full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/New-Eicar.ps1
New-Eicar.ps1
function New-Eicar { <# .SYNOPSIS New-Eicar Author: Chris Campbell (@obscuresec) License: BSD 3-Clause .DESCRIPTION A function that generates the EICAR string to test ondemand scanning of antivirus products. .PARAMETER $Path Specifies the path to write the eicar file to. .EXAMPLE PS C:\\> New-Eicar -Path c:\\test .NOTES During testing, several AV products caused the script to hang, but it always completed after a few minutes. .LINK http://obscuresec.com/2013/01/New-Eicar.html https://github.com/obscuresec/random/blob/master/New-Eicar #> [CmdletBinding()] Param( [ValidateScript({Test-Path $_ -PathType 'Container'})] [string] $Path = "$env:temp\\" ) [string] $FilePath = (Join-Path $Path eicar.com) #Base64 of Eicar string [string] $EncodedEicar = 'WDVPIVAlQEFQWzRcUFpYNTQoUF4pN0NDKTd9JEVJQ0FSLVNUQU5EQVJELUFOVElWSVJVUy1URVNULUZJTEUhJEgrSCo=' If (!(Test-Path -Path $FilePath)) { Try { [byte[]] $EicarBytes = [System.Convert]::FromBase64String($EncodedEicar) [string] $Eicar = [System.Text.Encoding]::UTF8.GetString($EicarBytes) Set-Content -Value $Eicar -Encoding ascii -Path $FilePath -Force } Catch { Write-Warning "Eicar.com file couldn't be created. Either permissions or AV prevented file creation." } } Else { Write-Warning "Eicar.com already exists!" } }
combined_dataset/train/non-malicious/Get-Films (From Netflix).ps1
Get-Films (From Netflix).ps1
function Get-Films { param($Name) $proxy = New-ODataServiceProxy http://odata.netflix.com/Catalog/ if($Name -match "\\*") { $sName = $Name -replace "\\*" $Global:Films = $proxy.Titles.AddQueryOption('$filter',"substringof('$sName',Name)") | Where { $_.Name -like $Name } } else { $Global:Films = $proxy.Titles.AddQueryOption('$filter',"'$Name' eq Name") } $Films | Format-List Name, ReleaseYear, AverageRating, Url, Synopsis Write-Host "NOTE: This data is cached in `$Films" -Fore Yellow } Get-Films Salt Get-Films "The Matrix*" Get-Films "Ernest*"
combined_dataset/train/non-malicious/427.ps1
427.ps1
Register-PSFTeppScriptblock -Name 'PSFramework-tepp-scriptblockname' -ScriptBlock { [PSFramework.TabExpansion.TabExpansionHost]::Scripts.Keys } Register-PSFTeppScriptblock -Name 'PSFramework-tepp-parametername' -ScriptBlock { if ($fakeBoundParameter.Command) { $common = 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable', 'WhatIf', 'Confirm' try { $command = Get-Command $fakeBoundParameter.Command if ($command -is [System.Management.Automation.AliasInfo]) { $command = $command.ResolvedCommand } $command.Parameters.Keys | Where-Object { $_ -notin $common } } catch { } } }
combined_dataset/train/non-malicious/Reverse filename sequenc_5.ps1
Reverse filename sequenc_5.ps1
# Reverse filename sequence v 0.9 # Author: Sean Wendt # # This script will rename a sequenced set of files in a directory. # For example, you have foobar01.jpg, foobar02.jpg, foobar03.jpg # -- it will reverse the order, so the last file is now 01, the second to last 02, etc.. # # Limitations: -You cannot use the same filename prefix, i.e. foobar must change to foobars. # -It's hardcoded to only support 5 digit numbers right now. # -Similarly, it will only support a file sequence with up to 5 digits. # This is the first script I've written, I know it's not great! ;) # Help to make it better would be appreciated. Thanks. # $file_extension = Read-Host "Enter file extension, i.e. .jpg or .txt" $file_prefix = Read-Host "Enter file prefix, i.e. entering foobar will rename files to foobar001.ext, foobar002.ext, etc.." $files = Get-ChildItem | ?{ $_.PSIsContainer -ne "True"} # Creates array of files in current directory, ignores folders $idx = 0 # Sets index value (0 = filenames start at foobar00000.jpg, modify to 1 to start at foobar00001.jpg) for ($ctr=$files.count; $ctr -gt 0 ; --$ctr) { if (($idx -ge 0) -and ($idx -le 9)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '00000' + $idx++ + $file_extension) } elseif (($idx -ge 10) -and ($idx -le 99)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '0000' + $idx++ + $file_extension) } elseif (($idx -ge 100) -and ($idx -le 999)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '000' + $idx++ + $file_extension) } elseif (($idx -ge 1000) -and ($idx -le 9999)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '00' + $idx++ + $file_extension) } elseif (($idx -ge 10000) -and ($idx -le 99999)) { Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '0' + $idx++ + $file_extension) } $idx #prints the index # it just completed }
combined_dataset/train/non-malicious/464.ps1
464.ps1
Set-PSFConfig -Module PSFramework -Name 'System.Unattended' -Value $false -Initialize -Validation "bool" -Handler { [PSFramework.PSFCore.PSFCoreHost]::Unattended = $args[0] } -Description "Central setting, showing whether the current execution is unattended or not. This allows scripts/modules to react to whether there is a user at the controls or not." Set-PSFConfig -Module PSFramework -Name 'SupportPackage.ContactMessage' -Value ' ' -Initialize -Validation 'string' -Description 'Message shown when using New-PSFSUpportPackage. This allows an organization to tie information on how to submit a support package into the command that generates it' Set-PSFConfig -Module PSFramework -Name 'Text.Encoding.FullTabCompletion' -Value $false -Initialize -Validation 'bool' -Description 'Whether all encodings should be part of the tab completion for encodings. By default, only a manageable subset is shown.' Set-PSFConfig -Module PSFramework -Name 'Text.Encoding.DefaultWrite' -Value 'utf-8' -Initialize -Validation 'string' -Description 'The default encoding to use when writing to file. Only applied by implementing commands.' Set-PSFConfig -Module PSFramework -Name 'Text.Encoding.DefaultRead' -Value 'utf-8' -Initialize -Validation 'string' -Description 'The default encoding to use when reading from file. Only applied by implementing commands.' Set-PSFConfig -Module PSFramework -Name 'Localization.Language' -Value ([System.Globalization.CultureInfo]::CurrentUICulture.Name) -Initialize -Handler { [PSFramework.Localization.LocalizationHost]::Language = $args[0] } -Validation 'languagecode' -Description 'The language the current PowerShell session is operating under' Set-PSFConfig -Module PSFramework -Name 'Localization.LoggingLanguage' -Value 'en-US' -Initialize -Handler { [PSFramework.Localization.LocalizationHost]::LoggingLanguage = $args[0] } -Validation 'languagecode' -Description 'The language the current PowerShell session is operating under'
combined_dataset/train/non-malicious/ISE-Lines_1.ps1
ISE-Lines_1.ps1
#requires -version 2.0 ## ISE-Lines module v 1.1 ## DEVELOPED FOR CTP3 ## See comments for each function for changes ... ############################################################################################################## ## Provides Line cmdlets for working with ISE ## Duplicate-Line - Duplicates current line ## Conflate-Line - Conflates current and next line ## MoveUp-Line - Moves current line up ## MoveDown-Line - Moves current line down ## Delete-TrailingBlanks - Deletes trailing blanks in the whole script ############################################################################################################## ## Duplicate-Line ############################################################################################################## ## Duplicates current line ############################################################################################################## function Duplicate-Line { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") $line = $text[$caretLine -1] $newText = $text[0..($caretLine -1)] $newText += $line $newText += $text[$caretLine..($text.Count -1)] $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine, $caretColumn) } ## Conflate-Line ############################################################################################################## ## Conflates current and next line ## v 1.1 fixed bug on last but one line and remove line continuation character while joining ############################################################################################################## function Conflate-Line { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") if ( $caretLine -ne $text.Count ) { $line = $text[$caretLine -1] + $text[$caretLine] -replace ("(``)?`r", "") $newText = @() if ( $caretLine -gt 1 ) { $newText = $text[0..($caretLine -2)] } $newText += $line if ( $caretLine -ne $text.Count - 1) { $newText += $text[($caretLine +1)..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine, $caretColumn) } } ## MoveUp-Line ############################################################################################################## ## Moves current line up ############################################################################################################## function MoveUp-Line { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine if ( $caretLine -ne 1 ) { $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") $line = $text[$caretLine -1] $lineBefore = $text[$caretLine -2] $newText = @() if ( $caretLine -gt 2 ) { $newText = $text[0..($caretLine -3)] } $newText += $line $newText += $lineBefore if ( $caretLine -ne $text.Count ) { $newText += $text[$caretLine..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine - 1, $caretColumn) } } ## MoveDown-Line ############################################################################################################## ## Moves current line down ############################################################################################################## function MoveDown-Line { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") if ( $caretLine -ne $text.Count ) { $line = $text[$caretLine -1] $lineAfter = $text[$caretLine] $newText = @() if ( $caretLine -ne 1 ) { $newText = $text[0..($caretLine -2)] } $newText += $lineAfter $newText += $line if ( $caretLine -lt $text.Count -1 ) { $newText += $text[($caretLine +1)..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine +1, $caretColumn) } } ## Delete-TrailingBlanks ############################################################################################################## ## Deletes trailing blanks in the whole script ############################################################################################################## function Delete-TrailingBlanks { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine $newText = @() foreach ( $line in $editor.Text.Split("`n") ) { $newText += $line -replace ("\\s+$", "") } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine, 1) } ############################################################################################################## ## Inserts a submenu Lines to ISE's Custum Menu ## Inserts command Duplicate Line to submenu Lines ## Inserts command Conflate Line Selected to submenu Lines ## Inserts command Move Up Line to submenu Lines ## Inserts command Move Down Line to submenu Lines ## Inserts command Delete Trailing Blanks to submenu Lines ############################################################################################################## if (-not( $psISE.CustomMenu.Submenus | where { $_.DisplayName -eq "Line" } ) ) { $lineMenu = $psISE.CustomMenu.Submenus.Add("_Lines", $null, $null) $null = $lineMenu.Submenus.Add("Duplicate Line", {Duplicate-Line}, "Ctrl+Alt+D") $null = $lineMenu.Submenus.Add("Conflate Line", {Conflate-Line}, "Ctrl+Alt+J") $null = $lineMenu.Submenus.Add("Move Up Line", {MoveUp-Line}, "Ctrl+Shift+Up") $null = $lineMenu.Submenus.Add("Move Down Line", {MoveDown-Line}, "Ctrl+Shift+Down") $null = $lineMenu.Submenus.Add("Delete Trailing Blanks", {Delete-TrailingBlanks}, "Ctrl+Shift+Del") }
combined_dataset/train/non-malicious/sample_67_75.ps1
sample_67_75.ps1
# # Module manifest for module 'OCI.PSModules.Marketplace' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Marketplace.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b7f90e90-3cc1-4fca-9773-f27b90f7945b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Marketplace Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplace.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIMarketplaceListing', 'Get-OCIMarketplaceAcceptedAgreement', 'Get-OCIMarketplaceAcceptedAgreementsList', 'Get-OCIMarketplaceAgreement', 'Get-OCIMarketplaceAgreementsList', 'Get-OCIMarketplaceCategoriesList', 'Get-OCIMarketplaceLaunchEligibility', 'Get-OCIMarketplaceListing', 'Get-OCIMarketplaceListingsList', 'Get-OCIMarketplacePackage', 'Get-OCIMarketplacePackagesList', 'Get-OCIMarketplacePublication', 'Get-OCIMarketplacePublicationPackage', 'Get-OCIMarketplacePublicationPackagesList', 'Get-OCIMarketplacePublicationsList', 'Get-OCIMarketplacePublishersList', 'Get-OCIMarketplaceReportsList', 'Get-OCIMarketplaceReportTypesList', 'Get-OCIMarketplaceTaxesList', 'Get-OCIMarketplaceThirdPartyPaidListingEligibility', 'Get-OCIMarketplaceWorkRequest', 'Get-OCIMarketplaceWorkRequestErrorsList', 'Get-OCIMarketplaceWorkRequestLogsList', 'Get-OCIMarketplaceWorkRequestsList', 'Invoke-OCIMarketplaceSearchListings', 'Move-OCIMarketplacePublicationCompartment', 'New-OCIMarketplaceAcceptedAgreement', 'New-OCIMarketplacePublication', 'Remove-OCIMarketplaceAcceptedAgreement', 'Remove-OCIMarketplacePublication', 'Update-OCIMarketplaceAcceptedAgreement', 'Update-OCIMarketplacePublication' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplace' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3264.ps1
3264.ps1
enum AccessRight { Allow Deny } enum ConnectionStatus { Connected Disconnected } enum TriggerType { Command Event Regex } enum Severity { Success Warning Error None } enum LogLevel { Info = 1 Verbose = 2 Debug = 4 } enum LogSeverity { Normal Warning Error } enum ReactionType { Success Failure Processing Custom Warning ApprovalNeeded Cancelled Denied } enum TimeInterval { Days Hours Minutes Seconds } enum ApprovalState { AutoApproved Pending Approved Denied } enum MessageType { CardClicked ChannelRenamed Message PinAdded PinRemoved PresenceChange ReactionAdded ReactionRemoved StarAdded StarRemoved } enum MessageSubtype { None ChannelJoined ChannelLeft ChannelRenamed ChannelPurposeChanged ChannelTopicChanged } enum MiddlewareType { PreReceive PostReceive PreExecute PostExecute PreResponse PostResponse }
combined_dataset/train/non-malicious/Custom Accelerators.ps1
Custom Accelerators.ps1
#requires -version 2.0 ## Custom Accelerators for PowerShell 2 #################################################################################################### ## A script module for PowerShell 2 which allows the user to create their own custom type accelerators. ## Thanks to "Oisin Grehan for the discovery":http://www.nivot.org/2008/12/25/ListOfTypeAcceleratorsForPowerShellCTP3.aspx. #################################################################################################### ## Revision History ## v1.0 - Modularization of Oisin's idea, by Joel 'Jaykul' Bennett ## v2.0 - Update for RTM (nothing significant) #################################################################################################### # get a reference to the Type $xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators") function Add-Accelerator { <# .Synopsis Add a type accelerator to the current session .Description The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]). .Example Add-Accelerator list System.Collections.Generic.List``1 $list = New-Object list[string] Creates an accelerator for the generic List[T] collection type, and then creates a list of strings. .Example Add-Accelerator "List T", GList System.Collections.Generic.List``1 $list = New-Object "list t[string]" Creates two accelerators for the Generic List[T] collection type. .Parameter Accelerator The short form accelerator should be just the name you want to use (without square brackets). .Parameter Type The type you want the accelerator to accelerate (without square brackets) .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". PowerShell requires arguments that are "types" to NOT have the square bracket type notation, because of the way the parsing engine works. You can either just type in the type as System.Int64, or you can put parentheses around it to help the parser out: ([System.Int64]) Also see the help for Get-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding()] PARAM( [Parameter(Position=0)] [Alias("Key")] [string[]]$Accelerator , [Parameter(Position=1)] [Alias("Value")] [type]$Type ) PROCESS { # add a user-defined accelerator foreach($a in $Accelerator) { $xlr8r::Add( $a, $Type) trap [System.Management.Automation.MethodInvocationException] { if($xlr8r::get.keys -contains $a) { Write-Error "Cannot add accelerator [$a] for [$($Type.FullName)]`n [$a] is already defined as [$($xlr8r::get[$a].FullName)]" Continue; } throw } } } } function Get-Accelerator { <# .Synopsis Get one or more type accelerator definitions .Description The Get-Accelerator function allows you to look up the type accelerators (like [regex]) defined on your system by their short form or by type .Example Get-Accelerator System.String Returns the KeyValue pair for the [System.String] accelerator(s) .Example Get-Accelerator ps*,wmi* Returns the KeyValue pairs for the matching accelerator definition(s) .Parameter Accelerator One or more short form accelerators to search for (Accept wildcard characters). .Parameter Type One or more types to search for. .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". Also see the help for Add-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(DefaultParameterSetName="ByType")] PARAM( [Parameter(Position=0, ParameterSetName="ByAccelerator", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key")] [string[]]$Accelerator , [Parameter(Position=0, ParameterSetName="ByType", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Value")] [type[]]$Type ) PROCESS { # add a user-defined accelerator switch($PSCmdlet.ParameterSetName) { "ByAccelerator" { $xlr8r::get.GetEnumerator() | % { foreach($a in $Accelerator) { if($_.Key -like $a) { $_ } } } break } "ByType" { if($Type -and $Type.Count) { $xlr8r::get.GetEnumerator() | ? { $Type -contains $_.Value } } else { $xlr8r::get.GetEnumerator() | %{ $_ } } break } } } } function Remove-Accelerator { <# .Synopsis Remove a type accelerator from the current session .Description The Remove-Accelerator function allows you to remove a simple type accelerator (like [regex]) from the current session. You can pass one or more accelerators, and even wildcards, but you should be aware that you can remove even the built-in accelerators. .Example Remove-Accelerator int Add-Accelerator int Int64 Removes the "int" accelerator for Int32 and adds a new one for Int64. I can't recommend doing this, but it's pretty cool that it works: So now, "$(([int]3.4).GetType().FullName)" would return "System.Int64" .Example Get-Accelerator System.Single | Remove-Accelerator Removes both of the default accelerators for System.Single: [float] and [single] .Example Get-Accelerator System.Single | Remove-Accelerator -WhatIf Demonstrates that Remove-Accelerator supports -Confirm and -Whatif. Will Print: What if: Removes the alias [float] for type [System.Single] What if: Removes the alias [single] for type [System.Single] .Parameter Accelerator The short form accelerator that you want to remove (Accept wildcard characters). .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accel string, regex". Also see the help for Add-Accelerator and Get-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(SupportsShouldProcess=$true)] PARAM( [Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key")] [string[]]$Accelerator ) PROCESS { foreach($a in $Accelerator) { foreach($key in $xlr8r::Get.Keys -like $a) { if($PSCmdlet.ShouldProcess( "Removes the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]", "Remove the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]?", "Removing Type Accelerator" )) { # remove a user-defined accelerator $xlr8r::remove($key) } } } } }
combined_dataset/train/non-malicious/2215.ps1
2215.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true,HelpMessage="Site server where the SMS Provider is installed")] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer, [parameter(Mandatory=$true,HelpMessage="Name of the Software Update Group")] [string]$SUGName, [parameter(Mandatory=$false,HelpMessage="Only remove expired Software Updates. This includes updates that are both expired and superseded. It does, however, exclude updates that are superseded but not expired")] [switch]$ExpiredOnly, [parameter(Mandatory=$false,HelpMessage="Remove the content for those Software Updates that will be removed from a Software Upgrade Group")] [switch]$RemoveContent, [parameter(Mandatory=$false,HelpMessage="Show a progressbar displaying the current operation")] [switch]$ShowProgress ) Begin { try { Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug "SiteCode: $($SiteCode)" } } } catch [Exception] { Throw "Unable to determine SiteCode" } } Process { try { if (($SUGName.StartsWith("*")) -and ($SUGName.EndsWith("*"))) { Write-Verbose -Message "Query: SELECT * FROM SMS_AuthorizationList WHERE LocalizedDisplayName like '%$($SUGName.Replace('*',''))%'" $WmiFilter = "LocalizedDisplayName like '%$($SUGName)%'" } elseif ($SUGName.StartsWith("*")) { Write-Verbose -Message "Query: SELECT * FROM SMS_AuthorizationList WHERE LocalizedDisplayName like '%$($SUGName.Replace('*',''))'" $WmiFilter = "LocalizedDisplayName like '%$($SUGName)'" } elseif ($SUGName.EndsWith("*")) { Write-Verbose -Message "Query: SELECT * FROM SMS_AuthorizationList WHERE LocalizedDisplayName like '$($SUGName.Replace('*',''))%'" $WmiFilter = "LocalizedDisplayName like '$($SUGName)%'" } else { Write-Verbose -Message "Query: SELECT * FROM SMS_AuthorizationList WHERE LocalizedDisplayName like '$($SUGName)'" $WmiFilter = "LocalizedDisplayName like '$($SUGName)'" } if ($SUGName -match "\*") { $SUGName = $SUGName.Replace("*","") $WmiFilter = $WmiFilter.Replace("*","") } $SUGResults = (Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_AuthorizationList -ComputerName $SiteServer -Filter "$($WmiFilter)" -ErrorAction SilentlyContinue | Measure-Object).Count if ($SUGResults -eq 1) { $AuthorizationList = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_AuthorizationList -ComputerName $SiteServer -Filter "$($WmiFilter)" -ErrorAction Stop $AuthorizationList = [wmi]"$($AuthorizationList.__PATH)" $UpdatesCount = $AuthorizationList.Updates.Count $UpdatesList = New-Object -TypeName System.Collections.ArrayList $RemovedUpdatesList = New-Object -TypeName System.Collections.ArrayList if ($PSBoundParameters["ShowProgress"]) { $ProgressCount = 0 } foreach ($Update in ($AuthorizationList.Updates)) { $CIID = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_SoftwareUpdate -ComputerName $SiteServer -Filter "CI_ID = '$($Update)'" -ErrorAction Stop if ($PSBoundParameters["ShowProgress"]) { $ProgressCount++ Write-Progress -Activity "Processing Software Updates in '$($SUGName)'" -Id 1 -Status "$($ProgressCount) / $($UpdatesCount)" -CurrentOperation "$($CIID.LocalizedDisplayName)" -PercentComplete (($ProgressCount / $UpdatesCount) * 100) } if ($CIID.IsExpired -eq $true) { Write-Verbose -Message "Update '$($CIID.LocalizedDisplayName)' was expired and will be removed from '$($AuthorizationList.LocalizedDisplayName)'" if ($CIID.CI_ID -notin $RemovedUpdatesList) { $RemovedUpdatesList.Add($CIID.CI_ID) | Out-Null } } elseif (($CIID.IsSuperseded -eq $true) -and (-not($PSBoundParameters["ExpiredOnly"]))) { Write-Verbose -Message "Update '$($CIID.LocalizedDisplayName)' was superseded and will be removed from '$($AuthorizationList.LocalizedDisplayName)'" if ($CIID.CI_ID -notin $RemovedUpdatesList) { $RemovedUpdatesList.Add($CIID.CI_ID) | Out-Null } } else { if ($CIID.CI_ID -notin $UpdatesList) { $UpdatesList.Add($CIID.CI_ID) | Out-Null } } } if ($UpdatesCount -gt $UpdatesList.Count) { try { if ($PSCmdlet.ShouldProcess("$($AuthorizationList.LocalizedDisplayName)","Clean '$($UpdatesCount - ($UpdatesList.Count))' updates")) { if ($UpdatesList.Count -ge 1) { $AuthorizationList.Updates = $UpdatesList $AuthorizationList.Put() | Out-Null Write-Verbose -Message "Successfully cleaned up $($UpdatesCount - ($UpdatesList.Count)) updates from '$($AuthorizationList.LocalizedDisplayName)'" } else { $AuthorizationList.Updates = @() $AuthorizationList.Put() | Out-Null Write-Verbose -Message "Successfully cleaned up all updates from '$($AuthorizationList.LocalizedDisplayName)'" } } if ($PSBoundParameters["RemoveContent"]) { try { $DeploymentPackageList = New-Object -TypeName System.Collections.ArrayList foreach ($CI_ID in $RemovedUpdatesList) { Write-Verbose -Message "Collecting content data for CI_ID: $($CI_ID)" $ContentData = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Query "SELECT SMS_PackageToContent.ContentID,SMS_PackageToContent.PackageID from SMS_PackageToContent JOIN SMS_CIToContent on SMS_CIToContent.ContentID = SMS_PackageToContent.ContentID where SMS_CIToContent.CI_ID in ($($CI_ID))" -ComputerName $SiteServer -ErrorAction Stop Write-Verbose -Message "Found '$(($ContentData | Measure-Object).Count)' objects" foreach ($Content in $ContentData) { $ContentID = $Content | Select-Object -ExpandProperty ContentID $PackageID = $Content | Select-Object -ExpandProperty PackageID $DeploymentPackage = [wmi]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_SoftwareUpdatesPackage.PackageID='$($PackageID)'" if ($DeploymentPackage.PackageID -notin $DeploymentPackageList) { $DeploymentPackageList.Add($DeploymentPackage.PackageID) | Out-Null } if ($PSCmdlet.ShouldProcess("$($PackageID)","Remove ContentID '$($ContentID)'")) { Write-Verbose -Message "Attempting to remove ContentID '$($ContentID)' from PackageID '$($PackageID)'" $ReturnValue = $DeploymentPackage.RemoveContent($ContentID, $false) if ($ReturnValue.ReturnValue -eq 0) { Write-Verbose -Message "Successfully removed ContentID '$($ContentID)' from PackageID '$($PackageID)'" } } } } foreach ($DPackageID in $DeploymentPackageList) { if ($PSCmdlet.ShouldProcess("$($DPackageID)","Refresh content source")) { $DPackage = [wmi]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_SoftwareUpdatesPackage.PackageID='$($DPackageID)'" Write-Verbose -Message "Attempting to refresh content source for Deployment Package '$($DPackage.Name)'" $ReturnValue = $DPackage.RefreshPkgSource() if ($ReturnValue.ReturnValue -eq 0) { Write-Verbose -Message "Successfully refreshed content source for Deployment Package '$($DPackage.Name)'" } } } } catch [Exception] { Write-Warning -Message "An error occured when attempting to remove ContentID '$($ContentID)' from '$($PackageID)'" } } } catch [Exception] { Write-Warning -Message "Unable to save changes to '$($AuthorizationList.LocalizedDisplayName)'" ; break } } else { Write-Verbose -Message "No changes detected, will not update '$($AuthorizationList.LocalizedDisplayName)'" } } elseif ($SUGResults -ge 1) { Write-Warning -Message "Specified Software Update Group name returned '$($SUGResults)' results, please be more specific" } else { Write-Warning -Message "Unable to locate a Software Update Group named '$($SUGName)'" } } catch [Exception] { Throw $_.Exception.Message } } End { if ($PSBoundParameters["ShowProgress"]) { Write-Progress -Activity "Enumerating Software Updates" -Completed -ErrorAction SilentlyContinue } }
combined_dataset/train/non-malicious/84.ps1
84.ps1
  function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"   $redirectUri = "urn:ietf:wg:oauth:2.0:oob"   $resourceAppIdURI = "https://graph.microsoft.com"   $authority = "https://login.microsoftonline.com/$Tenant"   try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } }   Function Get-DeviceCompliancePolicy(){ [cmdletbinding()] param ( $Name, [switch]$Android, [switch]$iOS, [switch]$Win10, $id ) $graphApiVersion = "Beta" $Resource = "deviceManagement/deviceCompliancePolicies" try { $Count_Params = 0 if($Android.IsPresent){ $Count_Params++ } if($iOS.IsPresent){ $Count_Params++ } if($Win10.IsPresent){ $Count_Params++ } if($Name.IsPresent){ $Count_Params++ } if($Count_Params -gt 1){ write-host "Multiple parameters set, specify a single parameter -Android -iOS or -Win10 against the function" -f Red } elseif($Android){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("android") } } elseif($iOS){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("ios") } } elseif($Win10){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("windows10CompliancePolicy") } } elseif($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") } } elseif($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)/$id`?`$expand=assignments,scheduledActionsForRule(`$expand=scheduledActionConfigurations)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-DeviceConfigurationPolicy(){ [cmdletbinding()] param ( $name, $id ) $graphApiVersion = "Beta" $DCP_resource = "deviceManagement/deviceConfigurations" try { if($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") } } elseif($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)/$id" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Update-DeviceCompliancePolicy(){ [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $id, [Parameter(Mandatory=$true)] $Type, [Parameter(Mandatory=$true)] $ScopeTags ) $graphApiVersion = "beta" $Resource = "deviceManagement/deviceCompliancePolicies/$id" try { if($ScopeTags -eq "" -or $ScopeTags -eq $null){ $JSON = @" { "@odata.type": "$Type", "roleScopeTagIds": [] } "@ } else { $object = New-Object –TypeName PSObject $object | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value "$Type" $object | Add-Member -MemberType NoteProperty -Name 'roleScopeTagIds' -Value @($ScopeTags) $JSON = $object | ConvertTo-Json } $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $JSON -ContentType "application/json" Start-Sleep -Milliseconds 100 } catch { Write-Host $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Update-DeviceConfigurationPolicy(){ [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $id, [Parameter(Mandatory=$true)] $Type, [Parameter(Mandatory=$true)] $ScopeTags ) $graphApiVersion = "beta" $Resource = "deviceManagement/deviceConfigurations/$id" try { if($ScopeTags -eq "" -or $ScopeTags -eq $null){ $JSON = @" { "@odata.type": "$Type", "roleScopeTagIds": [] } "@ } else { $object = New-Object –TypeName PSObject $object | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value "$Type" $object | Add-Member -MemberType NoteProperty -Name 'roleScopeTagIds' -Value @($ScopeTags) $JSON = $object | ConvertTo-Json } $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $JSON -ContentType "application/json" Start-Sleep -Milliseconds 100 } catch { Write-Host $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-RBACScopeTag(){ [cmdletbinding()] param ( [Parameter(Mandatory=$false)] $DisplayName ) $graphApiVersion = "beta" $Resource = "deviceManagement/roleScopeTags" try { if($DisplayName){ $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=displayName eq '$DisplayName'" $Result = (Invoke-RestMethod -Uri $uri -Method Get -Headers $authToken).Value } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource" $Result = (Invoke-RestMethod -Uri $uri -Method Get -Headers $authToken).Value } return $Result } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host throw } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } Write-Host "Are you sure you want to add Scope Tags to all Configuration and Compliance Policies? Y or N?" $Confirm = read-host if($Confirm -eq "y" -or $Confirm -eq "Y"){ Write-Host "Checking if any Scope Tags have been created..." Write-Host $ScopeTags = Get-RBACScopeTag if($ScopeTags){ Write-Host "Scope Tags found..." -ForegroundColor Green Write-Host foreach($ScopeTag in $ScopeTags){ $ScopeTag_DN = $ScopeTag.displayName $ScopeTagId = $ScopeTag.id Write-Host "Checking Scope Tag '$ScopeTag_DN'..." -ForegroundColor Cyan Write-Host "Testing if '$ScopeTag_DN' exists in Device Compliance Policy Display Name..." $CPs = Get-DeviceCompliancePolicy | Where-Object { ($_.displayName).contains("$ScopeTag_DN") } | Sort-Object displayName if($CPs){ foreach($Policy in $CPs){ $CP = Get-DeviceCompliancePolicy -id $Policy.id $CP_DN = $CP.displayName if($CP.roleScopeTagIds){ if(!($CP.roleScopeTagIds).contains("$ScopeTagId")){ $ST = @($CP.roleScopeTagIds) + @("$ScopeTagId") $Result = Update-DeviceCompliancePolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags $ST if($Result -eq ""){ Write-Host "Compliance Policy '$CP_DN' patched with '$ScopeTag_DN' ScopeTag..." -ForegroundColor Green } } else { Write-Host "Scope Tag '$ScopeTag_DN' already assigned to '$CP_DN'..." -ForegroundColor Red } } else { $ST = @("$ScopeTagId") $Result = Update-DeviceCompliancePolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags $ST if($Result -eq ""){ Write-Host "Compliance Policy '$CP_DN' patched with '$ScopeTag_DN' ScopeTag..." -ForegroundColor Green } } } } Write-Host Write-Host "Testing if '$ScopeTag_DN' exists in Device Configuration Policy Display Name..." $DCPs = Get-DeviceConfigurationPolicy | Where-Object { ($_.displayName).contains("$ScopeTag_DN") } | Sort-Object displayName if($DCPs){ foreach($Policy in $DCPs){ $DCP = Get-DeviceConfigurationPolicy -id $Policy.id $DCP_DN = $DCP.displayName if($DCP.roleScopeTagIds){ if(!($DCP.roleScopeTagIds).contains("$ScopeTagId")){ $ST = @($DCP.roleScopeTagIds) + @("$ScopeTagId") $Result = Update-DeviceConfigurationPolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags $ST if($Result -eq ""){ Write-Host "Configuration Policy '$DCP_DN' patched with '$ScopeTag_DN' ScopeTag..." -ForegroundColor Green } } else { Write-Host "Scope Tag '$ScopeTag_DN' already assigned to '$DCP_DN'..." -ForegroundColor Red } } else { $ST = @("$ScopeTagId") $Result = Update-DeviceConfigurationPolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags $ST if($Result -eq ""){ Write-Host "Configuration Policy '$DCP_DN' patched with '$ScopeTag_DN' ScopeTag..." -ForegroundColor Green } } } } Write-Host } } else { Write-Host "No Scope Tags configured..." -ForegroundColor Red } } else { Write-Host "Addition of Scope Tags to all Configuration and Compliance Policies was cancelled..." -ForegroundColor Yellow } Write-Host
combined_dataset/train/non-malicious/sample_4_95.ps1
sample_4_95.ps1
ConvertFrom-StringData @' id_regsetupperfrecoverydebuginfo=Recovery/Debug related keys id_regsetupperfistartupinfo=Startup information id_regsetupperfilocalprintkey=Local Print Key id_regsetupperfipolicies=Policies System id_regsetupperfregtimezoneinfo=Time Zone keys id_regsetupperfregts=Terminal Services ID_RegSetupPerfRegCrashDump=Crash Dump related reg key '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCY25jdD5h+momO # 93daEvKYe2YiWQXnGBhiagpdaKpydKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIENP # vzQIwaMnaAms7RsrgNhmcLIrFRVhvNEGljN6l9gPMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAR6lZxeMlt8n7DsHyMzs4ktDLGLwyG3bSuHP/ # bV/vv4bOLladPCYiq8vmPsc/LYBz50m9XEdrH9db9PiMLdZW2MRlxUo7vsv4ONql # Io5cPzycYom8Sztswm2VWNU0/6v0U4f5gQEVEmijNou4dRGcPcdlID2ZSTk6pDEx # xfHn9eCmcVllnyTT8FCG500dObhMWMwUzF7dF3f6HbClW7QCcYEHGON65m+KDN2S # 5t5iCUwTT8d4aEEQPxBHYW/dPxiUEezPEbpByEY9NE//6vmfrEGW9kS+mmPTXfO6 # 54NzGpCjVltrecU5UWvOZx4aTv0e/+FzdDVmC7xoIxDcpPOEtKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDMJJR6TH5RPtTEzJCgVwDHT6lEMoy7oUlA # qIuHZA0NgwIGZut4BYxYGBMyMDI0MTAyODExNDA0MC4xMzFaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ # lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38 # 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC # fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D # cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA # ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT # M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB # Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo # u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0 # PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88 # 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv # eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/ # 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4 # Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6 # I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa # QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV # 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS # s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5 # WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q # 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK # CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi # TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y # Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0 # MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA # AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3 # UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS # TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3 # FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO # RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB # NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgZMaBlnHTvfQRzFM9+geumVdVb7OPg93AtZPGztAcYbIwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT # hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1 # KYILMA0GCSqGSIb3DQEBCwUABIICADspnMRFh79KaZQfjz1nZ5r8VCRl2zEyw0t8 # lN9XOJC3dDc5Ym1tc2/X3LDvSOk5FsIY28S2kVWxvsWl/Ms4bzrIVF6SYRdjenPK # T8wlB95BkgfU3e2qaVH964o7BDhqqZ9AdEm4bVsltrVe7pJWrwSbCTZslIUJEbzK # 2SRSBS1/5VvrTu13z88V6l1dSVxPofqsYU3aFkDYPmAmkGKiBWmHjPuibJyeEuTy # p+qTLircOT6rdWXJwsId56aoqHkQe1aQi9oy5AodhEC5pwRDYU38B1mMqkO+mEhZ # EaAaZFFy9+WgO+VmUguodDFUtwU+YcJw/JfILGBjCOnxUlFp/AAqVO3hBniaiH3V # KN1uTKOnH0k6meh6cy6k7oH+OROR1zZsuXtPZ0jhKdJRszyqjMd4Y7LD6ZhmVVN8 # 5vmFTkQyPFX91BiiAjoTzU6zugksUp8fiMD0uHLWJdVQMIv/jyuNhfmnrXuDV5sj # BbVPrnRxWOf1Kaugf43yPimvzeXpcbajPq8Foi/wlq7VWvyJUk5VbeFfaF1db84o # GVfoc8KmgPMRQyi3WpHv2TV8O6GTMcg2kjuGBHCruzQCDyW/Tu3n4F44juD6bdNM # mVS0I1S+49lervwh2Y0IohZdxkt4ZCLzmNBNxvp1T5h5jnVfR6kYR5/5mmsY02sf # tpBjK9Yp # SIG # End signature block
combined_dataset/train/non-malicious/sample_53_92.ps1
sample_53_92.ps1
<# File tss_Perf-Collect.ps1 [Folderpath] #> param( [string]$Folderpath = (Split-Path $MyInvocation.MyCommand.Path -Parent) ) #region ::::: Configruation parameters ----------------------------------------------# $VerDate = "2021.04.30.0" #endregion ::::: Configruation parameters --------------------------------------------# #region [Initialisations] -----------------------------------------------------------# $version = "Perf-Collect (20180307) v" + $VerDate # by Gianni Bragante - gbrag@microsoft.com # mod by WalterE 2021-04-30 Function Write-Log { param( [string] $msg ) $msg = (get-date).ToString("yyyyMMdd HH:mm:ss.fff") + " " + $msg Write-Host $msg $msg | Out-File -FilePath $outfile -Append } Function ExecQuery { param( [string] $NameSpace, [string] $Query ) Write-Log ("Executing query " + $Query) if ($PSVersionTable.psversion.ToString() -ge "3.0") { $ret = Get-CimInstance -Namespace $NameSpace -Query $Query -ErrorAction Continue 2>>$errfile } else { $ret = Get-CimInstance -Namespace $NameSpace -Query $Query -ErrorAction Continue 2>>$errfile } Write-Log (($ret | Measure-Object).count.ToString() + " results") return $ret } $tbPerfV1 = New-Object system.Data.DataTable “Perf” $col = New-Object system.Data.DataColumn Name,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn Open,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn Close,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn Collect,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn Library,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn InstallType,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn PerfIniFile,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn IniExists,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn Disabled,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn FirstCounter,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn FirstHelp,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn LastCounter,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn LastHelp,([string]) $tbPerfV1.Columns.Add($col) $col = New-Object system.Data.DataColumn ObjectList,([string]) $tbPerfV1.Columns.Add($col) $myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent() $myWindowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($myWindowsID) $adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator if (-not $myWindowsPrincipal.IsInRole($adminRole)) { Write-Output "This script needs to be run as Administrator" #exit } if ($Folderpath) { $Root = $Folderpath } else { $Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path } $resName = "Perf-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss) $resDir = $Root + "\" + $resName $outfile = $resDir + "\script-output.txt" $errfile = $resDir + "\script-errors.txt" $RdrOut = " >>""" + $outfile + """" $RdrErr = " 2>>""" + $errfile + """" $SysInfoFile = ($resDir + "\SystemInfo.txt") New-Item -itemtype directory -path $resDir | Out-Null Write-Log $version $cult = Get-Culture $cultHex = ('{0:X4}' -f $cult.LCID) Copy-Item ($env:SystemRoot + "\system32\perfc*.dat") $resDir Copy-Item ($env:SystemRoot + "\system32\perfd*.dat") $resDir Copy-Item ($env:SystemRoot + "\system32\perfh*.dat") $resDir Copy-Item ($env:SystemRoot + "\system32\perfi*.dat") $resDir (get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\CurrentLanguage")).Counter | Out-File ($resDir + "\Counter.txt") (get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\CurrentLanguage")).Help | Out-File ($resDir + "\Help.txt") Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services" $cmd = "reg export ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services"" """ + $resDir + "\Services.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib" $cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"" """ + $resDir + "\Perflib.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Saving registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib" $cmd = "reg save ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"" """ + $resDir + "\Perflib.hiv"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup" $cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup"" """ + $resDir + "\FWSetup.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd $svc = "HKLM:\SYSTEM\CurrentControlSet\Services" New-PSDrive -PSProvider registry -Root HKEY_LOCAL_MACHINE -Name HKLM -ErrorAction SilentlyContinue | Out-Null $Keys = Get-ChildItem $svc ForEach ($Item in $Keys) { $perf = ($svc + "\" + $item.PSChildName + "\Performance") $reg = Get-ItemProperty $perf -ErrorAction SilentlyContinue if ($reg) { Write-Log $item.PSChildName $row = $tbPerfV1.NewRow() if ($reg.PerfIniFile) { $inipath = ($env:windir + "\INF\" + $item.PSChildName + "\" + $cultHex + "\" + $reg.PerfIniFile).TrimEnd([char]0) if (Test-Path $inipath) { $row.IniExists = "Yes" } else { $row.IniExists = "No" } } else { $row.IniExists = "" } $row.Name = $item.PSChildName $row.Open = $reg.Open $row.Close = $reg.Close $row.Collect = $reg.Collect $row.Library = $reg.Library $row.InstallType = $reg.InstallType $row.PerfIniFile = $reg.PerfIniFile $row.Disabled = $reg.'Disable Performance Counters' $row.FirstCounter = $reg.'First Counter' $row.FirstHelp = $reg.'First Help' $row.LastCounter = $reg.'Last Counter' $row.LastHelp = $reg.'Last Help' $row.ObjectList = $reg.'Object List' $tbPerfV1.Rows.Add($row) } } $tbPerfV1 | Export-Csv $resDir"\PerfV1.csv" -noType Write-Log "Enumerating performance counters" $cmd = "typeperf.exe -q > """ + $resDir + "\typeperf.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append Write-Log "Enumerating performance counters with instances" $cmd = "typeperf.exe -qx > """ + $resDir + "\typeperf-inst.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append Write-Log "Enumerating 32bit performance counters" $cmd = $env:windir + "\SysWOW64\typeperf.exe -q > """ + $resDir + "\typeperf32.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append Write-Log "Enumerating 32bit performance counters" $cmd = $env:windir + "\SysWOW64\typeperf.exe -qx > """ + $resDir + "\typeperf32-inst.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append Write-Log "Enumerating WMI performance classes" Get-CimInstance -Query "select * from meta_class where __CLASS like '%Win32_Perf%'" | Select-Object -Property __CLASS | Sort-Object -Property __CLASS | Out-File ($resDir + "\WMIPerfClasses.txt") <# #_# 2021-04-30 Write-Log "Exporting Application log" $cmd = "wevtutil epl Application """+ $resDir + "\" + $env:computername + "-Application.evtx""" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting System log" $cmd = "wevtutil epl System """+ $resDir + "\" + $env:computername + "-System.evtx""" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd #> Write-Log "Collecting system information" $pad = 27 $OS = ExecQuery -Namespace "root\cimv2" -Query "select Caption, CSName, OSArchitecture, BuildNumber, InstallDate, LastBootUpTime, LocalDateTime, TotalVisibleMemorySize, FreePhysicalMemory, SizeStoredInPagingFiles, FreeSpaceInPagingFiles from Win32_OperatingSystem" $CS = ExecQuery -Namespace "root\cimv2" -Query "select Model, Manufacturer, SystemType, NumberOfProcessors, NumberOfLogicalProcessors, TotalPhysicalMemory, DNSHostName, Domain from Win32_ComputerSystem" $BIOS = ExecQuery -Namespace "root\cimv2" -query "select BIOSVersion, Manufacturer, ReleaseDate, SMBIOSBIOSVersion from Win32_BIOS" $TZ = ExecQuery -Namespace "root\cimv2" -Query "select Description from Win32_TimeZone" $PR = ExecQuery -Namespace "root\cimv2" -Query "select Name, Caption from Win32_Processor" "Computer name".PadRight($pad) + " : " + $OS.CSName | Out-File -FilePath $SysInfoFile -Append "Model".PadRight($pad) + " : " + $CS.Model | Out-File -FilePath $SysInfoFile -Append "Manufacturer".PadRight($pad) + " : " + $CS.Manufacturer | Out-File -FilePath $SysInfoFile -Append "BIOS Version".PadRight($pad) + " : " + $BIOS.BIOSVersion | Out-File -FilePath $SysInfoFile -Append "BIOS Manufacturer".PadRight($pad) + " : " + $BIOS.Manufacturer | Out-File -FilePath $SysInfoFile -Append "BIOS Release date".PadRight($pad) + " : " + $BIOS.ReleaseDate | Out-File -FilePath $SysInfoFile -Append "SMBIOS Version".PadRight($pad) + " : " + $BIOS.SMBIOSBIOSVersion | Out-File -FilePath $SysInfoFile -Append "SystemType".PadRight($pad) + " : " + $CS.SystemType | Out-File -FilePath $SysInfoFile -Append "Processor".PadRight($pad) + " : " + $PR.Name + " / " + $PR.Caption | Out-File -FilePath $SysInfoFile -Append "Processors physical/logical".PadRight($pad) + " : " + $CS.NumberOfProcessors + " / " + $CS.NumberOfLogicalProcessors | Out-File -FilePath $SysInfoFile -Append "Memory physical/visible".PadRight($pad) + " : " + ("{0:N0}" -f ($CS.TotalPhysicalMemory/1mb)) + " MB / " + ("{0:N0}" -f ($OS.TotalVisibleMemorySize/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append "Free physical memory".PadRight($pad) + " : " + ("{0:N0}" -f ($OS.FreePhysicalMemory/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append "Paging files size / free".PadRight($pad) + " : " + ("{0:N0}" -f ($OS.SizeStoredInPagingFiles/1kb)) + " MB / " + ("{0:N0}" -f ($OS.FreeSpaceInPagingFiles/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append "Operating System".PadRight($pad) + " : " + $OS.Caption + " " + $OS.OSArchitecture | Out-File -FilePath $SysInfoFile -Append "Build Number".PadRight($pad) + " : " + $OS.BuildNumber | Out-File -FilePath $SysInfoFile -Append "Time zone".PadRight($pad) + " : " + $TZ.Description | Out-File -FilePath $SysInfoFile -Append "Install date".PadRight($pad) + " : " + $OS.InstallDate | Out-File -FilePath $SysInfoFile -Append "Last boot time".PadRight($pad) + " : " + $OS.LastBootUpTime | Out-File -FilePath $SysInfoFile -Append "Local time".PadRight($pad) + " : " + $OS.LocalDateTime | Out-File -FilePath $SysInfoFile -Append "DNS Hostname".PadRight($pad) + " : " + $CS.DNSHostName | Out-File -FilePath $SysInfoFile -Append "Domain".PadRight($pad) + " : " + $CS.Domain | Out-File -FilePath $SysInfoFile -Append # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA0cNPmmhStC95x # YKdwoFt/XvVwVaxYdhBURvHmGXzP5KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKSv # 7Kn0dJWgF1vEqG3//k6psvxkb02BVkZ7BEcHc5EqMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA6GpWRScNOfdgXRBpyrKSewyBucd+tsq/LYF9 # 5HQKO7bBJI+B71JNHdYATTVcxr9faAMkiVk/orQTxkipqqHhbBTiXko4D42VJyvn # 7YthUd23s4laX9BOvae0Ia6YX5ACp0V2Ff6pKmVLnDfsaZ1wLkid/N5Wk7keOp0C # WW6KiSgTJ7d8KpXUE+D1HO6/UTrHZnb/K59ntP6TYqM7ebZo6lKoy+2MRqSrN3+m # qVBq4KQftpFtatNhy5QeSqyoa76jx597Q0iIYvZCufQ45bsYMLGWJq4m7FCnUMya # yYLOfIDRMz4fPt+F+vIyZj0rzfbVc9MiPn6voTOAkaiHPycv5qGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCD1lCWOTr+JjFeLWpMS0aKgf43rVSWiQO2z # WF6F4hvI2AIGZldTgNdfGBMyMDI0MDYxMjE1MDA0MC41NThaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV # 8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVj # tZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC # 7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJ # bsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmU # Xs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwne # tSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfF # cS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4 # eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdth # FCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCW # ACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKv # NNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3u # fASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3 # ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwL # hP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrX # a2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0gan # hFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVl # UE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIo # ycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iO # aKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqv # E8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhS # gCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv # 1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhf # iB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOoTm/4wIhgPMjAyNDA2MTIxMjAxMDJaGA8yMDI0MDYx # MzEyMDEwMlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6hOb/gIBADAHAgEAAgIU # +DAHAgEAAgISGTAKAgUA6hTtfgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AJ/FJuetAVWJI9zIVgs/G6PJb2Htizs7thkptzHLKrRyIkqJv/q6dRq8CoHs3W9P # BVpwGoeYDNFqHTXGjcScJjSLFlL8KdtZ2Xe1nwjxChR8Ta+kTgfbll+of7DjBs4h # ou5X0dKwo0yyYMSYERBYeeIbZsDaI5CElxB95kDskp2pMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAA # AeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgSN29J+YcN1Xf/y1lojGtDl/Uv5UXmxfYbQoDyR8c # c1IwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4 # d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIFXEVszJvDLGPe6VS+bkhFGz # m96spv2wtK27KDsu4aKpMA0GCSqGSIb3DQEBCwUABIICAATANfOW6mY9bIN6MkQ4 # 8M3y3mXH8n2rimjMXO1i1CmUC7+qsL/LCkJo8RsRmbwVNK+XA/yjxb1UdLzWHPw2 # RRuiuZlD+ooKeZww0ECDnXW/IIoBrtm9cFKGJxwG+ycfJLZ/h/JLwUfeyKLw+UlC # +K4P+jBaYEddKV4t9sSjoPy2u2iNhIzqXH6kGnaevW085mkF3AVYccQK4NaeYb5Y # 7/iBVEu1Bto3v0NXPn9+BRyXf+hd4NWtIuK6wZKQfbxx2vdJxbh2L/I72vm0AxhP # wdxXnlrqtylg3tUr9g8KPgHejN09QUoUL2nKhIwZiYh7LJJX+5qplY7j2V0WeayI # CyB+NgmCEVCgG8qWjPxplniK3+PiUC/Bvmi8ZpGaboheApET6Sa+RGbjsjnSPqdV # SVlvJzoeGqqcfDgbuMUpnnElFMrSzwZqQNPJoD6ZK8N5rRY4T4DMNA7p2IHqXdYs # o/fE3d1+kPZo1FVGArTxBZE3ltzfLrR57r2PFmoGNZUQA8Fup1+VhZPdlAm48+C+ # ph+S1Yk4XdXnLB0pHO9/dzoWLig1oqlLGEIBV6ibuSjF5f45DU9wynAdmgmkSeOK # QKqg93Vus9F+frwD6RYeh4LDWRUQNwEShWKkmnxJqBrVz7K+fhRMXuFXXGPLLmIq # aWthX8Z/rnc3t4XGaYQFOv5Z # SIG # End signature block
combined_dataset/train/non-malicious/197.ps1
197.ps1
Function Add-SRComment { [CmdletBinding()] PARAM ( [Alias("SRObject")] [parameter(Mandatory = $true)] [System.WorkItem.ServiceRequest]$ServiceRequestObject, [parameter(Mandatory = $True)] [String]$Comment, [ValidateSet("User", "Analyst")] [parameter(Mandatory = $True)] [System.WorkItem.TroubleTicket] [String]$CommentType, [parameter(Mandatory = $True)] [String]$EnteredBy, [Switch]$IsPrivate ) BEGIN { TRY { if (-not (Get-Module -Name Smlets)) { Import-Module -Name Smlets -ErrorAction 'Stop' } } CATCH { $Error[0] } } PROCESS { TRY { If ($ServiceRequestObject.Id -ne $NULL) { Switch ($CommentType) { "Analyst" { $CommentClass = "System.WorkItem.TroubleTicket.AnalystCommentLog" $CommentClassName = "AnalystCommentLog" } "User" { $CommentClass = "System.WorkItem.TroubleTicket.UserCommentLog" $CommentClassName = "EndUserCommentLog" } } $NewGUID = ([guid]::NewGuid()).ToString() $Projection = @{ __CLASS = "System.WorkItem.ServiceRequest"; __SEED = $ServiceRequestObject; EndUserCommentLog = @{ __CLASS = $CommentClass; __OBJECT = @{ Id = $NewGUID; DisplayName = $NewGUID; Comment = $Comment; EnteredBy = $EnteredBy; EnteredDate = (Get-Date).ToUniversalTime(); IsPrivate = $IsPrivate.ToBool(); } } } New-SCSMObjectProjection -Type "System.WorkItem.ServiceRequestProjection" -Projection $Projection } else { Throw "Invalid Service Request Object!" } } CATCH { $Error[0] } } }
combined_dataset/train/non-malicious/Add _ Get-Help -Full.ps1
Add _ Get-Help -Full.ps1
$executionContext.SessionState.InvokeCommand.PreCommandLookupAction = { param($CommandName, $CommandLookupEventArgs) if($CommandName.StartsWith("?")) { $RealCommandName = $CommandName.TrimStart("?") $CommandLookupEventArgs.CommandScriptBlock = { Get-Help $RealCommandName -Full ## Wrap it in a closure because we need $CommandName }.GetNewClosure() } } Write-Warning "DO NOT USE THIS POSTCOMMANDLOOKUPACTION EXCEPT FOR DEMONSTRATION" $executionContext.SessionState.InvokeCommand.PostCommandLookupAction = { param($CommandName, $CommandLookupEventArgs) # Only for interactive commands (and that doesn't include "prompt") # I should exclude out-default so we don't handle it on every pipeline, but ... if($CommandLookupEventArgs.CommandOrigin -eq "Runspace" -and $CommandName -ne "prompt" ) { ## Create a new script block that checks for the "-??" argument ## And if -?? exists, calls Get-Help -Full instead ## Otherwise calls the expected command $CommandLookupEventArgs.CommandScriptBlock = { if($Args.Length -eq 1 -and $Args[0] -eq "-??") { Get-Help $CommandName -Full } else { & $CommandName @args } ## Wrap it in a closure because we need $CommandName }.GetNewClosure() } }
combined_dataset/train/non-malicious/1106.ps1
1106.ps1
$siteName = 'Carbon-Set-IisWebsiteSslCertificate' $cert = $null $appID = '990ae75d-b1c3-4c4e-93f2-9b22dfbfe0ca' $ipAddress = '43.27.98.0' $port = '443' $allPort = '8013' function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { Install-IisWebsite -Name $siteName -Path $TestDir -Bindings @( "https/$ipAddress`:$port`:", "https/*:$allPort`:" ) $cert = Install-Certificate -Path (Join-Path $TestDir ..\Certificates\CarbonTestCertificate.cer -Resolve) -StoreLocation LocalMachine -StoreName My } function Stop-Test { Uninstall-Certificate -Certificate $cert -StoreLocation LocalMachine -StoreName My Uninstall-IisWebsite -Name $siteName } function Test-ShouldSetWebsiteSslCertificate { Set-IisWebsiteSslCertificate -SiteName $siteName -Thumbprint $cert.Thumbprint -ApplicationID $appID try { $binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port Assert-NotNull $binding Assert-Equal $cert.Thumbprint $binding.CertificateHash Assert-Equal $appID $binding.ApplicationID $binding = Get-SslCertificateBinding -Port $allPort Assert-NotNull $binding Assert-Equal $cert.Thumbprint $binding.CertificateHash Assert-Equal $appID $binding.ApplicationID } finally { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port Remove-SslCertificateBinding -Port $allPort } } function Test-ShouldSupportWhatIf { $bindings = @( Get-SslCertificateBinding ) Set-IisWebsiteSslCertificate -SiteName $siteName -Thumbprint $cert.Thumbprint -ApplicationID $appID -WhatIf $newBindings = @( Get-SslCertificateBinding ) Assert-Equal $bindings.Length $newBindings.Length } function Test-ShouldSupportWebsiteWithoutSslBindings { Install-IisWebsite -Name $siteName -Path $TestDir -Bindings @( 'http/*:80:' ) $bindings = @( Get-SslCertificateBinding ) Set-IisWebsiteSslCertificate -SiteName $siteName -Thumbprint $cert.Thumbprint -ApplicationID $appID $newBindings = @( Get-SslCertificateBinding ) Assert-Equal $bindings.Length $newBindings.Length }
combined_dataset/train/non-malicious/sample_34_13.ps1
sample_34_13.ps1
# # Module manifest for module 'OCI.PSModules.Announcementsservice' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Announcementsservice.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4260cf9c-0dfb-4f1c-ac46-7d08fcbebbf2' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Announcementsservice Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Announcementsservice.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAnnouncementsserviceAnnouncement', 'Get-OCIAnnouncementsserviceAnnouncementsList', 'Get-OCIAnnouncementsserviceAnnouncementsPreference', 'Get-OCIAnnouncementsserviceAnnouncementsPreferencesList', 'Get-OCIAnnouncementsserviceAnnouncementSubscription', 'Get-OCIAnnouncementsserviceAnnouncementSubscriptionsList', 'Get-OCIAnnouncementsserviceAnnouncementUserStatus', 'Move-OCIAnnouncementsserviceAnnouncementSubscriptionCompartment', 'New-OCIAnnouncementsserviceAnnouncementsPreference', 'New-OCIAnnouncementsserviceAnnouncementSubscription', 'New-OCIAnnouncementsserviceFilterGroup', 'Remove-OCIAnnouncementsserviceAnnouncementSubscription', 'Remove-OCIAnnouncementsserviceFilterGroup', 'Update-OCIAnnouncementsserviceAnnouncementsPreference', 'Update-OCIAnnouncementsserviceAnnouncementSubscription', 'Update-OCIAnnouncementsserviceAnnouncementUserStatus', 'Update-OCIAnnouncementsserviceFilterGroup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Announcementsservice' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4059.ps1
4059.ps1
[CmdletBinding()] param () function Get-Architecture { [CmdletBinding()][OutputType([string])] param () $OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture $OSArchitecture = $OSArchitecture.OSArchitecture Return $OSArchitecture } function Get-RelativePath { [CmdletBinding()][OutputType([string])] param () $Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" Return $Path } function Install-EXE { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$DisplayName, [ValidateNotNullOrEmpty()][string]$Executable, [ValidateNotNullOrEmpty()][string]$Switches ) Write-Host "Install"$DisplayName.Trim()"....." -NoNewline $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Switches -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red Exit $ErrCode } } function New-AutoConfigFile { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$CFGFile ) '//The first line must be a comment' | Out-File -FilePath $CFGFile -Encoding UTF8 -NoClobber -Force 'pref("general.config.filename", "mozilla.cfg");' | Out-File -FilePath $CFGFile -Encoding UTF8 -NoClobber -Append 'pref("general.config.obscure_value", 0);' | Out-File -FilePath $CFGFile -Encoding UTF8 -NoClobber -Append } function New-MozillaConfig { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$CFGFile ) '//The first line must be a comment' | Out-File -FilePath $CFGFile -Encoding UTF8 -NoClobber -Force '// This is placed in the %programfiles%\Mozilla Firefox\ folder' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '' | Out-File -FilePath $env:ProgramFiles"\Mozilla Firefox\\mozilla.cfg" -Encoding UTF8 -Append '// Enable Automatic Updater' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'lockPref("app.update.enabled", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'lockPref("app.update.auto", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'lockPref("app.update.service.enabled", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'lockPref("app.update.mode", 0);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'lockPref("app.update.incompatible.mode", 0);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '// Do not show "know your rights" on first start' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'pref("browser.rights.3.shown", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '// Do not show What is New on first run' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'pref("browser.startup.homepage_override.mstone", "ignore");' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '// Set default homepage' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'defaultPref("browser.startup.homepage","data:text/plain,browser.startup.homepage=http://wallerville.com");' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '// Do not check if default browser' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'pref("browser.shell.checkDefaultBrowser", false);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append '// Disable Browser Reset Prompt' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append 'pref("browser.disableResetPrompt", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append } function Remove-Directory { param ( [String]$Directory, [switch]$Recurse ) Write-Host "Delete"$Directory"....." -NoNewline If (Test-Path $Directory) { If ($Recurse.IsPresent) { Remove-Item $Directory -Recurse -Force -ErrorAction SilentlyContinue } else { Remove-Item $Directory -Force -ErrorAction SilentlyContinue } If ((Test-Path $Directory) -eq $False) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } else { Write-Host "Not Present" -ForegroundColor Green } } function Stop-Processes { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][String]$ProcessName ) $Processes = Get-Process $ProcessName -ErrorAction SilentlyContinue If ($Processes -ne $null) { Do { foreach ($Process in $Processes) { If ($Process.Product -ne $null) { Write-Host "Killing"(($Process.Product).ToString()).Trim()"Process ID"(($Process.Id).ToString()).Trim()"....." -NoNewline Stop-Process -Id $Process.Id -Force -ErrorAction SilentlyContinue Start-Sleep -Milliseconds 250 $Process = Get-Process -Id $Process.Id -ErrorAction SilentlyContinue If ($Process -eq $null) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } } $Process = Get-Process $ProcessName -ErrorAction SilentlyContinue } While ($Process -ne $null) } } function Uninstall-EXE { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$DisplayName, [ValidateNotNullOrEmpty()][string]$Executable, [ValidateNotNullOrEmpty()][string]$Switches ) Write-Host "Uninstall"$DisplayName.Trim()"....." -NoNewline $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Switches -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red Exit $ErrCode } } Stop-Processes -ProcessName Firefox If (Test-Path $env:ProgramFiles"\Mozilla Firefox\uninstall\helper.exe") { Uninstall-EXE -DisplayName "Mozilla Firefox" -Executable $env:ProgramFiles"\Mozilla Firefox\uninstall\helper.exe" -Switches "/S" Remove-Directory -Directory $env:ProgramFiles"\Mozilla Firefox" -Recurse } elseif (Test-Path ${env:ProgramFiles(x86)}"\Mozilla Firefox\uninstall\helper.exe") { Uninstall-EXE -DisplayName "Mozilla Firefox" -Executable ${env:ProgramFiles(x86)}"\Mozilla Firefox\uninstall\helper.exe" -Switches "/S" Remove-Directory -Directory ${env:ProgramFiles(x86)}"\Mozilla Firefox" -Recurse } If ((Test-Path $env:ProgramData"\Mozilla") -eq $true) { Remove-Directory -Directory $env:ProgramData"\Mozilla" -Recurse }
combined_dataset/train/non-malicious/3303.ps1
3303.ps1
function Get-PoshBotConfiguration { [cmdletbinding(DefaultParameterSetName = 'Path')] param( [parameter( Mandatory, ParameterSetName = 'Path', Position = 0, ValueFromPipeline, ValueFromPipelineByPropertyName )] [ValidateNotNullOrEmpty()] [SupportsWildcards()] [string[]]$Path, [parameter( Mandatory, ParameterSetName = 'LiteralPath', Position = 0, ValueFromPipelineByPropertyName )] [ValidateNotNullOrEmpty()] [Alias('PSPath')] [string[]]$LiteralPath ) process { if ($PSCmdlet.ParameterSetName -eq 'Path') { $paths = Resolve-Path -Path $Path | Select-Object -ExpandProperty Path } elseif ($PSCmdlet.ParameterSetName -eq 'LiteralPath') { $paths = Resolve-Path -LiteralPath $LiteralPath | Select-Object -ExpandProperty Path } foreach ($item in $paths) { if (Test-Path $item) { if ( (Get-Item -Path $item).Extension -eq '.psd1') { Write-Verbose -Message "Loading bot configuration from [$item]" $hash = Get-Content -Path $item -Raw | ConvertFrom-Metadata $config = [BotConfiguration]::new() foreach ($key in $hash.Keys) { if ($config | Get-Member -MemberType Property -Name $key) { switch ($key) { 'ChannelRules' { $config.ChannelRules = @() foreach ($item in $hash[$key]) { $config.ChannelRules += [ChannelRule]::new($item.Channel, $item.IncludeCommands, $item.ExcludeCommands) } break } 'ApprovalConfiguration' { if ($hash[$key].ExpireMinutes -is [int]) { $config.ApprovalConfiguration.ExpireMinutes = $hash[$key].ExpireMinutes } if ($hash[$key].Commands.Count -ge 1) { foreach ($approvalConfig in $hash[$key].Commands) { $acc = [ApprovalCommandConfiguration]::new() $acc.Expression = $approvalConfig.Expression $acc.ApprovalGroups = $approvalConfig.Groups $acc.PeerApproval = $approvalConfig.PeerApproval $config.ApprovalConfiguration.Commands.Add($acc) > $null } } break } 'MiddlewareConfiguration' { foreach ($type in [enum]::GetNames([MiddlewareType])) { foreach ($item in $hash[$key].$type) { $config.MiddlewareConfiguration.Add([MiddlewareHook]::new($item.Name, $item.Path), $type) } } break } Default { $config.$Key = $hash[$key] break } } } } $config } else { Throw 'Path must be to a valid .psd1 file' } } else { Write-Error -Message "Path [$item] is not valid." } } } } Export-ModuleMember -Function 'Get-PoshBotConfiguration'
combined_dataset/train/non-malicious/Convert-PowerPack2Ps1.ps1
Convert-PowerPack2Ps1.ps1
