full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_57_91.ps1
sample_57_91.ps1
# # Module manifest for module 'OCI.PSModules.Databasemanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Databasemanagement.dll' # Version number of this module. ModuleVersion = '83.3.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0faf82fb-82c6-40fe-bbd2-87626481a704' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Databasemanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabasemanagementDataFiles', 'Add-OCIDatabasemanagementManagedDatabaseToManagedDatabaseGroup', 'Add-OCIDatabasemanagementmTasks', 'Confirm-OCIDatabasemanagementBasicFilter', 'Disable-OCIDatabasemanagementAutomaticInitialPlanCapture', 'Disable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask', 'Disable-OCIDatabasemanagementExternalContainerDatabaseManagementFeature', 'Disable-OCIDatabasemanagementExternalDbSystemDatabaseManagement', 'Disable-OCIDatabasemanagementExternalDbSystemStackMonitoring', 'Disable-OCIDatabasemanagementExternalExadataInfrastructureManagement', 'Disable-OCIDatabasemanagementExternalNonContainerDatabaseManagementFeature', 'Disable-OCIDatabasemanagementExternalPluggableDatabaseManagementFeature', 'Disable-OCIDatabasemanagementFeature', 'Disable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask', 'Disable-OCIDatabasemanagementPluggableDatabaseManagementFeature', 'Disable-OCIDatabasemanagementSqlPlanBaselinesUsage', 'Edit-OCIDatabasemanagementFeature', 'Edit-OCIDatabasemanagementPluggableDatabaseManagementFeature', 'Edit-OCIDatabasemanagementSnapshotSettings', 'Enable-OCIDatabasemanagementAutomaticInitialPlanCapture', 'Enable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask', 'Enable-OCIDatabasemanagementExternalContainerDatabaseManagementFeature', 'Enable-OCIDatabasemanagementExternalDbSystemDatabaseManagement', 'Enable-OCIDatabasemanagementExternalDbSystemStackMonitoring', 'Enable-OCIDatabasemanagementExternalExadataInfrastructureManagement', 'Enable-OCIDatabasemanagementExternalNonContainerDatabaseManagementFeature', 'Enable-OCIDatabasemanagementExternalPluggableDatabaseManagementFeature', 'Enable-OCIDatabasemanagementFeature', 'Enable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask', 'Enable-OCIDatabasemanagementPluggableDatabaseManagementFeature', 'Enable-OCIDatabasemanagementSqlPlanBaselinesUsage', 'Get-OCIDatabasemanagementAlertLogsList', 'Get-OCIDatabasemanagementAsmPropertiesList', 'Get-OCIDatabasemanagementAssociatedDatabasesList', 'Get-OCIDatabasemanagementAttentionLogsList', 'Get-OCIDatabasemanagementAwrDbReport', 'Get-OCIDatabasemanagementAwrDbsList', 'Get-OCIDatabasemanagementAwrDbSnapshotsList', 'Get-OCIDatabasemanagementAwrDbSqlReport', 'Get-OCIDatabasemanagementClusterCacheMetric', 'Get-OCIDatabasemanagementConsumerGroupPrivilegesList', 'Get-OCIDatabasemanagementCursorCacheStatementsList', 'Get-OCIDatabasemanagementDataAccessContainersList', 'Get-OCIDatabasemanagementDatabaseFleetHealthMetrics', 'Get-OCIDatabasemanagementDatabaseHomeMetrics', 'Get-OCIDatabasemanagementDatabaseParametersList', 'Get-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Get-OCIDatabasemanagementDbManagementPrivateEndpointsList', 'Get-OCIDatabasemanagementExecutionPlanStatsComparision', 'Get-OCIDatabasemanagementExternalAsm', 'Get-OCIDatabasemanagementExternalAsmConfiguration', 'Get-OCIDatabasemanagementExternalAsmDiskGroupsList', 'Get-OCIDatabasemanagementExternalAsmInstance', 'Get-OCIDatabasemanagementExternalAsmInstancesList', 'Get-OCIDatabasemanagementExternalAsmsList', 'Get-OCIDatabasemanagementExternalAsmUsersList', 'Get-OCIDatabasemanagementExternalCluster', 'Get-OCIDatabasemanagementExternalClusterInstance', 'Get-OCIDatabasemanagementExternalClusterInstancesList', 'Get-OCIDatabasemanagementExternalClustersList', 'Get-OCIDatabasemanagementExternalDatabasesList', 'Get-OCIDatabasemanagementExternalDbHome', 'Get-OCIDatabasemanagementExternalDbHomesList', 'Get-OCIDatabasemanagementExternalDbNode', 'Get-OCIDatabasemanagementExternalDbNodesList', 'Get-OCIDatabasemanagementExternalDbSystem', 'Get-OCIDatabasemanagementExternalDbSystemConnector', 'Get-OCIDatabasemanagementExternalDbSystemConnectorsList', 