage="Maximum number of events per batch.")] [int] $MaxEventsPerBatch, [Parameter(HelpMessage="Preferred batch size in Kilobytes.")] [int] $PreferredBatchSizeInKilobyte, [Parameter(HelpMessage="The Azure Resource Id that represents the endpoint of the Azure Function destination of an event subscription.")] [string] $ResourceId ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.AzureFunctionEventSubscriptionDestination]::New() if ($PSBoundParameters.ContainsKey('DeliveryAttributeMapping')) { $Object.DeliveryAttributeMapping = $DeliveryAttributeMapping } if ($PSBoundParameters.ContainsKey('MaxEventsPerBatch')) { $Object.MaxEventsPerBatch = $MaxEventsPerBatch } if ($PSBoundParameters.ContainsKey('PreferredBatchSizeInKilobyte')) { $Object.PreferredBatchSizeInKilobyte = $PreferredBatchSizeInKilobyte } if ($PSBoundParameters.ContainsKey('ResourceId')) { $Object.ResourceId = $ResourceId } return $Object } } # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDJ/HRl/pcNG9tx # r2sYgcPGHMjM8SHhUtlhBmCVQ3az7qCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILs3 # OfcueNdNms06yRTsOdZii2VCrOQR4gFMq8R478U1MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAwP8EcG3ICDaHwFPU/hIcPhULebYeZc+20tiC # sJPInb0bMUFwHGLVcZ335cMdufkFxeTtUKwmdidCThqjVi1dW4Vjx2lvWbNmnTv1 # 4/4QUpXeirUb6a8fYhG3M5uMhgBX8CNK/ntq5Fg7ZYAJUqi9F/9cDRX6AW4xewxL # 2bO9clnL5xaKvKP+WV7fQLmZ3u6kqd8psRfYnfFbyqDM6qDRsl5grMzwiu9/uomh # XbqKbsvsuzKwop4YsI1IOtw1dQMvp2077LO1H4K/EWBi62ARlf2zvy9USzw2I5Dj # ktORDP2H/igUWvSTZ1/mDVIalIhI3VlliAIgAj8xd+JQgyxFcqGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDzLZ0U3zcmFIGHL/eRLGRX80S/g0/F47b+ # D+Zfv25v7wIGZjK/uv0+GBMyMDI0MDUxNjA2NDIxNS42NDlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QAB # AAAB6zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaF # BuYbNc7hSKmktvJ15NrB/DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB # 3huvv91fZuUugIsKTnAvg2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG # 4cxKgcDAinihT8xroJWVATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARu # Co3TiRGjM2Lp4piT2lD5hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojT # dFLL5vJ9IAogWf3XAu3d7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrC # NL+Tmi/jalRto/J6bh4fPhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TY # jMPbYqG8y5xz+gI/SFyj+aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1X # b6hM5HIWA0jEAZhKEyd5hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6 # rUhudfI7k8L9KKCEufRbK5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjo # W3qs7JRMZmH9fkFkMzb6YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidV # tNqiZeWWpVjfavR+Jj/JOQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu # 4qT9O5jT2B+qAerhMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VW # ZP3+W87c/QbdbWK0sOt9Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8 # WHgDOvbwqdqsLUaM4NrertI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd # 5Bg3CWknV3uvVau14F55ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbe # I2IDqRxC4xBbRiNQ+1qHXDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXio # LVYo/2Hkyow6dI7uULJbKxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1R # VHcQtkUE7W9zxZqZ6/jPmaojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawp # azLBv997LRB0ZObNckJYyQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+ # 9dy6nmcCrVcOqbQHX7Zr8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50 # w+JoTxISQq7vBij2nitAsSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvD # Zo365vLOozmQOe/Z+pu4vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltU # dsi3HjNnieuE72fT4eWhxtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCABol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e+yJzAi # GA8yMDI0MDUxNTIyMTM1OVoYDzIwMjQwNTE2MjIxMzU5WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDp77InAgEAMAoCAQACAg1NAgH/MAcCAQACAhOWMAoCBQDp8QOn # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAHCnhFbmbeVzAdufubxJw21+ # OUGoMjMtV5gAZzlaCHmP06eYOxW6O50YnbqfT4imgRtCwH+ySn2yVAcmznvGlfNG # nWrXnSqfT4cjn/+JtKTFN+lXdzfFR1Vwz+ElWWWqXiOtEVjI5JIqJElAPv5hYjbo # /b7brk6Njql5l0C+JwNvUKPqQm9IIxJXSJCM/j3d8rpyuY2MNSPLbcUqb4PG7RdE # 3ftTsY3OXlDZ7pyrXX8yrpiNHVZNkaCNcEgytddDm2hd4/ufH0N4VS+kGE7r7zsC # 37NqH79aZD3x88EyPrv8tbJPT2jjcegyYGT5w0JtmtRs3Un9Fy7RyoYCqOtqFr8x # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AevgGGy1tu847QABAAAB6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCIaFY6PEvdIZhA2up5snUU # EB0JOifOCp9nsijO4xpswjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63 # a75faQPhf8SBDTtk2DSUgIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgFQYK # a0qu0Agk/s32XTBaBFn1G5TGB2JN7X/xKAq/lzUwDQYJKoZIhvcNAQELBQAEggIA # SJMEyGQ/LgZz1o0znrlZjPCBMNR6X5x7udDfE3nPrfjPy34X/qSQnaqEwaoddxBl # LbD8Gt0zUpr8nmyDGM99TlkSbRxVHsRfWnK4+NeXW4laLFcKDr/uK9nDaPXVjzma # X0Hs2JMttDVW59EklzyS744pf5YKHzm/gwHSW1MkRtEa9MrvzGkq3yU1cqsjOHl7 # p6PNwHZ3tHQZKyEg3yqs50MXoPYAWk937ZSFfZLZYLm9BvPO1j2TYMbNt93iApI9 # yRRDB+iKTFsPispzAlff0F7Vx6FqZpfu8M8w1XML/KovwfmAvMdU4VIlUECNu95m # Q2sn/yMhGZ2zTqLz+GKBchMfwxBwj/55JharP14GgiSaXvevnmR19i7PW3nQsBYA # hw40IdGTeghAhapnsBtj6q4lWV9BLGKng7uwcZx6Qbdq6luZ86efbv2yhDB6scdr # Z8B8fFCC5l2t5yX+35opFMM/xtT5Js9edVwXi6A1FXdre2UrnvGvDfwpY13aNYA+ # Ut/onvCWK6j0ii3QRwUcEVNmyGrXJ0M1wcU9mSaqpP9Cw5KlehuAEqXdkBZr4EXK # YPWmrsrW3R9OlflVUeuYiGkEDChzRDRl3AwZQFmmSlFOaLfIjzkG4Ck+2+Ikr8iV # G1xAopQRWoH5Ia/4YGOYXoKKaK5xqMZCHB/Cf+0NjM4= # SIG # End signature block
combined_dataset/train/non-malicious/Get-StrictMode.psm1.ps1
Get-StrictMode.psm1.ps1
<# .SYNOPSIS A very simple module to retrieve the Set-StrictMode setting of the session. .DESCRIPTION This procedure is necessary as there is, apparently, no PowerShell variable for this and enables the user setting to be returned to its original state after possibly being changed within a script. The various values returned will be Version 1, Version 2, or Off. #> function Get-StrictMode { try { $version = '2' $z = "2 * $nil" #V2 will catch this one. $version = '1' $z = 2 * $nil #V1 will catch this. Write-Host "StrictMode: Off" } catch { Write-Host "StrictMode: Version $version" } }
combined_dataset/train/non-malicious/sample_50_98.ps1
sample_50_98.ps1
# # Module manifest for module 'Az.Attestation' # # Generated by: Microsoft Corporation # # Generated on: 23/04/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.Attestation.psm1' # Version number of this module. ModuleVersion = '2.0.2' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '249cb945-683e-4866-a9af-5704a2d890a5' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell - Attestation service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. For more information on Attestation, please visit the following: https://learn.microsoft.com/azure/attestation/' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Attestation.Autorest/bin/Az.Attestation.private.dll', 'Microsoft.Azure.Attestation.dll', 'Microsoft.Azure.Management.Attestation.dll', 'Microsoft.IdentityModel.JsonWebTokens.dll', 'Microsoft.IdentityModel.Logging.dll', 'Microsoft.IdentityModel.Tokens.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'Attestation.Autorest\Az.Attestation.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('Attestation.Autorest/Az.Attestation.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Get-AzAttestationDefaultProvider', 'Get-AzAttestationProvider', 'New-AzAttestationProvider', 'Remove-AzAttestationProvider', 'Update-AzAttestationProvider' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-AzAttestationPolicySigner', 'Get-AzAttestationPolicy', 'Get-AzAttestationPolicySigners', 'Remove-AzAttestationPolicySigner', 'Reset-AzAttestationPolicy', 'Set-AzAttestationPolicy' # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','Attestation' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCfWe9eYnY0W2R+ # DQNn4p5eAWfqyyEWRrGMA1yIwe+maaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINAm # c/cqEZmbuFz3nh97c3T6rkspP2cJ72DKtPVqbGszMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA2ZX8X5FHNmaD7dJJxSoA2AVPVWAOe3ewA97q # /r1KONv4J39nUnY5eq3TBPLrrqb1pAlcL2mjvSbsVwgvaMdehxvRJfClWJ8fkyXR # NgnngbWfxJCm8cInzhY0XHySqFqu8PhRByctwpNrtdkY6gARU1sLxV05PyZw/Y6f # 5EVTOz5Y2BipN30mkmYjbGgFVvjrxbNzyBEZKnbEDhkJpvtbKUfQ90k2BYoiqoWg # zgvARLqJ2gEJT0jXGoK76IRmmZUdGPYP+cN5/fxPNrhsP1v7vwLKU2YjwEiCLjCw # G8gZWYWvQ89QL9VyAHhUpcCXXWRAqXJcWce5xbU6kzXUeSlcEKGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB8dxxzWXyT0TA11pJVsHNz0qe5OvQo03DW # 7XDCzoHdHAIGZh/+xnznGBMyMDI0MDQyMzE0MTExOS42MDZaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd # ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO # A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g # 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v # FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm # v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR # KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj # lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY # C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834 # bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu # YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w # pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I # l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy # vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS # mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx # vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q # Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k # VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm # i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp # upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY # h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW # InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU # hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi # DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnRvQQwIhgPMjAyNDA0MjMxMjUyMjBaGA8yMDI0MDQy # NDEyNTIyMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dG9BAIBADAHAgEAAgIH # /zAHAgEAAgISKDAKAgUA6dMOhAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AEtAJf9QQUkfnjakWpA/WTJ4s59d1ydd1YCu0doiQ7zKrtg+fPXaO+UnceDABE97 # pgPadQ3qu9K0ikm1c/cMWaf6FyR3t7zee3PwsEGTk2CPIUwLCYrMasurESYCykjm # cyo5aeimsVVRSCr36tnZYZLeD4pEzDs6hAxbbMfDl26nMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA # Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQghGeE5LmEDT255TwGc1b8i6MYXeiAm1epaLWmGOxY # WTAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3 # 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIOmVHNIZrArpRiTxre+ot/Sc # GrSRpjA9BFR2kZJAoOaAMA0GCSqGSIb3DQEBCwUABIICAAfisa14j6E+Ds2oVPX6 # NzkRfnpYmZ59Hm6suMbYNNKtHlmJP6daTavp6HPvCtQ4tWo1p5xT6R39DlZRVbbR # 5B3XImRdLoMYs5HIeUV6+gerNWok/c56skmsJive45d5GjRispuOK7BfOo54SFNW # 9MUnbOqR4lOWxGZa+/e2rOFgp3qMuCe+GU7fTma1rRiy89fTLt+guzhqLfpEw+77 # 8YZMv/NqX8aMcRDvJEDRvF8QcyEe9CMMRsqWvbQ6IovaOw82PtkLlXThGhxibSFu # d3QqqduMlV8ZtDS3PiEwXHWKhnQ6qWQNTV0qy/MDMXv9XDIErEA6E985pnSRX5TX # IzUrZghvrDfJHyDdxJGVRKPzyNgoNoVzq21UmSh33yVamh9Kg6VqyKzwOV2QS1B+ # xs8fXmSqhSk6PoXKOGh7awi2I7nXeBF1Y6fDRriW8ZFrMGLsAghtjoe4kTsEA9DY # 8eDIxpVQqDaOBItkuvZp1k3kXUEMP1yO2Ow3umXVLfF1jKOOXjxz330AbVhGNMUo # X+fAbE9upt24GaPmOFQYM5/1KujxCsy3lnNehI4PVYfhEdr/q/my5G5KV8IoEJ6G # CyeJ/lhp2YRruzcbkHZTLeYtRwi/EFahA9rwFCgS2su6nHw11HU+vPh0saBZYqBC # n+MqIGCxwzjtY4M7sbhguBj9 # SIG # End signature block
combined_dataset/train/non-malicious/Validate SPN Mappings.ps1
Validate SPN Mappings.ps1
###########################################################################" # # NAME: SPNValidation.psm1 # # AUTHOR: Jan Egil Ring # BLOG: http://blog.crayon.no/blogs/janegil # # COMMENT: Script module for validating SPN mappings. # For installation instructions and sample usage, see the following blog post: #http://blog.crayon.no/blogs/janegil/archive/2010/01/28/validate_2D00_spn_2D00_mappings_2D00_using_2D00_windows_2D00_powershell.aspx # # You have a royalty-free right to use, modify, reproduce, and # distribute this script file in any way you find useful, provided that # you agree that the creator, owner above has no warranty, obligations, # or liability for such use. # # VERSION HISTORY: # 1.0 28.01.2010 - Initial release # ###########################################################################" function Resolve-SPN { ################################################################ #.Synopsis # Resolves the provided SPN and checks for duplicate entries #.Parameter SPN # The SPN to perform the check against ################################################################ param( [Parameter(Mandatory=$true)][string]$SPN) $Filter = "(ServicePrincipalName=$SPN)" $Searcher = New-Object System.DirectoryServices.DirectorySearcher $Searcher.Filter = $Filter $SPNEntry = $Searcher.FindAll() $Count = $SPNEntry | Measure-Object if ($Count.Count -gt 1) { Write-Host "Duplicate SPN Found!" -ForegroundColor Red -BackgroundColor Black Write-Host "The following Active Directory objects contains the SPN $SPN :" $SPNEntry | Format-Table Path -HideTableHeaders } elseif ($Count.Count -eq 1) { Write-Host "No duplicate SPN found" -ForegroundColor Green Write-Host "The following Active Directory objects contains the SPN $SPN :" $SPNEntry | Format-Table Path -HideTableHeaders } else { Write-Host "SPN not found" } } #Imports the PowerShell ActiveDirectory available in Windows Server 2008 R2 and Windows 7 Remote Server Administration Tools (RSAT) Import-Module ActiveDirectory function Resolve-AllDuplicateDomainSPNs { ################################################################ #.Synopsis # # Resolves all domain SPNs and checks for duplicate entries ################################################################ $DomainSPNs = Get-ADObject -LDAPFilter "(ServicePrincipalName=*)" -Properties ServicePrincipalName foreach ($item in $DomainSPNs) { $SPNCollection = $item.ServicePrincipalName foreach ($SPN in $SPNCollection){ $Filter = "(ServicePrincipalName=$SPN)" $Searcher = New-Object System.DirectoryServices.DirectorySearcher $Searcher.Filter = $Filter $SPNEntry = $Searcher.FindAll() $Count = $SPNEntry | Measure-Object if ($count.Count -gt 1) { Write-Host "Warning: Duplicate SPN Found!" -ForegroundColor Red -BackgroundColor Black Write-Host "The following Active Directory objects contains the SPN $SPN :" $SPNEntry | Format-Table Path -HideTableHeaders } } } }
combined_dataset/train/non-malicious/1237.ps1
1237.ps1
[CmdletBinding()] param( [Parameter(Mandatory=$true,Position=0)] [string] $Name ) Set-StrictMode -Version 'Latest' $Name = [Text.Encoding]::Unicode.GetString( [Convert]::FromBase64String($Name) ) Add-Type -AssemblyName System.Configuration $config = [Configuration.ConfigurationManager]::OpenMachineConfiguration() $appSettings = $config.AppSettings.Settings if( $appSettings[$Name] ) { $appSettings.Remove( $Name ) $config.Save() }
combined_dataset/train/non-malicious/sample_35_30.ps1
sample_35_30.ps1
# # Module manifest for module 'OCI.PSModules.Recovery' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Recovery.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '953d757b-6410-4a6e-b5dc-2141a7da241e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Recovery Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Recovery.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIRecoveryProtectedDatabase', 'Get-OCIRecoveryProtectedDatabasesList', 'Get-OCIRecoveryProtectionPoliciesList', 'Get-OCIRecoveryProtectionPolicy', 'Get-OCIRecoveryServiceSubnet', 'Get-OCIRecoveryServiceSubnetsList', 'Get-OCIRecoveryWorkRequest', 'Get-OCIRecoveryWorkRequestErrorsList', 'Get-OCIRecoveryWorkRequestLogsList', 'Get-OCIRecoveryWorkRequestsList', 'Invoke-OCIRecoveryFetchProtectedDatabaseConfiguration', 'Move-OCIRecoveryProtectedDatabaseCompartment', 'Move-OCIRecoveryProtectionPolicyCompartment', 'Move-OCIRecoveryServiceSubnetCompartment', 'New-OCIRecoveryProtectedDatabase', 'New-OCIRecoveryProtectionPolicy', 'New-OCIRecoveryServiceSubnet', 'Remove-OCIRecoveryProtectedDatabase', 'Remove-OCIRecoveryProtectionPolicy', 'Remove-OCIRecoveryServiceSubnet', 'Update-OCIRecoveryProtectedDatabase', 'Update-OCIRecoveryProtectionPolicy', 'Update-OCIRecoveryServiceSubnet' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Recovery' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/ModuleWriteError.psd1.ps1
ModuleWriteError.psd1.ps1
# # Module manifest for module 'ModuleWriteError' # # Generated by: Thell Fowler # # Generated on: 1/13/2010 # @{ # Script module or binary module file associated with this manifest ModuleToProcess = 'ModuleWriteError.psm1' # Version number of this module. ModuleVersion = '1.0' # ID used to uniquely identify this module GUID = '64a09a69-e432-43ab-907e-18470da14621' # Author of this module Author = 'Thell Fowler' # Company or vendor of this module CompanyName = 'NPPCR' # Copyright statement for this module Copyright = 'GNU GPL v3' # Description of the functionality provided by this module Description = 'Generic module and advanced function aware exception class and error record generator for use with Write-Error and $PSCmdlet.WriteError() allowing embedding of the module name and prefixed or non-prefixed advanced function name into error messages.' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '' # Name of the Windows PowerShell host required by this module PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module PowerShellHostVersion = '' # Minimum version of the .NET Framework required by this module DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module CLRVersion = '' # Processor architecture (None, X86, Amd64, IA64) required by this module ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = 'FunctionInfo.types.ps1xml' # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = @() # Modules to import as nested modules of the module specified in ModuleToProcess NestedModules = @() # Functions to export from this module FunctionsToExport = '*' # Cmdlets to export from this module CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module AliasesToExport = '*' # List of all modules packaged with this module ModuleList = @() # List of all files packaged with this module FileList = 'ModuleWriteError.psm1', 'FunctionInfo.types.ps1xml' # Private data to pass to the module specified in ModuleToProcess PrivateData = '' }
combined_dataset/train/non-malicious/IE Proxy Toggle (Silent).ps1
IE Proxy Toggle (Silent).ps1
# Process command line parameter (if present). [bool] $DISABLE_PROXY = $false; foreach ($param in $MyInvocation.UnboundArguments) { if ($param -like 'disable') { $DISABLE_PROXY = $true; } } # Apply/refresh the organization's default proxy settings. @@ [string] $proxyServer = '###.###.###.###:####'; @@ [string] $proxyOverride = '*.local;192.168.*;<local>'; @@ [int] $migrateProxy = 1; @@ [int] $proxyHttp11 = 1; REG ADD """HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings"" /v ""ProxyServer"" /t REG_SZ /d ""$proxyServer"" /f" | Out-Null; REG ADD """HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings"" /v ""ProxyOverride"" /t REG_SZ /d ""$proxyOverride"" /f" | Out-Null; REG ADD """HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings"" /v ""MigrateProxy"" /t REG_DWORD /d $migrateProxy /f" | Out-Null; REG ADD """HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings"" /v ""ProxyHttp1.1"" /t REG_DWORD /d $proxyHttp11 /f" | Out-Null; <# Define a function to start a 'hidden' Internet Explorer process. This is needed since there is no easy way to programmatically 'refresh' the user's proxy settings after they have been changed in the registry. #> function Start-HiddenIEProcess () { [object] $ieProcess = $null; # Launch Internet Explorer (use 32-bit version only) in a hidden window. if (Test-Path "$env:PROGRAMFILES(X86)\\Internet Explorer\\iexplore.exe") { $ieProcess = Start-Process -Passthru -FilePath "$env:PROGRAMFILES(X86)\\Internet Explorer\\iexplore.exe" -WindowStyle Hidden -ErrorAction SilentlyContinue; } else { $ieProcess = Start-Process -Passthru -FilePath "$env:PROGRAMFILES\\Internet Explorer\\iexplore.exe" -WindowStyle Hidden; } # Wait for Internet Explorer to load fully. [int] $count = 10; do { if (($ieProcess.WaitForInputIdle())) { $waiting = $false; # IE is ready. $count = 0; } else { Start-Sleep 1; # Sleep for another second. $count--; # Decrement wait counter. } } while ($waiting -or ($count -gt 0)); # Check to see if our new process exists. if ((Get-Process -Name iexplore -ErrorAction SilentlyContinue)) { return $true; } else { return $false; } } # END <# Define a function to toggle the user's proxy settings by altering the required registry entry and then forcing a 'refresh' of the proxy status by utilizing a hidden/temporary Internet Explorer process. #> function Set-ProxyState ([bool] $disable) { # Kill existing IE processes. Stop-Process -Name iexplore -Force -ErrorAction SilentlyContinue; # Toggle proxy state. if ($disable) { Write-Host 'DISABLING user''s proxy settings...'; REG ADD '"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings" /v "ProxyEnable" /t REG_DWORD /d 0 /f' | Out-Null; # Disable proxy. } else { Write-Host 'ENABLING user''s proxy settings...'; REG ADD '"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings" /v "ProxyEnable" /t REG_DWORD /d 1 /f' | Out-Null; # Enable proxy. } # Start a new/hidden IE process temporarily. Start-HiddenIEProcess; # Kill existing IE processes. Stop-Process -Name iexplore -Force -ErrorAction SilentlyContinue; Write-Host '[DONE]'; return $null; } # END # Toggle the user's proxy settings. $null = Set-ProxyState $DISABLE_PROXY;
combined_dataset/train/non-malicious/1715.ps1
1715.ps1
function Get-ServiceNowUserGroup{ [OutputType([System.Management.Automation.PSCustomObject])] [CmdletBinding(DefaultParameterSetName, SupportsPaging)] Param( [Parameter(Mandatory = $false)] [string]$OrderBy = 'name', [Parameter(Mandatory = $false)] [ValidateSet('Desc', 'Asc')] [string]$OrderDirection = 'Desc', [Parameter(Mandatory = $false)] [int]$Limit, [Parameter(Mandatory = $false)] [Alias('Fields')] [string[]]$Properties, [Parameter(Mandatory = $false)] [hashtable]$MatchExact = @{}, [Parameter(Mandatory = $false)] [hashtable]$MatchContains = @{}, [Parameter(Mandatory = $false)] [ValidateSet('true', 'false', 'all')] [string]$DisplayValues = 'true', [Parameter(ParameterSetName = 'SpecifyConnectionFields', Mandatory = $true)] [ValidateNotNullOrEmpty()] [Alias('ServiceNowCredential')] [PSCredential]$Credential, [Parameter(ParameterSetName = 'SpecifyConnectionFields', Mandatory = $true)] [ValidateScript({Test-ServiceNowURL -Url $_})] [Alias('Url')] [string]$ServiceNowURL, [Parameter(ParameterSetName = 'UseConnectionObject', Mandatory = $true)] [ValidateNotNullOrEmpty()] [hashtable]$Connection ) $newServiceNowQuerySplat = @{ OrderBy = $OrderBy OrderDirection = $OrderDirection MatchExact = $MatchExact MatchContains = $MatchContains } $Query = New-ServiceNowQuery @newServiceNowQuerySplat $getServiceNowTableSplat = @{ Table = 'sys_user_group' Query = $Query Fields = $Properties DisplayValues = $DisplayValues } if ($null -ne $PSBoundParameters.Connection) { $getServiceNowTableSplat.Add('Connection', $Connection) } elseif ($null -ne $PSBoundParameters.Credential -and $null -ne $PSBoundParameters.ServiceNowURL) { $getServiceNowTableSplat.Add('Credential', $Credential) $getServiceNowTableSplat.Add('ServiceNowURL', $ServiceNowURL) } if ($PSBoundParameters.ContainsKey('Limit')) { $getServiceNowTableSplat.Add('Limit', $Limit) } ($PSCmdlet.PagingParameters | Get-Member -MemberType Property).Name | Foreach-Object { $getServiceNowTableSplat.Add($_, $PSCmdlet.PagingParameters.$_) } $Result = Get-ServiceNowTable @getServiceNowTableSplat If (-not $Properties) { $Result | ForEach-Object{$_.PSObject.TypeNames.Insert(0,"ServiceNow.UserAndUserGroup")} } $Result }