####################################################################### # Convert-PowerPack2Ps1 # # Converts PowerGUI .PowerPack files to ps1 PowerShell script library # v1 - raw conversion, no name changes, only script elements converted ###################################################################### # Example: # & .\\Convert-PowerPack2Ps1 "ActiveDirectory.powerpack" "ActiveDirectory.ps1" # . .\\ActiveDirectory.ps1 # Get-QADUser 'Dmitry Sotnikov' | MemberofRecursive ###################################################################### # # (c) Dmitry Sotnikov # http://dmitrysotnikov.wordpress.com # ##################################################################### param( $PowerPackFile = (throw 'Please supply path to source powerpack file'), $OutputFilePath = (throw 'Please supply path to output ps1 file') ) #region Functions function IterateTree { # processes all script nodes param($segment) if ( $segment.Type -like 'Script*' ) { $name = $segment.name -replace ' |\\(|\\)', '' $code = $segment.script.PSBase.InnerText @" ######################################################################## # Function: $name # Return type: $($segment.returntype) ######################################################################## function $name { $code } "@ | Out-File $OutputFilePath -Append } # recurse folders if ($segment.items.container -ne $null) { $segment.items.container | ForEach-Object { IterateTree $_ } } } function Output-Link { PROCESS { if ( $_.script -ne $null ) { $name = $_.name -replace ' |\\(|\\)', '' $code = $_.script.PSBase.InnerText @" ######################################################################## # Function: $name # Input type: $($_.type) # Return type: $($_.returntype) ######################################################################## function $name { $code } "@ | Out-File $OutputFilePath -Append } } } #endregion $sourcefile = Get-ChildItem $PowerPackFile if ($sourcefile -eq $null) { throw 'File not found' } @" ######################################################################## # Generated from: $PowerPackFile # by Convert-PowerPack2Ps1 script # on $(get-date) ######################################################################## "@ | Out-File $OutputFilePath $pp = [XML] (Get-Content $sourcefile) @" # Scripts generated from script nodes "@ | Out-File $OutputFilePath -Append IterateTree $pp.configuration.items.container[0] @" # Scripts generated from script links "@ | Out-File $OutputFilePath -Append $pp.configuration.items.container[1].items.container | where { $_.id -eq '481eccc0-43f8-47b8-9660-f100dff38e14' } | ForEach-Object { $_.items.item, $_.items.container | Output-Link } @" # Scripts generated from script actions "@ | Out-File $OutputFilePath -Append $pp.configuration.items.container[1].items.container | where { $_.id -eq '7826b2ed-8ae4-4ad0-bf29-1ff0a25e0ece' } | ForEach-Object { $_.items.item, $_.items.container | Output-Link }
combined_dataset/train/non-malicious/sample_28_10.ps1
sample_28_10.ps1
@{ ModuleVersion = '7.0.1' GUID = '3859ddf6-1713-4701-adf3-477aeaa06333' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Microsoft® Corporation. All rights reserved." NestedModules="Newtonsoft.Json.dll" } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDDtjxCygMR5Ds3 # XJZNp8CUYLhionvXP5xBZQAcWMBszqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIO3F # P1UTetKJ3JiiXNiyZUZ47FLRXOi42kzV42KIrUbkMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA6nwoPMeHU5X8QKD8HzvyzNbq9kbMRam0+CJf # kN/ALtmkCCFrah1ymfLcEIW8FWPdl0/s7e/rRnG+/ESfXkElMrtCGSzB/MY8xjjn # Q3mMYKb7PEUqiS5qTDCDoQxZ0MIU+FKdbO65mXtSiw3gDbkO7h+EfhnAnExC5t4F # fnrZJG04moNpIfvz7xvgUlBnSJToXtKRyuncUIamLYq6XvQgkelYhzenbpmP0PDq # ksdvLv/3y4Rxqp5xO3kNAskS6A1tUq4eqZ7u9KUh5HUGHps/D4A0HYAoWg3oatQ5 # 4gJRpel/2bOdP/obNVBeaoKtM/WsVt+JWOrQ6juupZPSS+a7EaGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDG8yW/qxcM4w/1seLi/6WkyO1W6Jr+wiWH # G9rj4wVGAgIGZiAsubpLGBMyMDI0MDQyMzAyMjQxMC43OTdaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM # wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI # syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra # GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn # iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF # LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl # BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7 # rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg # 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db # USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f # dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV # PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph # jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g # 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT # MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz # /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d # h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW # zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1 # qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h # sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q # wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06 # 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0 # bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf # SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQy # NDA0MDg0MlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIU # TDAHAgEAAgISBDAKAgUA6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AKdfQ6krn/9XKU8Iy031XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ # 0JNKwtpMkAnPoDcyylCPCELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhA # dtVx7+UUaWwr/s7KcbHaSrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA # AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgAXMgSPEGbfOG8PvR50fNmnvTPRaL/iqIDuGTa+wv # Yu8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0 # Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aq # td0QRMsB+0i74NsgRz7zMA0GCSqGSIb3DQEBCwUABIICAHPBDSuEPqmx1O0L6Qv/ # OVfSNVc8O5KtwvcgXtXC1FPWRuiZb3+SHTOseeTdxkjiZgSSZwP0u8zwdRP8bNiJ # Fz8nu0tPwDJj4OLRhNVfIG0VHTl3gOcz9PK3dpNTn6KIgw9bDaOYZnXqHOW0u4h0 # LuF+72thq0EuzLB722caGiH/48xT/E+P1pcKLY7qMIZFuGRMhRUlPi1uhyAEKjTZ # Dj1F6jX1z8Dh74cqT5SdeHPN/kjvZm2Xo6i47kXQEB+yL3QyFba4slUChh+InELz # irsyQZSySrRqevMmrcoj1i9eqxj/pE4q/oEUCS4aQHmiRpejmyU2ZLe00ZIjpf/B # 8yrAodhzSoJ18CfGosNmH2EIBnsaruVcPA5wn2pUPCSbH2BVNZ3Zz1iQYaCjahio # zp/kjWintciaciBO3lDHTkHO563HcrzdzHycCJp3hH8uE5PylNmp8HbnxbO2zoO5 # AlahtD52ThLY03fFwy+MfnFJYXlkLH3Us5oYU6yQkjwdcmV1laJL+buihLTV1aRu # To/GUWMf7DWhIpvLm5r3KCdqt40nBQ9BtUADt/um0x7evGHF6Ox6WPBfWvAzHMqo # Af0fTR4o1meSZ8xuiONXR+ZBNmP9HB8s2xDbYBJgzpzIkSUjSxN9Uu2M0vOjpMCr # PXWC8pEtKSdxPES/mbQVff5B # SIG # End signature block
combined_dataset/train/non-malicious/sample_6_2.ps1
sample_6_2.ps1
# # Module manifest for module 'OCI.PSModules.Networkloadbalancer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkloadbalancer.dll' # Version number of this module. ModuleVersion = '92.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd32e7ff0-9f4a-49d5-9f53-d22b8b4f9294' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkloadbalancer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkloadbalancer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkloadbalancer', 'Get-OCINetworkloadbalancerBackend', 'Get-OCINetworkloadbalancerBackendHealth', 'Get-OCINetworkloadbalancerBackendSet', 'Get-OCINetworkloadbalancerBackendSetHealth', 'Get-OCINetworkloadbalancerBackendSetsList', 'Get-OCINetworkloadbalancerBackendsList', 'Get-OCINetworkloadbalancerHealth', 'Get-OCINetworkloadbalancerHealthChecker', 'Get-OCINetworkloadbalancerHealthsList', 'Get-OCINetworkloadbalancerListener', 'Get-OCINetworkloadbalancerListenersList', 'Get-OCINetworkloadbalancersList', 'Get-OCINetworkloadbalancersPoliciesList', 'Get-OCINetworkloadbalancersProtocolsList', 'Get-OCINetworkloadbalancerWorkRequest', 'Get-OCINetworkloadbalancerWorkRequestErrorsList', 'Get-OCINetworkloadbalancerWorkRequestLogsList', 'Get-OCINetworkloadbalancerWorkRequestsList', 'Move-OCINetworkloadbalancerCompartment', 'New-OCINetworkloadbalancer', 'New-OCINetworkloadbalancerBackend', 'New-OCINetworkloadbalancerBackendSet', 'New-OCINetworkloadbalancerListener', 'Remove-OCINetworkloadbalancer', 'Remove-OCINetworkloadbalancerBackend', 'Remove-OCINetworkloadbalancerBackendSet', 'Remove-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancer', 'Update-OCINetworkloadbalancerBackend', 'Update-OCINetworkloadbalancerBackendSet', 'Update-OCINetworkloadbalancerHealthChecker', 'Update-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancerNetworkSecurityGroups' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkloadbalancer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_41_43.ps1
sample_41_43.ps1
# # Module manifest for module 'OCI.PSModules.Streaming' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Streaming.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ff4a80d2-3354-4a6a-a142-89663068a2ac' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Streaming Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Streaming.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIStreamingConnectHarness', 'Get-OCIStreamingConnectHarnessesList', 'Get-OCIStreamingGroup', 'Get-OCIStreamingMessages', 'Get-OCIStreamingStream', 'Get-OCIStreamingStreamPool', 'Get-OCIStreamingStreamPoolsList', 'Get-OCIStreamingStreamsList', 'Invoke-OCIStreamingConsumerCommit', 'Invoke-OCIStreamingConsumerHeartbeat', 'Move-OCIStreamingConnectHarnessCompartment', 'Move-OCIStreamingStreamCompartment', 'Move-OCIStreamingStreamPoolCompartment', 'New-OCIStreamingConnectHarness', 'New-OCIStreamingCursor', 'New-OCIStreamingGroupCursor', 'New-OCIStreamingStream', 'New-OCIStreamingStreamPool', 'Remove-OCIStreamingConnectHarness', 'Remove-OCIStreamingStream', 'Remove-OCIStreamingStreamPool', 'Update-OCIStreamingConnectHarness', 'Update-OCIStreamingGroup', 'Update-OCIStreamingStream', 'Update-OCIStreamingStreamPool', 'Write-OCIStreamingMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Streaming' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1671.ps1
1671.ps1
function Create-Shortcut { param ( [string]$Source, [string]$DestinationLnk, [string]$Arguments ) begin { $WshShell = New-Object -ComObject WScript.Shell } process { if (!$Source) {Throw 'No Source'} if (!$DestinationLnk) {Throw 'No DestinationLnk'} $Shortcut = $WshShell.CreateShortcut($DestinationLnk) $Shortcut.TargetPath = $Source if ($Arguments) { $Shortcut.Arguments = $Arguments } $Shortcut.Save() } end { function Release-Ref ($ref) { ([System.Runtime.InteropServices.Marshal]::ReleaseComObject([System.__ComObject]$ref) -gt 0) [System.GC]::Collect() [System.GC]::WaitForPendingFinalizers() } $Shortcut, $WshShell | % {$null = Release-Ref $_} } }
combined_dataset/train/non-malicious/SQLParser.ps1
SQLParser.ps1
#requires -version 2 #Uses Visual Studio Database Edition classes Microsoft.Data.Schema.ScriptDom and Microsoft.Data.Schema.Script.Sql to parse T-SQL #Chad Miller #http://chadwickmiller.spaces.live.com/ $PSScriptRoot = (Split-Path $MyInvocation.MyCommand.Path -Parent) Add-Type -Path "$PSScriptRoot\\Microsoft.Data.Schema.ScriptDom.dll" Add-Type -Path "$PSScriptRoot\\Microsoft.Data.Schema.ScriptDom.Sql.dll" $Source = @" using System; using System.Collections.Generic; using System.Linq; using System.Text; using Microsoft.Data.Schema.ScriptDom; using Microsoft.Data.Schema.ScriptDom.Sql; using System.IO; public class SQLParser { private IScriptFragment fragment; public SQLParser(SqlVersion sqlVersion, bool quotedIdentifier, string inputScript) { switch (sqlVersion) { case SqlVersion.Sql80: SQLParser80 (quotedIdentifier, inputScript); break; case SqlVersion.Sql90: SQLParser90 (quotedIdentifier, inputScript); break; case SqlVersion.Sql100: SQLParser100 (quotedIdentifier, inputScript); break; } } private void SQLParser100 (bool quotedIdentifier, string inputScript) { TSql100Parser parser = new TSql100Parser(quotedIdentifier); Parse(parser, inputScript); } private void SQLParser90 (bool quotedIdentifier, string inputScript) { TSql90Parser parser90 = new TSql90Parser(quotedIdentifier); Parse(parser90, inputScript); } private void SQLParser80 (bool quotedIdentifier, string inputScript) { TSql80Parser parser80 = new TSql80Parser(quotedIdentifier); Parse(parser80, inputScript); } private void Parse(TSql100Parser parser, string inputScript) { IList<ParseError> errors; using (StringReader sr = new StringReader(inputScript)) { fragment = parser.Parse(sr, out errors); } if (errors != null && errors.Count > 0) { StringBuilder sb = new StringBuilder(); foreach (var error in errors) { sb.AppendLine(error.Message); sb.AppendLine("offset " + error.Offset.ToString()); } throw new ArgumentException("InvalidSQLScript", sb.ToString()); } } private void Parse(TSql90Parser parser, string inputScript) { IList<ParseError> errors; using (StringReader sr = new StringReader(inputScript)) { fragment = parser.Parse(sr, out errors); } if (errors != null && errors.Count > 0) { StringBuilder sb = new StringBuilder(); foreach (var error in errors) { sb.AppendLine(error.Message); sb.AppendLine("offset " + error.Offset.ToString()); } throw new ArgumentException("InvalidSQLScript", sb.ToString()); } } private void Parse(TSql80Parser parser, string inputScript) { IList<ParseError> errors; using (StringReader sr = new StringReader(inputScript)) { fragment = parser.Parse(sr, out errors); } if (errors != null && errors.Count > 0) { StringBuilder sb = new StringBuilder(); foreach (var error in errors) { sb.AppendLine(error.Message); sb.AppendLine("offset " + error.Offset.ToString()); } throw new ArgumentException("InvalidSQLScript", sb.ToString()); } } public IScriptFragment Fragment { get { return fragment; } } } "@ $refs = @("$PSScriptRoot\\Microsoft.Data.Schema.ScriptDom.dll","$PSScriptRoot\\Microsoft.Data.Schema.ScriptDom.Sql.dll") add-type -ReferencedAssemblies $refs -TypeDefinition $Source -Language CSharpVersion3 -passThru
combined_dataset/train/non-malicious/4277.ps1
4277.ps1
function Out-Minidump { [CmdletBinding()] Param ( [Parameter(Position = 0, Mandatory = $True, ValueFromPipeline = $True)] [System.Diagnostics.Process] $Process, [Parameter(Position = 1)] [ValidateScript({ Test-Path $_ })] [String] $DumpFilePath = $PWD ) BEGIN { $WER = [PSObject].Assembly.GetType('System.Management.Automation.WindowsErrorReporting') $WERNativeMethods = $WER.GetNestedType('NativeMethods', 'NonPublic') $Flags = [Reflection.BindingFlags] 'NonPublic, Static' $MiniDumpWriteDump = $WERNativeMethods.GetMethod('MiniDumpWriteDump', $Flags) $MiniDumpWithFullMemory = [UInt32] 2 } PROCESS { $ProcessId = $Process.Id $ProcessName = $Process.Name $ProcessHandle = $Process.Handle $ProcessFileName = "$($ProcessName)_$($ProcessId).dmp" $ProcessDumpPath = Join-Path $DumpFilePath $ProcessFileName $FileStream = New-Object IO.FileStream($ProcessDumpPath, [IO.FileMode]::Create) $Result = $MiniDumpWriteDump.Invoke($null, @($ProcessHandle, $ProcessId, $FileStream.SafeFileHandle, $MiniDumpWithFullMemory, [IntPtr]::Zero, [IntPtr]::Zero, [IntPtr]::Zero)) $FileStream.Close() if (-not $Result) { $Exception = New-Object ComponentModel.Win32Exception $ExceptionMessage = "$($Exception.Message) ($($ProcessName):$($ProcessId))" Remove-Item $ProcessDumpPath -ErrorAction SilentlyContinue throw $ExceptionMessage } else { Get-ChildItem $ProcessDumpPath } } END {} }
combined_dataset/train/non-malicious/sample_60_9.ps1
sample_60_9.ps1
# # Module manifest for module 'OCI.PSModules.Objectstorage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Objectstorage.dll' # Version number of this module. ModuleVersion = '90.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2d17e379-676f-4800-9582-5814d9a8df00' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Objectstorage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Objectstorage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Copy-OCIObjectstorageObject', 'Get-OCIObjectstorageBucket', 'Get-OCIObjectstorageBucketsList', 'Get-OCIObjectstorageMultipartUploadPartsList', 'Get-OCIObjectstorageMultipartUploadsList', 'Get-OCIObjectstorageNamespace', 'Get-OCIObjectstorageNamespaceMetadata', 'Get-OCIObjectstorageObject', 'Get-OCIObjectstorageObjectLifecyclePolicy', 'Get-OCIObjectstorageObjectsList', 'Get-OCIObjectstorageObjectVersionsList', 'Get-OCIObjectstoragePreauthenticatedRequest', 'Get-OCIObjectstoragePreauthenticatedRequestsList', 'Get-OCIObjectstoragePrivateEndpoint', 'Get-OCIObjectstoragePrivateEndpointsList', 'Get-OCIObjectstorageReplicationPoliciesList', 'Get-OCIObjectstorageReplicationPolicy', 'Get-OCIObjectstorageReplicationSourcesList', 'Get-OCIObjectstorageRetentionRule', 'Get-OCIObjectstorageRetentionRulesList', 'Get-OCIObjectstorageWorkRequest', 'Get-OCIObjectstorageWorkRequestErrorsList', 'Get-OCIObjectstorageWorkRequestLogsList', 'Get-OCIObjectstorageWorkRequestsList', 'Invoke-OCIObjectstorageCommitMultipartUpload', 'Invoke-OCIObjectstorageHeadBucket', 'Invoke-OCIObjectstorageHeadObject', 'Invoke-OCIObjectstorageMakeBucketWritable', 'Invoke-OCIObjectstorageReencryptBucket', 'Invoke-OCIObjectstorageReencryptObject', 'New-OCIObjectstorageBucket', 'New-OCIObjectstorageMultipartUpload', 'New-OCIObjectstoragePreauthenticatedRequest', 'New-OCIObjectstoragePrivateEndpoint', 'New-OCIObjectstorageReplicationPolicy', 'New-OCIObjectstorageRetentionRule', 'Remove-OCIObjectstorageBucket', 'Remove-OCIObjectstorageObject', 'Remove-OCIObjectstorageObjectLifecyclePolicy', 'Remove-OCIObjectstoragePreauthenticatedRequest', 'Remove-OCIObjectstoragePrivateEndpoint', 'Remove-OCIObjectstorageReplicationPolicy', 'Remove-OCIObjectstorageRetentionRule', 'Rename-OCIObjectstorageObject', 'Restore-OCIObjectstorageObjects', 'Stop-OCIObjectstorageMultipartUpload', 'Stop-OCIObjectstorageWorkRequest', 'Update-OCIObjectstorageBucket', 'Update-OCIObjectstorageNamespaceMetadata', 'Update-OCIObjectstoragePrivateEndpoint', 'Update-OCIObjectstorageRetentionRule', 'Update-OCIObjectstorageTier', 'Write-OCIObjectstorageObject', 'Write-OCIObjectstorageObjectLifecyclePolicy', 'Write-OCIObjectstoragePart', 'Write-OCIObjectstorageuploadmanagerObject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Objectstorage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/174.ps1
174.ps1
Start-Job -Name "UpdateHelp" -ScriptBlock { Update-Help -Force } | Out-null Write-Host "Updating Help in background (Get-Help to check)" -ForegroundColor Yellow Write-host "PowerShell Version: $($psversiontable.psversion) - ExecutionPolicy: $(Get-ExecutionPolicy)" -ForegroundColor yellow Set-Location $home\onedrive\scripts\github Import-Module -Name PSReadline if(Get-Module -name PSReadline) { Set-PSReadlineKeyHandler -Key UpArrow -Function HistorySearchBackward Set-PSReadlineKeyHandler -Key DownArrow -Function HistorySearchForward } Set-Alias -Name npp -Value notepad++.exe Set-Alias -Name np -Value notepad.exe if (Test-Path $env:USERPROFILE\OneDrive){$OneDriveRoot = "$env:USERPROFILE\OneDrive"} function prompt { Write-output "PS [LazyWinAdmin.com]> " } function Get-ScriptDirectory { if ($hostinvocation -ne $null) { Split-Path $hostinvocation.MyCommand.path } else { Split-Path $script:MyInvocation.MyCommand.Path } } $MyInvocation.MyCommand $currentpath = Get-ScriptDirectory . (Join-Path -Path $currentpath -ChildPath "\functions\Show-Object.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Connect-Office365.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Test-Port.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Get-NetAccelerator.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Clx.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Test-DatePattern.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\View-Cats.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Find-Apartment.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Launch-AzurePortal.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Launch-ExchangeOnline.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Launch-InternetExplorer.ps1") . (Join-Path -Path $currentpath -ChildPath "\functions\Launch-Office365Admin.ps1") Get-Command -Module Microsoft*,Cim*,PS*,ISE | Get-Random | Get-Help -ShowWindow Get-Random -input (Get-Help about*) | Get-Help -ShowWindow
combined_dataset/train/non-malicious/3956.ps1
3956.ps1
function Check-CmdletReturnType { param($cmdletName, $cmdletReturn) $cmdletData = Get-Command $cmdletName; Assert-NotNull $cmdletData; [array]$cmdletReturnTypes = $cmdletData.OutputType.Name | Foreach-Object { return ($_ -replace "Microsoft.Azure.Commands.Network.Models.","") }; [array]$cmdletReturnTypes = $cmdletReturnTypes | Foreach-Object { return ($_ -replace "System.","") }; $realReturnType = $cmdletReturn.GetType().Name -replace "Microsoft.Azure.Commands.Network.Models.",""; return $cmdletReturnTypes -contains $realReturnType; } function Test-RouteTableCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $location = Get-ProviderLocation "Microsoft.Network/routeTables"; $RouteName = "RouteName"; $RouteAddressPrefix = "10.0.0.0/8"; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $Route = New-AzRouteConfig -Name $RouteName -AddressPrefix $RouteAddressPrefix; $vRouteTable = New-AzRouteTable -ResourceGroupName $rgname -Name $rname -Location $location -Route $Route; Assert-NotNull $vRouteTable; Assert-True { Check-CmdletReturnType "New-AzRouteTable" $vRouteTable }; Assert-NotNull $vRouteTable.Routes; Assert-True { $vRouteTable.Routes.Length -gt 0 }; Assert-AreEqual $rname $vRouteTable.Name; $vRouteTable = Get-AzRouteTable -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vRouteTable; Assert-True { Check-CmdletReturnType "Get-AzRouteTable" $vRouteTable }; Assert-AreEqual $rname $vRouteTable.Name; $listRouteTable = Get-AzRouteTable -ResourceGroupName $rgname; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -ResourceGroupName "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -Name "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $job = Remove-AzRouteTable -ResourceGroupName $rgname -Name $rname -PassThru -Force -AsJob; $job | Wait-Job; $removeRouteTable = $job | Receive-Job; Assert-AreEqual $true $removeRouteTable; Assert-ThrowsContains { Get-AzRouteTable -ResourceGroupName $rgname -Name $rname } "not found"; } finally { Clean-ResourceGroup $rgname; } } function Test-RouteTableCRUDAllParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $location = Get-ProviderLocation "Microsoft.Network/routeTables"; $Tag = @{tag1='test'}; $TagSet = @{tag2='testSet'}; $RouteName = "RouteName"; $RouteAddressPrefix = "10.0.0.0/8"; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $Route = New-AzRouteConfig -Name $RouteName -AddressPrefix $RouteAddressPrefix; $vRouteTable = New-AzRouteTable -ResourceGroupName $rgname -Name $rname -Location $location -Route $Route -Tag $Tag; Assert-NotNull $vRouteTable; Assert-True { Check-CmdletReturnType "New-AzRouteTable" $vRouteTable }; Assert-NotNull $vRouteTable.Routes; Assert-True { $vRouteTable.Routes.Length -gt 0 }; Assert-AreEqual $rname $vRouteTable.Name; Assert-AreEqualObjectProperties $Tag $vRouteTable.Tag; $vRouteTable = Get-AzRouteTable -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vRouteTable; Assert-True { Check-CmdletReturnType "Get-AzRouteTable" $vRouteTable }; Assert-AreEqual $rname $vRouteTable.Name; Assert-AreEqualObjectProperties $Tag $vRouteTable.Tag; $listRouteTable = Get-AzRouteTable -ResourceGroupName $rgname; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -ResourceGroupName "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -Name "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $vRouteTable.Tag = $TagSet; $vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable; Assert-NotNull $vRouteTable; Assert-True { Check-CmdletReturnType "Set-AzRouteTable" $vRouteTable }; Assert-AreEqual $rname $vRouteTable.Name; Assert-AreEqualObjectProperties $TagSet $vRouteTable.Tag; $vRouteTable = Get-AzRouteTable -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vRouteTable; Assert-True { Check-CmdletReturnType "Get-AzRouteTable" $vRouteTable }; Assert-AreEqual $rname $vRouteTable.Name; Assert-AreEqualObjectProperties $TagSet $vRouteTable.Tag; $listRouteTable = Get-AzRouteTable -ResourceGroupName $rgname; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -ResourceGroupName "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -Name "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteTable = Get-AzRouteTable -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $job = Remove-AzRouteTable -ResourceGroupName $rgname -Name $rname -PassThru -Force -AsJob; $job | Wait-Job; $removeRouteTable = $job | Receive-Job; Assert-AreEqual $true $removeRouteTable; Assert-ThrowsContains { Get-AzRouteTable -ResourceGroupName $rgname -Name $rname } "not found"; Assert-ThrowsContains { Set-AzRouteTable -RouteTable $vRouteTable } "not found"; } finally { Clean-ResourceGroup $rgname; } } function Test-RouteCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $rnameAdd = "${rname}Add"; $location = Get-ProviderLocation "Microsoft.Network/routeTables"; $AddressPrefix = "10.0.0.0/8"; $AddressPrefixSet = "11.0.0.0/8"; $AddressPrefixAdd = "12.0.0.0/8"; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vRoute = New-AzRouteConfig -Name $rname -AddressPrefix $AddressPrefix; Assert-NotNull $vRoute; Assert-True { Check-CmdletReturnType "New-AzRouteConfig" $vRoute }; $vRouteTable = New-AzRouteTable -ResourceGroupName $rgname -Name $rname -Route $vRoute -Location $location; Assert-NotNull $vRouteTable; Assert-AreEqual $rname $vRoute.Name; Assert-AreEqual $AddressPrefix $vRoute.AddressPrefix; $vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname; Assert-NotNull $vRoute; Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute }; Assert-AreEqual $rname $vRoute.Name; Assert-AreEqual $AddressPrefix $vRoute.AddressPrefix; $listRoute = Get-AzRouteConfig -RouteTable $vRouteTable; Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rname }); $vRouteTable = Set-AzRouteConfig -Name $rname -RouteTable $vRouteTable -AddressPrefix $AddressPrefixSet; Assert-NotNull $vRouteTable; $vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable; Assert-NotNull $vRouteTable; $vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname; Assert-NotNull $vRoute; Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute }; Assert-AreEqual $rname $vRoute.Name; Assert-AreEqual $AddressPrefixSet $vRoute.AddressPrefix; $listRoute = Get-AzRouteConfig -RouteTable $vRouteTable; Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rname }); $vRouteTable = Add-AzRouteConfig -Name $rnameAdd -RouteTable $vRouteTable -AddressPrefix $AddressPrefixAdd; Assert-NotNull $vRouteTable; $vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable; Assert-NotNull $vRouteTable; $vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rnameAdd; Assert-NotNull $vRoute; Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute }; Assert-AreEqual $rnameAdd $vRoute.Name; Assert-AreEqual $AddressPrefixAdd $vRoute.AddressPrefix; $listRoute = Get-AzRouteConfig -RouteTable $vRouteTable; Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rnameAdd }); Assert-ThrowsContains { Add-AzRouteConfig -Name $rnameAdd -RouteTable $vRouteTable -AddressPrefix $AddressPrefixAdd } "already exists"; $vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rnameAdd; $vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rname; $vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rname; $vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable; Assert-NotNull $vRouteTable; Assert-ThrowsContains { Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname } "Sequence contains no matching element"; Assert-ThrowsContains { Set-AzRouteConfig -Name $rname -RouteTable $vRouteTable -AddressPrefix $AddressPrefixSet } "does not exist"; } finally { Clean-ResourceGroup $rgname; } } function Test-RouteCRUDAllParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $rnameAdd = "${rname}Add"; $location = Get-ProviderLocation "Microsoft.Network/routeTables"; $AddressPrefix = "10.0.0.0/8"; $NextHopType = "VirtualNetworkGateway"; $AddressPrefixSet = "11.0.0.0/8"; $NextHopTypeSet = "VnetLocal"; $AddressPrefixAdd = "12.0.0.0/8"; $NextHopTypeAdd = "VnetLocal"; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vRoute = New-AzRouteConfig -Name $rname -AddressPrefix $AddressPrefix -NextHopType $NextHopType; Assert-NotNull $vRoute; Assert-True { Check-CmdletReturnType "New-AzRouteConfig" $vRoute }; $vRouteTable = New-AzRouteTable -ResourceGroupName $rgname -Name $rname -Route $vRoute -Location $location; Assert-NotNull $vRouteTable; Assert-AreEqual $rname $vRoute.Name; Assert-AreEqual $AddressPrefix $vRoute.AddressPrefix; Assert-AreEqual $NextHopType $vRoute.NextHopType; $vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname; Assert-NotNull $vRoute; Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute }; Assert-AreEqual $rname $vRoute.Name; Assert-AreEqual $AddressPrefix $vRoute.AddressPrefix; Assert-AreEqual $NextHopType $vRoute.NextHopType; $listRoute = Get-AzRouteConfig -RouteTable $vRouteTable; Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rname }); $vRouteTable = Set-AzRouteConfig -Name $rname -RouteTable $vRouteTable -AddressPrefix $AddressPrefixSet -NextHopType $NextHopTypeSet; Assert-NotNull $vRouteTable; $vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable; Assert-NotNull $vRouteTable; $vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname; Assert-NotNull $vRoute; Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute }; Assert-AreEqual $rname $vRoute.Name; Assert-AreEqual $AddressPrefixSet $vRoute.AddressPrefix; Assert-AreEqual $NextHopTypeSet $vRoute.NextHopType; $listRoute = Get-AzRouteConfig -RouteTable $vRouteTable; Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rname }); $vRouteTable = Add-AzRouteConfig -Name $rnameAdd -RouteTable $vRouteTable -AddressPrefix $AddressPrefixAdd -NextHopType $NextHopTypeAdd; Assert-NotNull $vRouteTable; $vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable; Assert-NotNull $vRouteTable; $vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rnameAdd; Assert-NotNull $vRoute; Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute }; Assert-AreEqual $rnameAdd $vRoute.Name; Assert-AreEqual $AddressPrefixAdd $vRoute.AddressPrefix; Assert-AreEqual $NextHopTypeAdd $vRoute.NextHopType; $listRoute = Get-AzRouteConfig -RouteTable $vRouteTable; Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rnameAdd }); Assert-ThrowsContains { Add-AzRouteConfig -Name $rnameAdd -RouteTable $vRouteTable -AddressPrefix $AddressPrefixAdd -NextHopType $NextHopTypeAdd } "already exists"; $vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rnameAdd; $vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rname; $vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rname; $vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable; Assert-NotNull $vRouteTable; Assert-ThrowsContains { Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname } "Sequence contains no matching element"; Assert-ThrowsContains { Set-AzRouteConfig -Name $rname -RouteTable $vRouteTable -AddressPrefix $AddressPrefixSet -NextHopType $NextHopTypeSet } "does not exist"; } finally { Clean-ResourceGroup $rgname; } }
combined_dataset/train/non-malicious/1904.ps1
1904.ps1
Describe "Debug-Runspace" -tag "CI" { BeforeAll { $rs1 = [runspacefactory]::CreateRunspace() $rs1.Open() $rs1.Name = "MyRunspace1" $rs2 = [runspacefactory]::CreateRunspace() $rs2.Open() $rs2.Name = "MyRunspace2" } AfterAll { if ( $rs1 ) { $rs1.Dispose() } if ( $rs2 ) { $rs2.Dispose() } } It "Debugging a runspace should fail if the name is ambiguous" { { Debug-Runspace -Name "My*" -ErrorAction stop } | Should -Throw -ErrorId "DebugRunspaceTooManyRunspaceFound,Microsoft.PowerShell.Commands.DebugRunspaceCommand" } It "Debugging a runspace should fail if the name is not found" { { Debug-Runspace -Name "dflkjsdkfjldkjssldfj" -ErrorAction stop } | Should -Throw -ErrorId "DebugRunspaceNoRunspaceFound,Microsoft.PowerShell.Commands.DebugRunspaceCommand" } It "Debugging a runspace should fail if the runspace is not open" { $rs2.Close() { Debug-Runspace -runspace $rs2 -ErrorAction stop } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.DebugRunspaceCommand" } It "Debugging a runspace should fail if the runspace has no debugger" { $rs1.Debugger.SetDebugMode("None") { Debug-Runspace -runspace $rs1 -ErrorAction stop } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.DebugRunspaceCommand" } }
combined_dataset/train/non-malicious/sample_55_93.ps1
sample_55_93.ps1
# # Module manifest for module 'OCI.PSModules.Cloudguard' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '416303ec-c9d6-4a65-8413-14973e520be8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudguard Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudguardCompartment', 'Get-OCICloudguardAdhocQueriesList', 'Get-OCICloudguardAdhocQuery', 'Get-OCICloudguardAdhocQueryResultContent', 'Get-OCICloudguardAdhocQueryResultsList', 'Get-OCICloudguardConditionMetadataType', 'Get-OCICloudguardConditionMetadataTypesList', 'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule', 'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource', 'Get-OCICloudguardDataSourceEventsList', 'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector', 'Get-OCICloudguardDetectorRecipe', 'Get-OCICloudguardDetectorRecipeDetectorRule', 'Get-OCICloudguardDetectorRecipeDetectorRulesList', 'Get-OCICloudguardDetectorRecipesList', 'Get-OCICloudguardDetectorRule', 'Get-OCICloudguardDetectorRulesList', 'Get-OCICloudguardDetectorsList', 'Get-OCICloudguardImpactedResourcesList', 'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList', 'Get-OCICloudguardManagedListTypesList', 'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem', 'Get-OCICloudguardProblemEndpointsList', 'Get-OCICloudguardProblemEntitiesList', 'Get-OCICloudguardProblemHistoriesList', 'Get-OCICloudguardProblemsList', 'Get-OCICloudguardRecommendationsList', 'Get-OCICloudguardResource', 'Get-OCICloudguardResourcePortsList', 'Get-OCICloudguardResourceProfile', 'Get-OCICloudguardResourceProfileEndpointsList', 'Get-OCICloudguardResourceProfileImpactedResourcesList', 'Get-OCICloudguardResourceProfilesList', 'Get-OCICloudguardResourcesList', 'Get-OCICloudguardResourceTypesList', 'Get-OCICloudguardResourceVulnerabilitiesList', 'Get-OCICloudguardResourceVulnerability', 'Get-OCICloudguardResponderActivitiesList', 'Get-OCICloudguardResponderExecution', 'Get-OCICloudguardResponderExecutionsList', 'Get-OCICloudguardResponderRecipe', 'Get-OCICloudguardResponderRecipeResponderRule', 'Get-OCICloudguardResponderRecipeResponderRulesList', 'Get-OCICloudguardResponderRecipesList', 'Get-OCICloudguardResponderRule', 'Get-OCICloudguardResponderRulesList', 'Get-OCICloudguardSavedQueriesList', 'Get-OCICloudguardSavedQuery', 'Get-OCICloudguardSecurityPoliciesList', 'Get-OCICloudguardSecurityPolicy', 'Get-OCICloudguardSecurityRecipe', 'Get-OCICloudguardSecurityRecipesList', 'Get-OCICloudguardSecurityZone', 'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting', 'Get-OCICloudguardSightingEndpointsList', 'Get-OCICloudguardSightingImpactedResourcesList', 'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList', 'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe', 'Get-OCICloudguardTargetDetectorRecipeDetectorRule', 'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList', 'Get-OCICloudguardTargetDetectorRecipesList', 'Get-OCICloudguardTargetResponderRecipe', 'Get-OCICloudguardTargetResponderRecipeResponderRule', 'Get-OCICloudguardTargetResponderRecipeResponderRulesList', 'Get-OCICloudguardTargetResponderRecipesList', 'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList', 'Get-OCICloudguardWlpAgent', 'Get-OCICloudguardWlpAgentsList', 'Get-OCICloudguardWorkRequest', 'Get-OCICloudguardWorkRequestErrorsList', 'Get-OCICloudguardWorkRequestLogsList', 'Get-OCICloudguardWorkRequestsList', 'Invoke-OCICloudguardExecuteResponderExecution', 'Invoke-OCICloudguardRequestRiskScores', 'Invoke-OCICloudguardRequestSecurityScores', 'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend', 'Invoke-OCICloudguardRequestSummarizedActivityProblems', 'Invoke-OCICloudguardRequestSummarizedProblems', 'Invoke-OCICloudguardRequestSummarizedResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedRiskScores', 'Invoke-OCICloudguardRequestSummarizedSecurityScores', 'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendProblems', 'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores', 'Invoke-OCICloudguardSkipBulkResponderExecution', 'Invoke-OCICloudguardSkipResponderExecution', 'Invoke-OCICloudguardTriggerResponder', 'Move-OCICloudguardDataSourceCompartment', 'Move-OCICloudguardDetectorRecipeCompartment', 'Move-OCICloudguardManagedListCompartment', 'Move-OCICloudguardResponderRecipeCompartment', 'Move-OCICloudguardSavedQueryCompartment', 'Move-OCICloudguardSecurityRecipeCompartment', 'Move-OCICloudguardSecurityZoneCompartment', 'New-OCICloudguardAdhocQuery', 'New-OCICloudguardDataMaskRule', 'New-OCICloudguardDataSource', 'New-OCICloudguardDetectorRecipe', 'New-OCICloudguardDetectorRecipeDetectorRule', 'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe', 'New-OCICloudguardSavedQuery', 'New-OCICloudguardSecurityRecipe', 'New-OCICloudguardSecurityZone', 'New-OCICloudguardTarget', 'New-OCICloudguardTargetDetectorRecipe', 'New-OCICloudguardTargetResponderRecipe', 'New-OCICloudguardWlpAgent', 'Remove-OCICloudguardAdhocQuery', 'Remove-OCICloudguardCompartment', 'Remove-OCICloudguardDataMaskRule', 'Remove-OCICloudguardDataSource', 'Remove-OCICloudguardDetectorRecipe', 'Remove-OCICloudguardDetectorRecipeDetectorRule', 'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource', 'Remove-OCICloudguardManagedList', 'Remove-OCICloudguardResponderRecipe', 'Remove-OCICloudguardSavedQuery', 'Remove-OCICloudguardSecurityRecipe', 'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget', 'Remove-OCICloudguardTargetDetectorRecipe', 'Remove-OCICloudguardTargetResponderRecipe', 'Remove-OCICloudguardWlpAgent', 'Stop-OCICloudguardWorkRequest', 'Update-OCICloudguardBulkProblemStatus', 'Update-OCICloudguardConfiguration', 'Update-OCICloudguardDataMaskRule', 'Update-OCICloudguardDataSource', 'Update-OCICloudguardDetectorRecipe', 'Update-OCICloudguardDetectorRecipeDetectorRule', 'Update-OCICloudguardManagedList', 'Update-OCICloudguardProblemStatus', 'Update-OCICloudguardResponderRecipe', 'Update-OCICloudguardResponderRecipeResponderRule', 'Update-OCICloudguardSavedQuery', 'Update-OCICloudguardSecurityRecipe', 'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget', 'Update-OCICloudguardTargetDetectorRecipe', 'Update-OCICloudguardTargetDetectorRecipeDetectorRule', 'Update-OCICloudguardTargetResponderRecipe', 'Update-OCICloudguardTargetResponderRecipeResponderRule', 'Update-OCICloudguardWlpAgent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/01fef1f2-03fd-4b4d-bed8-aa3c4999fedc.ps1
01fef1f2-03fd-4b4d-bed8-aa3c4999fedc.ps1
Connect-VIServer <vCenter server> # Uncomment the next line to test this script # $WhatIfPreference = $true if (-not (Get-PSSnapin VMware.VimAutomation.Core -ErrorAction SilentlyContinue)) { Add-PSSnapin VMware.VimAutomation.Core } if (-not (Get-PSSnapin Quest.ActiveRoles.ADManagement -ErrorAction SilentlyContinue)) { Add-PSSnapin Quest.ActiveRoles.ADManagement } $VMs = Get-Cluster -Name <Cluster name> | Get-VM | Sort Name $VM = $VMs | Select -First 1 If (-not $vm.CustomFields.ContainsKey("CreatedBy")) { Write-Host "Creating CreatedBy Custom field for all VM's" New-CustomAttribute -TargetType VirtualMachine -Name CreatedBy | Out-Null } If (-not $vm.CustomFields.ContainsKey("CreatedOn")) { Write-Host "Creating CreatedOn Custom field for all VM's" New-CustomAttribute -TargetType VirtualMachine -Name CreatedOn | Out-Null } Foreach ($VM in $VMs){ If ($vm.CustomFields["CreatedBy"] -eq $null -or $vm.CustomFields["CreatedBy"] -eq ""){ Write-Host "Finding creator for $vm" $Event = $VM | Get-VIEvent -Types Info | Where { $_.Gettype().Name -eq "VmBeingDeployedEvent" -or $_.Gettype().Name -eq "VmCreatedEvent" -or $_.Gettype().Name -eq "VmRegisteredEvent" -or $_.Gettype().Name -eq "VmClonedEvent"} If (($Event | Measure-Object).Count -eq 0){ $User = "Unknown" $Created = "Unknown" } Else { If ($Event.Username -eq "" -or $Event.Username -eq $null) { $User = "Unknown" } Else { $User = (Get-QADUser -Identity $Event.Username).DisplayName if ($User -eq $null -or $User -eq ""){ $User = $Event.Username } $Created = $Event.CreatedTime } } Write "Adding info to $($VM.Name)" Write-Host -ForegroundColor Yellow "CreatedBy $User" $VM | Set-Annotation -CustomAttribute "CreatedBy" -Value $User | Out-Null Write-Host -ForegroundColor Yellow "CreatedOn $Created" $VM | Set-Annotation -CustomAttribute "CreatedOn" -Value $Created | Out-Null } }
combined_dataset/train/non-malicious/sample_10_87.ps1
sample_10_87.ps1
#************************************************ # TS_4KDriveInfo.ps1 # Version 1.0.2 # Date: 03-21-2011 # Author: Andre Teixeira - andret@microsoft.com # Description: This script detects 4KB/ 512e drive informaiton #************************************************ # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } [string]$typeDefinition = @" using System; using System.Runtime.InteropServices; using Microsoft.Win32.SafeHandles; using System.ComponentModel; namespace Microsoft.DeviceIoControl { internal static class NativeMethods { [DllImport("kernel32.dll", EntryPoint = "CreateFileW", SetLastError = true, CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)] internal static extern IntPtr CreateFile(string fileName, int desiredAccess, int sharedMode, IntPtr securityAttributes, int creationDisposition, int flagsandAttributes, IntPtr templatFile); [DllImport("kernel32.dll", ExactSpelling = true, EntryPoint = "DeviceIoControl", CallingConvention = CallingConvention.StdCall, SetLastError = true)] internal static extern bool DeviceIoControl(IntPtr device, int ioControlCode, IntPtr inBuffer, int inBufferSize, IntPtr outBuffer, int outputBufferSize, out int bytesReturned, IntPtr ignore); internal static readonly IntPtr INVALID_HANDLE_VALUE = (IntPtr)(-1); [DllImport("kernel32.dll")] internal static extern void ZeroMemory(IntPtr destination, int size); } public class SectorSize { [StructLayout(LayoutKind.Sequential)] public struct STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR { public int Version; public int Size; public int BytesPerCacheLine; public int BytesOffsetForCacheAlignment; public int BytesPerLogicalSector; public int BytesPerPhysicalSector; public int BytesOffsetForSectorAlignment; } public enum STORAGE_PROPERTY_ID { StorageDeviceProperty = 0, StorageAdapterProperty, StorageDeviceIdProperty, StorageDeviceUniqueIdProperty, // See storduid.h for details StorageDeviceWriteCacheProperty, StorageMiniportProperty, StorageAccessAlignmentProperty = 6, StorageDeviceSeekPenaltyProperty, StorageDeviceTrimProperty, StorageDeviceWriteAggregationProperty } public enum STORAGE_QUERY_TYPE { PropertyStandardQuery = 0, PropertyExistsQuery, PropertyMaskQuery, PropertyQueryMaxDefined } [StructLayout(LayoutKind.Sequential)] public struct STORAGE_PROPERTY_QUERY { public STORAGE_PROPERTY_ID PropertyId; public STORAGE_QUERY_TYPE QueryType; public IntPtr AdditionalParameters; } private const int GENERIC_READ = -2147483648; private const int FILE_SHARE_READ = 0x00000001; private const int FILE_SHARE_WRITE = 0x00000002; private const int OPEN_EXISTING = 3; private const int FILE_ATTRIBUTE_NORMAL = 0x00000080; private const int FSCTL_IS_VOLUME_DIRTY = 589944; private const int VOLUME_IS_DIRTY = 1; private const int PropertyStandardQuery = 0; private const int StorageAccessAlignmentProperty = 6; public static STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR DetectSectorSize(string devName) { string FileName = @"\\.\" + devName; int bytesReturned; IntPtr outputBuffer = IntPtr.Zero; STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR pAlignmentDescriptor = new STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR(); SectorSize.STORAGE_PROPERTY_QUERY StoragePropertQuery = new SectorSize.STORAGE_PROPERTY_QUERY(); StoragePropertQuery.QueryType = SectorSize.STORAGE_QUERY_TYPE.PropertyStandardQuery; StoragePropertQuery.PropertyId = SectorSize.STORAGE_PROPERTY_ID.StorageAccessAlignmentProperty; IntPtr hVolume = NativeMethods.CreateFile(FileName, 0, 0, IntPtr.Zero, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, IntPtr.Zero); if (hVolume != NativeMethods.INVALID_HANDLE_VALUE) { outputBuffer = Marshal.AllocHGlobal(Marshal.SizeOf(pAlignmentDescriptor)); NativeMethods.ZeroMemory(outputBuffer, Marshal.SizeOf(pAlignmentDescriptor)); IntPtr outputBufferStoragePropertQuery = Marshal.AllocHGlobal(Marshal.SizeOf(StoragePropertQuery)); Marshal.StructureToPtr(StoragePropertQuery, outputBufferStoragePropertQuery,false); int IOCTL_STORAGE_QUERY_PROPERTY = 2954240; bool status = NativeMethods.DeviceIoControl(hVolume, IOCTL_STORAGE_QUERY_PROPERTY, outputBufferStoragePropertQuery, Marshal.SizeOf(StoragePropertQuery), outputBuffer, Marshal.SizeOf(pAlignmentDescriptor), out bytesReturned, IntPtr.Zero); if (!status) { throw new Win32Exception(Marshal.GetLastWin32Error()); } pAlignmentDescriptor = (STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR) Marshal.PtrToStructure(outputBuffer, typeof(STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR)); } return pAlignmentDescriptor; } } } "@ function FormatBytes{ param ($bytes,$precision='0') foreach ($i in ("Bytes","KB","MB","GB","TB")) { if (($bytes -lt 1000) -or ($i -eq "TB")){ $bytes = ($bytes).tostring("F0" + "$precision") return $bytes + " $i" }else{ $bytes /= 1KB } } } Function CheckMinimalFileVersionWithCTS([string] $Binary, $RequiredMajor, $RequiredMinor, $RequiredBuild, $RequiredFileBuild){ $newProductVersion = Get-FileVersionString($Binary) if((CheckMinimalFileVersion -Binar $Binary -RequiredMajor $RequiredMajor -RequiredMinor $RequiredMinor -RequiredBuild $RequiredBuild -RequiredFileBuild $RequiredFileBuild -LDRGDR) -eq $true){ "[CheckMinimalFileVersion] $Binary version is " + $newProductVersion + " - OK" | WriteTo-StdOut -ShortFormat return $true }else{ "[CheckMinimalFileVersion] $Binary version is " + $newProductVersion | WriteTo-StdOut -ShortFormat add-member -inputobject $KB982018Binaries_Summary -membertype noteproperty -name $Binary -value $newProductVersion return $false } } Function KB982018IsInstalled(){ if ($OSVersion.Build -le 7601){ #Win7 Service Pack 1 or RTM #Pre-Win7 SP1 - Need to check if KB 982018 is actually installed $System32Folder = $Env:windir + "\system32" if (((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Amdsata.sys" 1 1 2 5) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Amdxata.sys" 1 1 2 5) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Nvraid.sys" 10 6 0 18) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Nvstor.sys" 10 6 0 18) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Ntfs.sys" 6 1 7600 16778) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Ntfs.sys" 6 1 7600 20921) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Ntfs.sys" 6 1 7601 17577) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Ntfs.sys" 6 1 7601 21680) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Usbstor.sys" 6 1 7600 16778) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Usbstor.sys" 6 1 7600 20921) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Usbstor.sys" 6 1 7601 17577) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Usbstor.sys" 6 1 7601 21680) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Storport.sys" 6 1 7601 17577) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Storport.sys" 6 1 7601 21680) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Storport.sys" 6 1 7600 16778) -eq $true) -and ((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Storport.sys" 6 1 7600 20921) -eq $true) ) { #Everything is fine return $true }else{ return $false } }else{ #SP1 is already installed return $true } } $512eDrivesXML = Join-Path -Path $PWD.Path -ChildPath "512eDrives.xml" # Windows 8 fully support 4KB drives: http://blogs.msdn.com/b/b8/archive/2011/11/29/enabling-large-disks-and-large-sectors-in-windows-8.aspx if (($OSVersion.Build -gt 7000) -and ($OSVersion.Build -lt 9000)){ Import-LocalizedData -BindingVariable AdvDrivesString $4KBDriveE = @() $4KBDriveN = @() if (Test-Path $512eDrivesXML){ $512eDrivesXML | Remove-Item -Force -ErrorAction Continue } Write-DiagProgress -Activity $AdvDrivesString.ID_CheckingDriveSize $StorageType = Add-Type -TypeDefinition $typeDefinition -PassThru $AlignmentDescriptor = $StorageType::STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR #$AlignmentDescriptor = $StorageType[1]::DetectSectorSize("C:") #$devices = (Get-CimInstance -query "Select DeviceID from Win32_LogicalDisk WHERE ((MediaType=12) or (MediaType=11)) and ((DriveType=3) or (DriveType=2))") $devices = (Get-CimInstance -query "Select DeviceID, Model, InterfaceType, Size, BytesPerSector, MediaType from Win32_DiskDrive where ConfigManagerErrorCode=0 and MediaLoaded = true and SectorsPerTrack > 0") if($null -ne $devices){ $4KDriveDetected = $false $SectorSize_Summary = new-object PSObject $4KDrive_Summary = new-object PSObject $KB982018Binaries_Summary = new-object PSObject $4KNativeDetected = $false foreach($device in $devices){ trap [Exception]{ $errorMessage = $_.Exception.Message " Error: " + $errorMessage | WriteTo-StdOut $_.InvocationInfo | Format-List | out-string | WriteTo-StdOut WriteTo-ErrorDebugReport -ErrorRecord $_ -InvokeInfo $MyInvocation $Error.Clear() continue } Write-DiagProgress -Activity $AdvDrivesString.ID_CheckingDriveSize -Status ($AdvDrivesString.ID_4KDriveDetectedDesc -replace ("%Drive%", $device.DeviceID)) $Interface = Get-CimInstance -Query ("ASSOCIATORS OF {Win32_DiskDrive.DeviceID='" + $device.DeviceID + "'} Where ResultClass=Win32_PnPEntity") | ForEach-Object {Get-CimInstance -Query ("ASSOCIATORS OF {Win32_PnPEntity.DeviceID='" + $_.DeviceID + "'} Where ResultClass=CIM_Controller")} $Partitions = Get-CimInstance -Query ("ASSOCIATORS OF {Win32_DiskDrive.DeviceID='" + $device.DeviceID + "'} Where ResultClass=Win32_DiskPartition") $DriveLetters = @() foreach ($Partition in $Partitions){ $Win32Logical = Get-CimInstance -Query ("ASSOCIATORS OF {Win32_DiskPartition.DeviceID='" + $Partition.DeviceID + "'} Where ResultClass=Win32_LogicalDisk") if ($null -ne $Win32Logical){ $DriveLetters += $Win32Logical.DeviceID } } if ($DriveLetters.Length -gt 0){ $DriveLetterString = "[" + [string]::Join(", ", $DriveLetters) + "]" $DriveLetters | Export-Clixml -Path $512eDrivesXML }else{ $DriveLetterString = "" } $BytesDisplay = "" $4KDriveType = "" "Checking drive: " + $device.DeviceID | WriteTo-StdOut -ShortFormat "Storage Type: " + $StorageType[1].ToString() | WriteTo-StdOut -ShortFormat $AlignmentDescriptor = $StorageType[1]::DetectSectorSize($device.DeviceID) if ($null -ne $AlignmentDescriptor){ $BytesDisplay = ($AlignmentDescriptor.BytesPerPhysicalSector.ToString()) + " Bytes" }else{ $BytesDisplay = "(Unknown)" } $DebugString = " Results for drive " + $device.DeviceID $DebugString += "`r`n Drive Letter(s) : " + $DriveLetterString $DebugString += "`r`n Model : " + $device.Model $DebugString += "`r`n Interface Name : " + $Interface.Name $DebugString += "`r`n Interface Type : " + $device.InterfaceType $DebugString += "`r`n Bytes per sector (WMI): " + $device.BytesPerSector $DebugString += "`r`n BytesPerPhysicalSector: " + $AlignmentDescriptor.BytesPerPhysicalSector $DebugString += "`r`n BytesPerLogicalSector : " + $AlignmentDescriptor.BytesPerLogicalSector $DebugString += "`r`n Version : " + $AlignmentDescriptor.Version $DebugString | WriteTo-StdOut if (($AlignmentDescriptor.BytesPerPhysicalSector -gt 512) -or ($device.BytesPerSector -ne 512)){ trap [Exception]{ $errorMessage = $_.Exception.Message " Error: " + $errorMessage | WriteTo-StdOut $_.InvocationInfo | Format-List | out-string | WriteTo-StdOut WriteTo-ErrorDebugReport -ErrorRecord $_ -InvokeInfo $MyInvocation $Error.Clear() continue } #4K Drive $4KDriveDetected = $true $InformationCollected = @{"Drive Model"=$device.Model} $InformationCollected += @{"Device ID"=$device.DeviceID} $InformationCollected += @{"Drive Letter(s)"=$DriveLetterString} $InformationCollected += @{"Drive Size"=($device.Size | FormatBytes -precision 2)} $InformationCollected += @{"Media Type"=$device.MediaType} $InformationCollected += @{"Drive Type"=$device.InterfaceType} $InformationCollected += @{"Interface Name"=$Interface.Name} $InformationCollected += @{"Bytes per sector (Physical)"=$AlignmentDescriptor.BytesPerPhysicalSector} $InformationCollected += @{"Bytes per sector (Logical)"=$AlignmentDescriptor.BytesPerLogicalSector} $InformationCollected += @{"Bytes per sector (WMI)"=$device.BytesPerSector} if (($AlignmentDescriptor.BytesPerPhysicalSector -eq 3072) -or ($device.BytesPerSector -eq 4096)){ # known issue $BytesDisplay = "Physical: 4KB" }else{ $BytesDisplay = "Physical: " + ($AlignmentDescriptor.BytesPerPhysicalSector.ToString()) } if (($AlignmentDescriptor.BytesPerLogicalSector -eq 512) -and ($device.BytesPerSector -eq 512)){ $512EDriveDetected = $true $4KDriveType = " - Logical: " + $AlignmentDescriptor.BytesPerLogicalSector + " bytes<br/><b>[512e Drive]</b>" $4KBDriveE += $device.DeviceID } elseif ($device.BytesPerSector -eq 4096){ $4KNativeDetected = $true if ($AlignmentDescriptor.BytesPerPhysicalSector -eq 4096){ $4KDriveType = "Physical: " + ($AlignmentDescriptor.BytesPerPhysicalSector.ToString()) + "<b><font color=`"red`">[4KB Native]</font></b>" }else{ $4KDriveType = "<b><font color=`"red`">[4KB Native]</font></b>" } }else{ $4KNativeDetected = $true $4KDriveType = " - Logical: " + $AlignmentDescriptor.BytesPerLogicalSector + " bytes<br/><b><font color=`"red`">[4KB Native]</font></b>" $4KBDriveN += $device.DeviceID } } add-member -inputobject $SectorSize_Summary -membertype noteproperty -name ($device.DeviceID + " " + $DriveLetterString) -value ($BytesDisplay + $4KDriveType) if ($512EDriveDetected){ Write-GenericMessage -RootCauseID "RC_4KDriveDetected" -PublicContentURL "http://support.microsoft.com/kb/2510009" -Verbosity "Informational" -InformationCollected $InformationCollected -Visibility 4 -MessageVersion 4 -SupportTopicsID 8122 $512EDriveDetected = $false $RC_4KDriveDetected = $true } if ($4KNativeDetected){ Write-GenericMessage -RootCauseID "RC_4KNativeDriveDetected" -PublicContentURL "http://support.microsoft.com/kb/2510009" -Verbosity "Error" -InformationCollected $InformationCollected -MessageVersion 3 -Visibility 4 -MessageVersion 4 -SupportTopicsID 8122 $RC_4KNativeDriveDetected = $true $4KNativeDetected = $false } } $SectorSize_Summary | ConvertTo-Xml2 | update-diagreport -id 99_SectorSizeSummary -name "Drive Sector Size Information" -verbosity informational if ($RC_4KDriveDetected){ Update-DiagRootCause -id "RC_4KDriveDetected" -Detected $true if (-not (KB982018IsInstalled)){ $XMLFileName = "..\KB982018.XML" ($KB982018Binaries_Summary | ConvertTo-Xml2).Save($XMLFileName) Update-DiagRootCause -id "RC_KB982018IsNotInstalled" -Detected $true Write-GenericMessage -RootCauseID "RC_KB982018IsNotInstalled" -PublicContentURL "http://support.microsoft.com/kb/982018" -Verbosity "Error" -MessageVersion 3 -Visibility 4 -MessageVersion 3 -SupportTopicsID 8122 }else{ Update-DiagRootCause -Id "RC_KB982018IsNotInstalled" -Detected $false } }else{ Update-DiagRootCause -Id "RC_4KDriveDetected" -Detected $false } if ($RC_4KNativeDriveDetected){ Update-DiagRootCause -id "RC_4KNativeDriveDetected" -Detected $true Write-GenericMessage -RootCauseID "RC_4KNativeDriveDetected" -Verbosity "Error" -PublicContentURL "http://support.microsoft.com/kb/2510009" -Visibility 4 -MessageVersion 3 -SupportTopicsID 8122 }else{ Update-DiagRootCause -Id "RC_4KNativeDriveDetected" -Detected $false } } } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAni0HuFySzTagv # U6b1S+1L94JuKIWEDBmObErBpZGpMaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII7p8YyZx9TIdaLntt68JTmP # P88VROQNjQiSF5g8NOBZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAqmffHt4erzG336P89JU62dyzpDb7sHnXgch7ao3BHFn2O0NNSHgq1nLa # 10qKmETkma+s8sZ41/I2hyEpGQV4+9eZoK7NXEq26SZq1SMPASIkKtlWevxs22we # cmfT3K/cezVfRgoUloP4/oFHa2F3kHFo7aX7GA3tBWC9kwRQKnmZN+rPeQoqbpME # uza7LgLbCP2qNT1cjdhz5eQrf8FPfMrsu1GdQ8mp8tPosm5JkxvlvoFg1nJaiQbD # V5nu0MJo4UEce9gOVLwjhkXjYjFveRcQCq5x0TpYENw87QsL4121nHjlbGkOYjLr # 0G/mpp6nQm9WXFDqckSo4azKtBtH3qGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBHvI5Cgkf1pUmigW2Gu1CzL3X7nFdx/zklW5NVQdbyGQIGZv8ZfhGW # GBMyMDI0MTAyODExNDA0MC4wMzJaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMvJmpUXSLBAAEAAAH2MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZCMDUt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0UJeLMR/N9WPBZhuKVFF # +eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5AjaVh19ZVjDChHzimxsoaXx # Nu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7VONShujl1NCMkcgSrPdmd # /8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzmkWJD0N+60IiogFBzg3yI # SsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK/nV/aXjuo9LMrrRmn44o # YYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2VmbNWCjQWq5G4YkrcqbPMa # x7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL0hjxg44kpQn384V46o+z # dQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6wGOrPfzIm0FdOn+xFo48E # Rl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBcEFTOvS9E0diNu1eocw+Z # Ckz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25gD8tO9zJg6g6fRpaZc43 # 9mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2HWfMoqqd9uiQ0hTUEhG4 # 4FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRIwZsJuOcJ # fScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA13kBirH1cHu1 # WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTYxaPfp2IVFdgjaMaBi81w # B8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuwgdIdQvqE0h8VQ5QW5sDV # 4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB71a7dB9zgHOkW0hgUEeWO # 9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NTEU/4vlvsRIMWT0jsnNI7 # 1jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3hOLblC1vxM3+wMyOh97aF # Os7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDkC9AxXYB3yEtuwMs7pRWL # yxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWiCVslJbFIIB/4Alv+jQJS # KAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEPcEzG1dO9zIa1Mp32J+zz # W3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJm41ErdiTjAmdClen9yl6 # HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFBtQNEzcCdh1GYw/6nzzNN # t+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a06JFIuGFHIj/I+36ggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0MTAyOTEwMTYxNVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEAAgIV+jAHAgEAAgISoDAK # AgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBpUFU4+vZJFyUm # Vb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGXevIycaqI5McGg28UnXlT # 85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQuxkh2lsfu3f8RO+rHyvy # oc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMIGgIOURNjC5+mH+r4R0gk # grO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnExw84j1PW/7aPVhavzoHfT # 0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6jvcBxO0h6Uf9FkqnHwg7B # sMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgYPTSCsD9E7OU # lBTBL5TsY3eeAEDQM+Kk0vua1AWulIUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+LlQjG2ojCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLBAAEAAAH2 # MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhIwwAlMA0GCSqGSIb3DQEB # CwUABIICACndgsc7NqnXf65ZdJxRxeX2isPj9+tR6L80D3b34cuVZIGQRVNyS5Qf # pRR9zJWEdmuNuH+3Natn72wF2Cz7HB2L0fbF5VledpkNBxs8rvi86OQmWnD3HhCn # HjUIRyQXBSEgTCaN1bSks0EjeCNokencIh+c7JtmsjA3uolA1r4pSMPWvlx7A7K4 # ewt+Ys5/l+lDa6NhKjaW1LFpwVLT3Wy+zgiqsmUnOjo2HNP1YCTq2YKOSX95WkqY # odyiWiZTqgIhiTX7ZZ9Ksab1Q6laNWafwY7o8A+NgLlDZILtgFUgWkBUxX3xgdFh # P2VbCLoTG+Cm/+i95yfcPIy+HLNdAqJjmXiYYNRN251awuBFea5TR56B7DgiO3v0 # aDY9P4hDwNJ0PKrRyq3TgNEeHkTfDUHzwhOq78jzeeWv9XB+DEvAZGTzmur31jEe # HqSCm7aAG1KTwR6bcX2S4J+DtvXGNRGW+g6tpNpikjP0Y5lh9XvqiNR7OBungnyj # Fypl26eF9e3hMZYvgLPli9YGPJcQt7RG+WinIPBw0sl77syYJEG32j+Z2Ex0iOoR # wMcEts2B+ZlK6D7GaOp3K7mgOD3lI7qzUTjJu0OmZMPmkrljKQweti26EBuaUqLR # Twkc7ZbfN8Ti0waq9cNo3rRtxvumAK/mrgQtEO75NG/zX5ETeAEj # SIG # End signature block
combined_dataset/train/non-malicious/sample_50_13.ps1
sample_50_13.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Updates a database. .Description Updates a database. .Example $2ds = New-TimeSpan -Days 2 $4ds = New-TimeSpan -Days 4 Update-AzKustoDatabase -ResourceGroupName testrg -ClusterName testnewkustocluster -Name mykustodatabase -Kind ReadWrite -SoftDeletePeriod $4ds -HotCachePeriod $2ds -Location 'East US' -CallerRole Admin Kind Location Name Type ---- -------- ---- ---- ReadWrite East US testnewkustocluster/mykustodatabase Microsoft.Kusto/Clusters/Databases .Link https://learn.microsoft.com/powershell/module/az.kusto/update-azkustodatabase #> function Update-AzKustoDatabase { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase])] [CmdletBinding(DefaultParameterSetName = 'UpdateExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(ParameterSetName = 'UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the Kusto cluster. ${ClusterName}, [Parameter(ParameterSetName = 'UpdateExpanded', Mandatory)] [Alias('DatabaseName')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the database in the Kusto cluster. ${Name}, [Parameter(ParameterSetName = 'UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the resource group containing the Kusto cluster. ${ResourceGroupName}, [Parameter(ParameterSetName = 'UpdateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] [System.String] # Gets subscription credentials which uniquely identify Microsoft Azure subscription. # The subscription ID forms part of the URI for every service call. ${SubscriptionId}, [Parameter(ParameterSetName = 'UpdateViaIdentityExpanded', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.IKustoIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory)] [ArgumentCompleter( { param ( $CommandName, $ParameterName, $WordToComplete, $CommandAst, $FakeBoundParameters ) return @('ReadWrite', 'ReadOnlyFollowing') })] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.Kind] # Kind of the database ${Kind}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.TimeSpan] # The time the data should be kept in cache for fast queries in TimeSpan. ${HotCachePeriod}, [Parameter(ParameterSetName = 'UpdateExpanded')] [Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.TimeSpan] # The time the data should be kept before it stops being accessible to queries in TimeSpan. ${SoftDeletePeriod}, [Parameter(ParameterSetName = 'UpdateExpanded')] [Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The name of the key vault key. ${KeyVaultPropertyKeyName}, [Parameter(ParameterSetName = 'UpdateExpanded')] [Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The Uri of the key vault. ${KeyVaultPropertyKeyVaultUri}, [Parameter(ParameterSetName = 'UpdateExpanded')] [Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The version of the key vault key. ${KeyVaultPropertyKeyVersion}, [Parameter(ParameterSetName = 'UpdateExpanded')] [Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The user assigned identity (ARM resource id) that has access to the key. ${KeyVaultPropertyUserIdentity}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Query')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.CallerRole] # By default, any user who run operation on a database become an Admin on it. # This property allows the caller to exclude the caller from Admins list. ${CallerRole}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # Resource location. ${Location}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { if ($PSBoundParameters['Kind'] -eq 'ReadWrite') { $Parameter = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.ReadWriteDatabase]::new() } else { $Parameter = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.ReadOnlyFollowingDatabase]::new() } $Parameter.Kind = $PSBoundParameters['Kind'] $null = $PSBoundParameters.Remove('Kind') if ( $PSBoundParameters.ContainsKey('SoftDeletePeriod')) { $Parameter.SoftDeletePeriod = $PSBoundParameters['SoftDeletePeriod'] $null = $PSBoundParameters.Remove('SoftDeletePeriod') } if ( $PSBoundParameters.ContainsKey('HotCachePeriod')) { $Parameter.HotCachePeriod = $PSBoundParameters['HotCachePeriod'] $null = $PSBoundParameters.Remove('HotCachePeriod') } if ( $PSBoundParameters.ContainsKey('KeyVaultPropertyKeyName')) { $Parameter.KeyVaultPropertyKeyName = $PSBoundParameters['KeyVaultPropertyKeyName'] $null = $PSBoundParameters.Remove('KeyVaultPropertyKeyName') } if ( $PSBoundParameters.ContainsKey('KeyVaultPropertyKeyVaultUri')) { $Parameter.KeyVaultPropertyKeyVaultUri = $PSBoundParameters['KeyVaultPropertyKeyVaultUri'] $null = $PSBoundParameters.Remove('KeyVaultPropertyKeyVaultUri') } if ( $PSBoundParameters.ContainsKey('KeyVaultPropertyKeyVersion')) { $Parameter.KeyVaultPropertyKeyVersion = $PSBoundParameters['KeyVaultPropertyKeyVersion'] $null = $PSBoundParameters.Remove('KeyVaultPropertyKeyVersion') } if ( $PSBoundParameters.ContainsKey('KeyVaultPropertyUserIdentity')) { $Parameter.KeyVaultPropertyUserIdentity = $PSBoundParameters['KeyVaultPropertyUserIdentity'] $null = $PSBoundParameters.Remove('KeyVaultPropertyUserIdentity') } $Parameter.Location = $PSBoundParameters['Location'] $null = $PSBoundParameters.Remove('Location') $null = $PSBoundParameters.Add('Parameter', $Parameter) Az.Kusto.internal\Update-AzKustoDatabase @PSBoundParameters } catch { throw } } } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBthN95BXrcVyYX # O3idoJrKdyQMvhNtPWHzgXm79X0zL6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEeVU2CUgzAd+DOMyWbBqsTK # eMClour1pLIBy2sfepb4MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAEJ+E7jUE0/LAoY/DrfQynr9LPw14akMyD4qTy5GYbAUUAv5Mq7X04tXQ # VfO8qGW+gDkhc47br9Z3nVwYTHN5diuCOcxV6k/Vf0ayX8WfJRWA7YU9hnu/lK+g # r7qTmN+8whuMwK/xnfhFNHhlZgF4KCjEVHQBmjYWDKINm8xi2mvB83j1ueq0wQuO # wMnG0w5veBKS3Fax2v0k+9hSPr0dfMq4+u0E6PyPLBSBpfTmk+C1fMCAF5yExopn # Kev1jLV7fe08124YaMk1HMk93ODMzK0FyYl92wBdrERAAlOc44Xj9Ru58SWY0Gno # lI9E7XEh8P5Lk8zcroHQZhsetxEnBKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB4gzMLKmDIF+JNxIKWuoI6K0uggy1XTMwy/vPss8dscgIGZiAgthSr # GBMyMDI0MDQyMzEzMTUyMS4yMjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK # AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+ # h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx # G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje # 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgvRyhSzLPEhx+NuMBWAT8qGEOafT+bSjKWJsxoq/gL5QwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me # BeYsMA0GCSqGSIb3DQEBCwUABIICAAtda469TveinbRT7QcsaTd8dRKVVILPpArL # o3Q3BCrdaCM4me1PNboFjrQ6ixirq/3sdcOqxN5RVitRw09BdIWboXD5AWfKVoyF # 9t4TReFXcC+pafH3LwBYvK8ZDuoIs3hVIJzqMyiElOqkSxszMEebI+XyGjNL2jTh # 5I6u9LngYqA+y8UFvQYU0igjIltqg0MYIJ/xgwlZJlISbDCKwgwfzFAVDSqjTg40 # OQIfQJ0yXh7gTUvnOyJhvXa76A8jOrfgQv0RxbCFjcnzHyWZvJu8uIri4GkZ0Vpa # YZMkep1ZghUakIvJAYCg3UTKckyu+ecqc1/Jym1IC/JIuzYPXsrK+pG0UhGTCL3c # G3TP8UKadvqipRhMgLwtna5CDr/MX0VaWfrDumgyFtniu4P474vqAi727JMOu4xM # A9xCyJ7Gja3/EyQObYKJmlYuwZDYonZJcx3bHuuvHelZ/1mROPxgihc5COxaS/88 # TnDFhARdJbnzLnZp2cZv6/7tjURmw+sTBNPABHDrni0T0XEVeMOGlyA28vkEjU9X # e4HwgQ+HOWa3qc1tvd1LF4ymrtmiVZE0jQpmx0Nph/Xl6M5/HVoZvRKK7cmfjsl6 # idgsBqPfFOV+E19VkSd+P6C/dKLkGk/A7uYqhbYQ8Eqe5BEsh/5jmfvmOtbTlpKo # Y++3ibF+ # SIG # End signature block