'Get-OCIDatabasemanagementExternalDbSystemDiscoveriesList', 'Get-OCIDatabasemanagementExternalDbSystemDiscovery', 'Get-OCIDatabasemanagementExternalDbSystemsList', 'Get-OCIDatabasemanagementExternalExadataInfrastructure', 'Get-OCIDatabasemanagementExternalExadataInfrastructuresList', 'Get-OCIDatabasemanagementExternalExadataStorageConnector', 'Get-OCIDatabasemanagementExternalExadataStorageConnectorsList', 'Get-OCIDatabasemanagementExternalExadataStorageGrid', 'Get-OCIDatabasemanagementExternalExadataStorageServer', 'Get-OCIDatabasemanagementExternalExadataStorageServersList', 'Get-OCIDatabasemanagementExternalListener', 'Get-OCIDatabasemanagementExternalListenerServicesList', 'Get-OCIDatabasemanagementExternalListenersList', 'Get-OCIDatabasemanagementHeatWaveFleetMetric', 'Get-OCIDatabasemanagementIormPlan', 'Get-OCIDatabasemanagementJob', 'Get-OCIDatabasemanagementJobExecution', 'Get-OCIDatabasemanagementJobExecutionsList', 'Get-OCIDatabasemanagementJobRun', 'Get-OCIDatabasemanagementJobRunsList', 'Get-OCIDatabasemanagementJobsList', 'Get-OCIDatabasemanagementManagedDatabase', 'Get-OCIDatabasemanagementManagedDatabaseGroup', 'Get-OCIDatabasemanagementManagedDatabaseGroupsList', 'Get-OCIDatabasemanagementManagedDatabasesList', 'Get-OCIDatabasemanagementManagedMySqlDatabase', 'Get-OCIDatabasemanagementManagedMySqlDatabaseConfigurationDataList', 'Get-OCIDatabasemanagementManagedMySqlDatabasesList', 'Get-OCIDatabasemanagementManagedMySqlDatabaseSqlDataList', 'Get-OCIDatabasemanagementMySqlFleetMetric', 'Get-OCIDatabasemanagementNamedCredential', 'Get-OCIDatabasemanagementNamedCredentialsList', 'Get-OCIDatabasemanagementObjectPrivilegesList', 'Get-OCIDatabasemanagementOpenAlertHistory', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecution', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionScript', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionsList', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionAggregationsList', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperation', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperationsList', 'Get-OCIDatabasemanagementPdbMetrics', 'Get-OCIDatabasemanagementPreferredCredential', 'Get-OCIDatabasemanagementPreferredCredentialsList', 'Get-OCIDatabasemanagementProxiedForUsersList', 'Get-OCIDatabasemanagementProxyUsersList', 'Get-OCIDatabasemanagementRolesList', 'Get-OCIDatabasemanagementSqlExecutionPlan', 'Get-OCIDatabasemanagementSqlPlanBaseline', 'Get-OCIDatabasemanagementSqlPlanBaselineConfiguration', 'Get-OCIDatabasemanagementSqlPlanBaselineJobsList', 'Get-OCIDatabasemanagementSqlPlanBaselinesList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskFindingsList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskRecommendationsList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTasksList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskSummaryReport', 'Get-OCIDatabasemanagementSqlTuningSetsList', 'Get-OCIDatabasemanagementSystemPrivilegesList', 'Get-OCIDatabasemanagementTablespace', 'Get-OCIDatabasemanagementTablespacesList', 'Get-OCIDatabasemanagementTableStatisticsList', 'Get-OCIDatabasemanagementTopSqlCpuActivity', 'Get-OCIDatabasemanagementUser', 'Get-OCIDatabasemanagementUsersList', 'Get-OCIDatabasemanagementWorkRequest', 'Get-OCIDatabasemanagementWorkRequestErrorsList', 'Get-OCIDatabasemanagementWorkRequestLogsList', 'Get-OCIDatabasemanagementWorkRequestsList', 'Invoke-OCIDatabasemanagementCheckExternalDbSystemConnectorConnectionStatus', 'Invoke-OCIDatabasemanagementCheckExternalExadataStorageConnector', 'Invoke-OCIDatabasemanagementCloneSqlTuningTask', 'Invoke-OCIDatabasemanagementConfigureAutomaticCaptureFilters', 'Invoke-OCIDatabasemanagementConfigureAutomaticSpmEvolveAdvisorTask', 'Invoke-OCIDatabasemanagementDiscoverExternalExadataInfrastructure', 'Invoke-OCIDatabasemanagementDropSqlPlanBaselines', 'Invoke-OCIDatabasemanagementDropSqlsInSqlTuningSet', 'Invoke-OCIDatabasemanagementDropSqlTuningSet', 'Invoke-OCIDatabasemanagementDropSqlTuningTask', 'Invoke-OCIDatabasemanagementDropTablespace', 'Invoke-OCIDatabasemanagementFetchSqlTuningSet', 