combined_dataset/train/non-malicious/1605.ps1
1605.ps1
write-host " write-host " write-host " write-host " write-host " write-host " $a = (Get-Host).PrivateData $a.WarningBackgroundColor = "red" $a.WarningForegroundColor = "white" gc env:computername Get-Date function Read-Choice { PARAM([string]$message, [string[]]$choices, [int]$defaultChoice=12, [string]$Title=$null ) $Host.UI.PromptForChoice( $caption, $message, [Management.Automation.Host.ChoiceDescription[]]$choices, $defaultChoice ) } switch(Read-Choice "Use Shortcut Keys:[]" "&Restart","&IISRESET","&WLBS Status","&Job- SQL","&V-Start Service","&C-Stop Service","&Task- Scheduled","&Log-off TS","&Basic Computer Inventory","&Application List","&Process- Remote","&Event- Logs","&Quit"){ 0 { Write-Host "You have selected the option to restart a server" -ForegroundColor Yellow $ServerName = Read-Host "Enter the name of the server to be restarted" if (Test-connection $ServerName) { Get-Date write-host “$ServerName is reachable” Write-Host "$ServerName is getting restarted" Get-Date restart-computer -computername $ServerName -Force Write-Host "Starting continuous ping to test the status" Test-Connection -ComputerName $ServerName -Count 100 | select StatusCode Start-Sleep -s 300 Write-Host "Here is the last reboot time: " $wmi=Get-WmiObject -class Win32_OperatingSystem -computer $ServerName $LBTime=$wmi.ConvertToDateTime($wmi.Lastbootuptime) $LBTime } else { Get-Date write-host “$ServerName is not reachable, please check this manually” exit } } 1 { Write-Host "You have selected the option to do IISRESET" -ForegroundColor Yellow $Server1 = Read-Host "Enter the server name on which iis need to be reset" rcmd \\$Server1 iisreset } 2 { Write-Host "You have selected the option to check WLBS status" -ForegroundColor Yellow $Server2 = Read-host "Enter the remote computer name" rcmd \\$Server2 wlbs query $opt = Read-Host "Do you want to stop/start wlbs on $Server2 (Y/N)" if ($opt -eq 'Y') { $opt0 = Read-Host "S- To start X- To stop)" if ($opt0 -eq 'S') { rcmd \\$Server2 wlbs resume rcmd \\$Server2 wlbs start } else { if ($opt0 -eq 'X') { rcmd \\$Server2 wlbs stop rcmd \\$Server2 wlbs suspend } else { exit } exit } } else { exit } } 3 { Write-Host "You have selected the option to get the status of SQL job" -ForegroundColor Yellow write-host "Hope you are logged in with an account having SQL access privilege" [System.Reflection.Assembly]::LoadWithPartialName(‘Microsoft.SqlServer.SMO’) | out-null $instance = Read-Host "Enter the server name" $j = Read-Host "Job names starting with....." $s = New-Object (‘Microsoft.SqlServer.Management.Smo.Server’) $instance $s.JobServer.Jobs |Where-Object {$_.Name -ilike "$j*"}| SELECT NAME, LASTRUNOUTCOME, LASTRUNDATE } 4 { Write-Host "You have selected the option to start a service" -ForegroundColor Yellow $Server6 = Read-host "Enter the remote computer name" Get-Service * -computername $Server6 | where {$_.Status -eq "Stopped"} | Out-GridView $svc6 = Read-host "Enter the name of the service to be started" (Get-WmiObject -computer $Server6 Win32_Service -Filter "Name='$svc6'").InvokeMethod("StartService",$null) } 5 { Write-Host "You have selected the option to stop a service" -ForegroundColor Yellow $Server7 = Read-host "Enter the remote computer name" Get-Service * -computername $Server7 | where {$_.Status -eq "Running"} | Out-GridView $svc7 = Read-host "Enter the name of the service to be stopped" (Get-WmiObject -computer $Server7 Win32_Service -Filter "Name='$svc7'").InvokeMethod("StopService",$null) } 6 { Write-Host "You have selected the option to get the scheduled task status list" -ForegroundColor Yellow $Server8 = Read-host "Enter the remote computer name" schtasks /query /S $Server8 /FO TABLE /V | Out-GridView } 7 { Write-Host "You have selected the option to list and log off terminal service sessions" -ForegroundColor Yellow Import-Module PSTerminalServices $server9 = Read-Host "Enter Remote Server Name" $session = Get-TSSession -ComputerName $server9 | SELECT "SessionID","State","IPAddress","ClientName","WindowStationName","UserName" $session $s = Read-Host "Enter Session ID, if you want to log off any session" Get-TSSession -ComputerName $server9 -filter {$_.SessionID -eq $s} | Stop-TSSession –Force } 8 { Write-Host "You have selected the option to get basic computer inventory" -ForegroundColor Yellow $server8 = Read-Host "Enter Remote Server Name" Get-WMIObject -Class "Win32_BIOS" -Computer $server8 | select SerialNumber get-wmiobject -computername $server8 win32_computersystem Get-WmiObject win32_logicaldisk -ComputerName $server8 | select DeviceID, size, FreeSpace } 9 { Write-Host "The option to List the Applications installed on a remote machine" -ForegroundColor Yellow $computername= Read-Host "Enter the computer name" $Branch='LocalMachine' $SubBranch="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall" $registry=[microsoft.win32.registrykey]::OpenRemoteBaseKey('Localmachine',$computername) $registrykey=$registry.OpenSubKey($Subbranch) $SubKeys=$registrykey.GetSubKeyNames() Foreach ($key in $subkeys) { $exactkey=$key $NewSubKey=$SubBranch+"\\"+$exactkey $ReadUninstall=$registry.OpenSubKey($NewSubKey) $Value=$ReadUninstall.GetValue("DisplayName") WRITE-HOST $Value } } 10 { Write-Host "You have selected the option to get process details of a remote server" -ForegroundColor Yellow $server12 = Read-Host "Enter the remote machine name" Get-Process -ComputerName $server12 | Out-GridView } 11 { Write-Host "You have selected the option to get the event log details of a server" -ForegroundColor Yellow $server14 = Read-Host "Enter server name" [int]$n = Read-Host "Last how many Days?" $start1 = (Get-Date).addDays(-[int]$n) $start2 = (Get-Date) $opt3 = Read-Host "Do you want to save it to a notepad (Y/N)?" if ($opt3 -eq 'Y') { get-eventlog -logname System -EntryType Error -after $start1 -before $start2 -ComputerName $server14 > C:\Scripts\event.txt Invoke-Item C:\Scripts\event.txt } else { get-eventlog -logname System -EntryType Error -after $start1 -before $start2 -ComputerName $server14 | Out-GridView } } 12 { Write-Host "You have selected the option to exit the tool, Thank you for using this !!!" -ForegroundColor Yellow exit } }
combined_dataset/train/non-malicious/sample_64_14.ps1
sample_64_14.ps1
# -------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All Rights Reserved. # Microsoft Corporation (or based on where you live, one of its affiliates) licenses this sample code for your internal testing purposes only. # Microsoft provides the following sample code AS IS without warranty of any kind. The sample code arenot supported under any Microsoft standard support program or services. # Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. # The entire risk arising out of the use or performance of the sample code remains with you. # In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the code be liable for any damages whatsoever # (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) # arising out of the use of or inability to use the sample code, even if Microsoft has been advised of the possibility of such damages. # --------------------------------------------------------------- Import-Module -Name "$PSScriptRoot\..\Common\RoleHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\NetworkHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\StorageHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\ClusterHelpers.psm1" <# .Synopsis Function to shut down all provisioning machines from any role context .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter Parameters This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as public information of all other roles. It is passed down by the deployment engine. .Example Stop-DeployingMachines -Parameters $Parameters This will shut down all hosts that are in provisioning state #> function Stop-DeployingMachines { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" # Shut down all machines to avoid IP conflicts $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $bareMetalCredential = Get-BareMetalCredential -Parameters $Parameters if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } # If any machines are not accessible during this call, the caller may fail. It is important to mark all provisioning nodes as failed when this happens foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol if (IsVirtualAzureStack($Parameters)) { $trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value if (($trustedHosts -ne '*') -and ($bmcIP -notin $trustedHosts.Split(','))) { Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $bmcIP -Concatenate -Force } Invoke-Command -ComputerName $bmcIP -Credential $bareMetalCredential -ScriptBlock {Stop-VM -VMName $using:nodeName -TurnOff -Force -ErrorAction Stop } -ErrorAction Stop Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $trustedHosts -Force } else { Trace-Execution "Shut down $nodeName ($bmcIP)." Stop-IpmiDevice -TargetAddress $bmcIP -Credential $bareMetalCredential -NodeInstance $nodeInstance -OOBProtocol $oobProtocol -Verbose -Wait } } } <# .Synopsis Function to start-up all provisioning machines from any role context .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter Parameters This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as public information of all other roles. It is passed down by the deployment engine. .Example Start-DeployingMachines -Parameters $Parameters This will startup all hosts that are in provisioning state #> function Start-DeployingMachines { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $bareMetalCredential = Get-BareMetalCredential -Parameters $Parameters if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } # If any machines are not accessible during this call, the caller may fail. It is important to mark all provisioning nodes as failed when this happens foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol # TODO: For now this function will not support virtual hosts. # Due to time constraints and TZL requirements to get # SED support and clean up in CI, we will comment this # part of handling Virtual environments. MUST FIX soon. if (IsVirtualAzureStack($Parameters)) { Trace-Warning "Virtual environments are not supported in this version." Trace-Warning "This function is FOR NOW only designed to be called for SED cleanup on physical machines" Trace-Warning "Virtual environments will be handled here with the coming version." <# $trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value if (($trustedHosts -ne '*') -and ($bmcIP -notin $trustedHosts.Split(','))) { Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $bmcIP -Concatenate -Force } Invoke-Command -ComputerName $bmcIP -Credential $bareMetalCredential -ScriptBlock {Stop-VM -VMName $using:nodeName -TurnOff -Force -ErrorAction Stop } -ErrorAction Stop Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $trustedHosts -Force #> } else { Trace-Execution "Starting physical node: $nodeName ($bmcIP)." Start-IpmiDevice -TargetAddress $bmcIP -Credential $bareMetalCredential -NodeInstance $NodeInstance -OOBProtocol $oobProtocol -Verbose -Wait } } } <# .Synopsis Function to add a DHCP MAC-based reservation for a given machine. .Parameter NetworkName The network name within the infrastructure network where the IP should be reserved. .Parameter NodeName The node name to be associated with the reservation. .Parameter IPv4Address An IPv4 Address from the speficied network scope that the node will have reserved. .Parameter MacAddress The MAC address to associate with the reservation -- this can be in either dash or dashless format, but not comma format. .Parameter RemoteDHCPServerName The remote server that will act as the DHCP server to configure. .Parameter RemoteDHCPServerNameCredentials Credentials used to add the reservation only used on a remote computer when specified. .Example Add-DeployingMachineNetworkReservation -NetworkName 's-cluster-HostNic' -NodeName 'foo' -IPv4Address '10.0.0.1' -MACAddress '7C-FE-90-AF-1A-00' This will add a reservation for node foo with MAC 7C-FE-90-AF-1A-00 using the local credentials on the local DHCP server #> function Add-DeployingMachineNetworkReservation { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $NetworkName, [Parameter(Mandatory=$true)] [String] $NodeName, [Parameter(Mandatory=$true)] [String] $IPv4Address, [Parameter(Mandatory=$true)] [String] $MacAddress, [Parameter(Mandatory=$false)] [String] $RemoteDHCPServerName, [Parameter(Mandatory=$false)] [PSCredential] $RemoteDHCPServerNameCredentials ) $scriptBlock = { $scope = Get-DhcpServerv4Scope | Where-Object { $_.Name -eq $using:NetworkName } $reservation = $scope | Get-DhcpServerv4Reservation | Where-Object { $_.ClientId.Replace(':','').Replace('-','') -eq ($using:MacAddress).Replace(':','').Replace('-','') } foreach ($entry in $reservation) { # Always clear existing reservations that apply to this client ID Remove-DhcpServerv4Reservation -ClientId $entry.ClientId -ScopeId $entry.ScopeId } $scope | Add-DhcpServerv4Reservation -Name $using:NodeName -IPAddress $using:IPv4Address -ClientId $using:MacAddress -Description $using:NodeName } if ($remoteDHCPServerName) { $session = New-PSSession -ComputerName $RemoteDHCPServerName -Credential $RemoteDHCPServerNameCredentials } else { $session = New-PSSession } try { Trace-Execution "Adding DHCP reservation in '$NetworkName' scope: $NodeName - $IPv4Address - $MacAddress." Invoke-Command -Session $session -ScriptBlock $scriptBlock } catch { Trace-Error "Failed with error: $_" throw } finally { Remove-PSSession -Session $session -ErrorAction Ignore } } <# .Synopsis Function to add a DHCP MAC-based reservation for a given machine. .Parameter NetworkName The network name within the infrastructure network where the IP should be reserved. .Parameter NodeName The node name to be associated with the reservation. .Parameter IPv4Address An IPv4 Address from the speficied network scope that the node will have reserved. .Parameter RemoteDHCPServerName The remote server that will act as the DHCP server to configure. .Parameter RemoteDHCPServerNameCredentials Credentials used to add the reservation only used on a remote computer when specified. .Example Remove-MachineNetworkReservation -NetworkName 's-cluster-HostNic' -NodeName 'foo' -IPv4Address '10.0.0.1' -RemoteDHCPServerName 'Machine' -RemoteDHCPServerNameCredentials $cred This will remove a reservation and its leases for node foo with IP address specified #> function Remove-MachineNetworkReservation { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $NetworkName, [Parameter(Mandatory=$true)] [String] $IPv4Address, [Parameter(Mandatory=$true)] [String] $RemoteDHCPServerName, [Parameter(Mandatory=$true)] [PSCredential] $RemoteDHCPServerNameCredentials ) $scriptBlock = { $scope = Get-DhcpServerv4Scope | Where-Object { $_.Name -eq $using:NetworkName } $scope | Get-DhcpServerv4Reservation | Where-Object { $_.IPAddress -eq ($using:IPv4Address) } | Remove-DhcpServerv4Reservation # Remove the DHCP lease for the machine that is being removed as well Get-DhcpServerv4Lease -ScopeId $scope.ScopeId | Where-Object { $_.IPAddress -eq $using:IPv4Address } | Remove-DhcpServerv4Lease } try { $session = New-PSSession -ComputerName $RemoteDHCPServerName -Credential $RemoteDHCPServerNameCredentials Trace-Execution "Adding DHCP reservation in '$NetworkName' scope: $NodeName - $IPv4Address ." Invoke-Command -Session $session -ScriptBlock $scriptBlock } catch { Trace-Error "Failed with error: $_" throw } finally { $session | Remove-PSSession -ErrorAction Ignore } } <# .Synopsis Function to force a machine to boot in to PXE using BMC controls only. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node to start in to PXE. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Start-PXEBoot -NodeName $Name -BmcIPAddress $BmcIPAddress -BMCCredential $cred This will force the machine to boot in to PXE #> function Start-PXEBoot { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath="$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [string] $NodeName, [Parameter(Mandatory=$true)] [string] $BmcIPAddress, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $NodeInstance, [Parameter(Mandatory=$true)] [string] $OOBProtocol ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $logText = "Initiate PXE boot for $NodeName (BMC: $BmcIPAddress). `r`n" $logText += "Shutdown $NodeName (BMC: $BmcIPAddress). `r`n" # Normally the following line should do nothing, because the machine is expected to have been powered off in an earlier step, unless this is a deployment # restart, in which case the machine may be running. $logText += (Stop-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Wait -Verbose 4>&1) $logText += "`n Set PXE boot $NodeName (BMC: $BmcIPAddress). `r`n" # Some machines will set the next boot device correctly only if the machine is currently powered off. $logText += (Set-IpmiDeviceOneTimePxeBoot -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $logText += "`n Start $NodeName (BMC: $BmcIPAddress). `r`n" $logText += (Start-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Wait -Verbose 4>&1) $logText += "`n Set PXE boot $NodeName (BMC: $BmcIPAddress OEMWorkaround). `r`n" # Some machines (Dell R630) will set the next boot device correctly only if the machine is currently powered on and gets power cycled (not reset, but # specifically power cycled) after the request to set one-time PXE boot. $logText += (Set-IpmiDeviceOneTimePxeBoot -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $logText += "`n Restart $NodeName (BMC: $BmcIPAddress OEMWorkaround). `r`n" $logText += (Restart-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $retObj = @{LogText = $logText} return $retObj } <# .Synopsis Function to force a machine to reboot out of band from any context that can access BMC. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node to restart. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Restart-Node -PhysicalNode $node -BMCCredential $cred This will force the machine to reboot #> function Restart-Node { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath="$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [System.Xml.XmlElement] $PhysicalNode, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $NodeInstance, [Parameter(Mandatory=$true)] [string] $OOBProtocol ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $nodeName = $PhysicalNode.Name $bmcIP = $PhysicalNode.BmcIPAddress Trace-Execution "Initiate IPMI-based restart for $nodeName (BMC: $bmcIP)." Restart-IpmiDevice -TargetAddress $bmcIP -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose -Wait } <# .Synopsis Function to get product information of a physical node. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Restart-Node -PhysicalNode $node -BMCCredential $cred #> function Get-ProductInfo { [CmdletBinding()] param ( [Parameter(Mandatory = $false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [System.Xml.XmlElement] $PhysicalMachinesRole, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $OEMModel ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $PhysicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $PhysicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol try { Trace-Execution "Initiate IPMI-based cmd to get Fru log for $nodeName (BMC: $bmcIP)." $fru = Get-IpmiDeviceFruLogs -TargetAddress $bmcIP -Credential $BMCCredential -NodeInstance $nodeInstance -OOBProtocol $oobProtocol if ($fru) { return @{"Model" = $fru.ProductInfo.ProductName "Vendor" = $fru.ProductInfo.ManufacturerName "Serial" = $fru.ProductInfo.SerialNumber } } } catch { Trace-Execution "Fail to Get-IpmiDeviceFruLogs for $nodeName (BMC: $bmcIP): $_" } } return $null } <# .Synopsis Function to wait for ping, CIM, recent OS installation (with a deployment artifact) and WinRM to be available on a machine .Parameter StartTime The start time of the operation, used to check that OS boot time was strictly after the wait period. .Parameter StopTime The stop time for the wait operation after which the operation is considered failed. .Parameter PhysicalNodeArray A list of physical machine nodes to wait. .Parameter RemoteCIMCredential The credential to use to connect to CIM and WinRM. .Parameter DeploymentID A unique identifier meant to signify the deployment that the machine is associated with. .Parameter IgnoreOldOSCheckResult Whether to consider it a failure if the OS discovered on the machine is from before the waiting period began. #> function Wait-RemoteCimInitializedOneNodeBareMetal { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [DateTime] $StartTime, [Parameter(Mandatory=$true)] [DateTime] $StopTime, [Parameter(Mandatory=$true)] [System.Xml.XmlElement[]] $PhysicalNodeArray, [Parameter(Mandatory=$true)] [PSCredential] $RemoteCIMCredential, [Parameter(Mandatory=$true)] [Guid] $DeploymentID, [Parameter(Mandatory=$true)] [bool] $IgnoreOldOSCheckResults ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $remainingNodes = $PhysicalNodeArray $failedNodeNames = @() do { $nodes = $remainingNodes foreach ($node in $nodes) { $nodeName = $node.Name $nodeIP = $node.IPv4Address # Default to HostNIC if we cant find any IPv4Addresses if (-not $nodeIP) { $hostNICNetworkName = Get-NetworkNameForCluster -ClusterName "s-cluster" -NetworkName "HostNIC" $nodeIP = ($node.NICs.NIC | Where-Object NetworkId -eq $hostNICNetworkName | ForEach-Object IPv4Address)[0].Split('/')[0] } if (Test-IPConnection $nodeIP) { $cimSession = $null $session = $null try { $errorCountBefore = $global:error.Count #try the node name first because in some scenario IP is not trusted $cimSession = New-CimSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $cimSession) { $cimSession = New-CimSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } $os = $null if ($cimSession) { $os = Get-CimInstance win32_operatingsystem -CimSession $cimSession -ErrorAction SilentlyContinue } $errorCountAfter = $global:error.Count $numberOfNewErrors = $errorCountAfter - $errorCountBefore if ($numberOfNewErrors -gt 0) { $global:error.RemoveRange(0, $numberOfNewErrors) } if ($os) { $osLastBootUpTime = $os.LastBootUpTime $osInstallTime = $os.InstallDate #try the node name first because in some scenario IP is not trusted $session = New-PSSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $session) { $session = New-PSSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } } else { Trace-Execution "$nodeName could not query an OS." } } catch { if ($session) { Trace-Execution "Caught exception after session to new OS was created: $_" Remove-PSSession $session -ErrorAction SilentlyContinue $session = $null } $global:error.RemoveAt(0) } if ($session) { $isNewDeployment = Invoke-Command -Session $session -ScriptBlock { Test-Path "$env:SystemDrive\CloudBuilderTemp\$($using:DeploymentID).txt" } if ($isNewDeployment) { Trace-Execution "$nodeName has finished OS deployment. Boot time reported by the node - $($osLastBootUpTime.ToString())." $failedNodeNames = $failedNodeNames | Where-Object Name -ne $nodeName } else { Trace-Warning "$nodeName has booted up to an old OS installed on $($osInstallTime.ToString())." if (-not $IgnoreOldOSCheckResult) { $failedNodeNames += $nodeName } } $remainingNodes = $remainingNodes | Where-Object Name -ne $node.Name } elseif ($cimSession) { Remove-CimSession $cimSession } else { Trace-Execution "$nodeName could not establish CIM session using IP $nodeIP or name." } } else { Trace-Execution "$nodeName did not respond to ping with IP $nodeIP ." } } if (-not $remainingNodes) { break } Start-Sleep -Seconds 15 } until ([DateTime]::Now -gt $StopTime) $remainingNodeNames = @($remainingNodes | ForEach-Object Name) $totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes if ($failedNodeNames -or $remainingNodeNames) { Trace-Error "Bare metal deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $(($failedNodeNames + $remainingNodeNames) -join ',')." } else { Trace-Execution "Bare metal deployment has completed on the target node." } } function Wait-ForISOImageBareMetal { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [DateTime] $StartTime, [Parameter(Mandatory=$true)] [DateTime] $StopTime, [Parameter(Mandatory=$true)] [Array] $PhysicalNodeArray, [Parameter(Mandatory=$true)] [PSCredential] $RemoteCIMCredential, [Parameter(Mandatory=$true)] [Guid] $DeploymentID, [Parameter(Mandatory=$true)] [bool] $IgnoreOldOSCheckResults ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop [Array]$remainingNodes = $PhysicalNodeArray | Sort-Object Name $failedNodeNames = @() $wait = $true while ($wait) { if ([DateTime]::Now -lt $StopTime) { foreach ($node in $remainingNodes) { $nodeName = $node.Name $nodeIP = $node.IPv4Address if (Test-IPConnection $nodeIP) { Trace-Execution "$nodeName is responding to ping" $cimSession = $null $session = $null try { $errorCountBefore = $global:error.Count # Try the node name first because in some scenario IP is not trusted $cimSession = New-CimSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $cimSession) { $cimSession = New-CimSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } $os = $null if ($null -ne $cimSession) { Trace-Execution "$nodeName CIM was session created - getting Win32_OperatingSystem data" $os = Get-CimInstance Win32_OperatingSystem -CimSession $cimSession -ErrorAction SilentlyContinue } $errorCountAfter = $global:error.Count $numberOfNewErrors = $errorCountAfter - $errorCountBefore if ($numberOfNewErrors -gt 0) { $global:error.RemoveRange(0, $numberOfNewErrors) } if ($null -ne $os) { $osLastBootUpTime = $os.LastBootUpTime $osInstallTime = $os.InstallDate Trace-Execution "$nodeName attempting to create PS session as '$($RemoteCIMCredential.UserName)'" # Try the node name first because in some scenario IP is not trusted try { $session = Microsoft.PowerShell.Core\New-PSSession -ComputerName $nodeName -Credential $RemoteCIMCredential if ($null -eq $session) { $session = Microsoft.PowerShell.Core\New-PSSession -ComputerName $nodeIP -Credential $RemoteCIMCredential } } catch { Trace-Execution "$nodeName failed to created PS session with error: $($PSItem.Exception.Message)" } } else { Trace-Execution "$nodeName could not query Win32_OperatingSystem" } } catch { if ($null -ne $session) { Trace-Execution "Caught exception after session to new OS was created: $($PSItem.Exception.Message)" Remove-PSSession $session -ErrorAction SilentlyContinue $session = $null } $global:error.RemoveAt(0) } if ($null -ne $session) { Trace-Execution "$nodeName PS session was created - looking for $DeploymentID.txt file on this node" Trace-Execution "Waiting for 5 min after successful network connection so that setupcomplete can converge on the physical machine." Start-Sleep -Seconds 300 $isNewDeployment = Invoke-Command -Session $session -ScriptBlock { Test-Path -Path "$env:SystemDrive\CloudBuilderTemp\$($using:DeploymentID).txt" } if ($true -eq $isNewDeployment) { Trace-Execution "$nodeName has finished OS deployment. Boot time reported by the node - $($osLastBootUpTime.ToString())" $failedNodeNames = $failedNodeNames | Where-Object Name -ne $nodeName } else { Trace-Warning "$nodeName has booted up to an old OS installed on $($osInstallTime.ToString())" if (-not $IgnoreOldOSCheckResult) { $failedNodeNames += $nodeName } } Trace-Execution "$nodeName has completed bare metal deployment" $remainingNodes = $remainingNodes | Where-Object Name -ne $nodeName } else { Trace-Execution "$nodeName could not establish Powershell session using IP $nodeIP or name" Trace-Execution "$nodeName attempt to map network drive to C`$" try { $fileFound = $false $netShare = New-PSDrive -Name $nodeName -PSProvider FileSystem -Root "\\$nodeName\C`$" -Credential $RemoteCIMCredential if ($null -ne $netShare) { $fileFound = Test-Path -Path "$($nodeName):\CloudBuilderTemp\$($DeploymentID).txt" } } catch { Trace-Execution "$nodeName failed to map network drive with error: $($PSItem.Exception.Message)" } if ($true -eq $fileFound) { Trace-Execution "$nodeName has completed bare metal deployment" $remainingNodes = $remainingNodes | Where-Object Name -ne $nodeName } } if ($null -ne $cimSession) { Remove-CimSession $cimSession } else { Trace-Execution "$nodeName could not establish CIM session using IP $nodeIP or name" } if ($null -ne $netShare) { Remove-PSDrive -Name $nodeName -ErrorAction SilentlyContinue $netShare = $null } } else { Trace-Execution "$nodeName did not respond to ping with IP $nodeIP" } } if ($remainingNodes.Count -eq 0) { Trace-Execution "All nodes have completed bare metal deployment" $wait = $false } else { Trace-Execution "Still waiting for $($remainingNodes.Count) node(s) to complete" Start-Sleep -Seconds 60 } } else { Trace-Execution "Timed out waiting for all nodes to complete bare metal deployment" Trace-Execution "$($remainingNodes.Count) node(s) did not respond in time" $wait = $false } } if ($remainingNodes.Count -eq 0) { $remainingNodeNames = @() } else { $remainingNodeNames = @($remainingNodes | ForEach-Object Name) } $totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes if (($failedNodeNames.Count + $remainingNodeNames.Count) -gt 0) { [string]$badNodes = ($failedNodeNames + $remainingNodeNames) -join ',' Trace-Error "Bare metal deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $badNodes." } else { Trace-Execution "Bare metal deployment has completed on the target nodes." } } <# .SYNOPSIS While a host is being restarted and brought back online, this function is used to select a different host on the same cluster to perform remote PowerShell operations on. #> function Get-HostNameForRemoting { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$true)] [string] $HostBeingRebooted ) $ErrorActionPreference = "Stop" $clusterName = Get-NodeRefClusterId -Parameters $Parameters -RoleName "BareMetal" -NodeName $HostBeingRebooted $availableHosts = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $clusterName $availableHosts = $availableHosts | Where-Object { $_ -ne $HostBeingRebooted } if ($availableHosts.Count -eq 0) { Trace-Error "There are no available hosts on which to perform remote operations." } else { Trace-Execution "Selected host $($availableHosts[0])." return $availableHosts[0] } } <# .SYNOPSIS This function is used to do cluster aware update based on different Cau Plugins. #> function Invoke-CauRunHelper { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [System.Collections.Hashtable] $cauParams ) $ErrorActionPreference = "Stop" Trace-Execution "Start invoke caurun" Invoke-CauRun @cauParams } Export-ModuleMember -Function Start-PXEBoot Export-ModuleMember -Function Restart-Node Export-ModuleMember -Function Stop-DeployingMachines Export-ModuleMember -Function Start-DeployingMachines Export-ModuleMember -Function Add-DeployingMachineNetworkReservation Export-ModuleMember -Function Remove-MachineNetworkReservation Export-ModuleMember -Function Wait-RemoteCimInitializedOneNodeBareMetal Export-ModuleMember -Function Wait-ForISOImageBareMetal Export-ModuleMember -Function Get-HostNameForRemoting Export-ModuleMember -Function Get-ProductInfo Export-ModuleMember -Function Invoke-CauRunHelper # SIG # Begin signature block # MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBtuYtweW4wXFKw # Slz6sMNlownnwHytqoGhbETtt0TsjKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ0wghmZAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINOK3qGihyB6FnQ36vktKmpX # isSyJxcmJtXrsXDsre2eMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAeSRceKwQCIm+/mhxbBBsNOsWMjR+iDqPyYkg2CTLXkb6BXB1zxnByNm6 # E6GeAvuTjl8IauwtDmOq8FHFqsakvmJMKtcLHeFOynZuG3ccwS/hPx/72NCk2LRq # u31GWDENoBkiGAQeGHl7cHbQWriiUXJK1UlD+BqYlFmnt7rV8eSg4hB3x4fchsIO # 7vwRUyaahzVffZVr4jM03uZhO1ZRIqx4N7xHiInFQXBToFLjBxa/c6nIeVeiqUPa # x3aqi6F2KZ1GviqZw86JxM09ioEuX3uUYpkS5zWSYWlqYMzOy3mP53zFHTxgU+wH # ZcKUpQqoi+bl42GfAIZO+SUeaNYk4aGCFycwghcjBgorBgEEAYI3AwMBMYIXEzCC # Fw8GCSqGSIb3DQEHAqCCFwAwghb8AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFXBgsq # hkiG9w0BCRABBKCCAUYEggFCMIIBPgIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDSOvMRHZhlMiW2g2U2Docp1C5LzX13RWs2BJ+wROF1JwIGZjOrHlTO # GBEyMDI0MDUxNjE4NDQyNi42WjAEgAIB9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB4NT8HxMVH35dAAEAAAHgMA0GCSqG # SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAx # MjE5MDcxOVoXDTI1MDExMDE5MDcxOVowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046MTc5RS00QkIw # LTgyNDYxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCsh5zzocW70QE5xo2/+n7gYYd2 # S86LQMQIHS2mf85ERVHXkis8jbd7aqKzCuxg73F3SrPqiDFG73p5R/sOd7LD2uq2 # D++tGbhawAa37Hq39JBWsjV1c8E+42qyThI5xTAafsovrsENk5ybsXM3HhuRQx6y # COrBehfO/ZT+snWNAQWZGfbd/Xv7LzUYngOYFJ7/2HDP2yDGP0GJnfRdAfnmxWIv # jx+AJF2oTZBYCvOTiGkawxr4Z8Tmv+cxi+zooou/iff0B5HSRpX50X20N0FzP+f7 # pgTihuCaBWNZ4meUVR+T09Prgo8HKoU2571LXyvjfsgdm/axGb6dk7+GcGMxHfQP # VbGDLmYgkm2hTJO+y8FW5JaZ8OGh1iVyZBGJib8UW3E4RPBUMjqFZErinOTlmdvl # jP4+dKG5QNLQlOdwGrr1DmUaEAYfPZxyvpuaTlyl3WDCfnHri2BfIecv3Fy0DDpq # iyc+ZezC6hsFNMx1fjBDvC9RaNsxBEOIi+AV/GJJyl6JxxkGnEgmi2aLdpMiVUbB # UsZ9D5T7x1adGHbAjM3XosPYwGeyvbNVsbGRhAayv6G4qV+rsYxKclAPZm1T5Y5W # 90eDFiNBNsSPzTOheAHPAnmsd2Fi0/mlgmXqoiDC8cslmYPotSmPGRMzHjUyghCO # cBdcMaq+k9fzEKPvLQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHBeFz9unVfvErrK # ANV10Nkw0pnSMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1Ud # HwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr # BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw # MTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgw # DgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDAE84OkfwNJXTuzKhs # Q9VSY4uclQNYR29B3NGI7b+1pMUPIsH35bpV+VLOuLQ9/tzU9SZKYVs2gFn9sCnQ # MN+UcbUBtYjjdxxGdF9t53XuCoP1n28eaxB5GfW8yp0f9jeQNevsP9aW8Cc3X0XJ # yU93C8msK/5GIzFnetzj9Bpau9LmuFlBPz6OaVO60EW1hKEKM2NuIQKjnMLkXJug # m9CQXkzgnkQZ7RCoIynqeKUWkLe2/b7rE/e1niXH2laLJpj7bGbGsIJ6SI2wWueb # R37pNLw5GbWyF41OJq+XZ7PXZ2pwXQUtj2Nzd4SHwjxDrM6rsBy5H5BWf/W8cPP3 # kSZXbaLpB6NemnxPwKj/7JphiYeWUdKZoFukHF/uta3YuZAyU8whWqDMmM1EtEhG # 8qw2f6dijrigGDZ4JY4jpZZXLdLiVc9moH3Mxo47CotgEtVml7zoYGTZhsONkhQd # ampaGvCmrsfUNhxyxPIHnv+a4Dp8fc0m31VHOyHETaHauke7/kc/j+lyrToMgqlv # /q4T5qf5+xatgRk0ZHMv/4Zkt9qeqsoJa9iuDqCQyV8RbOpcHPA/OqpVHho1MqO4 # VcuVb8gPstJhpxALgPObbDnFD5c8FhebL/geX89+Tlt1+EqZOUojbpZyxUTzOVwr # Eh6r3GwvEd6sI9sNXrz4WcQ7jTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkA # AAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRl # IEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVow # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX # 9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1q # UoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8d # q6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byN # pOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2k # rnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4d # Pf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgS # Uei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8 # QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6Cm # gyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF # ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID # AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQU # KqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1 # GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0 # dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0 # bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMA # QTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbL # j+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1p # Y3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz # LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU # tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN # 3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU # 5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5 # KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGy # qVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB6 # 2FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltE # AY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFp # AUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcd # FYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRb # atGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd # VTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5k # IE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046MTc5 # RS00QkIwLTgyNDYxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp # Y2WiIwoBATAHBgUrDgMCGgMVAG3z0dXwV+h8WH8j8fM2MyVOXyEMoIGDMIGApH4w # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDp # 8J1DMCIYDzIwMjQwNTE2MjI1NzA3WhgPMjAyNDA1MTcyMjU3MDdaMHQwOgYKKwYB # BAGEWQoEATEsMCowCgIFAOnwnUMCAQAwBwIBAAICA98wBwIBAAICEa0wCgIFAOnx # 7sMCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh # IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQBkZSZg+D5tGtmVzawu3IVs # uYVy7Gn2TKonMMlhVDmoAb9NPFCV1fd+D8EfwGLuiRH0UDQUCgzmLJBSwDp7zo11 # PVYbzwC7JsvPpmQ9rYX+K9hxZGH32Rr8n0uxutUD2xnf+oHs9DuKfKXRXkKvKI2O # DNm4in0ixjxnPpaNl53EXzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 # YW1wIFBDQSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMA0GCWCGSAFlAwQCAQUA # oIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIE # IONHr0OsWQfGqyHiefrQSVjnZfuNsaJm26S3CQlWeYu+MIH6BgsqhkiG9w0BCRAC # LzGB6jCB5zCB5DCBvQQg4+5Sv/I55W04z73O+wwgkm+E2QKWPZyZucIbCv9pCsEw # gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw # JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeDU/B8T # FR9+XQABAAAB4DAiBCCkybJSPhqt2h7FifT+XioO3fT+VHxAx5RwMC10ndU1nzAN # BgkqhkiG9w0BAQsFAASCAgBXtApOWBUOjiQVHbn0TbzC5SZ33YnDHhoyILwyWB/U # qqpXoifacHDw05i1Zg8wKW+2BPdFNjxhuoI32iTAcCxSgGQaZ11Atiahl2xUq/op # 2qTOvsIGBmbOXfYrXgtC5D6bjUd6vylUHehkmQry3I9y/Ug7Ni2ibTJxEp8LsOOJ # B8oT1Ve21EnC5D7tUBy2a/8RMTQe4VCkU6L814NtEcHy92S3vSZxjCrQMNKHuTCE # WOoiPmhe3qNmPePxzPDGX9q7esfvL3iSmLFGrgNDASFH+s6vdN2ttfX1gfDJrpLC # UFfsX+o6OQz1sSdfwZESuTRZo84rtzRbpORVH1gBmh5bf0V2x3rt3Zj/duFdILe1 # 6QLwxrUcvLtupEHQ1aXwOm10hQMQ8tM4DL2A8LMFtW32QzqCXZtnjteOQEe8/Rza # lGPTo8WXUtAuyAIdF1akVMV9H4Ak4jnF1qWmw1gQI4rr/OoR1IZmUXPZFk92gbWD # pNvCQTres4Lc0qhgtkPJXzTgMdlSzXTmeSSWhb3AlLHkJvFNx+3NUbPlhAi6Or9Y # hQ6ijQfF62zpmK5r5Hear7vsGKMBZHUp8aLqRO4wsZCxQdnx3lfFVJsG+V8OCo/5 # AdH9b5Wfi0D0TerGKxIT7fRjXx2yTX/avoHLv/oU+5nAg9QNRyd7ECVwFSt6zeyc # 4g== # SIG # End signature block
combined_dataset/train/non-malicious/sample_53_0.ps1
sample_53_0.ps1
# # Module manifest for module 'OCI.PSModules.Jms' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Jms.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '7a9fc2a3-fd30-429b-bb7a-b66e5815c207' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Jms Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Jms.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIJmsFleetInstallationSites', 'Disable-OCIJmsDrs', 'Enable-OCIJmsDrs', 'Get-OCIJmsAnnouncementsList', 'Get-OCIJmsBlocklistsList', 'Get-OCIJmsCryptoAnalysisResult', 'Get-OCIJmsCryptoAnalysisResultsList', 'Get-OCIJmsDrsFile', 'Get-OCIJmsDrsFilesList', 'Get-OCIJmsExportSetting', 'Get-OCIJmsExportStatus', 'Get-OCIJmsFleet', 'Get-OCIJmsFleetAdvancedFeatureConfiguration', 'Get-OCIJmsFleetAgentConfiguration', 'Get-OCIJmsFleetDiagnosesList', 'Get-OCIJmsFleetsList', 'Get-OCIJmsInstallationSitesList', 'Get-OCIJmsJavaFamiliesList', 'Get-OCIJmsJavaFamily', 'Get-OCIJmsJavaMigrationAnalysisResult', 'Get-OCIJmsJavaMigrationAnalysisResultsList', 'Get-OCIJmsJavaRelease', 'Get-OCIJmsJavaReleasesList', 'Get-OCIJmsJreUsageList', 'Get-OCIJmsPerformanceTuningAnalysisResult', 'Get-OCIJmsPerformanceTuningAnalysisResultsList', 'Get-OCIJmsWorkItemsList', 'Get-OCIJmsWorkRequest', 'Get-OCIJmsWorkRequestErrorsList', 'Get-OCIJmsWorkRequestLogsList', 'Get-OCIJmsWorkRequestsList', 'Invoke-OCIJmsRequestCryptoAnalyses', 'Invoke-OCIJmsRequestJavaMigrationAnalyses', 'Invoke-OCIJmsRequestJfrRecordings', 'Invoke-OCIJmsRequestPerformanceTuningAnalyses', 'Invoke-OCIJmsScanJavaServerUsage', 'Invoke-OCIJmsScanLibraryUsage', 'Invoke-OCIJmsSummarizeApplicationInstallationUsage', 'Invoke-OCIJmsSummarizeApplicationUsage', 'Invoke-OCIJmsSummarizeDeployedApplicationInstallationUsage', 'Invoke-OCIJmsSummarizeDeployedApplicationUsage', 'Invoke-OCIJmsSummarizeInstallationUsage', 'Invoke-OCIJmsSummarizeJavaServerInstanceUsage', 'Invoke-OCIJmsSummarizeJavaServerUsage', 'Invoke-OCIJmsSummarizeJreUsage', 'Invoke-OCIJmsSummarizeLibraryUsage', 'Invoke-OCIJmsSummarizeManagedInstanceUsage', 'Invoke-OCIJmsSummarizeResourceInventory', 'Move-OCIJmsFleetCompartment', 'New-OCIJmsAgentDeployScript', 'New-OCIJmsBlocklist', 'New-OCIJmsDrsFile', 'New-OCIJmsFleet', 'Remove-OCIJmsBlocklist', 'Remove-OCIJmsCryptoAnalysisResult', 'Remove-OCIJmsDrsFile', 'Remove-OCIJmsFleet', 'Remove-OCIJmsFleetInstallationSites', 'Remove-OCIJmsJavaMigrationAnalysisResult', 'Remove-OCIJmsPerformanceTuningAnalysisResult', 'Stop-OCIJmsWorkRequest', 'Update-OCIJmsDrsFile', 'Update-OCIJmsExportSetting', 'Update-OCIJmsFleet', 'Update-OCIJmsFleetAdvancedFeatureConfiguration', 'Update-OCIJmsFleetAgentConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Jms' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Sith.ps1
Sith.ps1
' Script: Master_Audit_AD_Account_Management - 2008 v4 S1S2.vbs (Version 4 Section1 and Section2 combi script) ' Purpose: Parse a DC's security event log and generate account management events, log and e-mail for past 24hs ' Author: Paperclips (The Dark Lord) ' Email: magiconion_M@hotmail.com ' Date: Feb 2011 ' Comments: Make sure relevant auditing is already set up in AD before using this script. Auditing event logs must be set up for relevant ID's to be audited ' Notes: ' - '================================================================SECTION 1 AD Auditing MASTER REPORT GEN============================================================== Dim objFSO, objFolder, objFile, objWMI, objItem, objEmail Dim strComputer, strFileName, strFileOpen, strFolder, strPath Dim intEvent, colLoggedEvents, datenow, EventDate Dim count1, count2, count3, count4, count5, count6, count7, count8, count9, count10 Dim count11, count12, count13, count14, count15, count16, count17, count18, count19, count20 Dim count21, count22, count23, count24, count25 count1 = 0 count2 = 0 count3 = 0 count4 = 0 count5 = 0 count6 = 0 count7 = 0 count8 = 0 count9 = 0 count10 = 0 count11 = 0 count12 = 0 count13 = 0 count14 = 0 count15 = 0 count16 = 0 count17 = 0 count18 = 0 count19 = 0 count20 = 0 count21 = 0 count22 = 0 count23 = 0 count24 = 0 count25 = 0 On error resume next ' ---------------------------------------------------Set the folder and file name------------------------------------------------------------------- strComputer = "." strFileName = "\\AD_Account_Management_Events.txt" strFolder = "c:\\audit_AD" strPath = strFolder & strFileName '-----------------------------------------------------Set numbers/Date------------------------------------------------------------------------------ DateNow = Now() ' ----------------------------------------------------Create the File System Object----------------------------------------------------------------- Set objFSO = CreateObject("Scripting.FileSystemObject") '-----------------------------------------------------Check that the strFolder folder exists-------------------------------------------------------- If objFSO.FolderExists(strFolder) Then Set objFolder = objFSO.GetFolder(strFolder) Else Set objFolder = objFSO.CreateFolder(strFolder) End If If objFSO.FileExists(strFolder & strFileName) Then Set objFolder = objFSO.GetFolder(strFolder) Else Set objFile = objFSO.CreateTextFile(strFolder & strFileName) End If ' ----------------------------------------------------CLEANUP -------------------------------------------------------------------------------------- set objFile = nothing set objFolder = nothing ' -----------------------------------------------------Write the information to the file------------------------------------------------------------ Set strFileOpen = objFSO.CreateTextFile(strPath, True) ' -----------------------------------------------------Log Header----------------------------------------------------------------------------------- strFileOpen.WriteLine("Script started at " & Datenow & " on Your DC") strFileOpen.WriteLine("===================================================") strFileOpen.WriteLine("") strFileOpen.WriteLine("Created by Paperclips") strFileOpen.WriteLine("......................") strFileOpen.WriteLine("") strFileOpen.WriteLine("IMPORTANT NOTES:") strFileOpen.WriteLine("----------------") strFileOpen.WriteLine("Sections 21,22,23,24 all related to Directory Service Objects. These 4 categories are repetative of other sections,") strFileOpen.WriteLine("meaning that if an object was amended, (For example the permissions changed on a user account in section 5 etc.) the") strFileOpen.WriteLine("event will also appear in section 24 with specific details. Thus sections 21,22,23 and 24 will log in depth changes") strFileOpen.WriteLine("creations, deletions, move's and permissions. Thus in this example section 5 will only notify that a change has occured") strFileOpen.WriteLine("and section 24 will log the exact specific change made.") strFileOpen.WriteLine("") strFileOpen.WriteLine("Thus when reviewing logs in sections 21,22,23 and 24, look at the line that says Class: to see what object was changed") strFileOpen.WriteLine("This will be either, user, computer, group, organisationalunit etc.....") strFileOpen.WriteLine("Additionally if the LDAP Display Name: variable is NTSecurityDescriptor and the Class: is OrganisationalUnit this means") strFileOpen.WriteLine("that the permission has changed on the OU. Additional Totals have been added for OU's in the summary report with regards") strFileOpen.WriteLine("to sections 21, 22, 23 and 24.") strFileOpen.WriteLine("") strFileOpen.WriteLine("") ' -----------------------------------------------------WMI Core Section1---------------------------------------------------------------------------- Set objWMI = GetObject("winmgmts:" _ & "{impersonationLevel=impersonate,(Security)}!