combined_dataset/train/non-malicious/sample_41_72.ps1
sample_41_72.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module $PSScriptRoot\Tracer.psm1 $BackupStartedEventLogPattern = "Action {0} started with session name <{1}>, session shell ID {2} and process ID {3}." $BackupCompletedEventLogPattern = "Action {0} completed with session name <{1}>." $BackupFailedEventLogPattern = "Action {0} failed with session name <{1}>. Exception: {2}" $BCDRSessionNameBase = "AzsBCDRSession" $BCDRLogName = "AzSBCDR" $BCDRBackupEventSource = "AzSBackupAction" # TODO: restore actions are not utilizing the action helper at the moment. $BCDRRestoreEventSource = "AzSRestoreAction" $BCDRRemoteActionStartedEventId = 1 $BCDRRemoteActionCompletededEventId = 2 $BCDRRemoteActionFailedEventId = 3 # 4 hour session idle timeout $BCDRRemoteSessionIdleTimeoutInSec = 14400 <# .Synopsis Get the BCDR action plan constants #> function Get-BCDRActionPlanConsts { $consts = @{} $consts.BackupStartedEventLogPattern = $BackupStartedEventLogPattern $consts.BackupCompletedEventLogPattern = $BackupCompletedEventLogPattern $consts.BackupFailedEventLogPattern = $BackupFailedEventLogPattern $consts.BCDRSessionNameBase = $BCDRSessionNameBase $consts.BCDRLogName = $BCDRLogName $consts.BCDRBackupEventSource = $BCDRBackupEventSource $consts.BCDRRestoreEventSource = $BCDRRestoreEventSource $consts.BCDRRemoteActionStartedEventId = $BCDRRemoteActionStartedEventId $consts.BCDRRemoteActionCompletededEventId = $BCDRRemoteActionCompletededEventId $consts.BCDRRemoteActionFailedEventId = $BCDRRemoteActionFailedEventId return $consts } <# .Synopsis Get the BCDR action plan constant #> function Get-BCDRActionPlanConst { [CmdletBinding()] Param ( [Parameter(Mandatory = $true)] [ValidateSet('BackupStartedEventLogPattern', 'BackupCompletedEventLogPattern', 'BackupFailedEventLogPattern', ` 'BCDRSessionNameBase', 'BCDRLogName', 'BCDRBackupEventSource', 'BCDRRestoreEventSource', ` 'BCDRRemoteActionStartedEventId', 'BCDRRemoteActionCompletededEventId', 'BCDRRemoteActionFailedEventId')] [string] $ConstName ) $consts = Get-BCDRActionPlanConsts return $consts[$ConstName] } <# .Synopsis Create event source and log on target VMs #> function Ensure-BCDREventLog { param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [PSCredential] $Credential, [Parameter(Mandatory=$true)] [string] $EventSource ) Invoke-Command -ComputerName $ComputerName -Credential $Credential -ArgumentList @($BCDRLogName, $EventSource) ` -ScriptBlock { param ($BCDRLogName, $EventSource) if ([System.Diagnostics.EventLog]::SourceExists($EventSource) -eq $false) { Trace-Execution "Creating event source $EventSource on event log $BCDRLogName" [System.Diagnostics.EventLog]::CreateEventSource($EventSource, $BCDRLogName) Trace-Execution "Event source $EventSource created" Limit-EventLog -LogName $BCDRLogName -RetentionDays 30 } } } <# .Synopsis Get BCDR action event logs with a specific backup from the target VM #> function Get-BCDRActionEventLog { param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [PSCredential] $Credential, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $BackupId, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $SessionName ) return Invoke-Command -ComputerName $ComputerName -Credential $Credential -ArgumentList @($BackupId, $BCDRLogName, $SessionName) -ScriptBlock { param ($BackupId, $BCDRLogName, $SessionName) try { $logs = Get-EventLog -LogName $BCDRLogName -ErrorAction Stop ` | ? { ($_.Message -like "*$BackupId*") -and ($_.Message -like "*<$SessionName>*") } # Log the last 5 logs about this backup session for diagnostics $numHistory = 5 foreach ($log in ($logs | select -First $numHistory)) { Trace-Execution "Last $numHistory logs for backup $BackupId and session '$SessionName'" Trace-Execution "$($log.TimeGenerated), EventId: $($log.EventID), Msg: $($log.Message)" } return $logs } catch {} } } <# .Synopsis Check if the BCDR remote session process still exists and kill the process if requested to #> function Check-BCDRSessionProcess { param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [PSCredential] $Credential, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $SessionPid, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [DateTime] $SessionCreationTime, [switch] $Kill ) $proc = $null $retries = 10 while (!$proc) { try { # Use Invoke-Command instead of 'Get-Process -CompueterName' to make sure process StartTime properties can # be returned $proc = Invoke-Command -ComputerName $ComputerName -Credential $Credential -ScriptBlock { Get-Process -ProcessName 'wsmprovhost' -ErrorAction Stop } } catch { $retries-- if ($retries -gt 0) { Trace-Execution "Failed to get PowerShell remote host processes on $ComputerName. Exception: $_. Retrying..." Start-Sleep -s 10 continue } throw } } $sessionProc = $proc | ? { ($_.Id -eq $SessionPid)} if ($sessionProc) { # Check the creation time to prevent accidental termination of other processes with the same Pid. # Session process must be started earlier than session log time. Give it 1 extra second to the session creation # time because ETL log time has seconds precision while the process start time has milliseconds precision. $sessionProcStartTimeUTC = $sessionProc.StartTime.ToUniversalTime() $sessionCreationTimeUTC = $SessionCreationTime.ToUniversalTime().AddSeconds(1) if ($sessionProcStartTimeUTC -le $sessionCreationTimeUTC) { if ($Kill.IsPresent) { Invoke-Command -ComputerName $ComputerName -Credential $Credential -ArgumentList @($SessionPid) ` -ScriptBlock { param ($SessionPid) Stop-Process -Id $SessionPid -Force -ErrorAction SilentlyContinue } } return $true } else { Trace-Execution "The process with Id $SessionPid isn't the remote PowerShell host process for this invocation." Trace-Execution "Session process start time: $sessionProcStartTimeUTC, Session creation time: $sessionCreationTimeUTC" } } else { $str = $null $proc | select Id, ProcessName | % { $str += "($($_.Id), $($_.ProcessName))`n" } Trace-Execution "All PowerShell remote host processes names on $ComputerName :`n$str" Trace-Execution "Failed to find a remote PowerShell host process with process Id $SessionPid on $ComputerName." } return $false } <# .Synopsis Check previously started BCDR remote sessions. The BCDR remote sessions for each role (and each invocation if a role has more than one) are named with this pattern: '<BCDRSessionNameBase>-<FullRepositoryName>' This method searches the remote session name on all nodes for the current role, try to get the action status to determine next actions, and finally clean up the sessions. #> function Check-PreviousBCDRSession { param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string[]] $NodesForCurrentRole, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [PSCredential] $Credential, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $BackupId, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $SessionName, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $SessionInfoEventRegex, [Parameter(Mandatory=$false)] $ProvisionedPSSession = $null, [Parameter(Mandatory=$false)] [PSCredential] $ProvisionedPSSessionCredential = $null, [Parameter(Mandatory=$true)] [uint32] $ExpectedRuntimeInMin, [Parameter(Mandatory=$true)] [ref] $ShouldInvokeAction ) $ShouldInvokeAction.Value = $true # Test if the session already exists on all the nodes $sessions = @() Trace-Execution "Searching for existing PSSessions on $NodesForCurrentRole" foreach ($Node in $NodesForCurrentRole) { if ($ProvisionedPSSessionCredential) { $sessions += Get-PSSession -ComputerName $Node -Credential $ProvisionedPSSessionCredential -Name $SessionName -ErrorAction SilentlyContinue } else { $sessions += Get-PSSession -ComputerName $Node -Credential $Credential -Name $SessionName -ErrorAction SilentlyContinue } } # Make sure to filter out the provisioned PSSession if specified. Trace-Execution "Found sessions: $sessions" if ($ProvisionedPSSession) { $sessions = $sessions | ? { if ($ProvisionedPSSession.InstanceId -ne $_.InstanceId) { return $true } else { Trace-Execution "Filter out the provisioned PSSession with ID $($ProvisionedPSSession.InstanceId) from the sessions." return $false } } } foreach ($session in $sessions) { # Properly working BCDR remote sessions should be in the 'Disconnected' state and ready to be connected try { Trace-Execution "The disconnected remote PSSession '$($session.Name)' exists on $($session.ComputerName)." Trace-Execution "State: $($session.State), Availability: $($session.Availability), Instance ID: $($session.InstanceId)." Trace-Execution "Check the previous backup status of BackupID $backupID." # Get the latest log with this backup ID $latestLog = Get-BCDRActionEventLog -ComputerName $session.ComputerName -Credential $Credential ` -BackupId $backupId -SessionName $SessionName | select -First 1 if ($latestLog) { switch ($latestLog.EventId) { # Started $BCDRRemoteActionStartedEventId { $expectedCompletion = $latestLog.TimeGenerated.ToUniversalTime().AddMinutes($ExpectedRuntimeInMin) Trace-Execution "Action started at UTC $($latestLog.TimeGenerated.ToUniversalTime().ToString())" Trace-Execution "Expected to complete by UTC $($expectedCompletion.ToUniversalTime().ToString())" $actionPlanDone = $false do { # Check for completion $now = Get-Date Trace-Execution "Current time is UTC $($now.ToUniversalTime().ToString())" $log = Get-BCDRActionEventLog -ComputerName $session.ComputerName -Credential $Credential ` -BackupId $backupId -SessionName $SessionName | select -First 1 if ($log.EventId -eq $BCDRRemoteActionCompletededEventId) { $ShouldInvokeAction.Value = $false $actionPlanDone = $true } elseif ($log.EventId -eq $BCDRRemoteActionFailedEventId) { Trace-Execution "The previous action failed, invoking the action again" $actionPlanDone = $true } if ($actionPlanDone) { break } # Keep waiting Start-Sleep -Seconds 30 } while ($now -le $expectedCompletion) if (!$actionPlanDone) { Trace-Execution "The previous action plan didn't finish in time, restarting another one." } } # Completed $BCDRRemoteActionCompletededEventId { $shouldInvokeAction.Value = $false } # Failed $BCDRRemoteActionFailedEventId { Trace-Execution "The previous action failed, invoking the action again" } } } break } catch {} } if ($sessions) { Trace-Execution "Removing the disconnected PSSessions." $sessions | Remove-PSSession -ErrorAction SilentlyContinue } foreach ($Node in $NodesForCurrentRole) { try { Trace-Execution "Make sure the WSMan instance and the process are both gone on $Node" $instances = Get-WSManInstance -ConnectionURI "http://$Node`:5985/wsman" shell -Enumerate ` -cred $Credential -ErrorAction SilentlyContinue | ? Name -eq $SessionName if ($ProvisionedPSSession) { $instances = $instances | ? { if ($ProvisionedPSSession.InstanceId -ne $_.ShellId) { return $true } else { Trace-Execution "Filter out the provisioned PSSession ID $($ProvisionedPSSession.InstanceId) from the instances" return $false } } } foreach ($instance in $instances) { Trace-Execution "Try to remove the WSMan object with shell ID $($instance.ShellId)" Remove-WSManInstance -ConnectionURI "http://$Node`:5985/wsman" shell @{ShellID="$($instance.ShellId)"} ` -cred $Credential -ErrorAction SilentlyContinue } $logs = Get-BCDRActionEventLog -ComputerName $Node -Credential $Credential -BackupId $backupId ` -SessionName $SessionName | ? EventID -eq $BCDRRemoteActionStartedEventId if ($logs) { Trace-Execution "Check the previous session PID." foreach ($log in $logs) { Trace-Execution "Log message: $($log.Message)" if ($log.Message -Match $SessionInfoEventRegex) { $sessionNameFromLog = $Matches[2] if ($sessionNameFromLog -ne $SessionName) { Trace-Execution "Not for the current session, skipped." continue } $wsPid = $Matches[4] $logTime = $log.TimeGenerated.ToUniversalTime() if (![string]::IsNullOrEmpty($wsPid)) { Trace-Execution "Make sure process '$wsPid' is gone." $null = Check-BCDRSessionProcess -ComputerName $Node -Credential $Credential ` -SessionPid $wsPid -SessionCreationTime $logTime -Kill } } } } } catch { Trace-Execution "Failed to clean up the WSMan instance and/or the process on $Node. Proceeding anyway. Exception: $_" } } } <# .Synopsis A wrapper around actual execution on remote machines when the execution runs in a JEA session, in which case this method must be whitelisted in the session configuration (.psrc) or imported manually as part of the initialization #> function Start-BCDRExecutionOnRemoteComputer { param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $BCDRRemoteExecutionScriptBlockAsStr, [Parameter(Mandatory=$true)] $ScriptBlockParameters ) $BCDRRemoteExecutionScriptBlock = [scriptblock]::Create($BCDRRemoteExecutionScriptBlockAsStr) # Start the script block execution async Start-Job -ScriptBlock $BCDRRemoteExecutionScriptBlock -ArgumentList $ScriptBlockParameters } <# .Synopsis Execute backup operations idempotently. BCDR ECE actions start remote PSSession on VMs for roles that implements backup/restore interfaces to perform backup/restore actions. This method ensures that these sessions can be tracked or cleanly canceled when ECE fails over and/or crashes by disconnecting the worker PSSessions and poll for completion. .PARAMETER ComputerName The targe computer name where the execution is run. If ProvisionedPSSession isn't specified, a disconnected session will be created for the caller. Otherwise the computer name is used to poll action plan results. .PARAMETER Credential The credential to access the computer. .PARAMETER BackupID Backup ID .PARAMETER FullRepositoryName The full repository name is used to construct the PSSession name, which should be distinct for each repository so that they can be tracked individually. The pattern is 'AzsBCDRSession-<FullRepostiroyName>' .PARAMETER NodesForCurrentRole List of Nodes for the role where the method should look for previously started BCDR remote PSSessions .PARAMETER EmbeddedScriptBlockAsStr The script block that contains the codes for the actual execution on the remote machine, passed in as a string. The author of the script block must ensure that the codes runs in constrained language mode, otherwise the author must manually set full language mode in this script block. .PARAMETER ScriptBlockParameters The parameter list of the embedded script block .PARAMETER ProvisionedPSSession The provisioned PSSession. The session name must follow this pattern: 'AzsBCDRSession-<FullRepositoryName>'. Once the codes in the EmbeddedScriptBlockAsStr is executed as a job in the session, the session will be disconnected and the caller should *NOT* try to reconnect to it if a reference is still held. .PARAMETER ExpectedRuntimeInMin The method first checks if there were any previously started PSSessions, and if there is any, it finds the start time of the execution and poll for results until the run exceeds the expected run time. .PARAMETER ConfigurationName The configuration name to start the disconnected session with. If not specified, default to use CredSSP .PARAMETER ActionType Specifies whether the action is a backup or restore #> function Start-IdempotentBCDRRemoteExecution { param ( [Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)] [Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)] [Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)] [ValidateNotNullOrEmpty()] [PSCredential] $Credential, [Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)] [Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $BackupID, [Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)] [Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$false)] [ValidateNotNullOrEmpty()] [string] $FullRepositoryName, [Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)] [Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)] [ValidateNotNullOrEmpty()] [string[]] $NodesForCurrentRole, [Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)] [Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $EmbeddedScriptBlockAsStr, [Parameter(Mandatory=$false)] [Array] $ScriptBlockParameters, [Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)] [ValidateNotNullOrEmpty()] $ProvisionedPSSession = $null, [Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)] [ValidateNotNull()] [PSCredential] $ProvisionedPSSessionCredential = $null, [Parameter(Mandatory=$false)] [uint32] $ExpectedRuntimeInMin = 60 * 4, [Parameter(ParameterSetName = "DefaultSet", Mandatory=$false)] [string] $ConfigurationName = $null, [Parameter(Mandatory = $false)] [ValidateSet('Backup', 'Restore')] [string] $ActionType = 'Backup', [Parameter(Mandatory = $false)] [string] $BackupSnapshotFolder, [Parameter(Mandatory = $false)] [string[]] $BackupSnapshotFilters ) try { $defaultSessionName = "$BCDRSessionNameBase-$FullRepositoryName" if ($ProvisionedPSSession) { if ($ProvisionedPSSession.Name -notlike "$defaultSessionName*") { throw "Unexpected PSSession name '$($ProvisionedPSSession.Name)'. The session must start with '$defaultSessionName'." } $sessionName = $ProvisionedPSSession.Name } else { $sessionName = $defaultSessionName } if ($ActionType -eq 'Backup') { $EventSource = $BCDRBackupEventSource } else { $EventSource = $BCDRRestoreEventSource } $sessionInfoEventRegex = $BackupStartedEventLogPattern -f "([\d\w\-]+)", "(.+)", "([\d\w\-]+)", "(\d+)" $shouldInvokeAction = $true Check-PreviousBCDRSession -NodesForCurrentRole $NodesForCurrentRole -Credential $Credential -BackupID $BackupID ` -SessionName $sessionName -SessionInfoEventRegex $sessionInfoEventRegex ` -ProvisionedPSSession $ProvisionedPSSession -ProvisionedPSSessionCredential $ProvisionedPSSessionCredential ` -ExpectedRuntimeInMin $ExpectedRuntimeInMin -ShouldInvokeAction ([ref] $shouldInvokeAction) if ($shouldInvokeAction -eq $false) { Trace-Execution "The previous action is done, skip invoking the action again" return } Trace-Execution "Ensure the BCDR event source and log exists" Ensure-BCDREventLog -ComputerName $ComputerName -Credential $Credential -EventSource $EventSource $BCDREventParams = @{} $BCDREventParams.BCDRLogName = $BCDRLogName $BCDREventParams.EventSource = $EventSource $BCDREventParams.BCDRRemoteActionStartedEventId = $BCDRRemoteActionStartedEventId $BCDREventParams.BCDRRemoteActionCompletededEventId = $BCDRRemoteActionCompletededEventId $BCDREventParams.BCDRRemoteActionFailedEventId = $BCDRRemoteActionFailedEventId $BCDREventParams.BackupStartedEventLogPattern = $BackupStartedEventLogPattern $BCDREventParams.BackupCompletedEventLogPattern = $BackupCompletedEventLogPattern $BCDREventParams.BackupFailedEventLogPattern = $BackupFailedEventLogPattern $BCDRRemoteExecutionScriptBlockParams = @($BCDREventParams, $sessionName, $BackupID, ` $EmbeddedScriptBlockAsStr, $ScriptBlockParameters, $BackupSnapshotFolder, $BackupSnapshotFilters) $BCDRRemoteExecutionScriptBlock = { param ($BCDREventParams, $sessionName, $BackupID, $EmbeddedScriptBlockAsStr, $ScriptBlockParameters, $BackupSnapshotFolder, $BackupSnapshotFilters) try { Import-Module OpenUpSession Set-FullLanguage } catch{} # Log the shell ID and the PID of the disconnected session $instance = Get-WSManInstance -ConnectionURI "http://localhost:5985/wsman" shell -Enumerate ` | Where-Object Name -eq $sessionName $backupStartedEventLogMsg = $BCDREventParams.BackupStartedEventLogPattern -f $BackupID, $sessionName, ` $instance.ShellId, $instance.ProcessId Write-EventLog -LogName $BCDREventParams.BCDRLogName -Source $BCDREventParams.EventSource ` -EntryType Information -EventId $BCDREventParams.BCDRRemoteActionStartedEventId -Message $backupStartedEventLogMsg $sb = [scriptblock]::Create($EmbeddedScriptBlockAsStr) $succeeded = $false try { Invoke-Command -ArgumentList $ScriptBlockParameters -ScriptBlock $sb -ErrorAction Stop $succeeded = $true } catch { $errorRecord = $_ } finally { $errorMsg = $errorRecord | select * | Out-String # Double check the snapshots to adjust the final result if ($BackupSnapshotFolder -and ($BackupSnapshotFilters.Count -gt 0)) { try { $logFileFullPath = Join-Path "$env:SystemDrive\MASLogs" -ChildPath "$($sessionName)_$($BackupID)_$(Get-Date -Format "yyyyMMdd-HHmmss").log" Start-Transcript -Append -Path $logFileFullPath Write-Verbose "Check snapshots under $BackupSnapshotFolder with $BackupSnapshotFilters finally to adjust result" $snapshotNotFound = $false foreach ($filter in $BackupSnapshotFilters) { $snapshots = Get-ChildItem $BackupSnapshotFolder -Filter $filter -Force if (!$snapshots) { Write-Verbose "Failed to find snapshot with $filter" $succeeded = $false $snapshotNotFound = $true $errorMsg += "`nNo snapshot found under $BackupSnapshotFolder with filter $filter." } } if (!$snapshotNotFound) { Write-Verbose "Succeeded to find all snapshots, adjust result from $succeeded to true" $succeeded = $true } } catch { Write-Verbose "Ignore exception $($_.Exception.Message) when checking snapshots" } finally { Stop-Transcript -ErrorAction Ignore } } if ($succeeded) { $backupCompletedEventLogMsg = $BCDREventParams.BackupCompletedEventLogPattern -f $BackupID, $sessionName Write-EventLog -LogName $BCDREventParams.BCDRLogName -Source $BCDREventParams.EventSource ` -EntryType Information -EventId $BCDREventParams.BCDRRemoteActionCompletededEventId ` -Message $backupCompletedEventLogMsg } else { $backupFailedEventLogMsg = $BCDREventParams.BackupFailedEventLogPattern -f $BackupID, $sessionName, $errorMsg Write-EventLog -LogName $BCDREventParams.BCDRLogName -Source $BCDREventParams.EventSource ` -EntryType Error -EventId $BCDREventParams.BCDRRemoteActionFailedEventId ` -Message $backupFailedEventLogMsg throw $errorMsg, $errorRecord } } } if ($PsCmdlet.ParameterSetName -eq 'ProvisionedPSSessionSet') { Trace-Execution "Using the provisioned PSSession." Trace-Execution "Name: $($ProvisionedPSSession.Name), State: $($ProvisionedPSSession.State)" Trace-Execution "Availability: $($ProvisionedPSSession.Availability), ConfigName: $($ProvisionedPSSession.ConfigurationName)" # Execute the script block in the provisioned session and disconnect # # Most cases where the caller passes in a provisioned PSSession is because the session was created with a # JEA endpoint and specific language mode is enforced. Therefore, Start-BCDRExecutionOnRemoteComputer must # be imported in the provisioned PSSession already and cannot be imported here to support this scenario. Invoke-Command -Session $ProvisionedPSSession ` -ArgumentList @($BCDRRemoteExecutionScriptBlock.ToString(), $BCDRRemoteExecutionScriptBlockParams) ` -ScriptBlock { param ($BCDRRemoteExecutionScriptBlockAsStr, $BCDRRemoteExecutionScriptBlockParams) Start-BCDRExecutionOnRemoteComputer ` -BCDRRemoteExecutionScriptBlockAsStr $BCDRRemoteExecutionScriptBlockAsStr ` -ScriptBlockParameters $BCDRRemoteExecutionScriptBlockParams } Trace-Execution "Disconnecting the remote PSSession." Disconnect-PSSession -Session $ProvisionedPSSession -IdleTimeoutSec $BCDRRemoteSessionIdleTimeoutInSec Trace-Execution "Session disconnected." } else { Trace-Execution "Starting a new disconnected PSSession" # Set the idle timeout to 4hrs, which is the same timeout as the entire backup action plan, so that the # execution doesn't get killed too soon and the session dies after the timeout expires. $BCDRRemoteSessionIdleTimeoutInMs = $BCDRRemoteSessionIdleTimeoutInSec * 1000 $option = New-PSSessionOption -OutputBufferingMode Drop -IdleTimeout $BCDRRemoteSessionIdleTimeoutInMs $invokeParam = @{} $invokeParam.ComputerName = $ComputerName $invokeParam.Credential = $Credential $invokeParam.InDisconnectedSession = $true $invokeParam.SessionName = $sessionName $invokeParam.SessionOption = $option if (![string]::IsNullOrEmpty($ConfigurationName)) { $invokeParam.ConfigurationName = $ConfigurationName } else { $invokeParam.Authentication = "Credssp" } $invokeParam.ArgumentList = $BCDRRemoteExecutionScriptBlockParams Invoke-Command @invokeParam -ScriptBlock $BCDRRemoteExecutionScriptBlock } # Try to get session PID and creation time from the latest log $wsPid = $null for ($i = 0; $i -lt 3; $i++) { Trace-Execution "Wait for 10 seconds..." Start-Sleep -s 10 $latestStartLog = Get-BCDRActionEventLog -ComputerName $ComputerName -Credential $Credential ` -BackupID $BackupID -SessionName $sessionName | ? EventID -eq $BCDRRemoteActionStartedEventId | select -First 1 Trace-Execution "Latest start event: $($latestStartLog.Message)" if ($latestStartLog -and ($latestStartLog.Message -Match $sessionInfoEventRegex)) { if ($ProvisionedPSSession -and ($Matches[3] -ne $ProvisionedPSSession.InstanceId)) { Trace-Execution "Waiting for the start action plan event." continue } $wsPid = $Matches[4] $logTime = $latestStartLog.TimeGenerated.ToUniversalTime() break } } if ($i -eq 3) { Trace-Execution "Failed to get PSSession info. Wait for 5 min and try to determine if backup is completed." $timeout = (Get-Date).AddMinutes(5) } while ($true) { # Check for completion $log = Get-BCDRActionEventLog -ComputerName $ComputerName -Credential $Credential ` -BackupID $BackupID -SessionName $sessionName | select -First 1 if ($log) { if ($log.EventId -eq $BCDRRemoteActionCompletededEventId) { Trace-Execution "$ActionType succeeded." break } elseif ($log.EventId -eq $BCDRRemoteActionFailedEventId) { throw "$ActionType $BackupId failed. Message: $($log.Message)" } } # Make sure the process is still alive if ($wsPid) { $sessionProcExists = Check-BCDRSessionProcess -ComputerName $ComputerName -Credential $Credential ` -SessionPid $wsPid -SessionCreationTime $logTime if (!$sessionProcExists) { throw "The remote PSSession unexpectedly died. $ActionType failed." } } if ($timeout -and ((Get-Date) -gt $timeout)) { throw "Could not determine if the $ActionType is finished or not. Failing the $ActionType." } Start-Sleep -Seconds 30 } } finally { if ($ProvisionedPSSessionCredential) { $cleanupCredential = $ProvisionedPSSessionCredential } else { $cleanupCredential = $Credential } if (![string]::IsNullOrEmpty($sessionName)) { $session = Get-PSSession -ComputerName $ComputerName -Credential $cleanupCredential ` -Name $sessionName -ErrorAction SilentlyContinue $session | Remove-PSSession -ErrorAction SilentlyContinue } try { $instance = Get-WSManInstance -ConnectionURI "http://$ComputerName`:5985/wsman" shell -Enumerate ` -cred $cleanupCredential -ErrorAction SilentlyContinue | ? Name -eq $SessionName foreach ($instance in $instances) { Trace-Execution "Removing WSMan objects with shell ID $($instance.ShellId)" Remove-WSManInstance -ConnectionURI "http://$ComputerName`:5985/wsman" shell @{ShellID="$($instance.ShellId)"} ` -cred $cleanupCredential -ErrorAction SilentlyContinue } } catch { Trace-Execution "Could not clean up the WSMan instance. Exception: $_" } } } <# .Synopsis Get the first machine in the list where a remote PSSession can be created. #> function Get-FirstAvailableMachine { param ( [Parameter(Mandatory=$true)] [string[]] $Machines, [Parameter(Mandatory=$true)] [PSCredential] $Credential, [Parameter(Mandatory = $true, ParameterSetName = "JEA")] [ValidateNotNullOrEmpty()] [string] $ConfigurationName, [Parameter(Mandatory = $true, ParameterSetName = "Authentication")] [ValidateSet("Default","Basic","Credssp","Digest","Kerberos","Negotiate","NegotiateWithImplicitCredential")] [string] $Authentication = "Credssp", [Parameter(Mandatory = $false)] [uint32] $Retries = 0, [Parameter(Mandatory = $false)] [uint32] $RetrySleepTimeInSeconds = 5 ) $RemoteSession = $null $found = $null foreach ($Machine in $Machines) { Trace-Execution "Testing remote PSSession connectivities to $Machine with user $($Credential.UserName)" $attempt = 0; try { while ($true) { $attempt++ try { if ($PSCmdlet.ParameterSetName -eq "JEA") { $session = New-PSSession -ComputerName $Machine -Credential $Credential ` -ConfigurationName $ConfigurationName -ErrorAction Stop } else { $session = New-PSSession -ComputerName $Machine -Credential $Credential ` -Authentication $Authentication -ErrorAction Stop } break } catch { Trace-Warning "Test connection failed. Exception: $_" if ($attempt -lt $Retries) { Trace-Execution "Attempt $attempt of $Retries." Start-Sleep -s $RetrySleepTimeInSeconds continue } else { throw "Failed to connect to $Machine after $attempt attempts. Exception: $_" } } } $found = $Machine break } catch { Trace-Warning "Failed to connect to $Machine with exception $($_ | Out-String)" } finally { $session | Remove-PSSession -ErrorAction SilentlyContinue } } if ([string]::IsNullOrEmpty($found)) { throw "Could not create a PSSession to any of the specified machines." } return $found } Export-ModuleMember -Function Ensure-BCDREventLog Export-ModuleMember -Function Get-BCDRActionPlanConst Export-ModuleMember -Function Get-BCDRActionPlanConsts Export-ModuleMember -Function Get-FirstAvailableMachine Export-ModuleMember -Function Start-BCDRExecutionOnRemoteComputer Export-ModuleMember -Function Start-IdempotentBCDRRemoteExecution # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDUkI9CuCg+ewEj # UjnWERSejhLSTok6F5j/AfKseK3mWKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA/pehCkQwZn7fSFbhJC5ihv # 1vSG/qMNCVDv0o8RlW2FMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAP5WXIramWKXzt1rxRAbufjbgfsY0l2P5dLQ6SSkMt+BJw2LMUs+tNZFU # Na7nXSfYq0silQiu7p7FOStujjAD2+Z0dQJgeG6LCc1pFDlVET/sOR0+fcmm1jPR # SIVy9BL61VWUjvixxzBFjbmQE66Eb15/RwkDUGtZQtLcPiEFCu1qPp+GUX/+9NGD # JX8TMHiBYQPltmuTfmws4BkkPBxFI1QQk8T7e4qxK2nZLeBBGdZWRpbZ8T3mpE3F # 43ZwkCiqut8PyxiFPkzUhknV0xx9UQyLeUBSsocQW/XeFXkERkkZjQYbNbkNvPvF # TBgzvxzB6PynFQlStJBCHPO4zR3Ob6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBuqLzBhl3nsSGtLKOIH966A9AMcs58S+iKMiXp9rHmlgIGZbqk0R90 # GBMyMDI0MDIxMjE0MDgzNy4wMzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA # 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/ # fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly # OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc # Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgG/gaQA83XbdjJX6LwoAs4jDPRvJCpQ8MFXb0IV8tgdkwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao # MA0GCSqGSIb3DQEBCwUABIICAGx0QXlFPYRkc38TSskobXPwiWkrN3L96VNsbE/q # Q9XabTqJpeUg4lvE4xcvX05Nqdks7F0e2zqiWugAfTU6lRj+D+EmxFugKzmABK4/ # 0ylPLARi+rKwz8QNWvAKhzdL6XcGYK0PtPcRjoUrG/l/H5kZt9KVYWopQpsE+jlR # 6cl+z91e2O0UnwXnpggiYS/LLtEF4uFzScq2vzwO6/Y0qcJhGOQWodnnWC21vSZc # fWH50wTNp1sUYTGL4X4vRl5b49rxRSY1bv0IB2mTGfLedafBB/sADSf4BvonAaZ+ # WC6S6KTpKX2o8KYojAlXXAjDGVwB+J8TLoWxyQ/i+MtPhqSCL9GluR0Vr4C3fGjd # ntxua+sRVulupYycVr1USnB0RSsextvahtwxvay14aJP4NSsk7Xu7oy1KjfODmZm # w8ZLf6rY6+coT14aSuNNQMXdmPMJDl7oPAArD1XMtqu4u5jmOgI0ffGweQj4YSIt # 5nsPh8BlIOZcz2oke6r8j01pCPaYB9qp6a0En+FCK8U/cR4nF3qwsfeJwQnbUV/Y # skHwjl5rR+NV7IShm1NL7bJoRdR0TI8WojLHtK9ZIwcXASUgat5lCSr1FCKKDsy1 # DcKDuSqsG0RCABnbd6h8DIHNfgSDDptPQIDtuWKwni61vDfiuyOTNOtvXivqHHG9 # vbWP # SIG # End signature block
combined_dataset/train/non-malicious/sample_25_96.ps1
sample_25_96.ps1
# # Module manifest for module 'OCI.PSModules.Adm' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Adm.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a24e4d09-e598-41cc-b3e9-a1e3c5dce346' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Adm Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Adm.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIAdmRemediationRecipe', 'Get-OCIAdmApplicationDependencyRecommendationsList', 'Get-OCIAdmApplicationDependencyVulnerabilitiesList', 'Get-OCIAdmKnowledgeBase', 'Get-OCIAdmKnowledgeBasesList', 'Get-OCIAdmRemediationRecipe', 'Get-OCIAdmRemediationRecipesList', 'Get-OCIAdmRemediationRun', 'Get-OCIAdmRemediationRunsList', 'Get-OCIAdmStage', 'Get-OCIAdmStagesList', 'Get-OCIAdmVulnerabilityAudit', 'Get-OCIAdmVulnerabilityAuditsList', 'Get-OCIAdmWorkRequest', 'Get-OCIAdmWorkRequestErrorsList', 'Get-OCIAdmWorkRequestLogsList', 'Get-OCIAdmWorkRequestsList', 'Invoke-OCIAdmDeactivateRemediationRecipe', 'Move-OCIAdmKnowledgeBaseCompartment', 'Move-OCIAdmRemediationRecipeCompartment', 'Move-OCIAdmRemediationRunCompartment', 'Move-OCIAdmVulnerabilityAuditCompartment', 'New-OCIAdmKnowledgeBase', 'New-OCIAdmRemediationRecipe', 'New-OCIAdmRemediationRun', 'New-OCIAdmVulnerabilityAudit', 'Remove-OCIAdmKnowledgeBase', 'Remove-OCIAdmRemediationRecipe', 'Remove-OCIAdmRemediationRun', 'Remove-OCIAdmVulnerabilityAudit', 'Stop-OCIAdmRemediationRun', 'Stop-OCIAdmWorkRequest', 'Update-OCIAdmKnowledgeBase', 'Update-OCIAdmRemediationRecipe', 'Update-OCIAdmRemediationRun', 'Update-OCIAdmVulnerabilityAudit' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Adm' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/VM Performance Report_1.ps1
VM Performance Report_1.ps1
<# .SYNOPSIS The script creates an HTML report for given vSphere VM's, that contains VM performance data over a given period. The script then emails the report to a given address. .DESCRIPTION The script requires an input file, supplied as an argument to the script. The first line of this file contains an email address, subsequent lines contain VM names, one per line. The script connects to vCenter, queries for given performance stats (get-stat) and then generates a HTML report, which is then emailed to the recipient. The script can be scheduled via scheduled tasks (when supplied with a credential file for vCenter created with http://poshcode.org/3487) or run interactively. .NOTES File Name : Get-VMPeformanceReport.ps1 Author : Samuel Mulhearn Version History: Version 1.0 28 Jun 2012. Release .LINK http://poshcode.org/3489 .EXAMPLE Call the script with a single argument which should be the path to the input file .\\Get-VMPeformanceReport.ps1 <path\\datafile.txt> #> #Change These Values $VC = "vm-trb-vc02.th.local" #VirtualCenter $SMTPServer = "10.247.50.25" #SMTP Server $SendersAddress = "noreply@tribalgroup.com" #The report comes from this address $SavedCredentialsFile = "C:\\path\\file.txt" #Make this file using http://poshcode.org/3487 $CompanyLogo = "http://placehold.it/150x50" function Out-LogFile { #Log File Function http://poshcode.org/3232 [CmdletBinding(DefaultParameterSetName='Message')] param( [Parameter(ParameterSetName='Message', Position=0, ValueFromPipeline=$true)] [object[]]$Message, [Parameter(ParameterSetName='Message')] [string]$LogFile = $global:DefaultLogPath, [Parameter(ParameterSetName='Message')] [int]$BlankLine = 0, [switch]$WriteHost = $global:WriteHostPreference, [string]$Severity = "I", [Parameter(ParameterSetName='Message')] [switch]$DontFormat, [Parameter(ParameterSetName='Message')] [string]$DateFormat = "dd-MM-yyyy HH:mm:ss", #[Parameter(ParameterSetName='Title',Position=0,Mandatory=$true)] [string]$Title, [System.ConsoleColor]$ForegroundColor = $host.UI.RawUI.ForegroundColor, [System.ConsoleColor]$BackgroundColor = $host.UI.RawUI.BackgroundColor, [ValidateSet('unicode', 'utf7', 'utf8', 'utf32', 'ascii', 'bigendianunicode', 'default', 'oem')] [string]$Encoding = 'Unicode', [switch]$Force ) begin { Write-Verbose "Log File: $LogFile" if ( -not $LogFile ) { Write-Error "The -LogFile parameter must be defined or $global:LogFile must be set."; break} if ( -not (Test-Path $LogFile) ) { New-Item -Path $LogFile -ItemType File -Force | Out-Null } if ( -not (Test-Path $LogFile) ) { Write-Error "Log file can not be found: $LogFile."; break} if ( $Title ) { $text = $Title $Title = $null Out-LogFile -BlankLine 1 -LogFile $LogFile -WriteHost:$WriteHost -Force:$Force -Encoding $Encoding Out-LogFile -Message $text -BlankLine 1 -DontFormat -LogFile $LogFile -WriteHost:$WriteHost -Force:$Force -Encoding $Encoding } } process { if ( $Message ) { $text = $Message foreach ( $text in $Message ) { if ( -not $DontFormat ) { $text = "$(($Severity).ToUpper()): $(Get-Date -Format `"$DateFormat`")" + ": $text" } if ($WriteHost) { Write-Host $text -BackgroundColor $BackgroundColor -ForegroundColor $ForegroundColor} $text | Out-File -FilePath $LogFile -Force:$Force -Encoding $Encoding -Append } } if ( $BlankLine -gt 0 ){ for ($i = 0; $i -lt $BlankLine; $i++ ) { "" | Out-File -FilePath $LogFile -Force:$Force -Encoding $Encoding -Append if ($WriteHost) { Write-Host "" -BackgroundColor $BackgroundColor -ForegroundColor $ForegroundColor } } } } end { } } #end of logfile function #New Line Variable $nl = [Environment]::NewLine #INTERACTIVE: (Prompt for password) Replace code below with: $VCCred = (Get-Credential) #NONE-INTERACTIVE: Store password in a file (using http://poshcode.org/3487), and retrive as below $key = [byte]57,86,59,11,72,75,18,52,73,46,0,21,56,76,47,12 #Must match key used to save password (http://poshcode.org/3487) $VCCred = Import-Csv $SavedCredentialsFile #Make this file using http://poshcode.org/3487 $VCCred.Password = ($VCCred.Password| ConvertTo-SecureString -Key $key) $VCCred = (New-Object -typename System.Management.Automation.PSCredential -ArgumentList $VCCred.Username,$VCCred.Password) #Get Datafile, this wil contain VM's to report on, and an email address to send the report to #Datafile format: first line is email address, subsequent lines are VM's, one per line) if ($args[0] -eq $null) #Test Datafile was supplied as argument to the script, if not error! { Throw "No datafile supplied, supply path to datafile as an argument to the script! e.g .\\SCRIPT.ps1 DATAFILE.txt $nl To create a datafile, the first line of the datafile should be an email address, each subseqenet line should be a VM (one per line)" #$Datafile = "C:\\Path\\datain.txt" #If debugging uncomment this line and comment above to supply a fixed input file } else { $Datafile = $args[0] } #From Datafile, get a log file, and a $LogFile = (($DataFile).SubString(0,(($Datafile).length - 3))) + "log" $Outfile = (($DataFile).SubString(0,(($Datafile).length - 3))) + "htm" $global:WriteHostPreference = $true $global:DefaultLogPath = $LogFile Out-LogFile -Message "Starting script with $datafile" #Load PowerCLI if ( (Get-PSSnapin -Name VMware.VimAutomation.Core -ErrorAction SilentlyContinue) -eq $null ) { Add-PsSnapin VMware.VimAutomation.Core } If (!(Get-PSSnapin -Name VMware.VimAutomation.Core)) {Out-LogFile -Message "Failed to load PowerCLI Snap-in. Check PowerCLI is installed." -Severity "E" Exit(1) } #Static HTML $HTMLPreString=@" <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <link rel="stylesheet" href="http://current.bootstrapcdn.com/bootstrap-v204/css/bootstrap-combined.min.css"> <style type="text/css"> body { padding: 20px; } h2 { color: #3A87AD; } .mytable { width: 776px; margin: 12px; } .alert-info { color: #3A87AD; background-color: #D9EDF7; border-color: #BCE8F1; padding: 8px 8px 8px 14px; margin-top: 12px; margin-left: 12px; margin-right: 12px; margin-bottom: 12px; border: 1px solid; border-radius: 4px; } .chart_wrap { width: 800px; border-style:solid; border-width:1px; border-color: #DDDDDD; margin: 0px 0px 10px 0px; } .chart { text-align: center; width: 800px; height: 400px; } </style> <title> Virtual Machine Performance statistics </title> <script type="text/javascript" src="http://www.google.com/jsapi"></script> <script type="text/javascript"> google.load('visualization', '1', {packages: ['corechart']}); </script> "@ $HTMLPreString += "$nl" $HTMLBodyBegin ="<body style=`"font-family: Arial;border: 0 none;`"> $nl" $HTMLBodyBegin += "<img src=`"$CompanyLogo`" alt=`"Company Logo`" /> $nl" $HTMLBodyBegin += "<h2>Performance Statistics</h2>$nl" $HTMLPostString=@" <script src= "https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js"></script> <script src="http://current.bootstrapcdn.com/bootstrap-v204/js/bootstrap.min.js"</script> <script src="http://current.bootstrapcdn.com/bootstrap-v204/js/bootstrap-tab.js"</script> </body> </html> "@ #Functions for dynamic HTML Function Get-DataTable ($Statistics, $UID, $Summation = $false, $Title) { #https://developers.google.com/chart/interactive/docs/examples#custom_table_example $mystring = "<script type=`"text/javascript`">$nl" $mystring += "function drawVisualization$UID() {$nl" $mystring += "// Create and populate the data table. $nl" $mystring += "var " + "$UID" + "data = new google.visualization.DataTable();$nl" $mystring += "$UID" + "data.addColumn('datetime', 'Time');$nl" $VMs | % {$mystring += "$UID" + "data.addColumn('number', '$_');$nl"} $mystring += "$UID" + "data.addRows(" + $Statistics.Count + ");$nl" $ColumnCount = 0 $RowCount = 0 $Statistics | % { $ColumnCount = 0 $formatteddate = [datetime]::ParseExact(([string]$_.Name),"dd/MM/yyyy H:mm:ss",$null) $JSMonth = (($formatteddate.ToString("MM"))-1) #Javascript Months are base 0 (Jan = 0) $formatteddate = $formatteddate.ToString("yyyy, $JSMonth, dd, HH, mm") $formatteddate = "new Date($formatteddate)" $mystring += "$UID" + "data.setCell($RowCount, $ColumnCount, $formatteddate);$nl" $_.Group | % { $ColumnCount = 0 foreach ($VM in $VMs) { $ColumnCount += 1 If ($_.Entity.Name -eq $VM ) { if ($Summation -eq $true) { $strPercent = (( $_.Value / ( $_.IntervalSecs * 1000)) * 100) #http://kb.vmware.com/kb/2002181 $strPercent = [system.math]::round($strPercent,2) $mystring += "$UID" + "data.setCell($RowCount, $ColumnCount, " + $strPercent + ");$nl" } else { $mystring += "$UID" + "data.setCell($RowCount, $ColumnCount, " + $_.Value + ");$nl" } } } } $RowCount += 1 } $mystring += "$nl new google.visualization.LineChart(document.getElementById('visualization" + "$UID" +"')).$nl" $VisParam = "` { ` legend: {position: 'in',alignment:`"center`"}, ` lineWidth:`"2`", ` curveType: `"none`",` chartArea:{left:60,top:40,width:`"90%`",height:`"75%`"},` focusTarget:`"category`", ` hAxis: {slantedText:`"true`", format:`"E, d MMM`"},` vAxis: {textPosition:`"out`"},` width: 800, ` height: 400, ` title:`"$Title`"}" $mystring += "draw(" + "$UID" + "data, $VisParam);$nl" $mystring +="}$nl" $mystring += "google.setOnLoadCallback(drawVisualization" + "$UID" + ");$nl</script>$nl" return $mystring } function Get-DivHTML ($UID, $Notes) { $tempHTML = "<div class=`"tab-pane fade`" id=`"$UID`">$nl" $tempHTML += " <div class=`"chart_wrap`">$nl" $tempHTML += " <div id=`"visualization" + "$UID" + "`" class=`"chart`"></div>$nl" $tempHTML += " <div class=`"alert alert-info`"><strong>Information: </strong>$Notes</div>$nl" $tempHTML += " </div>$nl" $tempHTML += "</div>$nl" return $tempHTML } #Main Code #Process datafile, get VM's to report on, and an email address to send the report to $DataTable = @(Get-Content $Datafile) $email = $DataTable[0] $VMs = @($DataTable[1..($DataTable.Count)]) #Connect to VC Set-PowerCLIConfiguration -InvalidCertificateAction:Ignore -DefaultVIServerMode:Single -Confirm:$false|Out-Null if ((Connect-VIServer $VC -Credential $VCCred) -eq $null) #Connect to vCenter, exit if fails. { Out-LogFile -Message "Failed to connect to vCenter ($VC)" -Severity "E" -WriteHost Exit (1) } else {Out-LogFile -Message "Connected to vCenter ($VC)"} #Validate VM's exist $VCVMs = (get-vm -name $VMs -ErrorAction SilentlyContinue) $VMs | % { $tmpvm = $_ $Exists = $false $VCVMs | % { if ($_.Name -eq $tmpvm) {$Exists = $true}} If ($Exists){ Out-LogFile -Message "$_ found in vCenter inventory" } Else { Out-LogFile -Message "$_ not found in vCenter inventory" -Severity "W" $VMs = $VMs |? {$_ -ne $tmpvm} } } #To add new Stat #1. Add stat to $metrics (use Get-VM | GetStatType to find new metrics) #2. Create a Variable To hold new stats, $MyVariabe = ($Stats | Where-Object {$_.MetricId -eq $metrics[X]} | Sort-Object TimeStamp |Group-Object -Property Timestamp) #3. Invent a new UID - MyUID ? #4. Build Datatable, add code: $HTMLOut += (Get-DataTable -Statistics $MyVariable -UID "MyUID" -Title "Graph Title") #5. Edit static Tabs HTML below, within <ul class="nav nav-tabs"> add a new <li> - eg: <li><a href="#MyUID" data-toggle="tab">Tab Title</a></li> #6. Add a new Get-DivHTML - eg. $HTMLOut += (Get-DivHTML -UID "MyUID" -Notes "Some notes below the chart") #Start and Finish times $todayMidnight = (Get-Date -Hour 0 -Minute 0 -Second 0).AddMinutes(-1) $metrics = "cpu.usagemhz.average","mem.usage.average","disk.usage.average","net.usage.average","cpu.ready.summation","mem.vmmemctl.average" $start = $todayMidnight.AddDays(-7) #If changed consider changing hAxis.format in $VisParam to include the time. https://developers.google.com/chart/interactive/docs/gallery/linechart $finish = $todayMidnight $startstring = $start.ToString("dddd, dd MMMM yyyy HH:mm") $finishstring = $finish.ToString("dddd, dd MMMM yyyy HH:mm") Out-LogFile -Message "Getting stats from vCenter" #Variable for all stats combined $Stats = Get-Stat -Entity $vms -Stat $metrics -Start $start -Instance "" -Finish $finish -IntervalSecs "1800" #Instance "" accounts for machines with multiple CPU's or NICS, gets machine average Out-LogFile -Message "Got stats from vCenter" Out-LogFile -Message "Sorting and filtering stats" #Split stats out by each indivial metric into individual variable $CPU = ($Stats | Where-Object {$_.MetricId -eq $metrics[0]} | Sort-Object TimeStamp |Group-Object -Property Timestamp) $Memory = ($Stats | Where-Object {$_.MetricId -eq $metrics[1]} | Sort-Object TimeStamp |Group-Object -Property Timestamp) $Disk = ($Stats | Where-Object {$_.MetricId -eq $metrics[2]} | Sort-Object TimeStamp |Group-Object -Property Timestamp) $Net = ($Stats | Where-Object {$_.MetricId -eq $metrics[3]} | Sort-Object TimeStamp |Group-Object -Property Timestamp) $Ready = ($Stats | Where-Object {$_.MetricId -eq $metrics[4]} | Sort-Object TimeStamp |Group-Object -Property Timestamp) $Balloon = ($Stats | Where-Object {$_.MetricId -eq $metrics[5]} | Sort-Object TimeStamp |Group-Object -Property Timestamp) #Creates HTML inside of <head> for javascript for the charts Out-LogFile -Message "Creating HTML" $HTMLOut = $HTMLPreString + (Get-DataTable -Statistics $CPU -UID "CPU" -Title "CPU (MHz)") $HTMLOut += (Get-DataTable -Statistics $Memory -UID "Memory" -Title "Memory (%)") $HTMLOut += (Get-DataTable -Statistics $Disk -UID "Disk" -Title "Disk Activity (KBps)") $HTMLOut += (Get-DataTable -Statistics $Net -UID "Net" -Title "Network I/O (KBps)") $HTMLOut += (Get-DataTable -Statistics $Ready -UID "Ready" -Summation $true -Title "CPU Wait Time (%)") $HTMLOut += (Get-DataTable -Statistics $Balloon -UID "Balloon" -Summation $true -Title "Memory allocated to the balloon driver (KB)") $HTMLOut += "</head>$nl" $HTMLOut += $HTMLBodyBegin + $nl #Navigation Tabs... #Edit below to add a tab, when adding a new metric $HTMLOut += @" <div id="content"> <ul class="nav nav-tabs"> <li class="active"><a href="#Info" data-toggle="tab">Information</a></li> <li class="dropdown"> <a href="#" class="dropdown-toggle" data-toggle="dropdown">CPU<b class="caret"></b></a> <ul class="dropdown-menu"> <li><a href="#CPU" data-toggle="tab">CPU Usage</a></li> <li><a href="#Ready" data-toggle="tab">CPU Wait Time</a></li> </ul> </li> <li class="dropdown"> <a href="#" class="dropdown-toggle" data-toggle="dropdown">Memory<b class="caret"></b></a> <ul class="dropdown-menu"> <li><a href="#Memory" data-toggle="tab">Memory Usage</a></li> <li><a href="#Balloon" data-toggle="tab">Memory Balloon</a></li> </ul> <li> <li><a href="#Disk" data-toggle="tab">Disk</a></li> <li><a href="#Net" data-toggle="tab">Network</a></li> </ul> <div id="my-tab-content" class="tab-content"> <div class="tab-pane fade in active" id="Info"> <div class="chart_wrap"> <div class="alert alert-info"> <strong>Information: </strong> "@ #Info for fist tab $HTMLOut += "Each datapoint represents resource consumption since the last datapoint ` and its value is either an average, maximum, or summation of all usage in that interval. ` Any values that are zero may actually be zero, or may indicate statistics were not ` collected over that period (for example, if a virtual machine was powered off). $nl ` The statistics displayed are from $startstring to $finishstring</div>$nl" #Table that contains VM resource config & limits. $HTMLOut += "<table class=`"mytable table table-striped table-bordered`"><thead><tr><td>VM Name</td><td>Number of CPU's</td><td>Memory (MB)</td><td>CPU Limit</td><td>Memory Limit</td></tr></thead>$nl<tbody>$nl" $VCVMs | % { $tmpname =$_.Name $tmpNumCpu = $_.NumCpu $TmpMemoryMB = $_.MemoryMB $tmpCPULimit = $_.VMResourceConfiguration.CPULimitMhz.ToString().Replace("-1","None") $tmpMemLimit = $_.VMResourceConfiguration.MemLimitMB.ToString().Replace("-1","None") $HTMLOut += " <tr><td>$tmpname</td><td>$tmpNumCpu</td><td>$TmpMemoryMB</td><td>$tmpMemLimit</td><td>$tmpCPULimit</td></tr>$nl" } $HTMLOut += "</tbody></table>$nl" $HTMLOut +=@" </div> </div> "@ #Div elements that contain each chart $HTMLOut += (Get-DivHTML -UID "CPU" -Notes "Average CPU usage, as measured in megahertz, during the interval") $HTMLOut += (Get-DivHTML -UID "Memory" -Notes "Average memory usage as percentage of total configured or available memory") $HTMLOut += (Get-DivHTML -UID "Disk" -Notes "Average disk activity (combinded read & write) in KBps") $HTMLOut += (Get-DivHTML -UID "Net" -Notes "Average network utilization (combined transmit and receive rates) during the interval") $HTMLOut += (Get-DivHTML -UID "Ready" -Notes "The percentage of time that the virtual machine was ready, but could not get scheduled to run on the physical CPU. Values of less than 10% are considered normal") $HTMLOut += (Get-DivHTML -UID "Balloon" -Notes "Amount of memory allocated by the virtual machine memory control driver (vmmemctl), which is installed with VMware Tools. This value should remain at 0 or close to 0") $HTMLOut += @" </div> </div> </div> "@ $datenow = Get-Date -Format "F" $HTMLOut += "<h6>Report generated at $datenow<h6>$nl" $HTMLOut += $HTMLPostString #Finished HTML Out-LogFile -Message "Finished building HTML, writing to $Outfile" $HTMLOut | Out-File -FilePath $Outfile -Encoding "UTF8" #Build Email $body =@" <P>Performance statistics for the Virtual Machines listed below are attached</p> "@ $body += "<p>Statistics are from $startstring to $finishstring<p>" $VMs | % {$body+= "<li>$_</li>" } Out-LogFile -Message "Sending email. Email:$email. SMTP Server:$SMTPServer" #Send email Send-MailMessage -Attachments $Outfile -Body "$body" -BodyAsHtml:$true -Subject "Performance Statistics" -To $email -From $SendersAddress -SmtpServer $SMTPServer Disconnect-VIServer -Confirm:$false Out-LogFile -Message "Disconnected from vCenter" Out-LogFile -Message "Finished"
combined_dataset/train/non-malicious/sample_3_56.ps1
sample_3_56.ps1
ConvertFrom-StringData @' id_surfacepro3detectfirmwareversions=Detect Surface Pro 3 Firmware Versions id_surfacepro3detectfirmwareversionsdesc=Detected Surface Pro 3 Firmware Versions Update Needed '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9u4k1RmE370TP # A8Tm3un9Zb5c344H2aLd6iD+16euP6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA/9 # Xmn3GE5/gqTySRt3cZsRr37cDkEqjh7E7ymUPctSMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmHhVYimxObgNbvursXie7I1EvFmOY02xfZjC # 9KBCaWuvPTyNAcTmr97hMezAst93fgHA4mthWSLyASoihfJwuB64ufIpmhb1/1cL # NYUctmKiYMDT/U/b4d1ZUgv1hXTz81Bm6o+8e0qAAXSI4XRiUuZYxINoA2OgxSdZ # ailjWZbAjiGvYgvs1zSXoIppkiZJtQEZoeaqW1MW3eqlzQpjisc9bv/2FlpFyKs1 # /MXnaiYohw3ybHqlYgl8mPKM+nuiw1wZxCoyzva2ikNJDwFO8PgeRBTgfI73/tMi # 4/U7yCG5m/1mA+pHhc2AXBHEU8FiGFOj1zSfT4T6uHZ6jsDJr6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBc7uBQJIGUm7Y8OM4sStahQ/MAuqitsFck # O6lHiVfX/AIGZwgI5xF4GBMyMDI0MTAxNzAwMjMyMy44OTlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB # AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv # QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed # zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv # 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY # cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT # EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ # UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7 # b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD # oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe # h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69 # mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2 # t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx # BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X # pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t # aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t # uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM # iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw # psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL # zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR # J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB # 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX # WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV # PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE # K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpv2TAi # GA8yMDI0MTAxNjE3MDExM1oYDzIwMjQxMDE3MTcwMTEzWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqum/ZAgEAMAcCAQACAghjMAcCAQACAhL6MAoCBQDqu8FZAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAIuPeJEugjcfrJV0dIkhqUMSj6Jx # 3iRgadzJiwuR/iEWUxhTU8gOGun9rcCFm3umYppbXgsuh7809igGr/ehDJvxaUiw # AAtDWlR2j8tiMLDcOwNOBhlSKF5hvn5n35wEWDpegmb/PTBmPN3G8D/0TL45WRS5 # pYXHZ6/sNc8gZQxSlAtcqj7co05HXUB0JDuoomu3Pwp/sGo0KQaM1yTVPJHjv3Xm # SQPREH90wbRGxGK++zSl/SSd1yRCEwbXBDzFutf+L5MUUX6mX2+snBPzwdknIr4W # QHP1cUj3pQIa+XeamTHwm6GBWwXeWIE4oWfVRGiq1QxC5w7RCR3Em6z6V4ExggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+ # MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCXdb6A/Bieu8rdId3yZT+CJXf3 # n90zjMuUP5MtdR7YozCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0u # MVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgWYHxiR74 # jMaMh+s9xXYccKg8Afskta3kon5CuLtJw2AwDQYJKoZIhvcNAQELBQAEggIAsxJY # NLTHijwNPV8u4yKbEY9jECavfMHL+2YkN3CbkWQ7ueWNmokFHyWd7mLUFaRGIU7m # q9/qj/igwb+cnQqENgTQ65g2MTSyl56dmaeB/1nBXLX5Xd+sjbgD4mEstqT7IACO # gA+4KrTgCkLcTgf/1oMU8E/u0kSJWMtiCdjowexCBKPU+FFvXx1kWqXf0fTzVrtw # lGa/7J1r8YmTzh3vViAyUAR2ZLrvcVefYHVf6Y/yFsti2+sBQmdSHSXL8D+bKnTw # 5/uDGNbN3Z0y0vLnKFgD4a1ktyFePv0f0US97BDJCj83YVMUv50eUqJW4zrAzLoN # nlfieqR3k+UWqE/BYCVJ8fMO9JVDdezqCnQSau/xZvDO1N/zb6N1E0bUWkDWjSdH # b+1XhwR/nC21NtEMqbqoxMODIZ/DhBmIi83wv8dk7FhnBL5xt4IA82W01CBhyX83 # oU5cDOM9mYenWzAFw0IAzA4IdS5wmXB5749iO2LWdAaJj+PMuLybiARpkrfml5Fj # AQtTBAoqdG0SLMaeV4x6KYG0TR3faa1R/wUmu8sVaxv93XWo8/NpEH4pViJe+59b # IBo00DWUYEcWusKYUHJ19bH8MdgPwf4EsQ4eSS6LTdMcHY6Cq7l4hRH6NxR3KQpc # HspsnALtHPangWeawEJfwu0ILy1osAkulTdgXZc= # SIG # End signature block
combined_dataset/train/non-malicious/sample_48_47.ps1
sample_48_47.ps1
/*--------------------------------------------------------- * Copyright (C) Microsoft Corporation. All rights reserved. *--------------------------------------------------------*/ define("vs/languages/typescript/project/projectResolver.nls.keys",[],{}); // SIG // Begin signature block // SIG // MIIkXAYJKoZIhvcNAQcCoIIkTTCCJEkCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // nkQshafsrqW+R/3694nMqAos0U3qJwjnr+y8Xjpy8ymg // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAAVKbQJ9QVpl1iAAA // SIG // AAABUjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTE5MDUwMjIxMzc0NloX // SIG // DTIwMDUwMjIxMzc0NlowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // saeJ0/an7vTtdIicnsGFx5TflhIe/TaKK/Z4TOnp1DWw // SIG // m4V/b0vvHP93iFWs0mJ1QU6i81u8VjdWwnCLQ27BMyhB // SIG // NgbMErp+yfcQmi8HBhyha/qllJc+4YfUXJo2EpDhjcmz // SIG // n64I97JtA0raCvJY8BMlFXkXzB8fRP+wmvzhKtnFwU9y // SIG // 9H1Z5RJH2pd9dBBQiw6NgaxN+TRkYxvv552YqiqhIeZV // SIG // jZN9yVfPyNHyHFCqyxJlBq79AoAu8NnI5mwYQSCftCs0 // SIG // p0lop4F6Jf94lHQQcuEEDR++u5GBrpyXmNPEYxzCIIyQ // SIG // nQKBDPtpl79aYWle4/jN3Tc2f3HbM96A3wIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFN3/AMNbFu9lnCdm6P0EmBs1 // SIG // a0WHMFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis0NTQxMzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQCU8ETmh76IF4IsVo8o7y34kYKiNkCv // SIG // BqBtt3qgIDY1+1f1nVFgW7NGiAt5OPXHdM3aviSSJosX // SIG // F+lDk6c9i2TxUodt5dPzKN+cBuyV1MYDtFPuXa20Ibec // SIG // aDJdZ+/00OIinJgGEgD8U6uZRZ6FdvnwHpY1QOzuN7M4 // SIG // 7Oy0dPQ9MBR8M2XKP4hPB5WpJdt2U+xZweQH1NocH7/O // SIG // 8t6t2uahYroEspCC6StP76p5RFQdCgHUFc2FC0P1OHhR // SIG // I54rNybPVKwL7SISLNuuOOUY91D+lOBoDo4EKJ5UQPpg // SIG // 5bIe/MBUhmwEiLyvn5DjVIb4/AfGRzZ+ExX53LfmtGbn // SIG // mOH+mkT8a/G3jUlCp+0FvxUJp+NtmxOyn56lp3LB+72z // SIG // YRvdvaa1Rz7GmuydtovcMh4+5tKAE1yfmI38qBALXefz // SIG // ciGGhOFLtI9RIbmFKOVWiSZzGkxEdKl/Pv2GUVqxTf4X // SIG // qbONVzVY4gGsKWwGtH1Gt0fUTQYz4gZzNILzT6KzOHbF // SIG // dlSfBpbiEDqyZTr7gqzmAxoqxp2nTpkNtcDwaBhQlqSu // SIG // ej8c5YirMuTTZgF3BMe0G/b1I2NVpWLa3cDl06cTeLJc // SIG // yIbevQWmZSyIy1VsKiH7ja4RyjQzPSvr+74KyG3+5ef+ // SIG // uuYNII0AgwjekObMbrbUwBCrSXkv6ZKSPg22fzCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghYvMIIWKwIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAABUptAn1BWmXWIAAAAAAFSMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCs0ldtb0Q9JerG // SIG // P2QeUCqcigno07yhJWN2GOdAV+rmGzBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAIbEdg95aVwG2UTHAABs53Lr9rntdSWW // SIG // qMH19BJUoYFXgrk+TwA4urAmUqpsAypjsAgm41+fMnL2 // SIG // qPYmfry5KrDpKyuMnt4LQpidi+GDamcjHb7vDrRjI3qZ // SIG // Kx/IDibgiCavcJQlnaHFvPKFjpzes8kDLrIYelrnYaXd // SIG // U05+A+QAdX85voZwaKKBiXygiavWMpRzGMRs0WYbOLTy // SIG // 0GQ2nsymEEtc3JdV24nogGpXFL1zVoX8N6Gpq160fDIQ // SIG // Uzz2ip2WmXAw1cqC/IsLX3opQ09GEirT7XHLK+Z8lqc8 // SIG // 1s0yg/zLrJGVnrE7K4ptqi6uufSt84qWwSyLunovM/gb // SIG // xoihghO5MIITtQYKKwYBBAGCNwMDATGCE6UwghOhBgkq // SIG // hkiG9w0BBwKgghOSMIITjgIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBWAYLKoZIhvcNAQkQAQSgggFHBIIBQzCCAT8C // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // ifkSVsviK+kgyI0pdsvlBdrEMx63euevuXES2ky17m0C // SIG // Bl4g8WA4HxgTMjAyMDAyMTMyMDAyNTUuNzY4WjAHAgEB // SIG // gAIB9KCB1KSB0TCBzjELMAkGA1UEBhMCVVMxEzARBgNV // SIG // BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx // SIG // HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp // SIG // MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVl // SIG // cnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO // SIG // OjU4NDctRjc2MS00RjcwMSUwIwYDVQQDExxNaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIPITCCBPUwggPd // SIG // oAMCAQICEzMAAAEFBznqWfNVvyoAAAAAAQUwDQYJKoZI // SIG // hvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwHhcNMTkwOTA2MjA0MTE4WhcNMjAxMjA0MjA0MTE4 // SIG // WjCBzjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMg // SIG // TWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28x // SIG // JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjU4NDctRjc2 // SIG // MS00RjcwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T // SIG // dGFtcCBTZXJ2aWNlMIIBIjANBgkqhkiG9w0BAQEFAAOC // SIG // AQ8AMIIBCgKCAQEAzCKWY1VIi1kBqgxSy2nhn4XPW8Qs // SIG // IvB0MfoHGheWc9hqHYTO9aMo2perqp0TPEB8Y+PbihZm // SIG // P0lhIZVfrKNyK5hB1S5rJHhEGoqOT8VYFFkZvrASCaUv // SIG // Ro8Cqxj2drm+Ek9ifX7uRcW305icgdgC+lu1nElDjfLc // SIG // rs9vzUQCCOmLqI3TGupo1V2pi9gEuzwaNRluD2uF2zYR // SIG // EKAOP7IkuCRm3HwMFTBr/O24SmqQ6qVy2w6ui2xXSwL+ // SIG // 0O3lB4h0uHnHF0TRgJ6ZHYRziu7NTvRaqUWWLG8f1KZG // SIG // qMqokHvyRUwPtZHmGbGYGkKoDzaRmA+dEgw8kGdr7Tce // SIG // ylYF7QIDAQABo4IBGzCCARcwHQYDVR0OBBYEFD10G/66 // SIG // dyhMyug2DstxZ/0CMzciMB8GA1UdIwQYMBaAFNVjOlyK // SIG // MZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG // SIG // RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3Js // SIG // L3Byb2R1Y3RzL01pY1RpbVN0YVBDQV8yMDEwLTA3LTAx // SIG // LmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKG // SIG // Pmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy // SIG // dHMvTWljVGltU3RhUENBXzIwMTAtMDctMDEuY3J0MAwG // SIG // A1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYBBQUHAwgw // SIG // DQYJKoZIhvcNAQELBQADggEBAKfOYXd7awFX5lQD5nDg // SIG // KpzOO021gfUtMkhhv3jbyH4YGAtGIwixGYYokMjnkU8L // SIG // NJSDlhr+7TOba+9ERszaNfwu0kGnakNnU+bFI+xmuixz // SIG // tnsXHc0b1CMHXjmlbmo+FaYl54YzwUbtglTRlz3tXe2c // SIG // 8O3YvMYdg+qKGQY4Ry4e8hn9mRYwYy3A1Y632i8HeGKn // SIG // nyYIONrPBDFKF87E6T5UtCASlnl/kWwcnDlIV6Svapbx // SIG // WwUBqeDfrixFeoWht96FTrVsK24buRdBOFA87BVGmfDg // SIG // C8iq2kdXSKPmVPs46Z9zWuylJK0/9VBWHZ1mMKFA5vXv // SIG // g5gYanYVJcSIUZ8wggZxMIIEWaADAgECAgphCYEqAAAA // SIG // AAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBD // SIG // ZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3 // SIG // MDEyMTM2NTVaFw0yNTA3MDEyMTQ2NTVaMHwxCzAJBgNV // SIG // BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD // SIG // VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg // SIG // Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU // SIG // aW1lLVN0YW1wIFBDQSAyMDEwMIIBIjANBgkqhkiG9w0B // SIG // AQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6 // SIG // f2mUa3RUENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AV // SIG // UycEMR9BGxqVHc4JE458YTBZsTBED/FgiIRUQwzXTbg4 // SIG // CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4Yy // SIG // hB50YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxG // SIG // wScdJGcSchohiq9LZIlQYrFd/XcfPfBXday9ikJNQFHR // SIG // D5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR // SIG // togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJ // SIG // RF1eFpwBBU8iTQIDAQABo4IB5jCCAeIwEAYJKwYBBAGC // SIG // NxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8RhvF // SIG // M2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBB // SIG // MAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8G // SIG // A1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYG // SIG // A1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0Nl // SIG // ckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO // SIG // MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIw // SIG // MTAtMDYtMjMuY3J0MIGgBgNVHSABAf8EgZUwgZIwgY8G // SIG // CSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9k // SIG // ZWZhdWx0Lmh0bTBABggrBgEFBQcCAjA0HjIgHQBMAGUA // SIG // ZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt // SIG // AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aI // SIG // UQ3ixuCYP4FxAz2do6Ehb7Prpsz1Mb7PBeKp/vpXbRkw // SIG // s8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7uVOM // SIG // zPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/G // SIG // f/I3fVo/HPKZeUqRUgCvOA8X9S95gWXZqbVr5MfO9sp6 // SIG // AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9Va8v/rbl // SIG // jjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFj // SIG // nXshbcOco6I8+n99lmqQeKZt0uGc+R38ONiU9MalCpaG // SIG // pL2eGq4EQoO4tYCbIjggtSXlZOz39L9+Y1klD3ouOVd2 // SIG // onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnf // SIG // XXSYIghh2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fe // SIG // cn5ha293qYHLpwmsObvsxsvYgrRyzR30uIUBHoD7G4kq // SIG // VDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98is // SIG // TtoouLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99j // SIG // e/WZii8bxyGvWbWu3EQ8l1Bx16HSxVXjad5XwdHeMMD9 // SIG // zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341 // SIG // Hgi62jbb01+P3nSISRKhggOvMIIClwIBATCB/qGB1KSB // SIG // 0TCBzjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMg // SIG // TWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28x // SIG // JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjU4NDctRjc2 // SIG // MS00RjcwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T // SIG // dGFtcCBTZXJ2aWNloiUKAQEwCQYFKw4DAhoFAAMVANJ5 // SIG // nOzIh9j69Md959d2YOEZVfaqoIHeMIHbpIHYMIHVMQsw // SIG // CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ // SIG // MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z // SIG // b2Z0IENvcnBvcmF0aW9uMSkwJwYDVQQLEyBNaWNyb3Nv // SIG // ZnQgT3BlcmF0aW9ucyBQdWVydG8gUmljbzEnMCUGA1UE // SIG // CxMebkNpcGhlciBOVFMgRVNOOjRERTktMEM1RS0zRTA5 // SIG // MSswKQYDVQQDEyJNaWNyb3NvZnQgVGltZSBTb3VyY2Ug // SIG // TWFzdGVyIENsb2NrMA0GCSqGSIb3DQEBBQUAAgUA4e/+ // SIG // ajAiGA8yMDIwMDIxNDAwNTcxNFoYDzIwMjAwMjE1MDA1 // SIG // NzE0WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDh7/5q // SIG // AgEAMAkCAQACASMCAf8wBwIBAAICGDswCgIFAOHxT+oC // SIG // AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoD // SIG // AaAKMAgCAQACAxbjYKEKMAgCAQACAwehIDANBgkqhkiG // SIG // 9w0BAQUFAAOCAQEAK0SVgnt1ExNy97OLIhzsxeqZtm1g // SIG // btiCy4Le1I2YGsLsAyRGr2uWt1pz0I20W95i2iyKQ2Ug // SIG // N/TVpWJfyQ/JEjeznZSWuXDCazFaE84RJy1xXp0o5iou // SIG // AwVRgfaXX2Jbegi7LY9HbOp8+RzU/aYOg0zXyZ9lcrOL // SIG // IHClQ2dr+ZEPLHlzblhO2sNPaJgnYT6vpxT9KOCyf0QZ // SIG // xOje35zPrL/BOkiQcqEoSFPRK+Qbzb1tIlY38vsOOgfG // SIG // GpfbpUBqI3pkYbwQmv8KoCQCPp1tzjj2CrgiKWDV6YbG // SIG // wrd0rvPWSpG5vo0kLVMdKWGLD25we1+Azj/pNWJ772Rv // SIG // LAotbzGCAvUwggLxAgEBMIGTMHwxCzAJBgNVBAYTAlVT // SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS // SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y // SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 // SIG // YW1wIFBDQSAyMDEwAhMzAAABBQc56lnzVb8qAAAAAAEF // SIG // MA0GCWCGSAFlAwQCAQUAoIIBMjAaBgkqhkiG9w0BCQMx // SIG // DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIL1R // SIG // BNqjTVm2Mq9hfa9OmTL7AMvc9ekq+GCtnK7+p4P9MIHi // SIG // BgsqhkiG9w0BCRACDDGB0jCBzzCBzDCBsQQU0nmc7MiH // SIG // 2Pr0x33n13Zg4RlV9qowgZgwgYCkfjB8MQswCQYDVQQG // SIG // EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE // SIG // BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv // SIG // cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt // SIG // ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAQUHOepZ81W/KgAA // SIG // AAABBTAWBBSyIOWTQzwdULy+NYafQEi7/SDhcTANBgkq // SIG // hkiG9w0BAQsFAASCAQAWkjWf62EiJ2smhxoav7bLjmTC // SIG // +OWti/pAMW3h7CIfkkI5p7eg8D/6GyoPpy4oCmWk1wpw // SIG // 45pxqu2eSF7drkVAV7ofOMa/2J73dCUBD88XPZNR5c86 // SIG // g72Ifx5I5OwWWgnKB/GM51Qf64ulqtOSVxVYkGrhmki0 // SIG // LF8CT7KlfXSEQgfF9Ir2pCaC6EcWQWaRS5OgXX34qzdw // SIG // 5GtX4ST7pq8OUE3rushpnZ/QZzSu3gF2zYGE/pxlU6jQ // SIG // Kuoc8FFDiX9gTg2OrXjEacOfVKjuNvEyy9f5CMf0tzyA // SIG // 16QPbKjpReozr+kVYtVgg7UjsMcJ6RDO87KRFWMnGQKI // SIG // B5ePTxe9 // SIG // End signature block