'Invoke-OCIDatabasemanagementImplementOptimizerStatisticsAdvisorRecommendations', 'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromAwr', 'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromCursorCache', 'Invoke-OCIDatabasemanagementLoadSqlTuningSet', 'Invoke-OCIDatabasemanagementPatchExternalDbSystemDiscovery', 'Invoke-OCIDatabasemanagementResizeDataFile', 'Invoke-OCIDatabasemanagementRunHistoricAddm', 'Invoke-OCIDatabasemanagementSaveSqlTuningSetAs', 'Invoke-OCIDatabasemanagementSummarizeAlertLogCounts', 'Invoke-OCIDatabasemanagementSummarizeAttentionLogCounts', 'Invoke-OCIDatabasemanagementSummarizeAwrDbCpuUsages', 'Invoke-OCIDatabasemanagementSummarizeAwrDbMetrics', 'Invoke-OCIDatabasemanagementSummarizeAwrDbParameterChanges', 'Invoke-OCIDatabasemanagementSummarizeAwrDbParameters', 'Invoke-OCIDatabasemanagementSummarizeAwrDbSnapshotRanges', 'Invoke-OCIDatabasemanagementSummarizeAwrDbSysstats', 'Invoke-OCIDatabasemanagementSummarizeAwrDbTopWaitEvents', 'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEventBuckets', 'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEvents', 'Invoke-OCIDatabasemanagementSummarizeExternalAsmMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalClusterMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalDbNodeMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalDbSystemAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalListenerMetrics', 'Invoke-OCIDatabasemanagementSummarizeJobExecutionsStatuses', 'Invoke-OCIDatabasemanagementSummarizeManagedDatabaseAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeManagedMySqlDatabaseAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselines', 'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselinesByLastExecution', 'Invoke-OCIDatabasemanagementTestNamedCredential', 'Invoke-OCIDatabasemanagementTestPreferredCredential', 'Move-OCIDatabasemanagementDatabaseParameters', 'Move-OCIDatabasemanagementDbManagementPrivateEndpointCompartment', 'Move-OCIDatabasemanagementExternalDbSystemCompartment', 'Move-OCIDatabasemanagementExternalExadataInfrastructureCompartment', 'Move-OCIDatabasemanagementJobCompartment', 'Move-OCIDatabasemanagementManagedDatabaseGroupCompartment', 'Move-OCIDatabasemanagementNamedCredentialCompartment', 'Move-OCIDatabasemanagementPlanRetention', 'Move-OCIDatabasemanagementSpaceBudget', 'Move-OCIDatabasemanagementSqlPlanBaselinesAttributes', 'New-OCIDatabasemanagementAwrSnapshot', 'New-OCIDatabasemanagementDbManagementPrivateEndpoint', 'New-OCIDatabasemanagementExternalDbSystem', 'New-OCIDatabasemanagementExternalDbSystemConnector', 'New-OCIDatabasemanagementExternalDbSystemDiscovery', 'New-OCIDatabasemanagementExternalExadataInfrastructure', 'New-OCIDatabasemanagementExternalExadataStorageConnector', 'New-OCIDatabasemanagementJob', 'New-OCIDatabasemanagementManagedDatabaseGroup', 'New-OCIDatabasemanagementNamedCredential', 'New-OCIDatabasemanagementSqlTuningSet', 'New-OCIDatabasemanagementTablespace', 'Remove-OCIDatabasemanagementDataFile', 'Remove-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Remove-OCIDatabasemanagementExternalDbSystem', 'Remove-OCIDatabasemanagementExternalDbSystemConnector', 'Remove-OCIDatabasemanagementExternalDbSystemDiscovery', 'Remove-OCIDatabasemanagementExternalExadataInfrastructure', 'Remove-OCIDatabasemanagementExternalExadataStorageConnector', 'Remove-OCIDatabasemanagementJob', 'Remove-OCIDatabasemanagementManagedDatabaseFromManagedDatabaseGroup', 'Remove-OCIDatabasemanagementManagedDatabaseGroup', 'Remove-OCIDatabasemanagementNamedCredential', 'Remove-OCIDatabasemanagementPreferredCredential', 'Reset-OCIDatabasemanagementDatabaseParameters', 'Start-OCIDatabasemanagementSqlTuningTask', 'Update-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Update-OCIDatabasemanagementExternalAsm', 'Update-OCIDatabasemanagementExternalAsmInstance', 'Update-OCIDatabasemanagementExternalCluster', 'Update-OCIDatabasemanagementExternalClusterInstance', 'Update-OCIDatabasemanagementExternalDbHome', 'Update-OCIDatabasemanagementExternalDbNode', 'Update-OCIDatabasemanagementExternalDbSystem', 'Update-OCIDatabasemanagementExternalDbSystemConnector', 'Update-OCIDatabasemanagementExternalDbSystemDiscovery', 'Update-OCIDatabasemanagementExternalExadataInfrastructure', 'Update-OCIDatabasemanagementExternalExadataStorageConnector', 'Update-OCIDatabasemanagementExternalExadataStorageGrid', 'Update-OCIDatabasemanagementExternalExadataStorageServer', 'Update-OCIDatabasemanagementExternalListener', 'Update-OCIDatabasemanagementJob', 'Update-OCIDatabasemanagementManagedDatabase', 'Update-OCIDatabasemanagementManagedDatabaseGroup', 'Update-OCIDatabasemanagementNamedCredential', 'Update-OCIDatabasemanagementPreferredCredential', 'Update-OCIDatabasemanagementTablespace' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4094.ps1
4094.ps1