\\\\" _ & strComputer & "\\root\\cimv2") Set colLoggedEvents = objWMI.ExecQuery _ ("Select * from Win32_NTLogEvent Where Logfile = 'Security' AND EventCode = '1102'" ) '------------------------------------------------------Next few sections loops through ID properties------------------------------------------------ strFileOpen.WriteLine(" =====================================================================") strFileOpen.WriteLine(" = The Security Event Log on this Domain Controller was last cleared =") strFileOpen.WriteLine(" =====================================================================") strFileOpen.WriteLine(" ") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) 'If DateDiff("h",DateNow,EventDate) > -25 Then 'If objItem.EventType=4 then 'If objItem.EventCode =1102 Then strFileOpen.WriteLine ("Time of last clear: " & EventDate) strFileOpen.WriteLine("DC Name: " & objItem.ComputerName) strFileOpen.WriteLine("Logfile: " & objItem.SourceName) strFileOpen.WriteLine("Message: " & objItem.Message) strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") 'End If 'End If 'end if Next ' -----------------------------------------------------WMI Core Section2 ---------------------------------------------------------------------------- Set objWMI = GetObject("winmgmts:" _ & "{impersonationLevel=impersonate,(Security)}!\\\\" _ & strComputer & "\\root\\cimv2") Set colLoggedEvents = objWMI.ExecQuery _ ("Select * from Win32_NTLogEvent Where Logfile = 'Security'" ) '1------------------------------------------------------Next few sections loops through ID properties------------------------------------------------ strFileOpen.WriteLine("===========================================================================================") strFileOpen.WriteLine("= 1. User Password Change Attempts by SUBJECT in the past 24hrs (most likely by an admin) =") strFileOpen.WriteLine("===========================================================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4724 Then count1 = count1 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 1.)User Password Change Attempts by SUBJECT in the past 24hrs (most likely by an admin) TOTAL = " & Count1) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '2--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("==============================================================================") strFileOpen.WriteLine("= 2. User Password Change Attempts by THE USER HIM/HERSELF in the past 24hrs =") strFileOpen.WriteLine("==============================================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4723 Then count2 = count2 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 2.)User Password Change Attempts by THE USER HIM/HERSELF in the past 24hrs TOTAL = " & Count2) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '3--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("==============================================") strFileOpen.WriteLine("= 3. User Accounts Created in the past 24hrs =") strFileOpen.WriteLine("==============================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4720 Then count3 = count3 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 3.)User Accounts Created in the past 24hrs TOTAL = " & Count3) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '4--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("==============================================") strFileOpen.WriteLine("= 4. User Accounts Deleted in the past 24hrs =") strFileOpen.WriteLine("==============================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4726 Then count4 = count4 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 4.)User Accounts Deleted in the past 24hrs TOTAL = " & Count4) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '5--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("==============================================") strFileOpen.WriteLine("= 5. User Accounts Changed in the past 24hrs =") strFileOpen.WriteLine("==============================================") strFileOpen.WriteLine("") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4738 Then count5 = count5 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Important Note: To see exactly what changed on the user object refer to events created") strFileOpen.WriteLine ("--------------- for (Directory Service Changes) later in this log for Class: User") strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 5.)User Accounts Changed in the past 24hrs TOTAL = " & Count5) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '6--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("=================================================") strFileOpen.WriteLine("= 6. User Accounts Locked Out in the past 24hrs =") strFileOpen.WriteLine("=================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4740 Then count6 = count6 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 6.)User Accounts Locked Out in the past 24hrs TOTAL = " & Count6) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '7--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("===============================================") strFileOpen.WriteLine("= 7. User Accounts Unlocked in the past 24hrs =") strFileOpen.WriteLine("===============================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4767 Then count7 = count7 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 7.)User Accounts Unlocked in the past 24hrs TOTAL = " & Count7) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '8--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("==================================================") strFileOpen.WriteLine("= 8. Computer Accounts Created in the past 24hrs =") strFileOpen.WriteLine("==================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4741 Then count8 = count8 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 8.)Computer Accounts Created in the past 24hrs TOTAL = " & Count8) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '9--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("==================================================") strFileOpen.WriteLine("= 9. Computer Accounts Deleted in the past 24hrs =") strFileOpen.WriteLine("==================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4743 Then count9 = count9 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 9.)Computer Accounts Deleted in the past 24hrs TOTAL = " & Count9) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '10--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("===================================================") strFileOpen.WriteLine("= 10. Computer Accounts Amended in the past 24hrs =") strFileOpen.WriteLine("===================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4742 Then count10 = count10 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Important Note: To see exactly what changed on the computer object refer to events created") strFileOpen.WriteLine ("--------------- for (Directory Service Changes) later in this log for Class: Computer") strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 10.)Computer Accounts Amended in the past 24hrs TOTAL = " & Count10) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '11--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("===========================================================") strFileOpen.WriteLine("= 11. User or Computer Objects Disabled in the past 24hrs =") strFileOpen.WriteLine("===========================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4725 Then count11 = count11 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 11.)User or Computer Objects Disabled in the past 24hrs TOTAL = " & Count11) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '12--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("==========================================================") strFileOpen.WriteLine("= 12. User or Computer Objects Enabled in the past 24hrs =") strFileOpen.WriteLine("==========================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4722 Then count12 = count12 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 12.)User or Computer Objects Enabled in the past 24hrs TOTAL = " & Count12) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '13--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("=========================================================") strFileOpen.WriteLine("= 13. Users Added to Security Groups in the past 24hrs =") strFileOpen.WriteLine("=========================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4728 Then count13 = count13 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 13.)Users Added to Security Groups in the past 24hrs TOTAL = " & Count13) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '14----------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("==================================================") strFileOpen.WriteLine("= 14. Security Groups Deleted in the past 24hrs =") strFileOpen.WriteLine("==================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4730 Then count14 = count14 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 14.)Security Groups Deleted in the past 24hrs TOTAL = " & Count14) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '15------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("=================================================") strFileOpen.WriteLine("= 15. Security Groups Created in the past 24hrs =") strFileOpen.WriteLine("=================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4727 Then count15 = count15 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 15.)Security Groups Created in the past 24hrs TOTAL = " & Count15) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '16------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("=========================================================") strFileOpen.WriteLine("= 16. Security Groups Amended/Changed in the past 24hrs =") strFileOpen.WriteLine("=========================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4737 Then count16 = count16 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Important Note: To see exactly what changed on the Group object refer to events created") strFileOpen.WriteLine ("--------------- for (Directory Service Changes) later in this log for Class: Group") strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 16.)Security Groups Amended/Changed in the past 24hrs TOTAL = " & Count16) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '17------------------------------------------------------------------------------------------------------------------------ strFileOpen.WriteLine("==========================================================") strFileOpen.WriteLine("= 17. Mail Distribution Groups Created in the past 24hrs =") strFileOpen.WriteLine("==========================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4749 Then count17 = count17 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 17.)Mail Distribution Groups Created in the past 24hrs TOTAL = " & Count17) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '18------------------------------------------------------------------------------------------------------------------------ strFileOpen.WriteLine("==========================================================") strFileOpen.WriteLine("= 18. Mail Distribution Groups Deleted in the past 24hrs =") strFileOpen.WriteLine("==========================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4753 Then count18 = count18 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 18.)Mail Distribution Groups Deleted in the past 24hrs TOTAL = " & Count18) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '19------------------------------------------------------------------------------------------------------------------------ strFileOpen.WriteLine("=================================================================") strFileOpen.WriteLine("= 19. Users Added To Mail Distribution Groups in the past 24hrs =") strFileOpen.WriteLine("=================================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4751 Then count19 = count19 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 19.)Users Added To Mail Distribution Groups in the past 24hrs TOTAL = " & Count19) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '20------------------------------------------------------------------------------------------------------------------------ strFileOpen.WriteLine("==================================================================") strFileOpen.WriteLine("= 20. Mail Distribution Groups Amended/Changed in the past 24hrs =") strFileOpen.WriteLine("==================================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4750 Then count20 = count20 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Important Note: To see exactly what changed on the Group object refer to events created") strFileOpen.WriteLine ("--------------- for (Directory Service Changes) later in this log for Class: Group") strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 20.)Mail Distribution Groups Amended/Changed in the past 24hrs TOTAL = " & Count20) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '21------------------------------------------------------------------------------------------------------------------------ strFileOpen.WriteLine("=========================================================================") strFileOpen.WriteLine("= 21. Directory Service Objects Created in the past 24hrs (Check CLASS) =") strFileOpen.WriteLine("=========================================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =5137 Then count21 = count21 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 21.)Directory Service Objects Created in the past 24hrs (Check CLASS) TOTAL = " & Count21) strFileOpen.WriteLine("stop21") strFileOpen.WriteLine(" ") '22------------------------------------------------------------------------------------------------------------------------ strFileOpen.WriteLine("=======================================================================") strFileOpen.WriteLine("= 22. Directory Service Objects Moved in the past 24hrs (Check CLASS) =") strFileOpen.WriteLine("=======================================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =5139 Then count22 = count22 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 22.)Directory Service Objects Moved in the past 24hrs (Check CLASS) TOTAL = " & Count22) strFileOpen.WriteLine("stop22") strFileOpen.WriteLine(" ") '23------------------------------------------------------------------------------------------------------------------------ strFileOpen.WriteLine("=========================================================================") strFileOpen.WriteLine("= 23. Directory Service Objects Deleted in the past 24hrs (Check CLASS) =") strFileOpen.WriteLine("=========================================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =5141 Then count23 = count23 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 23.)Directory Service Objects Deleted in the past 24hrs (Check CLASS) TOTAL = " & Count23) strFileOpen.WriteLine("stop23") strFileOpen.WriteLine(" ") '24------------------------------------------------------------------------------------------------------------------------ strFileOpen.WriteLine("=================================================================================================") strFileOpen.WriteLine("= 24. A directory service object was modified (CHECK OBJECT CLASS) for object that was modified =") strFileOpen.WriteLine("=================================================================================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =5136 Then count24 = count24 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 24.)A directory service object was modified (CHECK OBJECT CLASS) for object that was modified TOTAL = " & Count24) strFileOpen.WriteLine("stop24") strFileOpen.WriteLine(" ") '25--------------------------------------------------------------------------------------------------------------------------------------------------- strFileOpen.WriteLine("========================================================================================================================") strFileOpen.WriteLine("==================================") strFileOpen.WriteLine("= 25. EPIC LOGON FAILED ATTEMPTS =") strFileOpen.WriteLine("==================================") For Each objItem in colLoggedEvents EventDate = GetVBDate(objItem.TimeGenerated) If DateDiff("h",DateNow,EventDate) > -24 Then If objItem.EventCode =4625 Then count25 = count25 + 1 strFileOpen.WriteLine (" ") strFileOpen.WriteLine ("---------------------------------Start Of Entry--------------------------------") strFileOpen.WriteLine ("EventDate\\Time: " & EventDate) strFileOpen.WriteLine ("Message: " & objItem.Message) strFileOpen.WriteLine ("----------------------------------End Of Entry---------------------------------") strFileOpen.WriteLine (" ") strFileOpen.WriteLine (" ") End If end if Next strFileOpen.WriteLine(" ") strFileOpen.WriteLine("** 25.)EPIC LOGON FAILED ATTEMPTS TOTAL = " & Count25) strFileOpen.WriteLine(" ") strFileOpen.WriteLine(" ") '-------------------------------------backup and Clear security event log--------------------------------------------------------------------------- dtmThisDay = Day(Date) dtmThisMonth = Month(Date) dtmThisYear = Year(Date) strBackupName = dtmThisYear & "_" & dtmThisMonth _ & "_" & dtmThisDay strComputer = "." Set objWMIService = GetObject("winmgmts:" _ & "{impersonationLevel=impersonate,(Backup)}!\\\\" & _ strComputer & "\\root\\cimv2") Set colLogFiles = objWMIService.ExecQuery _ ("Select * from Win32_NTEventLogFile " _ & "Where LogFileName='Security'") For Each objLogfile in colLogFiles objLogFile.BackupEventLog("c:\\audit_AD\\" _ & strBackupName & _ "_Security.evt") objLogFile.ClearEventLog() Next '--------------------------------------------------------------------------------------------------------------------------------------------------- Function GetVBDate(wd) GetVBDate = DateSerial(left(wd,4),mid(wd,5,2),mid(wd,7,2))+ TimeSerial(mid(wd,9,2),mid(wd,11,2),mid(wd,13,2)) End Function '--------------------------------------------------------------------------------------------------------------------------------------------------- '================================================================SECTION 2 AD Auditing============================================================== '-----------------------------------------------------Declaring and setting variables--------------------------------------------------------------- WScript.Sleep(4000) Dim strEmailFrom, strEmailTo, strEmailSubject, strEmailBody, strSMTP, OUcreateCount, OUDeleteCount, OUMoveCount, OUChangeCount Dim PermChangeCount OUcreateCount = 0 OUDeleteCount = 0 OUMoveCount = 0 OUChangeCount = 0 PermChangeCount = 0 Const ForReading=1 Set WshNetwork = WScript.CreateObject("WScript.Network") StrComputer = WshNetwork.ComputerName Set objFSO = CreateObject("Scripting.FileSystemObject") folder = "C:\\audit_AD\\" filePath = folder & "AD_Account_Management_Events.txt" 'original log created by SECTION 1 that will be used in this script to generate the Set myFile = objFSO.OpenTextFile(filePath, ForReading, True) 'summary report, This file must exist for this Script to work strEmailFrom = "xx@xx.com" strEmailTo = "aa@aa.com; bb@bb.com" strEmailSubject = "Summary Of AD Activity on " & StrComputer & " for the past 24hrs - Date/TimeStamp: " & Datenow strSMTP = "xxx.xxx.xxx.xxx" '------------------------------------------------------Important Notes Area in Body Of E-mail------------------------------------------------------- strEmailBody = strEmailbody & vbCRLf & "IMPORTANT NOTES to Auditor:" strEmailBody = strEmailbody & vbCRLf strEmailBody = strEmailbody & vbCRLf & "Sections 21,22,23,24 all related to Directory Service Objects. These 4 categories are repetative of other sections," strEmailBody = strEmailbody & vbCRLf & "meaning that if an object was amended, (For example the permissions changed on a user account in section 5 etc.) the" strEmailBody = strEmailbody & vbCRLf & "event will also appear in section 24 with specific details. Thus sections 21,22,23 and 24 will log in depth changes" strEmailBody = strEmailbody & vbCRLf & "creations, deletions, move's and permissions. Thus in this example section 5 will only notify that a change has occured" strEmailBody = strEmailbody & vbCRLf & "and section 24 will log the exact specific change made." strEmailBody = strEmailbody & vbCRLf & "" strEmailBody = strEmailbody & vbCRLf & "Thus when reviewing logs in sections 21,22,23 and 24, look at the line that says Class: to see what object was changed" strEmailBody = strEmailbody & vbCRLf & "This will be either, user, computer, group, organisationalunit etc....." strEmailBody = strEmailbody & vbCRLf & "Additionally if the LDAP Display Name: variable is NTSecurityDescriptor and the Class: is OrganisationalUnit this means" strEmailBody = strEmailbody & vbCRLf & "that the permission has changed on the OU. Additional Totals have been added for OU's in the summary report with regards to sections 21, 22, 23 and 24." strEmailBody = strEmailbody & vbCRLf & "" strEmailBody = strEmailbody & vbCRLf & "The Full report can be viewed at on the DC at C:\\Audit_Ad" strEmailBody = strEmailbody & vbCRLf strEmailBody = strEmailbody & vbCRLf '------------------This section reads the original log file created in SECTION 1 and generates a summary report------------------------------------- Do While Not myFile.AtEndofStream myLine = myFile.ReadLine MarkersLine = left(myline,3) ' main summary markers(Will read all lines starting with "** " in log and append into email body) EventLine = left(myline,19) 'eventlog (Will read all lines starting with "defined field" in original log and append into email body) If EventLine = "Time of last clear:" Then strEmailBody = strEmailbody & vbCRLf & "Security Event Log " & MyLine & " on " & StrComputer & vbCRLf strEmailBody = strEmailbody & vbCRLf End If If MarkersLine = "** " Then strEmailBody = strEmailbody & vbCRLf & MyLine & vbCRLf End If Loop myFile.Close '1.---------This section reads the original log file created in SECTION 1 and generates a summary report specifically for OU Creations-------------- Set objFSO = CreateObject("Scripting.FileSystemObject") folder = "C:\\audit_AD\\" filePath = folder & "AD_Account_Management_Events.txt" Set myFile = objFSO.OpenTextFile(filePath, ForReading, True) blnAddToBody = False Do While Not myFile.AtEndofStream myLine = myFile.ReadLine ClassLine = " Class: organizationalUnit" ' Sets the class that will be searched inside the original log strStartLine1 = "= 21. Directory Service Objects Created in the past 24hrs (Check CLASS) =" StrEndLine1 = "stop21" If myLine = strStartLine1 Then blnAddToBody = True End If If myLine = ClassLine Then If blnAddToBody = True Then OUcreateCount = OUcreateCount + 1 end if end if if myLine = strEndLine1 Then blnAddToBody = False end if Loop myFile.Close '2.---------This section reads the original log file created in SECTION 1 and generates a summary report specifically for OU Moves------------------- Set objFSO = CreateObject("Scripting.FileSystemObject") folder = "C:\\audit_AD\\" filePath = folder & "AD_Account_Management_Events.txt" Set myFile = objFSO.OpenTextFile(filePath, ForReading, True) blnAddToBody = True Do While Not myFile.AtEndofStream myLine = myFile.ReadLine ClassLine = " Class: organizationalUnit" ' Sets the class that will be searched inside the original log strStartLine2 = "= 22. Directory Service Objects Moved in the past 24hrs (Check CLASS) =" StrEndLine2 = "stop22" If myLine = strStartLine2 Then blnAddToBody = True End If If myLine = ClassLine Then If blnAddToBody = True Then OUMoveCount = OUMoveCount + 1 end if end if if myLine = strEndLine2 Then blnAddToBody = False end if Loop myFile.Close '3.---------This section reads the original log file created in SECTION 1 and generates a summary report specifically for OU Deletions---------------- Set objFSO = CreateObject("Scripting.FileSystemObject") folder = "C:\\audit_AD\\" filePath = folder & "AD_Account_Management_Events.txt" Set myFile = objFSO.OpenTextFile(filePath, ForReading, True) blnAddToBody = False Do While Not myFile.AtEndofStream myLine = myFile.ReadLine ClassLine = " Class: organizationalUnit" ' Sets the class that will be searched inside the original log strStartLine3 = "= 23. Directory Service Objects Deleted in the past 24hrs (Check CLASS) =" StrEndLine3 = "stop23" If myLine = strStartLine3 Then blnAddToBody = True End If If myLine = ClassLine Then If blnAddToBody = True Then OUDeleteCount = OUDeleteCount + 1 end if end if if myLine = strEndLine3 Then blnAddToBody = False end if Loop myFile.Close '4.---------This section reads the original log file created in SECTION 1 and generates a summary report specifically for OU Changes---------------- Set objFSO = CreateObject("Scripting.FileSystemObject") folder = "C:\\audit_AD\\" filePath = folder & "AD_Account_Management_Events.txt" Set myFile = objFSO.OpenTextFile(filePath, ForReading, True) blnAddToBody = False Do While Not myFile.AtEndofStream myLine = myFile.ReadLine ClassLine = " Class: organizationalUnit" ' Sets the class that will be searched inside the original log strStartLine4 = "= 24. A directory service object was modified (CHECK OBJECT CLASS) for object that was modified =" StrEndLine4 = "stop24" If myLine = strStartLine4 Then blnAddToBody = True End If If myLine = ClassLine Then If blnAddToBody = True Then OUChangeCount = OUChangeCount + 1 end if end if if myLine = strEndLine4 Then blnAddToBody = False end if Loop myFile.Close '============================================================END OF SUMMARY ENUMERATION============================================================= strEmailBody = strEmailbody & vbCRLf strEmailBody = strEmailbody & vbCRLf & "With regards to section 21: Specific OU Creations = " & OUCreateCount & vbCRLf strEmailBody = strEmailbody & vbCRLf & "With regards to section 22: Specific OU Moves = " & OUMoveCount & vbCRLf strEmailBody = strEmailbody & vbCRLf & "With regards to section 23: Specific OU Deletions = " & OUDeleteCount & vbCRLf strEmailBody = strEmailbody & vbCRLf & "With regards to section 24: Specific OU Changes e.g. Permissions = " & OUChangeCount & vbCRLf Set objEmail = CreateObject("CDO.Message") objEmail.From = strEmailFrom objEmail.To = strEmailTo objEmail.Subject = strEmailSubject objEmail.Textbody = strEmailBody objEmail.Configuration.Fields.Item _ ("http://schemas.microsoft.com/cdo/configuration/sendusing") = 2 objEmail.Configuration.Fields.Item _ ("http://schemas.microsoft.com/cdo/configuration/smtpserver") = strSMTP objEmail.Configuration.Fields.Item _ ("http://schemas.microsoft.com/cdo/configuration/smtpserverport") = 25 objEmail.Configuration.Fields.Update objEmail.Send