combined_dataset/train/non-malicious/ISEFun_1.psm1.ps1
ISEFun_1.psm1.ps1
# Module version 0.2 # Author: Bartek Bielawski (@bielawb on twitter) # Purpose: Add functionality to PowerShell ISE # Description: Adds Add-ons menu 'ISEFun' with all functions included. # User can add any action there using Add-MyMenuItem function # One of functions (Copy item from history) was build using WPK - won't work if the latter is not loaded. # There is also pretty large code for Windows Forms form (change token colors using ColorDialog) # Edit-Function will allow you modify any function in ISE editor # Expand-Alias will expand aliases in current file # Edit-HelpExample will create new file $with all examples from a given command # Show-Top will generate table of processes sorted by a given Property in separate ISE Tab, with new/ terminated processes marked # Update-SnippetMenu and New-Snippet are designed to work with custom code snippets. # Have ISE - Fun! ;) # Changes: # Version 0.2 # * Added function Edit-HelpExample # * Added function Show-Top # * Added custom snippets support (add/ use) # Version 0.1 # * First public version # * Cleaned code, added help # * Contains functions: Edit-Function, Add-MenuItem, Set-TokenColor, Expand-Alias, Invoke-CurrentLine, Copy-HistoryItem # * Simple menu with all functions included, together with helper function (Add-MenuItem) that should simplify adding new items if needed. if (-not ($MyISEMenu = $psISE.CurrentPowerShellTab.AddOnsMenu.Submenus | Where-Object { $_.DisplayName -eq 'ISEFun'} ) ) { $MyISEMenu = $psISE.CurrentPowerShellTab.AddOnsMenu.Submenus.Add('ISEFun',$null,$null) } # Helper function to add menu items, exported cause it can be used also for other stuff. :> function Add-MyMenuItem { <# .Synopsis Adds items to ISEFun Add-Ons sub-menu .Description Function can be used to add menu items to ISEFun menu. All you need is command, name and hotkey - we will take care of the rest for you. ;) .Example Add-MyMenuItem 'Write-Host fooo' 'Fooo!' 'CTRL+9' Description ----------- This command will add item 'Fooo!' to ISEFun menu. This item will write 'fooo' to the host and can be launched using shortcut CTRL + 9 #> PARAM ( # Script that will be launched when menu item will be selected [Parameter(Mandatory = $true, HelpMessage = 'Command that you want to add to menu')] [string]$Command, # Title for the command in the menu [string]$DisplayName, # Hot key to use given item [string]$HotKey = $null, # If specified - will create submenu to hold given command [string]$SubMenu = $null ) if (!$DisplayName) { $DisplayName = $Command -replace '-',' ' } if (!$SubMenu) { $Menu = $Script:MyISEMenu } elseif ($Menu = $MyISEMenu.Submenus | Where-Object { $_.DisplayName -eq $SubMenu }) { if (!($Menu.submenus)) { $Menu = $Script:MyISEMenu } } else { $Menu = $MyISEMenu.Submenus.Add($SubMenu,$null,$null) } if ( -not ($Menu.Submenus | Where-Object { $_.DisplayName -eq $DisplayName} ) ) { try { [void]$Menu.Submenus.Add($DisplayName,[scriptblock]::Create($Command),$HotKey) } catch { # Probably hotkey already used, adding item without it [void]$Menu.Submenus.Add($DisplayName,[scriptblock]::Create($Command),$null) } } } Add-MyMenuItem Add-MyMenuItem 'Add items' function Update-SnippetMenu { <# .Synopsis Updates/ creates custom snippet menu. .Description This function will take any snippets that you have in location (either default or selected one) and add those to ISEFun 'Code Snippets' menu. It uses .ps1 file to make it easier to modify files in ISE (with syntax highlighting and stuff...) .Example Update-SnippetMenu Checks for files in $PSScriptRoot\\ISESnippets folder and add them to 'Code Snippets' menu. #> param ( [string]$Path = "$PSScriptRoot\\ISESnippets" ) foreach ($file in Get-ChildItem $Path -filter *.ps1) { $command = @" if (!(`$file = `$psISE.CurrentFile)) { `$file = `$psISE.CurrentPowerShellTab.Files.Add() } `$file.Editor.InsertText( `$( (Get-Content $($file.FullName)) | Out-String ) ) "@ $Name = $file.BaseName -replace '_', ' ' Add-MyMenuItem $command "Instert $Name" $null 'Code Snippets' } } Add-MyMenuItem Update-SnippetMenu 'Adds/ updates code snippets menu' function New-Snippet { <# .Synopsis Creates new snippet from current file/ selection. .Description This function will create new snippets for you. To simplify usage in ISE it has mandatory parameter for snippet name (GUI prompt). It will by default store snippets under modules root folder in 'ISESnippets'. .Example New-Snippet -SnippetName 'My funny name that will have underscore instead of **?? special \\ chars' Will create new file (with rather odd name) with current selection (or file, if nothing was selected). All special chars and spaces will be replace with underscore ( _ ). #> param( [Parameter(Mandatory = $true, HelpMessage = 'Please specify name of the snippet')] [Alias("SN","Name")] [string]$SnippetName, [string]$Path = "$PSScriptRoot\\ISESnippets" ) if ($file = $psISE.CurrentFile) { if (!($Value = $file.Editor.SelectedText)) { $Value = $file.Editor.Text } } else { Write-Error "No files opened in this tab!" return } $Name = ($SnippetName -replace '[\\s+\\\\\\*\\?]', '_') + '.ps1' New-Item -Force -ItemType file -Path (Join-Path $Path $Name) -Value $Value | Out-Null } Add-MyMenuItem New-Snippet 'Create new snippet from selection/ file' function Show-Top { PARAM ( [int]$Count = 20, [int]$Sleep = 5, [string]$Property = 'WS' ) $TopTab = $psISE.PowerShellTabs.Add() sleep 10 if ($TopTab.CanInvoke) { $TopTab.DisplayName = "TOP$Count - $Property" $psISE.PowerShellTabs.SetSelectedPowerShellTab($TopTab) $TopTab.Invoke([scriptblock]::Create(@" Register-WmiEvent -Query "SELECT * From Win32_ProcessStartTrace" Register-WmiEvent -Query "SELECT * From Win32_ProcessStopTrace" `$formaterS = "{0,10} {1,10} {2,10} {3,10} {4,10} {5,10} {6,10} {7,-30}" `$formaterD = "{0,10} {1,10:N0} {2,10:N0} {3,10:N0} {4,10:N0} {5,10:N2} {6,10} {7,-30}" while (`$true) { function prompt { `$psISE.PowerShellTabs.Remove(`$psISE.CurrentPowerShellTab) } Clear-Host 'TOP for PowerShell ISE - from ISEFun module' '=' * 50 `$Processes = Get-Process `$Started = @(Get-Event | where { `$_.SourceEventArgs.NewEvent.__Class -match 'Start' } | foreach { `$_.SourceEventArgs.NewEvent.ProcessID }) `$Stopped = @(Get-Event | where { `$_.SourceEventArgs.NewEvent.__Class -match 'Stop' } | foreach { `$_.SourceEventArgs.NewEvent.ProcessID }) `$Processes += `$DisplayedProcess | where { `$Stopped -contains `$_.Id } `$Processes = `$Processes | sort -Descending $Property `$DisplayedProcess = `$Processes | select -First $Count `$formaterS -f `$('Handles NPM(K) PM(K) WS(K) VM(M) CPU(s) Id ProcessName'.Split()) `$formaterS -f `$(@('-' * 10) * 8) foreach (`$process in `$DisplayedProcess) { `$ProcessString = `$formaterD -f `$process.Handles, `$(`$process.NPM / 1KB), `$(`$process.PM/1KB), `$(`$process.WS / 1KB), `$(`$process.VM / 1MB), `$process.CPU, `$process.Id, `$(`$process.Name -replace '(^.{0,29}).*', '`$1') if (`$Stopped -contains `$process.id) { `$ProcessString + "==> PROCESS TERMINATED" } elseif (`$Started -contains `$process.id) { `$ProcessString + "<== NEW PROCESS ADDED" } else { `$ProcessString } } Get-Event | Remove-Event "Diplay $Count processes out of `$(`$Processes.Count)" sleep $Sleep } "@)) } } Add-MyMenuItem Show-Top function Edit-HelpExample { <# .Synopsis Simple function to copy help examples (as useable code) and it's description (as comments) to empty file in ISE .Description If you want to see what examples are available for a given command - that function is for you. It can easily get all examples in a way that you can just highlight them and get results back. Only basic testing done, so probably something is still missing... .Example Get-HelpExample Get-ChildItem Copies all 7 examples from Get-ChilItem cmdlet to empty file. .Example Get-HelpExample Get-HelpExample If I did everything right you will probably see this command, text that I'm currently typing and anything above/ below in this section of function #> param ( # Name of the command that will be used to get examples [Parameter(Mandatory = $true, HelpMessage = 'Name of the command that will be used to get examples')] [ValidateScript( { (Get-Help $_).Examples.example })] [string]$Name ) if ($psISE) { $Editor = $psISE.CurrentPowerShellTab.Files.Add().Editor $Editor.InsertText("# Examples from help - $Name`n") foreach ($example in (Get-Help $Name).Examples.example) { $Editor.InsertText(@" <# START :=> $(($example.title) -replace '-') $(($example.remarks | select -ExpandProperty text | where { $_ }) -join "`n") END :=> $(($example.title) -replace '-') #> $(($example | select -ExpandProperty code) -replace '(?m:^C:(\\\\\\w*)+>)') "@) } } else { throw "You must use this function/ script in PowerShell ISE!" } } Add-MyMenuItem Edit-HelpExample 'Edit Help Example' # Next few lines are just garbage you get when you wanna be smart and create GUI in the script. # Forgive me for adding this stuff here, I could probably compile it in some dll and skip this but... # ... well - it gives impression that my module is bigger than it actually is. ;) # # Our form to change colours... :) $handler_bClose_Click= { $Main.Hide() } $handler_bColor_Click= { $Dialog = New-Object Windows.Forms.ColorDialog -Property @{ Color = [drawing.color]::FromArgb($psISE.Options.TokenColors.Item($Combo.SelectedItem).ToString()) FullOpen = $true } if ($Dialog.ShowDialog() -eq 'OK') { $psISE.Options.TokenColors.Item($Combo.SelectedItem) = [windows.media.color]::FromRgb($Dialog.Color.R, $Dialog.Color.G, $Dialog.Color.B) $Combo.ForeColor = $Dialog.Color } } $handler_selectedValue = { $Combo.ForeColor = [drawing.color]::FromArgb($psISE.Options.TokenColors.Item($Combo.SelectedItem).ToString()) $bColor.Focus() } $OnLoadForm_StateCorrection = { $Main.WindowState = $InitialFormWindowState } $Script:Main = New-Object Windows.Forms.Form -Property @{ Text = "Token colors selector" MaximizeBox = $False Name = "Main" HelpButton = $True MinimizeBox = $False ClientSize = New-Object System.Drawing.Size 426, 36 } $Main.DataBindings.DefaultDataSourceUpdateMode = 0 $Combo = New-Object Windows.Forms.ComboBox -Property @{ FormattingEnabled = $True Size = New-Object System.Drawing.Size 239, 23 Name = "Combo" Location = New-Object System.Drawing.Point 12, 7 Font = New-Object System.Drawing.Font("Lucida Console",11.25,0,3,238) TabIndex = 4 DropDownStyle = 'DropDownList' } $Combo.DataBindings.DefaultDataSourceUpdateMode = 0 $Combo.Items.AddRange($psISE.Options.TokenColors.Keys) $Combo.Add_SelectedValueChanged($handler_SelectedValue) $InitialFormWindowState = New-Object Windows.Forms.FormWindowState $bClose = New-Object Windows.Forms.Button -Property @{ TabIndex = 2 Name = "bClose" Size = New-Object System.Drawing.Size 75, 23 UseVisualStyleBackColor = $True Text = "Close" Location = New-Object System.Drawing.Point 338, 7 } $bClose.DataBindings.DefaultDataSourceUpdateMode = 0 $bClose.add_Click($handler_bClose_Click) $bColor = New-Object Windows.Forms.Button -Property @{ TabIndex = 1 Name = "bColor" Size = New-Object System.Drawing.Size 75, 23 UseVisualStyleBackColor = $True Text = "Color" Location = New-Object System.Drawing.Point 257, 7 } $bColor.DataBindings.DefaultDataSourceUpdateMode = 0 $bColor.add_Click($handler_bColor_Click) $Main.Controls.AddRange(@($bColor,$bClose,$Combo)) $InitialFormWindowState = $Main.WindowState $Main.add_Load($OnLoadForm_StateCorrection) $HelpMessage = @' This GUI will help you change you token colors. It's updating text color as you select tokens that you want to modify. Button 'Color' opens up color dialog. I won't describe actions performed by 'Close' button. I hope you are able to guess it... ;) '@ $Main.add_HelpButtonClicked( { [void][windows.forms.MessageBox]::Show($HelpMessage,'Help','OK','Information')}) function Set-TokenColor { <# .Synopsis GUI to add some Token Colors. .Description Really. It is just that. No more to it. Seriously! OK. GUI is pretty smart. You can select tokens that are available, color will change and match the one you currently have. See for yourself. ;) .Example Can't show you click-click-click example :) #> $Script:Main.ShowDialog()| Out-Null } Add-MyMenuItem Set-TokenColor function Expand-Alias { <# .Synopsis Function to expand all command aliases in current script. .Description If you want to expand all aliases in a script/ module that you write in PowerShell ISE - this function will help you with that. It's using Tokenizer to find all commands, Get-Alias to find aliases and their definition, and simply replace alias with command hidden by it. .Example Expand-Alias #> # Read in current file if (!$psISE.CurrentFile) { throw 'No files opened!' } if ( -not ($Script = $psISE.CurrentFile.Editor.Text) ) { throw 'No code!' } $line = $psISE.CurrentFile.Editor.CaretLine $column = $psISE.CurrentFile.Editor.CaretColumn if ( -not ($commands = [System.Management.Automation.PsParser]::Tokenize($Script, [ref]$null) | Where-Object { $_.Type -eq 'Command' } | Sort-Object -Property Start -Descending) ) { return } foreach ($command in $commands) { if (Get-Alias $command.Content -ErrorAction SilentlyContinue) { # $command $psISE.CurrentFile.Editor.Select($command.StartLine, $command.StartColumn, $command.EndLine, $command.EndColumn) $psISE.CurrentFile.Editor.InsertText($(Get-Alias $command.Content | Select-Object -ExpandProperty Definition)) } } $psISE.CurrentFile.Editor.SetCaretPosition($line, $column) } Add-MyMenuItem Expand-Alias function Edit-Function { <# .Synopsis Simpe function to edit functions in ISE. .Description Need to edit function on-the-fly? Want to see how a given function looks like to change it a bit and rename it? Or maybe just preparing module and you want to change functions you define to make sure changes will work as expected? Well, with Edit-Function, which is very simple (thank you PowerShell team!) you can do it. :) .Example Edit-Function Edit-Function Description ----------- You can open any function that exists in your current session, including the function that you reading help to now. Be careful with that one though. If you change it in wrong direction you may not be able to open it again and fix it. At least not in the way you could originaly, with Edit-Function. :) #> [CmdletBinding()] param ( [Parameter(Mandatory=$true,HelpMessage='Function name is mandatory parameter.')] [ValidateScript({Get-Command -CommandType function $_})] [string] $Name ) if (!$psISE) { Throw 'Implemented for PowerShell ISE only!' } $file = $psISE.CurrentPowerShellTab.Files.Add() $file.Editor.InsertText("function $name {`n") $file.Editor.InsertText($(Get-Command -CommandType function $name | Select-Object -ExpandProperty definition)) $file.Editor.InsertText("}") } Add-MyMenuItem Edit-Function function Copy-HistoryItem { <# .Synopsis Function build using WPK to give you functionality similar to one you already have in PowerShell.exe .Description Display you command history and let you choose from it. Copies selected command to you commandPane. .Example Copy-HistoryItem GUI, so it's not easy to show examples... #> try { New-Window -Width 800 -Height 100 { New-ListBox -On_PreviewMouseDoubleClick { $psISE.CurrentPowerShellTab.CommandPane.InsertText($this.SelectedValue) $this.parent.close() } -Items $(Get-History | Select-Object -ExpandProperty CommandLine) } -Show } catch { throw 'Requires WPK to work, will be rewritten soon...' } } Add-MyMenuItem Copy-HistoryItem 'Copy item from History' F7 function Invoke-CurrentLine { $Editor = $psISE.CurrentFile.Editor $row = $Editor.CaretLine $col = $Editor.CaretColumn $Editor.Select($row, 1, $col, $Editor.GetLineLength($row) + 1) [scriptblock]::Create($Editor.SelectedText).Invoke() $Editor.SetCaretPosition($row,$col) } Add-MyMenuItem Invoke-CurrentLine 'Invoke Current Line' F9 New-Alias -Name edfun -Value Edit-Function New-Alias -Name expa -Value Expand-Alias New-Alias -Name cphi -Value Copy-HistoryItem Export-ModuleMember -Function * -Alias * # Get rid off menu if module is going to be unloaded. $MyInvocation.MyCommand.ScriptBlock.Module.OnRemove = { [void]$psISE.CurrentPowerShellTab.AddOnsMenu.Submenus.Remove($MyISEMenu) }
combined_dataset/train/non-malicious/sample_34_69.ps1
sample_34_69.ps1
export function scrollToPrevious(horizontalScrollElement) { horizontalScrollElement.scrollToPrevious(); } export function scrollToNext(horizontalScrollElement) { horizontalScrollElement.scrollToNext(); } export function scrollInView(horizontalScrollElement, viewIndex) { horizontalScrollElement.scrollInView(viewIndex); } // SIG // Begin signature block // SIG // MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // lJNd3LLucubqalFWROYoH3gIZDgNKfF/0X2INnKmaDqg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghoKMIIaBgIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCB21nuM4FNUOCIlyOe8Bf9ZJe7vZLkOW8T7 // SIG // YzNvP0i/wjBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAL2Jg4zn // SIG // WreYLrztEqlqz7SD2Bh2L/8oKT0QhHvkq0GvKDIdWGEZ // SIG // d8BVbNVeEhWjCuA7Ls3Wb7mTMXzJTuWVqicbtG9tJ9L5 // SIG // VCbKPQREEu/HmnfavTQs8ryRyCkkdX1pL7ZE6mvqP0co // SIG // bVbi/2rCFaDfDbUemRc+gZIhKnrvXZ752MO956W7IlbF // SIG // +56KG/boNqR4YDXbzrNS3HhPi8MUNg+UPo6PtFcs4zmS // SIG // ybiB3KGIXbBhyY83cNkxHDpZS1gI4dHjpoi/mo43X3Aj // SIG // OnwNoyi46TGE1qH0aupTxx7ug8zejf+3spXUmRfTPuBi // SIG // yFxrslx5o8T8mnpj/Ks51WLFUvahgheUMIIXkAYKKwYB // SIG // BAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdtMIIX // SIG // aQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN // SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgKR9EGCSp2swoLDHXPB7L // SIG // gBB571LMYKiRoPMVj54pvxECBmYYBR59vhgTMjAyNDA0 // SIG // MTQyMTIwMDIuOTExWjAEgAIB9KCB0aSBzjCByzELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0 // SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo // SIG // aWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYD // SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl // SIG // oIIR6jCCByAwggUIoAMCAQICEzMAAAHt4V/L1felXXMA // SIG // AQAAAe0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTQxWhcN // SIG // MjUwMzA1MTg0NTQxWjCByzELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl // SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO // SIG // Ojg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG // SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEAqDDCbJK66mqcnC8T // SIG // wtR+8w+4PPDaWxGkOko3EyEW8wlcmEDbM/E2i9aahUxA // SIG // Dy9V+6Iy+PxGhFvlIzambP2sjMluGCKRT2T9seBQTFQn // SIG // XbHhdovmjDIwx4tC3E0GcTNrN5hTKwmQFkny2F2AyIph // SIG // Qc/I9KC1hst1YC5gUyjOMS6r+w2VM/AdkqAJmxLaetp4 // SIG // EpdITqDe90hcBPmNuErxkDFocpKRvr1w8HKVr8A3vk4J // SIG // 6y0ewE0RVzeSUtunZtssukmBTEWJzBN3TBwkP1ECEEDQ // SIG // vJy5iL3SpAKFhDF7SbBhKN0KzNktkgb+D6R0c0bpM07T // SIG // /lAHHhsTPScq8FED+TghJlumHIRMkQ0sD+IVPX+wdAMo // SIG // deD8PbyaO43sDY3jDyJJp3si0otK7r9qMf8URrXCfcgT // SIG // QuQWkZLY8+7LT2qI0fjwwNn7gbQqPMSpZLed5lG+wGPg // SIG // mRx6oS5u+qXTBegR79k78JVQXkETdtl42lVUcAoI4CZz // SIG // XsLez3o3K6VJ9Khy4C6vtQTdQ82LpFpE6+8E9M5dIl6/ // SIG // jbalJFkjp1kX3vDdtbQerr91ZFvJxXQobW22Wc9uKXi7 // SIG // SRGbjazfF3/T0zzM2VwyQSNRHIkf/dUHBqGRZlWxVW9q // SIG // 1CALNNfmZHsL24ZhlQ3n1/aGRuPyuIBlLE701vq9SWTM // SIG // VE9jMKkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTOG/Ds // SIG // 994QKgRHypQGX9DSoeAiGTAfBgNVHSMEGDAWgBSfpxVd // SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ // SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz // SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB // SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG // SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j // SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt // SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB // SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G // SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // ndYCtkXfnhi9Hh4vohOv6g2PLG27DuHpmp3Keijzfsau // SIG // WQGrYgUeI5kUYZvvVYpNBaNAy1ovzdvGxSO3V2MNPad7 // SIG // woqW48uBKIn5tDbne/+FN9Ivfu0b1u1zkN68d+/lO76v // SIG // ZZOsmKRgjadI5SdfPPwrkT4KiZ36uRHXmnx9gKBuOoSl // SIG // k3gew7l2rBrerKSTnpxnnUq3t+DFmankyENK2jiLWZxb // SIG // hg8uPsaA9akc9kFvrtoAh2hvAEI4WFDOLk4vbepLbY+n // SIG // O12pq9s61rnHg4c+7Ci7bS0ye8LOWKwNiPHE5WzAH9il // SIG // tBlYym2Bnfi2RnbhCu/+37OBlJDKnOdRbDXRtZ/s4HO8 // SIG // x7tqBhnggYOLPGUdGRcse47IJvbEhQikOQrGwL5a/+tD // SIG // XZOU3jEfCbNpDVInLtgqmdN/N907L04JO4g9Si4H0teh // SIG // xL4zepuFSiSoIyeziSc2m7UuCUIFJyayGX8qLJOA9fK2 // SIG // Z4vaVMDdN1oE5nddFk8ImTruIPFJ+oinDzGP4hak7uJ7 // SIG // ZMxVMQQaWxRupNQiDWZqIqxFpgrRt5cmdiHXZo7SHn05 // SIG // CLxlm+Ccc8+5dpvxNpBjosQyR7GoWVZsLKDb4cuZLv4p // SIG // 1PvnVx88PoZb6k0hU/PayBVYXJrFjwyTzUUkqTIaCd91 // SIG // dmWv5ZCnG5FDNEm0IEvarHcwggdxMIIFWaADAgECAhMz // SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA // SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN // SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp // SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx // SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX // SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD // SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV // SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw // SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA // SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 // SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF // SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc // SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus // SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130 // SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI // SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes // SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp // SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+ // SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz // SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO // SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi // SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5 // SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q // SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H // SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG // SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE // SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf // SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG // SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw // SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv // SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH // SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f // SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK // SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu // SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w // SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq // SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 // SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT // SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL // SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l // SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ // SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz // SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7 // SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY // SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX // SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU // SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz // SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/ // SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1 // SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328 // SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG // SIG // ahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGkgc4w // SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n // SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p // SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV // SIG // BAsTHm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1RTAtRDk0 // SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA7h2sikwmmLGM // SIG // SYfqFk8erlTxcPmggYMwgYCkfjB8MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T // SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOnG // SIG // d9QwIhgPMjAyNDA0MTQxNTQyMTJaGA8yMDI0MDQxNTE1 // SIG // NDIxMlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6cZ3 // SIG // 1AIBADAHAgEAAgJCnjAHAgEAAgITZjAKAgUA6cfJVAIB // SIG // ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMC // SIG // oAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 // SIG // DQEBCwUAA4IBAQBiKapvEvmngT/1eXS0Jzy4cU3Y4vIZ // SIG // FHVgoUli3cqpY7jHN+w44CQiKWDTtIuZKgl15c3nfKgN // SIG // 9MZHhPDgYlaEt8q8I5536RZ9ws7YEBC5cEQ31qngPx/T // SIG // 5KWzbtaYXyifKYJwHtqdR/mSgm0peDaVYX8USXRfgB+p // SIG // KOx+EChFO9zeN+FRKBr31OchBAtGmvbu9SbK2UaOTgin // SIG // vtNXfBqZYbNaW0auXzkYoFXBr0bnWCMiSGSSa+kIUsEb // SIG // jBpVW1Mykm7kKrXHQt1UZEb0UQhlXRe0Y8ZxLYSJx9zV // SIG // oO1wmMP3PywC02KLJmno6quCzbMGrZhow5MmesXnWAXQ // SIG // RCCqMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx // SIG // EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl // SIG // ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh // SIG // dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh // SIG // bXAgUENBIDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0w // SIG // DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzEN // SIG // BgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgZj29 // SIG // xSr+xfCuzQHeEWlRBNMtcAsK+lfcn1K13sqcug4wgfoG // SIG // CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCNLg1oNAhb // SIG // HisStwNepdcKyMK7Eg612esUn9BeMWzKOTCBmDCBgKR+ // SIG // MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n // SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p // SIG // Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB // SIG // 7eFfy9X3pV1zAAEAAAHtMCIEIHNFkKmFH/jeQvR82/a0 // SIG // 5WN20XURvDybpH+Tl6Kma57vMA0GCSqGSIb3DQEBCwUA // SIG // BIICAJ5MKG05mrvylT1SGq+rio1j5Zsgsu38RAFZJS27 // SIG // 9AWO1gvzSoeqeOGModyewSfUrvPK3/HFGMH8X8R5c2Kb // SIG // BttBu/datZ1U16gbPev7tTfvFwzkhGxY7igA3ffIDNRG // SIG // SEZmDjsjcHMHFgvkf2zUTeDNUEn3sHEAvu24fA1P/7Ff // SIG // HZnWuFqcoDcgfOl1kqBaTbIINwoTrlNgk5CIsZpyhk/z // SIG // k4jXYUXUXyqsa5Xi+P1SxYlaJDj6nrEH+fs2c2D6ivux // SIG // qRdqsE8o+mXvFRs7bl6RphaEK43ssEoHra4gr/OPicfk // SIG // nHrIIkBxIHM4yv8q/Ax85jbYWzt05IaOF5p3aboh9qwg // SIG // DMJAI8xCUNZZ/fmsOG78j9WQprwLj1BXlMHETZCPKHVS // SIG // scLQn+1cCpBS9Bjcx4chH9uPpF4AJf+32f9yh10YsNd0 // SIG // nXzYRksBxWkYkiDNfnW1wkfboZYLnE8CvC6sD5lvcZGr // SIG // bdJ1MLwuW0+uHMRl2cwL6Wk0RMk3JfvV6M0637cutC8x // SIG // 40aArtEHQ2fBCAyfTT2dTjm2q5jEhvVbDXtSd2OISjX8 // SIG // m7b91PHO8R0GBUWRNfWhkbr9Sfqk7A84TXjhU/ec71rf // SIG // ArnEhspFBq9aLq/lB5ZFgMWxzb9dUvtic32KEE6oxJ9m // SIG // ulZs2Tk5mqDYbBN3ksR1rBrZuJ0M // SIG // End signature block
combined_dataset/train/non-malicious/Start-ComputerJobs_2.ps1
Start-ComputerJobs_2.ps1
#requires -version 2.0 function Start-ComputerJobs{ <# .NOTES Name: Start-ComputerJobs Author: Tome Tanasovski Created: 6/25/2010 Modified: 6/25/2010 Version: 1.2 Website: http://powertoe.wordpress.com .SYNOPSIS Multithreads a scriptblock with jobs .DESCRIPTION The Start-ComputerJobs cmdlet runs a specified scriptblock within a maximum number of simultaneously spawned Powershell jobs. You must pass a list of ComputerNames to it. The names passed to the cmdlet will replace $computername within the scriptblock prior to starting each thread. This can be thought of as a multithreaded approach to a foreach loop. .PARAMETER ComputerName Specifies a list of computers that you wish to inject into your scriptblock. The list of computer names will replace $computername in the script block. This does not actually need to be a list of computer names. It can be anything you wish to inject into your scriptblock. .PARAMETER ScriptBlock Specifies the commands to run in the background jobs. Enclose the commands in braces ({}) or use $ExecutionContext.InvokeCommand.NewScriptBlock to create a scriptblock. The scriptblock must contain a $computername variable. $computername will be replaced by each entry into the pipeline or from the parameter ComputerName. .PARAMETER Threads Specifies the maximum number of jobs that can be simultaneously running at any given time. This defaults to 10 if nothing is specified. .PARAMETER Sleep Specifies the amount of time in seconds to sleep before querying the active jobs. This defaults to 5 seconds. If your jobs are long running you will want to increase this number. If they are very quick to run you may want to decrease this number. .EXAMPLE $computers = "computer1","computer2","computer3","computer4","computer5" Start-ComputerJobs -computername $computers -ScriptBlock {dir \\\\$computername\\c$} Queries the share for each computer in the computer list. This will spawn the default 5 jobs at once with a 5 second pause between querying the jobs. .EXAMPLE Get-Content computerlist.txt |Start-ComputerJobs -ScriptBlock {Get-Service -ComputerName $computername} -Threads 3 -Sleep 10 -Verbose Reads a list of computers from a file named computerlist.txt. For each computer listed it will return the results from get-service. It will do this with three simultaneous jobs and will sleep 10 seconds between querying the jobs. Verbose will tell you when each job has been launced. .INPUTS System.String .OUTPUTS PSObject Returns the results of the commands in the job. It is the data returned from receive-job. If you're scriptblock contains write-host it will write that to the console as it is running. To avoid this you should just return objects within your scriptblock. i.e. Instead of write-host "text" just use "text" #> param( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [string[]]$ComputerName, [Parameter(Mandatory=$true)] [ScriptBlock]$ScriptBlock, [Parameter(Mandatory=$false)] [ValidateScript({$_ -gt 0})] [int32]$Threads = 10, [Parameter(Mandatory=$false)] [ValidateScript({$_ -gt 0})] [int32]$Sleep = 5 ) BEGIN { $firstrun = $true $computers = @() $curthreads = 0 $jobs = @() $valid = $false } PROCESS { if ($firstrun) { $firstrun = $false # Validate scriptblock - Making sure it has a $computername variable to use if ($ScriptBlock -match '\\$computername') { $valid = $true } else { Write-Error 'You must specify a scriptblock that contains a variable called $computername' $valid = $false } } if ($valid) { foreach ($computer in $computername) { while ($jobs.count -eq $Threads) { $newjobs = @() $jobs |foreach { Receive-Job $_.id if ($_.state -eq "Running" -or $_.HasMoreData) { $newjobs += $_ } else { $_ |Remove-Job } } $jobs = $newjobs if ($jobs.count -eq $Threads) { sleep $sleep } } $runscript = $ExecutionContext.InvokeCommand.NewScriptBlock(($ScriptBlock -replace '\\$computername', "$computer")) Write-Verbose "Starting Job for computer: $computer" $jobs += Start-Job -ScriptBlock $runscript $curthreads++ } } } END { while ($jobs.count -ne 0) { $newjobs = @() $jobs |foreach { Receive-Job $_.id if ($_.state -eq "Running" -or $_.HasMoreData) { $newjobs += $_ } else { $_ |Remove-Job } } $jobs = $newjobs if ($jobs.count -gt 0) { sleep $sleep } } } }
combined_dataset/train/non-malicious/sample_46_42.ps1
sample_46_42.ps1
# # Module manifest for module 'OCI.PSModules.Identitydomains' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identitydomains.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a6c13cbd-d51d-4887-9285-9eb20c02e9cc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identitydomains Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydomains.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIIdentitydomainsAccountMgmtInfo', 'Get-OCIIdentitydomainsAccountMgmtInfosList', 'Get-OCIIdentitydomainsAccountRecoverySetting', 'Get-OCIIdentitydomainsAccountRecoverySettingsList', 'Get-OCIIdentitydomainsApiKey', 'Get-OCIIdentitydomainsApiKeysList', 'Get-OCIIdentitydomainsApp', 'Get-OCIIdentitydomainsAppRole', 'Get-OCIIdentitydomainsAppRolesList', 'Get-OCIIdentitydomainsApprovalWorkflow', 'Get-OCIIdentitydomainsApprovalWorkflowAssignment', 'Get-OCIIdentitydomainsApprovalWorkflowAssignmentsList', 'Get-OCIIdentitydomainsApprovalWorkflowsList', 'Get-OCIIdentitydomainsApprovalWorkflowStep', 'Get-OCIIdentitydomainsApprovalWorkflowStepsList', 'Get-OCIIdentitydomainsAppsList', 'Get-OCIIdentitydomainsAuthenticationFactorSetting', 'Get-OCIIdentitydomainsAuthenticationFactorSettingsList', 'Get-OCIIdentitydomainsAuthToken', 'Get-OCIIdentitydomainsAuthTokensList', 'Get-OCIIdentitydomainsBrandingSetting', 'Get-OCIIdentitydomainsBrandingSettingsList', 'Get-OCIIdentitydomainsCloudGate', 'Get-OCIIdentitydomainsCloudGateMapping', 'Get-OCIIdentitydomainsCloudGateMappingsList', 'Get-OCIIdentitydomainsCloudGateServer', 'Get-OCIIdentitydomainsCloudGateServersList', 'Get-OCIIdentitydomainsCloudGatesList', 'Get-OCIIdentitydomainsCondition', 'Get-OCIIdentitydomainsConditionsList', 'Get-OCIIdentitydomainsCustomerSecretKey', 'Get-OCIIdentitydomainsCustomerSecretKeysList', 'Get-OCIIdentitydomainsDynamicResourceGroup', 'Get-OCIIdentitydomainsDynamicResourceGroupsList', 'Get-OCIIdentitydomainsGrant', 'Get-OCIIdentitydomainsGrantsList', 'Get-OCIIdentitydomainsGroup', 'Get-OCIIdentitydomainsGroupsList', 'Get-OCIIdentitydomainsIdentityPropagationTrust', 'Get-OCIIdentitydomainsIdentityPropagationTrustsList', 'Get-OCIIdentitydomainsIdentityProvider', 'Get-OCIIdentitydomainsIdentityProvidersList', 'Get-OCIIdentitydomainsIdentitySetting', 'Get-OCIIdentitydomainsIdentitySettingsList', 'Get-OCIIdentitydomainsKmsiSetting', 'Get-OCIIdentitydomainsKmsiSettingsList', 'Get-OCIIdentitydomainsMe', 'Get-OCIIdentitydomainsMyApiKey', 'Get-OCIIdentitydomainsMyApiKeysList', 'Get-OCIIdentitydomainsMyAppsList', 'Get-OCIIdentitydomainsMyAuthToken', 'Get-OCIIdentitydomainsMyAuthTokensList', 'Get-OCIIdentitydomainsMyCompletedApproval', 'Get-OCIIdentitydomainsMyCompletedApprovalsList', 'Get-OCIIdentitydomainsMyCustomerSecretKey', 'Get-OCIIdentitydomainsMyCustomerSecretKeysList', 'Get-OCIIdentitydomainsMyDevice', 'Get-OCIIdentitydomainsMyDevicesList', 'Get-OCIIdentitydomainsMyGroupsList', 'Get-OCIIdentitydomainsMyOAuth2ClientCredential', 'Get-OCIIdentitydomainsMyOAuth2ClientCredentialsList', 'Get-OCIIdentitydomainsMyPendingApproval', 'Get-OCIIdentitydomainsMyPendingApprovalsList', 'Get-OCIIdentitydomainsMyRequest', 'Get-OCIIdentitydomainsMyRequestableGroupsList', 'Get-OCIIdentitydomainsMyRequestsList', 'Get-OCIIdentitydomainsMySmtpCredential', 'Get-OCIIdentitydomainsMySmtpCredentialsList', 'Get-OCIIdentitydomainsMySupportAccount', 'Get-OCIIdentitydomainsMySupportAccountsList', 'Get-OCIIdentitydomainsMyTrustedUserAgent', 'Get-OCIIdentitydomainsMyTrustedUserAgentsList', 'Get-OCIIdentitydomainsMyUserDbCredential', 'Get-OCIIdentitydomainsMyUserDbCredentialsList', 'Get-OCIIdentitydomainsNetworkPerimeter', 'Get-OCIIdentitydomainsNetworkPerimetersList', 'Get-OCIIdentitydomainsNotificationSetting', 'Get-OCIIdentitydomainsNotificationSettingsList', 'Get-OCIIdentitydomainsOAuth2ClientCredential', 'Get-OCIIdentitydomainsOAuth2ClientCredentialsList', 'Get-OCIIdentitydomainsOAuthClientCertificate', 'Get-OCIIdentitydomainsOAuthClientCertificatesList', 'Get-OCIIdentitydomainsOAuthPartnerCertificate', 'Get-OCIIdentitydomainsOAuthPartnerCertificatesList', 'Get-OCIIdentitydomainsPasswordPoliciesList', 'Get-OCIIdentitydomainsPasswordPolicy', 'Get-OCIIdentitydomainsPoliciesList', 'Get-OCIIdentitydomainsPolicy', 'Get-OCIIdentitydomainsResourceTypeSchemaAttributesList', 'Get-OCIIdentitydomainsRule', 'Get-OCIIdentitydomainsRulesList', 'Get-OCIIdentitydomainsSchema', 'Get-OCIIdentitydomainsSchemasList', 'Get-OCIIdentitydomainsSecurityQuestion', 'Get-OCIIdentitydomainsSecurityQuestionSetting', 'Get-OCIIdentitydomainsSecurityQuestionSettingsList', 'Get-OCIIdentitydomainsSecurityQuestionsList', 'Get-OCIIdentitydomainsSelfRegistrationProfile', 'Get-OCIIdentitydomainsSelfRegistrationProfilesList', 'Get-OCIIdentitydomainsSetting', 'Get-OCIIdentitydomainsSettingsList', 'Get-OCIIdentitydomainsSmtpCredential', 'Get-OCIIdentitydomainsSmtpCredentialsList', 'Get-OCIIdentitydomainsUser', 'Get-OCIIdentitydomainsUserAttributesSetting', 'Get-OCIIdentitydomainsUserAttributesSettingsList', 'Get-OCIIdentitydomainsUserDbCredential', 'Get-OCIIdentitydomainsUserDbCredentialsList', 'Get-OCIIdentitydomainsUsersList', 'Invoke-OCIIdentitydomainsPatchAccountRecoverySetting', 'Invoke-OCIIdentitydomainsPatchApiKey', 'Invoke-OCIIdentitydomainsPatchApp', 'Invoke-OCIIdentitydomainsPatchAppRole', 'Invoke-OCIIdentitydomainsPatchApprovalWorkflow', 'Invoke-OCIIdentitydomainsPatchApprovalWorkflowStep', 'Invoke-OCIIdentitydomainsPatchAuthToken', 'Invoke-OCIIdentitydomainsPatchCloudGate', 'Invoke-OCIIdentitydomainsPatchCloudGateMapping', 'Invoke-OCIIdentitydomainsPatchCloudGateServer', 'Invoke-OCIIdentitydomainsPatchCondition', 'Invoke-OCIIdentitydomainsPatchCustomerSecretKey', 'Invoke-OCIIdentitydomainsPatchDynamicResourceGroup', 'Invoke-OCIIdentitydomainsPatchGrant', 'Invoke-OCIIdentitydomainsPatchGroup', 'Invoke-OCIIdentitydomainsPatchIdentityPropagationTrust', 'Invoke-OCIIdentitydomainsPatchIdentityProvider', 'Invoke-OCIIdentitydomainsPatchIdentitySetting', 'Invoke-OCIIdentitydomainsPatchKmsiSetting', 'Invoke-OCIIdentitydomainsPatchMe', 'Invoke-OCIIdentitydomainsPatchMyApiKey', 'Invoke-OCIIdentitydomainsPatchMyAuthToken', 'Invoke-OCIIdentitydomainsPatchMyCustomerSecretKey', 'Invoke-OCIIdentitydomainsPatchMyDevice', 'Invoke-OCIIdentitydomainsPatchMyOAuth2ClientCredential', 'Invoke-OCIIdentitydomainsPatchMyPendingApproval', 'Invoke-OCIIdentitydomainsPatchMyRequest', 'Invoke-OCIIdentitydomainsPatchMySmtpCredential', 'Invoke-OCIIdentitydomainsPatchNetworkPerimeter', 'Invoke-OCIIdentitydomainsPatchOAuth2ClientCredential', 'Invoke-OCIIdentitydomainsPatchPasswordPolicy', 'Invoke-OCIIdentitydomainsPatchPolicy', 'Invoke-OCIIdentitydomainsPatchRule', 'Invoke-OCIIdentitydomainsPatchSchema', 'Invoke-OCIIdentitydomainsPatchSecurityQuestion', 'Invoke-OCIIdentitydomainsPatchSecurityQuestionSetting', 'Invoke-OCIIdentitydomainsPatchSelfRegistrationProfile', 'Invoke-OCIIdentitydomainsPatchSetting', 'Invoke-OCIIdentitydomainsPatchSmtpCredential', 'Invoke-OCIIdentitydomainsPatchUser', 'Invoke-OCIIdentitydomainsPatchUserAttributesSetting', 'Invoke-OCIIdentitydomainsSearchAccountMgmtInfos', 'Invoke-OCIIdentitydomainsSearchApiKeys', 'Invoke-OCIIdentitydomainsSearchAppRoles', 'Invoke-OCIIdentitydomainsSearchApps', 'Invoke-OCIIdentitydomainsSearchAuthenticationFactorSettings', 'Invoke-OCIIdentitydomainsSearchAuthTokens', 'Invoke-OCIIdentitydomainsSearchCloudGateMappings', 'Invoke-OCIIdentitydomainsSearchCloudGates', 'Invoke-OCIIdentitydomainsSearchCloudGateServers', 'Invoke-OCIIdentitydomainsSearchConditions', 'Invoke-OCIIdentitydomainsSearchCustomerSecretKeys', 'Invoke-OCIIdentitydomainsSearchDynamicResourceGroups', 'Invoke-OCIIdentitydomainsSearchGrants', 'Invoke-OCIIdentitydomainsSearchGroups', 'Invoke-OCIIdentitydomainsSearchIdentityProviders', 'Invoke-OCIIdentitydomainsSearchIdentitySettings', 'Invoke-OCIIdentitydomainsSearchKmsiSettings', 'Invoke-OCIIdentitydomainsSearchMyApps', 'Invoke-OCIIdentitydomainsSearchMyGroups', 'Invoke-OCIIdentitydomainsSearchMyRequestableGroups', 'Invoke-OCIIdentitydomainsSearchMyRequests', 'Invoke-OCIIdentitydomainsSearchNetworkPerimeters', 'Invoke-OCIIdentitydomainsSearchNotificationSettings', 'Invoke-OCIIdentitydomainsSearchOAuth2ClientCredentials', 'Invoke-OCIIdentitydomainsSearchOAuthClientCertificates', 'Invoke-OCIIdentitydomainsSearchOAuthPartnerCertificates', 'Invoke-OCIIdentitydomainsSearchPasswordPolicies', 'Invoke-OCIIdentitydomainsSearchPolicies', 'Invoke-OCIIdentitydomainsSearchResourceTypeSchemaAttributes', 'Invoke-OCIIdentitydomainsSearchRules', 'Invoke-OCIIdentitydomainsSearchSchemas', 'Invoke-OCIIdentitydomainsSearchSecurityQuestions', 'Invoke-OCIIdentitydomainsSearchSecurityQuestionSettings', 'Invoke-OCIIdentitydomainsSearchSelfRegistrationProfiles', 'Invoke-OCIIdentitydomainsSearchSettings', 'Invoke-OCIIdentitydomainsSearchSmtpCredentials', 'Invoke-OCIIdentitydomainsSearchUserAttributesSettings', 'Invoke-OCIIdentitydomainsSearchUserDbCredentials', 'Invoke-OCIIdentitydomainsSearchUsers', 'New-OCIIdentitydomainsApiKey', 'New-OCIIdentitydomainsApp', 'New-OCIIdentitydomainsAppRole', 'New-OCIIdentitydomainsApprovalWorkflow', 'New-OCIIdentitydomainsApprovalWorkflowAssignment', 'New-OCIIdentitydomainsApprovalWorkflowStep', 'New-OCIIdentitydomainsAuthenticationFactorsRemover', 'New-OCIIdentitydomainsAuthToken', 'New-OCIIdentitydomainsCloudGate', 'New-OCIIdentitydomainsCloudGateMapping', 'New-OCIIdentitydomainsCloudGateServer', 'New-OCIIdentitydomainsCondition', 'New-OCIIdentitydomainsCustomerSecretKey', 'New-OCIIdentitydomainsDynamicResourceGroup', 'New-OCIIdentitydomainsGrant', 'New-OCIIdentitydomainsGroup', 'New-OCIIdentitydomainsIdentityPropagationTrust', 'New-OCIIdentitydomainsIdentityProvider', 'New-OCIIdentitydomainsMe', 'New-OCIIdentitydomainsMyApiKey', 'New-OCIIdentitydomainsMyAuthenticationFactorInitiator', 'New-OCIIdentitydomainsMyAuthenticationFactorsRemover', 'New-OCIIdentitydomainsMyAuthenticationFactorValidator', 'New-OCIIdentitydomainsMyAuthToken', 'New-OCIIdentitydomainsMyCustomerSecretKey', 'New-OCIIdentitydomainsMyOAuth2ClientCredential', 'New-OCIIdentitydomainsMyRequest', 'New-OCIIdentitydomainsMySmtpCredential', 'New-OCIIdentitydomainsMySupportAccount', 'New-OCIIdentitydomainsMyUserDbCredential', 'New-OCIIdentitydomainsNetworkPerimeter', 'New-OCIIdentitydomainsOAuth2ClientCredential', 'New-OCIIdentitydomainsOAuthClientCertificate', 'New-OCIIdentitydomainsOAuthPartnerCertificate', 'New-OCIIdentitydomainsPasswordPolicy', 'New-OCIIdentitydomainsPolicy', 'New-OCIIdentitydomainsRule', 'New-OCIIdentitydomainsSecurityQuestion', 'New-OCIIdentitydomainsSelfRegistrationProfile', 'New-OCIIdentitydomainsSmtpCredential', 'New-OCIIdentitydomainsUser', 'New-OCIIdentitydomainsUserDbCredential', 'Remove-OCIIdentitydomainsApiKey', 'Remove-OCIIdentitydomainsApp', 'Remove-OCIIdentitydomainsAppRole', 'Remove-OCIIdentitydomainsApprovalWorkflow', 'Remove-OCIIdentitydomainsApprovalWorkflowAssignment', 'Remove-OCIIdentitydomainsApprovalWorkflowStep', 'Remove-OCIIdentitydomainsAuthToken', 'Remove-OCIIdentitydomainsCloudGate', 'Remove-OCIIdentitydomainsCloudGateMapping', 'Remove-OCIIdentitydomainsCloudGateServer', 'Remove-OCIIdentitydomainsCondition', 'Remove-OCIIdentitydomainsCustomerSecretKey', 'Remove-OCIIdentitydomainsDynamicResourceGroup', 'Remove-OCIIdentitydomainsGrant', 'Remove-OCIIdentitydomainsGroup', 'Remove-OCIIdentitydomainsIdentityPropagationTrust', 'Remove-OCIIdentitydomainsIdentityProvider', 'Remove-OCIIdentitydomainsMyApiKey', 'Remove-OCIIdentitydomainsMyAuthToken', 'Remove-OCIIdentitydomainsMyCustomerSecretKey', 'Remove-OCIIdentitydomainsMyDevice', 'Remove-OCIIdentitydomainsMyOAuth2ClientCredential', 'Remove-OCIIdentitydomainsMySmtpCredential', 'Remove-OCIIdentitydomainsMySupportAccount', 'Remove-OCIIdentitydomainsMyTrustedUserAgent', 'Remove-OCIIdentitydomainsMyUserDbCredential', 'Remove-OCIIdentitydomainsNetworkPerimeter', 'Remove-OCIIdentitydomainsOAuth2ClientCredential', 'Remove-OCIIdentitydomainsOAuthClientCertificate', 'Remove-OCIIdentitydomainsOAuthPartnerCertificate', 'Remove-OCIIdentitydomainsPasswordPolicy', 'Remove-OCIIdentitydomainsPolicy', 'Remove-OCIIdentitydomainsRule', 'Remove-OCIIdentitydomainsSecurityQuestion', 'Remove-OCIIdentitydomainsSelfRegistrationProfile', 'Remove-OCIIdentitydomainsSmtpCredential', 'Remove-OCIIdentitydomainsUser', 'Remove-OCIIdentitydomainsUserDbCredential', 'Write-OCIIdentitydomainsAccountRecoverySetting', 'Write-OCIIdentitydomainsApp', 'Write-OCIIdentitydomainsApprovalWorkflow', 'Write-OCIIdentitydomainsAppStatusChanger', 'Write-OCIIdentitydomainsAuthenticationFactorSetting', 'Write-OCIIdentitydomainsCloudGate', 'Write-OCIIdentitydomainsCloudGateMapping', 'Write-OCIIdentitydomainsCloudGateServer', 'Write-OCIIdentitydomainsCondition', 'Write-OCIIdentitydomainsDynamicResourceGroup', 'Write-OCIIdentitydomainsGroup', 'Write-OCIIdentitydomainsIdentityPropagationTrust', 'Write-OCIIdentitydomainsIdentityProvider', 'Write-OCIIdentitydomainsIdentitySetting', 'Write-OCIIdentitydomainsKmsiSetting', 'Write-OCIIdentitydomainsMe', 'Write-OCIIdentitydomainsMePasswordChanger', 'Write-OCIIdentitydomainsNetworkPerimeter', 'Write-OCIIdentitydomainsNotificationSetting', 'Write-OCIIdentitydomainsPasswordPolicy', 'Write-OCIIdentitydomainsPolicy', 'Write-OCIIdentitydomainsRule', 'Write-OCIIdentitydomainsSchema', 'Write-OCIIdentitydomainsSecurityQuestionSetting', 'Write-OCIIdentitydomainsSelfRegistrationProfile', 'Write-OCIIdentitydomainsSetting', 'Write-OCIIdentitydomainsUser', 'Write-OCIIdentitydomainsUserCapabilitiesChanger', 'Write-OCIIdentitydomainsUserPasswordChanger', 'Write-OCIIdentitydomainsUserPasswordResetter', 'Write-OCIIdentitydomainsUserStatusChanger' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydomains' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_67_47.ps1
sample_67_47.ps1
@{ GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Start-Transcript", "Stop-Transcript" AliasesToExport = @() NestedModules="Microsoft.PowerShell.ConsoleHost.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAafI9Gy/Jba/h5 # P4E+2b0zPlBjhQyHNjAYnPqkeCyjq6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILL0LNcTOl5fB4j3BOCsjqQo # x/Jicg70oB7mLdT2Lf6QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbnRzo0A3sSZ/GIP3Z3xJ5C+BLn5jLp0jAWV4PuiDE+yc2EbDZNJQIT9z # EvKZ458xy/tbRaZDNuBIKENgYHct+9dPb4z99rCBy0dhjtByBqc8FzGDtl20K7D+ # Gmol5XbgD8vAgRlZCbnwCOBHnyNaXhISQgdCz81gQ2re2NZr67SY5J7PsJ0u6/FT # rbpnT9jGDmpUAtS1mGexnlXYX2D1TWDz+54LJruwqET291w6DaxAgXzS1MP6lD9i # vA5+FvdPm9KVJj9QVGI3YP2hWG7w+0mbup5UQFkTct1q2H+VwMtoDrGy2oog8I0n # lgp75aG3HDnyYNE5Vcuu1S1Uos4P9aGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC # FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDaE5ukTalehAPfxlyt9eVrZ4EspeNPqtP/yMw8/qNbOQIGZlddpxbQ # GBIyMDI0MDYxMzAxMTU1My4zMVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # RDA4Mi00QkZELUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAdzB4IzCX1hejgABAAAB3DANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw # MTIxOTA3MDZaFw0yNTAxMTAxOTA3MDZaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJG # RC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAi8izIDWyOD2RIonN6WtRYXlK # GphYvzdqafdITknIhU9QLsXqpNwumGEdn2J1/bV/RFoatTwQfJ0Xw3E8xHYpU2IC # 0IY8lryRXUIa+fdt4YHabaW2aolqcbvWYDLCuQoBNieLAos9AsnTQSRfDlNLB+Yl # dt2BAsWUfJ8DkqD6lSwlfOq6aQi8SvQNc++m0AaqR0UsrCjgFOUSCe/N5N9e6TNf # y9C1MAt9Um5NSBFTvOg/9EVa3dZqBqFnpSWgjQULxeUFANUNfkl4wSzHuOAkN0Sc # rjhjyAe4RZEOr5Ib1ejQYg6OK5NYPm6/e+USYgDJH/utIW9wufACox2pzL+KpA8y # UM5x3QBueI/yJrUFARSd9lPdTHIr2ssH9JGIo/IcOWDyhbBfKK/f5sYHp2Z0zrW6 # vqdS18N/nWU9wqErhWjzek4TX+eJaVWcQdBX00nn8NtRKpbZGpNRrY7Yq6+zJEYw # SCMYkDXb9KqtGqW8TZ+I3lmZlW2pI9ZohqzHtrQYH591PD6B5GfoyjZLr79tkTBL # /QgnmBwoaKc1t/JDXGu9Zc+1fMo5+OSHvmJG5ei6sZU9GqSbPlRjP5HnJswlaP6Z # 9warPaFdXyJmcJkMGuudmK+cSsIyHkWV+Dzj3qlPSmGNRMfYYKEci8ThINKTaHBY # /+4cH2ASzyn/097+a30CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBToc9IF3Q58Rfe4 # 1ax2RKtpQZ7d2zAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA2etvwTCvx5f8fWwq # 3eufBMPHgCqAduQw1Cj6RQbAIg1dLfLUZRx2qwr9HWDpN/u03HWrQ2kqTUlO6lQl # 8d0TEq2S6EcD7zaVPvIhKn9jvh2onTdEJPhD7yihBdMzPGJ7B8StUu3xZ595udxJ # PSLrKkq/zukJiTEzbhtupsz9X4zlUGmkJSztH5wROLP/MQDUBtkv++Je0eavIDQI # Z34+31z5p2xh+bup7lQydLR/9gmYQQyQSoZcLPIsr52H5SwWLR3iWR1wT5mrkk2M # gd6xfXDO0ZUC29fQNgNl03ZZnWST6E4xuVRX8vyfVhbOE//ldCdiXTcB9cSuf7UR # q3KWJ/N3cKEnXG4YbvphtaCJFecO8KLAOq9Ql69VFjWrLjLi+VUppKG1t1+A/IZ5 # 4n9hxIE405zQM1NZuMxsvnSp4gQLSUdKkvatFg1W7eGwfMbyfm7kJBqM/DH0/Omx # kh4VM0fJUXqS6MjhWj0287/MXw63jggyPgztRf1lrhDAZ/kHvXHns6NpfneDFPi/ # Oge8QFcX2oKYdGBcEttGiYl8OfrRqXO/t2kJVAi5DTrafIhkqexfHO4oVvRONdbD # o4WkbVuyNek6jkMweTKyuJvEeivhjPl1mNXIcA3IqjRtKsCVV6KFxobkXvhJlPwW # 3IcBboiAtznD/cP5HWhsOEpnbVYwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQw # ODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQAcOf9zP7fJGQhQIl9Jsvd2OdASpqCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6hRPzTAiGA8yMDI0MDYxMzAwNDgxM1oYDzIwMjQwNjE0MDA0ODEzWjB0MDoGCisG # AQQBhFkKBAExLDAqMAoCBQDqFE/NAgEAMAcCAQACAgPFMAcCAQACAhNBMAoCBQDq # FaFNAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAiEjWaBcfXS6/aX0bMxA4 # uD7sZYYOZXA5c+lA8PngooiPuA1+8zPvOBQXChmQfDC+5GPK8JJPH/RVBc8kdZCT # qiMd+KfV40272fkWTSej0wxFz/iO2ZmiEm0NjjjLInWG+wmg5Oil2DEBsJUxKuzG # UTGbz0KFSb1uaNmLVeCdDaoxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T # dGFtcCBQQ0EgMjAxMAITMwAAAdzB4IzCX1hejgABAAAB3DANBglghkgBZQMEAgEF # AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi # BCAItaf/aHHDZteOBUuVvF7JmrG0yjMXoLJQL+CqqkTO+DCB+gYLKoZIhvcNAQkQ # Ai8xgeowgecwgeQwgb0EIFOnF4pq2UQ/jLypnOO5YvQ67QirEQsOFfZMvKXEgg03 # MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCM # wl9YXo4AAQAAAdwwIgQgvHlH0wrfPJhvO5NwOZTRNO8Xd+CD3/kJd2X4B5QVTpow # DQYJKoZIhvcNAQELBQAEggIAilgo8xlemN85IMU5ZadhKX9gVmqnPzLWp+CxZ0Gq # UXgVxsswl01AZ5v5Oj7bW1LO4bQuEtH0uSh/sAwB+bGnqvQimWchRf9Z7bj6wJtV # mmGl30bEWkhTO+lX0fClJsoe89+6HDsTaHJ5DiT0hj10vPo54R9jo/zKz9ictHbJ # C62zqVbM02JSZH04vRG4qjv03i++cpohmphli+PM/1Tbtv1sdqGShypnrNseJx0x # D+KrTEjnEjlrtsTzKRi/9UWtej79rVeSlnGyCAjogCbktA1k0tYQqgJASOACbZEg # Sv9aKRWsyhwa/vh5vE7P/oHk89vcfc4R9qy+25pCrkGV+xovOgw4I+G8Xu19Uegy # Rs/dc9pBmsucDxM7HGtZa3CbPSSljYxc3MiMCzlIVUZWJgjtAuIfo421jVmIv+eS # G982t72540NxMIk+0sM7bo1yQcIAj2DK+7f/gAv0pa0sBxqELU3R52NjO/2+BYHi # IkG3fItBCtNyqqn36pymHTMqSNfNbeNgDZ2JciwIRywcM1WoI6ND4CtRyMjnGOvO # twX8AcPaFXJoEo8iAK8JhUUcPsSiFsbQewHg2KsqwfRlkomxxkCjaKZrxQrPVQdp # wzliNGm6xmkDb4daAOXR8wpWB8gl53eOkftYdHEtbMe2Wlhxl8krpiP5qeZXu3jS # JYo= # SIG # End signature block
combined_dataset/train/non-malicious/sample_12_13.ps1
sample_12_13.ps1
#************************************************ # DC_RDSRDWeb.ps1 # Version 1.0.1 # Date: 21-01-2012 # Author: Daniel Grund - dgrund@microsoft.com # Description: # This script gets the IIS config # 1.0.0 Beta release # 1.0.1 Release # TODO get windows\web\rdweb dir #************************************************ PARAM( [string] $TargetHost = "localhost", $OutputFileName ) $IISConfig = (C:\WINDOWS\SYSTEM32\INETSRV\APPCMD list config) if ($null -ne $IISConfig) { $savepath = $TargetHost + "_IISConfig.txt" [array]$OutputFileName += $savepath $IISConfig | Out-File $savepath } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD9+PNMwhf5kMaz # ON0qnIh8J95W070RF7L2itRGeWpnAKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHw6 # tntOk1lPhNQIhgUoYfH6CzKvo1vPCW2gQcBubJSKMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAeBiLxwUfwvm9xS4kx4c1B0IiHtuHX6zqKKTC # tnAp3X5ysglB7HFXtG9XB8fnU1itkIPAADdgm5C81hWUFMl8Vsi6/KEuFAiUQlmO # iCPCrkbybkuANtxs3R1oK2cgrTWPI7CbsnnYV2aSWBTjfLvJpN6uvHatvuzP9fHA # cVI4O5fQXgfJLmZzhF3lGBiMRJU+/R3d/KPFkEGI18WWErUJ/gneNvNXqGZ61Ebm # xWZ99UwT6jrCa0m0jCVVRDt54cK69GOnOpUrZ6fvU3yFVcGSgZpyxqpUMDiEEyMR # t2D5ctAKg6vwgQ0d3bwMvFDF5XcurBrb7jBJJzikpYprhMUewKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAObf0SNhXvlcvDynyKAVha097GqFfnlzX3 # bChIO4FDMwIGZusiCs74GBMyMDI0MTAyODExNDA0NC41MjRaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgPhnK8zlpV74QlpVhujWfRv9Vm/R8AkS8oLwnHxgw6lcwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAG4Wyjhtnzsyw4+eYkRaTI0tv8wgSZDboX6h # GsoawSosl8e/kTZqfcYNgUeVByOAK6NZblCFGQ94cJLpJAvgtUs+3fQUlFaaleJI # XrPrYarkjQSA/ZGfYZ/zK1KMYTDZH5L4Mg3biXAGPDJHUwzQ97n+fjmhS90A7E1m # qj2s9+sdEGiqq5mckIEqvwLeZfEOYFuqxXoiFRxwBznbI3OGSfds4dM3C4izJGjB # 8gRCCzHuJXoSxiUe4eGVtKy3n1en0UvIbFgua/hbwmYwlI/i6F0Wj8J+uI8geE7t # kHC1PTUgpvTlLejsv7tZwCkVITKpe7PBhs2skUKYt1t3FZTCaZvBY+uWLuUNTe2B # CCz5C7IgmAGr2wMbTIZqgM6KbZq/KO9RXV9PKdVUdmZMVYZle740OAQVCfIrHXbQ # HIqbiq603btotoqvxdsR6zjclxxIAz6vmcFKtZBGzR3vdTmoP2kjpwc7pfQSk/mQ # gm2tS6i8iluRdbbdFyT5ZD1nWOy0OBRwKvTXuuiYmjj3oF329mdXNqUcZ21HompX # iGbb3f8/AUvShL/1PxQNmH9+Po1EyzwDOyW3aANQzsVQoRWamebwuhS/OywlbzAI # etf3DMT8pdOnIgCG8BSdTOdfKeCBxHNUp52yPA06vQcDwbrq0slJH2OLVgEnHd6Z # wCpoeHYz # SIG # End signature block
combined_dataset/train/non-malicious/sample_58_18.ps1
sample_58_18.ps1
import{W as s}from"./index-BIaDS2NQ.js";/*!----------------------------------------------------------------------------- * Copyright (c) Microsoft Corporation. All rights reserved. * Version: 0.47.0(69991d66135e4a1fc1cf0b1ac4ad25d429866a0d) * Released under the MIT license * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt *-----------------------------------------------------------------------------*/var c=Object.defineProperty,l=Object.getOwnPropertyDescriptor,d=Object.getOwnPropertyNames,p=Object.prototype.hasOwnProperty,i=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of d(e))!p.call(t,r)&&r!==o&&c(t,r,{get:()=>e[r],enumerable:!(n=l(e,r))||n.enumerable});return t},h=(t,e,o)=>(i(t,e,"default"),o&&i(o,e,"default")),a={};h(a,s);var m=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"],b={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["<!--","-->"]},brackets:[["<!--","-->"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",close:">"}],onEnterRules:[{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),afterText:/^<\/(\w[\w\d]*)\s*>$/i,action:{indentAction:a.languages.IndentAction.IndentOutdent}},{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),action:{indentAction:a.languages.IndentAction.Indent}}]},y={defaultToken:"",tokenPostfix:"",tokenizer:{root:[[/@@@@/],[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.root"}],[/<!DOCTYPE/,"metatag.html","@doctype"],[/<!--/,"comment.html","@comment"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)(script)/,["delimiter.html",{token:"tag.html",next:"@script"}]],[/(<)(style)/,["delimiter.html",{token:"tag.html",next:"@style"}]],[/(<)([:\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/(<\/)([\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/</,"delimiter.html"],[/[ \t\r\n]+/],[/[^<@]+/]],doctype:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/[^>]+/,"metatag.content.html"],[/>/,"metatag.html","@pop"]],comment:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/-->/,"comment.html","@pop"],[/[^-]+/,"comment.content.html"],[/./,"comment.content.html"]],otherTag:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.otherTag"}],[/\/?>/,"delimiter.html","@pop"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/]],script:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.script"}],[/type/,"attribute.name","@scriptAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/(<\/)(script\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],scriptAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterType"}],[/=/,"delimiter","@scriptAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.scriptEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/script/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],style:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.style"}],[/type/,"attribute.name","@styleAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/(<\/)(style\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],styleAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterType"}],[/=/,"delimiter","@styleAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.styleEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/style/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],razorInSimpleState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3"}]],razorInEmbeddedState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],razorBlockCommentTopLevel:[[/\*@/,"@rematch","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorBlockComment:[[/\*@/,"comment.cs","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorRootTopLevel:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/[})]/,"@rematch","@pop"],{include:"razorCommon"}],razorRoot:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/\}/,"delimiter.bracket.cs","@pop"],[/\)/,"delimiter.parenthesis.cs","@pop"],{include:"razorCommon"}],razorCommon:[[/[a-zA-Z_]\w*/,{cases:{"@razorKeywords":{token:"keyword.cs"},"@default":"identifier.cs"}}],[/[\[\]]/,"delimiter.array.cs"],[/[ \t\r\n]+/],[/\/\/.*$/,"comment.cs"],[/@\*/,"comment.cs","@razorBlockComment"],[/"([^"]*)"/,"string.cs"],[/'([^']*)'/,"string.cs"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<\/)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/[\+\-\*\%\&\|\^\~\!\=\<\>\/\?\;\:\.\,]/,"delimiter.cs"],[/\d*\d+[eE]([\-+]?\d+)?/,"number.float.cs"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float.cs"],[/0[xX][0-9a-fA-F']*[0-9a-fA-F]/,"number.hex.cs"],[/0[0-7']*[0-7]/,"number.octal.cs"],[/0[bB][0-1']*[0-1]/,"number.binary.cs"],[/\d[\d']*/,"number.cs"],[/\d/,"number.cs"]]},razorKeywords:["abstract","as","async","await","base","bool","break","by","byte","case","catch","char","checked","class","const","continue","decimal","default","delegate","do","double","descending","explicit","event","extern","else","enum","false","finally","fixed","float","for","foreach","from","goto","group","if","implicit","in","int","interface","internal","into","is","lock","long","nameof","new","null","namespace","object","operator","out","override","orderby","params","private","protected","public","readonly","ref","return","switch","struct","sbyte","sealed","short","sizeof","stackalloc","static","string","select","this","throw","true","try","typeof","uint","ulong","unchecked","unsafe","ushort","using","var","virtual","volatile","void","when","while","where","yield","model","inject"],escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/};export{b as conf,y as language};
combined_dataset/train/non-malicious/sample_30_58.ps1
sample_30_58.ps1
# # Module manifest for module 'OCI.PSModules.Datasafe' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datasafe.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'acae3050-5046-4f4b-812f-d87bfcb51ba7' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datasafe Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datasafe.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatasafeMaskingColumnsFromSdm', 'Edit-OCIDatasafeGlobalSettings', 'Enable-OCIDatasafeConfiguration', 'Enable-OCIDatasafeTargetDatabase', 'Get-OCIDatasafeAlert', 'Get-OCIDatasafeAlertAnalyticsList', 'Get-OCIDatasafeAlertPoliciesList', 'Get-OCIDatasafeAlertPolicy', 'Get-OCIDatasafeAlertPolicyRulesList', 'Get-OCIDatasafeAlertsList', 'Get-OCIDatasafeAuditArchiveRetrieval', 'Get-OCIDatasafeAuditArchiveRetrievalsList', 'Get-OCIDatasafeAuditEventAnalyticsList', 'Get-OCIDatasafeAuditEventsList', 'Get-OCIDatasafeAuditPoliciesList', 'Get-OCIDatasafeAuditPolicy', 'Get-OCIDatasafeAuditPolicyAnalyticsList', 'Get-OCIDatasafeAuditProfile', 'Get-OCIDatasafeAuditProfileAnalyticsList', 'Get-OCIDatasafeAuditProfilesList', 'Get-OCIDatasafeAuditTrail', 'Get-OCIDatasafeAuditTrailAnalyticsList', 'Get-OCIDatasafeAuditTrailsList', 'Get-OCIDatasafeAvailableAuditVolumesList', 'Get-OCIDatasafeCollectedAuditVolumesList', 'Get-OCIDatasafeColumnsList', 'Get-OCIDatasafeCompatibleFormatsForDataTypes', 'Get-OCIDatasafeCompatibleFormatsForSensitiveTypes', 'Get-OCIDatasafeConfiguration', 'Get-OCIDatasafeDatabaseSecurityConfig', 'Get-OCIDatasafeDatabaseSecurityConfigsList', 'Get-OCIDatasafeDatabaseTableAccessEntriesList', 'Get-OCIDatasafeDatabaseTableAccessEntry', 'Get-OCIDatasafeDatabaseViewAccessEntriesList', 'Get-OCIDatasafeDatabaseViewAccessEntry', 'Get-OCIDatasafeDifferenceColumn', 'Get-OCIDatasafeDifferenceColumnsList', 'Get-OCIDatasafeDiscoveryAnalyticsList', 'Get-OCIDatasafeDiscoveryJob', 'Get-OCIDatasafeDiscoveryJobResult', 'Get-OCIDatasafeDiscoveryJobResultsList', 'Get-OCIDatasafeDiscoveryJobsList', 'Get-OCIDatasafeFindingAnalyticsList', 'Get-OCIDatasafeFindingsChangeAuditLogsList', 'Get-OCIDatasafeFindingsList', 'Get-OCIDatasafeGrantsList', 'Get-OCIDatasafeLibraryMaskingFormat', 'Get-OCIDatasafeLibraryMaskingFormatsList', 'Get-OCIDatasafeMaskedColumnsList', 'Get-OCIDatasafeMaskingAnalyticsList', 'Get-OCIDatasafeMaskingColumn', 'Get-OCIDatasafeMaskingColumnsList', 'Get-OCIDatasafeMaskingObjectsList', 'Get-OCIDatasafeMaskingPoliciesList', 'Get-OCIDatasafeMaskingPolicy', 'Get-OCIDatasafeMaskingReport', 'Get-OCIDatasafeMaskingReportsList', 'Get-OCIDatasafeMaskingSchemasList', 'Get-OCIDatasafeOnPremConnector', 'Get-OCIDatasafeOnPremConnectorsList', 'Get-OCIDatasafePeerTargetDatabase', 'Get-OCIDatasafePeerTargetDatabasesList', 'Get-OCIDatasafePrivateEndpoint', 'Get-OCIDatasafePrivateEndpointsList', 'Get-OCIDatasafeProfile', 'Get-OCIDatasafeProfileAnalyticsList', 'Get-OCIDatasafeProfileSummariesList', 'Get-OCIDatasafeReport', 'Get-OCIDatasafeReportContent', 'Get-OCIDatasafeReportDefinition', 'Get-OCIDatasafeReportDefinitionsList', 'Get-OCIDatasafeReportsList', 'Get-OCIDatasafeRoleGrantPathsList', 'Get-OCIDatasafeRolesList', 'Get-OCIDatasafeSchemasList', 'Get-OCIDatasafeSdmMaskingPolicyDifference', 'Get-OCIDatasafeSdmMaskingPolicyDifferencesList', 'Get-OCIDatasafeSecurityAssessment', 'Get-OCIDatasafeSecurityAssessmentComparison', 'Get-OCIDatasafeSecurityAssessmentsList', 'Get-OCIDatasafeSecurityFeatureAnalyticsList', 'Get-OCIDatasafeSecurityFeaturesList', 'Get-OCIDatasafeSecurityPoliciesList', 'Get-OCIDatasafeSecurityPolicy', 'Get-OCIDatasafeSecurityPolicyDeployment', 'Get-OCIDatasafeSecurityPolicyDeploymentsList', 'Get-OCIDatasafeSecurityPolicyEntryState', 'Get-OCIDatasafeSecurityPolicyEntryStatesList', 'Get-OCIDatasafeSecurityPolicyReport', 'Get-OCIDatasafeSecurityPolicyReportsList', 'Get-OCIDatasafeSensitiveColumn', 'Get-OCIDatasafeSensitiveColumnsList', 'Get-OCIDatasafeSensitiveDataModel', 'Get-OCIDatasafeSensitiveDataModelsList', 'Get-OCIDatasafeSensitiveObjectsList', 'Get-OCIDatasafeSensitiveSchemasList', 'Get-OCIDatasafeSensitiveType', 'Get-OCIDatasafeSensitiveTypesList', 'Get-OCIDatasafeSqlCollection', 'Get-OCIDatasafeSqlCollectionAnalyticsList', 'Get-OCIDatasafeSqlCollectionLogInsightsList', 'Get-OCIDatasafeSqlCollectionsList', 'Get-OCIDatasafeSqlFirewallAllowedSqlAnalyticsList', 'Get-OCIDatasafeSqlFirewallAllowedSqlsList', 'Get-OCIDatasafeSqlFirewallPoliciesList', 'Get-OCIDatasafeSqlFirewallPolicy', 'Get-OCIDatasafeSqlFirewallPolicyAnalyticsList', 'Get-OCIDatasafeSqlFirewallViolationAnalyticsList', 'Get-OCIDatasafeSqlFirewallViolationsList', 'Get-OCIDatasafeTablesList', 'Get-OCIDatasafeTargetAlertPolicyAssociation', 'Get-OCIDatasafeTargetAlertPolicyAssociationsList', 'Get-OCIDatasafeTargetDatabase', 'Get-OCIDatasafeTargetDatabasesList', 'Get-OCIDatasafeUserAccessAnalyticsList', 'Get-OCIDatasafeUserAnalyticsList', 'Get-OCIDatasafeUserAssessment', 'Get-OCIDatasafeUserAssessmentComparison', 'Get-OCIDatasafeUserAssessmentsList', 'Get-OCIDatasafeUsersList', 'Get-OCIDatasafeWorkRequest', 'Get-OCIDatasafeWorkRequestErrorsList', 'Get-OCIDatasafeWorkRequestLogsList', 'Get-OCIDatasafeWorkRequestsList', 'Invoke-OCIDatasafeAlertsUpdate', 'Invoke-OCIDatasafeApplyDiscoveryJobResults', 'Invoke-OCIDatasafeApplySdmMaskingPolicyDifference', 'Invoke-OCIDatasafeCalculateAuditVolumeAvailable', 'Invoke-OCIDatasafeCalculateAuditVolumeCollected', 'Invoke-OCIDatasafeCompareSecurityAssessment', 'Invoke-OCIDatasafeCompareUserAssessment', 'Invoke-OCIDatasafeDeactivateTargetDatabase', 'Invoke-OCIDatasafeDiscoverAuditTrails', 'Invoke-OCIDatasafeDownloadDiscoveryReport', 'Invoke-OCIDatasafeDownloadMaskingLog', 'Invoke-OCIDatasafeDownloadMaskingPolicy', 'Invoke-OCIDatasafeDownloadMaskingReport', 'Invoke-OCIDatasafeDownloadPrivilegeScript', 'Invoke-OCIDatasafeDownloadSecurityAssessmentReport', 'Invoke-OCIDatasafeDownloadSensitiveDataModel', 'Invoke-OCIDatasafeDownloadUserAssessmentReport', 'Invoke-OCIDatasafeMaskData', 'Invoke-OCIDatasafePatchAlerts', 'Invoke-OCIDatasafePatchDiscoveryJobResults', 'Invoke-OCIDatasafePatchMaskingColumns', 'Invoke-OCIDatasafePatchSdmMaskingPolicyDifferenceColumns', 'Invoke-OCIDatasafePatchSensitiveColumns', 'Invoke-OCIDatasafePatchTargetAlertPolicyAssociation', 'Invoke-OCIDatasafeProvisionAuditPolicy', 'Invoke-OCIDatasafePurgeSqlCollectionLogs', 'Invoke-OCIDatasafeRefreshDatabaseSecurityConfiguration', 'Invoke-OCIDatasafeRefreshSecurityAssessment', 'Invoke-OCIDatasafeRefreshSqlCollectionLogInsights', 'Invoke-OCIDatasafeRefreshTargetDatabase', 'Invoke-OCIDatasafeRefreshUserAssessment', 'Invoke-OCIDatasafeResumeAuditTrail', 'Invoke-OCIDatasafeResumeWorkRequest', 'Invoke-OCIDatasafeRetrieveAuditPolicies', 'Invoke-OCIDatasafeScheduleReport', 'Invoke-OCIDatasafeSetSecurityAssessmentBaseline', 'Invoke-OCIDatasafeSetUserAssessmentBaseline', 'Invoke-OCIDatasafeSuspendWorkRequest', 'Invoke-OCIDatasafeUnsetSecurityAssessmentBaseline', 'Invoke-OCIDatasafeUnsetUserAssessmentBaseline', 'Move-OCIDatasafeAlertCompartment', 'Move-OCIDatasafeAuditArchiveRetrievalCompartment', 'Move-OCIDatasafeAuditPolicyCompartment', 'Move-OCIDatasafeAuditProfileCompartment', 'Move-OCIDatasafeDatabaseSecurityConfigCompartment', 'Move-OCIDatasafeDiscoveryJobCompartment', 'Move-OCIDatasafeLibraryMaskingFormatCompartment', 'Move-OCIDatasafeMaskingPolicyCompartment', 'Move-OCIDatasafeOnPremConnectorCompartment', 'Move-OCIDatasafePrivateEndpointCompartment', 'Move-OCIDatasafeReportCompartment', 'Move-OCIDatasafeReportDefinitionCompartment', 'Move-OCIDatasafeRetention', 'Move-OCIDatasafeSdmMaskingPolicyDifferenceCompartment', 'Move-OCIDatasafeSecurityAssessmentCompartment', 'Move-OCIDatasafeSecurityPolicyCompartment', 'Move-OCIDatasafeSecurityPolicyDeploymentCompartment', 'Move-OCIDatasafeSensitiveDataModelCompartment', 'Move-OCIDatasafeSensitiveTypeCompartment', 'Move-OCIDatasafeSqlCollectionCompartment', 'Move-OCIDatasafeSqlFirewallPolicyCompartment', 'Move-OCIDatasafeTargetAlertPolicyAssociationCompartment', 'Move-OCIDatasafeTargetDatabaseCompartment', 'Move-OCIDatasafeUserAssessmentCompartment', 'New-OCIDatasafeAuditArchiveRetrieval', 'New-OCIDatasafeDiscoveryJob', 'New-OCIDatasafeDiscoveryReportForDownload', 'New-OCIDatasafeLibraryMaskingFormat', 'New-OCIDatasafeMaskingColumn', 'New-OCIDatasafeMaskingPolicy', 'New-OCIDatasafeMaskingPolicyForDownload', 'New-OCIDatasafeMaskingReportForDownload', 'New-OCIDatasafeOnPremConnector', 'New-OCIDatasafeOnPremConnectorConfiguration', 'New-OCIDatasafePeerTargetDatabase', 'New-OCIDatasafePrivateEndpoint', 'New-OCIDatasafeReport', 'New-OCIDatasafeReportDefinition', 'New-OCIDatasafeSdmMaskingPolicyDifference', 'New-OCIDatasafeSecurityAssessment', 'New-OCIDatasafeSecurityAssessmentReport', 'New-OCIDatasafeSensitiveColumn', 'New-OCIDatasafeSensitiveDataModel', 'New-OCIDatasafeSensitiveDataModelForDownload', 'New-OCIDatasafeSensitiveType', 'New-OCIDatasafeSqlCollection', 'New-OCIDatasafeSqlFirewallPolicy', 'New-OCIDatasafeTargetAlertPolicyAssociation', 'New-OCIDatasafeTargetDatabase', 'New-OCIDatasafeUserAssessment', 'New-OCIDatasafeUserAssessmentReport', 'Remove-OCIDatasafeAuditArchiveRetrieval', 'Remove-OCIDatasafeAuditTrail', 'Remove-OCIDatasafeDiscoveryJob', 'Remove-OCIDatasafeDiscoveryJobResult', 'Remove-OCIDatasafeLibraryMaskingFormat', 'Remove-OCIDatasafeMaskingColumn', 'Remove-OCIDatasafeMaskingPolicy', 'Remove-OCIDatasafeOnPremConnector', 'Remove-OCIDatasafePeerTargetDatabase', 'Remove-OCIDatasafePrivateEndpoint', 'Remove-OCIDatasafeReportDefinition', 'Remove-OCIDatasafeScheduleReport', 'Remove-OCIDatasafeSdmMaskingPolicyDifference', 'Remove-OCIDatasafeSecurityAssessment', 'Remove-OCIDatasafeSensitiveColumn', 'Remove-OCIDatasafeSensitiveDataModel', 'Remove-OCIDatasafeSensitiveType', 'Remove-OCIDatasafeSqlCollection', 'Remove-OCIDatasafeSqlFirewallPolicy', 'Remove-OCIDatasafeTargetAlertPolicyAssociation', 'Remove-OCIDatasafeTargetDatabase', 'Remove-OCIDatasafeUserAssessment', 'Start-OCIDatasafeAuditTrail', 'Start-OCIDatasafeSqlCollection', 'Stop-OCIDatasafeAuditTrail', 'Stop-OCIDatasafeSqlCollection', 'Stop-OCIDatasafeWorkRequest', 'Update-OCIDatasafeAlert', 'Update-OCIDatasafeAuditArchiveRetrieval', 'Update-OCIDatasafeAuditPolicy', 'Update-OCIDatasafeAuditProfile', 'Update-OCIDatasafeAuditTrail', 'Update-OCIDatasafeDatabaseSecurityConfig', 'Update-OCIDatasafeFinding', 'Update-OCIDatasafeLibraryMaskingFormat', 'Update-OCIDatasafeMaskingColumn', 'Update-OCIDatasafeMaskingPolicy', 'Update-OCIDatasafeOnPremConnector', 'Update-OCIDatasafeOnPremConnectorWallet', 'Update-OCIDatasafePeerTargetDatabase', 'Update-OCIDatasafePrivateEndpoint', 'Update-OCIDatasafeReport', 'Update-OCIDatasafeReportDefinition', 'Update-OCIDatasafeSdmMaskingPolicyDifference', 'Update-OCIDatasafeSecurityAssessment', 'Update-OCIDatasafeSecurityPolicy', 'Update-OCIDatasafeSecurityPolicyDeployment', 'Update-OCIDatasafeSensitiveColumn', 'Update-OCIDatasafeSensitiveDataModel', 'Update-OCIDatasafeSensitiveType', 'Update-OCIDatasafeSqlCollection', 'Update-OCIDatasafeSqlFirewallPolicy', 'Update-OCIDatasafeTargetAlertPolicyAssociation', 'Update-OCIDatasafeTargetDatabase', 'Update-OCIDatasafeUserAssessment', 'Write-OCIDatasafeMaskingPolicy', 'Write-OCIDatasafeSensitiveDataModel' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datasafe' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_54_10.ps1
sample_54_10.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.PostgreSql.private.dll') # Load the internal module $internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.PostgreSql.internal.psm1' if(Test-Path $internalModulePath) { $null = Import-Module -Name $internalModulePath } # Export nothing to clear implicit exports Export-ModuleMember # Export script cmdlets Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias) # endregion # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKC1HK3sZ5Ig5m # CLTjRsMUI4jUekiVl569qkgi7uQ716CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICZaM0ItU6Mjim+f7sdzruQd # k8/9mBwMYTDZKZBXiyLAMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAo6uOoSrI++00vzClWZZpB+oadBuvmXIhMf8EopZ3dpB6Y/czGxDmi7Cg # gBvXpGztTgLWfObTeW3yyKRF78z4VZBTfPgJa31TnvgprSuf2uBHwQkDEagIokCM # yPaRfH1IqRFFo39+xkyB82IHiuaD/ZPHjZPjAUg9nCpfNd7oaQOOHoqAZpKv90Vh # vt2pHF6fXgBhKY86QyMnENdqGeV6qZz147FzVY1loCJXjFXw8mG7eGrYP9EUSf0J # Vp1I6Rqmp4/uRV/kJhroe3OsfXKZT4+TIAa+px+GbrqDiGNDctfB78xwRsUnG7wM # oTdtXiuMBr+Qf9xHCPpJV1mwswquW6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAabNBIhhOMhDbQZAjpg/JwQpDflnBMZqBmHuvjJxuVAAIGZhfNGBCn # GBMyMDI0MDQyMzEzMTUxMC4xOThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIcTDAiGA8yMDI0MDQyMzExMzg1 # MloYDzIwMjQwNDI0MTEzODUyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0hxM # AgEAMAoCAQACAghFAgH/MAcCAQACAhNpMAoCBQDp023MAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAK8eH3rZdn1zSVWz/62/4QXWc469a0821JsUCszUNQE7 # zofGTI2pXfcLRkid5HDMoyzHaxFyQd7BlB9RiWflQDCbmJDXi+gQvIkxjCTCRBlC # ur00RnLzUEmS1uJPOLOL/bOqar9Ef8dldb6m5FXynuOMavaqfurd40q4GBqB6frP # +NXQ2XPKm+yNQ9eFgWq4QfuetnD8+P6G4T+Mv6nxbUeZURvBPR5FA9fsJpjoKDc9 # w9ekBTznBDZfbQ5BcayMyUd+K0eOSstGOQ0kwrQkFJUjB+EDHoNJVO3T4Migd36w # R6XnZTD4GG7mwxX0i8EYxg0lKounpH1hw7E6P5VgX74xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB # 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCK+iRm/fPnSmNyWaEPF23th+5sZut2z2hrXPI/mwJ6 # CzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4 # riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgfEHm2ExKtPF0slQuA53nCHBP # mRCZtnL9CXNnAqBr+34wDQYJKoZIhvcNAQELBQAEggIAGNTfPY64Al6RT39LjSJN # L2+l/TVNzh6QLGtDqMrcSbuc7eSsAwgFEW5sDnU0UaVS0vgUbapfv0kje4gu8meA # JcdtMRYIhaD+jCv13YaeWUVoudJIuTWeChgbTfoDTxsddTCz38ev3kxsXY+B2szG # itXyzMuHfHuMljebN1mxTvUf/1qC8UPT6QcaxXTYC22/LjrnYC1ZrJtmV82rzRXv # KDOfnOVAWc9hhTU85GsZ2ABdfp2teyBThmwBpEfMFEp/9MLJ5PKN9d23b8q2neUy # Cchp3odTCX8xPze8XnE5a0eIUd2Pch163EJREO2wDZagpLX7shGtiR2otaTTJJ6W # iFX/tIb9UYhQQ51x2y7sgsQ1c5HPcXhCuijvm4ofWNirDUVCKKsigFCyqvrIcwdW # pMOhEKwLc7wzAK3HCAIDt+TsuDu7osXoISMZn0QT73gBDS2C825+L8hOVh4auGSF # ALb0Ctwk/JHL8AQAe5mjzKRWnYE5EGWBkQe/VIyHEapTMvKOzlt+dnctV0eevxba # QTcgsGBoZTD5YqvYwTB8T1rd6q2yKEdUEE0xcpusQJT4vaAmgU1MVvS/dj+uWv5s # 9Ijw5UsCipotgjXL5k2+N9N2iGVANK5W/Ybm7DB2xk9yoHvNG5LUr3ACZ3MEB/Gh # xgb15bnamyDw85E29S2v8xc= # SIG # End signature block
combined_dataset/train/non-malicious/sample_37_87.ps1
sample_37_87.ps1
/*!----------------------------------------------------------------------------- * Copyright (c) Microsoft Corporation. All rights reserved. * Version: 0.47.0(69991d66135e4a1fc1cf0b1ac4ad25d429866a0d) * Released under the MIT license * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt *-----------------------------------------------------------------------------*/ define("vs/basic-languages/powerquery/powerquery", ["require"],(require)=>{ "use strict"; var moduleExports = (() => { var __defProp = Object.defineProperty; var __getOwnPropDesc = Object.getOwnPropertyDescriptor; var __getOwnPropNames = Object.getOwnPropertyNames; var __hasOwnProp = Object.prototype.hasOwnProperty; var __export = (target, all) => { for (var name in all) __defProp(target, name, { get: all[name], enumerable: true }); }; var __copyProps = (to, from, except, desc) => { if (from && typeof from === "object" || typeof from === "function") { for (let key of __getOwnPropNames(from)) if (!__hasOwnProp.call(to, key) && key !== except) __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable }); } return to; }; var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod); // src/basic-languages/powerquery/powerquery.ts var powerquery_exports = {}; __export(powerquery_exports, { conf: () => conf, language: () => language }); var conf = { comments: { lineComment: "//", blockComment: ["/*", "*/"] }, brackets: [ ["[", "]"], ["(", ")"], ["{", "}"] ], autoClosingPairs: [ { open: '"', close: '"', notIn: ["string", "comment", "identifier"] }, { open: "[", close: "]", notIn: ["string", "comment", "identifier"] }, { open: "(", close: ")", notIn: ["string", "comment", "identifier"] }, { open: "{", close: "}", notIn: ["string", "comment", "identifier"] } ] }; var language = { defaultToken: "", tokenPostfix: ".pq", ignoreCase: false, brackets: [ { open: "[", close: "]", token: "delimiter.square" }, { open: "{", close: "}", token: "delimiter.brackets" }, { open: "(", close: ")", token: "delimiter.parenthesis" } ], operatorKeywords: ["and", "not", "or"], keywords: [ "as", "each", "else", "error", "false", "if", "in", "is", "let", "meta", "otherwise", "section", "shared", "then", "true", "try", "type" ], constructors: ["#binary", "#date", "#datetime", "#datetimezone", "#duration", "#table", "#time"], constants: ["#infinity", "#nan", "#sections", "#shared"], typeKeywords: [ "action", "any", "anynonnull", "none", "null", "logical", "number", "time", "date", "datetime", "datetimezone", "duration", "text", "binary", "list", "record", "table", "function" ], builtinFunctions: [ "Access.Database", "Action.Return", "Action.Sequence", "Action.Try", "ActiveDirectory.Domains", "AdoDotNet.DataSource", "AdoDotNet.Query", "AdobeAnalytics.Cubes", "AnalysisServices.Database", "AnalysisServices.Databases", "AzureStorage.BlobContents", "AzureStorage.Blobs", "AzureStorage.Tables", "Binary.Buffer", "Binary.Combine", "Binary.Compress", "Binary.Decompress", "Binary.End", "Binary.From", "Binary.FromList", "Binary.FromText", "Binary.InferContentType", "Binary.Length", "Binary.ToList", "Binary.ToText", "BinaryFormat.7BitEncodedSignedInteger", "BinaryFormat.7BitEncodedUnsignedInteger", "BinaryFormat.Binary", "BinaryFormat.Byte", "BinaryFormat.ByteOrder", "BinaryFormat.Choice", "BinaryFormat.Decimal", "BinaryFormat.Double", "BinaryFormat.Group", "BinaryFormat.Length", "BinaryFormat.List", "BinaryFormat.Null", "BinaryFormat.Record", "BinaryFormat.SignedInteger16", "BinaryFormat.SignedInteger32", "BinaryFormat.SignedInteger64", "BinaryFormat.Single", "BinaryFormat.Text", "BinaryFormat.Transform", "BinaryFormat.UnsignedInteger16", "BinaryFormat.UnsignedInteger32", "BinaryFormat.UnsignedInteger64", "Byte.From", "Character.FromNumber", "Character.ToNumber", "Combiner.CombineTextByDelimiter", "Combiner.CombineTextByEachDelimiter", "Combiner.CombineTextByLengths", "Combiner.CombineTextByPositions", "Combiner.CombineTextByRanges", "Comparer.Equals", "Comparer.FromCulture", "Comparer.Ordinal", "Comparer.OrdinalIgnoreCase", "Csv.Document", "Cube.AddAndExpandDimensionColumn", "Cube.AddMeasureColumn", "Cube.ApplyParameter", "Cube.AttributeMemberId", "Cube.AttributeMemberProperty", "Cube.CollapseAndRemoveColumns", "Cube.Dimensions", "Cube.DisplayFolders", "Cube.Measures", "Cube.Parameters", "Cube.Properties", "Cube.PropertyKey", "Cube.ReplaceDimensions", "Cube.Transform", "Currency.From", "DB2.Database", "Date.AddDays", "Date.AddMonths", "Date.AddQuarters", "Date.AddWeeks", "Date.AddYears", "Date.Day", "Date.DayOfWeek", "Date.DayOfWeekName", "Date.DayOfYear", "Date.DaysInMonth", "Date.EndOfDay", "Date.EndOfMonth", "Date.EndOfQuarter", "Date.EndOfWeek", "Date.EndOfYear", "Date.From", "Date.FromText", "Date.IsInCurrentDay", "Date.IsInCurrentMonth", "Date.IsInCurrentQuarter", "Date.IsInCurrentWeek", "Date.IsInCurrentYear", "Date.IsInNextDay", "Date.IsInNextMonth", "Date.IsInNextNDays", "Date.IsInNextNMonths", "Date.IsInNextNQuarters", "Date.IsInNextNWeeks", "Date.IsInNextNYears", "Date.IsInNextQuarter", "Date.IsInNextWeek", "Date.IsInNextYear", "Date.IsInPreviousDay", "Date.IsInPreviousMonth", "Date.IsInPreviousNDays", "Date.IsInPreviousNMonths", "Date.IsInPreviousNQuarters", "Date.IsInPreviousNWeeks", "Date.IsInPreviousNYears", "Date.IsInPreviousQuarter", "Date.IsInPreviousWeek", "Date.IsInPreviousYear", "Date.IsInYearToDate", "Date.IsLeapYear", "Date.Month", "Date.MonthName", "Date.QuarterOfYear", "Date.StartOfDay", "Date.StartOfMonth", "Date.StartOfQuarter", "Date.StartOfWeek", "Date.StartOfYear", "Date.ToRecord", "Date.ToText", "Date.WeekOfMonth", "Date.WeekOfYear", "Date.Year", "DateTime.AddZone", "DateTime.Date", "DateTime.FixedLocalNow", "DateTime.From", "DateTime.FromFileTime", "DateTime.FromText", "DateTime.IsInCurrentHour", "DateTime.IsInCurrentMinute", "DateTime.IsInCurrentSecond", "DateTime.IsInNextHour", "DateTime.IsInNextMinute", "DateTime.IsInNextNHours", "DateTime.IsInNextNMinutes", "DateTime.IsInNextNSeconds", "DateTime.IsInNextSecond", "DateTime.IsInPreviousHour", "DateTime.IsInPreviousMinute", "DateTime.IsInPreviousNHours", "DateTime.IsInPreviousNMinutes", "DateTime.IsInPreviousNSeconds", "DateTime.IsInPreviousSecond", "DateTime.LocalNow", "DateTime.Time", "DateTime.ToRecord", "DateTime.ToText", "DateTimeZone.FixedLocalNow", "DateTimeZone.FixedUtcNow", "DateTimeZone.From", "DateTimeZone.FromFileTime", "DateTimeZone.FromText", "DateTimeZone.LocalNow", "DateTimeZone.RemoveZone", "DateTimeZone.SwitchZone", "DateTimeZone.ToLocal", "DateTimeZone.ToRecord", "DateTimeZone.ToText", "DateTimeZone.ToUtc", "DateTimeZone.UtcNow", "DateTimeZone.ZoneHours", "DateTimeZone.ZoneMinutes", "Decimal.From", "Diagnostics.ActivityId", "Diagnostics.Trace", "DirectQueryCapabilities.From", "Double.From", "Duration.Days", "Duration.From", "Duration.FromText", "Duration.Hours", "Duration.Minutes", "Duration.Seconds", "Duration.ToRecord", "Duration.ToText", "Duration.TotalDays", "Duration.TotalHours", "Duration.TotalMinutes", "Duration.TotalSeconds", "Embedded.Value", "Error.Record", "Excel.CurrentWorkbook", "Excel.Workbook", "Exchange.Contents", "Expression.Constant", "Expression.Evaluate", "Expression.Identifier", "Facebook.Graph", "File.Contents", "Folder.Contents", "Folder.Files", "Function.From", "Function.Invoke", "Function.InvokeAfter", "Function.IsDataSource", "GoogleAnalytics.Accounts", "Guid.From", "HdInsight.Containers", "HdInsight.Contents", "HdInsight.Files", "Hdfs.Contents", "Hdfs.Files", "Informix.Database", "Int16.From", "Int32.From", "Int64.From", "Int8.From", "ItemExpression.From", "Json.Document", "Json.FromValue", "Lines.FromBinary", "Lines.FromText", "Lines.ToBinary", "Lines.ToText", "List.Accumulate", "List.AllTrue", "List.Alternate", "List.AnyTrue", "List.Average", "List.Buffer", "List.Combine", "List.Contains", "List.ContainsAll", "List.ContainsAny", "List.Count", "List.Covariance", "List.DateTimeZones", "List.DateTimes", "List.Dates", "List.Difference", "List.Distinct", "List.Durations", "List.FindText", "List.First", "List.FirstN", "List.Generate", "List.InsertRange", "List.Intersect", "List.IsDistinct", "List.IsEmpty", "List.Last", "List.LastN", "List.MatchesAll", "List.MatchesAny", "List.Max", "List.MaxN", "List.Median", "List.Min", "List.MinN", "List.Mode", "List.Modes", "List.NonNullCount", "List.Numbers", "List.PositionOf", "List.PositionOfAny", "List.Positions", "List.Product", "List.Random", "List.Range", "List.RemoveFirstN", "List.RemoveItems", "List.RemoveLastN", "List.RemoveMatchingItems", "List.RemoveNulls", "List.RemoveRange", "List.Repeat", "List.ReplaceMatchingItems", "List.ReplaceRange", "List.ReplaceValue", "List.Reverse", "List.Select", "List.Single", "List.SingleOrDefault", "List.Skip", "List.Sort", "List.StandardDeviation", "List.Sum", "List.Times", "List.Transform", "List.TransformMany", "List.Union", "List.Zip", "Logical.From", "Logical.FromText", "Logical.ToText", "MQ.Queue", "MySQL.Database", "Number.Abs", "Number.Acos", "Number.Asin", "Number.Atan", "Number.Atan2", "Number.BitwiseAnd", "Number.BitwiseNot", "Number.BitwiseOr", "Number.BitwiseShiftLeft", "Number.BitwiseShiftRight", "Number.BitwiseXor", "Number.Combinations", "Number.Cos", "Number.Cosh", "Number.Exp", "Number.Factorial", "Number.From", "Number.FromText", "Number.IntegerDivide", "Number.IsEven", "Number.IsNaN", "Number.IsOdd", "Number.Ln", "Number.Log", "Number.Log10", "Number.Mod", "Number.Permutations", "Number.Power", "Number.Random", "Number.RandomBetween", "Number.Round", "Number.RoundAwayFromZero", "Number.RoundDown", "Number.RoundTowardZero", "Number.RoundUp", "Number.Sign", "Number.Sin", "Number.Sinh", "Number.Sqrt", "Number.Tan", "Number.Tanh", "Number.ToText", "OData.Feed", "Odbc.DataSource", "Odbc.Query", "OleDb.DataSource", "OleDb.Query", "Oracle.Database", "Percentage.From", "PostgreSQL.Database", "RData.FromBinary", "Record.AddField", "Record.Combine", "Record.Field", "Record.FieldCount", "Record.FieldNames", "Record.FieldOrDefault", "Record.FieldValues", "Record.FromList", "Record.FromTable", "Record.HasFields", "Record.RemoveFields", "Record.RenameFields", "Record.ReorderFields", "Record.SelectFields", "Record.ToList", "Record.ToTable", "Record.TransformFields", "Replacer.ReplaceText", "Replacer.ReplaceValue", "RowExpression.Column", "RowExpression.From", "Salesforce.Data", "Salesforce.Reports", "SapBusinessWarehouse.Cubes", "SapHana.Database", "SharePoint.Contents", "SharePoint.Files", "SharePoint.Tables", "Single.From", "Soda.Feed", "Splitter.SplitByNothing", "Splitter.SplitTextByAnyDelimiter", "Splitter.SplitTextByDelimiter", "Splitter.SplitTextByEachDelimiter", "Splitter.SplitTextByLengths", "Splitter.SplitTextByPositions", "Splitter.SplitTextByRanges", "Splitter.SplitTextByRepeatedLengths", "Splitter.SplitTextByWhitespace", "Sql.Database", "Sql.Databases", "SqlExpression.SchemaFrom", "SqlExpression.ToExpression", "Sybase.Database", "Table.AddColumn", "Table.AddIndexColumn", "Table.AddJoinColumn", "Table.AddKey", "Table.AggregateTableColumn", "Table.AlternateRows", "Table.Buffer", "Table.Column", "Table.ColumnCount", "Table.ColumnNames", "Table.ColumnsOfType", "Table.Combine", "Table.CombineColumns", "Table.Contains", "Table.ContainsAll", "Table.ContainsAny", "Table.DemoteHeaders", "Table.Distinct", "Table.DuplicateColumn", "Table.ExpandListColumn", "Table.ExpandRecordColumn", "Table.ExpandTableColumn", "Table.FillDown", "Table.FillUp", "Table.FilterWithDataTable", "Table.FindText", "Table.First", "Table.FirstN", "Table.FirstValue", "Table.FromColumns", "Table.FromList", "Table.FromPartitions", "Table.FromRecords", "Table.FromRows", "Table.FromValue", "Table.Group", "Table.HasColumns", "Table.InsertRows", "Table.IsDistinct", "Table.IsEmpty", "Table.Join", "Table.Keys", "Table.Last", "Table.LastN", "Table.MatchesAllRows", "Table.MatchesAnyRows", "Table.Max", "Table.MaxN", "Table.Min", "Table.MinN", "Table.NestedJoin", "Table.Partition", "Table.PartitionValues", "Table.Pivot", "Table.PositionOf", "Table.PositionOfAny", "Table.PrefixColumns", "Table.Profile", "Table.PromoteHeaders", "Table.Range", "Table.RemoveColumns", "Table.RemoveFirstN", "Table.RemoveLastN", "Table.RemoveMatchingRows", "Table.RemoveRows", "Table.RemoveRowsWithErrors", "Table.RenameColumns", "Table.ReorderColumns", "Table.Repeat", "Table.ReplaceErrorValues", "Table.ReplaceKeys", "Table.ReplaceMatchingRows", "Table.ReplaceRelationshipIdentity", "Table.ReplaceRows", "Table.ReplaceValue", "Table.ReverseRows", "Table.RowCount", "Table.Schema", "Table.SelectColumns", "Table.SelectRows", "Table.SelectRowsWithErrors", "Table.SingleRow", "Table.Skip", "Table.Sort", "Table.SplitColumn", "Table.ToColumns", "Table.ToList", "Table.ToRecords", "Table.ToRows", "Table.TransformColumnNames", "Table.TransformColumnTypes", "Table.TransformColumns", "Table.TransformRows", "Table.Transpose", "Table.Unpivot", "Table.UnpivotOtherColumns", "Table.View", "Table.ViewFunction", "TableAction.DeleteRows", "TableAction.InsertRows", "TableAction.UpdateRows", "Tables.GetRelationships", "Teradata.Database", "Text.AfterDelimiter", "Text.At", "Text.BeforeDelimiter", "Text.BetweenDelimiters", "Text.Clean", "Text.Combine", "Text.Contains", "Text.End", "Text.EndsWith", "Text.Format", "Text.From", "Text.FromBinary", "Text.Insert", "Text.Length", "Text.Lower", "Text.Middle", "Text.NewGuid", "Text.PadEnd", "Text.PadStart", "Text.PositionOf", "Text.PositionOfAny", "Text.Proper", "Text.Range", "Text.Remove", "Text.RemoveRange", "Text.Repeat", "Text.Replace", "Text.ReplaceRange", "Text.Select", "Text.Split", "Text.SplitAny", "Text.Start", "Text.StartsWith", "Text.ToBinary", "Text.ToList", "Text.Trim", "Text.TrimEnd", "Text.TrimStart", "Text.Upper", "Time.EndOfHour", "Time.From", "Time.FromText", "Time.Hour", "Time.Minute", "Time.Second", "Time.StartOfHour", "Time.ToRecord", "Time.ToText", "Type.AddTableKey", "Type.ClosedRecord", "Type.Facets", "Type.ForFunction", "Type.ForRecord", "Type.FunctionParameters", "Type.FunctionRequiredParameters", "Type.FunctionReturn", "Type.Is", "Type.IsNullable", "Type.IsOpenRecord", "Type.ListItem", "Type.NonNullable", "Type.OpenRecord", "Type.RecordFields", "Type.ReplaceFacets", "Type.ReplaceTableKeys", "Type.TableColumn", "Type.TableKeys", "Type.TableRow", "Type.TableSchema", "Type.Union", "Uri.BuildQueryString", "Uri.Combine", "Uri.EscapeDataString", "Uri.Parts", "Value.Add", "Value.As", "Value.Compare", "Value.Divide", "Value.Equals", "Value.Firewall", "Value.FromText", "Value.Is", "Value.Metadata", "Value.Multiply", "Value.NativeQuery", "Value.NullableEquals", "Value.RemoveMetadata", "Value.ReplaceMetadata", "Value.ReplaceType", "Value.Subtract", "Value.Type", "ValueAction.NativeStatement", "ValueAction.Replace", "Variable.Value", "Web.Contents", "Web.Page", "WebAction.Request", "Xml.Document", "Xml.Tables" ], builtinConstants: [ "BinaryEncoding.Base64", "BinaryEncoding.Hex", "BinaryOccurrence.Optional", "BinaryOccurrence.Repeating", "BinaryOccurrence.Required", "ByteOrder.BigEndian", "ByteOrder.LittleEndian", "Compression.Deflate", "Compression.GZip", "CsvStyle.QuoteAfterDelimiter", "CsvStyle.QuoteAlways", "Culture.Current", "Day.Friday", "Day.Monday", "Day.Saturday", "Day.Sunday", "Day.Thursday", "Day.Tuesday", "Day.Wednesday", "ExtraValues.Error", "ExtraValues.Ignore", "ExtraValues.List", "GroupKind.Global", "GroupKind.Local", "JoinAlgorithm.Dynamic", "JoinAlgorithm.LeftHash", "JoinAlgorithm.LeftIndex", "JoinAlgorithm.PairwiseHash", "JoinAlgorithm.RightHash", "JoinAlgorithm.RightIndex", "JoinAlgorithm.SortMerge", "JoinKind.FullOuter", "JoinKind.Inner", "JoinKind.LeftAnti", "JoinKind.LeftOuter", "JoinKind.RightAnti", "JoinKind.RightOuter", "JoinSide.Left", "JoinSide.Right", "MissingField.Error", "MissingField.Ignore", "MissingField.UseNull", "Number.E", "Number.Epsilon", "Number.NaN", "Number.NegativeInfinity", "Number.PI", "Number.PositiveInfinity", "Occurrence.All", "Occurrence.First", "Occurrence.Last", "Occurrence.Optional", "Occurrence.Repeating", "Occurrence.Required", "Order.Ascending", "Order.Descending", "Precision.Decimal", "Precision.Double", "QuoteStyle.Csv", "QuoteStyle.None", "RelativePosition.FromEnd", "RelativePosition.FromStart", "RoundingMode.AwayFromZero", "RoundingMode.Down", "RoundingMode.ToEven", "RoundingMode.TowardZero", "RoundingMode.Up", "SapHanaDistribution.All", "SapHanaDistribution.Connection", "SapHanaDistribution.Off", "SapHanaDistribution.Statement", "SapHanaRangeOperator.Equals", "SapHanaRangeOperator.GreaterThan", "SapHanaRangeOperator.GreaterThanOrEquals", "SapHanaRangeOperator.LessThan", "SapHanaRangeOperator.LessThanOrEquals", "SapHanaRangeOperator.NotEquals", "TextEncoding.Ascii", "TextEncoding.BigEndianUnicode", "TextEncoding.Unicode", "TextEncoding.Utf16", "TextEncoding.Utf8", "TextEncoding.Windows", "TraceLevel.Critical", "TraceLevel.Error", "TraceLevel.Information", "TraceLevel.Verbose", "TraceLevel.Warning", "WebMethod.Delete", "WebMethod.Get", "WebMethod.Head", "WebMethod.Patch", "WebMethod.Post", "WebMethod.Put" ], builtinTypes: [ "Action.Type", "Any.Type", "Binary.Type", "BinaryEncoding.Type", "BinaryOccurrence.Type", "Byte.Type", "ByteOrder.Type", "Character.Type", "Compression.Type", "CsvStyle.Type", "Currency.Type", "Date.Type", "DateTime.Type", "DateTimeZone.Type", "Day.Type", "Decimal.Type", "Double.Type", "Duration.Type", "ExtraValues.Type", "Function.Type", "GroupKind.Type", "Guid.Type", "Int16.Type", "Int32.Type", "Int64.Type", "Int8.Type", "JoinAlgorithm.Type", "JoinKind.Type", "JoinSide.Type", "List.Type", "Logical.Type", "MissingField.Type", "None.Type", "Null.Type", "Number.Type", "Occurrence.Type", "Order.Type", "Password.Type", "Percentage.Type", "Precision.Type", "QuoteStyle.Type", "Record.Type", "RelativePosition.Type", "RoundingMode.Type", "SapHanaDistribution.Type", "SapHanaRangeOperator.Type", "Single.Type", "Table.Type", "Text.Type", "TextEncoding.Type", "Time.Type", "TraceLevel.Type", "Type.Type", "Uri.Type", "WebMethod.Type" ], tokenizer: { root: [ // quoted identifier [/#"[\w \.]+"/, "identifier.quote"], // numbers [/\d*\.\d+([eE][\-+]?\d+)?/, "number.float"], [/0[xX][0-9a-fA-F]+/, "number.hex"], [/\d+([eE][\-+]?\d+)?/, "number"], // keywords [ /(#?[a-z]+)\b/, { cases: { "@typeKeywords": "type", "@keywords": "keyword", "@constants": "constant", "@constructors": "constructor", "@operatorKeywords": "operators", "@default": "identifier" } } ], // built-in types [ /\b([A-Z][a-zA-Z0-9]+\.Type)\b/, { cases: { "@builtinTypes": "type", "@default": "identifier" } } ], // other built-ins [ /\b([A-Z][a-zA-Z0-9]+\.[A-Z][a-zA-Z0-9]+)\b/, { cases: { "@builtinFunctions": "keyword.function", "@builtinConstants": "constant", "@default": "identifier" } } ], // other identifiers [/\b([a-zA-Z_][\w\.]*)\b/, "identifier"], { include: "@whitespace" }, { include: "@comments" }, { include: "@strings" }, [/[{}()\[\]]/, "@brackets"], [/([=\+<>\-\*&@\?\/!])|([<>]=)|(<>)|(=>)|(\.\.\.)|(\.\.)/, "operators"], [/[,;]/, "delimiter"] ], whitespace: [[/\s+/, "white"]], comments: [ ["\\/\\*", "comment", "@comment"], ["\\/\\/+.*", "comment"] ], comment: [ ["\\*\\/", "comment", "@pop"], [".", "comment"] ], strings: [['"', "string", "@string"]], string: [ ['""', "string.escape"], ['"', "string", "@pop"], [".", "string"] ] } }; return __toCommonJS(powerquery_exports); })(); return moduleExports; });
combined_dataset/train/non-malicious/2654.ps1
2654.ps1
Try { If (([System.Diagnostics.Process]::GetCurrentProcess() | Select "SessionID" -ExpandProperty "SessionID") -eq 0) { Exit 1 } Else { Exit 0 } } Catch { Exit 2 }
combined_dataset/train/non-malicious/archive.ps1
archive.ps1
$rootDir = 'C:\\Documents and Settings\\buddyl\\My Documents\\Powershell Scripts\\'; $temp = $rootDir + 'temp' mkdir $temp $tempDir = $temp + '\\' $targetFolder1 = $rootDir + 'test' $zip1 = $tempDir + 'test1.zip' gi $targetFolder1 | out-zip $zip1 $_ $targetFolder2 = $rootDir + 'test2' $zip2 = $tempDir + 'test2.zip' gi $targetFolder2 | out-zip $zip2 $_ $day = (Get-Date).get_day(); $month = (Get-Date).get_Month(); $year = (Get-Date).get_Year(); $date = $month.ToString() + "-" + $day.ToString() + "-" + $year.ToString(); $file = $rootDir + 'backup' + $date + '.zip' gi $temp | out-zip $file $_ rmdir $temp -r
combined_dataset/train/non-malicious/1146.ps1
1146.ps1
$cert = $null function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { $cert = Install-Certificate (Join-Path $TestDir CarbonTestCertificate.cer -Resolve) -StoreLocation LocalMachine -StoreName My } function Stop-Test { Uninstall-Certificate -Certificate $cert -StoreLocation LocalMachine -StoreName My } function Test-ShouldCreateNewSslCertificateBinding { $appID = '0e8a659e-8034-4ab1-ab82-dcb0f5e90bfd' $ipAddress = '74.32.80.43' $port = '3847' $binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint try { Assert-Null $binding $binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port $ipPort = '{0}:{1}' -f $ipAddress,$port Assert-Equal $ipPort $binding.IPPort Assert-Equal $appID $binding.ApplicationID Assert-Equal $cert.Thumbprint $binding.CertificateHash } finally { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port } } function Test-ShouldReturnBinding { $appID = '0e8a659e-8034-4ab1-ab82-dcb0f5e90bfd' $ipAddress = '74.32.80.43' $port = '3847' $binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint -PassThru $expectedBinding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port try { Assert-NotNull $binding Assert-Equal $expectedBinding $binding $ipPort = '{0}:{1}' -f $ipAddress,$port Assert-Equal $ipPort $binding.IPPort Assert-Equal $appID $binding.ApplicationID Assert-Equal $cert.Thumbprint $binding.CertificateHash } finally { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port } } function Test-ShouldUpdateExistingSslCertificateBinding { $appID = '40f5bb4b-569b-47a8-a0cb-39ed797ce8ea' $newAppID = '353364bb-1ca8-4d6c-a596-be7608d57771' $ipAddress = '74.38.209.47' $port = '8823' $binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint Assert-Null $binding $binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $newAppID -Thumbprint $cert.Thumbprint Assert-Null $binding $binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port try { Assert-Equal $newAppID $binding.ApplicationID } finally { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port } } function Test-ShouldSupportShouldProcess { $appID = '411b1023-be42-458e-8fe7-a7ab6c908566' $ipAddress = '54.72.38.90' $port = '4782' $binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint -WhatIf Assert-Null $binding try { Assert-Null (Get-SslCertificateBinding -IPAddress $ipAddress -Port $port) } finally { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port } } function Test-ShouldSupportShouldProcessOnBindingUpdate { $appID = '411b1023-be42-458e-8fe7-a7ab6c908566' $newAppID = 'db48e0ec-6d8c-4b2c-9486-a2bb33c68b05' $ipAddress = '54.237.80.94' $port = '7821' $binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint Assert-Null $binding $binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $newAppID -Thumbprint $cert.Thumbprint -WhatIf Assert-Null $binding $binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port try { Assert-Equal $appID $binding.ApplicationID } finally { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port } } function Test-ShouldSupportIPv6Address { $appID = '9aa262a9-dfb3-49db-b368-9f15bc12168c' $ipAddress = '[::]' $port = '7821' $binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint try { Assert-Null $binding $binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port Assert-Equal $appID $binding.ApplicationID } finally { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port } }
combined_dataset/train/non-malicious/sample_48_12.ps1
sample_48_12.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Returns an Application Insights component. .Description Returns an Application Insights component. .Link https://learn.microsoft.com/powershell/module/az.applicationinsights/get-azapplicationinsights #> function Get-AzApplicationInsights { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api202002.IApplicationInsightsComponent], [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.PSApplicationInsightsComponentWithPricingPlan])] [CmdletBinding(DefaultParameterSetName='ListBySubscription', PositionalBinding=$false)] param( [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='ListByResourceGroupName', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Get', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [System.String] [Alias("ApplicationInsightsComponentName", "ComponentName")] # The name of the Application Insights component resource. ${Name}, [Parameter(ParameterSetName='Get')] [Parameter(ParameterSetName='ListByResourceGroupName')] [Parameter(ParameterSetName='ListBySubscription')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String[]] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='GetByResourceId', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [System.String] # The resource ID of applicationinsights component. ${ResourceId}, [Parameter(ParameterSetName='Get')] [Parameter(ParameterSetName='GetByResourceId')] [Alias("IncludeDailyCap", "IncludeDailyCapStatus", "IncludePricingPlan")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] ${Full}, [Parameter(ParameterSetName='GetByInputObject', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.IApplicationInsightsIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if ($PSBoundParameters.ContainsKey('Full')) { $full = $PSBoundParameters['Full'] $null = $PSBoundParameters.Remove('Full') } switch ($PSCmdlet.ParameterSetName) { 'GetByResourceId' { $resourceId = $PSBoundParameters['ResourceId'] $null = $PSBoundParameters.Remove('ResourceId') $component = (. Az.ApplicationInsights.internal\Get-AzApplicationInsights -InputObject $resourceId @PSBoundParameters) if ($full) { $pricingPlan = . Az.ApplicationInsights.internal\Get-AzApplicationInsightsComponentCurrentBillingFeature -InputObject $resourceId @PSBoundParameters $dailyCapStatus = . Az.ApplicationInsights.internal\Get-AzApplicationInsightsComponentQuotaStatus -InputObject $resourceId @PSBoundParameters } break } default { if ($PSBoundParameters['Name']) { if ($full) { $pricingPlan = (. Az.ApplicationInsights.internal\Get-AzApplicationInsightsComponentCurrentBillingFeature @PSBoundParameters) $dailyCapStatus = (. Az.ApplicationInsights.internal\Get-AzApplicationInsightsComponentQuotaStatus @PSBoundParameters) } } $component = (. Az.ApplicationInsights.internal\Get-AzApplicationInsights @PSBoundParameters) break } } if ($full) { $PSCmdlet.WriteObject([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.PSApplicationInsightsComponentWithPricingPlan]::New($component, $pricingPlan, $dailyCapStatus), $true) } else { $PSCmdlet.WriteObject($component, $true) } } } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAyxuRE1EzRIZD9 # ZVtrFhUabmMihf/6S9SHorOQFlIOGaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAV+ # 8xPOaGB2QcIGbXR4lRsC7FzgWMSh5mqo1/455yceMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAQ01OZ9H3AnZqcwo/JFcpCRv13cYIDTE3ZhBF # tMPkU82FOQOcVzZB2UnN51jkswmp4Z4ZS8YypaU4pm9Wn9RGwhtzuYLoO96ofPCH # +mbWlvk0iRTsSelMaJQRo8Fgrf2lGGw7YkZHJOSssXbxDcYzPSpTaIexsC+wWrn6 # p9Fb3G3M5AVEAPYvTUyYuSgaIXdVnW9/DOCWNq5PxF2NvhSoJUJTYDkcYNuRhDDU # WIuBplTZKlFnj6XQiFgWvHz9M4hpyexqsGjO7Sd6IgDanXldHCILZWg+s9+4mg0I # H7XLhi37xJeFCOy9O4zvqbYiIWOvrJbJni6SUYjECaW9ehukraGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCvE1UgqgmQxNRK0IWWXvNLNDm3NEhNx+4c # n+DLoS8QvQIGZh+2Ye+cGBMyMDI0MDQyMzEzMTYxNi40NDRaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkie # lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB # 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU # IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo # KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn # vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 # RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 # OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS # qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 # G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ # 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy # k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK # IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu # y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X # EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi # D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S # QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY # huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 # 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg # Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r # rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg # 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH # doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy # 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnSHRowIhgPMjAyNDA0MjMxOTQyMThaGA8yMDI0MDQy # NDE5NDIxOFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dIdGgIBADAHAgEAAgIN # KjAHAgEAAgIRtjAKAgUA6dNumgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AAPWsZdCCWsEmxg1OXos5EufWRbruuws3CJ+wEAhXiNDRMQ7tdOCBgZR4T/JVpjA # dTjbpz0afi31snq11zCbJoH2p291ETykxGG5oDc9PUq7jhEVlu3lAa2u4xmVD6Tp # ANJGZ4XBHaaFo4pYqZnf+r6LSbkNZ7j7/OiTe7k9FCvYMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAA # Ad4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgJQGV1uqc1+5Lgmv0lr+a9rLZKTNH69OK9xFVVR8B # slswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3Mg # rT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIJZsqRmMvFYOvtIgYbW9mvW3 # 4zSiELA9VMZ+e/k6ckSaMA0GCSqGSIb3DQEBCwUABIICAIj3mPfJlPfsdugw8x0D # Nt4xPBlKL9+oGJjmQVI0szWMwLMMyveY33g5+2TECTJUslSBWRPTswHzW06c41Hc # psYWIMSbEUxGNu2+hbIfYFQqZoGuTTNv+7ncl4m4MgCJTCOPZ2eEm05JDioHXii0 # F9HpQ6WRmhccSSi9kicO/BCcV2ogWbdR6KlYscRAX0j911GkaOClZFCXrs4yuPy5 # Eytv7Q8BcEwZcITX2Cp+Q9x3EAXHAaAmr9ClDWAIDp7PkvuH4TFLsXFQNtqla99f # 369E+Y4t/LlyFC0epbWwKW88CkD5nn+3xwS8skzUaq0v5Gx/zqWyfMe973QzG51a # NyP4pugqHWKxsCRr4efo/ZDwKtn/HdP9RdMrVkPV70pUTEPvLgGLeej3GFbEST2C # ryZzRpnMUEegR2Z3YNt6EKQdWC5w6rD9Ywk/hsyKDguRLhZn5tNdy95uAO+oBwg1 # 8aYqcjgjGOdbMDcDtD04+fvnVFUOLfP4yRG9nZWLDIamVqCrhkcuG2hNgPZib5pG # z6PIS3AW92LtNOSNdQJb2PbBdmP+KRQ8I0ndr0M4brw8Dh+RJFGPXjYoGgngq22q # MWesfBuLuBo5ABtUG1cw+gpLkQuAqrnxqSKCzvHXK8geCq+8bhKaDzFuZJEZpief # EPcciWfkq7yNkVROWJ/fd3sU # SIG # End signature block
combined_dataset/train/non-malicious/Get-QADGroupNesting_1.ps1
Get-QADGroupNesting_1.ps1
Param ( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, HelpMessage="DN or ObjectGUID of the AD Group." )] [string]$groupIdentity, [switch]$showTree ) #Validate Quest PSSnapin is loaded Add-PSSnapin -Name Quest.ActiveRoles.ADManagement -ErrorAction SilentlyContinue $global:numberOfRecursiveGroupMemberships = 0 $lastGroupAtALevelFlags = @() function Get-GroupNesting ([string] $identity, [int] $level, [hashtable] $groupsVisitedBeforeThisOne, [bool] $lastGroupOfTheLevel) { $group = $null $group = Get-QADGroup -Identity $identity -SizeLimit 0 if($lastGroupAtALevelFlags.Count -le $level) { $lastGroupAtALevelFlags = $lastGroupAtALevelFlags + 0 } if($group -ne $null) { if($showTree) { for($i = 0; $i -lt $level - 1; $i++) { if($lastGroupAtALevelFlags[$i] -ne 0) { Write-Host -ForegroundColor Blue -NoNewline " " } else { Write-Host -ForegroundColor Blue -NoNewline "&#9474; " } } if($level -ne 0) { if($lastGroupOfTheLevel) { Write-Host -ForegroundColor Blue -NoNewline "&#9492;&#9472;" } else { Write-Host -ForegroundColor Blue -NoNewline "&#9500;&#9472;" } } Write-Host -ForegroundColor Blue $group.Name } $groupsVisitedBeforeThisOne.Add($group.DN,$null) $global:numberOfRecursiveGroupMemberships ++ $groupMemberShipCount = $group.memberOf.Count if ($groupMemberShipCount -gt 0) { $maxMemberGroupLevel = 0 $count = 0 foreach($groupDN in $group.memberOf) { $count++ $lastGroupOfThisLevel = $false if($count -eq $groupMemberShipCount){$lastGroupOfThisLevel = $true; $lastGroupAtALevelFlags[$level] = 1} if(-not $groupsVisitedBeforeThisOne.Contains($groupDN)) #prevent cyclic dependancies { $memberGroupLevel = Get-GroupNesting -Identity $groupDN -Level $($level+1) -GroupsVisitedBeforeThisOne $groupsVisitedBeforeThisOne -lastGroupOfTheLevel $lastGroupOfThisLevel if ($memberGroupLevel -gt $maxMemberGroupLevel){$maxMemberGroupLevel = $memberGroupLevel} } } $level = $maxMemberGroupLevel } else #we've reached the top level group, return it's height { return $level } return $level } } $global:numberOfRecursiveGroupMemberships = 0 $groupObj = Get-QADGroup -Identity $groupIdentity -SizeLimit 0 if($groupObj) { [int]$maxNestingLevel = Get-GroupNesting -Identity $groupIdentity -Level 0 -GroupsVisitedBeforeThisOne @{} -lastGroupOfTheLevel $false Add-Member -InputObject $groupObj -MemberType NoteProperty -Name MaxNestingLevel -Value $maxNestingLevel -Force Add-Member -InputObject $groupObj -MemberType NoteProperty -Name NestedGroupMembershipCount -Value $($global:numberOfRecursiveGroupMemberships - 1) -Force $groupObj | Select-Object Name,DN,MaxNestingLevel,NestedGroupMembershipCount | Format-List }
combined_dataset/train/non-malicious/sample_58_64.ps1
sample_58_64.ps1
# Localized 06/27/2024 06:02 AM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=&Ano PromptNoString=&Ne BundleFound=Nalezený svazek: {0} PackageFound=Nalezený balíček: {0} EncryptedBundleFound=Nalezena zašifrovaná sada prostředků: {0} EncryptedPackageFound=Nalezen zašifrovaný balíček: {0} CertificateFound=Nalezený certifikát: {0} DependenciesFound=Nalezené balíčky závislostí: GettingDeveloperLicense=Získává se vývojářská licence... InstallingCertificate=Instaluje se certifikát... InstallingPackage=\nInstaluje se aplikace... AcquireLicenseSuccessful=Vývojářská licence se úspěšně získala. InstallCertificateSuccessful=Certifikát se úspěšně nainstaloval. Success=\nÚspěch: Aplikace se úspěšně nainstalovala. WarningInstallCert=\nChystáte se do úložiště certifikátů od důvěryhodných osob ve vašem počítači nainstalovat digitální certifikát. Provedení této akce představuje vážné bezpečnostní riziko a měli byste ji provést jenom v případě, že původci tohoto digitálního certifikátu důvěřujete.\n\nAž tuto aplikaci přestanete používat, měli byste přidružený digitální certifikát ručně odebrat. Postup, jak to udělat, najdete tady: http://go.microsoft.com/fwlink/?LinkId=243053\n\nOpravdu chcete pokračovat?\n\n ElevateActions=\nPřed instalací této aplikace musíte provést následující: ElevateActionDevLicense=\t- získat vývojářskou licenci ElevateActionCertificate=\t- nainstalovat podpisový certifikát ElevateActionsContinue=Po zadání přihlašovacích údajů správce budete moct pokračovat. Přijměte prosím výzvu služby UAC a v případě, že budete vyzváni, zadejte heslo správce. ErrorForceElevate=Po zadání přihlašovacích údajů správce budete moct pokračovat. Spusťte prosím tento skript bez parametru -Force, nebo z okna prostředí PowerShell se zvýšenými oprávněními. ErrorForceDeveloperLicense=Získání vývojářské licence vyžaduje interakci s uživatelem. Spusťte prosím tento skript znovu bez parametru -Force. ErrorLaunchAdminFailed=Chyba: Nový proces nemůžete zahájit jako správce. ErrorNoScriptPath=Chyba: Tento skript je potřeba spustit ze souboru. ErrorNoPackageFound=Chyba: V adresáři skriptů se nenašel žádný balíček ani svazek. Zkontrolujte prosím, jestli se balíček nebo svazek, který chcete nainstalovat, nachází ve stejném adresáři jako tento skript. ErrorManyPackagesFound=Chyba: V adresáři skriptů se našlo víc balíčků nebo svazků. Zkontrolujte prosím, že se ve stejném adresáři jako skript nachází jenom ten balíček nebo svazek, který chcete nainstalovat. ErrorPackageUnsigned=Chyba: Balíček nebo svazek není digitálně podepsaný nebo je jeho podpis poškozený. ErrorNoCertificateFound=Chyba: V adresáři skriptů se nenašel žádný certifikát. Zkontrolujte prosím, že se certifikát použitý k podpisu balíčku nebo svazku, který chcete nainstalovat, nachází ve stejném adresáři jako tento skript. ErrorManyCertificatesFound=Chyba: V adresáři skriptů se našlo víc certifikátů. Zkontrolujte prosím, že se ve stejném adresáři jako tento skript nachází jenom ten certifikát použitý k podpisu balíčku nebo svazku, který chcete nainstalovat. ErrorBadCertificate=Chyba: Soubor {0} není platným digitálním certifikátem. Nástroj CertUtil se vrátil s kódem chyby {1}. ErrorExpiredCertificate=Chyba: Platnost certifikátu vývojáře {0} vypršela. Jednou z možných příčin je skutečnost, že systémové hodiny nejsou nastavené na správné datum a čas. Pokud je nastavení systému správné, obraťte se na vlastníka aplikace s žádostí o opakované vytvoření balíčku nebo svazku s platným certifikátem. ErrorCertificateMismatch=Chyba: Certifikát se neshoduje s tím, který je použitý k podpisu balíčku nebo svazku. ErrorCertIsCA=Chyba: Jako certifikát se nedá použít certifikační autorita. ErrorBannedKeyUsage=Chyba: Certifikát nemůže mít následující použití klíče: {0}. Použití klíče musí být neurčené nebo shodné s digitálním podpisem. ErrorBannedEKU=Chyba: Certifikát nemůže mít následující rozšířené použití klíče: {0}. Povolené je jenom rozšířené použití klíče podpisu kódu a životnosti podepisování. ErrorNoBasicConstraints=Chyba: U certifikátu chybí rozšíření základních omezení. ErrorNoCodeSigningEku=Chyba: U certifikátu chybí rozšířené použití klíče pro podpis kódu. ErrorInstallCertificateCancelled=Chyba: Instalace certifikátu byla zrušena. ErrorCertUtilInstallFailed=Chyba: Certifikát se nepovedlo nainstalovat. Nástroj CertUtil se vrátil s kódem chyby {0}. ErrorGetDeveloperLicenseFailed=Chyba: Nepovedlo se získat vývojářskou licenci. Další informace najdete na adrese http://go.microsoft.com/fwlink/?LinkID=252740. ErrorInstallCertificateFailed=Chyba: Certifikát se nepovedlo nainstalovat. Stav: {0}. Další informace najdete na adrese http://go.microsoft.com/fwlink/?LinkID=252740. ErrorAddPackageFailed=Chyba: Aplikace se nedala nainstalovat. ErrorAddPackageFailedWithCert=Chyba: Aplikace se nedala nainstalovat. Abyste zajistili bezpečnost, zvažte prosím odinstalování podpisového certifikátu, dokud nebudete moct aplikaci nainstalovat. Postup, jak to udělat, najdete tady:\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@
combined_dataset/train/non-malicious/Remove local profiles.ps1
Remove local profiles.ps1
<# .SYNOPSIS This is a powershell script form to remove a users local profile from a workstation and and gives the option to remove the users profile fromt he network. .DESCRIPTION This script askes for a machine name. It displays all of the roaming profiles on that machine. The administrator selects the profile to be removed from the machine. The administrator selects whether the network profile is to be removed as well. The administrator clicks the delete button and the script removes the local profile and the network profile if the option was seleteced. .NOTES This script must be run as with adminstrator credentials. Created: 08/03/13 #> CLS Import-Module ActiveDirectory # Define Variables $global:Workstation = "" function CheckCredentials { # Check Credentials $Credential = ([Security.Principal.WindowsIdentity]::GetCurrent()).Name $CredentialTest = ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator") if($CredentialTest -eq $false) { [System.Windows.Forms.MessageBox]::Show("You are not an Administrator.`n`nPlease run the script with `nAdministrator credentials." , "Not an Administrator!" , 0) $objForm.Close() } } function TestWMIConnection { # Test WMI Connection and update label if(!(Get-WmiObject -class "Win32_Process" -namespace "root\\cimv2" -ComputerName $Workstation -ErrorAction SilentlyContinue)) { $WMIConnectionLabel.ForeColor = "Red" $WMIConnectionLabel.Text = "WMI Connection to device is DOWN." } else { $WMIConnectionLabel.ForeColor = "Green" $WMIConnectionLabel.Text = "WMI Connection to device is OK." } } function GetLocalProfiles { $ProfilesFoundListBox.Items.Clear() $ProfileDetailsRichTextBox.Text = "" $Profiles = "" $Profiles = @(Get-WmiObject -Class Win32_UserProfile -ComputerName $Workstation -ErrorAction SilentlyContinue | ?{$_.Status -eq "2"}) # Profile Status values are (0, 1, 2, 4, 8) where a value of zero denotes unset or default # and 1 = Temporary, 2 = Roaming, 4 = Mandatory and 8 = Corrupted. foreach($Profile in $Profiles) { $objSID = New-Object System.Security.Principal.SecurityIdentifier($Profile.sid) $objUser = $objSID.Translate([System.Security.Principal.NTAccount]) $Profilename = $objUser.value.split("\\")[1] $ProfilesFoundListBox.Items.Add($Profilename.ToUpper()) $objForm.Update() } } function GetProfileDetails { # Get AD Account Info $ADInfo = "" $LocalProfile = "" $ADUserID = Get-ADUser -Identity $ProfilesFoundListBox.SelectedItem -Properties * $ProfileInfo = "Active Directory Details:" $ProfileInfo = $ProfileInfo + "`nName : " + $ADUserID.displayNamePrintable $ProfileInfo = $ProfileInfo + "`nOffice : " + $ADUserID.Office $ProfileInfo = $ProfileInfo + "`nStaff ID: " + $ADUserID.EmployeeID $ProfileInfo = $ProfileInfo + "`nProfile : " + $ADUserID.ProfilePath # Get Local Profile Info $LocalProfile = Get-WmiObject -Class Win32_UserProfile -ComputerName $Workstation -ErrorAction SilentlyContinue | ?{$_.LocalPath -like "*" + $ProfilesFoundListBox.SelectedItem} try { $LastDownloadTime = $LocalProfile.ConvertToDateTime($LocalProfile.LastDownloadTime).ToShortDateString() } catch { $LastDownloadTime = "Never Downloaded" } $LastUsedTime = $LocalProfile.ConvertToDateTime($LocalProfile.LastUseTime).ToShortDateString() $ProfileInfo = $ProfileInfo + "`n`nLocal Profile Details:" $ProfileInfo = $ProfileInfo + "`nProfile Path : " + $LocalProfile.LocalPath $ProfileInfo = $ProfileInfo + "`nLast Download : " + $LastDownloadTime $ProfileInfo = $ProfileInfo + "`nLast Used : " + $LastUsedTime $ProfileInfo = $ProfileInfo + "`nIs Loaded : " + $LocalProfile.Loaded $ProfileDetailsRichTextBox.Text = $ProfileInfo if($LocalProfile.Loaded -eq $true) { [System.Windows.Forms.MessageBox]::Show("The selected profile is currently loaded.`nThe profile will need to be logged off.", "Profile Loaded" , 0) } } function DeleteLocalProfile { $ConfirmDelete = [System.Windows.Forms.MessageBox]::Show("CONFIRM`n`nDelete local profile : " + $ProfilesFoundListBox.SelectedItem + "`nFrom Workstation : " + $Workstation.ToUpper() , "Local Profile Delete" , 4) if ($ConfirmDelete -eq "YES") { Get-WmiObject -Class Win32_UserProfile -ComputerName $Workstation -ErrorAction SilentlyContinue | ?{$_.LocalPath -like "*" + $ProfilesFoundListBox.SelectedItem} | Remove-WmiObject [System.Windows.Forms.MessageBox]::Show("Profile "+ $ProfilesFoundListBox.SelectedItem + " has been deleted from " + $Workstation + ".", "Profile Deleted" , 0) } } function DeleteNetworkProfile { $ADUserID = Get-ADUser -Identity $ProfilesFoundListBox.SelectedItem -Properties * $ConfirmDelete = [System.Windows.Forms.MessageBox]::Show("CONFIRM`n`nDelete network profile : " + $ADUserID.displayNamePrintable + "`nPath : " + $ADUserID.ProfilePath , "Network Profile Delete" , 4) if ($ConfirmDelete -eq "YES") { $NetProfile = $ADUserID.ProfilePath $NetProfile = [string]::Join('\\', $NetProfile.Split('\\')[0..$($NetProfile.Split('\\').Length-2)]) Remove-Item $NetProfile -Recurse -Force [System.Windows.Forms.MessageBox]::Show("Network profile has been deleted.`n" + "Path : " + $NetProfile , "Profile Deleted" , 0) } else { $objForm.Close() } } Function BuildForm { [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Drawing") [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void] [System.Windows.Forms.Application]::EnableVisualStyles() $objForm = New-Object System.Windows.Forms.Form $objForm.Text = "Remove Profile Tool" $objForm.Icon = [system.drawing.icon]::ExtractAssociatedIcon($PsHome + "\\powershell.exe") $objForm.Size = New-Object System.Drawing.Size(550,500) $objForm.StartPosition = "CenterScreen" $objForm.AutoSize = $True $objForm.AutoSizeMode = "GrowOnly" # GrowAndShrink or GrowOnly $objForm.AutoScroll = $True $objForm.MinimizeBox = $true $objForm.MaximizeBox = $False $objForm.WindowState = "Normal" # Maximized, Minimized, Normal $objForm.SizeGripStyle = "Hide" # Auto, Hide, Show $objForm.ShowInTaskbar = $true $objForm.Topmost = $True $objFormFont1 = New-Object System.Drawing.Font("Arial",24,[System.Drawing.FontStyle]::Regular) # Form title font $objFormFont2 = New-Object System.Drawing.Font("Arial",10,[System.Drawing.FontStyle]::Regular) # Form font $objFormFont3 = New-Object System.Drawing.Font("Consolas",10,[System.Drawing.FontStyle]::Regular) # Fixed width font # $objFormFont3 = New-Object System.Drawing.Font("Lucida Console",10,[System.Drawing.FontStyle]::Regular) # Second fixed width font # Font styles are: Regular, Bold, Italic, Underline, Strikeout $objForm.Font = $objFormFont2 # Applies font to whole form $objForm.KeyPreview = $True # $objForm.Add_KeyDown({if ($_.KeyCode -eq "Enter"){$x=$objTextBox.Text;$objForm.Close()}}) $objForm.Add_KeyDown({if ($_.KeyCode -eq "Escape"){$objForm.Close()}}) # Form Objects # Check Credentials CheckCredentials #Form Title $FormTitleLabel = New-Object System.Windows.Forms.Label $FormTitleLabel.Location = New-Object System.Drawing.Size(10,10) $FormTitleLabel.Autosize = $true # = New-Object System.Drawing.Size(650,40) $FormTitleLabel.Font = $objFormFont1 $FormTitleLabel.Text = "Profile Removal Tool" $objForm.Controls.Add($FormTitleLabel) #Get Workstation Name $GetWorkstationNameLabel = New-Object System.Windows.Forms.Label $GetWorkstationNameLabel.Location = New-Object System.Drawing.Size(10,70) $GetWorkstationNameLabel.Size = New-Object System.Drawing.Size(140,20) $GetWorkstationNameLabel.Text = "Enter Machine Name" $objForm.Controls.Add($GetWorkstationNameLabel) $GetWorkstationNameTextBox = New-Object System.Windows.Forms.TextBox $GetWorkstationNameTextBox.Location = New-Object System.Drawing.Size(155,69) # Count as (160,70) -1 to align text box $GetWorkstationNameTextBox.Size = New-Object System.Drawing.Size(140,20) $objForm.Controls.Add($GetWorkstationNameTextBox) $GetWorkstationNameButton = New-Object System.Windows.Forms.Button $GetWorkstationNameButton.Location = New-Object System.Drawing.Size(305,69) # Count as (305,70) -1 to align button $GetWorkstationNameButton.Size = New-Object System.Drawing.Size(75,23) $GetWorkstationNameButton.Text = "OK" $GetWorkstationNameButton.Add_Click( { $Workstation = $GetWorkstationNameTextBox.Text.ToUpper() # Update profiles found label $ProfilesFoundLabel.Text = "Profiles found on " + $Workstation $objForm.Controls.Add($ProfilesFoundLabel) # Test WMI Connection TestWMIConnection # Get local profiles GetLocalProfiles }) $objForm.Controls.Add($GetWorkstationNameButton) #WMI Connection Status $WMIConnectionLabel = New-Object System.Windows.Forms.Label $WMIConnectionLabel.Location = New-Object System.Drawing.Size(10,115) $WMIConnectionLabel.Size = New-Object System.Drawing.Size(280,20) $WMIConnectionLabel.Text = "WMI Connection to device is..." $objForm.Controls.Add($WMIConnectionLabel) # Found Profiles $ProfilesFoundLabel = New-Object System.Windows.Forms.Label $ProfilesFoundLabel.Location = New-Object System.Drawing.Size(10,150) $ProfilesFoundLabel.Size = New-Object System.Drawing.Size(280,20) $ProfilesFoundLabel.Text = "Profiles found on..." $objForm.Controls.Add($ProfilesFoundLabel) $ProfilesFoundListBox = New-Object System.Windows.Forms.ListBox $ProfilesFoundListBox.Location = New-Object System.Drawing.Size(10,180) $ProfilesFoundListBox.Size = New-Object System.Drawing.Size(280,200) $ProfilesFoundListBox.Text = "Found Profiles" $ProfilesFoundListBox.Add_Click( { GetProfileDetails }) $objForm.Controls.Add($ProfilesFoundListBox) # Profile Details $ProfileDetailsLabel = New-Object System.Windows.Forms.Label $ProfileDetailsLabel.Location = New-Object System.Drawing.Size(305,150) $ProfileDetailsLabel.Size = New-Object System.Drawing.Size(280,20) $ProfileDetailsLabel.Text = "Profile Details" $objForm.Controls.Add($ProfileDetailsLabel) $ProfileDetailsRichTextBox = New-Object System.Windows.Forms.RichTextBox $ProfileDetailsRichTextBox.Location = New-Object System.Drawing.Size(305,180) $ProfileDetailsRichTextBox.Size = New-Object System.Drawing.Size(280,200) $ProfileDetailsRichTextBox.Font = $objFormFont3 $ProfileDetailsRichTextBox.ForeColor = "DarkGreen" $objForm.Controls.Add($ProfileDetailsRichTextBox) # Delete network profile checkbox $DeleteNetProfileCheckBox = New-Object System.Windows.Forms.CheckBox $DeleteNetProfileCheckBox.Location = New-Object System.Drawing.Size(10,390) $DeleteNetProfileCheckBox.Size = New-Object System.Drawing.Size(280,20) $DeleteNetProfileCheckBox.Text = "Include Network Profile in Delete" $DeleteNetProfileCheckBox.ForeColor = "Red" $objForm.Controls.Add($DeleteNetProfileCheckBox) # Delete button $DeleteButton = New-Object System.Windows.Forms.Button $DeleteButton.Location = New-Object System.Drawing.Size(10,430) $DeleteButton.Size = New-Object System.Drawing.Size(135,23) $DeleteButton.Text = "Delete" $DeleteButton.BackColor = "Red" $DeleteButton.Forecolor = "White" $DeleteButton.Add_Click( { DeleteLocalProfile if($DeleteNetProfileCheckBox.Checked) { DeleteNetworkProfile } # Update profile info GetLocalProfiles }) $objForm.Controls.Add($DeleteButton) $ExitButton = New-Object System.Windows.Forms.Button $ExitButton.Location = New-Object System.Drawing.Size(155,430) $ExitButton.Size = New-Object System.Drawing.Size(135,23) $ExitButton.Text = "Exit" $ExitButton.Add_Click({$objForm.Close()}) $objForm.Controls.Add($ExitButton) # Status Line $StatusLineLabel = New-Object System.Windows.Forms.Label $StatusLineLabel.Location = New-Object System.Drawing.Size(415,430) $StatusLineLabel.Size = New-Object System.Drawing.Size(180,40) $StatusLineLabel.Text = "Version : 2.02" $objForm.Controls.Add($StatusLineLabel) # Show Form $objForm.Add_Shown({$objForm.Activate()}) [void] $objForm.ShowDialog() } # End Function # Application Start BuildForm
combined_dataset/train/non-malicious/2681.ps1
2681.ps1
Param( [string]$SourceEnvironment, [string]$DestinationEnvironment ) begin { Clear-Host } process { $path = Split-Path -parent $MyInvocation.MyCommand.Definition if ($env:PSModulePath -notlike "*$path\Modules\TriadModules\Modules*") { "Adding ;$path\Modules\TriadModules\Modules to PSModulePath" | Write-Debug $env:PSModulePath += ";$path\Modules\TriadModules\Modules" } $config = [xml](Get-Content $path/config.xml -ErrorAction Stop) $defaultSourceEnvironment = "Dev" $defaultDestinationEnvironment = "Uat" if ($SourceEnvironment -eq $null -or $SourceEnvironment -eq "") { $SourceEnvironment = $defaultSourceEnvironment } if ($DestinationEnvironment -eq $null -or $DestinationEnvironment -eq "") { $DestinationEnvironment = $defaultDestinationEnvironment } Add-TMPnPTemplatesForSiteCollections -TemplatePath $path -Configuration $config.OuterXml -SourceEnvironment $SourceEnvironment -DestinationEnvironment $DestinationEnvironment } end { "Completed import!" | Write-Debug }
combined_dataset/train/non-malicious/sample_22_4.ps1
sample_22_4.ps1
<# .SYNOPSIS Launch Developer PowerShell .DESCRIPTION Locates and imports a Developer PowerShell module and calls the Enter-VsDevShell cmdlet. The Developer PowerShell module is located in one of several ways: 1) From a path in a Visual Studio installation 2) From the latest installation of Visual Studio (higher versions first) 3) From the instance ID of a Visual Studio installation 4) By selecting a Visual Studio installation from a list By default, with no parameters, the path to this script is used to locate the Developer PowerShell module. If that fails, then the latest Visual Studio installation is used. If both methods fail, then the user can select a Visual Studio installation from a list. .PARAMETER VsInstallationPath A path in a Visual Studio installation. The path is used to locate the Developer PowerShell module. By default, this is the path to this script. .PARAMETER Latest Use the latest Visual Studio installation to locate the Developer PowerShell module. .PARAMETER List Display a list of Visual Studio installations to choose from. The choosen installation is used to locate the Developer PowerShell module. .PARAMETER VsInstanceId A Visual Studio installation instance ID. The matching installation is used to locate the Developer PowerShell module. .PARAMETER ExcludePrerelease Excludes Prerelease versions of Visual Studio from consideration. Applies only to Latest and List. .PARAMETER VsWherePath Path to the vswhere utility used to located and identify Visual Studio installations. By default, the path is the well-known location shared by Visual Studio installations. #> [CmdletBinding(DefaultParameterSetName = "Default")] param ( [ValidateScript({Test-Path $_})] [Parameter(ParameterSetName = "VsInstallationPath")] [string] $VsInstallationPath = "$($MyInvocation.MyCommand.Definition)", [Parameter(ParameterSetName = "Latest")] [switch] $Latest, [Parameter(ParameterSetName = "List")] [switch] $List, [Parameter(ParameterSetName = "List")] [object[]] $DisplayProperties = @("displayName", "instanceId", "installationVersion", "isPrerelease", "installationName", "installDate"), [Parameter(ParameterSetName = "VsInstanceId", Mandatory = $true)] [string] $VsInstanceId, [Parameter(ParameterSetName = "Latest")] [Parameter(ParameterSetName = "List")] [switch] $ExcludePrerelease, [Parameter(ParameterSetName = "Default")] [Parameter(ParameterSetName = "VsInstallationPath")] [Parameter(ParameterSetName = "Latest")] [Parameter(ParameterSetName = "List")] [Parameter(ParameterSetName = "VsInstanceId")] [ValidateSet('x86','amd64','arm','arm64')] [string] $Arch, [Parameter(ParameterSetName = "Default")] [Parameter(ParameterSetName = "VsInstallationPath")] [Parameter(ParameterSetName = "Latest")] [Parameter(ParameterSetName = "List")] [Parameter(ParameterSetName = "VsInstanceId")] [ValidateSet('x86','amd64')] [string] $HostArch, [Parameter(ParameterSetName = "Default")] [Parameter(ParameterSetName = "VsInstallationPath")] [Parameter(ParameterSetName = "Latest")] [Parameter(ParameterSetName = "List")] [Parameter(ParameterSetName = "VsInstanceId")] [switch] $SkipAutomaticLocation, [ValidateScript({Test-Path $_ -PathType 'Leaf'})] [Parameter(ParameterSetName = "Default")] [Parameter(ParameterSetName = "VsInstallationPath")] [Parameter(ParameterSetName = "Latest")] [Parameter(ParameterSetName = "List")] [Parameter(ParameterSetName = "VsInstanceId")] [string] $VsWherePath = "${env:ProgramFiles(x86)}\Microsoft Visual Studio\Installer\vswhere.exe" ) function GetSetupConfigurations { param ( $whereArgs ) $expression = "& `"$VsWherePath`" $whereArgs -format json" Invoke-Expression $expression | ConvertFrom-Json } function LaunchDevShell { param ( $config ) $basePath = $config.installationPath $instanceId = $config.instanceId $currModulePath = "$basePath\Common7\Tools\Microsoft.VisualStudio.DevShell.dll" # Prior to 16.3 the DevShell module was in a different location $prevModulePath = "$basePath\Common7\Tools\vsdevshell\Microsoft.VisualStudio.DevShell.dll" $modulePath = if (Test-Path $prevModulePath) { $prevModulePath } else { $currModulePath } if (Test-Path $modulePath) { Write-Verbose "Found at $modulePath." try { Import-Module $modulePath } catch [System.IO.FileLoadException] { Write-Verbose "The module has already been imported from a different installation of Visual Studio:" (Get-Module Microsoft.VisualStudio.DevShell).Path | Write-Verbose } $params = @{ VsInstanceId = $instanceId } $command = Get-Command Enter-VsDevShell if ($SkipAutomaticLocation) { $params.SkipAutomaticLocation = $true } # -Arch is only available from 17.1 if ($Arch -and $command.Parameters.ContainsKey("Arch")) { $params.Arch = $Arch } # -HostArch is only available from 17.1 if ($HostArch -and $command.Parameters.ContainsKey("HostArch")) { $params.HostArch = $HostArch } # -ReportNewInstanceType is only available from 16.5 if ($command.Parameters.ContainsKey("ReportNewInstanceType")) { $params.ReportNewInstanceType = "LaunchScript" } $boundParams = $PSCmdlet.MyInvocation.BoundParameters if ($boundParams.ContainsKey("Verbose") -and $boundParams["Verbose"].IsPresent) { Write-Verbose "Enter-VsDevShell Parameters:" $params.GetEnumerator() | ForEach-Object{ $message = '{0} = {1}' -f $_.key, $_.value Write-Verbose $message } } Enter-VsDevShell @params exit } throw [System.Management.Automation.ErrorRecord]::new( [System.Exception]::new("Required assembly could not be located. This most likely indicates an installation error. Try repairing your Visual Studio installation. Expected location: $modulePath"), "DevShellModuleLoad", [System.Management.Automation.ErrorCategory]::NotInstalled, $config) } function VsInstallationPath { $setupargs = "-path `"$VsInstallationPath`"" Write-Verbose "Using path: $VsInstallationPath" $config = GetSetupConfigurations($setupargs) LaunchDevShell($config) } function Latest { $setupargs = "-latest" if (-not $ExcludePrerelease) { $setupargs += " -prerelease" } $config = GetSetupConfigurations($setupargs) LaunchDevShell($config) } function VsInstanceId { $configs = GetSetupConfigurations("-prerelease -all") $config = $configs | Where-Object { $_.instanceId -eq $VsInstanceId } if ($config) { Write-Verbose "Found Visual Studio installation with InstanceId of '$($config.instanceId)' and InstallationPath '$($config.installationPath)'" LaunchDevShell($config) exit } throw [System.Management.Automation.ErrorRecord]::new( [System.Exception]::new("Could not find an installation of Visual Studio with InstanceId '$VsInstanceId'."), "VsSetupInstance", [System.Management.Automation.ErrorCategory]::InvalidArgument, $config) } function List { $setupargs = "-sort" if (-not $ExcludePrerelease) { $setupargs = " -prerelease" } $configs = GetSetupConfigurations($setupargs) $DisplayProperties = @("#") + $DisplayProperties # Add an incrementing select column $configs = $configs | Sort-Object displayName, installationDate | ForEach-Object {$i = 0}{ $i++; $_ | Add-Member -NotePropertyName "#" -NotePropertyValue $i -PassThru } Write-Host "The following Visual Studio installations were found:" $configs | Format-Table -Property $DisplayProperties $selected = Read-Host "Enter '#' of the Visual Studio installation to launch DevShell. <Enter> to quit: " if (-not $selected) { exit } $config = $configs | Where-Object { $_."#" -eq $selected } if ($config) { LaunchDevShell($config) } else { "Invalid selection: $selected" } } function Default{ Write-Verbose "No parameters passed to script. Trying VsInstallationPath." try { VsInstallationPath exit } catch { Write-Verbose "VsInstallationPath failed. Trying Latest." } Write-Host "Could not start Developer PowerShell using the script path." Write-Host "Attempting to launch from the latest Visual Studio installation." try { Latest exit } catch { Write-Verbose "Latest failed. Defaulting to List." } Write-Host "Could not start Developer PowerShell from the latest Visual Studio installation." Write-Host List } if ($PSCmdlet.ParameterSetName) { & (Get-ChildItem "Function:$($PSCmdlet.ParameterSetName)") exit } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB7cpavZzVzbDmR # tFRSbdabKCMPm0+YAH01FA8nFbex/KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHPsZ8DbaAp3m9TPusm7vlos # rwBn+o+wW7H47SQLjRp5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmXCs4ZgS+rvQEUtSJv/Elw+38ybXUNObqUNv0wcfJ49WO6od60Lq+bAp # DPi1Aala1hcwWEUTrlOW5kEzOVHUmFRZquJTlOWgqWYLqkXhUMGo5q8NrjNI1ES1 # XZhfD1obPP/xUKQlE54Tm5FBGSAcvn+Ps4fnjWVmhj345+VzsI/UeN0AXz6doSWB # /HSSxt0ZnvIsuk7rD5pfcjlBMuveR+MszT1LCi/7YPOte2+SBiM+VWkKVTWSUltc # O4RXqxeq3G/qHlIN0gSC7klXqyQFhXl5foY/tbPMYAHpQZZU/PwcflN42HF45/qE # MFvryxK2+nEJCQ2Y8kHASUQ+ZH/B9aGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBqpgOVcunQE9lXURLjX+TDdTkM/Dj3budQ1a3aN9+FAwIGZfLhwHHg # GBMyMDI0MDQwMzAyMzUyOS41NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6bcSfjAiGA8yMDI0MDQwMjIzMjU1 # MFoYDzIwMjQwNDAzMjMyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDptxJ+ # AgEAMAcCAQACAgnEMAcCAQACAhMLMAoCBQDpuGP+AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAHccoKnCN2a/axSG92ASOq8Ry6xg9lnSBNR0yb8bbGGOQx1t # 65kQ43hszfAOLvCtm3HpmVrhzBErX0NZelferF4N7dGNFFnv77mMwuANoze8KqaB # 22n/sSOqgPZClH5TRAOlDaZgjv//ZZesbDULeZ5wWo8HPLpc4mt5krhBbZKXb9G9 # IH9/zegWPS5Vw3ulAL5jkrkdbdHBAjvcRgV0y3fMGnJAHu5TQRuKjkFLbKhyujr+ # tggu5VTzwQEar/XjrJTNlULlbmv7GSKV5mfrLIHQefBSbl2ptx1LHuSglRlR8InP # xC2q868N/J/KQtF/PoOa1eKSVnvAWIpcslKwDcIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCByWnMA9v1nfS9tVSRpVvcwKVoMu5fUUvg73Fbg+HNApzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ # IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgEmFw/DPRNjPvgOuKYf4wnhsPE0J5 # MBkt5oH1ehjHCBMwDQYJKoZIhvcNAQELBQAEggIAkBL7PzI5aH6sRMMpj78lP+/+ # 0qM9h7xYpHmVT+E3JZiewkuYZfkrh3342Op9MNoXYXqDcL8qzmDGj9ad4sRJ2m+C # Sj2t3qRSjdwjhE+HPPjqhDeeXNyI1Ih8wk0bK3OIlRizyXx1OlBecy0IVJtOLlh8 # ylZ7fy2U8DvekCLroquN5y6BvnbeMOFonwji9Rf+76AQhsrvlHjQClRRDuTsd+bN # ylunlpT70NFY+xgptaed6FI4Dkig67VNFvZRPhbDJKJoXinPrF6Zt4pRrMuubcMD # AqIlFGSRuFL67+6J2ko910a0momC3l+mhnzhY6XEz3g7PC4gwqGI2HgkWyCzEKFz # gBt3/J59ofGcw6CiuOgsaXfbe+pwf0wUqkwlBXQBeK9v/9pbA2TAOpVhgVy9T8ji # YkEBLtYpscRA751Vg3F5Ok34TEv3Ixw+dWhyDVMIx6EErpYKsPaMYfeGAHlEsXXh # Z8mj+f45bAyNWjmm0yhuQcxM5ytAR/kOZGsafX+CY6baSdaPmeATUJ7y9Hzlc1Fg # 0qJlpH+tV3VlvUno0bsrjeXCsrLs84kixTzo1S7fWtAkm5wVy2LNp+nF5Ownwi8x # xr83cQNWOlvgU6SS2ekzHo2p2OdDaVo9tiBSaAu0eKx6LINGbQQeJlYNqTylurBc # 654J+EHdJx92VUjBOXg= # SIG # End signature block