combined_dataset/train/non-malicious/sample_3_94.ps1
sample_3_94.ps1
# *********************************************************************************************** # File: utils_ConfigMgr12-ps1 # Version 1.0 # Date: 02-17-2012 - Last edit 2022-06-01 # Author: Vinay Pamnani - vinpa@microsoft.com # Description: Utility Script to load common variables/functions. View utils_ConfigMgr07_ReadMe.txt for details. # 1. Defines commonly used functions in the Troubleshooter # 2. Defines global variables # 3. Detects Configuration Manager Client and Server Roles Installation Status # 4. Detects Install and Log Locations for Client, Server, Admin Console and WSUS # 5. Executes WSUSutil.exe checkhealth, if WSUS is installed. # *********************************************************************************************** trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ continue } # Manifest Name - Used for Logging Set-Variable -Name ManifestName -Value "CM12" -Scope Global Set-Variable -Name ManifestLog -Value (Join-Path -Path ($PWD.Path) -ChildPath "..\_SDPExecution_log.txt") -Scope Global if (Test-Path $ManifestLog) { Remove-Item -Path $ManifestLog -Force } ########################## ## Function Definitions ## ########################## function TraceOut{ # To standardize Logging to StdOut.log param ( $WhatToWrite ) process { $SName = ([System.IO.Path]::GetFileName($MyInvocation.ScriptName)) $SName = $SName.Substring(0, $SName.LastIndexOf(".")) $SLine = $MyInvocation.ScriptLineNumber.ToString() $STime =Get-Date -Format G WriteTo-StdOut " $STime [$ManifestName][$ComputerName][$SName][$SLine] $WhatToWrite" "$STime [$ManifestName][$ComputerName][$SName][$SLine] $WhatToWrite" | Out-File -FilePath $ManifestLog -Append -ErrorAction SilentlyContinue } } function AddTo-CMClientSummary (){ # Adds the specified name/value to the appropriate CMClient PS Objects so that they can be dumped to File & Report in DC_FinishExecution. param ( $Name, $Value, [switch]$NoToSummaryFile, [switch]$NoToSummaryReport ) process { if(-not($NoToSummaryFile)) { Add-Member -InputObject $global:CMClientFileSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } if (-not($NoToSummaryReport)) { Add-Member -InputObject $global:CMClientReportSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } } } function AddTo-CMServerSummary (){ # Adds the specified name/value to the appropriate CMServer PS Objects so that they can be dumped to File & Report in DC_FinishExecution. param ( $Name, $Value, [switch]$NoToSummaryFile, [switch]$NoToSummaryReport ) process { if(-not($NoToSummaryFile)) { Add-Member -InputObject $global:CMServerFileSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } if (-not($NoToSummaryReport)) { Add-Member -InputObject $global:CMServerReportSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } } } function AddTo-CMDatabaseSummary (){ # Adds the specified name/value to the appropriate CMDatabase PS Objects so that they can be dumped to File & Report in DC_FinishExecution. param ( $Name, $Value, [switch]$NoToSummaryFile, [switch]$NoToSummaryReport, [switch]$NoToSummaryQueries ) process { if(-not($NoToSummaryFile)) { Add-Member -InputObject $global:CMDatabaseFileSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } if (-not($NoToSummaryReport)) { Add-Member -InputObject $global:CMDatabaseReportSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } if (-not($NoToSummaryQueries)) { Add-Member -InputObject $global:CMDatabaseQuerySummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } } } function Get-ADKVersion (){ process { TraceOut "Get-ADKVersion: Entering" $UninstallKey = "HKLM:\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall" $ADKKey = Get-ChildItem $UninstallKey -Recurse | ForEach-Object {Get-ItemProperty $_.PSPath} | Where-Object {$_.DisplayName -like '*Assessment and Deployment Kit*'} if ($ADKKey) { return $ADKKey.DisplayVersion } else { return "ADK Version Not Found." } TraceOut "Get-ADKVersion: Leaving" } } ######################################### ## SMS Provider and Database Functions ## ######################################### function Get-DBConnection (){ param ( $DatabaseServer, $DatabaseName ) process { TraceOut "Get-DBConnection: Entering" try { # Get NetBIOS name of the Database Server If ($DatabaseServer.Contains(".")) { $DatabaseServer = $DatabaseServer.Substring(0,$DatabaseServer.IndexOf(".")) } # Prepare a Connection String If ($DatabaseName.Contains("\")) { $InstanceName = $DatabaseName.Substring(0,$DatabaseName.IndexOf("\")) $DatabaseName = $DatabaseName.Substring($DatabaseName.IndexOf("\")+1) $strConnString = "Integrated Security=SSPI; Application Name=ConfigMgr Diagnostics; Server=$DatabaseServer\$InstanceName; Database=$DatabaseName" } Else { $strConnString = "Integrated Security=SSPI; Application Name=ConfigMgr Diagnostics; Server=$DatabaseServer; Database=$DatabaseName" } $SqlConnection = New-Object System.Data.SqlClient.SqlConnection $SqlConnection.ConnectionString = $strConnString TraceOut "SQL Connection String: $strConnString" $Error.Clear() $SqlConnection.Open() TraceOut "Get-DBConnection: Successful" # Reset Error Variable only when we're connecting to SCCM database and the connection is successful. # If SCCM database connection failed, TS_CheckSQLConfig will retry connection to MASTER, but we don't want to reset Error Variable in that case, if connection succeeds. if ($DatabaseName.ToUpper() -ne "MASTER") { $global:DatabaseConnectionError = $null } } catch [Exception] { $global:DatabaseConnectionError = $_ $SqlConnection = $null TraceOut "Get-DBConnection: Failed with Error: $global:DatabaseConnectionError" } TraceOut "Get-DBConnection: Leaving" return $SqlConnection } } ###################### ## Global Variables ## ###################### TraceOut "Script Started" TraceOut "Setting Global Variables..." # Get Current Time Set-Variable -Name CurrentTime -Scope Global $Temp = Get-CimInstance -Namespace root\cimv2 -Class Win32_OperatingSystem -ErrorAction SilentlyContinue If ($Temp -is [CimInstance]) { $CurrentTime = ($Temp.LocalDateTime).ToString() $Temp = Get-CimInstance -Namespace root\cimv2 -Class Win32_TimeZone -ErrorAction SilentlyContinue If ($Temp -is [CimInstance]) { $CurrentTime += " $($Temp.Description)" if ((Get-Date).IsDayLightSavingTime()) { $CurrentTime += " - Daylight Saving Time" } } } else { $CurrentTime = Get-Date -Format G } # Remote Execution Status Set-Variable RemoteStatus -Scope Global # Set Software\Microsoft Registry Key path Set-Variable Reg_MS -Value "HKLM\SOFTWARE\Microsoft" -Scope Global Set-Variable Reg_MS6432 -Value "HKLM\SOFTWARE\Wow6432Node\Microsoft" -Scope Global # Set SMS, CCM and WSUS Registry Key Path Set-Variable -Name Reg_CCM -Value ($REG_MS + "\CCM") -Scope Global Set-Variable -Name Reg_SMS -Value ($REG_MS + "\SMS") -Scope Global Set-Variable -Name Reg_WSUS -Value "HKLM\Software\Microsoft\Update Services" -Scope Global # Log Collection Variables and Flags Set-Variable -Name GetCCMLogs -Value $false -Scope Global Set-Variable -Name GetSMSLogs -Value $false -Scope Global # CCMLogPaths is defined as an array since CCM Log Path could be at various locations depending on Client/Role install status # We'll get all possible locations and parse through Get-Unique to a single value stored in CCMLogPath later since there will only be one CCM Log Location Set-Variable -Name CCMLogPaths -Value @() -Scope Global Set-Variable -Name CCMLogPath -Scope Global Set-Variable -Name CCMInstallDir -Scope Global Set-Variable -Name CCMSetupLogPath -Scope Global # Set Variables for Logs for CM12 Roles Set-Variable -Name Is_SiteSystem -Scope Global Set-Variable -Name SMSLogPath -Scope Global Set-Variable -Name AdminUILogPath -Scope Global Set-Variable -Name EnrollPointLogPath -Scope Global Set-Variable -Name EnrollProxyPointLogPath -Scope Global Set-Variable -Name AppCatalogLogPath -Scope Global Set-Variable -Name AppCatalogSvcLogPath -Scope Global Set-Variable -Name CRPLogPath -Scope Global Set-Variable -Name SMSSHVLogPath -Scope Global Set-Variable -Name DPLogPath -Scope Global Set-Variable -Name SMSProvLogPath -Scope Global Set-Variable -Name SQLBackupLogPathUNC -Scope Global # Site Server Globals Set-Variable -Name SMSInstallDir -Scope Global Set-Variable -Name SMSSiteCode -Scope Global Set-Variable -Name SiteType -Scope Global Set-Variable -Name SiteBuildNumber -Scope Global Set-Variable -Name ConfigMgrDBServer -Scope Global Set-Variable -Name ConfigMgrDBName -Scope Global Set-Variable -Name ConfigMgrDBNameNoInstance -Scope Global Set-Variable -Name SMSProviderServer -Scope Global Set-Variable -Name SMSProviderNamespace -Scope Global # Database Connection Globals Set-Variable -Name DatabaseConnection -Scope Global Set-Variable -Name DatabaseConnectionError -Scope Global ############################### ## Summary Files and Objects ## ############################### # Summary Objects Set-Variable -Name SummarySectionDescription -Scope Global -Value "ConfigMgr Data Collection Summary" Set-Variable -Name CMClientFileSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMClientReportSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMServerFileSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMServerReportSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMDatabaseFileSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMDatabaseReportSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMDatabaseQuerySummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMRolesStatusFilePSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMInstalledRolesStatusReportPSObject -Scope Global -Value (New-Object PSObject) ##################### ## Start Execution ## ##################### Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_ACTIVITY_Utils -Status $ScriptStrings.ID_Utils_Init # Print Variable values TraceOut "Global Variable - OSArchitecture: $OSArchitecture" # $OSArchitecture is defined in utils_CTS.ps1 TraceOut "Global Variable - Reg_SMS: $Reg_SMS" TraceOut "Global Variable - Reg_CCM: $Reg_CCM" TraceOut "Global Variable - Reg_WSUS: $Reg_WSUS" # -------------------------------------------------------------------------------------------- # Get Remote Execution Status from Get-TSRemote. The following return values can be returned: # 0 - No TS_Remote environment # 1 - Under TS_Remote environment, but running on the local machine # 2 - Under TS_Remote environment and running on a remote machine # -------------------------------------------------------------------------------------------- $RemoteStatus = (Get-TSRemote) TraceOut "Global Remote Execution Status: $RemoteStatus" # ----------------------- # Set CCM Setup Log Path # ----------------------- $CCMSetupLogPath = Join-Path $Env:windir "ccmsetup" TraceOut "Global Variable - CCMSetupLogPath: $CCMSetupLogPath" # --------------------------------- # Set Site System Global Variables # --------------------------------- #$InstalledRolesStatus = New-Object PSObject # For Update-DiagReport #$RolesStatus = New-Object PSObject $RolesArray = @{ "Client" = "Configuration Manager Client"; "SiteServer" = "Configuration Manager Site Server"; "SMSProv" = "SMS Provider Server"; "AdminUI" = "Configuration Manager Admin Console"; "AWEBSVC" = "Application Catalog Web Service Point"; "PORTALWEB" = "Application Catalog Website Point"; "AIUS" = "Asset Intelligence Synchronization Point"; "AMTSP" = "Out of Band Service Point"; "CRP" = "Certificate Registration Point"; "DP" = "Distribution Point"; "DWSS" = "Data Warehouse Service Point"; "ENROLLSRV" = "Enrollment Point"; "ENROLLWEB" = "Enrollment Proxy Point"; "EP" = "Endpoint Protection Point"; "FSP" = "Fallback Status Point"; "IIS" = "IIS Web Server"; "MCS" = "Distribution Point - Multicast Enabled"; "MP" = "Management Point"; "PullDP" = "Distribution Point - Pull Distribution Point"; "PXE" = "Distribution Point - PXE Enabled"; "SMP" = "State Migration Point"; "SMS_CLOUD_PROXYCONNECTOR" = "CMG Connection Point"; "SMSSHV" = "System Health Validator Point"; "SRSRP" = "Reporting Services Point"; "WSUS" = "Software Update Point" } foreach ($Role in ($RolesArray.Keys | Sort-Object)) { Switch ($Role) { "Client" { $Installed = Check-RegValueExists ($Reg_SMS + "\Mobile Client") "ProductVersion" If ($Installed) { $GetCCMLogs = $true $CCMLogPaths += (Get-RegValue ($Reg_CCM + "\Logging\@Global") "LogDirectory") + "\" } } "SiteServer" { $Installed = Check-RegValueExists ($Reg_SMS + "\Setup") "Full Version" If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "SMSProv" { $Installed = Check-RegKeyExists ($Reg_SMS + "\Providers") If ($Installed) { $SMSProvLogPath = (Get-RegValue ($Reg_SMS + "\Providers") "Logging Directory") } } "AdminUI" { $Installed = Check-RegKeyExists ($Reg_MS6432 + "\ConfigMgr10\AdminUI") If ($Installed) {$AdminUILogPath = (Get-RegValue ($Reg_MS6432 + "\ConfigMgr10\AdminUI") "AdminUILog")} } "AWEBSVC" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $AppCatalogSvcLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "PORTALWEB" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $AppCatalogLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "AIUS" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "AMTSP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "CRP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $CRPLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "DP" { $Installed = Check-RegValueExists ($Reg_SMS + "\" + $Role) "NALPath" If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "ENROLLSRV" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $EnrollPointLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "ENROLLWEB" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $EnrollProxyPointLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "EP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\Operations Management\Components\SMS_ENDPOINT_PROTECTION_CONTROL_MANAGER") } "FSP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true $CCMLogPaths += Get-RegValue ($Reg_SMS + "\" + $Role +"\Logging\@Global") "LogDirectory" $Is_SiteSystem = $true } } "MCS" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true ; $CCMLogPaths += Get-RegValue ($Reg_SMS + "\" + $Role +"\Logging\@Global") "LogDirectory" $Is_SiteSystem = $true } } "MP" { $Installed = Check-RegValueExists ($Reg_SMS + "\" + $Role) "MP Hostname" If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true ; $Is_SiteSystem = $true $CCMLogPaths += (Get-RegValue ($Reg_CCM + "\Logging\@Global") "LogDirectory") + "\" } } "PullDP" { $Temp = Get-RegValue ($Reg_SMS + "\DP") "IsPullDP" If ($Temp) { $Installed = $true } Else { $Installed = $false } If ($Installed) { $GetCCMLogs = $true $Is_SiteSystem = $true $CCMLogPaths += (Get-RegValue ($Reg_CCM + "\Logging\@Global") "LogDirectory") + "\" } } "PXE" { $Temp = Get-RegValue ($Reg_SMS + "\DP") "IsPXE" If ($Temp) { $Installed = $true } Else { $Installed = $false } If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true ; $Is_SiteSystem = $true $CCMLogPaths += Get-RegValue ($Reg_SMS + "\" + $Role +"\Logging\@Global") "LogDirectory" } } "SMP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true ; $CCMLogPaths += Get-RegValue ($Reg_SMS + "\" + $Role +"\Logging\@Global") "LogDirectory" $Is_SiteSystem = $true } } "SMSSHV" { $Installed = Check-RegKeyExists ($Reg_MS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true $SMSSHVLogPath = (Get-RegValue ($Reg_MS + "\" + $Role + "\Logging\@Global") "LogDirectory") $Is_SiteSystem = $true } } "SRSRP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "WSUS" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } Default { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) } } # Set a Variable for each Role and it's Install Status Set-Variable -Name ("Is_" + $Role) -Value $Installed -Scope Global Add-Member -InputObject $global:CMRolesStatusFilePSObject -MemberType NoteProperty -Name ($RolesArray.Get_Item($Role)) -Value (Get-Variable ("Is_" + $Role) -ValueOnly) TraceOut ("Global Role Variable - Is_" + $Role + ": " + (Get-Variable ("Is_" + $Role) -ValueOnly)) if ($Installed) { Add-Member -InputObject $global:CMInstalledRolesStatusReportPSObject -MemberType NoteProperty -Name ($RolesArray.Item($Role)) -Value (Get-Variable ("Is_" + $Role) -ValueOnly) } } # Mark IIS installed, if WSUS is installed on CAS, since SMS\IIS registry is not set on CAS if ($Is_WSUS) { $Is_IIS = $true } # ----------------------------------------------------------------------------------------------------------------------------- # Parse CCMLogPaths, and get a unique path # To handle collection of CCM Logs even if Client is not installed, but a Role is installed which stores logs in CCM directory # ----------------------------------------------------------------------------------------------------------------------------- $CCMLogPath = $CCMLogPaths | Sort-Object | Get-Unique # Error Handling if Get-RegValue failed to obtain a valid CCMLogPath and returned null instead If (($CCMLogPath -eq "\") -or ($null -eq $CCMLogPath)) { $CCMLogPath = $null If ($GetCCMLogs) { TraceOut "ERROR: CCM Logs need to be collected but CCM Directory not found." } Else { TraceOut "WARNING: GetCCMLogs is set to False. CCM Log Path Not Required." } } Else { $CCMInstallDir = $CCMLogPath.Substring(0, $CCMLogPath.LastIndexOf("\Logs")) TraceOut "Global Variable - CCMInstallDir: $CCMInstallDir" TraceOut "Global Variable - CCMLogPath: $CCMLogPath" } If ($Is_Client) { Set-Variable -Name Is_Lantern -Scope Global -Value $true Set-Variable -Name LanternLogPath -Scope Global $LanternLogPath = Join-Path (Get-RegValue ($Reg_MS + "\PolicyPlatform\Client\Trace") "LogDir") (Get-RegValue ($Reg_MS + "\PolicyPlatform\Client\Trace") "LogFile") TraceOut "Global Variable - LanternLogPath: $LanternLogPath" } # ----------------------------- # Get SMSLogPath from Registry # ----------------------------- If ($GetSMSLogs) { $SMSInstallDir = (Get-RegValue ($Reg_SMS + "\Identification") "Installation Directory") If ($null -ne $SMSInstallDir) { $SMSLogPath = $SMSInstallDir + "\Logs" TraceOut "Global Variable - SMSInstallDir: $SMSInstallDir" TraceOut "Global Variable - SMSLogPath: $SMSLogPath" } Else { $SMSLogPath = $null TraceOut "ERROR: SMS Logs need to be collected but SMS Install Directory not Found" } } # ------------------------------- # Get Site Server Info From Registry # ------------------------------- If ($Is_SiteServer) { # Database Server and name $ConfigMgrDBServer = Get-RegValue ($Reg_SMS + "\SQL Server\Site System SQL Account") "Server" # Stored as FQDN $ConfigMgrDBName = Get-RegValue ($Reg_SMS + "\SQL Server\Site System SQL Account") "Database Name" # Stored as INSTANCE\DBNAME or just DBNAME if on Default instance # Get the database name without the Instance Name If ($ConfigMgrDBName.Contains("\")) { $ConfigMgrDBNameNoInstance = $ConfigMgrDBName.Substring($ConfigMgrDBName.IndexOf("\")+1) } Else { $ConfigMgrDBNameNoInstance = $ConfigMgrDBName } # Get Database connection. # If connection fails, DatabaseConnectionError will have the error. If connection is successful, DatabaseConnectionError will be $null. # Connection is closed in FinishExecution $global:DatabaseConnection = Get-DBConnection -DatabaseServer $ConfigMgrDBServer -DatabaseName $ConfigMgrDBName # Site Type $global:SiteType = Get-RegValue ($Reg_SMS + "\Setup") "Type" $global:SiteBuildNumber = Get-RegValue ($Reg_SMS + "\Setup") "Version" # Site Code and Provider Namespace $global:SMSProviderServer = Get-RegValue ($Reg_SMS + "\Setup") "Provider Location" $global:SMSSiteCode = Get-RegValue ($Reg_SMS + "\Identification") "Site Code" If (($null -ne $global:SMSSiteCode) -and ($null -ne $global:SMSProviderServer)) { $global:SMSProviderNamespace = "root\sms\site_$SMSSiteCode" } # Site Server FQDN $SiteServerFQDN = [System.Net.Dns]::GetHostByName(($ComputerName)).HostName # SQLBackup Log Location (SqlBkup.log) $RegKey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey("LocalMachine", $ConfigMgrDBServer) $Key = $RegKey.OpenSubKey("SOFTWARE\Microsoft\SMS\Tracing\SMS_SITE_SQL_BACKUP_$SiteServerFQDN") if ($Key -ne $null) { $SQLBackupLogPath = $Key.GetValue("TraceFileName") $SQLBackupLogPathUNC = $SQLBackupLogPath -replace ":","$" $SQLBackupLogPathUNC = "\\$ConfigMgrDBServer\$SQLBackupLogPathUNC" $SQLBackupLogPathUNC = Split-Path $SQLBackupLogPathUNC } TraceOut "Global Variable - SiteType: $SiteType" TraceOut "Global Variable - SQLBackupLogPathUNC: $SQLBackupLogPathUNC" TraceOut "Global Variable - ConfigMgrDBServer: $ConfigMgrDBServer" TraceOut "Global Variable - ConfigMgrDBName: $ConfigMgrDBName" } # -------------------------------------------------------------------------------------------------------------------------- # Set WSUS Install Directory, if WSUS is installed. # Execute WSUSutil checkhealth. Running it now would ensure that it's finished by the time we collect Event Logs # Fails to run remotely, because it runs under Anonymous. Using psexec to execute, to ensure that it runs remotely as well. # -------------------------------------------------------------------------------------------------------------------------- If ($Is_WSUS) { $WSUSInstallDir = Get-RegValue ($Reg_WSUS + "\Server\Setup") "TargetDir" If ($null -ne $WSUSInstallDir) { TraceOut "Global Variable - WSUSInstallDir: $WSUSInstallDir" TraceOut "Running WSUSutil.exe checkhealth..." $CmdToRun = "psexec.exe /accepteula -s `"" + $WSUSInstallDir + "Tools\WSUSutil.exe`" checkhealth" RunCmd -commandToRun $CmdToRun -collectFiles $false } Else { TraceOut "ERROR: WSUS Role detected but WSUS Install Directory not found" } } # ----------------------------------------------------------------------- # Get DP Logs Directory, if DP is installed and remote from Site Server. # ----------------------------------------------------------------------- If ($Is_DP) { If ($Is_SiteServer -eq $false) { $DPLogPath = (Get-CimInstance Win32_Share -filter "Name LIKE 'SMS_DP$'").path + "\sms\Logs" TraceOut "Global Variable - DPLogPath = $DPLogPath" } } # ---------------------- # Remove Temp Variables # ---------------------- Remove-Variable -Name Role Remove-Variable -Name Installed TraceOut "Completed" # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC0q14USZymFauO # Cz7bFCzBT6EhOcFr1gRHKV29itfWgqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEs6 # Q9KAQxU8qUSw+EvxNKTqTEkKjGQMeIOioS64LGRKMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEARMKarFVWEVypwYkz65lJn5ddEubQEumi+61b # Mg7dp92Ep6EseGHVwtoG4wgzLzHGGLOW/l0zI1C6lH+vZrUQeuka9vM9G1bixwtC # C6FLrDi/yC1TiV7STXU3i5U6zN88tGUDDjggLTh/A2En4VBFMI2Al8fgbFAqcnK0 # yi2gMXaFjzL+UUQMx3p7m+laDmdAqFwgA4xa80/wape7rSjLxFHcDZtmwdBM8GGr # NIahnSBsTvhB0jPCxLs0oZIlPjivX+DRC3sWqmnkTuvNX8u+4kQlq+l4g2TyJ8CA # q6ZYJ/UqnsmdfmgE6NJh2+gvpKvrs/0Y/Pf0rx+IzFcV6QD/7qGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBqRb3ft5phxHS/7Bh3C45KQCZPUA8HdI8c # Dyag+bxxNwIGZut+oGFXGBMyMDI0MTAyODExNDA0MC4yNjZaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big # r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF # RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts # urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF # 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83 # 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ # t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l # RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT # shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+ # vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7 # 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A # SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt # weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc # D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL # 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO # RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H # WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn # jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va # iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC # 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K # tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW # wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w # fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0 # MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA # AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l # eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L # fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M # Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a # tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao # 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgfZREQ17uhpFyt8YeiNdC2OsClmLWzSSqV91Jr7uqyEMwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3 # d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU # R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICAFd3h6YXlMcoMFL1cGSk6Y1a5dihKtMy # YEcIrH6pX0MM9c84ICNltQ0JJPcUuGpb5Ab+OvTLfd7vZgJSJSJN8+QzGjS4y/yE # Wj1xVnHrLdg4zb8eVSm2sJRvetPFSlvEr+VPUMm/3Neq23IFtfTrkTVeWPKZzaT5 # ZhTZi55uPwA99dRQLMIjXbhBFE2hs46kiK+gRiKxKvAi0RjjEQDsqekD+DAIcykH # +suxJa87sNeUXMz07RSjQPKfKJYEic7M1mbj7KTXSJu+tbsurDbrxrAE0nknKob8 # /ZYy9+M5csCmzLTiFA6vxe43IEWJDoOZd85FdltbMrvJhJsD0gYn7DSnWfTSJODs # 7iBltyOyzwn69klILkY8XQAG6DK2lU5XMXOgPfo8qw+y9ifCR463mAdEJF/EaJn9 # 7TbyrhMxh0IEdbxGwEf0dVFjAsIVU5CeVZHvDEjZ3lygctuTfdwB7lqye8GG0N2F # OVoGITgSwRP7qkM/mUb0B6vw2kPBN6m1voE1wsHCqSVfWa93zMLqdVusOPuXXfjP # WERXtScAHtelWV2dZDgGz33JzSkit4uk3+fN4oGT2cUnNAo67EInRIipSeRz+bhM # 06hC9K5GL6nHBZce8AhB7xQaeokT/CFKhnn7OdZdzyWk2HOy3ZWGvgemJkYkEElw # jEC8FIL3pq8b # SIG # End signature block
combined_dataset/train/non-malicious/sample_44_92.ps1
sample_44_92.ps1
# # Module manifest for module 'PowerShellEditorServices' # # Generated by: daviwil # # Generated on: 5/12/2016 # @{ # Script module or binary module file associated with this manifest. RootModule = if ($PSEdition -eq 'Core') { 'bin/Core/Microsoft.PowerShell.EditorServices.Hosting.dll' } else { 'bin/Desktop/Microsoft.PowerShell.EditorServices.Hosting.dll' } # Version number of this module. ModuleVersion = '3.20.1' # ID used to uniquely identify this module GUID = '9ca15887-53a2-479a-9cda-48d26bcb6c47' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) Microsoft Corporation' # Description of the functionality provided by this module # Description = '' # Minimum version of the Windows PowerShell engine required by this module # NOTE: The syntax used above in the manifest means this manifest cannot be read in PS 4 or below. # Instead this is just an informative field. PowerShellVersion = '5.1' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module # NOTE: We check this later, so that the error message is communicated properly to the user # DotNetFrameworkVersion = '4.6.2' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @('Start-EditorServices') # Variables to export from this module VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() CompatiblePSEditions = @('Core', 'Desktop') # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. LicenseUri = 'https://github.com/PowerShell/PowerShellEditorServices/blob/main/LICENSE' # A URL to the main website for this project. ProjectUri = 'https://github.com/PowerShell/PowerShellEditorServices' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC/M3z3M+bnT8XS # 21/G15OOC2bR8Mn4dDgUYq/V17nX9aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICEsHF28HB9x2hepz5sPupyy # pxrFL2PrVdHxsQKBuQtGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEATUYK5e3ucU5KYP5ch1c0CAb09eE+arbU5ihi6kytMU3p3/yNNMBpLfCc # 8WkgbXXVOaP3U2OLWP20cfKoRV5sy9h5qq3ONzAPdbCOY4ffVqyuFNffSxNgeFHJ # lvwxWTH+fKLlXBsUUocHByKGl9CxVtTKFJQ0Flj24UAoEZsviB7i6s4M3f37k7hs # 0x6jtBRtTFqdDbxdtasSdDpxBv9Td/RrVsHLok6Z/P3fCWwOrTze92fIoODUjen1 # 0+1wNKotnv13Qw1K2CQ36TmOm3fYE1mBS2d75OUV0/ISsazRM0MjnbJ+xECQ51pK # z1qa9+6gqPz1YULkNVHIUHDEznOrT6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBOu9t1/adOtxgBOWtv55uily05tTzObcf8tJ+Q9v4RKwIGZjOZx96j # GBMyMDI0MDUwMzIzMzAxOC44MDFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV # lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz # zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf # dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld # 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW # EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC # tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK # Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG # 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs # WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH # SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU # 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F # 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS # ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU # XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w # iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ # gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u # er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni # a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si # rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf # 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa # WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho # Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI # o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6d9pxTAiGA8yMDI0MDUwMzEzNDg1 # M1oYDzIwMjQwNTA0MTM0ODUzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp32nF # AgEAMAcCAQACAhuNMAcCAQACAhKCMAoCBQDp4LtFAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAAQny8O4SOgMdjlh3VB4hZ9Lc2ogwvWGvljoi6/lm141+rxH # djui98FE2EIEf3u+4XGTfQbVicMZS+3ujwMGHgoWoUQAtm6wE/NCblcqLDN20udO # wLXO3t6OFFLO9tzANVir8EmxMGfnhoA/qbz2/+r42MLd8ussEHSZVzh8Agsj8jyT # QjzZrGP3wQ0j7NvMaO+tugp40O4gkp229es6gmEwKUW1QGog5X1/qOFPXPLkx/7C # PUipYNDCU/KfQ/FT0RQ04/B9cvc6KhMgW1KjE5VN+vQL890DKcoZQ7RLth/8fjpd # vB+WGAMT3iJKJh6z9mJbVHErrLADh+KGcT6fBbMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCBfsk6pgEcHlG6bUGem82u25HYats+osb2gt5NDusDkXDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o # CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgnTPBK8FgevUOHvP8+k1/U3taqPz7 # J+sRrzz6G5JpJScwDQYJKoZIhvcNAQELBQAEggIAKr3GLQowD0/1iLshjONAhkaW # aUbMcC3lSC+sHmqrNRSvmPQDl1R1OXHyD3aT8HLNbbm2e0Bh45pKsiEVtoV/Wdu1 # ssM6X3tfCIumxYutxDHcO6kOXFVJnvgCid6UEzQ9QB5uvHALhqH87wHrAELgvZsw # LgLYAM+jlqbuJIGr50RvHMENz7aZwakNgvfxpPiE2XwTH8zGjSvkulEu4vkAPaWJ # rQ0Id7Whb9bMDFi1XzD7SDBDUmqEDEUfrs/gK8Dm+Af/Vjm70BhKmpQlQDBqJVnv # KRtar1PgossjnZiiYrkjGAN035L0xuZtsKb4taBv5xvzMYlR67Llirt6XNjk+ki2 # 3mE4vm3dXjsAMU0WQgmG41hPiYmOzsqDF1sGD6BMMUDFYTuTlI/jn0swbUXNaXUh # w/iQKofUfrV00H1k6E+1XmgcgVa3QrCXppgHDrQ/RKnCcayHtkhSvqIB/fhMkz8T # zGI7lRtU7z7Z+ceSIFoltTmU0XqOJsjaLcJyZ3DL2y3W/VZil6qZP7g6LVXFHzB2 # iEqGtv0ta0vspY8e300ayv/KnIysMfT6Ao7J0Tr/YD0cMPanOQ1mZfmJtRUJ7oGe # OGKgPm77i6mLipnnntb9Vf+kMuW0IdRpTPC/S3N9o0BG2BlbIEfSOkGZGyveHZyF # /RtnTGZHrLUBRdfgN4k= # SIG # End signature block
combined_dataset/train/non-malicious/Script for mBull.ps1
Script for mBull.ps1
$endDate = New-Object datetime(2013,1, 1) for ($date = [DateTime]::Today; $date -le $endDate; $date = $date.AddDays(1);) { if ($date.DayOfWeek -ne [DayOfWeek]::Saturday -and $date.DayOfWeek -ne [DayOfWeek]::Saturday) { New-Item -type directory $date.ToShortDateString() } }
combined_dataset/train/non-malicious/2581.ps1
2581.ps1
Set-ExecutionPolicy Unrestricted c:\temp\InitPowerSMO.ps1 $server = SMO_Server $db = SMO_Database $server "PowerDW" function global:PsDisk ($servername,$dn) { $Tablename='disk' $var=@' $disk $SizeMB $FreeMB $PercFree '@ $out='' $out=C:\Dexma\bin\psinfo \\$servername -d Disk if ($out -LT '') {$Dischi='';} else {$Dischi=$out[3..$($out.count-1)]; } $dischi $dischi | %{ $SizeMB=0 $FreeMB=0 $PercFree='' IF ($dischi -eq '') { Invoke-Expression $($("insert-"+$tablename+" "+$servername+" ""$dn"" "+$var) ) | %{$DB.ExecuteNonQuery($_)} } else { $dischi2=$_.split(":") if ($dischi2[1].trimstart().substring(0,5) -eq 'Fixed' ) { $DISCO=$dischi2[0].trimstart()+':' $INFO=$($dischi2[1].split(" ") | %{if ($_ -gt '') {$_}}) $INFO[$($INFO.COUNT-1)] $PercFree=$INFO[$($INFO.COUNT-1)] $esegui=@' $FreeBites= '@ $esegui=$esegui+$($INFO[$($INFO.COUNT-3)]+$INFO[$($INFO.COUNT-2)]) Invoke-Expression $($esegui) $esegui=@' $SizeBites= '@ $esegui=$esegui+$($INFO[$($INFO.COUNT-5)]+$INFO[$($INFO.COUNT-4)]) Invoke-Expression $($esegui) $disk=$disco $SizeMB=[int] $($SizeBites/1MB) $FreeMB=[int] $($FreeBites/1MB) Invoke-Expression $($("insert-"+$tablename+" "+$servername+" ""$dn"" "+$var) ) | %{$DB.ExecuteNonQuery($_)} } } } } function global:PsSysinfo ($servername,$dn) { $psinfo=C:\Dexma\bin\psinfo \\$servername $tablename="SysInfo" $variabili=$($psinfo[1..$($psinfo.count-1)] | %{ $variabile,$valore=$_.split(":"); $variabile.tostring().trimstart().trimend().replace(" ","_")}) $valori=$($psinfo[1..$($psinfo.count-1)] | %{ $variabile,$valore=$_.split(":"); $valore.tostring().trimstart()}) $a=@' $valori '@; $b="insert-"+$tablename+" "+$servername+" ""$dn"" " $var='' for ($j=0; $j -lt $valori.count; $j++) {$var=$var+' '+$a.trimend()+'['+$j+']';}; $b=$b+$var write-host $dn Invoke-Expression $($b ) | %{$DB.ExecuteNonQuery($_)} } function global:PsApplication ($servername,$dn) { $out='' $out=C:\Dexma\bin\psinfo \\$servername -s Applications if ($out -LT '') {$Applicazioni='';} else {$Applicazioni=$out[3..$($out.count-1)]; } $tablename="Application" $all=insert-table $tablename Invoke-Expression $($all) write-host $all $b="insert-"+$tablename+" "+$servername+" ""$dn"" " $applicazioni | %{$applic=$_; $c=$b+" ""$applic"""; Invoke-Expression $($c); } | %{$DB.ExecuteNonQuery($_)} } function global:RegVal($keyname,$keyvalue) { $val=reg query $keyname /v $keyvalue $val[2].replace($keyvalue,"").replace("REG_SZ","").trimstart() } function global:PsNetInfo($servername,$dn2) { $tcpipparamloc = "\\$servername\hklm\System\CurrentControlSet\Services\tcpip\parameters" $Hostname = RegVal $tcpipparamloc hostname if ($hostname -lt '') { $inserisco="insert-NetInfo "+$servername +" "+"""$dn2""" Invoke-Expression $($inserisco) | %{$DB.ExecuteNonQuery($_)} } else { $Domainname = RegVal $tcpipparamloc domain $Routing = RegVal $tcpipparamloc IPEnableRouter $DomainNameD = RegVal $tcpipparamloc UseDomainNameDevolution $netbtparamloc = "\\$servername\hklm\System\CurrentControlSet\Services\netbt\parameters" $Nodetype = RegVal $netbtparamloc DHCPNodeType $LMhostsEnab = RegVal $netbtparamloc EnableLMHosts $nodetypestr="Unknown" Switch ($Nodetype) { 4 {$NodeTypeStr = "Mixed"} 8 {$NodeTypestr = "Hybrid"} else {$NodeTypestr = "Not known"} } $IPRouting="unknown" if ($routing -eq 0) {$IPRouting="No"} if ($routing -eq 1) {$IPRouting="Yes"} $niccol = gwmi Win32_NetworkAdapterConfiguration -computerName $servername | WHERE {$_.IPEnabled} ForEach ($nic in $NicCol) {$DnsWins = $nic.DNSEnabledForWINSResolution} If ($DnsWins) {$winsproxy = "Yes"} Else {$WinsProxy = "No"} $OSVersion=[float]$(gwmi Win32_OperatingSystem -computerName $servername).version.substring(0,3) $adapterconfigcol = gwmi Win32_NetworkAdapterConfiguration -computerName $servername $adaptercol= gwmi Win32_NetworkAdapter -computerName $servername For ($i=0; $i -lt $adaptercol.length; $i++) { $nic=$adaptercol[$i] $config=$adapterconfigcol[$i] If ($config.IPEnabled) { $Index = $nic.Index $AdapterType = $Nic.AdapterType If ($OsVersion -gt 5.0) {$Conn = $Nic.NetConnectionID} Else {$Conn = $nic.Index} "$($Nic.AdapterType) - Adapter: $Conn" "Connection-specific DNS Suffix . : $($config.DNSDomain)" "Description . . . . . . . . . . . : $($Nic.Description)" "Physical Address. . . . . . . . . : $($Nic.MACAddress)" "DHCP Enabled. . . . . . . . . . . : $($Config.DHCPEnabled)" "Autoconfiguration Enabled . . . . : $($Nic.AutoSense)" "IP Address. . . . . . . . . . . . : $($config.IPAddress)" "Subnet Mask . . . . . . . . . . . : $($Config.IPSubnet)" "Default Gateway . . . . . . . . . : $($Config.DefaultIPGateway)" "DHCP Server . . . . . . . . . . . : $($Config.DHCPServer)" "DNS Servers . . . . . . . . . . . : $($Config.DNSServerSearchOrder)" "Primary WINS Server . . . . . . . : $($Config.WINSPrimaryServer)" "Secondary WINS Server . . . . . . : $($Config.WINSSecondaryServer)" "Lease Obtained. . . . . . . . . . : $($Config.DHCPLeaseObtained)" "Lease Expires . . . . . . . . . . : $($Config.DHCPLeaseExpires)" "" Invoke-Expression $($(insert-table NetInfo)) $allvaria=@' $Hostname $DomainName $NodeTypeStr $IPRouting $WinsProxy $([boolean]$DomainNameD) $([boolean] $LMHostsEnab) $DomainName $Conn $($config.DNSDomain) $($Nic.Description) $($Nic.MACAddress) $($Config.DHCPEnabled) $($Nic.AutoSense) "$($config.IPAddress)" "$($Config.IPSubnet)" $($Config.DefaultIPGateway) $($Config.DHCPServer) "$($Config.DNSServerSearchOrder)" $($Config.WINSPrimaryServer) $($Config.WINSSecondaryServer) $($Config.DHCPLeaseObtained) $($Config.DHCPLeaseExpires) '@ $inserisco="insert-NetInfo "+$servername +" "+"""$dn2""" +" "+$allvaria Invoke-Expression $($inserisco) | %{$DB.ExecuteNonQuery($_)} } } } } function global:collect($tablename) { if ($($DB.ExecuteWithResults($("sp_columns "+$tablename)).TABLES[0].ROWS).count -lt 1) { if ($tablename.toupper() -eq "NETINFO") {$DB.ExecuteNonQuery($("CREATE TABLE [dbo].[NetInfo]([ServerName] ` [varchar](50),[DistinguishedName] [varchar](500),[HostName] [varchar](100),[PrimaryDNSSuffix] [varchar](100),` [NodeType] [varchar](100), [IPRoutingEnabled] [varchar](100), ` [WINSProxyEnabled] [varchar](100), [UseDNSDomainNameDevloution] [varchar](100),[LMHostsEnabled] ` [varchar](100),[DNSSuffixSearchList] [varchar](100),[Ethernet8023Adapter] [varchar](100),[ConnectionspecificDNSSuffix] ` [varchar](100),[Description] [varchar](100),[PhysicalAddress] [varchar](100),[DHCPEnabled] ` [varchar](100),[AutoconfigurationEnabled] [varchar](100),[IPAddress] [varchar](1000),[SubnetMask] ` [varchar](1000),[DefaultGateway] [varchar](100),[DHCPServer] [varchar](100),[DNSServers] [varchar](100),[PrimaryWINSServer] ` [varchar](100),[SecondaryWINSServer] [varchar](100),[LeaseObtained] [varchar](100),[LeaseExpires] [varchar](100))"));} if ($tablename.toupper() -eq "SYSINFO") {$DB.ExecuteNonQuery($("CREATE TABLE [dbo].[SysInfo]([ServerName] ` [varchar](50),[DistinguishedName] [varchar](500), [Uptime] [varchar](50), [Kernel_version] [varchar](50), ` [Product_type] [varchar](50),[Product_version] [varchar](50),[Service_pack] [varchar](50),[Kernel_build_number] ` [varchar](50),[Registered_organization] [varchar](50),[Registered_owner] [varchar](50),[Install_date] ` [varchar](50),[Activation_status] [varchar](50),[IE_version] [varchar](50),[System_root] [varchar](50),[Processors] ` [varchar](50),[Processor_speed] [varchar](50),[Processor_type] [varchar](50),[Physical_memory] [varchar](50),[Video_driver] [varchar](100))"));} if ($tablename.toupper() -eq "APPLICATION") {$DB.ExecuteNonQuery($("CREATE TABLE [dbo].[Application]([ServerName] ` [varchar](50),[DistinguishedName] [varchar](500),[Application] [varchar](500))"));} if ($tablename.toupper() -eq "DISK") {$DB.ExecuteNonQuery($("CREATE TABLE [dbo].[Disk]([ServerName] ` [varchar](50),[DistinguishedName] [varchar](500),[Disk] [varchar](50),[SizeMB] [bigint] NULL,[FreeMB] [bigint] ` NULL,[PercFree] [varchar](50))"));} } $all=insert-table $tablename Invoke-Expression $($all) write-host $all $DB.ExecuteNonQuery("delete from [$tablename]") $servers=$($DB.ExecuteWithResults ` ("select name,distinguishedname from computer where OperatingSystem='Windows Server 2003' ").TABLES[0].ROWS) $servers | %{$dn2=$_.distinguishedname; $inserisco="Ps"+$tablename+" "+$_.name+" "+"""$dn2"""; ` write-host $inserisco; Invoke-Expression $($inserisco)} $path="d:\ad\"+$tablename+"_delta.ps1" &($path) } collect Application collect SysInfo collect Disk collect NetInfo
combined_dataset/train/non-malicious/sample_41_16.ps1
sample_41_16.ps1
# # Module manifest for module 'OCI.PSModules.Oda' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Oda.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '040ef05d-6373-43bf-a0a9-67444099f906' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Oda Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oda.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIOdaDigitalAssistant', 'Export-OCIOdaSkill', 'Get-OCIOdaAuthenticationProvider', 'Get-OCIOdaAuthenticationProvidersList', 'Get-OCIOdaChannel', 'Get-OCIOdaChannelsList', 'Get-OCIOdaDigitalAssistant', 'Get-OCIOdaDigitalAssistantParameter', 'Get-OCIOdaDigitalAssistantParametersList', 'Get-OCIOdaDigitalAssistantsList', 'Get-OCIOdaImportedPackage', 'Get-OCIOdaImportedPackagesList', 'Get-OCIOdaInstance', 'Get-OCIOdaInstanceAttachment', 'Get-OCIOdaInstanceAttachmentsList', 'Get-OCIOdaInstancesList', 'Get-OCIOdaPackage', 'Get-OCIOdaPackagesList', 'Get-OCIOdaPrivateEndpoint', 'Get-OCIOdaPrivateEndpointAttachment', 'Get-OCIOdaPrivateEndpointAttachmentsList', 'Get-OCIOdaPrivateEndpointScanProxiesList', 'Get-OCIOdaPrivateEndpointScanProxy', 'Get-OCIOdaPrivateEndpointsList', 'Get-OCIOdaSkill', 'Get-OCIOdaSkillParameter', 'Get-OCIOdaSkillParametersList', 'Get-OCIOdaSkillsList', 'Get-OCIOdaTranslator', 'Get-OCIOdaTranslatorsList', 'Get-OCIOdaWorkRequest', 'Get-OCIOdaWorkRequestErrorsList', 'Get-OCIOdaWorkRequestLogsList', 'Get-OCIOdaWorkRequestsList', 'Import-OCIOdaBot', 'Invoke-OCIOdaBulkCreateSkillEntities', 'Invoke-OCIOdaCascadingDeleteSkillCustomEntities', 'Invoke-OCIOdaConfigureDigitalAssistantParameters', 'Invoke-OCIOdaPublishDigitalAssistant', 'Invoke-OCIOdaPublishSkill', 'Invoke-OCIOdaRotateChannelKeys', 'Invoke-OCIOdaTrainSkill', 'Move-OCIOdaInstanceCompartment', 'Move-OCIOdaPrivateEndpointCompartment', 'New-OCIOdaAuthenticationProvider', 'New-OCIOdaChannel', 'New-OCIOdaDigitalAssistant', 'New-OCIOdaImportedPackage', 'New-OCIOdaInstance', 'New-OCIOdaInstanceAttachment', 'New-OCIOdaPrivateEndpoint', 'New-OCIOdaPrivateEndpointAttachment', 'New-OCIOdaPrivateEndpointScanProxy', 'New-OCIOdaSkill', 'New-OCIOdaSkillParameter', 'New-OCIOdaTranslator', 'Remove-OCIOdaAuthenticationProvider', 'Remove-OCIOdaChannel', 'Remove-OCIOdaDigitalAssistant', 'Remove-OCIOdaImportedPackage', 'Remove-OCIOdaInstance', 'Remove-OCIOdaInstanceAttachment', 'Remove-OCIOdaPrivateEndpoint', 'Remove-OCIOdaPrivateEndpointAttachment', 'Remove-OCIOdaPrivateEndpointScanProxy', 'Remove-OCIOdaSkill', 'Remove-OCIOdaSkillParameter', 'Remove-OCIOdaTranslator', 'Start-OCIOdaChannel', 'Start-OCIOdaInstance', 'Stop-OCIOdaChannel', 'Stop-OCIOdaInstance', 'Update-OCIOdaAuthenticationProvider', 'Update-OCIOdaChannel', 'Update-OCIOdaDigitalAssistant', 'Update-OCIOdaDigitalAssistantParameter', 'Update-OCIOdaImportedPackage', 'Update-OCIOdaInstance', 'Update-OCIOdaInstanceAttachment', 'Update-OCIOdaPrivateEndpoint', 'Update-OCIOdaSkill', 'Update-OCIOdaSkillParameter', 'Update-OCIOdaTranslator' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oda' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4152.ps1
4152.ps1
cls $Errors = 0 $SourceDrive = Read-Host 'Enter source folder' $DestinationDrive = Read-Host 'Enter destination folder' $TempDrive = Get-Item -Path $SourceDrive $SourceDrive = $TempDrive.FullName $TempDrive = Get-Item -Path $DestinationDrive $DestinationDrive = $TempDrive.FullName $SourceFolders = Get-ChildItem $SourceDrive -Recurse | ?{ $_.PSIsContainer } $SourceFiles = Get-ChildItem $SourceDrive -Recurse -Force | where { ! $_.PSIsContainer } $DestinationFolders = Get-ChildItem $DestinationDrive -Recurse | ?{ $_.PSIsContainer } $DestinationFiles = Get-ChildItem $DestinationDrive -Recurse -Force | where { ! $_.PSIsContainer } $Output = robocopy $SourceDrive $DestinationDrive /ZB /E /LEV:0 /COPY:SOU /XF *.* /R:5 /W:5 Write-Host "Folders:" Write-Host "========" For ($Count=0; $Count -le $SourceFolders.Count; $Count++) { If ($SourceFolders[$Count].FullName -ne $null) { $SourceFolder = $SourceFolders[$Count].FullName $DestinationFolder = $DestinationFolders[$Count].FullName Write-Host $SourceFolder"....." -NoNewline $SourceFolderACL = Get-Acl -Path $SourceFolder $DestinationFolderACL = Get-Acl -Path $DestinationFolder For ($Count1=0; $Count1 -le $SourceFolderACL.Access.Count; $Count1++) { If ($SourceFolderACL.Access[$Count1].FileSystemRights -ne $DestinationFolderACL.Access[$Count1].FileSystemRights) { $Errors++ } } If ($Errors -eq 0) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } $Errors = 0 } $Output = robocopy $SourceDrive $DestinationDrive /ZB /E /LEV:0 /COPY:SOU /XD *.* /R:5 /W:5 Write-Host "Files:" Write-Host "======" For ($Count=0; $Count -le $SourceFiles.Count; $Count++) { If ($SourceFiles[$Count].FullName -ne $null) { $SourceFile = $SourceFiles[$Count].FullName $DestinationFile = $DestinationFiles[$Count].FullName Write-Host $SourceFile"....." -NoNewline $SourceFileACL = Get-Acl -Path $SourceFile $DestinationFileACL = Get-Acl -Path $DestinationFile For ($Count1=0; $Count1 -le $SourceFileACL.Access.Count; $Count1++) { If ($SourceFileACL.Access[$Count1].FileSystemRights -ne $DestinationFileACL.Access[$Count1].FileSystemRights) { $Errors++ } } If ($Errors -eq 0) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } $Errors = 0 }
combined_dataset/train/non-malicious/d599ff7e-17c4-40a4-b3fc-8666dd953df5.ps1
d599ff7e-17c4-40a4-b3fc-8666dd953df5.ps1
function Get-VCTime() { return (Get-View "ServiceInstance-ServiceInstance").CurrentTime() } $lastCheckTime = Get-VCTime while ($true) { $modifiedVMs = @() $freshEventsStartTime = $lastCheckTime $lastCheckTime = Get-VCTime # Get all the VM network edit events foreach ($event in Get-VIEvent -Start $freshEventsStartTime -Types Info) { if ($event.GetType().FullName -eq "VimApi.VmReconfiguredEvent" -and $event.configSpec -ne $null) { foreach ($change in $event.configSpec.deviceChange) { if ($change.operation -eq "edit" -and $change.device -ne $null -and $change.device.GetType().FullName -eq "VimApi.VirtualPCNet32") { # VM's networking was reconfigured. $vmId = $event.vm.vm.Type + '-' + $event.vm.vm.Value $modifiedVMs += Get-VM -Id $vmId } } } } # Did one of these edits violate isolation? foreach ($vm in $modifiedVMs | select -Unique) { $intranetNics = $vm.NetworkAdapters | where { $_.NetworkName -eq 'Intranet' } $dmzNics = $vm.NetworkAdapters | where { $_.NetworkName -eq 'DMZ' } if ($intranetNics -ne $null -and $dmzNics -ne $null) { # Send an email notification $message = "VM '" + $vm.Name + "' violates network isolation rules!" Write-Host $message -ForegroundColor Yellow # Use .Net’s SmtpClient to send mail. Just tell it which SMTP server to use (New-Object 'System.Net.Mail.SmtpClient' 'smtp.example1234.com').Send( 'NetworkMonitor@example1234.com', # Sender 'john.doe@example1234.com', # Recipient 'Network isolation violation', # Subject $message) } } Start-Sleep 60 } # while ($true)
combined_dataset/train/non-malicious/sample_17_71.ps1
sample_17_71.ps1
# # Module manifest for module 'OCI.PSModules.Blockchain' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Blockchain.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ed7a188d-b220-4182-bc10-6c9d8157ad66' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Blockchain Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Blockchain.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIBlockchainOsn', 'Get-OCIBlockchainOsnsList', 'Get-OCIBlockchainPeer', 'Get-OCIBlockchainPeersList', 'Get-OCIBlockchainPlatform', 'Get-OCIBlockchainPlatformPatchesList', 'Get-OCIBlockchainPlatformsList', 'Get-OCIBlockchainWorkRequest', 'Get-OCIBlockchainWorkRequestErrorsList', 'Get-OCIBlockchainWorkRequestLogsList', 'Get-OCIBlockchainWorkRequestsList', 'Invoke-OCIBlockchainPreviewScaleBlockchainPlatform', 'Invoke-OCIBlockchainScaleBlockchainPlatform', 'Invoke-OCIBlockchainUpgradeBlockchainPlatform', 'Move-OCIBlockchainPlatformCompartment', 'New-OCIBlockchainOsn', 'New-OCIBlockchainPeer', 'New-OCIBlockchainPlatform', 'Remove-OCIBlockchainOsn', 'Remove-OCIBlockchainPeer', 'Remove-OCIBlockchainPlatform', 'Remove-OCIBlockchainWorkRequest', 'Start-OCIBlockchainPlatform', 'Stop-OCIBlockchainPlatform', 'Update-OCIBlockchainOsn', 'Update-OCIBlockchainPeer', 'Update-OCIBlockchainPlatform' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Blockchain' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_44_85.ps1
sample_44_85.ps1
# # Module manifest for module 'OCI.PSModules.Databasemigration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Databasemigration.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '75c40824-63ca-4f44-8abc-b6d5cb895ad8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Databasemigration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemigration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabasemigrationMigrationObjects', 'Connect-OCIDatabasemigrationionDiagnostics', 'Get-OCIDatabasemigrationAdvisorReport', 'Get-OCIDatabasemigrationAgent', 'Get-OCIDatabasemigrationAgentImagesList', 'Get-OCIDatabasemigrationAgentsList', 'Get-OCIDatabasemigrationConnection', 'Get-OCIDatabasemigrationConnectionsList', 'Get-OCIDatabasemigrationExcludedObjectsList', 'Get-OCIDatabasemigrationJob', 'Get-OCIDatabasemigrationJobOutputContent', 'Get-OCIDatabasemigrationJobOutputsList', 'Get-OCIDatabasemigrationJobsList', 'Get-OCIDatabasemigrationMigration', 'Get-OCIDatabasemigrationMigrationObjectsList', 'Get-OCIDatabasemigrationMigrationObjectTypesList', 'Get-OCIDatabasemigrationMigrationsList', 'Get-OCIDatabasemigrationWorkRequest', 'Get-OCIDatabasemigrationWorkRequestErrorsList', 'Get-OCIDatabasemigrationWorkRequestLogsList', 'Get-OCIDatabasemigrationWorkRequestsList', 'Invoke-OCIDatabasemigrationCloneMigration', 'Invoke-OCIDatabasemigrationEvaluateMigration', 'Invoke-OCIDatabasemigrationResumeJob', 'Invoke-OCIDatabasemigrationRetrieveSupportedPhases', 'Move-OCIDatabasemigrationAgentCompartment', 'Move-OCIDatabasemigrationConnectionCompartment', 'Move-OCIDatabasemigrationMigrationCompartment', 'New-OCIDatabasemigrationConnection', 'New-OCIDatabasemigrationMigration', 'Remove-OCIDatabasemigrationAgent', 'Remove-OCIDatabasemigrationConnection', 'Remove-OCIDatabasemigrationJob', 'Remove-OCIDatabasemigrationMigration', 'Remove-OCIDatabasemigrationMigrationObjects', 'Start-OCIDatabasemigrationMigration', 'Stop-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationAgent', 'Update-OCIDatabasemigrationConnection', 'Update-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationMigration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemigration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/582.ps1
582.ps1
function Get-RemoteConnection{ param( [parameter(Mandatory=$false)] [string[]] $Name ) function New-ObjectRemoteConnection{ param( [string]$Name, [string]$Server, [string]$User, [string]$Description, [string]$SnapIns, [string]$PrivatKey ) New-Object PSObject -Property @{ Name = $Name Server = $Server User = $User Description = $Description SnapIns = $SnapIns PrivatKey = $PrivatKey } } $ServerConfigs = Get-ChildItem -Path $PSconfigs.Path -Filter $PSconfigs.Server.Filter -Recurse | %{ [xml]$(get-content $_.FullName)} | %{ $_.Content.Server} if(-not $Name){ $ServerConfigs | Sort Key }elseif($Name){ $Matches = $ServerConfigs | %{$Server = $_; $Name | %{if(($Server.Key -contains $_) -or ($Server.Name -contains $_)){$Server}}} if($Matches -eq $Null){ $Name | %{New-ObjectRemoteConnection -Name $_} }else{ $Matches } }else{ throw "Enter values for the following parameters: Name[]" } }
combined_dataset/train/non-malicious/1014.ps1
1014.ps1
$random = (New-Guid).ToString().Substring(0,8) $subscriptionId = "my-azure-subscription-id" $apimServiceName = "apim-$random" $resourceGroupName = "apim-rg-$random" $location = "Japan East" $organisation = "Contoso" $adminEmail = "admin@contoso.com" $swaggerUrl = "http://petstore.swagger.io/v2/swagger.json" $apiPath = "petstore" Select-AzSubscription -SubscriptionId $subscriptionId New-AzResourceGroup -Name $resourceGroupName -Location $location New-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apimServiceName -Location $location -Organization $organisation -AdminEmail $adminEmail $context = New-AzApiManagementContext -ResourceGroupName $resourceGroupName -ServiceName $apimServiceName $api = Import-AzApiManagementApi -Context $context -SpecificationUrl $swaggerUrl -SpecificationFormat Swagger -Path $apiPath $productName = "Pet Store Product" $productDescription = "Product giving access to Petstore api" $productState = "Published" $product = New-AzApiManagementProduct -Context $context -Title $productName -Description $productDescription -State $productState -SubscriptionsLimit 10 Add-AzApiManagementApiToProduct -Context $context -ProductId $product.ProductId -ApiId $api.ApiId
combined_dataset/train/non-malicious/sample_34_7.ps1
sample_34_7.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.DiagnosticSetting.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.Monitor.DiagnosticSetting.Module]::Instance # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = $PSScriptRoot $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # endregion # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC+503rLyctJwmJ # KVZabaUSiMM43kaRwP+gXuiS2z/vaKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILwP # BghhDVrLVmRTTH6nStDzsnhJ00jXSa14k9JGehH7MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEATU+MF/I/9jvVqO/RRYhhFtDumTkpg4XZh3qS # iqyT3pR38kh4uoFi4+H3mOdyhLo/1vOQZpQ9vGFcw0c3s9VajHGlg397qvdXLdyN # pt3esU+YTqy+vdtX+ZYOmJSHN9DnB7MIdxcVBCFnjLUEk9ODDHTqYkPmnCsB7VUH # 2Mmlk2mQMzryGtxNwAbBlA59kz/UVDJ70EuLCJ3LbH2GtCUFeVZvSd33+bvHNLJL # jUeQrEGPnlNXbxJ4Sq02QaVxsrAQUlyUY6i5fszjnV3YzItX2jx6LcpkY0YCmueR # xSf5PqdZa4HeLWG4mMkP9rgBiI7y5+upFJA0IgHB6U7mXj4ucqGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBLyKAVtyrXt+Nc/19gdzMZOqiKdRvnXnkt # sDHMMVsBMgIGZjOi5WsaGBMyMDI0MDUxNjA2NDIxNC41OThaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkie # lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB # 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU # IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo # KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn # vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 # RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 # OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS # qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 # G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ # 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy # k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK # IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu # y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X # EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi # D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S # QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY # huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 # 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg # Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r # rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg # 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH # doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy # 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnv7CMwIhgPMjAyNDA1MTYxMDIxMjNaGA8yMDI0MDUx # NzEwMjEyM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6e/sIwIBADAHAgEAAgII # 6DAHAgEAAgIRtzAKAgUA6fE9owIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AA8S04PdvpgIQxTB9BcEw3PDHFW61ikI1ROdT84WACj7fwyebtQhRsiXuuzJYQPs # W8jbiUcSlWNWIEy/3KtM2d02C2Qi97DpEtz89osITgSq1sN8wXwPGKkP8QSOXr0p # vKK/qIKgjdcWthiumAWNI+wRu+EmHr3s/uDKiSWK1UGrMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAA # Ad4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQg4jTDIpGBHKupFWRcJWLniCdgk5X5J7/W+FuCVb/p # F60wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3Mg # rT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIKUwAFkqMGEpWVkfsRXAk4AH # 4OPnjt4vfoleYszyEw2dMA0GCSqGSIb3DQEBCwUABIICAKhbDCR653GFyJolV2dY # pBHNHBKZQ1hHiPEtqjvS0obA6hYNgUw29vAlUyTHINXcnlTVJGXE6wFXsuud+Ua4 # h/IsGGhXE5PJcCQA+kObfwQ4IY8Z0A1kOwR/EIo5/UzQhlF7eEDuC7oOzsBV1Yjm # kk070imeMGGqm0POosiOULhBzaA1XqqHJFLeR4u5Pp/ljgT8a1hucOQ06oWykhhd # BeDz3yTNDAWLT0JCzleF+8Of5EmNN0x4pjGnUTabe1fI7UYF7RAV6vs43NVrRYRv # wt43effQjiRA0kM3W39Vjau2yeI9Ps5hqGUbtbQiIMXt9Pd0squmHyiV4HlDY+26 # qOZro1qG/ol+QDSorhx31Fqpf3gHoMJGqeRrdXq7uEl5XhBEXY6EVNnvbC5I+KCU # A1i7Gr0jcWrSpdDjnB9zAqlpx3TBajdkT8iaDUYB98CJ2cejXKYjTSCmC46dXe/s # EfluPh1/zNDkRikwUTAbXlbL3/m0U5JOWn5k1wyJ+JKhgTQccQ/YdLrVLXLdemuG # h74c60r/WyQoaBuWe6xAY5KARXaPnrUxyoJb/9r4ORjBTpmnegxIysP+BNOZxSDH # gL0BLporHd/XwuIlW5DeZlev2Pa1Ge8eLDMFBSAvhHir6Zg+ukKQgkBT5wvC1Z2S # yDFTx9oOXkiXIiqLdqnvWu6g # SIG # End signature block
combined_dataset/train/non-malicious/sample_15_73.ps1
sample_15_73.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3 # RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq # tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7 # EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/ # 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt # SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC # FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL # JZwfEO4YeUvzRyzBGzb6/QIGZbqlDb5TGBMyMDI0MDIyMTA3MzUxMi45NjZaMASA # AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC # EzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1 # WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE # CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL # Ex1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAKl74Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9z # BfRPNcucreIYSyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKE # lKneJQ8R6cP4dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsF # BeWHiez/PllqcM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq # 2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7 # Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWN # YQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppd # lWJX6psDesQuQR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDq # lG3zXux9tNQmz2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7 # KJuftF6CToccc/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/Q # tY4FIjHlI5zdJzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJ # MIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw # AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv # ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI # hvcNAQELBQADggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0X # VLcimrJlDnKGgFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q # 83zb1c0RWEupgC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdG # irna2rpV23EUwFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0 # elswfq0qJNQgoYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795Z # vKLSEqXiRUjDYZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tVi # OlwI7EkeU5hudctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+z # Y/T9BnTp8si36Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ # 2ntkARy5SfluuJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDe # JGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFi # RR5otBoGLvaYFpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIH # cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw # OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh # C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx # WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc # UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc # nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo # veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi # YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9 # fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH # GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X # KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE # R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/ # eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3 # FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd # BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE # AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI # MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB # Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud # HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By # b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO # MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC # AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk # bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng # ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 # lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC # gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 # MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU # BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh # VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+ # fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp # NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI # qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB # AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt # MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw # JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942i # GuYFrsE4wzWDd85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOl+1LMwIhgPMjAyNDAyMjAxNTM1MTVa # GA8yMDI0MDIyMTE1MzUxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6X7UswIB # ADAHAgEAAgINZjAHAgEAAgISOzAKAgUA6YAmMwIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBBQUAA4GBAIpysElI0/XLRqOKmHo+m227xCEZtsr/3xLd/MV1hK6hl5Jmie8e # 9Qv//8ogOpWkqJH3Z0oNgrww/WWmI0RPhbWqweaZQjErzifgKTJqlztZyiIIs3pU # xlUz2LHwPi8BXHUtQWd4apjcbMetANVp6gvB/SBOUw3wHemGQcpOkg6RMYIEDTCC # BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA # 8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgtRdiL3JcWKPAFGNFbC4NxFffaAQt # R0IoO5UvbOuJ9Z8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjx # GFhe2YboEXeb8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEIBsAbimdI+ye # 2UIiP0NL+ZRHoPI3NgLOHJjAAqJlKaGwMA0GCSqGSIb3DQEBCwUABIICABpOYuux # N9BB4okrClnAu3A63KMyOTZdNhk+5eyyTMLeKY2jaXm9sRu9MROd35zrGhqMakj9 # wUKMfWoiS1iFqdg3xcIBWvTwWkD7ee6U6xuB64ob1YBLbPh6bJ2R+wBdzjzmuODk # FOTjytN0YdklKg+e3Wk/m6ORqD5WpJLGvyc0nl/dquDzSQOL7XqYwHTgVsK5FiY0 # we8ZMeMtyyx3VLVJdzdKolNo6zTNJBv5GwsJaz2Eo6TEcbvLq5D3/UYpZC7CxiLc # V70ugCgGakvY0nlg+KYCWf/5uhF/ISvN3/QKcQJ7dgQ+rfAdMyc9qFtmRJzZuCR9 # YrQq7RwOEt9T0OU3JXl9w+NqYCNvBjtowzDKHSZHCluA2YWe1grEphr20iwMaqCb # DGdRjBK0904hlkuq3pTo2feTvTpbzKQu5yRyVe1m9kH/p66xpTZun2uktUO57ch6 # kNIxfb9GmHWzkaNzFCvS4bs78UuwzBa613YLC8WB3pMNm00/nTXTyPMoeSh7oJiv # jwpe+dk21dl2opgmpKHEswnadKvIfvP9bhWooq9bJqeKXPBdC1l11lUovR2FMvhR # wVYWdMx3+biw8+bkUt7vsVayq4Ss//1dJlo2/bnmdALhdk+Y5l5NbXLCd9hT+X4o # Pqib4bPEFOhg0hwaShoE1oS9sAt8yoSKZEjD # SIG # End signature block
combined_dataset/train/non-malicious/Reverse filename sequenc_2.ps1
Reverse filename sequenc_2.ps1
# Reverse filename sequence v 0.9 # Author: Sean Wendt # # This script will rename a sequenced set of files in a directory. # For example, you have foobar01.jpg, foobar02.jpg, foobar03.jpg # -- it will reverse the order, so the last file is now 01, the second to last 02, etc.. # # Limitations: -You cannot use the same filename prefix, i.e. foobar must change to foobars. # -It's hardcoded to only support 5 digit numbers right now. # -Similarly, it will only support a file sequence with up to 5 digits. # This is the first script I've written, I know it's not great! ;) # Help to make it better would be appreciated. Thanks. # $file_extension = Read-Host "Enter file extension, i.e. .jpg or .txt" $file_prefix = Read-Host "Enter file prefix, i.e. entering foobar will rename files to foobar001.ext, foobar002.ext, etc.." $files = Get-ChildItem | ?{ $_.PSIsContainer -ne "True"} # Creates array of files in current directory, ignores folders $idx = 0 # Sets index value (0 = filenames start at foobar00000.jpg, modify to 1 to start at foobar00001.jpg) for ($ctr=$files.count; $ctr -gt 0 ; --$ctr) { if (($idx -ge 0) -and ($idx -le 9)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '00000' + $idx++ + $file_extension) } elseif (($idx -ge 10) -and ($idx -le 99)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '0000' + $idx++ + $file_extension) } elseif (($idx -ge 100) -and ($idx -le 999)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '000' + $idx++ + $file_extension) } elseif (($idx -ge 1000) -and ($idx -le 9999)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '00' + $idx++ + $file_extension) } elseif (($idx -ge 10000) -and ($idx -le 99999)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '0' + $idx++ + $file_extension) } $idx #prints the index # it just completed }
combined_dataset/train/non-malicious/sample_14_72.ps1
sample_14_72.ps1