combined_dataset/train/non-malicious/Set-FileWriteable.ps1
Set-FileWriteable.ps1
function Set-FileWriteable { #.Example # $s = New-PSSession $ComputerName # C:\\PS>$files = Invoke-Command $s { ls } # .... # C:\\PS>Set-FileWriteable $files # param( [Parameter(Mandatory=$true,ValueFromPipeline=$true)] $File , [switch]$Passthru ) process { foreach($path in @($file)) { write-verbose "'$path' is on '$($path.PSComputerName)'" if($path.PSComputerName) { Invoke-Command $path.PSComputerName { param([string[]]$path,[switch]$passthru) $files = Get-Item $path foreach($f in $files) { if($f.Attributes -band [IO.FileAttributes]"ReadOnly") { $f.Attributes = $f.Attributes -bxor [IO.FileAttributes]"ReadOnly" } } write-output $files } -Argument $path | Where { $Passthru } } else { $files = Get-Item $path foreach($f in $files) { if($f.Attributes -band [IO.FileAttributes]"ReadOnly") { $f.Attributes = $f.Attributes -bxor [IO.FileAttributes]"ReadOnly" } } if($Passthru) { write-output $files } } } } }
combined_dataset/train/non-malicious/2649.ps1
2649.ps1
param([parameter(Mandatory=$true)][string] $dir, [parameter(Mandatory=$true)][string] $server) Add-PSSnapin SqlServerCmdletSnapin100 Add-PSSnapin SqlServerProviderSnapin100 [System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.SMO') | out-null [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SmoExtended") | Out-Null $smosrv = new-object ('Microsoft.SqlServer.Management.Smo.Server') $server $files = gci $dir | where {$_.name -like "*.bak"} $output=([Environment]::GetFolderPath("MyDocuments")) + "\attachdbs.sql" "/*****************************************" > $output "Attach script based off of backup files" >> $output "*****************************************/" >> $output foreach($file in $files){ $rs=new-object("Microsoft.SqlServer.Management.Smo.Restore") $rs.Devices.AddDevice($file.FullName, "File") $hd=$rs.ReadBackupHeader($smosrv) $dbname=$hd.Rows[0].DatabaseName $dbfiles=$rs.ReadFileList($smosrv) "CREATE DATABASE $dbname ON" >> $output $filewrite=@() foreach($dbfile in $dbfiles){ $filewrite+="(FILENAME='"+$dbfile.PhysicalName+"')" } $filewrite -join ",`n" >> $output "FOR ATTACH; `n--------------------------" >> $output }
combined_dataset/train/non-malicious/1616.ps1
1616.ps1
function Get-ShaHash { param ( [Parameter(ValueFromPipeline=$true)] [string]$file, [ValidateSet(1, 256, 384, 512)] [int]$bit = 512 ) begin { function Resolve-FullPath ([string]$Path) { if ( -not ([IO.Path]::IsPathRooted($Path)) ) { $Path = Join-Path $PWD $Path } [IO.Path]::GetFullPath($Path) } } process { $file = Resolve-FullPath $file $sha = New-Object System.Security.Cryptography.SHA$bit`CryptoServiceProvider $hash = [BitConverter]::ToString($sha.ComputeHash([IO.File]::ReadAllBytes([IO.FileInfo]$file))) $hash } }
combined_dataset/train/non-malicious/sample_57_67.ps1
sample_57_67.ps1
# # Module manifest for module 'OCI.PSModules.Rover' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Rover.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6b3a22b9-6905-4ece-936d-982335059f13' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Rover Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Rover.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIRoverCluster', 'Get-OCIRoverClusterCertificate', 'Get-OCIRoverClusterRoverBundleRequestsList', 'Get-OCIRoverClustersList', 'Get-OCIRoverEntitlement', 'Get-OCIRoverEntitlementsList', 'Get-OCIRoverNode', 'Get-OCIRoverNodeCertificate', 'Get-OCIRoverNodeEncryptionKey', 'Get-OCIRoverNodeGetRpt', 'Get-OCIRoverNodeRoverBundleRequestsList', 'Get-OCIRoverNodesList', 'Get-OCIRoverShapesList', 'Get-OCIRoverWorkRequest', 'Get-OCIRoverWorkRequestErrorsList', 'Get-OCIRoverWorkRequestLogsList', 'Get-OCIRoverWorkRequestsList', 'Invoke-OCIRoverRequestAdditionalNodes', 'Invoke-OCIRoverRequestBundleRoverCluster', 'Invoke-OCIRoverRequestBundleRoverNode', 'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverCluster', 'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverNode', 'Invoke-OCIRoverRetrieveBundleStatusRoverCluster', 'Invoke-OCIRoverRetrieveBundleStatusRoverNode', 'Invoke-OCIRoverRoverNodeActionRetrieveCaBundle', 'Invoke-OCIRoverRoverNodeActionSetKey', 'Invoke-OCIRoverRoverNodeGenerateCertificate', 'Invoke-OCIRoverRoverNodeRenewCertificate', 'Invoke-OCIRoverRoverNodeReplaceCertificateAuthority', 'Invoke-OCIRoverRoverNodeRetrieveLeafCertificate', 'Move-OCIRoverClusterCompartment', 'Move-OCIRoverEntitlementCompartment', 'Move-OCIRoverNodeCompartment', 'New-OCIRoverCluster', 'New-OCIRoverEntitlement', 'New-OCIRoverNode', 'Remove-OCIRoverCluster', 'Remove-OCIRoverEntitlement', 'Remove-OCIRoverNode', 'Stop-OCIRoverWorkRequest', 'Update-OCIRoverCluster', 'Update-OCIRoverEntitlement', 'Update-OCIRoverNode' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Rover' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3370.ps1
3370.ps1
param( [Parameter(Mandatory = $false, Position = 0)] [ValidateSet("Release", "Debug")] [string] $BuildConfig, [Parameter(Mandatory = $false, Position = 1)] [ValidateSet("All", "Latest", "Stack", "NetCore", "ServiceManagement", "AzureStorage")] [string] $Scope ) function New-ModulePsm1 { [CmdletBinding()] param( [string]$ModulePath, [string]$TemplatePath, [switch]$IsRMModule, [switch]$IsNetcore ) PROCESS { $manifestDir = Get-Item -Path $ModulePath $moduleName = $manifestDir.Name + ".psd1" $manifestPath = Join-Path -Path $ModulePath -ChildPath $moduleName $file = Get-Item $manifestPath Import-LocalizedData -BindingVariable ModuleMetadata -BaseDirectory $file.DirectoryName -FileName $file.Name if ($ModuleMetadata.RootModule) { Write-Host "root modules exists, skipping..." return } $templateOutputPath = $manifestPath -replace ".psd1", ".psm1" [string]$importedModules if ($ModuleMetadata.RequiredModules -ne $null) { foreach ($mod in $ModuleMetadata.RequiredModules) { if ($mod["ModuleVersion"]) { $importedModules += New-MinimumVersionEntry -ModuleName $mod["ModuleName"] -MinimumVersion $mod["ModuleVersion"] } elseif ($mod["RequiredVersion"]) { $importedModules += "Import-Module " + $mod["ModuleName"] + " -RequiredVersion " + $mod["RequiredVersion"] + " -Global`r`n" } } } if ($ModuleMetadata.NestedModules -ne $null) { foreach ($dll in $ModuleMetadata.NestedModules) { $importedModules += "Import-Module (Join-Path -Path `$PSScriptRoot -ChildPath " + $dll.Substring(2) + ")`r`n" } } $template = Get-Content -Path $TemplatePath $template = $template -replace "%MODULE-NAME%", $file.BaseName $template = $template -replace "%DATE%", [string](Get-Date) $template = $template -replace "%IMPORTED-DEPENDENCIES%", $importedModules if ($IsNetcore) { $template = $template -replace "%AZORAZURERM%", "AzureRM" $template = $template -replace "%ISAZMODULE%", "`$true" } else { $template = $template -replace "%AZORAZURERM%", "`Az" $template = $template -replace "%ISAZMODULE%", "`$false" } $contructedCommands = Find-DefaultResourceGroupCmdlets -IsRMModule:$IsRMModule -ModuleMetadata $ModuleMetadata -ModulePath $ModulePath $template = $template -replace "%DEFAULTRGCOMMANDS%", $contructedCommands Write-Host "Writing psm1 manifest to $templateOutputPath" $template | Out-File -FilePath $templateOutputPath -Force $file = Get-Item -Path $templateOutputPath } } function Get-Cmdlets { [CmdletBinding()] param( [Hashtable]$ModuleMetadata, [string]$ModulePath ) $nestedModules = $ModuleMetadata.NestedModules $cmdlets = @() foreach ($module in $nestedModules) { $dllPath = Join-Path -Path $ModulePath -ChildPath $module $Assembly = [Reflection.Assembly]::LoadFrom($dllPath) $dllCmdlets = $Assembly.GetTypes() | Where-Object {$_.CustomAttributes.AttributeType.Name -contains "CmdletAttribute"} $cmdlets += $dllCmdlets } return $cmdlets } function Find-DefaultResourceGroupCmdlets { [CmdletBinding()] param( [Hashtable]$ModuleMetadata, [string]$ModulePath, [switch]$IsRMModule ) PROCESS { $contructedCommands = "@(" if ($IsRMModule) { $AllCmdlets = Get-Cmdlets -ModuleMetadata $ModuleMetadata -ModulePath $ModulePath $FilteredCommands = $AllCmdlets | Where-Object {Test-CmdletRequiredParameter -Cmdlet $_ -Parameter "ResourceGroupName"} foreach ($command in $FilteredCommands) { $contructedCommands += "'" + $command.GetCustomAttributes("System.Management.Automation.CmdletAttribute").VerbName + "-" + $command.GetCustomAttributes("System.Management.Automation.CmdletAttribute").NounName + ":ResourceGroupName" + "'," } $contructedCommands = $contructedCommands -replace ",$", "" } $contructedCommands += ")" return $contructedCommands } } function Test-CmdletRequiredParameter { [CmdletBinding()] param( [Object]$Cmdlet, [string]$Parameter ) PROCESS { $rgParameter = $Cmdlet.GetProperties() | Where-Object {$_.Name -eq $Parameter} if ($rgParameter -ne $null) { $parameterAttributes = $rgParameter.CustomAttributes | Where-Object {$_.AttributeType.Name -eq "ParameterAttribute"} foreach ($attr in $parameterAttributes) { $hasParameterSet = $attr.NamedArguments | Where-Object {$_.MemberName -eq "ParameterSetName"} $MandatoryParam = $attr.NamedArguments | Where-Object {$_.MemberName -eq "Mandatory"} if (($hasParameterSet -ne $null) -or (!$MandatoryParam.TypedValue.Value)) { return $false } } return $true } return $false } } function New-MinimumVersionEntry { [CmdletBinding()] param( [string]$ModuleName, [string]$MinimumVersion ) PROCESS { return "`$module = Get-Module $ModuleName ` if (`$module -ne `$null -and `$module.Version.ToString().CompareTo(`"$MinimumVersion`") -lt 0) ` { ` Write-Error `"This module requires $ModuleName version $MinimumVersion. An earlier version of $ModuleName is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information.`" -ErrorAction Stop ` } ` elseif (`$module -eq `$null) ` { ` Import-Module $ModuleName -MinimumVersion $MinimumVersion -Scope Global ` }`r`n" } } function Update-RMModule { [CmdletBinding()] param( $Modules ) $Ignore = @('AzureRM.Profile', 'Azure.Storage') foreach ($module in $Modules) { if ( -not ($module.Name -in $Ignore)) { $modulePath = $module.FullName Write-Host "Updating $module module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsRMModule Write-Host "Updated $module module`n" } } } function Update-Azure { [CmdletBinding()] param( [ValidateNotNullOrEmpty()] [String]$Scope, [ValidateNotNullOrEmpty()] [ValidateSet('Debug', 'Release')] [String]$BuildConfig ) if ($Scope -in $script:AzureRMScopes) { Write-Host "Updating profile module" New-ModulePsm1 -ModulePath "$script:AzureRMRoot\AzureRM.Profile" -TemplatePath $script:TemplateLocation -IsRMModule Write-Host "Updated profile module" Write-Host " " } if ($scope -in $script:StorageScopes) { $modulePath = "$script:AzurePackages\$buildConfig\Storage\Azure.Storage" Write-Host "Updating AzureStorage module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsRMModule:$false Write-Host " " } if ($scope -in $script:ServiceScopes) { $modulePath = "$script:AzurePackages\$buildConfig\ServiceManagement\Azure" Write-Host "Updating ServiceManagement(aka Azure) module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation Write-Host " " } if ($Scope -in $script:AzureRMScopes) { $resourceManagerModules = Get-ChildItem -Path $script:AzureRMRoot -Directory Write-Host "Updating Azure modules" Update-RMModule -Modules $resourceManagerModules Write-Host " " } if ($Scope -in $script:AzureRMScopes) { $modulePath = "$PSScriptRoot\AzureRM" Write-Host "Updating AzureRM module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation Write-Host " " } } function Update-Stack { [CmdletBinding()] param( [ValidateNotNullOrEmpty()] [ValidateSet('Debug', 'Release')] [String]$BuildConfig ) Write-Host "Updating profile module for stack" New-ModulePsm1 -ModulePath "$script:StackRMRoot\AzureRM.Profile" -TemplatePath $script:TemplateLocation -IsRMModule Write-Host "Updated profile module" Write-Host " " $modulePath = "$script:StackPackages\$buildConfig\Storage\Azure.Storage" Write-Host "Updating AzureStorage module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsRMModule:$false Write-Host " " $StackRMModules = Get-ChildItem -Path $script:StackRMRoot -Directory Write-Host "Updating stack modules" Update-RMModule -Modules $StackRMModules Write-Host " " $modulePath = "$script:StackProjects\AzureRM" Write-Host "Updating AzureRM module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation Write-Host " " $modulePath = "$script:StackProjects\AzureStack" Write-Host "Updating AzureStack module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation Write-Host " " } function Update-Netcore { [CmdletBinding()] param( [ValidateNotNullOrEmpty()] [ValidateSet('Debug', 'Release')] [String]$BuildConfig ) $AzureRMModules = Get-ChildItem -Path $script:AzureRMRoot -Directory Write-Host "Updating Accounts module" New-ModulePsm1 -ModulePath "$script:AzureRMRoot\Az.Accounts" -TemplatePath $script:TemplateLocation -IsRMModule -IsNetcore Write-Host "Updated Accounts module" $env:PSModulePath += "$([IO.Path]::PathSeparator)$script:AzureRMRoot\Az.Accounts"; foreach ($module in $AzureRMModules) { if (($module.Name -ne "Az.Accounts")) { $modulePath = $module.FullName Write-Host "Updating $module module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsRMModule -IsNetcore Write-Host "Updated $module module" } } $modulePath = "$PSScriptRoot\Az" Write-Host "Updating Netcore module from $modulePath" New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsNetcore Write-Host "Updated Netcore module" } $script:TemplateLocation = "$PSScriptRoot\AzureRM.Example.psm1" $script:NetCoreScopes = @('NetCore') $script:AzureScopes = @('All', 'Latest', 'ServiceManagement', 'AzureStorage') $script:StackScopes = @('All', 'Stack') $script:AzureRMScopes = @('All', 'Latest') $script:StorageScopes = @('All', 'Latest', 'AzureStorage') $script:ServiceScopes = @('All', 'Latest', 'ServiceManagement') $script:AzurePackages = "$PSScriptRoot\..\artifacts" $script:StackPackages = "$PSScriptRoot\..\src\Stack" $script:StackProjects = "$PSScriptRoot\..\src\StackAdmin" $script:AzureRMRoot = "$script:AzurePackages\$buildConfig" $script:StackRMRoot = "$script:StackPackages\$buildConfig" Write-Host "Updating $Scope package (and its dependencies)" if ($Scope -in $NetCoreScopes) { Update-Netcore -BuildConfig $BuildConfig } if ($Scope -in $AzureScopes) { Update-Azure -Scope $Scope -BuildConfig $BuildConfig } if ($Scope -in $StackScopes) { Update-Stack -BuildConfig $BuildConfig }
combined_dataset/train/non-malicious/2882.ps1
2882.ps1
task default -depends Test task Test -depends Compile, Clean -PreAction {"Pre-Test"} -Action { "Test" } -PostAction {"Post-Test"} task Compile -depends Clean { "Compile" } task Clean { "Clean" }
combined_dataset/train/non-malicious/sample_66_30.ps1
sample_66_30.ps1
<############################################################## # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # ##############################################################> # # Module manifest for module 'TestObservability' # @{ # Script module or binary module file associated with this manifest. RootModule = '.\TestObservability.psm1' # Version number of this module. ModuleVersion = '1.2100.2671.410' # ID used to uniquely identify this module GUID = '0feb7cf1-76a5-460f-b12a-49e7c86d045f' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) Microsoft. All rights reserved.' # Description of the functionality provided by this module # Description = 'Azure Stack Support Service Operation cmdlets.' # Minimum version of the Windows PowerShell engine required by this module # PowerShellVersion = '' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @("Test-Observability") # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaSZ54vkpgnc1k # pgkXSKD9wJNoYz8UtWW8wEeV94S50aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJDeAXAjxgGBnxHPfzbYjK1I # J250agm6sD9s+UVT1h7fMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEANDWFxvCWnV3Q0u+mPbbK8TXceCFuINpfz1k3JiI2Iy8F4OcgOZnreRK9 # kLZJgs0qCXgeKtRenuNgpxOhWh2QwbQDgPd2RvcsDziQX3wKfe8Aur9tungF++VR # d4e7vHBLxcucnX7IA0eupKgwl8rFHQ2h336ppGjzLOS0pOXclZmQn1yb10uYxJ6w # Q+75u7DduhuUEzfNCZZt2XzdTEgcvUjms7j63yWb222T0WNzMAyjySjz6IQF4qVG # gP2d/bzkew2kdf8FvEyk9b5aDxbtiJdCX43JFEA4TO8QpC47TNhg2Q2pB7l4iIll # 04S/gii29ZXGmtZdF7d6AkiyTcKDAqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCyyYEX4Gei1hx6QDtIFcxKWbo91+p9P9ngkRdOGxE0zQIGZjOrzATu # GBMyMDI0MDUxNjE4NDUzMC4wODdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnwnfEwIhgPMjAyNDA1MTYyMzAwMDFaGA8yMDI0MDUxNzIzMDAwMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fCd8QIBADAHAgEAAgIEnjAHAgEAAgIRbDAKAgUA # 6fHvcQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHnT0LxSY/nWLIhldpba # s+/PI5nwSlUEjVz2T8+za4oOWpPvEXFZubjQpKV+rZcSz8dC3W9E3H0XfRCVX8Hc # nAUMQOUovNoxn0wyleMRSJKOdzhZ4nvVCpnfUVS08zkwMS06Gcqv4txhUWFZ3zEQ # 8KQKBIpbgaxeKYGCxMYijGxrMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgRsQ33/98UhdfxrN5yt4uUt2vM2FTIDf3s3ZzgV721RUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj # ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X # HZXUraobAAEAAAHdMCIEIGw/GMnaHgOLTlJ1AOPfbuCj5wPO8mWTx5OYG0qVMVp+ # MA0GCSqGSIb3DQEBCwUABIICAAh5YG8j54r304PhhpBx244kjgpo0KRMdfVJdK5v # JX0gDxaiwNkT0vnUdPUeHQ0tJVPiNcHV848d8frs/XRdHEjLBxy4ulGysr18Za4P # Uutq2WEhE1KQHzj7qKIi2jU1Bcm89ipMiqlce/5wDAh79Or2dm3C/3Cf+nvGk+nh # KlikqFgR7E7k2PEC5SeW/V5KAsZrLt7EwEjqsCiS8gTtRwHrQyXl4SPijOKVQdRM # CyqvsShuHtkdKbpHn7nxA0vUBgOY+6BZJkWCVhnSsCOFGTAPvmeTZSIhWLIJV7l7 # aMykaGrPlFNO7sZLp2yBtDHMjJPoe8PEXzgmC2kNqrwoHgC+AkAycxFa8hLj9DGG # sVqBjYz3mYt8bzw20SyaAkiD8gpMJLePO5VhxLXyX4GVG1r81t5oZW7spXba6BMA # VP5hOGS9uCDE+DcDzFpHGVeFeSipJNUfm3k5H/b8sicpKN3k6mM298bODen/DR/S # /RMdQAXH8HETPqFx9bLNAqGd/f/v0ncFzYM1CqHM1CDttq4Q3Un2Yf/mT9RwsY2u # BtlN+o6uZR8s9othOgyEAItl23swgaYThzAjCcMoJ2J3OrIHo3wSI0BfF0NkeV11 # 0No7S4e68OFl25nnoPqtWmDuEJfWchJEQtDLWirJguok99MI7aZNZtViNSVLnSlA # 0/th # SIG # End signature block
combined_dataset/train/non-malicious/DirToday Extended.ps1
DirToday Extended.ps1
## NAME: Get-Dirty.ps1 ## AUTHOR: Barry Morrison ## LASTEDIT: 07/05/2011 16:18:33 <# .Synopsis Get's files from today's date. Will also return narrowed results based on keyword .Description Get's files from today's date. Will also return narrowed results based on keyword .Parameter Path Will run in current directory. Path argument will allow you to define a path not in current working directory .Parameter Keyword Keyword argument will allow you to define a keyword to search on to narrow results. .Example PS C:\\scripts> .\\dirtoday.ps1 Directory: C:\\scripts Mode LastWriteTime Length Name ---- ------------- ------ ---- -a--- 7/5/2011 3:25 PM 114 cat -a--- 7/5/2011 4:11 PM 2252 dirtoday.ps1 -a--- 7/5/2011 3:46 PM 848 dirtoday2.ps1 -a--- 7/5/2011 2:55 PM 110 info.txt -a--- 7/5/2011 1:52 PM 37 test.foo .Example PS C:\\scripts> .\\dirtoday.ps1 -path "c:\\Users\\John Doe\\Pictures" Directory: C:\\Users\\John Doe\\Pictures Mode LastWriteTime Length Name ---- ------------- ------ ---- -a--- 7/5/2011 11:05 AM 49888 weinerdog.jpg .Example PS C:\\scripts> .\\dirtoday.ps1 -keyword foo cat:2:test.foo:1:blah, blah, foo, ice cream, test.foo:1:blah, blah, foo, ice cream, #> param( [string]$Path = "", [string]$keyword = "" ) ## Checking to see if the Keyword argument is passed -- If it is, search for $keyword if ($keyword) { $files = dir -Path $path | Where-Object { $_.lastwritetime -ge (get-date).date } | Select-String $keyword ## If there are not results returned, tell me! if (!$files) { Write-Output "Nothing Here" }else{ ## If Results exist, give them to me! $files } } else { ## If not keyword argument is passed, do a simple search $files = dir -Path $path | Where-Object { $_.lastwritetime -ge (get-date).date } ## Like above, checking to see if no results are found for the query if (!$files) { ## Tell me if nothing exists Write-Output "Nothing Here" }else{ ## Write results if something exists $files } }
combined_dataset/train/non-malicious/Get-ADGroupMembers_5.ps1
Get-ADGroupMembers_5.ps1
Function Get-ADGroupMembers { <# .SYNOPSIS Return a collection of users in an ActiveDirectory group. .DESCRIPTION This function returns an object that contains all the properties of a user object. This function works for small groups as well as groups in excess of 1000. .PARAMETER UserGroup The name of the group to get membership from. .PARAMETER UserDomain The LDAP URL of the domain that the group resides in. .EXAMPLE Get-ADGroupMembers -UserGroup Managers |Format-Table -Property name, distinguishedName, cn name distinguishedName cn ---- ----------------- -- {Steve Roberts} {CN=Steve Roberts,CN=Users,DC... {Steve Roberts} {S-1-5-21-57989841-1078081533... {CN=S-1-5-21-57989841-1078081... {S-1-5-21-57989841-1078081533... {S-1-5-21-57989841-1078081533... {CN=S-1-5-21-57989841-1078081... {S-1-5-21-57989841-1078081533... {Matt Temple} {CN=Matt Temple,CN=Users,DC=c... {Matt Temple} ... Description ----------- This example shows passing in a group name, but leaving the default domain name in place. .NOTES The context under which this script is run must have rights to pull infromation from ActiveDirectory. .LINK http://scripts.patton-tech.com/wiki/PowerShell/ActiveDirectoryManagement#Get-ADGroupMembers #> Param ( $UserGroup = "Domain Users", [ADSI]$UserDomain = ("LDAP://DC=company,DC=com") ) Begin { $DirectoryEntry = New-Object System.DirectoryServices.DirectoryEntry($UserDomain.Path) $DirectorySearcher = New-Object System.DirectoryServices.DirectorySearcher $LDAPFilter = "(&(objectCategory=Group)(name=$($UserGroup)))" $DirectorySearcher.SearchRoot = $DirectoryEntry $DirectorySearcher.PageSize = 1000 $DirectorySearcher.Filter = $LDAPFilter $DirectorySearcher.SearchScope = "Subtree" $SearchResult = $DirectorySearcher.FindAll() $UserAccounts = @() } Process { foreach ($Item in $SearchResult) { $Group = $Item.GetDirectoryEntry() $Members = $Group.member If ($Members -ne $Null) { foreach ($User in $Members) { $UserObject = New-Object System.DirectoryServices.DirectoryEntry("LDAP://$($User)") If ($UserObject.objectCategory.Value.Contains("Group")) { } Else { $ThisUser = New-Object -TypeName PSObject -Property @{ cn = $UserObject.cn distinguishedName = $UserObject.distinguishedName name = $UserObject.name nTSecurityDescriptor = $UserObject.nTSecurityDescriptor objectCategory = $UserObject.objectCategory objectClass = $UserObject.objectClass objectGUID = $UserObject.objectGUID objectSID = $UserObject.objectSID showInAdvancedViewOnly = $UserObject.showInAdvancedViewOnly } } $UserAccounts += $ThisUser } } } } End { Return $UserAccounts } }
combined_dataset/train/non-malicious/sample_8_73.ps1
sample_8_73.ps1
ConvertFrom-StringData @' id_wsftpsiexplorercrashcheck_st=Wsftpsi.dll version 12.3.0.1 was detected in this machine. This version is known to cause consistent Explorer crashes '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBFagCkZEke2ius # mYVa5fK1FLY3vFZM7RIq+787XSUxHaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKOP # RZo4i4CHdSPOULSZz0qJ4TU7v02UQtgRsGPrdSgbMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAksGdyEdwyyBlTYaFfmkqkZ7W9nDyMmnjPd7P # s/oxSNuaa8+vqPN2alzDRUEcMuatrOpV27qp9RAfsKPE+h6WBTDW8VjvjErDrrNN # 9q6G+XRJtIYk0WFWMc9QM3+mzre8VqYAtLd/enw/Qp2GdnHGT01EQF9jREHiZ4DM # s3yHtjbJTg/i3NoxPEYOe3+iFfcmiqmCWp+zg7q6BaOrXNOE0lFCgfoJECHVgr8D # je+PCCRtCkWmRnHwvcQZUlYNaa0M57mKHKdrvm53wXkqX3WlnVybiRwn68YCjC8a # VCZc/bE8X4IRZJs4Nv1CL/KWuu4Y7MCU8hWy7hdWgFQ7UAtlwqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBPPuR8DRZU6V/fGhtMP0vC0sx1eb9naMDL # AvVn9S7YaQIGZxqPzfD8GBMyMDI0MTAyODExNDA0My4xMTJaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QAB # AAAB5jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAj # cElGzflvKADZ1D+2d/ieYYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35 # Zx0gXJBE0zWanZEAjCjt4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo # /9t6OeNezIwX5E5+VwEG37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMs # zuucaR5nMwQN6sDjG99FzdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4J # uURUBRZ0JWu0NYQBp8khku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+l # RZAA4iMgbcLZ2P/xSdnKFxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/ # lJD1stdNo5wJG+mgXsE/zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCSceg # NzHeYtw5OmZ/7eVnRmjXlCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJ # NNjVndkpWy934PIZuWTMk360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8 # YB3M+u1tYeVDO/TcObGHxaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiF # Bf6iYYrCjtRwF7IPdQLFtQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+ # 11ZM+Qu7Q5rg3Fc9MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwS # kaFMQ6dyu8ZCYUpWQ8iIrbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VY # fxz1EIbPlt897MJ2sBGO2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQ # CJ55LLvyFlJ195AVo4Wy8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w7 # 2eRY/vWDuptrvzruFNmKCIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWk # rGjyeVJ+khzctxaLkklVwCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YR # a9pH2zvddsuBEfSFG6Cj0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh # 3ZOe+BFqJ57OXdeIDSHbvHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z # 1uB0XYQP60rsMLdTlVYEyZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMW # TTeQ0IwnWG98vWv/roPegCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4 # TbVj/Lw0XvnLYNwMUA9ouY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCff # CaspKUXC72YMu5W8L/zyTxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQDiWNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrUDAi # GA8yMDI0MTAyODA2MTg1NloYDzIwMjQxMDI5MDYxODU2WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyatQAgEAMAcCAQACAiZmMAcCAQACAhORMAoCBQDqyvzQAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEBxNUvMJ0O0UDu8Og9sWf208vhS # kFloumMW1RvgFdb92+THK6H4x3VJwAos7fSTrcyd3rBsbPaWsDzEE8lSpQZRl1tT # +xqJ9FN0+DhU7VbhQzFplSEQLO3ZUNQUMNltvLzXqrbJuEfQiXerQxhkutzT4Ceh # f10MosdYIq9nQ6IhxL20siq9Nudp03+xjjbZmZjrxvnqZQ1GXhucuPUTYDKdOdHa # +dU71t77KkdCeO70ybxR1x1yXXr+kaA0X/o61KSn3G2WSmzdwnX2nOuuBi5Wptv9 # NmwZTYfI/s4Qh0GVxQ1vRelr66myMkPQ75xHUd8APnZdEG/h251KOccn5yUxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZ # Qp7qAPh94QABAAAB5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCN7qTUk+8bab42WuH0FbL8VEWI # tpnEWfpT2CVR+z/+ZzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4ao # HrMJaG8gnLO1q16hIYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgTB6qQcMd # P6fMqtySduFITAgYbREF90zOkmEDwIb58bEwDQYJKoZIhvcNAQELBQAEggIAtZ3E # lWGgiqplln04nGghOCqD8+kl2Tfxo/hHSYU8LsuY1+TJzNbPWK2v64pRADxLPYKg # lbFMkoq1vwTS7sJGyUeaGFcdieVyJ3OYlkaGr0i+9c52R3v7mTQ6OVhU04AbHTiI # MWK4PmDlvLc4ZhO4dZ+yUFWEmQR6V2l6L8RWbflZIb2bkf+lckxLiAm2hu2oW10E # JxK0xmhJGbRxXskUkooYvFzfUi/eGw4wFLlok6mE0edw5PJzeAv49muy4Yc5lIsd # p7N5xy6KK5lscIL5GPfg/+x/EjknS4YAQXK+/vONCUgFrgnkPJVar9H7Kv9KvSFS # FCj/DEnuyrMqQA8w9okfyPgGyP8vgU5VQnHfYtB8515SXq3DGuvOoA9Wl0yNgCgp # kIAJJEQEW4oR6EBGD4Q7qFGLaLw1z6KH+QgZMRtzwi/JStCEzj9eJWglpiFfIRE4 # MMwqT+Z/HddDei0S4WI3cXTcvdOM3wgBe1m9z8kz6Fr4h6Vpx5Z8psrS5u3KxBI0 # AbLe575jjzSklUOJmKy3vukbnavN+mBQnVZNMYySlNJ6YOla9Y6Xjy0JBhRanyz3 # d+H6cPTWISHNpEKC12Evt/jxXy/IeS9av84p+AXR1bnoiGq+CxgmTzEIKKUSYG3w # RaoS3Hq83ziGQcf8MCqf7fN2xiSHWuB+F82CWPg= # SIG # End signature block
combined_dataset/train/non-malicious/get-kbinfo.ps1
get-kbinfo.ps1
# -==-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= # Author: Kris Cieslak (defaultset.blogspot.com) # Date: 2010-05-26 # Description: Identifying knowledge base article by id number taken from # string or filename. # # Parameters: filename / knowledge base number # # Requirements: Internet connection # # Usage example: # ./get-kbinfo.ps1 KB926139 # or # ./get-kbinfo.ps1 WindowsXP-KB926139-x86-ENU.exe # or # ls Windows* | % { ./get-kbinfo.ps1 $_.Name } # # -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=--=-=-=-=-=-=-=-=-=-= PARAM ($filename = $(throw "Specifiy the file name")) $page = New-Object System.Net.WebClient; $kb = [regex]::match($filename,'KB\\d*|kb\\d*').ToString(); $p = $page.DownloadString('http://support.microsoft.com/kb/'+$kb) $p = [regex]::replace( [regex]::match($p,'<h1 class="title">.*</h1>').ToString(), '<h1 class="title">|</h1>', '' ) write-host -Fore Yellow `n'[*] Filename: '$filename write-host `n' '$p `n' ( http://support.microsoft.com/kb/'$kb' )'`n
combined_dataset/train/non-malicious/ServicePWChgReset.ps1
ServicePWChgReset.ps1
# ============================================================================================== # # NAME: ServicePWChgReset.ps1 # # AUTHOR: Saehrig, Steven # DATE : 8/26/2008 # @@# COMMENT: Please read comments on each section! # 1st - Search Domain computers for matching name and import into array. # 2nd - Export matching hosts from array to text file. (comment out after text file created) # 3rd - Create CSV file of all Matching Critera with full service detail. ( so you have record of modified # services) # 4th - Create text file of all matching services with limited info # 5th - Change password on matching services # 6th - Restart services if running if not running skip restart. (with console feedback) # # I would like to Thank Halr9000 and glnsize from powershellcomunity.org for there guidance during this # script creation. I would not have been able to complete this without them and i would have been spending # alot of time manually updating every service. Granted if they actually wrote this it would be much nicer :). # But hey everyone has to start somewhere. # ============================================================================================== #discover Servers for Host.txt file function func_Forest() { [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Domains | ForEach-Object { Get-QADComputer -Service $_.Name -SizeLimit 0 -ErrorAction SilentlyContinue ` | Add-Member -Name 'DomainName' -MemberType NoteProperty -Value $_.Name -PassThru } } #initialize Array for Output $Array = @() #This should be run once to fill the host file then commented out. #Fill Array func_forest | where { $_.Name -like 'jxr*' } | Sort-Object -property "Name" |? { $array += $_.name} $file = $array | Out-File -FilePath c:\\txt\\host.txt -Append #Variables $StartName = "username" $csvlocation = "c:\\txt\\service.csv" $txtlocation = "c:\\txt\\service.txt" $computer = gc c:\\txt\\host.txt $password = "password" $service = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname} #exports discovered services for documentation of modified services $service | Export-Csv $csvlocation #Function Declarations function exporttxt { #This function exports the services to a text file in limited data fields. foreach ($i in $service) { ($i | FT systemname, Displayname, State, Startname, Status | Out-File -Append -FilePath $txtlocation ) } } function changepw { #This function will change the password to the variable assigned above. foreach ($i in $service) { (Write-Host -ForegroundColor "Yellow" "Changing password on" $i.SystemName "Service Name"$i.Name) ($i.Change($Null,$Null,$Null,$Null,$Null,$Null,$Null,$password)) (Write-Host -ForegroundColor "green" "Password Successfully Changed on" $i.SystemName "Service Name"$i.Name) } } function restartsvc { #This function will restart the service for the new password to take effect. $s = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname} foreach ($i in $s) { if ($i.State -eq "running") { Write-Host -ForegroundColor "Yellow" "Service name" $i.SystemName "Service name"$i.Name "is" $i.state $i.StopService() Sleep -Seconds 20 #allow time for service to stop. $b = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname} Write-Host -ForegroundColor "RED" "Service name" $b.SystemName "Service name" $b.Name "is" $b.state $i.StartService() $c = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname} Write-Host -ForegroundColor "Green" "Server name" $c.SystemName "Service name" $c.Name "is" $c.state } elseif ($i.State -eq "Stopped") { Write-Host -ForegroundColor "RED" "Service name" $i.SystemName "Service name" $i.Name $i.state "Service will not be Started" } } } #Execute exporttxt changepw | out-null restartsvc | out-null
combined_dataset/train/non-malicious/sample_50_43.ps1
sample_50_43.ps1
# # Module manifest for module 'PowerShellProTools' # # Generated by: Ironman Software, LLC # # Generated on: 1/17/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'PowerShellProTools.psm1' # Version number of this module. ModuleVersion = '2023.12.0' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '6a03dcee-a249-4b5d-a464-279e8d0d71e8' # Author of this module Author = 'Ironman Software, LLC' # Company or vendor of this module CompanyName = 'Unknown' # Copyright statement for this module Copyright = 'Ironman Software, LLC' # Description of the functionality provided by this module Description = 'PowerShell script packaging, profiling, WPF and Windows Forms design, and desktop automation.' # Minimum version of the PowerShell engine required by this module # PowerShellVersion = '' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('PowerShellToolsPro.Cmdlets.dll') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Merge-Script', 'Install-PoshProToolsLicense', 'Get-PoshProToolsLicense', 'Measure-Block', 'Measure-Script', 'Show-WinFormDesigner', 'ConvertTo-WinForm', 'Show-PSScriptPad', 'Set-Hotkey', 'Get-Hotkey', 'Remove-Hotkey' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = 'pad' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = 'https://docs.poshtools.com/powershell-pro-tools-module' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_14_40.ps1
sample_14_40.ps1
#************************************************ # TS_HPZ12ServiceCheck.ps1 # Version 1.0 # Date: 1-11-2011 # Author: v-anecho # Description: Checks if 'Net Driver HPZ12' or 'Pml Driver HPZ12' is one of the installed services and startup type is something different than Disabled #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_HPZ12ServiceCheck -Status $ScriptStrings.ID_HPZ12ServiceCheckDesc $RootCauseDetected = $false $RootCauseName = "RC_HPZ12ServiceCheck" #Rule ID 1970 #----------- # http://sharepoint/sites/rules/Rule%20Submissions/Windows_digvijan_2011-11-23T00_14_06.xml # #Description #----------- # Check if 'Net Driver HPZ12' or 'Pml Driver HPZ12' is one of theinstalled services and startup type is something different than Disabled # #Related KB #---------- # 2546364 # #Script Author #------------- # anecho #******************** #Data gathering #******************** $InformationCollected = new-object PSObject $HasIssue = $false Function isNetPmlRunnig { $currentServices = Get-Service # grabs all services to prevent pulling running services multiple times $NetDriver = $currentServices | Where-Object {($_.displayname -eq "Net Driver HPZ12") -and ($_.status -ne "Stopped")} $PmlDriver = $currentServices | Where-Object {$_.displayname -eq "Pml Driver HPZ12" -and ($_.status -ne "Stopped")} if(($NetDriver) -and ($PmlDriver)) #returns number to identify which process is running { return 3 } elseif($NetDriver) { return 1 } elseif($PmlDriver) { return 2 } else { return 0 } } #******************** #Detection Logic #******************** $isNetPml = isNetPmlRunnig if ($isNetPml -gt 0) { $HasIssue = $true } #******************** #Alert Evaluation #******************** if($HasIssue) { $runningServices = "" switch ($isNetPml) { 1{$runningServices = "Net Driver HPZ12"} 2{$runningServices = "Pml Driver HPZ12"} 3{$runningServices = "Net Driver HPZ12, Pml Driver HPZ12"} } add-member -inputobject $InformationCollected -membertype noteproperty -name "Service(s) Running" -value $runningServices Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2546364" -Verbosity "Error" -InformationCollected $InformationCollected -Visibility 2 -SupportTopicsID 8066 } else { Update-DiagRootCause -id $RootCauseName -Detected $false } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDaTypf795A48Ct # O16St+rnH28ZWd2ITdpcYxGC0SkpV6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKCz # FrWw81mURdtlfbm+R5ANkfDbIXLhJScmcfcilmtWMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAg2ERqVqoACZrPLf64JvCKvFOE0RvRsDuU35G # n6YMBE/kEmnk8gZpQofAIYMSf+oSEN6R84d20ZOWVdzmR3nF2Kx7TShOyipWPaS+ # 33fZEyHeH3tDu97FTu2Dxp8+O0GcC9Y2S2dqt3b1y084XaxUMLab7psR9MCFsET8 # JAEDfldQpeFhTV1C1Gi5BIW0K5I7bNOw5Sm6ZyNrtgsrtiVQB6miqIKcf2fRKtf9 # J7g7RFoTtUJJcSJjd3BZ8unvSBPij/tZZDH7xIJSZOEUZlnTvVtG+yPSzy2PFBya # GtpQq7rIPTfk6OOVNFwcffCKG4YqwPr4iA9BFGnc50HNDuO886GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBVXvfKct9XIeCNYNQInL23hujGLZbGMZzc # g2NdsRl7JwIGZxpym1wXGBMyMDI0MTAyODExNDA0My4wMzFaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAAB # AAAB7DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22 # uwdEZm0IoAFs6oIr39VK/ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKR # SOwrRNxVIKoPPeUF3f4VyHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7 # S3MCi2bk2nvtGKdeAIL+H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWX # t4zxvdIGcPjS4ZKyQEF3SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAi # nb0o+uQ9KtaKNLVVcNf5QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQ # HrWkfPzZp/X+bt9C7E5hPP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0H # dOv6KWa+sAmJG7PDvTZae77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDH # EzGsQnMUQKstS3zjn6SU0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wC # bwe9SCJIoqtBexBrPyQYA2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgR # o/bs/Xu8gua8LDe6KWyu974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgM # GJj73CQvr+jqoWwx6XdyeQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1 # whYQsV8UgEf4TIWGMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDP # ag8ARb0OFrAQtSLMDpN0UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbF # Tr+IAnDSeg8TB9zfG/4ybknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO # 1n5xrrLOL8m0nmv5kBcv+y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhB # Ntu57wPKXZ1EoNToBk8bA6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJV # vfIhm4Ap8zptC7xVAly0jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedL # Qf7s3L5+qfaY/xEh/9uo17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe7 # 6iYtL+mhxXPEpzda3bJlhPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd0 # 71bemnou8A3rUZrdgKIautsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla # 7Xad9qrTYdT45VlCYTtBSY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQ # CTVMXaDc25DTLcMGJrRua3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJ # FeW7r29XX+k0e4DnG6iBHKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCOHPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAi # GA8yMDI0MTAyODA0MTQxN1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyY4ZAgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlm # EUSqsB1JFEW74Yh1oAnUZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apW # F7OLJj+IzfERluG9wFcnKZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2J # A5g0hP9oaR70WD/wOq0PR+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1v # NThkBK0cQg8uhyBgCm7AsGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHS # lmMTGuAFMVHbFFtVtBr3X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezg # K6SC0JFSgAABAAAB7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBbvxIdC/+32Pqdc4zIu6pFE2Hv # Utkn76raPWgKs7aRjTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVq # fTfIhx21QBBbKyo/xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5Tm # SmMHedwiqAcbeNSpfnbye1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIAnaHa # s1QDrNzGMuHG4KXSeUDUxx9wnpe2pGIe0AOZgodBVv/tln0sdxuE/ktliSo1xHHM # nmlMNsg7MgLcCNhZEVvpSexGYk8q2pqFEi+/hcMu1mDwCh2vyNg2pc5QeZ3+RXLr # yogicIfk7CRiI9qK5rp1fWm9tVP+88d0bdG6eEf4r5N5kimMTIKTuUe7Lhi+sLF+ # TLn3FB7ZzOJCBMC1O6+PVUDK1amskIYxzbvk6LerRjdT193nRZ5ToW2oHrXQ9FTA # BNZECwXp9uJXgs1OPdF04Aa56pr3viTqOid/05beTL5JxBKGVYM3Y7gxiemMdYcz # NToIvzhoP1BPVTe2nqtLQQ0FV18AVG0tpJVp0gyFwnMeXHdgbsCL16MoCHMBhx9I # FXtGLxgH6lIQ6r1sisOkF5gyQhyOALYGiZXkNcB2XQc7sPT/lsTzYJpLdnMwYBqp # Jjsjo0+2ALs+We5A5FC/1+VYVio81PatLCg+dBmAGH4klmrmo5wB19EIlXBkrMBN # 9HNnjzG5UHGBqU2xolHDRpEE0KYzNFTzrwSn5wF6tyoadbzSIsqQB27SXkhyfHtO # Q5KjwpR+K3qoa8/AYUWvzy+ZG1FT5yQKjBKexzGyEfwiD80g/Jq0rQr9eEugIUDD # 7JjePqkzxdFX8fCp2PiQTPfpCvYfNvPNJ0uo2io= # SIG # End signature block
combined_dataset/train/non-malicious/3810.ps1
3810.ps1
function Test-VirtualMachineGetRunCommand { $loc = Get-ComputeVMLocation; $loc = $loc.Replace(" ", "") $commandId = "RunPowerShellScript" $result = Get-AzVMRunCommandDocument -Location $loc -CommandId $commandId Assert-AreEqual $commandId $result.Id Assert-AreEqual "Windows" $result.OsType $result_output = $result | Out-String $result = Get-AzVMRunCommandDocument -Location $loc Assert-True {$result.Count -gt 0} $result_output = $result | Out-String } function Test-VirtualMachineSetRunCommand { $rgname = Get-ComputeTestResourceName try { $loc = Get-ComputeVMLocation; $loc = $loc.Replace(" ", "") New-AzResourceGroup -Name $rgname -Location $loc -Force; $vmsize = 'Standard_A4'; $vmname = 'vm' + $rgname; $subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname); $pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname; $pubipId = $pubip.Id; $nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id; $nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname; $nicId = $nic.Id; $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; $osDiskName = 'osDisk'; $osDiskCaching = 'ReadWrite'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $p = New-AzVMConfig -VMName $vmname -VMSize $vmsize ` | Add-AzVMNetworkInterface -Id $nicId -Primary ` | Set-AzVMOSDisk -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage ` | Set-AzVMOperatingSystem -Windows -ComputerName $computerName -Credential $cred; $imgRef = Get-DefaultCRPImage -loc $loc; $imgRef | Set-AzVMSourceImage -VM $p | New-AzVM -ResourceGroupName $rgname -Location $loc; $vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname; $vm = Get-AzVM -ResourceGroupName $rgname $commandId = "RunPowerShellScript" $param = @{"first" = "var1";"second" = "var2"}; $path = 'ScenarioTests\test.ps1'; $job = Invoke-AzVMRunCommand -ResourceGroupName $rgname -Name $vmname -CommandId $commandId -ScriptPath $path -Parameter $param -AsJob; $result = $job | Wait-Job; Assert-AreEqual "Completed" $result.State; $st = $job | Receive-Job; Assert-NotNull $st.Value; $vm = Get-AzVM -ResourceGroupName $rgname -Name $vmname; $result = Invoke-AzVMRunCommand -ResourceId $vm.Id -CommandId $commandId -ScriptPath $path -Parameter $param; Assert-NotNull $result.Value; $result = Get-AzVM -ResourceGroupName $rgname -Name $vmname | Invoke-AzVMRunCommand -CommandId $commandId -ScriptPath $path -Parameter $param; Assert-NotNull $result.Value; $vm = Get-AzVM -ResourceGroupName $rgname -Name $vmname; } finally { Clean-ResourceGroup $rgname } } function Test-VirtualMachineScaleSetVMRunCommand { $rgname = Get-ComputeTestResourceName try { $loc = Get-Location "Microsoft.Compute" "virtualMachines"; New-AzResourceGroup -Name $rgname -Location $loc -Force; $subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $vmssName = 'vmss' + $rgname; $adminUsername = 'Foo12'; $adminPassword = Get-PasswordForVM; $imgRef = Get-DefaultCRPImage -loc $loc; $ipCfg = New-AzVmssIPConfig -Name 'test' -SubnetId $subnetId; $vmss = New-AzVmssConfig -Location $loc -SkuCapacity 2 -SkuName 'Standard_A0' -UpgradePolicyMode 'Automatic' ` | Add-AzVmssNetworkInterfaceConfiguration -Name 'test' -Primary $true -IPConfiguration $ipCfg ` | Set-AzVmssOSProfile -ComputerNamePrefix 'test' -AdminUsername $adminUsername -AdminPassword $adminPassword ` | Set-AzVmssStorageProfile -OsDiskCreateOption 'FromImage' -OsDiskCaching 'None' ` -ImageReferenceOffer $imgRef.Offer -ImageReferenceSku $imgRef.Skus -ImageReferenceVersion $imgRef.Version ` -ImageReferencePublisher $imgRef.PublisherName; $result = New-AzVmss -ResourceGroupName $rgname -Name $vmssName -VirtualMachineScaleSet $vmss; $vmssVMs = Get-AzVmssVM -ResourceGroupName $rgname -VMScaleSetName $vmssName; $vmssId = $vmssVMs[0].InstanceId; $commandId = "RunPowerShellScript" $param = @{"first" = "var1";"second" = "var2"}; $path = 'ScenarioTests\test.ps1'; $job = Invoke-AzVmssVMRunCommand -ResourceGroupName $rgname -Name $vmssName -InstanceId $vmssId -CommandId $commandId -ScriptPath $path -Parameter $param -AsJob; $result = $job | Wait-Job; Assert-AreEqual "Completed" $result.State; $st = $job | Receive-Job; Assert-NotNull $st.Value; $vmssVM = Get-AzVmssVM -ResourceGroupName $rgname -Name $vmssName -InstanceId $vmssId; $result = Invoke-AzVmssVMRunCommand -ResourceId $vmssVM.Id -CommandId $commandId -ScriptPath $path -Parameter $param; Assert-NotNull $result.Value; $result = Get-AzVmssVM -ResourceGroupName $rgname -Name $vmssName -InstanceId $vmssId | Invoke-AzVmssVMRunCommand -CommandId $commandId -ScriptPath $path -Parameter $param; Assert-NotNull $result.Value; $vmssVM = Get-AzVmssVM -ResourceGroupName $rgname -Name $vmssName -InstanceId $vmssId; } finally { Clean-ResourceGroup $rgname; } }
combined_dataset/train/non-malicious/776.ps1
776.ps1
param([switch]$Serve, [switch]$Clean, [switch]$Publish) $toolsPath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\tools") $docfxZipPath = [System.IO.Path]::GetFullPath("$toolsPath\docfx.zip") $docfxBinPath = [System.IO.Path]::GetFullPath("$toolsPath\docfx\") $docfxExePath = [System.IO.Path]::GetFullPath("$docfxBinPath\docfx.exe") $docfxJsonPath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\docs\docfx.json") $sitePath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\docs\_site") $docsRepoPath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\docs\_repo") mkdir $toolsPath -Force | Out-Null if (![System.IO.File]::Exists($docfxExePath)) { Remove-Item -Path "$docfxBinPath" -Force -ErrorAction Stop | Out-Null (new-object net.webclient).DownloadFile('https://github.com/dotnet/docfx/releases/download/v1.8/docfx.zip', "$docfxZipPath") Expand-Archive $docfxZipPath -DestinationPath $docfxBinPath -Force -ErrorAction "Stop" } if ($Clean.IsPresent) { Remove-Item -Path $sitePath -Force -Recurse | Out-Null } & $docfxExePath metadata $docfxJsonPath if ($Serve.IsPresent) { & $docfxExePath build $docfxJsonPath --serve } else { & $docfxExePath build $docfxJsonPath if ($Publish.IsPresent) { if (Test-Path $docsRepoPath) { Remove-Item -Path $docsRepoPath -Recurse -Force -ErrorAction Stop | Out-Null } git clone -b gh-pages https://github.com/PowerShell/PowerShellEditorServices.git $docsRepoPath Write-Host -ForegroundColor Green "*** Copying documentation site files ***" Copy-Item -Recurse -Force $sitePath\* $docsRepoPath Write-Host -ForegroundColor Green "*** Committing changes ***" Push-Location $docsRepoPath git add -A git commit -m "Updated documentation site" $response = $host.ui.PromptForChoice( "Ready to push?", "Are you ready to push the doc site changes?", [System.Management.Automation.Host.ChoiceDescription[]]( (New-Object System.Management.Automation.Host.ChoiceDescription "&Yes","Yes"), (New-Object System.Management.Automation.Host.ChoiceDescription "&No","No") ), 1); if ($response -eq 0) { Write-Host -ForegroundColor Green "*** Pushing changes ***" git push origin gh-pages } else { Write-Output "Did not push changes. Run 'git push origin gh-pages' manually when ready." } } }
combined_dataset/train/non-malicious/sample_35_20.ps1
sample_35_20.ps1
# Copyright (C) 2024 Alejandro Santoyo <alejandro.santoyo@canonical.com> # # This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. from sos.report.plugins import Plugin, IndependentPlugin class InfinidatStorage(Plugin, IndependentPlugin): short_desc = 'Infinidat Storage plugin' plugin_name = 'infinidat' profiles = ('storage',) packages = ('host-power-tools',) def setup(self): # Get infinidat logs if not self.get_option("all_logs"): self.add_copy_spec([ "/var/log/infinihost.latest*.log", "/var/log/infinihost.usage*.log", ]) else: self.add_copy_spec([ "/var/log/infinihost*.log", "/var/log/buildout.*.log", ]) # Get info from the infinidat boxes, etc. self.add_cmd_output([ "infinihost volume list", "infinihost connectivity list", "infinihost system list", "infinihost pool list", "infinihost snapshot list", "infinihost --version" ]) # vim: set et ts=4 sw=4 :
combined_dataset/train/non-malicious/chkhash_30.ps1
chkhash_30.ps1
# calculate SHA512 of file. function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } function noequal ( $first, $second) { if (!($second) -or $second -eq "") {return $true} $first=join-path $first "\\" foreach($s in $second) { if ($first.tolower().startswith($s.tolower())) {return $false} } return $true } function WriteFileName ( [string]$writestr ) # this function prints multiline messages on top of each other, good for iterating through filenames without filling { # the console with a huge wall of text. Call this function to print each of the filename messages, then call WriteFileNameEnd when done # before printing anything else, so that you are not printing into a long file name with extra characters from it visible. if ($Host.Name -match 'ise') { write-host $writestr; return } if ($global:lastlen -eq $null) {$global:lastlen=0} $ctop=[console]::cursortop [console]::cursorleft=0 $oldwritestrlen=$writestr.length $spaces = "" if ($global:lastlen -gt $writestr.length) { $spaces = " " * ($global:lastlen-$writestr.length) } $writelines = [math]::divrem($writestr.length, [console]::bufferwidth, [ref]$null) $cwe = ($writelines-([console]::bufferheight-$ctop))+1 # calculate where text has scroll back to. if ($cwe -gt 0) {$ctop-=($cwe)} write-host "$writestr" -nonewline $global:oldctop=[console]::cursortop if ([console]::cursorleft -ne 0) {$global:oldctop+=1} write-host "$spaces" -nonewline $global:lastlen = $oldwritestrlen [console]::cursortop=$ctop [console]::cursorleft=0 } function WriteFileNameEnd ( ) # call this function when you are done overwriting messages on top of each other { # and before printing something else if ($Host.Name -match 'ise') { return } if ($global:oldctop -ne $null) { [console]::cursortop=$global:oldctop [console]::cursorleft=0 } $global:oldctop=$null $global:lastlen=$null } # chkhash.ps1 [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #3] [-u] [-h [path of .xml database]] # -u updates the XML file database and exits # otherwise, all files are checked against the XML file database. # -h specifies location of xml hash database $hashespath=".\\hashes.xml" del variable:\\args3 -ea 0 del variable:\\args2 -ea 0 del variable:\\xfiles -ea 0 del variable:\\files -ea 0 del variable:\\exclude -ea 0 $args3=@() $args2=@($args) $nu = 0 $errs = 0 $fc = 0 $fm = 0 $upd = $false $create = $false $n = $null "ChkHash.ps1 - ChkHash.ps1 can create a .XML database of files and their SHA-512 hashes and check files against the database, " "in order to detect corrupt or hacked files." "" ".\\chkhash.ps1 -h for usage." "" for($i=0;$i -lt $args2.count; $i++) { if ($args2[$i] -like "-h*") # -help specified? { "Usage: .\\chkhash.ps1 [-h] [-u] [-c] [-x <file path of hashes .xml database>] [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #n] [-e <Dirs>]" "Options: -h - Help display." " -c - Create hash database. If .xml hash database does not exist, -c will be assumed." " -u - Update changed files and add new files to existing database." " -x - specifies .xml database file path to use. Default is .\\hashes.xml" " -e - exclude dirs. Put this after the files/dirs you want to check with SHA512 and needs to be fullpath (e.g. c:\\users\\bob not ..\\bob)." "" "Examples: PS>.\\chkhash.ps1 c:\\ d:\\ -c -x c:\\users\\bob\\hashes\\hashes.xml" " [hash all files on c:\\ and d:\\ and subdirs, create and store hashes in c:\\users\\bob\\hashes\\hashes.xml]" " PS>.\\chkhash.ps1 c:\\users\\alice\\pictures\\sunset.jpg -u -x c:\\users\\alice\\hashes\\pictureshashes.xml]" " [hash c:\\users\\alice\\pictures\\sunset.jpg and add or update the hash to c:\\users\\alice\\hashes\\picturehashes.xml" " PS>.\\chkhash.ps1 c:\\users\\eve\\documents d:\\media\\movies -x c:\\users\\eve\\hashes\\private.xml" " [hash all files in c:\\users\\eve\\documents and d:\\media\\movies, check against hashes stored in c:\\users\\eve\\hashes\\private.xml" " or create it and store hashes there if not present]" " PS>.\\chkhash.ps1 c:\\users\\eve -x c:\\users\\eve\\hashes\\private.xml -e c:\\users\\eve\\hashes" " [hash all files in c:\\users\\eve and subdirs, check hashes against c:\\users\\eve\\hashes\\private.xml or store if not present, exclude " " c:\\users\\eve\\hashes directory and subdirs]" " PS>.\\chkhash.p1s c:\\users\\ted\\documents\\f* d:\\data -x d:\\hashes.xml -e d:\\data\\test d:\\data\\favorites -u" " [hash all files starting with 'f' in c:\\users\\ted\\documents, and all files in d:\\data, add or update hashes to" " existing d:\\hashes.xml, exclude d:\\data\\test and d:\\data\\favorites and subdirs]" " PS>.\\chkhash -x c:\\users\\alice\\hashes\\hashes.xml" " [Load hashes.xml and check hashes of all files contained within.]" "" "Note: files in subdirectories of any specified directory are automatically processed." " if you specify only an -x option, or no option and .\\hash.xml exists, only files in the database will be checked." exit } if ($args2[$i] -like "-u*") {$upd=$true;continue} # Update and Add new files to database? if ($args2[$i] -like "-c*") {$create=$true;continue} # Create database specified? if ($args2[$i] -like "-x*") { $i++ # Get hashes xml database path if ($i -ge $args2.count) { write-host "-X specified but no file path of .xml database specified. Exiting." exit } $hashespath=$args2[$i] continue } if ($args2[$i] -like "-e*") # Exclude files, dirs { while (($i+1) -lt $args2.count) { $i++ if ($args2[$i] -like "-*") {break} $exclude+=@(join-path $args2[$i] "\\") # collect array of excluded directories. } continue } $args3+=@($args2[$i]) # Add files/dirs } if ($args3.count -ne 0) { # Get list of files and SHA512 hash them. "Enumerating files from specified locations..." $files=@(dir $args3 -recurse -ea 0 | ?{$_.mode -notmatch "d"} | ?{noequal $_.directoryname $exclude}) # Get list of files, minus directories and minus files in excluded paths if ($create -eq $true -or !(test-path $hashespath)) # Create database? { # Create SHA512 hashes of files and write to new database if ($files.count -eq 0) {"No files found. Exiting."; exit} $files = $files | %{WriteFileName "SHA-512 Hashing: `"$($_.fullname)`" ...";add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} WriteFileNameEnd $files |export-clixml $hashespath "Created $hashespath" "$($files.count) file hash(es) saved. Exiting." exit } write-host "Loading file hashes from $hashespath..." -nonewline $xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database if (($xfiles.count -eq 0) -or ($files.count -eq 0)) {"No files in Database or no files specified. Exiting.";Exit} } else { if (!(test-path $hashespath)) {"No database found or specified, exiting."; exit} write-host "Loading file hashes from $hashespath..." -nonewline $xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database and check it if ($xfiles.count -eq 0) {"No files specified and no files in Database. Exiting.";Exit} $files=$xfiles | %{get-item -ea 0 -literalpath $_.fullname} } "Loaded $($xfiles.count) file hash(es)." $hash=@{} for($x=0;$x -lt $xfiles.count; $x++) # Build dictionary (hash) of filenames and indexes into file array { if ($hash.contains($xfiles[$x].fullname)) {continue} $hash.Add($xfiles[$x].fullname,$x) } foreach($f in $files) { if ((get-item -ea 0 -literalpath $f.fullname) -eq $null) {continue} # skip if file no longer exists. $n=($hash.($f.fullname)) if ($n -eq $null) { $nu++ # increment needs/needed updating count if ($upd -eq $false) {WriteFileName "Needs to be added: `"$($f.fullname)`"";WriteFileNameEnd;continue} # if not updating, then continue WriteFileName "SHA-512 Hashing `"$($f.fullname)`" ..." # Create SHA512 hash of file $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force} $xfiles+=@($f) # then add file + hash to list continue } WriteFileName "SHA-512 Hashing and checking: `"$($f.fullname)`" ..." $fc++ # File checked increment. if (($upd -eq $false) -and ($f.length -ne $xfiles[$n].length)) { $errs++ WriteFileName "Size mixmatch: `"$($f.fullname)`""; WriteFileNameEnd continue } $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force} # Check SHA512 and size for mixmatch. if ($xfiles[$n].length -eq $f.length) { if ($xfiles[$n].SHA512 -eq $f.SHA512) { $fm++;continue # if matched, increment file matches and continue loop } } $errs++ # increment mixmatches if ($upd -eq $true) { $xfiles[$n]=$f; WriteFileName "Updated `"$($f.fullname)`""; WriteFileNameEnd;continue} WriteFileName "SHA-512 and/or size mixmatch found: `"$($f.fullname)`""; WriteFileNameEnd } WriteFileNameEnd # restore cursor position after last write string if ($upd -eq $true) # if database updated { $xfiles|export-clixml $hashespath # write xml database "Updated Database: $hashespath" "$nu file hash(es) added to Database." "$errs file hash(es) updated in Database." exit } "$errs SHA-512 or size mixmatch(es) found." "$fm file(s) SHA512 and size matched." "$fc file(s) checked total." if ($nu -ne 0) {"$nu file(s) need to be added [run with -u option to Add file hashes to database]."}
combined_dataset/train/non-malicious/Test-Prompt_3.ps1
Test-Prompt_3.ps1
$choices = [System.Management.Automation.Host.ChoiceDescription[]]( (New-Object System.Management.Automation.Host.ChoiceDescription "&Yes","Choose me!"), (New-Object System.Management.Automation.Host.ChoiceDescription "&No","Pick me!")) $Answer = $host.ui.PromptForChoice('Caption',"Message",$choices,(1)) Write-Output $Answer $fields = new-object System.Collections.ObjectModel.Collection``1[System.Management.Automation.Host.FieldDescription] $f = New-Object System.Management.Automation.Host.FieldDescription "String Field" $f.HelpMessage = "This is the help for the first field" $f.DefaultValue = "Field1" $f.Label = "&Any Text" $fields.Add($f) $f = New-Object System.Management.Automation.Host.FieldDescription "Secure String" $f.SetparameterType( [System.Security.SecureString] ) $f.HelpMessage = "You will get a password input with **** instead of characters" $f.DefaultValue = "Password" $f.Label = "&Password" $fields.Add($f) $f = New-Object System.Management.Automation.Host.FieldDescription "Numeric Value" $f.SetparameterType( [int] ) $f.DefaultValue = "42" $f.HelpMessage = "You need to type a number, or it will re-prompt" $f.Label = "&Number" $fields.Add($f) $results = $Host.UI.Prompt( "Caption", "Message", $fields ) Write-Output $results
combined_dataset/train/non-malicious/55.ps1
55.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-ApplicationCategory(){ [cmdletbinding()] param ( $Name ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileAppCategories" try { if($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") } } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } catch { $ex = $_.Exception Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } Get-ApplicationCategory
combined_dataset/train/non-malicious/push-module function .ps1
push-module function .ps1
function Push-Module { param( [parameter(position=0, mandatory=$true)] [validatenotnullorempty()] [string]$ModuleName ) # find out what this module exports (and therefore what it overwrites) $metadata = new-module -ascustomobject { param([string]$ModuleName) # import targeted module $inner = import-module $ModuleName -PassThru function GetExportedFunctions() { $inner.ExportedFunctions.values } # prevent export of inner module's exports Export-ModuleMember -Cmdlet "" -Function GetExportedFunctions } -args $ModuleName $clobbered = @{} # grab copies of functions that would get clobbered $metadata.GetExportedFunctions() | ? { Test-Path "function:$($_.name)" } | % { $clobbered[$_.name] = gc -path "function:$($_.name)" } # import module $m = import-module $ModuleName -PassThru # hook up function restore $m.onremove = { $clobbered.keys | % { si -path function:global:$_ $clobbered[$_] -force } }.getnewclosure() }
combined_dataset/train/non-malicious/2541.ps1
2541.ps1