ConvertFrom-StringData @' FailoverClustersModuleRequired=O módulo do PowerShell necessário (FailoverClusters) não foi encontrado. Use a Ferramenta Funções e Recursos para instalar: Ferramentas de Administração de Servidor Remoto | Ferramentas de Administração de Recursos | Ferramentas de Cluster de Failover | Módulo de Cluster de Failover para Windows PowerShell. HyperVModuleRequired=O módulo do PowerShell necessário (Hyper-V) não foi encontrado. Use a Ferramenta Funções e Recursos para instalar: Ferramentas de Administração de Servidor Remoto | Ferramentas de Administração de Funções | Ferramentas de Gerenciamento do Hyper-V | Módulo do Hyper-V para Windows PowerShell. CimCmdletsModuleRequired=O módulo do PowerShell necessário (CimCmdlets) não foi encontrado. HypervisorSchedulerTypeNotSupported=Não é possível definir o tipo de agendador do Hipervisor em Windows Servers anteriores ao Windows Server 2016. InvalidLoadBalancingAlgorithmType=O parâmetro Algoritmo de Balanceamento de Carga foi fornecido quando não há suporte para o SET (Switch Embedded Teaming). DeviceIdNotFound=Não é possível localizar o dispositivo com Id {0} na máquina virtual {1} (vmId = {2}) PhysicalNetworkAdapterRequired=É necessário fornecer um nome de adaptador de rede físico para um comutador virtual externo. StartVirtualMachineStartingMessage=Iniciando a máquina virtual {0}... StartVirtualMachineSuccessMessage=Máquina virtual {0} iniciada com êxito. StartVirtualMachineFailureMessage=Falha ao iniciar a máquina virtual {0}. Erro: {1} StartVirtualMachineOperationMessage={0} máquinas virtuais foram iniciadas com êxito. Não foi possível iniciar {1} máquinas virtuais. ShutdownVirtualMachineStartingMessage=Desligando a máquina virtual {0}... ShutdownVirtualMachineSuccessMessage=Máquina virtual {0} desligada com êxito. ShutdownVirtualMachineFailureMessage=Falha ao desligar a máquina virtual {0}. Mensagem de erro: {1} ShutdownVirtualMachineOperationMessage={0} máquinas virtuais foram desligadas com êxito. Não foi possível desligar {1} máquinas virtuais. TurnoffVirtualMachineStartingMessage=Desligando máquina virtual {0}... TurnoffVirtualMachineSuccessMessage=A máquina virtual {0} foi desligada com êxito. TurnoffVirtualMachineFailureMessage=Falha ao desligar a máquina virtual {0}. Mensagem de erro: {1} TurnoffVirtualMachineOperationMessage={0} máquinas virtuais foram desligadas com êxito. Não foi possível desligar {1} máquinas virtuais. DeleteSavedStateVirtualMachineStartingMessage=Removendo o estado salvo da máquina virtual {0}... DeleteSavedStateVirtualMachineSuccessMessage=O estado salvo da máquina virtual {0} foi removido com êxito. DeleteSavedStateVirtualMachineFailureMessage=Falha ao remover o estado salvo da máquina virtual {0}. Mensagem de erro: {1} DeleteSavedStateVirtualMachineOperationMessage=O estado salvo de {0} máquinas virtuais foi excluído com êxito. Não foi possível excluir o estado salvo de {1} máquinas virtuais. SaveVirtualMachineStartingMessage=Salvando a máquina virtual {0}... SaveVirtualMachineSuccessMessage=Máquina virtual {0} salva com êxito. SaveVirtualMachineFailureMessage=Falha ao salvar a máquina virtual {0}. Mensagem de erro: {1} SaveVirtualMachineOperationMessage={0} máquinas virtuais foram salvas com êxito. Não foi possível salvar {1} máquinas virtuais. ResetVirtualMachineStartingMessage=Reiniciando a máquina virtual {0}... ResetVirtualMachineSuccessMessage=Máquina virtual {0} reiniciada com êxito. ResetVirtualMachineFailureMessage=Falha ao reiniciar a máquina virtual {0}. Mensagem de erro: {1} ResetVirtualMachineOperationMessage={0} máquinas virtuais foram reiniciadas com êxito. Não foi possível reiniciar {1} máquinas virtuais. ResumeVirtualMachineStartingMessage=Retomando a máquina virtual {0}... ResumeVirtualMachineSuccessMessage=Máquina virtual {0} retomada com êxito. ResumeVirtualMachineFailureMessage=Falha ao retomar a máquina virtual {0}. Mensagem de erro: {1} ResumeVirtualMachineOperationMessage={0} máquinas virtuais foram retomadas com êxito. Não foi possível retomar {1} máquinas virtuais. SuspendVirtualMachineStartingMessage=Suspendendo a máquina virtual {0}... SuspendVirtualMachineSuccessMessage=Máquina virtual {0} suspensa com êxito. SuspendVirtualMachineFailureMessage=Falha ao suspender a máquina virtual {0}. Mensagem de erro: {1} SuspendVirtualMachineOperationMessage={0} máquinas virtuais foram suspensas com êxito. Não foi possível suspender {1} máquinas virtuais. VirtualMachineDiskDeleteDiskNotFound=O disco com Id {0} não pode ser removido da máquina virtual {1} porque não foi encontrado. VirtualMachineDvdDeleteDiskNotFound=O DVD/CD-ROM com Id {0} não pode ser removido da máquina virtual {1} porque não foi encontrado. VirtualMachineDiskEditDiskNotFound=O disco com Id {0} não pode ser alterado na máquina virtual {1} porque não foi encontrado. VirtualMachineDvdEditDiskNotFound=O DVD/CD-ROM com Id {0} não pode ser editado na máquina virtual {1} porque não foi encontrado. VirtualMachineDiskPathNotFound=O disco com Id {0} não pode ser alterado na máquina virtual {1} porque ele apresenta uma configuração de caminho vazia. VirtualMachineDvdPathNotFound=O DVD/CD-ROM com Id {0} não pode ser alterado na máquina virtual {1} porque ele apresenta uma configuração de caminho vazia. VirtualMachineNetworkDeleteAdapterNotFound=O adaptador de rede virtual com Id {0} não pode ser removido da máquina virtual {1} porque não foi encontrado. VirtualMachineNetworkEditAdapterNotFound=O adaptador de rede virtual com Id {0} não pode ser alterado na máquina virtual {1} porque não foi encontrado. VirtualMachineNetworkEditAdapterVlanModeNotSupported=O adaptador de rede virtual com Id {0} não pode ser alterado na máquina virtual {1} porque não há suporte para o modo de VLAN {2}. VirtualMachineNetworkEditAdapterIsolationModeNotSupported=O adaptador de rede virtual com Id {0} não pode ser alterado na máquina virtual {1} porque não há suporte para o modo de Isolamento {2}. VirtualMachineSdnConfigurationFailed=A máquina virtual {0} foi criada, mas ocorreu um falha ao configurar a rede virtual. VirtualMachinesString=Máquinas Virtuais VirtualMachinesSecuritySettingsNotSupported=As configurações de segurança da Máquina Virtual não têm suporte nas versões do Windows Server anteriores ao Windows Server 2012 R2. MoveVirtualMachineStorageParametersInvalid=Os parâmetros que controlam como o armazenamento da máquina virtual é movido não são válidos. BritannicaNamespaceNotAvailable=O namespace CIM necessário para o Data Center Definido por Software (Gerenciamento\SDDC) não foi encontrado. MoveVirtualMachineInvalidParameters=Os parâmetros fornecidos para mover a máquina virtual não são válidos. MoveVirtualMachineVMIncompatible=Não foi possível mover a máquina virtual {0} para o novo servidor de hospedagem porque foram detectadas incompatibilidades. Para obter mais informações sobre as incompatibilidades, consulte os logs de eventos (Logs de Aplicativos e Serviços\\Microsoft-ServerManagementExperience) em {1}. ImportVirtualMachineVMIncompatible=Não foi possível mover a máquina virtual {0} para o novo servidor de hospedagem porque foram detectadas incompatibilidades. Para obter mais informações sobre as incompatibilidades, consulte os logs de eventos (Logs de Aplicativos e Serviços\\Microsoft-ServerManagementExperience) em {1}. NewVirtualMachineCreatedAddToClusterFailed=A máquina {0} virtual foi criada com êxito no servidor {1}. Ele não foi adicionado ao cluster de failover. Para obter mais informações, consulte os logs de eventos (Logs de Aplicativos e Serviços\\Microsoft-ServerManagementExperience) no {1}. '@ # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBn91/SHpLm7JIA # AU6VL3jG1lddnG9rGoJNRxdI80sPQaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIO/Zp88xV8a3qC0cgtTN0dyw # 1zOhD/noKIqOcg/OQBSBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhohb6U9f19hu9/o+XF174Vfx6xa8IJlFksWvR2F/nLnBCP5ZDLxRn9Qd # Cy5tbBRjnE9Q4EuIhrpwVzaiaIlGRoLPkC20ODpkxJRIDjlapvg6TsUFkWV8tlAv # 7F/hnLbHHBYhAfsXD6M4oXTsEZpapoAi+t7KLsl3hfnYeZuNzEIW9DLCnIeK5yUd # cIXmzJg+6A9bkQbt2iB26LxxmAYu56JbeJhf1DhK4u08Fb1ZcDiL83kCC9DHCxno # Y1BjPnU+QyYUohaNrfyZSrtccaVDyeOkxMjJwFBsV3ndzwNp+186jH5pKDrKPWrA # rofGVuQzGC+5D2z9+1VP+S6na7plR6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA/jF5RvSj4nE9g2OAjbYlG0pwDlek11VwTq+M3zNoPJAIGZdYJAS+9 # GBMyMDI0MDMwNzIxMTkyOS44OTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmUSxMwIhgPMjAyNDAzMDcyMjE3NTVaGA8yMDI0MDMwODIyMTc1NVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6ZRLEwIBADAHAgEAAgIy2TAHAgEAAgIUBTAKAgUA # 6ZWckwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFaazxlLFAIxJfTxGh9U # wtSl6JTFgkoetfKiDG5trZMIZ22qg/e9GV74LcWrEHEbxjwRC9NdaKWz7Ubxi/kG # zNA3XHZZ4EUi5r+0sRxRpx72Ps1nnZCQPexqQTqDhkFxjYu7Ts5NDOxt2otAqniq # 865/4ZwKeFuq1W1abmQozFLxMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgqHLo0+B2K+DhLpK2UF+MYMQaO7OhIl8+eV0wqFTvpCgwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIC58HBtly9ONbLEJxzPigfjEEyjBV161D7Wwhfi7T2gU # MA0GCSqGSIb3DQEBCwUABIICAEOmX4Mpn3fEYchVChIJzyhOXNyz3Hmj01nfa4/J # rc2CiA2UWDNet63GBw5VBPdHmtfvjf8HwIEHsKB82kq1LT6rx9bl7cKoMocP2Gvc # 2vi7h5fO6FhEJe1IRmIWrJ5EeLM9i2XI33v8vvhVvtWHKiTKBNOFBAh9ZgjMjybm # /s/vwWnDoh7sx1zmo/5IciIKMcWtzSWsGN0r0NKpP73UaJN0cx/mn02n7TccoBck # 2EVaa6n6OcrV1NefNMHymSbWL+Azy/6W9NxLsfAVgeZU8MIz+ysJPIHNUS/Mu0P+ # lUpUuvNei4PibZgPPm6ZD49kDpqF2EQk2qb5/RQV/Tiux3kMZyQ2Kbp/OrCbA9Xq # d8Pt1+v+g7ssBtILqnh1Km52OvE6/jMi0q8b+xSnVe53tQ8h1iW1IK3Tfb9AecnD # cg2HUJTTvTsJPO7dY2mH2PRlNoPlc0jx66S3NVpH6IDcnVEqrumuCa0MGQA2cn5V # +o1WOUivGBJUsE9mInKKEx0opqquCW0tzyufJwQnGSiRIHOWE61ktoA+Mg8c8MAl # luQtI4A3q6wQC1vaEYrDbJm97PgU7uCFx1xauiqxnSk2iM4ZYTKLEhfV6grQZ0sS # +wUiSg/AsapfRpBOagK1j38CJ+JPPsWvr5oSOjN6SOmOVY3IL6ITjcDUTLMtsQ05 # xzDo # SIG # End signature block
combined_dataset/train/non-malicious/sample_33_3.ps1
sample_33_3.ps1
# # Module manifest for module 'OCI.PSModules.Osuborganizationsubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osuborganizationsubscription.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e98d9d2f-0e34-4cf5-b62f-660dcfdc3e34' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osuborganizationsubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osuborganizationsubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOsuborganizationsubscriptionOrganizationSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osuborganizationsubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_17_76.ps1
sample_17_76.ps1
#************************************************ # TS_PrintCSRBloatingCheck.ps1 # Version 1.0.1 # Date: 6/26/2012 # Author: v-maam # Description: [Idea ID 2374] [Windows] Spooler service hangs since CSR exhausts the 512 threads in thread pool # Rule number: 2374 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=2374 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 2374 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_PrintCSRBloatingCheck" $PublicContent = "http://support.microsoft.com/kb/2697865" $InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;en-US;2716108 " $Verbosity = "Error" $Visibility = "4" $SupportTopicsID = "8066" $Title = $ScriptStrings.ID_PrintCSRBloatingCheck_ST $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** #check the machine is server media or not Function isServerMedia { $Win32OS = Get-CimInstance -Class Win32_OperatingSystem if (($Win32OS.ProductType -eq 3) -or ($Win32OS.ProductType -eq 2)) #Server Media { return $true } else { return $false } } Function AppliesToSystem { if(((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or # Server 2008 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1))) -and #Server 2008 R2 (isServerMedia)) #Server Media { return $true } else { return $false } } Function getAllBytesOfPrintersDevMode { $PrintersDevModePath = "Registry::HKEY_USERS\.DEFAULT\Printers\DevModes2" if(Test-Path $PrintersDevModePath) { $Properties = Get-ItemProperty $PrintersDevModePath $ExcludeProperty = @('PSPath','PSParentPath','PSChildName','PSProvider') Foreach($Property in $Properties.PSObject.Members|Where-Object -FilterScript {($_.MemberType -eq 'NoteProperty') -and ($ExcludeProperty -notcontains $_.Name)}) { $AllBytesOfPrintersDevMode += $Property.Name.Length + $Property.Value.Length } } return $AllBytesOfPrintersDevMode } Function getNumberOfSpoolsvThreads { return (Get-Process | Where-Object { $_.Name -eq 'spoolsv'} | ForEach-Object { $_.Threads }).Count #get the Threads number of spoolsv process } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true $BytesUnderDevModes2 = getAllBytesOfPrintersDevMode if ($BytesUnderDevModes2 -gt 700MB ) { $RootCauseDetected = $true $InformationCollected | add-member -membertype noteproperty -name "Number of bytes under DevModes2" -value $BytesUnderDevModes2 $InformationCollected | add-member -membertype noteproperty -name "Current number of threads in spoolsv process" -value (getNumberOfSpoolsvThreads) } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDHT2qGMAA/iWM2 # yCTFX/LlkAhm7ET3+skB74HttFehwaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJCE/aA3xhpGCC6JBnFyQDJq # SyNPtS2DDpM07fwi6pIBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkRBOd79qd0IhFQkBhNk9l474h2lsWyfbVcScbZeUL0J1MyNVIev9OAhd # 6IkQeYI0ccDdMe1z33C2u0TOxOaEgzHzpOFYA+9Xoz/U44Scu1hHK16g0SwKodWH # 9qJKUVgGUpF1l2YTsuUELB3aQk20gPoXnAs92TSU2HatIS5VgD4Uw12SPeAjwQyY # 9hdlNu63og6l09mBjN99ZBhbWgPzL9ER6WTJftxpAbzTK5jmNTFkNebVmUsBGAKd # rPkp7+T18itx0oIrUES7AoHZOpQcK4q9HFjV3ZvHLzuSRR6D2kdG6rBKnOBDzuoc # m10CEpFmzzQlXF8UQ3RbqGQEyHiA9aGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCYDlgHn40ysvxzq+iZIL+NeiSnODdC3b4sqMnkyHAGHgIGZutTTeQD # GBMyMDI0MTAyODExNDA0Mi4zODNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+vs7RNN3M8bTAAEAAAH6MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExMVoXDTI1MTAyMjE4MzExMVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQzMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyhZVBM3PZcBfEpAf7fII # hygwYVVP64USeZbSlRR3pvJebva0LQCDW45yOrtpwIpGyDGX+EbCbHhS5Td4J0Yl # c83ztLEbbQD7M6kqR0Xj+n82cGse/QnMH0WRZLnwggJdenpQ6UciM4nMYZvdQjyb # A4qejOe9Y073JlXv3VIbdkQH2JGyT8oB/LsvPL/kAnJ45oQIp7Sx57RPQ/0O6qay # J2SJrwcjA8auMdAnZKOixFlzoooh7SyycI7BENHTpkVKrRV5YelRvWNTg1pH4EC2 # KO2bxsBN23btMeTvZFieGIr+D8mf1lQQs0Ht/tMOVdah14t7Yk+xl5P4Tw3xfAGg # Hsvsa6ugrxwmKTTX1kqXH5XCdw3TVeKCax6JV+ygM5i1NroJKwBCW11Pwi0z/ki9 # 0ZeO6XfEE9mCnJm76Qcxi3tnW/Y/3ZumKQ6X/iVIJo7Lk0Z/pATRwAINqwdvzpdt # X2hOJib4GR8is2bpKks04GurfweWPn9z6jY7GBC+js8pSwGewrffwgAbNKm82ZDF # vqBGQQVJwIHSXpjkS+G39eyYOG2rcILBIDlzUzMFFJbNh5tDv3GeJ3EKvC4vNSAx # tGfaG/mQhK43YjevsB72LouU78rxtNhuMXSzaHq5fFiG3zcsYHaa4+w+YmMrhTEz # D4SAish35BjoXP1P1Ct4Va0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRjjHKbL5WV # 6kd06KocQHphK9U/vzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAuFbCorFrvodG # +ZNJH3Y+Nz5QpUytQVObOyYFrgcGrxq6MUa4yLmxN4xWdL1kygaW5BOZ3xBlPY7V # puf5b5eaXP7qRq61xeOrX3f64kGiSWoRi9EJawJWCzJfUQRThDL4zxI2pYc1wnPp # 7Q695bHqwZ02eaOBudh/IfEkGe0Ofj6IS3oyZsJP1yatcm4kBqIH6db1+weM4q46 # NhAfAf070zF6F+IpUHyhtMbQg5+QHfOuyBzrt67CiMJSKcJ3nMVyfNlnv6yvttYz # LK3wS+0QwJUibLYJMI6FGcSuRxKlq6RjOhK9L3QOjh0VCM11rHM11ZmN0euJbbBC # VfQEufOLNkG88MFCUNE10SSbM/Og/CbTko0M5wbVvQJ6CqLKjtHSoeoAGPeeX24f # 5cPYyTcKlbM6LoUdO2P5JSdI5s1JF/On6LiUT50adpRstZajbYEeX/N7RvSbkn0d # jD3BvT2Of3Wf9gIeaQIHbv1J2O/P5QOPQiVo8+0AKm6M0TKOduihhKxAt/6Yyk17 # Fv3RIdjT6wiL2qRIEsgOJp3fILw4mQRPu3spRfakSoQe5N0e4HWFf8WW2ZL0+c83 # Qzh3VtEPI6Y2e2BO/eWhTYbIbHpqYDfAtAYtaYIde87ZymXG3MO2wUjhL9HvSQzj # oquq+OoUmvfBUcB2e5L6QCHO6qTO7WowggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA94Z+bUJn+nKwBvII6sg0Ny7aPDaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ4mkwIhgPMjAyNDEwMjgxMDE0MDFaGA8yMDI0MTAyOTEwMTQwMVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6sniaQIBADAHAgEAAgIa4zAHAgEAAgITSTAK # AgUA6ssz6QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBDp2k9IO7lePSu # N2vi99dNhT8Ur9aidO320rDGDIcPcyFVri4JRa6egypOa+QZHboICRCPw0/gWqlr # vDCRZTwyGk5Y42nI/Ilu2wyxfwKHIFRNzSJmuD5IbQNLMl1wOoWE3WfiBV23XWqi # qgVMrvudjR2zBKTDWoEDcFPa7iv5CUd7sAQW3tiMdpKLQri7U/CWGo0EhKQQh5XE # qgC01E+FTTCm/kZmwXTQqMRAMGfm2Z83vJzQFqlNaOUj7KSuuVKsMWeLMNH4sRgs # 1pvlc78R+eR2b3qHl4HaW2yz+dSUmble365gLjUpgDBcudKw24qBm3gFHJ2uSv/o # CRYyzAghMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH6+ztE03czxtMAAQAAAfowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg9OVXCny6ht6y # qPcPqhag4mCpThAJJ37xj3TjLpv2rrcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCB98n8tya8+B2jjU/dpJRIwHwHHpco5ogNStYocbkOeVjCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+vs7RNN3M8bTAAEAAAH6 # MCIEILhY9vnDG3hQBjfXzsPIyEAOxeeRFPicwYS+g7hWGYq3MA0GCSqGSIb3DQEB # CwUABIICAKlrekThFwY41RyzLBYRRkfqAxHbY2c15GCt+lUysmDOtTLoys609+tg # 2Ng38KmWAZE+R8aWzZDx1fp0pA+FwTus2jXE+B6+88AgsiujjA/gW01qhNeumqh7 # 81rbdSE2J7CjETTv6QP1dFAj4jYmVtGz6refHsdZ0cD2gFmL5DCN2cFiomnvjxCM # 2PE5hj4oQD5ag1/E3DHOa9shS1xtkigNp/U0W37JdcUu8Te7I915Qcdp1KVXlIsc # bsSrEkALO9qBpFpqJoTi/DlhHA0jlVeanutIVx5BJoqSLAxEPkLRd2tMQCJyHHFo # Jj9xXZVur05MGQ3mYuSSTfKMctvxvkKxmJPqfOMPsHe43dVc6qnp/bX5wZsUBXTn # Y1MI661zwbJPB7wmzxTUnB3+nm89WDCV3zd88YUVhlXja4VARclXDf1LRV/1bnY8 # fJtAdbEtY68dM5aa+4B9FC8Spy9IJsq55MPHy5Wi6qu4gUwI2ZPW6vdzyCA96Fmu # i0ITFisq8XYYH4h/N/OR+F2qvYhdBa0D0nceSHW6Bhi2SJL3WKe9y3m9vtWVayTk # yoCoz0uZ4Ii+eaHtblagJhdD/KsVQpYT/lRt5wkORwLmZR7a9SbG5Ao6ORbWOvVk # BbDqOP/e/H0ZPW2cQe3ca7gkBWaxRNkE7+3n59MKHojVmWwC/JrN # SIG # End signature block
combined_dataset/train/non-malicious/3470.ps1
3470.ps1
function ConsumerGroupsTests { $location = Get-Location $resourceGroupName = getAssetName "RSG" $namespaceName = getAssetName "Namespace-" $eventHubName = getAssetName "EventHub-" $consumerGroupName = getAssetName "ConsumerGroup-" Write-Debug " Create resource group" Write-Debug " Resource Group Name : $resourceGroupName" $Result11 = New-AzResourceGroup -Name $resourceGroupName -Location $location -Force Write-Debug " Create new Evnethub namespace" Write-Debug " Namespace name : $namespaceName" $result = New-AzEventHubNamespace -ResourceGroup $resourceGroupName -Name $namespaceName -Location $location Write-Debug " Get the created namespace within the resource group" $createdNamespace = Get-AzEventHubNamespace -ResourceGroup $resourceGroupName -Name $namespaceName Assert-AreEqual $createdNamespace.Name $namespaceName "New Namespace: Namespace created earlier is not found." Write-Debug " Create new eventHub " $msgRetentionInDays = 3 $partionCount = 2 $result = New-AzEventHub -ResourceGroup $resourceGroupName -Namespace $namespaceName -Name $eventHubName -MessageRetentionInDays $msgRetentionInDays -PartitionCount $partionCount Write-Debug " Get the created eventHub " $createdEventHub = Get-AzEventHub -ResourceGroup $resourceGroupName -Namespace $namespaceName -Name $result.Name Assert-AreEqual $createdEventHub.Name $eventHubName "Get Namespace: Namespace created earlier is not found." Write-Debug " Create a new ConsumerGroup " $result_ConsumerGroup = New-AzEventHubConsumerGroup -ResourceGroup $resourceGroupName -Namespace $namespaceName -EventHub $eventHubName -Name $consumerGroupName Assert-AreEqual $result_ConsumerGroup.Name $consumerGroupName "New ConsumerGroup: ConsumerGroup created earlier is not found." Write-Debug " Get created ConsumerGroup " $GetConsumerGroup = Get-AzEventHubConsumerGroup -ResourceGroup $resourceGroupName -Namespace $namespaceName -EventHub $eventHubName -Name $result_ConsumerGroup.Name Assert-AreEqual $GetConsumerGroup.Name $consumerGroupName "Get ConsumerGroup: ConsumerGroup created earlier is not found." Write-Debug " Get all created ConsumerGroup " $ListConsumerGroups = Get-AzEventHubConsumerGroup -ResourceGroup $resourceGroupName -Namespace $namespaceName -EventHub $result.Name Assert-True { $ListConsumerGroups.Count -ge 0 } "List ConsumerGroup: ConsumerGroup created earlier is not found." Write-Debug " Delete created ConsumerGroup " Remove-AzEventHubConsumerGroup -ResourceGroup $resourceGroupName -Namespace $namespaceName -EventHub $result.Name -Name $GetConsumerGroup.Name Write-Debug " check the if consumergroup is deleted" $ListConsumerGroups_afterdelete = Get-AzEventHubConsumerGroup -ResourceGroup $resourceGroupName -Namespace $namespaceName -EventHub $result.Name Assert-True { $ListConsumerGroups_afterdelete.Count -lt 2 } "List ConsumerGroup: ConsumerGroup deleted earlier is found." Write-Debug " Delete the EventHub" $delete1 = Remove-AzEventHub -ResourceGroup $resourceGroupName -Namespace $namespaceName -Name $result.Name Write-Debug " Delete namespaces" Remove-AzEventHubNamespace -ResourceGroup $resourceGroupName -Name $namespaceName Write-Debug " Delete resourcegroup" Remove-AzResourceGroup -Name $resourceGroupName -Force }
combined_dataset/train/non-malicious/2763.ps1
2763.ps1
if (Test-Path "$env:SystemRoot\sigcheck.exe") { & $env:SystemRoot\sigcheck.exe /accepteula -a -e -c -h -q -s -r $("$env:SystemDrive\") 2> $null | ConvertFrom-Csv | ForEach-Object { $_ } } else { Write-Error "Sigcheck.exe not found in $env:SystemRoot." }
combined_dataset/train/non-malicious/sample_66_3.ps1
sample_66_3.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for TritonModelJobOutput. .Description Create an in-memory object for TritonModelJobOutput. .Outputs Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.TritonModelJobOutput .Link https://learn.microsoft.com/powershell/module/Az.MachineLearningServices/new-AzMLWorkspaceTritonModelJobOutputObject #> function New-AzMLWorkspaceTritonModelJobOutputObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.TritonModelJobOutput')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="Output Asset Delivery Mode.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Support.OutputDeliveryMode])] [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Support.OutputDeliveryMode] $Mode, [Parameter(HelpMessage="Output Asset URI.")] [string] $Uri, [Parameter(HelpMessage="Description for the output.")] [string] $Description, [Parameter(Mandatory, HelpMessage="[Required] Specifies the type of job.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Support.JobOutputType])] [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Support.JobOutputType] $Type ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.TritonModelJobOutput]::New() if ($PSBoundParameters.ContainsKey('Mode')) { $Object.Mode = $Mode } if ($PSBoundParameters.ContainsKey('Uri')) { $Object.Uri = $Uri } if ($PSBoundParameters.ContainsKey('Description')) { $Object.Description = $Description } if ($PSBoundParameters.ContainsKey('Type')) { $Object.Type = $Type } return $Object } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDjwLdpcDhQ67jc # 4jQhegsEIfCdP2JpT14wzWVBN9rlgKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGoqJinn6GUbAlA8wFiw29Yv # eKFiyyd3oORfvH7NorcDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEACtKjsqv917xA+mdeTo2OI+OJOcKmIJKXr/Fg5oQIxKVJOfBPB1/dWLDF # RjytTR23YXX8SvbaLblcqnU1z6lRzMAp59umrPBusmrPViEdEbGxUc+NQtEIuO+M # eIbkJA3edAuCNE1+TGLWyLWOMs/YTcWYIX8mEPHEVfaAcmr5pRxBGGV0XRl9JAYR # HbrajpJ8S7jg56plPdcfwcsusqfsOV/QPdgkiqjE7APOvkQyNIqUgwog3NtGGNzY # 9clYJF7EaP6cAV5WzKloENr+Um91JuR19+9R45xwVzF7NjtMz+AK5UeKiT3LpxVx # drn4vOJHz2aiZTuusJuu5/Gvsg/BvqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCiU0LBC5SFvJ53JVrFUpkavoNZs9kyJIsbLE/ZjbrbgAIGZpVexnHj # GBMyMDI0MDczMTA3MDA0MS42NjRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB # /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv # g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV # ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5 # hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d # 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f # PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj # +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5 # hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb # K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6 # YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J # OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9 # Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre # rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55 # ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH # XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb # KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP # maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY # yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr # 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA # sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4 # vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh # xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA # Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6lRLOTAiGA8yMDI0MDczMTA1MzM0 # NVoYDzIwMjQwODAxMDUzMzQ1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqVEs5 # AgEAMAcCAQACAheUMAcCAQACAhLUMAoCBQDqVZy5AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBALADV0JqIxH6ymp4mm/lL/Ihy48dhERmkAlz0OnNiuvNR05h # jW+4PsBXhZjcQIqHEhbbie5mtctq6WAB0bjAa8txR5mTYyQux6mn3jJ6/Zh9eTYP # uPpEUp+lMyYfV9YkUxUu9yZROkJJNu/5jc2ExTqzFOiAshiIoFmneJR7Y4FBvLyH # /eISlUg2OyESDuHhOp6HOggkJX/YMmL0hUUyyLTcturUxHeaGc+2KcrpEB+A7SG3 # /qotnCpBgSBeIOzXBvWBIQsNiesYqcLPcgAgta3kwtKxnuMlbgX+RgO8s11PVs2p # XCm5pryVWgfC8C6nxY0PljYUe9+4tRsYY5nHMbIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCD7XXnPlR7MaL4hO1LXxGvsBDk+TVLG66ccopxhgEE0HDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSUgIbd # izXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgbgg63AMFgI4MPcOAAiNPePNpHq/4 # LCNv8yPLrW0MKbMwDQYJKoZIhvcNAQELBQAEggIAEAELxtWNS2wigCg67DFGcY/E # P8SIeGfQWLI9nQAF+9ivSkO7ZRGvTgVufO7dnzqqP1G5clkvhgz5hq4VaTmsQMWk # UDOStm68iV0h9snWKBIk7R0EgOxVK7xNzyKCzPphJD+AaU+G7gqGUlUEpxNmK0J2 # qfgTx/E6Xe3ZJQU65q/5EpZFl5KBEc3GooGfvh5ADiK/vi0GkhetHd19XHh13vUi # XJPHGR2KlEmwKLHN4sYq1f2V4AbnNz1Vsi9RA893B3WIGILAnPDToOIbtMFKVarV # lIq0li+USRyvfZsLzOxD3zUITkwu5iq5t8CDwTdi5ggb9M/SnY681T35tQM42E6H # ztJTCkmdSGRwn9GGn9lNY9KdGXdcpDDrbAWUhLpgKPw9nfAWOnjg6OzpM/FGHndl # aC84oaMEh9pRDCfiB9P5JKJLvuJi26vd6TwPbgB4V0kl+giZoN1To4SndUtfLyUS # PTxFqv4y0S7oIXATeG3Qvr1RjRYZOV1uh1kpx8ATLijeJfVCv5yMxeUkfaPGRHAB # KwlqfMDjHdQYFcZK2PpFqnLCCZ5+S3WplP4Pza0Ipo2RzAqazky9pbKTHvzgCqoX # xxn4zYvE2OZOFGxDgak9jNNF3vVoevurVvl6xc2D9tomJqGNzlf+BBIp71GnS8KG # pKd3FPK3T5Mv+ZzVIJE= # SIG # End signature block