Param ( [parameter(Mandatory=$true, Position=0, HelpMessage="Define valdation type: All, Domain, Zone, ZoneAging, ZoneDelegation, Forwarder, RootHints")] [Alias("Type")] [String[]] $ValidationType, [parameter(Mandatory=$false, Position=1, HelpMessage="Full path of cache files.")] [String] $Path = $pwd.path + "\", [parameter(Mandatory=$false, HelpMessage="Clean-Up old cache files.")] [Switch] $CleanUpOldCacheFiles, [parameter(Mandatory=$false, HelpMessage="Clean-Up old report files.")] [Switch] $CleanUpOldReports, [parameter(Mandatory=$false, HelpMessage="Applicable with CleanUpOldCacheFiles & CleanUpOldReports switches and deletes the files without user confirmation.")] [Switch] $Force, [parameter(Mandatory=$false, HelpMessage="List of name resolvers on which health check need to be performed.")] [String[]] $DnsServerList = $null, [parameter(Mandatory=$false, HelpMessage="List of all available root domains across the enterprise.")] [String[]] $DomainList = $null, [parameter(Mandatory=$false, HelpMessage="List of zones to be verified.")] [String[]] $ZoneList = $null, [parameter(Mandatory=$false, HelpMessage="List of zone hosting servers, which hosts one or more zones.")] [String[]] $ZoneHostingServerList = $null, [parameter(Mandatory=$false, HelpMessage="List of DHCP servers across the enterprise.")] [String[]] $DhcpServerList = $null ) Set-StrictMode -Version 2 Import-Module DNSServer -ErrorAction Ignore Import-Module DHCPServer -ErrorAction Ignore Import-Module ActiveDirectory -ErrorAction Ignore if (-not (Get-Module DNSServer)) { throw 'The Windows Feature "DNS Server Tools" is not installed. ` (On server SKU run "Install-WindowsFeature -Name RSAT-DNS-Server", on client SKU install RSAT client)' } $script:validValidationTypes = @("Domain", "Zone", "ZoneAging", "ZoneDelegation", "Forwarder", "RootHints"); $script:allValidationType = "All"; $script:switchParamVal = "__SWITCH__"; $script:cmdLetReturnedStatus = $null; $script:dnsServerList = $DnsServerList; $script:domainList = $DomainList; $script:zoneList = $ZoneList; $script:zoneHostingServerList = $ZoneHostingServerList; $script:dhcpServerList = $DhcpServerList; $script:dnsServerListFilePath = $Path + "DnsServerList.txt"; $script:domainListFilePath = $Path + "DomainList.txt"; $script:zoneListFilePath = $Path + "ZoneList.txt"; $script:zoneHostingServerListFilePath = $Path + "ZoneHostingServerList.txt"; $script:dhcpServerListFilePath = $Path + "DhcpServerList.txt"; $script:domainAndHostingServersList = $null; $script:zoneAndHostingServersList = $null; if ($CleanUpOldCacheFiles -and (Test-Path -Path ($Path + "*.txt") -PathType Leaf)) { if ($Force) { Remove-Item -Path ($Path + "*.txt") -Force; } else { Remove-Item -Path ($Path + "*.txt") -Confirm; } } if ($CleanUpOldReports -and (Test-Path -Path ($Path + "*.html") -PathType Leaf)) { if ($Force) { Remove-Item -Path ($Path + "*.html") -Force; } else { Remove-Item -Path ($Path + "*.html") -Confirm; } } $script:logLevel = @{ "Verbose" = [int]1 ;"Host" = [int]2 ;"Warning" = [int]3 ;"Error" = [int]4 } $script:resultView =@{ "List" = "List" ;"Table" = "Table" } Function LogComment { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$message, [int]$level = $script:logLevel.Verbose ) $message = ([DateTime]::Now).ToString() + ": " + $message; switch ($level) { $script:logLevel.Verbose {Write-Verbose $message}; $script:logLevel.Host {Write-Host -ForegroundColor Cyan $message}; $script:logLevel.Warning {Write-Warning $message}; $script:logLevel.Error {Write-Error $message}; default {throw "Not a valid log level: " + $level}; } } Function ExecuteCmdLet { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$cmdLetName, [HashTable]$params = @{} ) $cmdString=$cmdLetName; $displayString=$cmdLetName; $script:cmdLetReturnedStatus = [RetStatus]::Success; if ($null -ne $params) { foreach($key in $params.keys) { if ($script:switchParamVal -eq $params[$key]) { $cmdString +=" -$key "; $displayString +=" -$key "; } else { $cmdString += " -$key `$params[`"$key`"]"; $displayString += " -$key $($params[$key])"; } } } $cmdString += " -ErrorAction Stop 2> `$null"; $displayString += " -ErrorAction Stop 2> `$null"; LogComment $displayString $script:logLevel.Host; $retObj = $null; try { $retObj = Invoke-Expression $cmdString; } catch [Exception] { if (Get-Member -InputObject $_.Exception -Name "Errordata") { if (5 -eq $_.Exception.Errordata.error_Code) { LogComment $("Caught error: Access is denied, considering it as current login creds don't have server read access.") ` $script:logLevel.Warning; $script:cmdLetReturnedStatus = [RetStatus]::AccessIsDenied; } elseif (1722 -eq $_.Exception.Errordata.error_Code) { LogComment $("Caught error: The RPC server is unavailable, considering it as server is down.") ` $script:logLevel.Warning; $script:cmdLetReturnedStatus = [RetStatus]::RpcServerIsUnavailable; } elseif (9601 -eq $_.Exception.Errordata.error_Code) { LogComment $("Caught error: DNS zone does not exist, considering it as given server isn't hosting input zone.") ` $script:logLevel.Warning; $script:cmdLetReturnedStatus = [RetStatus]::ZoneDoesNotExist; } elseif (9611 -eq $_.Exception.Errordata.error_Code) { LogComment $("Caught error: Invalid DNS zone type, considering it as we can't perform current operation on input zone.") ` $script:logLevel.Warning; $script:cmdLetReturnedStatus = [RetStatus]::OperationIsNotSupported; } elseif (9714 -eq $_.Exception.Errordata.error_Code) { LogComment $("Caught error: DNS name does not exist, considering it as input record doesn't exist.") ` $script:logLevel.Warning; $script:cmdLetReturnedStatus = [RetStatus]::RecordDoesNotExist; } else { LogComment $("Caught error while executing '" + $displayString + "' with errorcode: " + $_.Exception.Errordata.error_Code) ` $script:logLevel.Error; $script:cmdLetReturnedStatus = $([String]$_.Exception.Errordata.error_Code + ":" + $_.Exception.Errordata.error_WindowsErrorMessage); } } elseif (Get-Member -InputObject $_ -Name "FullyQualifiedErrorId") { if ($_.FullyQualifiedErrorId.Contains("DNS_ERROR_RCODE_NAME_ERROR")) { LogComment $("Caught error: ResolveDnsNameResolutionFailed in Resolve-DnsName.") $script:logLevel.Warning; $script:cmdLetReturnedStatus = [RetStatus]::ResolveDnsNameResolutionFailed; } elseif ($_.FullyQualifiedErrorId.Contains("System.Net.Sockets.SocketException")) { LogComment $("Caught error: ResolveDnsNameServerNotFound in Resolve-DnsName.") $script:logLevel.Warning; $script:cmdLetReturnedStatus = [RetStatus]::ResolveDnsNameServerNotFound; } elseif ($_.FullyQualifiedErrorId.Contains("ERROR_TIMEOUT")) { LogComment $("Caught error: ResolveDnsNameTimeoutPeriodExpired in Resolve-DnsName.") $script:logLevel.Warning; $script:cmdLetReturnedStatus = [RetStatus]::ResolveDnsNameServerNotFound; } else { LogComment $("Caught error while executing '" + $displayString + "' `n" + $_.Exception) $script:logLevel.Error; $script:cmdLetReturnedStatus = $([String]$_.FullyQualifiedErrorId + ":" + $_.Exception); throw; } } else { LogComment $("Caught error while executing '" + $displayString + "' `n" + $_.Exception) $script:logLevel.Error; $script:cmdLetReturnedStatus = $($_.Exception); throw; } } if ($null -eq $retObj) { LogComment "CmdLet returned with NULL..." $script:logLevel.Host; } return $retObj } Function Get-EnterpriseDnsServerList { param ( $dnsServerListFilePath = $script:dnsServerListFilePath, $dhcpServerListFilePath = $script:dhcpServerListFilePath, $dnsServerListFromCmdLine = $script:dnsServerList ) $dnsServerList = $null; if ($null -eq $dnsServerListFromCmdLine) { $dnsServerList = Get-FileContent $dnsServerListFilePath; } else { $dnsServerList = $dnsServerListFromCmdLine; } if ($null -eq $dnsServerList) { LogComment "Unable to load DNS servers from the cache. So loading from DHCP servers." if (-not(Get-Module DHCPServer)) { LogComment $('The Windows Feature "DHCP Server Tools" is not installed. ` (On server SKU run "Install-WindowsFeature -Name RSAT-DHCP", on client SKU install RSAT client)') ` $script:logLevel.Warning; LogComment $("Skipping this step and returning with NULL DNS List.") $script:logLevel.Warning; return $null; } $dhcpServerList = Get-EnterpriseDhcpServerList $dhcpServerListFilePath; if ($null -eq $dhcpServerList) { LogComment $("No DHCP servers were found, returning with NULL DNS server list.") $script:logLevel.Warning; return $null; } $optionList = @(); $v4Options = Get-EnterpriseDhcpv4OptionId $dhcpServerList $false; $optionList += $v4Options; $v4Options = Get-EnterpriseDhcpv4OptionId $dhcpServerList $true; $optionList += $v4Options; $v6Options = Get-EnterpriseDhcpv6OptionId $dhcpServerList $false; $optionList += $v6Options; $v6Options = Get-EnterpriseDhcpv6OptionId $dhcpServerList $true; $optionList += $v6Options; $optionList = $optionList | ?{-not([String]::IsNullOrEmpty($_))}; if ($null -eq $optionList) { LogComment $("No DNS server found in configured DHCP options across all input DHCP servers, returning with NULL DNS server list.") $script:logLevel.Warning; } else { $servers = @(); $optionList | %{ $servers += $_.Value }; $dnsServerList = $servers | sort -Unique; ExecuteCmdLet "Set-Content" @{"Path" = $dnsServerListFilePath; "Value" = $dnsServerList}; } } return $dnsServerList; } Function Get-EnterpriseDomainList { param ( $domainListFilePath = $script:domainListFilePath, $domainListFromCmdLine = $script:domainList ) $domainList = $null; if ($null -eq $domainListFromCmdLine) { $domainList = Get-FileContent $domainListFilePath; } else { $domainList = $domainListFromCmdLine; } if ($null -eq $domainList) { LogComment "Failed to load domains from the file. So loading from AD."; try { if (Get-Module ActiveDirectory) { $forestObj = ExecuteCmdLet "Get-ADForest"; if ($null -ne $forestObj) { $domainList = $forestObj.Domains; } if ($null -ne $domainList) { ExecuteCmdLet "Set-Content" @{"Path" = $domainListFilePath; "Value" = $domainList}; } else { LogComment $("Unable to obtain domainList from Get-ADForest. Returning with NULL DomainList.") ` $script:logLevel.Warning; } } else { LogComment $('The Windows Feature "Active Directory module for Windows PowerShell" is not installed. ` (On server SKU run "Install-WindowsFeature -Name RSAT-AD-PowerShell", on client SKU install RSAT client)') $script:logLevel.Warning; LogComment $("Skipping this step and returning with NULL DomainList.") $script:logLevel.Warning; } } catch [Exception] { LogComment $("Get-ADForest failed, Skipping this step and returning with NULL DomainList. `n" ` + $_.Exception) $script:logLevel.Warning; } } return $domainList; } Function Get-EnterpriseZoneList { param ( $zoneListFilePath = $script:zoneListFilePath, $zoneListFromCmdLine = $script:zoneList ) $zoneList = $null; if ($null -eq $zoneListFromCmdLine) { $zoneList = Get-FileContent $zoneListFilePath; } else { $zoneList = $zoneListFromCmdLine; } return $zoneList; } Function Get-EnterpriseZoneHostingServerList { param ( $zoneHostingServerListFilePath = $script:zoneHostingServerListFilePath, $dnsServerList = $script:dnsServerList, $zoneHostingServerListFromCmdLine = $script:zoneHostingServerList ) $zoneHostingServerList = $null; if ($null -eq $zoneHostingServerListFromCmdLine) { LogComment $("Filling Zone Hosting Servers list from the file."); $zoneHostingServerList = Get-FileContent $zoneHostingServerListFilePath; } else { $zoneHostingServerList = $zoneHostingServerListFromCmdLine; } if ($null -eq $zoneHostingServerList) { LogComment $("Zone Hosting Servers list isn't available, returning with DNS Server list."); $zoneHostingServerList = $dnsServerList; } return $zoneHostingServerList; } Function Get-EnterpriseDhcpServerList { param ( $dhcpServerListFilePath = $script:dhcpServerListFilePath, $dhcpServerListFromCmdLine = $script:dhcpServerList ) $dhcpServerList = $null; if ($null -eq $dhcpServerListFromCmdLine) { $dhcpServerList = Get-FileContent $dhcpServerListFilePath; } else { $dhcpServerList = $dhcpServerListFromCmdLine; } if ($null -eq $dhcpServerList) { LogComment "Failed to load DHCP server list from the file. So loading from AD."; $dhcpObjList = ExecuteCmdLet "Get-DhcpServerInDC"; foreach($dhcpObj in $dhcpObjList) { if ($null -eq $dhcpServerList) {$dhcpServerList = @()}; $dhcpServerList += $dhcpObj.IPAddress; } } return $dhcpServerList; } Function Get-EnterpriseDomainAndHostingServersHash { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $domainHostingServers, $domainListFilePath = $script:domainListFilePath ) $domainAndHostingServersHash = $null; $domainList = Get-EnterpriseDomainList $domainListFilePath; if ($null -ne $domainList) { $domainAndHostingServersHash = @{}; foreach($domain in $domainList) { $domainHostingServer = Get-ZoneHostingServerListFromNSRecords $domain; $domainAndHostingServersHash.Add($domain, $domainHostingServer); } Write-HashTableInHtml $domainAndHostingServersHash "DomainAndHostingServersHash"; } else { LogComment $("Failed to get domain list. So returning with NULL HashTable.") $script:logLevel.Warning; } return $domainAndHostingServersHash; } Function Get-EnterpriseZoneAndHostingServersHash { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $zoneHostingServerList, $zoneListFilePath = $script:zoneListFilePath ) $zoneAndHostingServersHash = $null; $zoneList = Get-EnterpriseZoneList $zoneListFilePath; if ($null -ne $zoneList) { $zoneAndHostingServersHash = Get-ServersHostingTheZones $zoneList $zoneHostingServerList; } else { LogComment $("Failed to load zones from the file. So loading it from zoneHostingServerList."); if ($null -ne $zoneHostingServerList) { $zoneAndHostingServersHash = Get-ZonesHostingOnServers $zoneHostingServerList; Write-HashTableInHtml $zoneAndHostingServersHash "ZoneAndHostingServersHash"; } else { LogComment $("Failed to get Zone Hosting Servers list. Returning with NULL.") $script:logLevel.Warning; } } return $zoneAndHostingServersHash; } Function Get-ServersHostingTheZones { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $zoneList, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $zoneHostingServerList ) $zoneAndHostingServersHash = $null; foreach($zone in $zoneList) { if ($null -eq $zoneAndHostingServersHash) {$zoneAndHostingServersHash = @{}}; if ($zoneAndHostingServersHash.ContainsKey($zone)) { LogComment $($zone + " is already there in ZoneAndHostingServersList."); continue; } LogComment $("Searching for servers which are hosting Zone: " + $zone); $serverList = $null; foreach($server in $zoneHostingServerList) { $tempZoneObj = ExecuteCmdLet "Get-DnsServerZone" @{"ComputerName" = $server; "ZoneName" = $zone}; if ($null -ne $tempZoneObj) { if ($null -eq $serverList) {$serverList = @()}; LogComment $($server + " is hosting Zone: " + $zone); $serverList += $server; } else { if ([RetStatus]::ZoneDoesNotExist -eq $script:cmdLetReturnedStatus) { LogComment $($server + " doesn't host Zone: " + $zone); } else { LogComment $("Failed to get " + $zone + " info on " + $server + " with error " + $script:cmdLetReturnedStatus) ` $script:logLevel.Error; } } } if ($null -eq $serverList) { LogComment $("Didn't find any server which is hosting Zone: " + $zone) ` $script:logLevel.Warning; } $zoneAndHostingServersHash.Add($zone, $serverList); } return $zoneAndHostingServersHash; } Function Get-ZonesHostingOnServers { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $zoneHostingServerList ) $zoneAndHostingServersHash = $null; foreach($zoneHostingServer in $zoneHostingServerList) { $tempZoneObj = ExecuteCmdLet "Get-DnsServerZone" @{"ComputerName" = $zoneHostingServer}; if ($null -ne $tempZoneObj) { foreach ($zone in $tempZoneObj) { if (($false -eq $zone.IsAutoCreated) -and ("TrustAnchors" -ne $zone.ZoneName)) { if ($null -eq $zoneAndHostingServersHash) {$zoneAndHostingServersHash = @{}}; LogComment $($zoneHostingServer + " is hosting Zone: " + $zone.ZoneName); if ($zoneAndHostingServersHash.ContainsKey($zone.ZoneName)) { $zoneAndHostingServersHash[$zone.ZoneName] += $zoneHostingServer; } else { $zoneAndHostingServersHash.Add($zone.ZoneName, @($zoneHostingServer)); } } } } else { if ([RetStatus]::Success -eq $script:cmdLetReturnedStatus) { LogComment $($zoneHostingServer + " doesn't host any Zone"); } else { LogComment $("Failed to get Zone info on " + $zoneHostingServer + " with error " + $script:cmdLetReturnedStatus) ` $script:logLevel.Error; } } } return $zoneAndHostingServersHash; } Function Get-EnterpriseDhcpv4OptionId { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [Array]$dhcpServerList, $scopeOption = $false, $OptionId = 6 ) $optionList = @(); foreach ($dhcpServer in $dhcpServerList) { try { if ($true -eq $scopeOption) { $scopeOptions = @(); $scopeList = ExecuteCmdLet "Get-DhcpServerv4Scope" @{"ComputerName" = $dhcpServer}; foreach ($scope in $scopeList) { try { $scopeOption = ExecuteCmdLet "Get-DhcpServerv4OptionValue" ` @{"ComputerName" = $dhcpServer; "OptionId" = $OptionId; "ScopeId" = $scope.ScopeId}; $scopeOptions += $scopeOption; } catch { LogComment "Failed to get options for the scope $($scope.ScopeId). Continuing..."; } } $optionList += $scopeOptions; } else { try { $serverOptions = ExecuteCmdLet "Get-DhcpServerv4OptionValue" ` @{"ComputerName" = $dhcpServer; "OptionId" = $OptionId}; $optionList += $serverOptions; } catch { LogComment "Get-DhcpServerv4OptionValue -ComputerName $($dhcpServer) -OptionId $OptionId failed. Continuing..."; } } } catch { LogComment "Get-DhcpServerv4Scope -ComputerName $($dhcpServer) failed" $script:logLevel.Error; } } $optionList = $optionList | ?{-not([String]::IsNullOrEmpty($_))}; if ($null -eq $optionList) { LogComment $("No DHCPv4 option found across the DHCP servers for ScopeOption = " + $scopeOption + ", returning with NULL option list.") $script:logLevel.Warning; } return $optionList; } Function Get-EnterpriseDhcpv6OptionId { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [Array]$dhcpServerList, $scopeOption = $false, $OptionId = 23 ) $optionList = @(); foreach ($dhcpServer in $dhcpServerList) { try { if ($true -eq $scopeOption) { $scopeOptions = @(); $scopeList = ExecuteCmdLet "Get-DhcpServerv6Scope" @{"ComputerName" = $dhcpServer}; foreach ($scope in $scopeList) { try { $scopeOption = ExecuteCmdLet "Get-DhcpServerv6OptionValue" ` @{"ComputerName" = $dhcpServer; "OptionId" = $OptionId; "Prefix" = $scope.Prefix}; $scopeOptions += $scopeOption; } catch { LogComment "Failed to get options for the scope $($scope.Prefix). Continuing..."; } } $optionList += $scopeOptions; } else { try { $serverOptions = ExecuteCmdLet "Get-DhcpServerv6OptionValue" ` @{"ComputerName" = $dhcpServer; "OptionId" = $OptionId}; $optionList += $serverOptions; } catch { LogComment "Get-DhcpServerv6OptionValue -ComputerName $($dhcpServer) -OptionId $OptionId failed. Continuing..."; } } } catch { LogComment $("Get-DhcpServerv6Scope -ComputerName $($dhcpServer) failed") $script:logLevel.Error; } } $optionList = $optionList | ?{-not([String]::IsNullOrEmpty($_))}; if ($null -eq $optionList) { LogComment $("No DHCPv6 option found across the DHCP servers for ScopeOption = " + $scopeOption + ", returning with NULL option list.") $script:logLevel.Warning; } return $optionList; } Function Test-ZoneHealthAcrossAllDnsServers { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $zoneList, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $dnsServerList, [bool]$isRootZone = $false, [String]$outputReportName = $MyInvocation.MyCommand ) $statusArray = @(); foreach($zone in $zoneList) { $status = New-Object PSObject; $status | Add-Member -memberType NoteProperty -name "ZoneName" -value $zone; foreach($dnsServer in $dnsServerList) { try { $result = [RetStatus]::Success; $resultStream = $null; $retVal1 = Test-DnsServerForInputDnsName $zone $dnsServer; $resultStream = $resultStream + "ResolveDnsName:" + $retVal1 + "`n"; $retVal2 = Test-DnsServerForInputZone $zone $dnsServer $dnsServer; $resultStream = $resultStream + "TestDnsServer:" + $retVal2 + "`n"; if (!(([RetStatus]::Success -eq $retVal1) -and ([RetStatus]::Success -eq $retVal2))) { $result = [RetStatus]::Failure; } if ($isRootZone) { $retVal3 = Test-DnsServerForInputDnsName ("_msdcs." + $zone) $dnsServer; $resultStream = $resultStream + "MsdcsResolveDnsName:" + $retVal3 + "`n"; $retVal4 = Test-DnsServerForInputZone ("_msdcs." + $zone) $dnsServer $dnsServer; $resultStream = $resultStream + "MsdcsTestDnsServer:" + $retVal4 + "`n"; $retVal5 = Test-DnsServerForInputDnsName ("_ldap._tcp.dc._msdcs." + $zone) $dnsServer "SRV"; $resultStream = $resultStream + "LdapTCPMsdcsResolveDnsName:" + $retVal5 + "`n"; if (!(([RetStatus]::Success -eq $retVal3) -and ([RetStatus]::Success -eq $retVal4) -and ([RetStatus]::Success -eq $retVal5))) { $result = [RetStatus]::Failure; } } if ([RetStatus]::Success -eq $result) { LogComment $("Validation of " + $zone + " passed on DNS Server: " + $dnsServer); LogComment $("Validation of " + $zone + " passed on DNS Server: " + $dnsServer) $script:logLevel.Host; } else { LogComment $("Validation of " + $zone + " failed on DNS Server: " + $dnsServer) $script:logLevel.Error; LogComment $("Validation output:" + $resultStream) $script:logLevel.Error; $result = $resultStream; } } catch { LogComment $("Test-ZoneHealthAcrossAllDnsServers failed for Zone: " + $zone + " on DNSServer: " + $dnsServer + " `n " + $_.Exception) ` $script:logLevel.Error; $result = [RetStatus]::Failure; } $status = Insert-ResultInObject $status $dnsServer $result; } $statusArray += $status; } Generate-Report $statusArray $outputReportName $script:resultView.Table; return $statusArray; } Function Test-RootDomainHealthAcrossAllDnsServers { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [HashTable]$domainAndHostingServerHash, $dnsServerList ) Test-ZoneHealthAcrossAllDnsServers $domainAndHostingServerHash.Keys $dnsServerList $true $MyInvocation.MyCommand } Function Test-ZoneAgingHealth { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [HashTable]$zoneAndHostingServersHash ) $status = New-Object PSObject; foreach($zone in $zoneAndHostingServersHash.keys) { $result = [RetStatus]::Success; $agingStatus = $false; $defaultRefreshInterval = [Timespan]::FromHours(168); foreach($server in $zoneAndHostingServersHash[$zone]) { try { $retObj = ExecuteCmdLet "Get-DnsServerZoneAging" @{"ComputerName" = $server; "ZoneName" = $zone}; if ($null -ne $retObj) { if ($retObj.AgingEnabled) { LogComment $("Aging is enabled on Server: " + $server + " for Zone: " + $zone); if ($defaultRefreshInterval -ne $retObj.RefreshInterval) { LogComment $("RefreshInterval is set to non-default value: " + $retObj.RefreshInterval) ` $script:logLevel.Warning; } if ($defaultRefreshInterval -ne $retObj.NoRefreshInterval) { LogComment $("NoRefreshInterval is set to non-default value: " + $retObj.NoRefreshInterval) ` $script:logLevel.Warning; } if ($null -eq $retObj.ScavengeServers) { LogComment $("There's no ScavengeServers configured.") $script:logLevel.Warning; } if ($agingStatus) { $result = [RetStatus]::Failure; LogComment $("Aging is enabled on more than one server for Zone: " + $zone) ` $script:logLevel.Warning; } else { $agingStatus = $true; } } else { LogComment $("Aging is disabled on Server: " + $server + " for Zone: " + $zone); } } else { if ([RetStatus]::OperationIsNotSupported -eq $script:cmdLetReturnedStatus) { LogComment $($zone + " is non-primary zone on " + $server); } else { LogComment $("Failed to get " + $zone + " aging info on " + $server + " with error " + $script:cmdLetReturnedStatus) ` $script:logLevel.Error; $result = [RetStatus]::Failure; } } } catch { LogComment $("Test-ZoneAgingHealth failed for Zone: " + $zone + " on Server: " + $server + " `n " + $_.Exception) ` $script:logLevel.Error; $result = [RetStatus]::Failure; } if (!$agingStatus) { LogComment $("No server found with zone aging enabled for the Zone: " + $zone) ` $script:logLevel.Warning; $result = [RetStatus]::Failure; } if ([RetStatus]::Success -eq $result) { LogComment $("Zone Aging setting validation of " + $zone + " passed."); LogComment $("Zone Aging setting validation of " + $zone + " passed.") ` $script:logLevel.Host; } else { LogComment $("Zone Aging setting validation of " + $zone + " failed.") ` $script:logLevel.Error; } $status = Insert-ResultInObject $status $zone $result; } } Generate-Report $status $MyInvocation.MyCommand $script:resultView.List; return $status; } Function Test-ZoneDelegationHealth { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [HashTable]$zoneAndHostingServersHash ) $statusArray = @(); foreach($zone in $zoneAndHostingServersHash.keys) { foreach($server in $zoneAndHostingServersHash[$zone]) { $rrObj = ExecuteCmdLet "Get-DnsServerResourceRecord" @{"ComputerName" = $server; "RRType" = "NS"; "ZoneName" = $zone}; $rrObj = $rrObj |? hostname -ne "@"; $zoneDelObj = $null; if ($null -ne $rrObj) { LogComment $("Performing delegation check for " + $zone + " on " + $server); foreach($rr in $rrObj) { $result = [RetStatus]::Success; $resultStream = $null; $status = New-Object PSObject; $status | Add-Member -memberType NoteProperty -name "ZoneName :: Server" -value ($zone + " :: " + $server) -Force; try { $zoneDelObj = ExecuteCmdLet "Get-DnsServerZoneDelegation" @{"ComputerName" = $server; "ZoneName" = $zone; "ChildZoneName" = $rr.hostname}; if ($null -eq $zoneDelObj) { LogComment $("Failed to get info for " + $rr.hostname + " on " + $server + " with error " + $script:cmdLetReturnedStatus) ` $script:logLevel.Error; if ([RetStatus]::Success -eq $script:cmdLetReturnedStatus) { $result = [RetStatus]::Failure; } else { $result = $script:cmdLetReturnedStatus; } } else { foreach($zoneDel in $zoneDelObj) { $zoneDelName = $zoneDel.ChildZoneName; LogComment $("Validating ZoneDelegation: " + $zoneDelName + " at server: " + $server); [Array]$rr_ip = $zoneDel.IPAddress foreach ($ipRec in $rr_ip) { if ($null -ne $ipRec){ $ipAddr = @(); if ($ipRec.RecordType -eq "A") { $ipAddr = $ipRec.RecordData.IPv4Address } else { $ipAddr = $ipRec.RecordData.IPv6Address } foreach ($ip in $ipAddr) { $retVal = Test-DnsServerForInputDnsName $zoneDelName $ip; $resultStream = $resultStream + $ip.IPAddressToString + ":" + $retVal + "`n"; if ([RetStatus]::Success -eq $retVal) { LogComment $("Validated NameServer IP: " + $ip + " for ZoneDelegation: " + $zoneDelName + " on Server: " + $server); LogComment $("Validated NameServer IP: " + $ip + " for ZoneDelegation: " + $zoneDelName + " on Server: " + $server) ` $script:logLevel.Host; } else { $result = [RetStatus]::Failure; LogComment $("Validation of NameServer IP: " + $ip + " for ZoneDelegation: " + $zoneDelName + " on Server: " + $server + " failed.") ` $script:logLevel.Error; } } } else { $result = [RetStatus]::Failure; $resultStream = $resultStream + "NullIPAddressRecord;"; LogComment $("IPAddress record is null for ZoneDelegation: " + $zoneDelName + " on Server: " + $server) $script:logLevel.Error; } } } if ([RetStatus]::Success -ne $result) { $result = $resultStream; LogComment $("Validation output:" + $resultStream) $script:logLevel.Error; } } } catch { LogComment $("Test-ZoneDelegationHealth failed for Zone: " + $zone + " on Server: " + $server + " `n " + $_.Exception) ` $script:logLevel.Error; $result = [RetStatus]::Failure; } $status = Insert-ResultInObject $status $rr.hostname $result; $statusArray += $status; } } else { if ([RetStatus]::Success -eq $script:cmdLetReturnedStatus) { LogComment $("There's no non-root NS record in " + $zone + " on " + $server); } elseif ([RetStatus]::OperationIsNotSupported -eq $script:cmdLetReturnedStatus) { LogComment $($zone + " isn't a primary or secondary zone on " + $server); } else { LogComment $("Failed to get NS records under " + $zone + " on " + $server + " with error " + $script:cmdLetReturnedStatus) ` $script:logLevel.Error; $status = New-Object PSObject; $status | Add-Member -memberType NoteProperty -name "ZoneName :: Server" -value ($zone + " :: " + $server) -Force; $status = Insert-ResultInObject $status "Get-DnsServerResourceRecord" $script:cmdLetReturnedStatus; $statusArray += $status; } } } } Generate-Report $statusArray $MyInvocation.MyCommand $script:resultView.List; return $statusArray; } Function Test-ConfiguredForwarderHealth { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $dnsServerList ) $statusArray = @(); foreach($dnsServer in $dnsServerList) { $status = New-Object PSObject; $status | Add-Member -memberType NoteProperty -name "DNSServer" -value $dnsServer; try { $retObj = ExecuteCmdLet "Get-DnsServerForwarder" @{"ComputerName" = $dnsServer}; if ($null -ne $retObj) { LogComment $("Performing Forwarder health check for DnsServer: " + $dnsServer); foreach($fwdIp in $retObj.IPAddress) { $result = Test-DnsServerForInputContext $fwdIp.IPAddressToString "Forwarder" $dnsServer; if ([RetStatus]::Success -eq $result) { LogComment $("Validated Forwarder: " + $fwdIp.IPAddressToString + " of DNS Server: " + $dnsServer); LogComment $("Validated Forwarder: " + $fwdIp.IPAddressToString + " of DNS Server: " + $dnsServer) ` $script:logLevel.Host; } else { LogComment $("Validation of Forwarder: " + $fwdIp.IPAddressToString + " of DNS Server: " + $dnsServer + " failed.") ` $script:logLevel.Error; } $status = Insert-ResultInObject $status $fwdIp $result; } } else { if ([RetStatus]::Success -ne $script:cmdLetReturnedStatus) { LogComment $("Unable to get Forwarder list for DnsServer: " + $dnsServer) ` $script:logLevel.Error; $status = Insert-ResultInObject $status "Get-DnsServerForwarder" $script:cmdLetReturnedStatus; } else { LogComment $("There's no forwarder configured on DnsServer: " + $dnsServer); $status = Insert-ResultInObject $status "NoForwarderConfigured" $script:cmdLetReturnedStatus; } } } catch { LogComment $("Test-ConfiguredForwarderHealth failed on DNSServer: " + $dnsServer + " `n " + $_.Exception) ` $script:logLevel.Error; $status = Insert-ResultInObject $status "ForwarderHealthCheckFailed" [RetStatus]::Failure; } $statusArray += $status; } Generate-Report $statusArray $MyInvocation.MyCommand $script:resultView.List; return $statusArray; } Function Test-ConfiguredRootHintsHealth { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $dnsServerList ) $statusArray = @(); foreach($dnsServer in $dnsServerList) { $status = New-Object PSObject; $status | Add-Member -memberType NoteProperty -name "DNSServer" -value $dnsServer; try { $retObj = ExecuteCmdLet "Get-DnsServerRootHint" @{"ComputerName" = $dnsServer}; if ($null -ne $retObj) { LogComment $("Performing RootHints health check for DnsServer: " + $dnsServer); foreach($rH in $retObj) { $result = [RetStatus]::Success; $resultStream = $null; $rHName = $rH.NameServer.RecordData.NameServer; LogComment $("Validating RootHints: " + $rHName + " for DnsServer: " + $dnsServer); [Array]$rr_ip = $rH.IPAddress foreach ($ipRec in $rr_ip) { $ipAddr = @(); if ($ipRec.RecordType -eq "A") { $ipAddr = $ipRec.RecordData.IPv4Address } else { $ipAddr = $ipRec.RecordData.IPv6Address } foreach ($ip in $ipAddr) { $retVal = Test-DnsServerForInputContext $ip "RootHints" $dnsServer; $resultStream = $resultStream + $ip.IPAddressToString + ":" + $retVal + "`n"; if ([RetStatus]::Success -eq $retVal) { LogComment $("Validated RootHints: " + $ip + " of DNS Server: " + $dnsServer); LogComment $("Validated RootHints: " + $ip + " of DNS Server: " + $dnsServer) ` $script:logLevel.Host; } else { $result = [RetStatus]::Failure; LogComment $("Validation of RootHints: " + $ip + " of DNS Server: " + $dnsServer + " failed.") ` $script:logLevel.Error; } } } if ([RetStatus]::Success -eq $result) { $status = Insert-ResultInObject $status $rHName $result; } else { $status = Insert-ResultInObject $status $rHName $resultStream; LogComment $("Validation output:" + $resultStream) $script:logLevel.Error; } } } else { if ([RetStatus]::Success -ne $script:cmdLetReturnedStatus) { LogComment $("Unable to get RootHints list for DnsServer: " + $dnsServer) ` $script:logLevel.Error; $status = Insert-ResultInObject $status "Get-DnsServerRootHint" $script:cmdLetReturnedStatus; } else { LogComment $("There's no RootHints configured on DnsServer: " + $dnsServer); $status = Insert-ResultInObject $status "NoRootHintConfigured" $script:cmdLetReturnedStatus; } } } catch { LogComment $("Test-ConfiguredRootHintsHealth failed on DNSServer: " + $dnsServer + " `n " + $_.Exception) ` $script:logLevel.Error; $result = [RetStatus]::Failure; $status = Insert-ResultInObject $status "RootHintsHealthCheckFailed" $result; } $statusArray += $status; } Generate-Report $statusArray $MyInvocation.MyCommand $script:resultView.List; return $statusArray; } Function Test-DnsServerForInputDnsName { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $dnsName, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $dnsServer, $rrType = "All" ) $result = [RetStatus]::Failure; try { $retObj = ExecuteCmdLet "Resolve-DnsName" @{"Name" = $dnsName; "Type" = $rrType; "Server" = $dnsServer}; if ($null -eq $retObj) { LogComment $("Resolve-DnsName for " + $dnsName + " failed on server " + $dnsServer + " with " + $script:cmdLetReturnedStatus) ` $script:logLevel.Error; $result = $script:cmdLetReturnedStatus; } else { LogComment $("Name resolution of " + $dnsName + " passed on server " + $dnsServer); $result = [RetStatus]::Success; } } catch { LogComment $("Test-DnsServerForInputDnsName failed " + $_.Exception) $script:logLevel.Error; $result = [RetStatus]::Failure; } return $result; } Function Test-DnsServerForInputZone { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $zoneName, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $dnsServer, $remoteServer = "." ) $result = [RetStatus]::Failure; try { $dnsServerIP = $null; if (![Net.IPaddress]::TryParse($dnsServer, [ref]$dnsServerIP)) { try { $dnsServerIP = [System.Net.Dns]::GetHostAddresses($dnsServer).IPAddressToString.Split(" ")[0]; } catch { LogComment $("Exception while trying to get IP Address of " + $dnsServer + "`n" + $_.Exception) ` $script:logLevel.Error; throw; } } $retObj = ExecuteCmdLet "Test-DnsServer" @{"ComputerName" = $remoteServer; "ZoneName" = $zoneName; "IPAddress" = $dnsServerIP}; if ($null -eq $retObj) { LogComment $("Test-DnsServer failed for " + $zoneName + " on server " + $dnsServer) $script:logLevel.Warning; $result = $script:cmdLetReturnedStatus; } else { if (($retObj.Result -eq "Success") -or ($retObj.Result -eq "NotAuthoritativeForZone")) { LogComment $("Test-DnsServer passed for " + $zoneName + " on server " + $dnsServer + " with Result: " + $retObj.Result); $result = [RetStatus]::Success; } else { LogComment $("Test-DnsServer failed for " + $zoneName + " on server " + $dnsServer + " with Result: " + $retObj.Result) ` $script:logLevel.Warning; $result = $retObj.Result; } } } catch { LogComment $("Test-DnsServerForInputDnsName failed " + $_.Exception) $script:logLevel.Error; $result = [RetStatus]::Failure; } return $result; } Function Test-DnsServerForInputContext { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $dnsServer, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $context, $remoteServer = "." ) $result = [RetStatus]::Failure; try { $retObj = ExecuteCmdLet "Test-DnsServer" @{"ComputerName" = $remoteServer; "IPAddress" = $dnsServer; "Context" = $context}; if ($null -eq $retObj) { LogComment $("Test-DnsServer failed for DnsServer: " + $dnsServer + " with context: " + $context) $script:logLevel.Warning; $result = $script:cmdLetReturnedStatus; } else { if ($retObj.Result -eq "Success") { LogComment $("Test-DnsServer Passed for DnsServer: " + $dnsServer + " with context: " + $context + " and Result: " + $retObj.Result); $result = [RetStatus]::Success; } else { LogComment $("Test-DnsServer Failed for DnsServer: " + $dnsServer + " with context: " + $context + " and Result: " + $retObj.Result) ` $script:logLevel.Warning; $result = $retObj.Result; } } } catch { LogComment $("Test-DnsServerForInputContext failed " + $_.Exception) $script:logLevel.Error; $result = [RetStatus]::Failure; } return $result; } Function Get-ZoneHostingServerListFromNSRecords { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $dnsZone, $dnsServer = $null ) try { $retObj = $null; $zoneHostingServerList = $null; if ($null -eq $dnsServer) { $retObj = ExecuteCmdLet "Resolve-DnsName" @{"Name" = $dnsZone; "Type" = "NS"}; } else { $retObj = ExecuteCmdLet "Resolve-DnsName" @{"Name" = $dnsZone; "Type" = "NS"; "Server" = $dnsServer}; } if ($null -eq $retObj) { if ([RetStatus]::Success -eq $script:cmdLetReturnedStatus) { LogComment $("No NS records found for zone: " + $dnsZone + " on server: " + $dnsServer) ` $script:logLevel.Warning; } else { LogComment $("Resolve-DnsName for " + $dnsZone + " failed on server " + $dnsServer + " with " + $script:cmdLetReturnedStatus) ` $script:logLevel.Error; } } else { LogComment $("NS records found for zone: " + $dnsZone + " on server: " + $dnsServer); $retObj = $retObj | ? Type -eq "NS"; $zoneHostingServerList = @(); $retObj | % {$zoneHostingServerList += $_.NameHost}; } } catch { LogComment $("Get-ZoneHostingServerListFromNSRecords failed " + $_.Exception) $script:logLevel.Error; } return $zoneHostingServerList; } Function Get-FileContent { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String]$filePath ) $fileContent = $null; if (Test-Path $filePath) { $fileContent = ExecuteCmdLet "Get-Content" @{"Path" = $filePath}; } else { LogComment $($filePath + " not found."); } if ($null -ne $fileContent) { $fileContent = $fileContent | ?{-not([String]::IsNullOrEmpty($_))}; } else { LogComment $("Returning with Null content for " + $filePath); } return $fileContent; } Function Generate-Report { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [Object]$inputObj, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String]$contextName, [String]$viewAs = $script:resultView.Table ) $head = @' <!--mce:0--> '@ $header = "<H1>DNS Health Report for " + $contextName + "</H1>"; $ouputFile = $contextName + ".html"; $inputObj = $inputObj | ? {$null -ne ($_ | gm -m properties)}; $inputObj | ConvertTo-Html -Head $head -Body $header -As $viewAs | Out-File $ouputFile | Out-Null; $success2Search = "<td>" + [RetStatus]::Success + "</td>"; $success2Replace = "<td style=`"color:green;font-weight:bold;`">" + [RetStatus]::Success + "</td>"; $failure2Search = "<td>" + [RetStatus]::Failure + "</td>"; $failure2Replace = "<td style=`"color:red;font-weight:bold;`">" + [RetStatus]::Failure + "</td>"; $content = Get-Content -path $ouputFile; $content = $content -creplace $success2Search, $success2Replace; $content = $content -creplace $failure2Search, $failure2Replace; $content | Set-Content $ouputFile -Encoding UTF8 | Out-Null; } Function Insert-ResultInObject { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [Object]$inputObj, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String]$resultName, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String]$resultVal ) if (Get-Member -InputObject $inputObj -Name $resultName) { $inputObj.$resultName = $resultVal; } else { $inputObj | Add-Member -memberType NoteProperty -name $resultName -value $resultVal; } return $inputObj; } Function Write-HashTableInHtml { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [HashTable]$inputHash, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String]$fileLabel ) $tempHash = @{}; foreach($key in $inputHash.Keys){ $tempHash[$key] = $inputHash[$key] -join '; '; } $tempObj = New-Object PSObject -Property $tempHash; Generate-Report $tempObj $fileLabel $script:resultView.List; } Function New-Enum { param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $enumName, [Array] $enumVals = @() ) $appdomain = [System.Threading.Thread]::GetDomain(); $assembly = new-object System.Reflection.AssemblyName; $assembly.Name = "EmittedEnum"; $assemblyBuilder = $appdomain.DefineDynamicAssembly($assembly, ` [System.Reflection.Emit.AssemblyBuilderAccess]::Save -bor [System.Reflection.Emit.AssemblyBuilderAccess]::Run); $moduleBuilder = $assemblyBuilder.DefineDynamicModule("DynamicModule", "DynamicModule.mod"); $enumBuilder = $moduleBuilder.DefineEnum($enumName, [System.Reflection.TypeAttributes]::Public, [System.Int32]); for($i = 0; $i -lt $enumVals.Count; $i++) { $null = $enumBuilder.DefineLiteral($enumVals[$i], $i); } $enumBuilder.CreateType() > $null | Out-Null; } New-Enum -EnumName RetStatus -EnumVals @("Success", "Failure", "RpcServerIsUnavailable", "AccessIsDenied", "ZoneDoesNotExist", "OperationIsNotSupported", "RecordDoesNotExist", "NotApplicable","ResolveDnsNameServerNotFound", "ResolveDnsNameResolutionFailed", "ResolveDnsNameTimeoutPeriodExpired"); New-Enum -EnumName ValidationType -EnumVals $script:validValidationTypes; try { Start-Transcript Test-EnterpriseDnsHealth.txt | Out-Null; if ($null -eq $script:dnsServerList) {$script:dnsServerList = Get-EnterpriseDnsServerList;} if ($null -eq $script:dnsServerList) { throw "Unable to get DNS server information. Exiting..."; } if ($null -eq $script:zoneHostingServerList) {$script:zoneHostingServerList = Get-EnterpriseZoneHostingServerList}; if ($null -eq $script:zoneHostingServerList) { throw "Unable to get Zone Hosting server information. Exiting..."; } if($ValidationType -icontains $script:allValidationType) { LogComment $("Validation type contains 'All'. Performing all available health checks.") $script:logLevel.Host; $applicableValidationTypes = $script:validValidationTypes; } else { $applicableValidationTypes = $ValidationType; } foreach ($validationSubType in $applicableValidationTypes) { LogComment $("Performing health check for Validation Type: " + $validationSubType) $script:logLevel.Host; Switch ($validationSubType) { ([ValidationType]::Domain) { if($null -eq $script:domainAndHostingServersList) { $script:domainAndHostingServersList = Get-EnterpriseDomainAndHostingServersHash $script:zoneHostingServerList; } if ($null -ne $script:domainAndHostingServersList) { Test-RootDomainHealthAcrossAllDnsServers $script:domainAndHostingServersList $script:dnsServerList; } else { LogComment $("No domain found, Skipping RootDomainHealthCheckUp") $script:logLevel.Warning; } } ([ValidationType]::Zone) { if($null -eq $script:zoneAndHostingServersList) { $script:zoneAndHostingServersList = Get-EnterpriseZoneAndHostingServersHash $script:zoneHostingServerList; } if ($null -ne $script:zoneAndHostingServersList) { Test-ZoneHealthAcrossAllDnsServers $script:zoneAndHostingServersList.Keys $script:dnsServerList; } else { LogComment $("No zone found, Skipping ZoneHealthCheckUp") $script:logLevel.Warning; } } ([ValidationType]::ZoneAging) { if($null -eq $script:zoneAndHostingServersList) { $script:zoneAndHostingServersList = Get-EnterpriseZoneAndHostingServersHash $script:zoneHostingServerList; } if ($null -ne $script:zoneAndHostingServersList) { Test-ZoneAgingHealth $script:zoneAndHostingServersList; } else { LogComment $("No zone found, Skipping ZoneAgingHealthCheckUp") $script:logLevel.Warning; } } ([ValidationType]::ZoneDelegation) { if($null -eq $script:zoneAndHostingServersList) { $script:zoneAndHostingServersList = Get-EnterpriseZoneAndHostingServersHash $script:zoneHostingServerList; } if ($null -ne $script:zoneAndHostingServersList) { Test-ZoneDelegationHealth $script:zoneAndHostingServersList; } else { LogComment $("No zone found, Skipping ZoneDelegationHealthCheckUp") $script:logLevel.Warning; } } ([ValidationType]::Forwarder) { Test-ConfiguredForwarderHealth $script:dnsServerList; } ([ValidationType]::RootHints) { Test-ConfiguredRootHintsHealth $script:dnsServerList; } default { LogComment $($validationSubType + " isn't a valid input ValidationType, skipping the validation.") $script:logLevel.Warning; LogComment $("Choose '" + $script:allValidationType + "' or one or more validation types among below:`n" + $($script:validValidationTypes | Out-String)) ` $script:logLevel.Warning; } } } } catch { LogComment $("Caught exception during Test-EnterpriseDnsHealth: `n" + $_.Exception) $script:logLevel.Error; } Finally { Stop-Transcript | Out-Null; $logContent = Get-Content Test-EnterpriseDnsHealth.txt; $logContent > Test-EnterpriseDnsHealth.txt | Out-Null; }
combined_dataset/train/non-malicious/Get-TranscriptFilePath.ps1
Get-TranscriptFilePath.ps1
#requires -version 2.0 function Get-TranscriptFilePath { try { $externalHost = $host.gettype().getproperty("ExternalHost", [reflection.bindingflags]"nonpublic,instance").getvalue($host, @()) $externalhost.gettype().getfield("transcriptFileName", "nonpublic,instance").getvalue($externalhost) } catch { write-warning "This host does not support transcription." } }
combined_dataset/train/non-malicious/sample_22_98.ps1
sample_22_98.ps1
ConvertFrom-StringData @' ###PSLOC DeployRole = Deploy '{0:RoleName}' role on '{1:MachineName}' machine. DeployRoleFailed = Deployment of '{0:RoleName}' role failed on '{1:MachineName}' machine with Error: {2:ErrorMessage}. CheckLogs = Check logs at '{0:FilePath}' on '{1:MachineName}' machine. ConfigureRole = Configure '{0:RoleName}' role on '{1:MachineName}' machine. ConfigureRoleFailed = Configuration of '{0:RoleName}' role failed on '{1:MachineName}' machine with Error: {2:ErrorMessage}. WaitingForScheduleTask = Waiting for the scheduled tasks to finish. ServiceDidNotStartup = Service {0:ServiceName} did not start on {1:ComputerName} computer after {2:ValueInSeconds} seconds. ValidationTestStarting = Starting validation test for Role '{0:ServerRoleName}' on machine '{1:ComputerName}' ValidationTestFailed = One or more validation test failed for Role '{0:ServerRoleName}' on machine '{1:ComputerName}' ValidationTestNotAvailable = Validation test result is empty for Role '{0:ServerRoleName}' on machine '{1:ComputerName}'. Investigate whether test cases were not run. ValidationTestFinished = Validation test for Role '{0:ServerRoleName}' finished on machine '{1:ComputerName}' TestConnection = Test Connection on machine '{0:ComputerName}' KeyValueNotProvided = The parameter '{0:ParameterName}' does not contain a value for the key '{1:KeyName}' TestResultsLocation = For detailed test results look at file '{0:FullFilePath}' TestParameterShouldBeProvided = Test parameter '{0:TestParameterName}' should not be null or empty. CouldNotConnectToServerWarning = Could not connect to server '{0:ServerName}' using Test-WSMAN. Server may already be shutdown. GettingCluster = Getting cluster '{0:ClusterName}'. StoppingCluster = Stopping the cluster '{0:ClusterName}'. CheckingClusterResources = Checking cluster: '{0:ClusterName}' resources: '{1:ResourceNames}' for online state. ClusterStartedSuccessfully = Successfully started cluster: '{0:ClusterName}'. ClusterNotReadyRestartingService = Cluster: '{0:ClusterName}' is not yet ready. Restarting the service on servers: '{1:ServerNames}'. VerifyingCluster = Verifying cluster: '{0:ClusterName}' and its resources: '{1:ResourceNames}' are online. ClusterAlreadyStarted = Cluster: '{0:ClusterName}' is already started and ready to receive requests. SetClusterServiceToAutomatic = Setting Cluster: '{0:ClusterName}' service to automatic on servers: '{1:ServerNames}'. UnableToGetCluster = Unable to get the sql cluster: '{0:ClusterName}'. Cluster may already be shutdown. ClusterResourcesTimeout = The following cluster resources: '{0:ClusterResourceNames}' did not come online before timeout of '{1:ClusterTimeoutTime}' seconds. UnableToGetClusterTimeout = Unable to get cluster: '{0:ClusterName}' before timeout of '{1:ClusterTimeoutTime}' seconds. ParameterCannotBeEmptyOrNull = Parameter '{0:ParameterName}' cannot be empty or null. TimeoutOccurred = A timeout has occurred after {0:NumberOfMinutes} minutes. NodeToUpdateNotProvided = A machine name has not been provided to run update. Verify that the running action plan has a RoleName defined in the ExecutionContext node in the CustomerConfig.xml file. ServiceShouldBeRunningOnMachine = Service '{0:ServiceName}' should be running on machine '{1:MachineName}'. QueryingScalableNode = Querying Nodelist in '{0:machineRole}' for any node in '{1:ProvisioningStatus}' state and from '{2:Role}' role. FoundNoScalableNode = No nodes in '{0:ProvisioningStatus}' state from '{1:Role}' role found in {2:machineRole} Nodelist." FoundSomeScalableNodes = Found {0} Nodes in '{1:ProvisioningStatus}' state from '{2:Role}' role found in {3:machineRole} Nodelist." '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBy2vpvlsrNHYuS # qnc71e8aGy07FZ3F3l91RMYllA0DLaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFt3RQxzr5yjYcYUmgfb0Zw5 # W5GDNZdK4jnc+fOy4+kcMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAdDLlgx1bi6pMEQ5ECaMTO8zcmEN8sbGJPxEE12Dqc9pJ4vu7KT+a6NY4 # Xz3ulTgZjRDdIwAeHMYWEKU69h++FXKMSMqdPPgg8IxLS1OwFlBnZpZhm028+I1m # Vsy6Kmo6Z4abDcn4k92OgUC/FuyLmgE1gcOCzqSY0X3YiGoCD4tMIJr9hQze/Omm # MPJ+uGaA5zLQP9O07BaA69pO51K7y3LWBBapDJaiTxTfDQxPoEI/MhwhhvSoznuv # uZYzksUFXgxYW/3zJGFmMqpE/VceH5NKQ3hBgHGMNjL2CVLcvkqYtrx1F8WAYBzf # 7AuyxzaL/7Z/WEoMEwYL5NfqoHGTEqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB5IKL5Jy1DhCEo5INMu2pgrxy7L0VXfzxhIOR+iLUfBwIGZbwTIW8b # GBMyMDI0MDIxMjE0MDkzMS43ODZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomjAiGA8yMDI0MDIxMjA5NTEy # MloYDzIwMjQwMjEzMDk1MTIyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpdGia # AgEAMAcCAQACAhIoMAcCAQACAhRTMAoCBQDpdboaAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBABW+tYgbAPR+oZCQHOd+wSgK8zCkDMJdxQjRkijYy18aYkva # C9bgueZug2D3MkqyuStHRfU/gl1yxM5Siw8Civeo8cvRd0+QBWaOwJEhVoQRWSl/ # HAhpPqkB6t2GdrnOGnQfBbGaee1JvvZ/2qpMd3iaaOt6Ccw2n+3K6G39dt/d4EPI # U4y4mjzRD59H47Stg/8g8oxN0MuNMsIqpG8raHlbZ6slT6S+2rufioM1eBAgKb/P # piIYBzlqckFhaUQ1SbnS2+plre/hnmG9Eg3Wf6YevhqnC1JxFfhX+s3QeI2NlwFd # uU8u+kirxzndHmgWnBszIN/ERMnYMyveR9RU1S8xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCeWjJN7ZOp8aGCfR2b65IUtREdIJy9bccIAjOaDUzKbzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s # uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQg+AA24QkUUyOE+ron3tucOKViVGjQ # FIfFQSs5Iud3JxIwDQYJKoZIhvcNAQELBQAEggIAa68vEIjAy/TpCKFTE1sYAch5 # xUfE+3LLC/THozzf9jkVkXpD5T73/pAxzCYX/HnFQyAy7UutFGgHXBocmXndUD/k # fyv+qde2YQTPFaGmqvhojYMioTW0wcKUflg/Zk2ZY7Ze2ysjFMrDPEB2n4c1m7ZS # PWFrZJHTSCtBdL35NIVzJ0AC6XE3zBks4GvLZ3AYprNdk09dxkUUiN+nj57ccwmj # nc510RJeFnuvSf4/GsCidDgT1LkRPGlQ6huvcYXQKN4ViIDlWEKvDlrDMEDnmcf6 # wmzvVvoUlfjpvLkIjLY7UnD6NqoGWCcZvRWuzqfa3ByeDzjKMpOrJIwBHsxV1E6P # ESnGM1q13ZI8/pT4nrgjJmyZsSAY+pfWs3ptCEnm955cbW1I5XnJVSjvHNQEEn8v # t0/ZOiM8DTPcahkpUtdRIiEu8LuMCFJzdxPyXbQ5Tu9wlRg9Hr4zwAwYfNlrf3pC # FfxTrStmNRGjWEfRPcE1rClqjm3Edt3808YdLgGF6x4SZDDXGSDTDCg5Wb5ifFm7 # h8GzZHiZgsoOcBPSwoAzfpAT0QSd2nTdC9+NPZcHfvKVHi/2LgqYKQcmGVw4bvQl # DlftHL9RguV2wQFm+rAAlmQ0jzP3xy3CjcKaPvgIFZuM2fDc1KgS3ycJWZIoZApY # POVTrpf6DsWcVy+doNk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_17_60.ps1
sample_17_60.ps1
# # Module manifest for module 'OCI.PSModules.Loganalytics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loganalytics.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a190d2eb-8d34-45b0-836a-ba4f1b2e1914' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loganalytics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loganalytics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCILoganalyticsEntityAssociation', 'Add-OCILoganalyticsSourceEventTypes', 'Confirm-OCILoganalyticsAssociationParameters', 'Confirm-OCILoganalyticsEndpoint', 'Confirm-OCILoganalyticsFile', 'Confirm-OCILoganalyticsLabelCondition', 'Confirm-OCILoganalyticsSource', 'Confirm-OCILoganalyticsSourceExtendedFieldDetails', 'Confirm-OCILoganalyticsSourceMapping', 'Disable-OCILoganalyticsArchiving', 'Disable-OCILoganalyticsAutoAssociation', 'Disable-OCILoganalyticsIngestTimeRule', 'Disable-OCILoganalyticsSourceEventTypes', 'Enable-OCILoganalyticsArchiving', 'Enable-OCILoganalyticsAutoAssociation', 'Enable-OCILoganalyticsIngestTimeRule', 'Enable-OCILoganalyticsSourceEventTypes', 'Export-OCILoganalyticsCustomContent', 'Export-OCILoganalyticsQueryResult', 'Get-OCILoganalyticsAssociableEntitiesList', 'Get-OCILoganalyticsAssociatedEntitiesList', 'Get-OCILoganalyticsAssociationSummary', 'Get-OCILoganalyticsAutoAssociationsList', 'Get-OCILoganalyticsCategoriesList', 'Get-OCILoganalyticsCategory', 'Get-OCILoganalyticsColumnNames', 'Get-OCILoganalyticsConfigWorkRequest', 'Get-OCILoganalyticsConfigWorkRequestsList', 'Get-OCILoganalyticsEffectivePropertiesList', 'Get-OCILoganalyticsEmBridge', 'Get-OCILoganalyticsEmBridgesList', 'Get-OCILoganalyticsEmBridgeSummary', 'Get-OCILoganalyticsEncryptionKeyInfoList', 'Get-OCILoganalyticsEntitiesList', 'Get-OCILoganalyticsEntitiesSummary', 'Get-OCILoganalyticsEntity', 'Get-OCILoganalyticsEntityAssociationsList', 'Get-OCILoganalyticsEntitySourceAssociationsList', 'Get-OCILoganalyticsEntityTopologyList', 'Get-OCILoganalyticsEntityType', 'Get-OCILoganalyticsEntityTypesList', 'Get-OCILoganalyticsField', 'Get-OCILoganalyticsFieldsList', 'Get-OCILoganalyticsFieldsSummary', 'Get-OCILoganalyticsIngestTimeRule', 'Get-OCILoganalyticsIngestTimeRulesList', 'Get-OCILoganalyticsLabel', 'Get-OCILoganalyticsLabelPrioritiesList', 'Get-OCILoganalyticsLabelsList', 'Get-OCILoganalyticsLabelSourceDetailsList', 'Get-OCILoganalyticsLabelSummary', 'Get-OCILoganalyticsLogGroup', 'Get-OCILoganalyticsLogGroupsList', 'Get-OCILoganalyticsLogGroupsSummary', 'Get-OCILoganalyticsLogSetsCount', 'Get-OCILoganalyticsLogSetsList', 'Get-OCILoganalyticsLookup', 'Get-OCILoganalyticsLookupsList', 'Get-OCILoganalyticsLookupSummary', 'Get-OCILoganalyticsMetaSourceTypesList', 'Get-OCILoganalyticsNamespace', 'Get-OCILoganalyticsNamespacesList', 'Get-OCILoganalyticsObjectCollectionRule', 'Get-OCILoganalyticsObjectCollectionRulesList', 'Get-OCILoganalyticsOverlappingRecallsList', 'Get-OCILoganalyticsParser', 'Get-OCILoganalyticsParserFunctionsList', 'Get-OCILoganalyticsParserMetaPluginsList', 'Get-OCILoganalyticsParsersList', 'Get-OCILoganalyticsParserSummary', 'Get-OCILoganalyticsPreferences', 'Get-OCILoganalyticsPropertiesMetadataList', 'Get-OCILoganalyticsQueryResult', 'Get-OCILoganalyticsQueryWorkRequest', 'Get-OCILoganalyticsQueryWorkRequestsList', 'Get-OCILoganalyticsRecallCount', 'Get-OCILoganalyticsRecalledDataList', 'Get-OCILoganalyticsRecalledDataSize', 'Get-OCILoganalyticsResourceCategoriesList', 'Get-OCILoganalyticsRulesList', 'Get-OCILoganalyticsRulesSummary', 'Get-OCILoganalyticsScheduledTask', 'Get-OCILoganalyticsScheduledTasksList', 'Get-OCILoganalyticsSource', 'Get-OCILoganalyticsSourceAssociationsList', 'Get-OCILoganalyticsSourceEventTypesList', 'Get-OCILoganalyticsSourceExtendedFieldDefinitionsList', 'Get-OCILoganalyticsSourceLabelOperatorsList', 'Get-OCILoganalyticsSourceMetaFunctionsList', 'Get-OCILoganalyticsSourcePatternsList', 'Get-OCILoganalyticsSourcesList', 'Get-OCILoganalyticsSourceSummary', 'Get-OCILoganalyticsStorage', 'Get-OCILoganalyticsStorageUsage', 'Get-OCILoganalyticsStorageWorkRequest', 'Get-OCILoganalyticsStorageWorkRequestErrorsList', 'Get-OCILoganalyticsStorageWorkRequestsList', 'Get-OCILoganalyticsSupportedCharEncodingsList', 'Get-OCILoganalyticsSupportedTimezonesList', 'Get-OCILoganalyticsUnprocessedDataBucket', 'Get-OCILoganalyticsUpload', 'Get-OCILoganalyticsUploadFilesList', 'Get-OCILoganalyticsUploadsList', 'Get-OCILoganalyticsUploadWarningsList', 'Get-OCILoganalyticsWarningsList', 'Get-OCILoganalyticsWorkRequest', 'Get-OCILoganalyticsWorkRequestErrorsList', 'Get-OCILoganalyticsWorkRequestLogsList', 'Get-OCILoganalyticsWorkRequestsList', 'Import-OCILoganalyticsCustomContent', 'Invoke-OCILoganalyticsAppendLookupData', 'Invoke-OCILoganalyticsAssignEncryptionKey', 'Invoke-OCILoganalyticsBatchGetBasicInfo', 'Invoke-OCILoganalyticsClean', 'Invoke-OCILoganalyticsCompareContent', 'Invoke-OCILoganalyticsEstimatePurgeDataSize', 'Invoke-OCILoganalyticsEstimateRecallDataSize', 'Invoke-OCILoganalyticsEstimateReleaseDataSize', 'Invoke-OCILoganalyticsExtractStructuredLogFieldPaths', 'Invoke-OCILoganalyticsExtractStructuredLogHeaderPaths', 'Invoke-OCILoganalyticsFilter', 'Invoke-OCILoganalyticsOffboardNamespace', 'Invoke-OCILoganalyticsOnboardNamespace', 'Invoke-OCILoganalyticsParseQuery', 'Invoke-OCILoganalyticsPauseScheduledTask', 'Invoke-OCILoganalyticsPurgeStorageData', 'Invoke-OCILoganalyticsQuery', 'Invoke-OCILoganalyticsRecallArchivedData', 'Invoke-OCILoganalyticsReleaseRecalledData', 'Invoke-OCILoganalyticsResumeScheduledTask', 'Invoke-OCILoganalyticsRun', 'Invoke-OCILoganalyticsSetUnprocessedDataBucket', 'Invoke-OCILoganalyticsSuggest', 'Invoke-OCILoganalyticsSuppressWarning', 'Invoke-OCILoganalyticsTestParser', 'Invoke-OCILoganalyticsUnsuppressWarning', 'Invoke-OCILoganalyticsUpsertAssociations', 'Invoke-OCILoganalyticsUpsertField', 'Invoke-OCILoganalyticsUpsertLabel', 'Invoke-OCILoganalyticsUpsertParser', 'Invoke-OCILoganalyticsUpsertSource', 'Invoke-OCILoganalyticsVerify', 'Move-OCILoganalyticsEmBridgeCompartment', 'Move-OCILoganalyticsEntityCompartment', 'Move-OCILoganalyticsIngestTimeRuleCompartment', 'Move-OCILoganalyticsLogGroupCompartment', 'Move-OCILoganalyticsObjectCollectionRuleCompartment', 'Move-OCILoganalyticsScheduledTaskCompartment', 'New-OCILoganalyticsEmBridge', 'New-OCILoganalyticsEntity', 'New-OCILoganalyticsEntityType', 'New-OCILoganalyticsIngestTimeRule', 'New-OCILoganalyticsLogGroup', 'New-OCILoganalyticsObjectCollectionRule', 'New-OCILoganalyticsScheduledTask', 'Register-OCILoganalyticsLookup', 'Remove-OCILoganalyticsAssociations', 'Remove-OCILoganalyticsEmBridge', 'Remove-OCILoganalyticsEntity', 'Remove-OCILoganalyticsEntityAssociations', 'Remove-OCILoganalyticsEntityType', 'Remove-OCILoganalyticsField', 'Remove-OCILoganalyticsIngestTimeRule', 'Remove-OCILoganalyticsLabel', 'Remove-OCILoganalyticsLogGroup', 'Remove-OCILoganalyticsLookup', 'Remove-OCILoganalyticsObjectCollectionRule', 'Remove-OCILoganalyticsParser', 'Remove-OCILoganalyticsPreferences', 'Remove-OCILoganalyticsResourceCategories', 'Remove-OCILoganalyticsScheduledTask', 'Remove-OCILoganalyticsSource', 'Remove-OCILoganalyticsSourceEventTypes', 'Remove-OCILoganalyticsUpload', 'Remove-OCILoganalyticsUploadFile', 'Remove-OCILoganalyticsUploadWarning', 'Stop-OCILoganalyticsQueryWorkRequest', 'Update-OCILoganalyticsEmBridge', 'Update-OCILoganalyticsEntity', 'Update-OCILoganalyticsEntityType', 'Update-OCILoganalyticsIngestTimeRule', 'Update-OCILoganalyticsLogGroup', 'Update-OCILoganalyticsLookup', 'Update-OCILoganalyticsLookupData', 'Update-OCILoganalyticsObjectCollectionRule', 'Update-OCILoganalyticsPreferences', 'Update-OCILoganalyticsResourceCategories', 'Update-OCILoganalyticsScheduledTask', 'Update-OCILoganalyticsStorage', 'Write-OCILoganalyticsDiscoveryData', 'Write-OCILoganalyticsLogEventsFile', 'Write-OCILoganalyticsLogFile', 'Write-OCILoganalyticsQueryWorkRequestBackground' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loganalytics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1965.ps1
1965.ps1
Describe "Update-FormatData" -Tags "CI" { BeforeEach { $ps = [PowerShell]::Create() } Context "Validate Update-FormatData update correctly" { It "Should not throw upon reloading previous formatting file" { { Update-FormatData } | Should -Not -throw } It "Should validly load formatting data" { $path = Join-Path -Path $TestDrive -ChildPath "outputfile.ps1xml" Get-FormatData -typename System.Diagnostics.Process | Export-FormatData -Path $path $null = $ps.AddScript("Update-FormatData -prependPath $path") $ps.Invoke() $ps.HadErrors | Should -BeFalse } It "Update with atributes on Configuration node should be ignored" { $xmlContent = @" <Configuration xmlns:foo="bar"> <ViewDefinitions> <View> <Name>Test</Name> <ViewSelectedBy> <TypeName>Test</TypeName> </ViewSelectedBy> <ListControl> <ListEntries> <ListEntry> <ListItems> <ListItem> <PropertyName>Test</PropertyName> </ListItem> </ListItems> </ListEntry> </ListEntries> </ListControl> </View> </ViewDefinitions> </Configuration> "@ $path = "$testdrive\rootattribute.format.ps1xml" Set-Content -Path $path -Value $xmlContent $null = $ps.AddScript("Update-FormatData -prependPath $path") $ps.Invoke() $ps.HadErrors | Should -BeFalse $ps.Commands.Clear() $null = $ps.AddScript("Get-FormatData test") $formatData = $ps.Invoke() $formatData | Should -HaveCount 1 $formatData.TypeNames | Should -BeExactly "Test" $formatData.FormatViewDefinition.Name | Should -BeExactly "Test" } } } Describe "Update-FormatData basic functionality" -Tags "CI" { BeforeAll { $testfilename = "testfile.ps1xml" $testfile = Join-Path -Path $TestDrive -ChildPath $testfilename $xmlContent=@" <Types> <Type> <Name>AnyName</Name> <Members> <PropertySet> <Name>PropertySetName</Name> <ReferencedProperties> <Name>FirstName</Name> <Name>LastName</Name> </ReferencedProperties> </PropertySet> </Members> </Type> </Types> "@ $xmlContent > $testfile } It "Update-FormatData with WhatIf should work"{ { Update-FormatData -Append $testfile -WhatIf } | Should -Not -Throw { Update-FormatData -Prepend $testfile -WhatIf } | Should -Not -Throw } It "Update with invalid format xml should fail" { $xmlContent = @" <Configuration> <ViewDefinitions> <View> <Name>T2</Name> </View> </ViewDefinitions> </Configuration> "@ $xmlContent | Out-File -FilePath "$testdrive\invalid.format.ps1xml" -Encoding ascii { Update-FormatData -Path "$testdrive\invalid.format.ps1xml" -ErrorAction Stop } | Should -Throw -ErrorId "FormatXmlUpdateException,Microsoft.PowerShell.Commands.UpdateFormatDataCommand" } } Describe "Update-FormatData with resources in CustomControls" -Tags "CI" { BeforeAll { $templatePath = Join-Path $PSScriptRoot (Join-Path 'assets' 'UpdateFormatDataTests.format.ps1xml') $formatFilePath = Join-Path $TestDrive 'UpdateFormatDataTests.format.ps1xml' $ps = [powershell]::Create() $iss = [system.management.automation.runspaces.initialsessionstate]::CreateDefault2() $rs = [system.management.automation.runspaces.runspacefactory]::CreateRunspace($iss) $rs.Open() $ps.Runspace = $rs } AfterAll { $rs.Close() $ps.Dispose() } Context "Validate Update-FormatData" { It "Resources in WindowsPS syntax should be loaded successfully" { $format = Get-Content -Path $templatePath -Raw $format.Replace("%BaseName%","FileSystemProviderStrings") | Set-Content -Path $formatFilePath -Force $null = $ps.AddScript("Update-FormatData -PrependPath $formatFilePath") $ps.Streams.Error.Clear() $ps.Invoke() $ps.Streams.Error | Should -BeNullOrEmpty } It "Resources in CorePS syntax should be loaded successfully" { $format = Get-Content -Path $templatePath -Raw $format.Replace("%BaseName%","System.Management.Automation.resources.FileSystemProviderStrings") | Set-Content -Path $formatFilePath -Force $null = $ps.AddScript("Update-FormatData -PrependPath $formatFilePath") $ps.Streams.Error.Clear() $ps.Invoke() $ps.Streams.Error | Should -BeNullOrEmpty } It "Verify assembly path in error message when resource is Not found" { $format = Get-Content -Path $templatePath -Raw $format.Replace("%BaseName%","NonExistingResource") | Set-Content -Path $formatFilePath -Force $null = $ps.AddScript("Update-FormatData -PrependPath $formatFilePath") $ps.Streams.Error.Clear() $ps.Invoke() $sma = [appdomain]::CurrentDomain.GetAssemblies() | Where-Object { if ($_.Location) {$_.Location.EndsWith("System.Management.Automation.dll")}} $smaLocation = $sma.Location $ps.Streams.Error | ForEach-Object { $_.Exception.Message.Contains($smaLocation) | Should -BeTrue } $ps.Streams.Error | ForEach-Object { $_.FullyQualifiedErrorId | Should -Match 'FormatXmlUpdateException' } } } }
combined_dataset/train/non-malicious/156.ps1
156.ps1
function Get-DistributionGroupMemberRecursive { [CmdletBinding()] PARAM ($Group) BEGIN { TRY { Write-Verbose -Message "[BEGIN] Retrieving members of $Group" $GroupMembers = Get-DistributionGroupMember -Identity $Group -ErrorAction Stop -ErrorVariable ErrorBeginGetDistribMembers | Select-object -Property Name, PrimarySMTPAddress, @{ Label = "Group"; Expression = { $Group } }, RecipientType } CATCH { Write-Warning -Message "[BEGIN] Something wrong happened" if ($ErrorBeginGetDistribMembers) { Write-Warning -Message "[BEGIN] Issue while retrieving members of $Group" } Write-Warning -Message $Error[0].Exception.Message } } PROCESS { FOREACH ($Member in $GroupMembers) { TRY { Write-verbose "[PROCESS] Member: $($member.name)" SWITCH ($Member.RecipientType) { "MailUniversalDistributionGroup" { Get-DistributionGroupMemberRecursive -Group $($Member.name) | Select-Object -Property Name, PrimarySMTPAddress, @{ Label = "Group"; Expression = { $($Member.name) } }, RecipientType Write-Verbose -Message "[PROCESS] $($Member.name)" } "UserMailbox" { $Member | Select-object -Property Name, PrimarySMTPAddress, @{ Label = "Group"; Expression = { $Group } } } } } CATCH { Write-Warning -Message "[PROCESS] Something wrong happened" Write-Warning -Message $Error[0].Exception.Message } } } END { Write-Verbose -message "[END] Done" } }
combined_dataset/train/non-malicious/sample_32_22.ps1
sample_32_22.ps1
@{ RootModule = 'PSReadLine.psm1' NestedModules = @("Microsoft.PowerShell.PSReadLine2.dll") ModuleVersion = '2.1.0' GUID = '5714753b-2afd-4492-a5fd-01d9e2cff8b5' Author = 'Microsoft Corporation' CompanyName = 'Microsoft Corporation' Copyright = '(c) Microsoft Corporation. All rights reserved.' Description = 'Great command line editing in the PowerShell console host' PowerShellVersion = '5.0' DotNetFrameworkVersion = '4.6.1' CLRVersion = '4.0.0' FormatsToProcess = 'PSReadLine.format.ps1xml' AliasesToExport = @() FunctionsToExport = 'PSConsoleHostReadLine' CmdletsToExport = 'Get-PSReadLineKeyHandler','Set-PSReadLineKeyHandler','Remove-PSReadLineKeyHandler', 'Get-PSReadLineOption','Set-PSReadLineOption' HelpInfoURI = 'https://aka.ms/powershell71-help' } # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDmogoFH4ntis+T # 6gP1N8mtfHlIGRThbw/NPLqG1dcX2KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINdd # SWYuY7JlxXf6lBHSiWYiHbWgRD/EKwJ7FzEQBlVHMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAfYW1XYKIbj6BdDZBbE6vVQeALVJPuDHVKhIS # NJndFlG/fZOucgp/jvS4Muvz/EQChx1VxjawkaSKahGtWYmmDy8UZ28jhmgjrsCy # CLL0hNhza8YBehgryfqopNXYfU9ukIFDZ3918tevPFfmK82HZhvCxIrUMHHWDLtj # Ewm8WaHkHXF2peINY+zJc1Q4/Vc8vARt+t8U/cndrPoj1CPcytD4f5QnioghgMyr # yqHGw9JunE4jcJCEE2qR1mvw4GWMQXjga6a/15BPklFOpzQ0SzNY/mEou3bGfwlB # mWgcocTM70m/2UmU8GTTxYfQud/zLGAEoi0LWJ2R4ESKbwcV/qGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDfHNYPiF74QM8j2SKeWptHZkyEtj5QT6aD # AYcYTov2XQIGZc4N4zkcGBMyMDI0MDIyMDE4MTgzOS45NjVaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQAB # AAAB8zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ2MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngq # YAb+z3IfzNpZIWS/sgfXhlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz # 8zcn1aUD5D2r2PhzVKjHtivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVo # mOybQ7+2jc4afzj2XJQQSmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiI # YlGf+XV2u6oQHAkMG56xYPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxc # QGXjnAgeeVbbPbAoELhbw+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3x # uw3R7fJsqe7pqsnjwvniP7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE # 71EYrcSNrOGlTm5uqq+syO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxL # CSzqXOVOzdqA8O5Xa3E41j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJ # wBj2FQgTiVHacvMQDgSA7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wF # kBrf2Sjn+ieNq6Fx0tWj8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+ # cwdJ39REU43aWCwn0C+XxwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEM # jA3ApoUx9qDrDQokMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc # 3liO4c7nXM/UKFcAm5w61FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15 # j7q8e6elg8/cD3bv0sW4Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2s # gAUh7+OZnb9TwJE7pbEBPJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaA # GooT4A15/7oNj9zyzRABTUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0 # SZ8Zq65iK2hQ8IMAOVxewCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B # 7E2odVfs6H2EYCZxUS1rgReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQ # n5IzhfCkraT1KnZF8TI3ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9v # ErDVBDRMjGsE/HqqY7QTSTtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5 # aOa31FyCM17/pPTIKTRiKsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJ # IcqopVAwdbNdroZi2HN8nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc0 # 5DW8JNvZ328Jps3LJCALt0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBu+gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X8jhzAi # GA8yMDI0MDIyMDEzMTEzNVoYDzIwMjQwMjIxMTMxMTM1WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDpfyOHAgEAMAoCAQACAgrFAgH/MAcCAQACAhWzMAoCBQDpgHUH # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAJlwQPHTlhzgOweThT2RDkwy # So7JUzoEEosawP9we2bTQNlvhX4I43E7uS7zdfTqekvQjw490TQJyByljXgKErPz # 43tW7d/zya9K0oqLJXp/HyKzsnsZTjzeXvQHzO8dpEAT6rqZIZEaUC5iufZP2Q2m # 3SfEWcQkQ7yGXxI1KqJGHYvf1RTNIulMvzDDqi4qKQTPPhGBd7xIK70/kQpLsb7I # CCONj9kW74FyxDrUWVHdyLs6uAz9FDU/Dbfw1Zx8qz07VoC42IlA8t2qUkQEpLwW # dtZETELFFPcZ5e5LhU7zogcv78ITSbrkU+y/jNBVRroTgAExthmHrotYaqx29bIx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfPFCkOuA8wdMQABAAAB8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDYl1zzrrzCjpuQoHqeAtM6 # MArE4hoCCodsuIus4pcf3zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi8 # 2TSLtuG4Vkp8wBmJk/T+RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg45QO # +h3Q3x/fdifPtogmNTfDo+rA0YFwdxQXJqT1TM4wDQYJKoZIhvcNAQELBQAEggIA # CQQsRC2WzRt/hspBpSKNTfofPLMQrZPk/jyLIaeC/NRgG7mMYz4s7IL8iVtLnRx0 # f3exVExHADuWYJLtzTGXdOQSOXg5jiotG88kSnN5aznzbVHwN0cf5n7f0D3JZkTx # gkPteC/fAsKUa/r+vcEN5zf3/KdGJxy6oCnWMbXZUCAl+bxY+3k3pu/UvRW6eXsN # MlHmeDEHp7HQiPgPDNnI+OdJRpFWygc3PDcGPWRPdbwsHUiSC4hWA+HfNxfW3XeB # d8dL8T2vWOhQTjKNE2b9JrNxczE/Smud161uq+NHk/KmV1KEiLhz4hcjJYPfAOiH # ojJw9eHHSCGg6s2Qa+Ef6cesvzDjKd7MWZJ8sdR/uTXpvpVPkvd47vdFK40YCjd+ # GeKY9qZMWT3Vgv9MB+CpW4SX93N3fqCuKsnm7b8tFOTfmQAsZSQGcNFT+UWk29Vi # X3UoLdulatmMmTos3xOWsGfbkpVRqHUnGrw+JU30YFHfhmGlY/tXmdeIsj/1hYwA # 6X05PJSqQYhYGFM69929c9953Qry+kZ+DMPYsu/p7aEvNsrleGGd01C0aa9TJgWi # f6ZitzBZHFfCfU6ufYFcGImLO5VzLGNQN0ewnYVYpfQ8x0Uns4mFaUVqoFlLLK/e # RGZzrURxMbE/eU8dFT3rBxDKa42YFoR0VN1XaBWAGvA= # SIG # End signature block
combined_dataset/train/non-malicious/3007.ps1
3007.ps1
$Script:ReportStrings = DATA { @{ HeaderMessage = @' ____ __ / __ \___ _____/ /____ _____ / /_/ / _ \/ ___/ __/ _ \/ ___/ / ____/ __(__ ) /_/ __/ / /_/ \___/____/\__/\___/_/ Pester v{0} '@ StartMessage = "Executing all tests in '{0}'" FilterMessage = ' matching test name {0}' TagMessage = ' with Tags {0}' MessageOfs = "', '" CoverageTitle = 'Code coverage report:' CoverageMessage = 'Covered {2:P2} of {3:N0} analyzed {0} in {4:N0} {1}.' MissedSingular = 'Missed command:' MissedPlural = 'Missed commands:' CommandSingular = 'Command' CommandPlural = 'Commands' FileSingular = 'File' FilePlural = 'Files' Describe = 'Describing {0}' Script = 'Executing script {0}' Context = 'Context {0}' Margin = ' ' Timing = 'Tests completed in {0}' ContextsPassed = '' ContextsFailed = '' TestsPassed = 'Tests Passed: {0}, ' TestsFailed = 'Failed: {0}, ' TestsSkipped = 'Skipped: {0}, ' TestsPending = 'Pending: {0}, ' TestsInconclusive = 'Inconclusive: {0} ' } } $Script:ReportTheme = DATA { @{ Describe = 'Green' DescribeDetail = 'DarkYellow' Context = 'Cyan' ContextDetail = 'DarkCyan' Pass = 'DarkGreen' PassTime = 'DarkGray' Fail = 'Red' FailTime = 'DarkGray' Skipped = 'Yellow' SkippedTime = 'DarkGray' Pending = 'Gray' PendingTime = 'DarkGray' Inconclusive = 'Gray' InconclusiveTime = 'DarkGray' Incomplete = 'Yellow' IncompleteTime = 'DarkGray' Foreground = 'White' Information = 'DarkGray' Coverage = 'White' CoverageWarn = 'DarkRed' } } function Format-PesterPath ($Path, [String]$Delimiter) { if ($null -eq $Path) { $null } elseif ($Path -is [String]) { $Path } elseif ($Path -is [hashtable]) { $Path.Path } elseif ($null -ne ($path -as [hashtable[]])) { ($path | ForEach-Object { $_.Path }) -join $Delimiter } elseif ($Path -as [String[]]) { $Path -join $Delimiter } } function Write-PesterStart { param( [Parameter(mandatory = $true, valueFromPipeline = $true)] $PesterState, $Path = '.' ) process { if (-not ( $pester.Show | Has-Flag 'Header')) { return } $OFS = $ReportStrings.MessageOfs $moduleInfo = $MyInvocation.MyCommand.ScriptBlock.Module $moduleVersion = $moduleInfo.Version.ToString() if ($moduleInfo.PrivateData.PSData.Prerelease) { $moduleVersion += "-$($moduleInfo.PrivateData.PSData.Prerelease)" } $message = $ReportStrings.HeaderMessage -f $moduleVersion $message += [Environment]::NewLine $message += $ReportStrings.StartMessage -f (Format-PesterPath $Path -Delimiter $OFS) if ($PesterState.TestNameFilter) { $message += $ReportStrings.FilterMessage -f "$($PesterState.TestNameFilter)" } if ($PesterState.ScriptBlockFilter) { $m = $(foreach ($m in $PesterState.ScriptBlockFilter) { "$($m.Path):$($m.Line)" }) -join ", " $message += $ReportStrings.FilterMessage -f $m } if ($PesterState.TagFilter) { $message += $ReportStrings.TagMessage -f "$($PesterState.TagFilter)" } & $SafeCommands['Write-Host'] $message -Foreground $ReportTheme.Foreground } } function Write-Describe { param ( [Parameter(mandatory = $true, valueFromPipeline = $true)] $Describe, [string] $CommandUsed = 'Describe' ) process { if (-not ( $pester.Show | Has-Flag Describe)) { return } $margin = $ReportStrings.Margin * $pester.IndentLevel $Text = if ($Describe.PSObject.Properties['Name'] -and $Describe.Name) { $ReportStrings.$CommandUsed -f $Describe.Name } else { $ReportStrings.$CommandUsed -f $Describe } & $SafeCommands['Write-Host'] & $SafeCommands['Write-Host'] "${margin}${Text}" -ForegroundColor $ReportTheme.Describe if ($Describe.PSObject.Properties['Description'] -and $Describe.Description) { $Describe.Description -split "$([System.Environment]::NewLine)" | ForEach-Object { & $SafeCommands['Write-Host'] ($ReportStrings.Margin * ($pester.IndentLevel + 1)) $_ -ForegroundColor $ReportTheme.DescribeDetail } } } } function Write-Context { param ( [Parameter(mandatory = $true, valueFromPipeline = $true)] $Context ) process { if (-not ( $pester.Show | Has-Flag Context)) { return } $Text = if ($Context.PSObject.Properties['Name'] -and $Context.Name) { $ReportStrings.Context -f $Context.Name } else { $ReportStrings.Context -f $Context } & $SafeCommands['Write-Host'] & $SafeCommands['Write-Host'] ($ReportStrings.Margin + $Text) -ForegroundColor $ReportTheme.Context if ($Context.PSObject.Properties['Description'] -and $Context.Description) { $Context.Description -split "$([System.Environment]::NewLine)" | ForEach-Object { & $SafeCommands['Write-Host'] (" " * $ReportStrings.Context.Length) $_ -ForegroundColor $ReportTheme.ContextDetail } } } } function ConvertTo-PesterResult { param( [String] $Name, [Nullable[TimeSpan]] $Time, [System.Management.Automation.ErrorRecord] $ErrorRecord ) $testResult = @{ Name = $Name Time = $time FailureMessage = "" StackTrace = "" ErrorRecord = $null Success = $false Result = "Failed" } if (-not $ErrorRecord) { $testResult.Result = "Passed" $testResult.Success = $true return $testResult } if (@('PesterAssertionFailed', 'PesterTestSkipped', 'PesterTestInconclusive', 'PesterTestPending') -contains $ErrorRecord.FullyQualifiedErrorID) { $details = $ErrorRecord.TargetObject $failureMessage = $details.Message $file = $details.File $line = $details.Line $Text = $details.LineText if (-not $Pester.Strict) { switch ($ErrorRecord.FullyQualifiedErrorID) { PesterTestInconclusive { $testResult.Result = "Inconclusive"; break; } PesterTestPending { $testResult.Result = "Pending"; break; } PesterTestSkipped { $testResult.Result = "Skipped"; break; } } } } else { $failureMessage = $ErrorRecord.ToString() $file = $ErrorRecord.InvocationInfo.ScriptName $line = $ErrorRecord.InvocationInfo.ScriptLineNumber $Text = $ErrorRecord.InvocationInfo.Line } $testResult.FailureMessage = $failureMessage $testResult.StackTrace = "at <ScriptBlock>, ${file}: line ${line}$([System.Environment]::NewLine)${line}: ${Text}" $testResult.ErrorRecord = $ErrorRecord return $testResult } function Remove-Comments ($Text) { $text -replace "(?s)()" -replace "\ } function Write-PesterResult { param ( [Parameter(mandatory = $true, valueFromPipeline = $true)] $TestResult ) process { $quiet = $pester.Show -eq [Pester.OutputTypes]::None $OutputType = [Pester.OutputTypes] $TestResult.Result $writeToScreen = $pester.Show | Has-Flag $OutputType $skipOutput = $quiet -or (-not $writeToScreen) if ($skipOutput) { return } $margin = $ReportStrings.Margin * ($pester.IndentLevel + 1) $error_margin = $margin + $ReportStrings.Margin $output = $TestResult.Name $humanTime = Get-HumanTime $TestResult.Time.TotalSeconds if (-not ($OutputType | Has-Flag 'Default, Summary')) { switch ($TestResult.Result) { Passed { & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Pass "$margin[+] $output" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.PassTime " $humanTime" break } Failed { & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Fail "$margin[-] $output" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.FailTime " $humanTime" if ($pester.IncludeVSCodeMarker) { & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Fail $($TestResult.StackTrace -replace '(?m)^', $error_margin) & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Fail $($TestResult.FailureMessage -replace '(?m)^', $error_margin) } else { $TestResult.ErrorRecord | ConvertTo-FailureLines | ForEach-Object {$_.Message + $_.Trace} | ForEach-Object { & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Fail $($_ -replace '(?m)^', $error_margin) } } break } Skipped { $targetObject = if ($null -ne $testresult.ErrorRecord -and ($o = $testresult.ErrorRecord.PSObject.Properties.Item("TargetObject"))) { $o.Value } $because = if ($targetObject -and $targetObject.Data.Because) { ", because $($testresult.ErrorRecord.TargetObject.Data.Because)" } else { $null } & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Skipped "$margin[!] $output" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Skipped ", is skipped$because" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.SkippedTime " $humanTime" break } Pending { $because = if ($testresult.ErrorRecord.TargetObject.Data.Because) { ", because $($testresult.ErrorRecord.TargetObject.Data.Because)" } else { $null } & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Pending "$margin[?] $output" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Pending ", is pending$because" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.PendingTime " $humanTime" break } Inconclusive { $because = if ($testresult.ErrorRecord.TargetObject.Data.Because) { ", because $($testresult.ErrorRecord.TargetObject.Data.Because)" } else { $null } & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Inconclusive "$margin[?] $output" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Inconclusive ", is inconclusive$because" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.InconclusiveTime " $humanTime" break } default { if ($null -eq $TestResult.Time) { & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Incomplete "$margin[?] $output" -NoNewLine & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.IncompleteTime " $humanTime" } } } } } } function Write-PesterReport { param ( [Parameter(mandatory = $true, valueFromPipeline = $true)] $PesterState ) if (-not ($PesterState.Show | Has-Flag Summary)) { return } & $SafeCommands['Write-Host'] ($ReportStrings.Timing -f (Get-HumanTime $PesterState.Time.TotalSeconds)) -Foreground $ReportTheme.Foreground $Success, $Failure = if ($PesterState.FailedCount -gt 0) { $ReportTheme.Foreground, $ReportTheme.Fail } else { $ReportTheme.Pass, $ReportTheme.Information } $Skipped = if ($PesterState.SkippedCount -gt 0) { $ReportTheme.Skipped } else { $ReportTheme.Information } $Pending = if ($PesterState.PendingCount -gt 0) { $ReportTheme.Pending } else { $ReportTheme.Information } $Inconclusive = if ($PesterState.InconclusiveCount -gt 0) { $ReportTheme.Inconclusive } else { $ReportTheme.Information } Try { $PesterStatePassedScenariosCount = $PesterState.PassedScenarios.Count } Catch { $PesterStatePassedScenariosCount = 0 } Try { $PesterStateFailedScenariosCount = $PesterState.FailedScenarios.Count } Catch { $PesterStateFailedScenariosCount = 0 } if ($ReportStrings.ContextsPassed) { & $SafeCommands['Write-Host'] ($ReportStrings.ContextsPassed -f $PesterStatePassedScenariosCount) -Foreground $Success -NoNewLine & $SafeCommands['Write-Host'] ($ReportStrings.ContextsFailed -f $PesterStateFailedScenariosCount) -Foreground $Failure } if ($ReportStrings.TestsPassed) { & $SafeCommands['Write-Host'] ($ReportStrings.TestsPassed -f $PesterState.PassedCount) -Foreground $Success -NoNewLine & $SafeCommands['Write-Host'] ($ReportStrings.TestsFailed -f $PesterState.FailedCount) -Foreground $Failure -NoNewLine & $SafeCommands['Write-Host'] ($ReportStrings.TestsSkipped -f $PesterState.SkippedCount) -Foreground $Skipped -NoNewLine & $SafeCommands['Write-Host'] ($ReportStrings.TestsPending -f $PesterState.PendingCount) -Foreground $Pending -NoNewLine & $SafeCommands['Write-Host'] ($ReportStrings.TestsInconclusive -f $PesterState.InconclusiveCount) -Foreground $Inconclusive } } function Write-CoverageReport { param ([object] $CoverageReport) if ($null -eq $CoverageReport -or ($pester.Show -eq [Pester.OutputTypes]::None) -or $CoverageReport.NumberOfCommandsAnalyzed -eq 0) { return } $totalCommandCount = $CoverageReport.NumberOfCommandsAnalyzed $fileCount = $CoverageReport.NumberOfFilesAnalyzed $executedPercent = ($CoverageReport.NumberOfCommandsExecuted / $CoverageReport.NumberOfCommandsAnalyzed).ToString("P2") $command = if ($totalCommandCount -gt 1) { $ReportStrings.CommandPlural } else { $ReportStrings.CommandSingular } $file = if ($fileCount -gt 1) { $ReportStrings.FilePlural } else { $ReportStrings.FileSingular } $commonParent = Get-CommonParentPath -Path $CoverageReport.AnalyzedFiles $report = $CoverageReport.MissedCommands | & $SafeCommands['Select-Object'] -Property @( @{ Name = 'File'; Expression = { Get-RelativePath -Path $_.File -RelativeTo $commonParent } } 'Class' 'Function' 'Line' 'Command' ) & $SafeCommands['Write-Host'] & $SafeCommands['Write-Host'] $ReportStrings.CoverageTitle -Foreground $ReportTheme.Coverage if ($CoverageReport.MissedCommands.Count -gt 0) { & $SafeCommands['Write-Host'] ($ReportStrings.CoverageMessage -f $command, $file, $executedPercent, $totalCommandCount, $fileCount) -Foreground $ReportTheme.CoverageWarn if ($CoverageReport.MissedCommands.Count -eq 1) { & $SafeCommands['Write-Host'] $ReportStrings.MissedSingular -Foreground $ReportTheme.CoverageWarn } else { & $SafeCommands['Write-Host'] $ReportStrings.MissedPlural -Foreground $ReportTheme.CoverageWarn } $report | & $SafeCommands['Format-Table'] -AutoSize | & $SafeCommands['Out-Host'] } else { & $SafeCommands['Write-Host'] ($ReportStrings.CoverageMessage -f $command, $file, $executedPercent, $totalCommandCount, $fileCount) -Foreground $ReportTheme.Coverage } } function ConvertTo-FailureLines { param ( [Parameter(mandatory = $true, valueFromPipeline = $true)] $ErrorRecord ) process { $lines = & $script:SafeCommands['New-Object'] psobject -Property @{ Message = @() Trace = @() } $exception = $ErrorRecord.Exception $exceptionLines = @() while ($exception) { $exceptionName = $exception.GetType().Name $thisLines = $exception.Message.Split([string[]]($([System.Environment]::NewLine), "\n", "`n"), [System.StringSplitOptions]::RemoveEmptyEntries) if ($ErrorRecord.FullyQualifiedErrorId -ne 'PesterAssertionFailed' -and $thisLines.Length -gt 0) { $thisLines[0] = "$exceptionName`: $($thisLines[0])" } [array]::Reverse($thisLines) $exceptionLines += $thisLines $exception = $exception.InnerException } [array]::Reverse($exceptionLines) $lines.Message += $exceptionLines if ($ErrorRecord.FullyQualifiedErrorId -eq 'PesterAssertionFailed') { $lines.Message += "$($ErrorRecord.TargetObject.Line)`: $($ErrorRecord.TargetObject.LineText)".Split([string[]]($([System.Environment]::NewLine), "\n", "`n"), [System.StringSplitOptions]::RemoveEmptyEntries) } if ( -not ($ErrorRecord | & $SafeCommands['Get-Member'] -Name ScriptStackTrace) ) { if ($ErrorRecord.FullyQualifiedErrorID -eq 'PesterAssertionFailed') { $lines.Trace += "at line: $($ErrorRecord.TargetObject.Line) in $($ErrorRecord.TargetObject.File)" } else { $lines.Trace += "at line: $($ErrorRecord.InvocationInfo.ScriptLineNumber) in $($ErrorRecord.InvocationInfo.ScriptName)" } return $lines } if ($null -ne $ErrorRecord.ScriptStackTrace) { $traceLines = $ErrorRecord.ScriptStackTrace.Split([Environment]::NewLine, [System.StringSplitOptions]::RemoveEmptyEntries) } $count = 0 If ((GetPesterOS) -ne 'Windows') { [String]$pattern1 = '^at (Invoke-Test|Context|Describe|InModuleScope|Invoke-Pester), .*/Functions/.*.ps1: line [0-9]*$' [String]$pattern2 = '^at Should<End>, .*/Functions/Assertions/Should.ps1: line [0-9]*$' [String]$pattern3 = '^at Assert-MockCalled, .*/Functions/Mock.ps1: line [0-9]*$' [String]$pattern4 = '^at Invoke-Assertion, .*/Functions/.*.ps1: line [0-9]*$' [String]$pattern5 = '^at (<ScriptBlock>|Invoke-Gherkin.*), (<No file>|.*/Functions/.*.ps1): line [0-9]*$' [String]$pattern6 = '^at Invoke-LegacyAssertion, .*/Functions/.*.ps1: line [0-9]*$' } Else { [String]$pattern1 = '^at (Invoke-Test|Context|Describe|InModuleScope|Invoke-Pester), .*\\Functions\\.*.ps1: line [0-9]*$' [String]$pattern2 = '^at Should<End>, .*\\Functions\\Assertions\\Should.ps1: line [0-9]*$' [String]$pattern3 = '^at Assert-MockCalled, .*\\Functions\\Mock.ps1: line [0-9]*$' [String]$pattern4 = '^at Invoke-Assertion, .*\\Functions\\.*.ps1: line [0-9]*$' [String]$pattern5 = '^at (<ScriptBlock>|Invoke-Gherkin.*), (<No file>|.*\\Functions\\.*.ps1): line [0-9]*$' [String]$pattern6 = '^at Invoke-LegacyAssertion, .*\\Functions\\.*.ps1: line [0-9]*$' } foreach ( $line in $traceLines ) { if ( $line -match $pattern1 ) { break } $count ++ } if ($ExecutionContext.SessionState.PSVariable.GetValue("PesterDebugPreference_ShowFullErrors")) { $lines.Trace += $traceLines } else { $lines.Trace += $traceLines | & $SafeCommands['Select-Object'] -First $count | & $SafeCommands['Where-Object'] { $_ -notmatch $pattern2 -and $_ -notmatch $pattern3 -and $_ -notmatch $pattern4 -and $_ -notmatch $pattern5 -and $_ -notmatch $pattern6 } } return $lines } }
combined_dataset/train/non-malicious/sample_62_94.ps1
sample_62_94.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for DeliveryRuleCacheKeyQueryStringAction. .Description Create an in-memory object for DeliveryRuleCacheKeyQueryStringAction. .Outputs Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCacheKeyQueryStringAction .Link https://learn.microsoft.com/powershell/module/Az.Cdn/new-AzCdnDeliveryRuleCacheKeyQueryStringActionObject #> function New-AzCdnDeliveryRuleCacheKeyQueryStringActionObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCacheKeyQueryStringAction')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="query parameters to include or exclude (comma separated).")] [string] $ParameterQueryParameter, [Parameter(Mandatory, HelpMessage="Caching behavior for the requests.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.QueryStringBehavior])] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.QueryStringBehavior] $ParameterQueryStringBehavior, [Parameter(Mandatory, HelpMessage="The name of the action for the delivery rule.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.DeliveryRuleAction])] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.DeliveryRuleAction] $Name ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCacheKeyQueryStringAction]::New() if ($PSBoundParameters.ContainsKey('ParameterQueryParameter')) { $Object.ParameterQueryParameter = $ParameterQueryParameter } if ($PSBoundParameters.ContainsKey('ParameterQueryStringBehavior')) { $Object.ParameterQueryStringBehavior = $ParameterQueryStringBehavior } if ($PSBoundParameters.ContainsKey('Name')) { $Object.Name = $Name } return $Object } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC/R8I6M3dQPSOg # 8OfNJh9LTx99DQLY3JHVBn72wAgWGKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOkdaULv8rkJ2DRxdCF33JjE # ihXAyGkY56M9J/C4xlVrMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjJ8zFCY6TSm8hkMKVWnHg6SW/BdQlojqkE6YxNPQmUxGYyJ4OuBnHAf+ # umdh5HRAGCWI/TYfhgWg8idSftWYsiOy5ezPYfqYRI0b4NX2XxAQjWNEjoCjQRzK # CJqjmq87RhvBRMraqfPUq8MsVOHFBoNOVqX3lJbEgkdfeQiCsCH8LWmNfZq1Hj8X # CadC1UvayCDtuk30bBHILJeGZvmY+b9x5eMEfFTxFIubHTIJMFKw771k9ZuvzyaO # KjjsFdDfE7BMHUn4vVxwayIVFBa6FeHPdkwQkG7OdqdA87n0eWH4xBIvc+A46K9p # OUcpUy/HKKfrwj4qvgFTzYfPcyNm8KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBTnjO2yP9wxb852TR85DPEfkoDwrcUEmgdbYwhBmbs+gIGZpVmIq5r # GBMyMDI0MDczMTA3MDA0MC44MDRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6lRSnDAiGA8yMDI0MDczMTA2MDUx # NloYDzIwMjQwODAxMDYwNTE2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqVFKc # AgEAMAcCAQACAhsiMAcCAQACAhMpMAoCBQDqVaQcAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAISUYp2vurxlmPwkl60i2DmUL5ofOma2vK9P6cJ7k5l/GBP2 # XdornkIGqTVjMdMlYazQ0T3cIQluzLpo7gSNmp88N0C99b5m6kujxQKFo1tst00k # IW4RvLTBzuHMNbdQCYm9Ulk+heVkp7h00vPbnMnSmH+4pcUhwnYfbKEPaJSAH5gZ # yY+mnglUmVe3nVl9Z9HNkXJ+KasHo9BHAtzRbgDA2FOW27OqwYSBj4ASQ1DFfk6i # Ti6iRwCxmXydSrLXhpWmbj8CGbG4OCmj+sz9OvIh8U+GFFnELAceVpuogedERdaS # LTWC3FXRb9fepjn3EIjMBeuYN6XJXbL6LYGe0JMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCBXy3VJsnrHpH0Dy9jlJTSaQFYDrgz1OQCtHzbJU3DmLTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh8 # 41sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQge7E1WqK8LnDQEKLDrvqG2GOEagMd # g17sshQXjVbsfvcwDQYJKoZIhvcNAQELBQAEggIAu4CUrrvKWP0nkqEnWdOPlcPH # vxkGX2Mj27KJhCVV5Q0hnDZcfWPbn16xpkrWc+PxrkyRdOgO6vGcfW4Qi4bUQQ4R # LV/8XKxAbItDtKeQqWyapLjpZx+zYDkaEZMr8t7MHQzzfvskNuYLSQAM0qjRCOlW # mbdfcgKsSSuf1spepyTOt49NiTDr4XACFiVbXeeU5cDL+fUYyj4dr4AYfzVGPQt7 # UT4PfYHGKvk/nI0IHso0OVwOakqaGQh2hjIYtKBwNQGqrPx+yFpdmdkFJRudZlK8 # cpqNxagO4qALTS94Tr4DFg59wFI1Dynzq9BbnMov/PwNCK2s6BPOa4PnoJebkv35 # fNgPrFPbBhT2UKWY1yGe3u2rQ4SM9F12iKSM1yDQqujRZfiRCUB8Niou10K4fyD2 # m01W3dtt7Wy/bdPwozxrHFw/L1+r4jH4ZFX5wTYGTzHdpqhViAjnBlaXd9llDZFv # 9/y3gAdZhqnN2COcF0sgh5E3A7oCaY5VDFO2u/tOn2QaSGF+3vJ7DZByewylFppe # 0V+DWxH0/PVJx6RBR32XNuP7TwGb4auQzqfbgk4K08r9OKVP3pY8L1qoog85+NmD # G7HnFwlGp6wFpKTkRhs3u8YgUDepPtgf/Soj+ZS3hWMJD7t4cAZNGcMB9BSzcb8l # BkDS22dvC4EzfT1DkJs= # SIG # End signature block
combined_dataset/train/non-malicious/874.ps1
874.ps1
function add-pythonfiles { $ErrorActionPreference = "Stop" $sub = Get-AzSubscription -ErrorAction SilentlyContinue if(-not($sub)) { Connect-AzAccount } $pathToStreamingFile = ".\hiveudf.py" $clusterName = Read-Host -Prompt "Enter the HDInsight cluster name" $clusterInfo = Get-AzHDInsightCluster -ClusterName $clusterName $resourceGroup = $clusterInfo.ResourceGroup $storageAccountName=$clusterInfo.DefaultStorageAccount.split('.')[0] $container=$clusterInfo.DefaultStorageContainer $storageAccountKey=(Get-AzStorageAccountKey ` -ResourceGroupName $resourceGroup ` -Name $storageAccountName)[0].Value $context = New-AzStorageContext ` -StorageAccountName $storageAccountName ` -StorageAccountKey $storageAccountKey Set-AzStorageBlobContent ` -File $pathToStreamingFile ` -Blob "hiveudf.py" ` -Container $container ` -Context $context } function start-hivejob { $ErrorActionPreference = "Stop" $sub = Get-AzSubscription -ErrorAction SilentlyContinue if(-not($sub)) { Connect-AzAccount } $clusterName = Read-Host -Prompt "Enter the HDInsight cluster name" $creds=Get-Credential -UserName "admin" -Message "Enter the login for the cluster" $HiveQuery = "add file wasbs:///hiveudf.py;" + "SELECT TRANSFORM (clientid, devicemake, devicemodel) " + "USING 'python hiveudf.py' AS " + "(clientid string, phoneLabel string, phoneHash string) " + "FROM hivesampletable " + "ORDER BY clientid LIMIT 50;" $jobDefinition = New-AzHDInsightHiveJobDefinition ` -Query $HiveQuery $activity="Hive query" Write-Progress -Activity $activity -Status "Starting query..." $job = Start-AzHDInsightJob ` -ClusterName $clusterName ` -JobDefinition $jobDefinition ` -HttpCredential $creds Write-Progress -Activity $activity -Status "Waiting on query to complete..." Wait-AzHDInsightJob ` -JobId $job.JobId ` -ClusterName $clusterName ` -HttpCredential $creds Write-Progress -Activity $activity -Status "Retrieving output..." Get-AzHDInsightJobOutput ` -Clustername $clusterName ` -JobId $job.JobId ` -HttpCredential $creds } function start-pigjob { $ErrorActionPreference = "Stop" $sub = Get-AzSubscription -ErrorAction SilentlyContinue if(-not($sub)) { Connect-AzAccount } $clusterName = Read-Host -Prompt "Enter the HDInsight cluster name" $creds=Get-Credential -UserName "admin" -Message "Enter the login for the cluster" $PigQuery = "Register wasbs:///pigudf.py using jython as myfuncs;" + "LOGS = LOAD 'wasbs:///example/data/sample.log' as (LINE:chararray);" + "LOG = FILTER LOGS by LINE is not null;" + "DETAILS = foreach LOG generate myfuncs.create_structure(LINE);" + "DUMP DETAILS;" $jobDefinition = New-AzHDInsightPigJobDefinition -Query $PigQuery $activity="Pig job" Write-Progress -Activity $activity -Status "Starting job..." $job = Start-AzHDInsightJob ` -ClusterName $clusterName ` -JobDefinition $jobDefinition ` -HttpCredential $creds Write-Progress -Activity $activity -Status "Waiting for the Pig job to complete..." Wait-AzHDInsightJob ` -Job $job.JobId ` -ClusterName $clusterName ` -HttpCredential $creds Write-Progress -Activity $activity "Retrieving output..." Get-AzHDInsightJobOutput ` -Clustername $clusterName ` -JobId $job.JobId ` -HttpCredential $creds } function fix-lineending($original_file) { $text = [IO.File]::ReadAllText($original_file) -replace "`r`n", "`n" [IO.File]::WriteAllText($original_file, $text) }
combined_dataset/train/non-malicious/2486.ps1
2486.ps1
Read-Host -AsSecureString | ConvertFrom-SecureString | Out-File encrypted_password.txt $vpn_profile = 'Profile name' $username = 'username' $enc_password = (gc .\encrypted_password.txt | ConvertTo-SecureString) $credentials = new-object -typename System.Management.Automation.PSCredential -argumentlist $username,$enc_password $password = $credentials.GetNetworkCredential().Password Set-Location 'C:\Program Files (x86)\Cisco Systems\VPN Client' .\vpnclient.exe connect $vpn_profile user $username pwd $password
combined_dataset/train/non-malicious/sample_62_69.ps1
sample_62_69.ps1
# # Module manifest for module 'OCI.PSModules.Cloudmigrations' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudmigrations.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b42be880-f45d-4128-a505-71c63f0f1b48' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudmigrations Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudmigrations.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCICloudmigrationsMigrationPlan', 'Get-OCICloudmigrationsAvailableShapesList', 'Get-OCICloudmigrationsMigration', 'Get-OCICloudmigrationsMigrationAsset', 'Get-OCICloudmigrationsMigrationAssetsList', 'Get-OCICloudmigrationsMigrationPlan', 'Get-OCICloudmigrationsMigrationPlansList', 'Get-OCICloudmigrationsMigrationsList', 'Get-OCICloudmigrationsReplicationProgress', 'Get-OCICloudmigrationsReplicationSchedule', 'Get-OCICloudmigrationsReplicationSchedulesList', 'Get-OCICloudmigrationsTargetAsset', 'Get-OCICloudmigrationsTargetAssetsList', 'Get-OCICloudmigrationsWorkRequest', 'Get-OCICloudmigrationsWorkRequestErrorsList', 'Get-OCICloudmigrationsWorkRequestLogsList', 'Get-OCICloudmigrationsWorkRequestsList', 'Import-OCICloudmigrationsMigrationPlan', 'Invoke-OCICloudmigrationsExecuteMigrationPlan', 'Invoke-OCICloudmigrationsRefreshMigration', 'Invoke-OCICloudmigrationsRefreshMigrationAsset', 'Invoke-OCICloudmigrationsRefreshMigrationPlan', 'Move-OCICloudmigrationsMigrationCompartment', 'Move-OCICloudmigrationsMigrationPlanCompartment', 'Move-OCICloudmigrationsReplicationScheduleCompartment', 'New-OCICloudmigrationsMigration', 'New-OCICloudmigrationsMigrationAsset', 'New-OCICloudmigrationsMigrationPlan', 'New-OCICloudmigrationsReplicationSchedule', 'New-OCICloudmigrationsTargetAsset', 'Remove-OCICloudmigrationsMigration', 'Remove-OCICloudmigrationsMigrationAsset', 'Remove-OCICloudmigrationsMigrationPlan', 'Remove-OCICloudmigrationsReplicationSchedule', 'Remove-OCICloudmigrationsTargetAsset', 'Start-OCICloudmigrationsAssetReplication', 'Start-OCICloudmigrationsMigrationReplication', 'Stop-OCICloudmigrationsWorkRequest', 'Update-OCICloudmigrationsMigration', 'Update-OCICloudmigrationsMigrationAsset', 'Update-OCICloudmigrationsMigrationPlan', 'Update-OCICloudmigrationsReplicationSchedule', 'Update-OCICloudmigrationsTargetAsset' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudmigrations' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-FSMORoleOwner.ps1
Get-FSMORoleOwner.ps1
Function Get-FSMORoleOwner { <# .SYNOPSIS Retrieves the list of FSMO role owners of a forest and domain .DESCRIPTION Retrieves the list of FSMO role owners of a forest and domain .NOTES Name: Get-FSMORoleOwner Author: Boe Prox DateCreated: 06/9/2011 .EXAMPLE Get-FSMORoleOwner DomainNamingMaster : dc1.rivendell.com Domain : rivendell.com RIDOwner : dc1.rivendell.com Forest : rivendell.com InfrastructureOwner : dc1.rivendell.com SchemaMaster : dc1.rivendell.com PDCOwner : dc1.rivendell.com Description ----------- Retrieves the FSMO role owners each domain in a forest. Also lists the domain and forest. #> [cmdletbinding()] Try { $forest = [system.directoryservices.activedirectory.Forest]::GetCurrentForest() ForEach ($domain in $forest.domains) { $forestproperties = @{ Forest = $Forest.name Domain = $domain.name SchemaMaster = $forest.SchemaRoleOwner DomainNamingMaster = $forest.NamingRoleOwner RIDOwner = $Domain.RidRoleOwner PDCOwner = $Domain.PdcRoleOwner InfrastructureOwner = $Domain.InfrastructureRoleOwner } $newobject = New-Object PSObject -Property $forestproperties $newobject.PSTypeNames.Insert(0,"ForestRoles") $newobject } } Catch { Write-Warning "$($Error)" } }
combined_dataset/train/non-malicious/2156.ps1
2156.ps1
[CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [string] $Path = $PSScriptRoot ) Set-StrictMode -Version Latest $ErrorActionPreference = 'Stop' function Test-Elevated { [CmdletBinding()] [OutputType([bool])] Param() return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544") } $IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows if (-not $IsWindowsOs) { throw 'This script must be run on Windows.' } if (-not (Test-Elevated)) { throw 'This script must be run from an elevated process.' } if ([System.Management.Automation.Platform]::IsNanoServer) { throw 'Group policy definitions are not supported on Nano Server.' } $admxName = 'PowerShellCoreExecutionPolicy.admx' $admlName = 'PowerShellCoreExecutionPolicy.adml' $admx = Get-Item -Path (Join-Path -Path $Path -ChildPath $admxName) $adml = Get-Item -Path (Join-Path -Path $Path -ChildPath $admlName) $admxTargetPath = Join-Path -Path $env:WINDIR -ChildPath "PolicyDefinitions" $admlTargetPath = Join-Path -Path $admxTargetPath -ChildPath "en-US" $files = @($admx, $adml) foreach ($file in $files) { if (-not (Test-Path -Path $file)) { throw "Could not find $($file.Name) at $Path" } } Write-Verbose "Copying $admx to $admxTargetPath" Copy-Item -Path $admx -Destination $admxTargetPath -Force $admxTargetFullPath = Join-Path -Path $admxTargetPath -ChildPath $admxName if (Test-Path -Path $admxTargetFullPath) { Write-Verbose "$admxName was installed successfully" } else { Write-Error "Could not install $admxName" } Write-Verbose "Copying $adml to $admlTargetPath" Copy-Item -Path $adml -Destination $admlTargetPath -Force $admlTargetFullPath = Join-Path -Path $admlTargetPath -ChildPath $admlName if (Test-Path -Path $admlTargetFullPath) { Write-Verbose "$admlName was installed successfully" } else { Write-Error "Could not install $admlName" }
combined_dataset/train/non-malicious/3959.ps1
3959.ps1
function Test-LocalNetworkGatewayCRUD { $rgname = Get-ResourceGroupName $rname = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/localNetworkGateways" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } $job = New-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname -location $location -AddressPrefix 192.168.0.0/16 -GatewayIpAddress 192.168.3.4 -AsJob $job | Wait-Job $actual = $job | Receive-Job $expected = Get-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual "192.168.3.4" $expected.GatewayIpAddress Assert-AreEqual "192.168.0.0/16" $expected.LocalNetworkAddressSpace.AddressPrefixes[0] $expected.Location = $location $list = Get-AzLocalNetworkGateway -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $list[0].ResourceGroupName $actual.ResourceGroupName Assert-AreEqual $list[0].Name $actual.Name Assert-AreEqual $list[0].Location $actual.Location Assert-AreEqual "192.168.3.4" $list[0].GatewayIpAddress $job = Set-AzLocalNetworkGateway -LocalNetworkGateway $expected -AddressPrefix "200.168.0.0/16" -AsJob $job | Wait-Job $actual = $job | Receive-Job $expected = Get-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname Assert-AreEqual "200.168.0.0/16" $expected.LocalNetworkAddressSpace.AddressPrefixes[0] $asn = 1234 $bgpPeeringAddress = "1.2.3.4" $peerWeight = 15 $actual = Set-AzLocalNetworkGateway -LocalNetworkGateway $expected -Asn $asn -BgpPeeringAddress $bgpPeeringAddress -PeerWeight $peerWeight $expected = Get-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname Assert-AreEqual $asn $expected.BgpSettings.Asn Assert-AreEqual $bgpPeeringAddress $expected.BgpSettings.BgpPeeringAddress Assert-AreEqual $peerWeight $expected.BgpSettings.PeerWeight $list = Get-AzLocalNetworkGateway -ResourceGroupName "*" -Name "*" Assert-True { $list.Count -ge 0 } $list = Get-AzLocalNetworkGateway -ResourceGroupName "*" Assert-True { $list.Count -ge 0 } $asn = 1337 $actual = Set-AzLocalNetworkGateway -LocalNetworkGateway $expected -Asn $asn $expected = Get-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname Assert-AreEqual $asn $expected.BgpSettings.Asn Assert-ThrowsContains { Set-AzLocalNetworkGateway -LocalNetworkGateway $expected -PeerWeight -1 } "PeerWeight cannot be negative" $job = Remove-AzLocalNetworkGateway -ResourceGroupName $actual.ResourceGroupName -name $rname -PassThru -Force -AsJob $job | Wait-Job $delete = $job | Receive-Job Assert-AreEqual true $delete $list = Get-AzLocalNetworkGateway -ResourceGroupName $actual.ResourceGroupName Assert-AreEqual 0 @($list).Count Assert-ThrowsContains { Set-AzLocalNetworkGateway -LocalNetworkGateway $actual } "not found" Assert-Throws { New-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname -location $location -PeerWeight -1 } "PeerWeight cannot be negative" Assert-ThrowsContains { New-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname -location $location -Asn 64 } "ASN and BgpPeeringAddress must both be specified" Assert-ThrowsContains { New-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname -location $location -BgpPeeringAddress "1.2.3.4" } "ASN and BgpPeeringAddress must both be specified" } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/sample_48_54.ps1
sample_48_54.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\rollup@4.9.6\node_modules\rollup\dist\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\rollup@4.9.6\node_modules\rollup\dist\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\rollup@4.9.6\node_modules\rollup\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\rollup@4.9.6\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/rollup@4.9.6/node_modules/rollup/dist/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/rollup@4.9.6/node_modules/rollup/dist/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/rollup@4.9.6/node_modules/rollup/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/rollup@4.9.6/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../rollup/dist/bin/rollup" $args } else { & "$basedir/node$exe" "$basedir/../rollup/dist/bin/rollup" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../rollup/dist/bin/rollup" $args } else { & "node$exe" "$basedir/../rollup/dist/bin/rollup" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/Start-Timer.ps1
Start-Timer.ps1
## Start-Timer.ps1 ## A kitchen timer script with visible countdown and customizable audio alert and messages #################################################################################################### param( $seconds=0, $reason="The Timer", $SoundFile="$env:SystemRoot\\Media\\notify.wav", $minutes=0, $hours=0, $timeout=0, [switch]$novoice, [string[]]$status="Cooking","Burning" ) $start = [DateTime]::Now write-progress -activity $reason -status "Running" $seconds = [Math]::Abs($seconds) + [Math]::Abs($minutes*60) + [Math]::Abs($hours*60*60) $end = $start.AddSeconds( $seconds ) ## Take care of as much overhead as we can BEFORE we start counting ## So the sounds can play as cloase to the end as possible $Voice = new-object -com SAPI.SpVoice $Sound = new-Object System.Media.SoundPlayer if(Test-Path $soundFile) { $Sound.SoundLocation=$SoundFile } else { $soundFile = $Null } ## The actual timing loop ... do { $remain = ($end - [DateTime]::Now).TotalSeconds $percent = [Math]::Min(100, ((($seconds - $remain)/$seconds) * 100)) $sec = [Math]::Max(000, $remain) write-progress -activity $reason -status $status[0] -percent $percent -seconds $sec start-sleep -milli 100 } while( $remain -gt 0 ) ## And a loop for beeping $Host.UI.RawUI.FlushInputBuffer() do { if($SoundFile) { $Sound.PlaySync() } else { [System.Media.SystemSounds]::Exclamation.Play() } if(!$novoice -and !$Host.UI.RawUI.KeyAvailable){ $null = $Voice.Speak( "$reason is $($status[1])!!", 0 ) } write-progress -activity $reason -status $status[1] -percent ([Math]::Min(100,((($seconds - $remain)/$seconds) * 100))) -seconds ([Math]::Max(0,$remain)) $remain = ($end - [DateTime]::Now).TotalSeconds } while( !$Host.UI.RawUI.KeyAvailable -and ($timeout -eq 0 -or $remain -gt -$timeout)) if($SoundFile) { $Sound.Stop() }
combined_dataset/train/non-malicious/3248.ps1
3248.ps1
class PluginManager : BaseLogger { [hashtable]$Plugins = @{} [hashtable]$Commands = @{} hidden [string]$_PoshBotModuleDir [RoleManager]$RoleManager [StorageProvider]$_Storage PluginManager([RoleManager]$RoleManager, [StorageProvider]$Storage, [Logger]$Logger, [string]$PoshBotModuleDir) { $this.RoleManager = $RoleManager $this._Storage = $Storage $this.Logger = $Logger $this._PoshBotModuleDir = $PoshBotModuleDir $this.Initialize() } [void]Initialize() { $this.LogInfo('Initializing') $this.LoadState() $this.LoadBuiltinPlugins() } [void]LoadState() { $this.LogVerbose('Loading plugin state from storage') $pluginsToLoad = $this._Storage.GetConfig('plugins') if ($pluginsToLoad) { foreach ($pluginKey in $pluginsToLoad.Keys) { $pluginToLoad = $pluginsToLoad[$pluginKey] $pluginVersions = $pluginToLoad.Keys foreach ($pluginVersionKey in $pluginVersions) { $pv = $pluginToLoad[$pluginVersionKey] $manifestPath = $pv.ManifestPath $adhocPermissions = $pv.AdhocPermissions $this.CreatePluginFromModuleManifest($pluginKey, $manifestPath, $true, $false) if ($newPlugin = $this.Plugins[$pluginKey]) { foreach ($version in $newPlugin.Keys) { $npv = $newPlugin[$version] foreach($permission in $adhocPermissions) { if ($p = $this.RoleManager.GetPermission($permission)) { $npv.AddPermission($p) } } $commandPermissions = $pv.CommandPermissions foreach ($commandName in $commandPermissions.Keys ) { $permissions = $commandPermissions[$commandName] foreach ($permission in $permissions) { if ($p = $this.RoleManager.GetPermission($permission)) { $npv.AddPermission($p) } } } } } } } } } [void]SaveState() { $this.LogVerbose('Saving loaded plugin state to storage') $pluginsToSave = @{} foreach($pluginKey in $this.Plugins.Keys | Where-Object {$_ -ne 'Builtin'}) { $versions = @{} foreach ($versionKey in $this.Plugins[$pluginKey].Keys) { $pv = $this.Plugins[$pluginKey][$versionKey] $versions.Add($versionKey, $pv.ToHash()) } $pluginsToSave.Add($pluginKey, $versions) } $this._Storage.SaveConfig('plugins', $pluginsToSave) } [void]InstallPlugin([string]$ManifestPath, [bool]$SaveAfterInstall = $false) { if (Test-Path -Path $ManifestPath) { $moduleName = (Get-Item -Path $ManifestPath).BaseName $this.CreatePluginFromModuleManifest($moduleName, $ManifestPath, $true, $SaveAfterInstall) } else { $msg = "Module manifest path [$manifestPath] not found" $this.LogInfo([LogSeverity]::Warning, $msg) } } [void]AddPlugin([Plugin]$Plugin, [bool]$SaveAfterInstall = $false) { if (-not $this.Plugins.ContainsKey($Plugin.Name)) { $this.LogInfo("Attaching plugin [$($Plugin.Name)]") $pluginVersion = @{ ($Plugin.Version).ToString() = $Plugin } $this.Plugins.Add($Plugin.Name, $pluginVersion) foreach ($permission in $Plugin.Permissions.GetEnumerator()) { $this.LogVerbose("Adding permission [$($permission.Value.ToString())] to Role Manager") $this.RoleManager.AddPermission($permission.Value) } } else { if (-not $this.Plugins[$Plugin.Name].ContainsKey($Plugin.Version)) { $this.LogInfo("Attaching version [$($Plugin.Version)] of plugin [$($Plugin.Name)]") $this.Plugins[$Plugin.Name].Add($Plugin.Version.ToString(), $Plugin) foreach ($permission in $Plugin.Permissions.GetEnumerator()) { $this.LogVerbose("Adding permission [$($permission.Value.ToString())] to Role Manager") $this.RoleManager.AddPermission($permission.Value) } } else { $msg = "Plugin [$($Plugin.Name)] version [$($Plugin.Version)] is already loaded" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginException]::New($msg) } } $this.LoadCommands() if ($SaveAfterInstall) { $this.SaveState() } } [void]RemovePlugin([Plugin]$Plugin) { if ($this.Plugins.ContainsKey($Plugin.Name)) { $pluginVersions = $this.Plugins[$Plugin.Name] if ($pluginVersions.Keys.Count -eq 1) { foreach ($permission in $Plugin.Permissions.GetEnumerator()) { $this.LogVerbose("Removing permission [$($Permission.Value.ToString())]. No longer in use") $this.RoleManager.RemovePermission($Permission.Value) } $this.LogInfo("Removing plugin [$($Plugin.Name)]") $this.Plugins.Remove($Plugin.Name) $moduleSpec = @{ ModuleName = $Plugin.Name ModuleVersion = $pluginVersions } Remove-Module -FullyQualifiedName $moduleSpec -Verbose:$false -Force } else { if ($pluginVersions.ContainsKey($Plugin.Version)) { $this.LogInfo("Removing plugin [$($Plugin.Name)] version [$($Plugin.Version)]") $pluginVersions.Remove($Plugin.Version) $moduleSpec = @{ ModuleName = $Plugin.Name ModuleVersion = $Plugin.Version } Remove-Module -FullyQualifiedName $moduleSpec -Verbose:$false -Force } else { $msg = "Plugin [$($Plugin.Name)] version [$($Plugin.Version)] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New($msg) } } } $this.LoadCommands() $this.SaveState() } [void]RemovePlugin([string]$PluginName, [string]$Version) { if ($p = $this.Plugins[$PluginName]) { if ($pv = $p[$Version]) { if ($p.Keys.Count -eq 1) { foreach ($permission in $pv.Permissions.GetEnumerator()) { $this.LogVerbose("Removing permission [$($Permission.Value.ToString())]. No longer in use") $this.RoleManager.RemovePermission($Permission.Value) } $this.LogInfo("Removing plugin [$($pv.Name)]") $this.Plugins.Remove($pv.Name) } else { $this.LogInfo("Removing plugin [$($pv.Name)] version [$Version]") $p.Remove($pv.Version.ToString()) } $unloadModuleParams = @{ FullyQualifiedName = @{ ModuleName = $PluginName ModuleVersion = $Version } Verbose = $false Force = $true } $this.LogDebug("Unloading module [$PluginName] version [$Version]") Remove-Module @unloadModuleParams } else { $msg = "Plugin [$PluginName] version [$Version] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New($msg) } } else { $msg = "Plugin [$PluginName] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New() } $this.LoadCommands() $this.SaveState() } [void]ActivatePlugin([string]$PluginName, [string]$Version) { if ($p = $this.Plugins[$PluginName]) { if ($pv = $p[$Version]) { $this.LogInfo("Activating plugin [$PluginName] version [$Version]") $pv.Activate() $this.LoadCommands() $this.SaveState() } else { $msg = "Plugin [$PluginName] version [$Version] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New($msg) } } else { $msg = "Plugin [$PluginName] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New() } } [void]ActivatePlugin([Plugin]$Plugin) { $p = $this.Plugins[$Plugin.Name] if ($p) { if ($pv = $p[$Plugin.Version.ToString()]) { $this.LogInfo("Activating plugin [$($Plugin.Name)] version [$($Plugin.Version)]") $pv.Activate() } } else { $msg = "Plugin [$($Plugin.Name)] version [$($Plugin.Version)] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New($msg) } $this.LoadCommands() $this.SaveState() } [void]DeactivatePlugin([Plugin]$Plugin) { $p = $this.Plugins[$Plugin.Name] if ($p) { if ($pv = $p[$Plugin.Version.ToString()]) { $this.LogInfo("Deactivating plugin [$($Plugin.Name)] version [$($Plugin.Version)]") $pv.Deactivate() } } else { $msg = "Plugin [$($Plugin.Name)] version [$($Plugin.Version)] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New($msg) } $this.LoadCommands() $this.SaveState() } [void]DeactivatePlugin([string]$PluginName, [string]$Version) { if ($p = $this.Plugins[$PluginName]) { if ($pv = $p[$Version]) { $this.LogInfo("Deactivating plugin [$PluginName)] version [$Version]") $pv.Deactivate() $this.LoadCommands() $this.SaveState() } else { $msg = "Plugin [$PluginName] version [$Version] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New($msg) } } else { $msg = "Plugin [$PluginName] is not loaded in bot" $this.LogInfo([LogSeverity]::Warning, $msg) throw [PluginNotFoundException]::New($msg) } } [PluginCommand]MatchCommand([ParsedCommand]$ParsedCommand, [bool]$CommandSearch = $true) { $builtinKey = $this.Plugins['Builtin'].Keys | Select-Object -First 1 $builtinPlugin = $this.Plugins['Builtin'][$builtinKey] foreach ($commandKey in $builtinPlugin.Commands.Keys) { $command = $builtinPlugin.Commands[$commandKey] if ($command.TriggerMatch($ParsedCommand, $CommandSearch)) { $this.LogInfo("Matched parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to builtin command [Builtin:$commandKey]") return [PluginCommand]::new($builtinPlugin, $command) } } if (($ParsedCommand.Plugin -ne [string]::Empty) -and ($ParsedCommand.Command -ne [string]::Empty)) { $plugin = $this.Plugins[$ParsedCommand.Plugin] if ($plugin) { if ($ParsedCommand.Version) { $pluginVersion = $plugin[$ParsedCommand.Version] } else { $latestVersionKey = $plugin.Keys | Sort-Object -Descending | Select-Object -First 1 $pluginVersion = $plugin[$latestVersionKey] } if ($pluginVersion) { foreach ($commandKey in $pluginVersion.Commands.Keys) { $command = $pluginVersion.Commands[$commandKey] if ($command.TriggerMatch($ParsedCommand, $CommandSearch)) { $this.LogInfo("Matched parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to plugin command [$($plugin.Name)`:$commandKey]") return [PluginCommand]::new($pluginVersion, $command) } } } $this.LogInfo([LogSeverity]::Warning, "Unable to match parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to a command in plugin [$($plugin.Name)]") } else { $this.LogInfo([LogSeverity]::Warning, "Unable to match parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to a plugin command") return $null } } else { foreach ($pluginKey in $this.Plugins.Keys) { $plugin = $this.Plugins[$pluginKey] $pluginVersion = $null if ($ParsedCommand.Version) { $pluginVersion = $plugin[$ParsedCommand.Version] foreach ($commandKey in $pluginVersion.Commands.Keys) { $command = $pluginVersion.Commands[$commandKey] if ($command.TriggerMatch($ParsedCommand, $CommandSearch)) { $this.LogInfo("Matched parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to plugin command [$pluginKey`:$commandKey]") return [PluginCommand]::new($pluginVersion, $command) } } } else { foreach ($pluginVersionKey in $plugin.Keys | Sort-Object -Descending | Select-Object -First 1) { $pluginVersion = $plugin[$pluginVersionKey] foreach ($commandKey in $pluginVersion.Commands.Keys) { $command = $pluginVersion.Commands[$commandKey] if ($command.TriggerMatch($ParsedCommand, $CommandSearch)) { $this.LogInfo("Matched parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to plugin command [$pluginKey`:$commandKey]") return [PluginCommand]::new($pluginVersion, $command) } } } } } } $this.LogInfo([LogSeverity]::Warning, "Unable to match parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to a plugin command") return $null } [void]LoadCommands() { $allCommands = New-Object System.Collections.ArrayList foreach ($pluginKey in $this.Plugins.Keys) { $plugin = $this.Plugins[$pluginKey] foreach ($pluginVersionKey in $plugin.Keys | Sort-Object -Descending | Select-Object -First 1) { $pluginVersion = $plugin[$pluginVersionKey] if ($pluginVersion.Enabled) { foreach ($commandKey in $pluginVersion.Commands.Keys) { $command = $pluginVersion.Commands[$commandKey] $fullyQualifiedCommandName = "$pluginKey`:$CommandKey`:$pluginVersionKey" $allCommands.Add($fullyQualifiedCommandName) if (-not $this.Commands.ContainsKey($fullyQualifiedCommandName)) { $this.LogVerbose("Loading command [$fullyQualifiedCommandName]") $this.Commands.Add($fullyQualifiedCommandName, $command) } } } } } $remove = New-Object System.Collections.ArrayList foreach($c in $this.Commands.Keys) { if (-not $allCommands.Contains($c)) { $remove.Add($c) } } $remove | ForEach-Object { $this.LogVerbose("Removing command [$_]. Plugin has either been removed or is deactivated.") $this.Commands.Remove($_) } } [void]CreatePluginFromModuleManifest([string]$ModuleName, [string]$ManifestPath, [bool]$AsJob = $true, [bool]$SaveAfterCreation = $false) { $manifest = Import-PowerShellDataFile -Path $ManifestPath -ErrorAction SilentlyContinue if ($manifest) { $this.LogInfo("Creating new plugin [$ModuleName]") $plugin = [Plugin]::new($this.Logger) $plugin.Name = $ModuleName $plugin._ManifestPath = $ManifestPath if ($manifest.ModuleVersion) { $plugin.Version = $manifest.ModuleVersion } else { $plugin.Version = '0.0.0' } $pluginConfig = $this.GetPluginConfig($plugin.Name, $plugin.Version) $this.GetPermissionsFromModuleManifest($manifest) | ForEach-Object { $_.Plugin = $plugin.Name $plugin.AddPermission($_) } if ($pluginConfig -and $pluginConfig.AdhocPermissions.Count -gt 0) { foreach ($permissionName in $pluginConfig.AdhocPermissions) { if ($p = $this.RoleManager.GetPermission($permissionName)) { $this.LogDebug("Adding adhoc permission [$permissionName] to plugin [$($plugin.Name)]") $plugin.AddPermission($p) } else { $this.LogInfo([LogSeverity]::Warning, "Adhoc permission [$permissionName] not found in Role Manager. Can't attach permission to plugin [$($plugin.Name)]") } } } $this.AddPlugin($plugin, $SaveAfterCreation) Import-Module -Name $ManifestPath -Scope Local -Verbose:$false -WarningAction SilentlyContinue -Force $moduleCommands = Microsoft.PowerShell.Core\Get-Command -Module $ModuleName -CommandType @('Cmdlet', 'Function') -Verbose:$false foreach ($command in $moduleCommands) { if ($command.CommandType -eq 'Function') { $metadata = $this.GetCommandMetadata($command) } else { $metadata = $null } $this.LogVerbose("Creating command [$($command.Name)] for new plugin [$($plugin.Name)]") $cmd = [Command]::new() $cmd.Name = $command.Name $cmd.ModuleQualifiedCommand = "$ModuleName\$($command.Name)" $cmd.ManifestPath = $ManifestPath $cmd.Logger = $this.Logger $cmd.AsJob = $AsJob if ($command.CommandType -eq 'Function') { $cmd.FunctionInfo = $command } elseIf ($command.CommandType -eq 'Cmdlet') { $cmd.CmdletInfo = $command } $triggers = @() if ($metadata) { if ($metadata.CommandName) { $cmd.Name = $metadata.CommandName } if ($metadata.Aliases) { $metadata.Aliases | Foreach-Object { $cmd.Aliases += $_ $triggers += [Trigger]::new([TriggerType]::Command, $_) } } if ($metadata.Permissions) { foreach ($item in $metadata.Permissions) { $fqPermission = "$($plugin.Name):$($item)" if ($p = $plugin.GetPermission($fqPermission)) { $cmd.AddPermission($p) } else { $this.LogInfo([LogSeverity]::Warning, "Permission [$fqPermission] is not defined in the plugin module manifest. Command will not be added to plugin.") continue } } } if ($pluginConfig) { foreach ($permissionName in $pluginConfig.AdhocPermissions) { if ($p = $this.RoleManager.GetPermission($permissionName)) { $this.LogDebug("Adding adhoc permission [$permissionName] to command [$($plugin.Name):$($cmd.name)]") $cmd.AddPermission($p) } else { $this.LogInfo([LogSeverity]::Warning, "Adhoc permission [$permissionName] not found in Role Manager. Can't attach permission to command [$($plugin.Name):$($cmd.name)]") } } } $cmd.KeepHistory = $metadata.KeepHistory $cmd.HideFromHelp = $metadata.HideFromHelp if ($metadata.TriggerType) { switch ($metadata.TriggerType) { 'Command' { $cmd.TriggerType = [TriggerType]::Command $cmd.Triggers += [Trigger]::new([TriggerType]::Command, $cmd.Name) if ($metadata.Aliases) { $metadata.Aliases | Foreach-Object { $cmd.Aliases += $_ $triggers += [Trigger]::new([TriggerType]::Command, $_) } } } 'Event' { $cmd.TriggerType = [TriggerType]::Event $t = [Trigger]::new([TriggerType]::Event, $command.Name) if ($metadata.MessageType) { $t.MessageType = $metadata.MessageType } if ($metadata.MessageSubtype) { $t.MessageSubtype = $metadata.MessageSubtype } $triggers += $t } 'Regex' { $cmd.TriggerType = [TriggerType]::Regex $t = [Trigger]::new([TriggerType]::Regex, $command.Name) $t.Trigger = $metadata.Regex $triggers += $t } } } else { $triggers += [Trigger]::new([TriggerType]::Command, $cmd.Name) } } else { $cmd.Name = $command.Name $triggers += [Trigger]::new([TriggerType]::Command, $cmd.Name) } $cmdHelp = Get-Help -Name $cmd.ModuleQualifiedCommand -ErrorAction SilentlyContinue if ($cmdHelp) { $cmd.Description = $cmdHelp.Synopsis.Trim() } if ($cmd.TriggerType -eq [TriggerType]::Command) { if ($cmdHelp) { $helpSyntax = ($cmdHelp.syntax | Out-String).Trim() -split "`n" | Where-Object {$_ -ne "`r"} $helpSyntax = $helpSyntax -replace '\[\<CommonParameters\>\]', '' $helpSyntax = $helpSyntax -replace '-Bot \<Object\> ', '' $helpSyntax = $helpSyntax -replace '\[-Bot\] \<Object\> ', '[' $helpSyntax = foreach ($item in $helpSyntax) { $item -replace $command.Name, $cmd.Name } $cmd.Usage = $helpSyntax.ToLower().Trim() } else { $this.LogInfo([LogSeverity]::Warning, "Unable to parse help for command [$($command.Name)]") $cmd.Usage = 'ERROR: Unable to parse command help' } } elseIf ($cmd.TriggerType -eq [TriggerType]::Regex) { $cmd.Usage = @($triggers | Select-Object -Expand Trigger) -join "`n" } $cmd.Triggers += $triggers $plugin.AddCommand($cmd) } if ($pluginConfig -and (-not $pluginConfig.Enabled)) { $plugin.Deactivate() } $this.LoadCommands() if ($SaveAfterCreation) { $this.SaveState() } } else { $msg = "Unable to load module manifest [$ManifestPath]" $this.LogInfo([LogSeverity]::Error, $msg) Write-Error -Message $msg } } [PoshBot.BotCommand]GetCommandMetadata([System.Management.Automation.FunctionInfo]$Command) { $attrs = $Command.ScriptBlock.Attributes $botCmdAttr = $attrs | ForEach-Object { if ($_.GetType().ToString() -eq 'PoshBot.BotCommand') { $_ } } if ($botCmdAttr) { $this.LogDebug("Command [$($Command.Name)] has metadata defined") } else { $this.LogDebug("No metadata defined for command [$($Command.Name)]") } return $botCmdAttr } [Permission[]]GetPermissionsFromModuleManifest($Manifest) { $permissions = New-Object System.Collections.ArrayList foreach ($permission in $Manifest.PrivateData.Permissions) { if ($permission -is [string]) { $p = [Permission]::new($Permission) $permissions.Add($p) } elseIf ($permission -is [hashtable]) { $p = [Permission]::new($permission.Name) if ($permission.Description) { $p.Description = $permission.Description } $permissions.Add($p) } } if ($permissions.Count -gt 0) { $this.LogDebug("Permissions defined in module manifest", $permissions) } else { $this.LogDebug('No permissions defined in module manifest') } return $permissions } [void]LoadBuiltinPlugins() { $this.LogInfo('Loading builtin plugins') $builtinPlugin = Get-Item -Path "$($this._PoshBotModuleDir)/Plugins/Builtin" $moduleName = $builtinPlugin.BaseName $manifestPath = Join-Path -Path $builtinPlugin.FullName -ChildPath "$moduleName.psd1" $this.CreatePluginFromModuleManifest($moduleName, $manifestPath, $false, $false) } [hashtable]GetPluginConfig([string]$PluginName, [string]$Version) { if ($pluginConfig = $this._Storage.GetConfig('plugins')) { if ($thisPluginConfig = $pluginConfig[$PluginName]) { if (-not [string]::IsNullOrEmpty($Version)) { if ($thisPluginConfig.ContainsKey($Version)) { $pluginVersion = $Version } else { $this.LogDebug([LogSeverity]::Warning, "Plugin [$PluginName`:$Version] not defined in plugins.psd1") return $null } } else { $pluginVersion = @($thisPluginConfig.Keys | Sort-Object -Descending)[0] } $pv = $thisPluginConfig[$pluginVersion] return $pv } else { $this.LogDebug([LogSeverity]::Warning, "Plugin [$PluginName] not defined in plugins.psd1") return $null } } else { $this.LogDebug([LogSeverity]::Warning, "No plugin configuration defined in storage") return $null } } }
combined_dataset/train/non-malicious/New-Zip_3.ps1
New-Zip_3.ps1
Function New-Zip { <# .SYNOPSIS Create a Zip File from any files piped in. .DESCRIPTION Requires that you have the SharpZipLib installed, which is available from http://www.icsharpcode.net/OpenSource/SharpZipLib/ .NOTES File Name : PowerZip.psm1 Author : Christophe CREMON (uxone) - http://powershell.codeplex.com Requires : PowerShell V2 .PARAMETER Source Set the name of the source to zip (file or directory) .PARAMETER ZipFile Set the name of the zip file to create .PARAMETER Recurse Browse the source recursively .PARAMETER Include Include only items you specify .PARAMETER Exclude Exclude items you specify .PARAMETER AbsolutePaths Preserve the absolute path name of each item in the zip container .PARAMETER DeleteAfterZip Delete source items after successful zip .EXAMPLE New-Zip -Source C:\\Temp -ZipFile C:\\Archive\\Scripts.zip -Include *.ps1 -DeleteAfterZip Copies all PS1 files from the C:\\Temp directory to C:\\Archive\\Scripts.zip and delete them after successful ZIP #> param ( [ValidateNotNullOrEmpty()] [Parameter( Mandatory = $true) ] [string] $Source, [Parameter( Mandatory = $true) ] [string] $ZipFile, [switch] $Recurse, [array] $Include, [array] $Exclude, [switch] $AbsolutePaths, [switch] $DeleteAfterZip ) $LoadAssembly = [System.Reflection.Assembly]::LoadWithPartialName("ICSharpCode.SharpZipLib") if ( -not $LoadAssembly ) { throw "! Assembly not found {ICSharpCode.SharpZipLib}" } $RootPath = ( Resolve-Path -Path $Source -ErrorAction SilentlyContinue ).Path if ( -not $RootPath ) { throw "! Source not found {$Source}" } if ( $ZipFile -notmatch "\\.zip$" ) { $ZipFile = $ZipFile -replace "$",".zip" } if ( $Recurse -eq $true ) { $RecurseArgument = "-Recurse" } if ( $AbsolutePaths -eq $true ) { $AbsolutePathsArgument = "-AbsolutePaths" } if ( $DeleteAfterZip -eq $true ) { $DeleteAfterZipArgument = "-DeleteAfterZip" } if ( $Include ) { $Include = $Include -join "," $IncludeArgument = "-Include $Include" $Source = $Source+"\\*" } if ( $Exclude ) { $Exclude = $Exclude -join "," $ExcludeArgument = "-Exclude $Exclude" } $GetCommand = "Get-ChildItem -Path '$Source' $RecurseArgument $IncludeArgument $ExcludeArgument -Force" $ItemsToZip = Invoke-Expression -Command $GetCommand $SizeBeforeZip = ( $ItemsToZip | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum $SizeBeforeZipInMB = $SizeBeforeZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) } if ( -not $SizeBeforeZip ) { Write-Output "NOTHING TO ZIP" break } $StartTime = Get-Date Write-Output "`n===================================`n=> Start Time : $($StartTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n" Write-Output "TOTAL SIZE BEFORE ZIP : {$SizeBeforeZipInMB MB}`n" Write-Output "Initializing ZIP File {$ZipFile} ...`n" $CreateZIPContainer = New-Item -ItemType File -Path $ZipFile -Force -ErrorAction SilentlyContinue if ( -not $CreateZIPContainer ) { throw "! Unable to create ZIP container {$ZipFile}" } $oZipOutputStream = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipOutputStream([System.IO.File]::Create($ZipFile)) [byte[]] $Buffer = New-Object Byte[] 4096 foreach ( $Item in $ItemsToZip ) { if ( $Item.FullName -ne $ZipFile ) { if ( Test-Path ( $Item.FullName ) -ErrorAction SilentlyContinue ) { $ZipEntry = $Item.FullName if ( -not $AbsolutePaths ) { $ReplacePath = [Regex]::Escape( $RootPath+"\\" ) $ZipEntry = $Item.FullName -replace $ReplacePath,"" } if ( $Item.psIsContainer -eq $true ) { if ( $Recurse -eq $true ) { Write-Output "Processing ZIP of Directory {$($Item.FullName)} ..." $OldErrorActionPreference = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" $oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry/") $oZipOutputStream.PutNextEntry($oZipEntry) if ( $? -ne $true ) { $ItemsNotZipped += @($Item.FullName) $ErrorsArray += @("! Unable to ZIP Directory {$($Item.FullName)}") } $ErrorActionPreference = $OldErrorActionPreference } } else { Write-Output "Processing ZIP of File {$($Item.FullName)} ..." $OldErrorActionPreference = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" $FileStream = [IO.File]::OpenRead($Item.FullName) $oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry") $oZipOutputStream.PutNextEntry($oZipEntry) [ICSharpCode.SharpZipLib.Core.StreamUtils]::Copy($FileStream,$oZipOutputStream,$Buffer) if ( $? -ne $true ) { $ItemsNotZipped += @($Item.FullName) $ErrorsArray += @("! Unable to ZIP File {$($Item.FullName)}") } $FileStream.Close() } } } } $oZipOutputStream.Finish() $oZipOutputStream.Close() if ( $? -eq $true ) { $ErrorActionPreference = $OldErrorActionPreference if ( $DeleteAfterZip ) { $ItemsToZip | Where-Object { $ItemsNotZipped -notcontains $_.FullName } | ForEach-Object { if ( $_.psIsContainer -ne $true ) { if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue ) { Write-Output "Processing Delete of File {$($_.FullName)} ..." $RemoveItem = Remove-Item -Path $_.FullName -Force -ErrorAction SilentlyContinue if ( $? -ne $true ) { $ErrorsArray += @("! Unable to Delete File {$($_.FullName)}") } } } } if ( $Recurse ) { $ItemsToZip | Where-Object { $ItemsNotZipped -notcontains ( Split-Path -Parent $_.FullName ) } | ForEach-Object { if ( $_.psIsContainer -eq $true ) { if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue ) { Write-Output "Processing Delete of Directory {$($_.FullName)} ..." $RemoveItem = Remove-Item -Path $_.FullName -Force -Recurse -ErrorAction SilentlyContinue if ( $? -ne $true ) { $ErrorsArray += @("! Unable to Delete Directory {$($_.FullName)}") } } } } } } Write-Output "`nZIP File Created {$ZipFile} ...`n" } else { $ErrorActionPreference = $OldErrorActionPreference $ErrorsArray += @("! ZIP Archive {$ZipFile} Creation Failed`n") } $EndTime = Get-Date $ExecutionTime = ($EndTime-$StartTime) Write-Output "`nExecution Time : $ExecutionTime`n" Write-Output "=> End Time : $($EndTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n=================================`n" if ( $ErrorsArray ) { Write-Output "`n[ ERRORS OCCURED ]" $ErrorsArray return $false } else { $SizeAfterZip = ( Get-Item -Path $ZipFile -Force -ErrorAction SilentlyContinue | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum $SizeAfterZipInMB = $SizeAfterZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) } Write-Output "`nTOTAL SIZE AFTER ZIP : {$SizeAfterZipInMB MB}`n" $Gain = ( $SizeBeforeZip - $SizeAfterZip ) $GainInMB = $Gain | ForEach-Object { "{0:N2}" -f ($_ / 1MB) } if ( $Gain -gt 0 ) { $GainInPercent = (($SizeBeforeZip - $SizeAfterZip) / $SizeBeforeZip) * 100 | ForEach-Object { "{0:N2}" -f $_ } Write-Output "GAIN : {$GainInMB MB} ($GainInPercent %)`n" } } } Export-ModuleMember -Function New-Zip
combined_dataset/train/non-malicious/sample_59_74.ps1
sample_59_74.ps1
@{ GUID="CA046F10-CA64-4740-8FF9-2565DBA61A4F" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-WinEvent", "New-WinEvent", "Get-Counter" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Commands.Diagnostics.dll" TypesToProcess="GetEvent.types.ps1xml" FormatsToProcess="Event.format.ps1xml", "Diagnostics.format.ps1xml" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDPn0/Kw53z57yO # 1TekDBJE1OmAf8RR94VaWe+Hq0qiG6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDg1qHtk+kS+nPK5UxxfdCkB # E2/pV7IDBT4ObGuanFTvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAciCqWpO091PCUBl8VcQfuJ7tcB3Z5xS0fsTyC9pakH9sEKWpkDMr/3vB # GYmU0HPSF0sGKjVu69hP36x4VfzB4ccGaz7Ofq+nP5kvcgWA89xdXB9u9pV219Pq # m/3KqeoI0sam56aXRbWxRS78o296XaGWzYTkj/il89e7m8CsM78VHOkLztqq8CH2 # WLZHwhMeqjP1+nBnVHW7vH7PTYsNzBjkoyTR1wTGjKl9nWH6Wdv1BvODOASd3l9S # 8veaeS8xO0RGMs+LUjg9sbB08R68x8cAfMAV48x/XInpoC/JyQ5Uaw+XmWCzfYSo # vdqWsneKpRLF4bDJ5RiPlg0IKhOooaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDcpWwqflvXyMz7JNlNApi3kTCwneX0LBlIbFRKzW9KNwIGZlddqYdx # GBMyMDI0MDYxMzAzMjAxNi44NjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoUT80wIhgPMjAyNDA2MTMwMDQ4MTNaGA8yMDI0MDYxNDAwNDgxM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6hRPzQIBADAHAgEAAgIDxTAHAgEAAgITQTAKAgUA # 6hWhTQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAIhI1mgXH10uv2l9GzMQ # OLg+7GWGDmVwOXPpQPD54KKIj7gNfvMz7zgUFwoZkHwwvuRjyvCSTx/0VQXPJHWQ # k6ojHfin1eNNu9n5Fk0no9MMRc/4jtmZohJtDY44yyJ1hvsJoOTopdgxAbCVMSrs # xlExm89ChUm9bmjZi1XgnQ2qMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgGgsdVNM/C/UfKuHQvFgfCNojVYZygRzUMzkUPrUh1BAwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEILx5R9MK3zyYbzuTcDmU0TTvF3fgg9/5CXdl+AeUFU6a # MA0GCSqGSIb3DQEBCwUABIICAAS+QcTxoD49AtS+CmEiw9nvJun67aDL6aNtY+LF # Ps40KFjj4HIX4n5u4jDWijS5A7+JDMJTHu3FMGzUHqAEuLKwtmqAzIXR7D2+YXlI # Okv/sIQbjBVdgzGaQyrgim0so+zGQf0awu7Uzt0ESBwJ92zW3s7ivPsyPNTEVRst # Wn2q51kkt5ymi1XG8vMTeHvOlYui9PkgitLEdb34AO+4nkU70AMx7OPKKOni0Vic # tmvWVd2DbHhtzycgVBgYPmIYoRz38pstz48l/Y2WwT79jplMhURNss2WPo5QnHgZ # JpV4sOqFirfGazer9lrD1FneGESwuXOZl3WveD79PBIozuyd2113YpkHB9xgAExf # Ep1zftg215KTcjzC0jnMI6IEXbupfhx73pVHNa7FgDAZQsTZux/Z6UHpBTJGCryf # kXK45yQHnXqZjzLtLLyGpyyWhC1aIT8NTaOE6uzcmCprgJ03VGbRaeuRlU+Lb98L # GjVAOLdpJDsVwhocpZw+OFnrgZWehSAUEos8vi6DMGBtDyakhiCKn5GSquAqOZYy # SohOVeyqeLL/c3lXpYaCxExBXQ+55CZBVF6u62ou7iAIgPkod2lcWXlciw0P966m # nt/mUIFblxZ9gQJNrUjZjrht/e7m9MJgeH4n0j6/LhPlbRY6O9d7M4fzvP1oVJRx # iyfc # SIG # End signature block
combined_dataset/train/non-malicious/78.ps1
78.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-IntuneBrand(){ [cmdletbinding()] $graphApiVersion = "Beta" $Resource = "deviceManagement/intuneBrand" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$($resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Export-JSONData(){ param ( $JSON, $ExportPath ) try { if($JSON -eq "" -or $JSON -eq $null){ write-host "No JSON specified, please specify valid JSON..." -f Red } elseif(!$ExportPath){ write-host "No export path parameter set, please provide a path to export the file" -f Red } elseif(!(Test-Path $ExportPath)){ write-host "$ExportPath doesn't exist, can't export JSON Data" -f Red } else { $JSON1 = ConvertTo-Json $JSON -Depth 5 $JSON_Convert = $JSON1 | ConvertFrom-Json $displayName = $JSON_Convert.displayName $DisplayName = $DisplayName -replace '\<|\>|:|"|/|\\|\||\?|\*', "_" $Properties = ($JSON_Convert | Get-Member | ? { $_.MemberType -eq "NoteProperty" }).Name $FileName_JSON = "$DisplayName" + "_" + $(get-date -f dd-MM-yyyy-H-mm-ss) + ".json" $Object = New-Object System.Object foreach($Property in $Properties){ $Object | Add-Member -MemberType NoteProperty -Name $Property -Value $JSON_Convert.$Property } write-host "Export Path:" "$ExportPath" $JSON1 | Set-Content -LiteralPath "$ExportPath\$FileName_JSON" write-host "JSON created in $ExportPath\$FileName_JSON..." -f cyan } } catch { $_.Exception } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $ExportPath = Read-Host -Prompt "Please specify a path to export Company Portal Branding data to e.g. C:\IntuneOutput" $ExportPath = $ExportPath.replace('"','') if(!(Test-Path "$ExportPath")){ Write-Host Write-Host "Path '$ExportPath' doesn't exist, do you want to create this directory? Y or N?" -ForegroundColor Yellow $Confirm = read-host if($Confirm -eq "y" -or $Confirm -eq "Y"){ new-item -ItemType Directory -Path "$ExportPath" | Out-Null Write-Host } else { Write-Host "Creation of directory path was cancelled..." -ForegroundColor Red Write-Host break } } Write-Host $IntuneBrand = Get-IntuneBrand if($IntuneBrand.displayName){ write-host "Exporting Company Portal Branding" -f Yellow Export-JSONData -JSON $IntuneBrand -ExportPath "$ExportPath" Write-Host } else { Write-Host "Company Portal Branding is set as default..." -ForegroundColor Red write-host "Company Name property is required at a minimum..." -ForegroundColor Red Write-Host }