cls Function AutoCAD2013English{ Set-Variable -Name GUID -Value "{5783F2D7-B001-0000-0102-0060B0CE6BBA}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "AutoCAD 2013 - English" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskRevitInteroperabilityfor3dsMaxand3dsMaxDesign201364-bit{ Set-Variable -Name GUID -Value "{06E18300-BB64-1664-8E6A-2593FC67BB74}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Revit Interoperability for 3ds Max and 3ds Max Design 2013 64-bit" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskShowcase201364-bit{ Set-Variable -Name GUID -Value "{A15BFC7D-6A90-47E6-8C6E-D51B2929D8C8}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Showcase 2013 64-bit" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskDirectConnect201364-bit{ Set-Variable -Name GUID -Value "{324297F8-2898-454B-9AC4-07050AEB35B3}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk DirectConnect 2013 64-bit" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskSketchBookDesigner2013{ Set-Variable -Name GUID -Value "{3CB60177-D3D2-4E9C-BE4D-8372B34B4C7F}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk SketchBook Designer 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskDesignReview201332-bit{ Set-Variable -Name GUID -Value "{153DB567-6FF3-49AD-AC4F-86F8A3CCFDFB}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Design Review 2013 *32-bit*" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskInventorFusion2013{ Set-Variable -Name GUID -Value "{FFF5619F-2013-0064-A85E-9994F70A9E5D}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Inventor Fusion 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskMaterialLibrary201332-bit{ Set-Variable -Name GUID -Value "{117EBEEB-5DB0-43C8-9FD6-DD583DB152DD}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Material Library 2013 *32-bit*" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskMaterialLibraryBaseResolutionImageLibrary2013{ Set-Variable -Name GUID -Value "{606E12B9-641F-4644-A22A-FF38AE980AFD}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Material Library Base Resolution Image Library 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskMaterialLibraryLowResolutionImageLibrary2013{ Set-Variable -Name GUID -Value "{27C6C0A2-2EC9-4FEA-BE2B-659EAAC2C68C}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Material Library Low Resolution Image Library 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskMaterialLibraryMediumResolutionImageLibrary2013{ Set-Variable -Name GUID -Value "{58760EEC-8B6A-43F4-81AA-696E381DFADD}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Material Library Medium Resolution Image Library 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskContentService{ Set-Variable -Name GUID -Value "{62F029AB-85F2-0000-866A-9FC0DD99DDBC}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Content Service" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskSync{ Set-Variable -Name GUID -Value "{EE5F74BC-5CD5-4EF2-86BA-81E6CF46A18F}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Sync" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskRevit2013{ Set-Variable -Name GUID -Value "{7346B4A0-1300-0510-0409-705C0D862004}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Revit 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutoCADArchitecture2013{ Set-Variable -Name GUID -Value "{5783F2D7-B004-0000-0102-0060B0CE6BBA}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "AutoCAD Architecture 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskNavisworksSimulate2013{ Set-Variable -Name GUID -Value "{F17E30E2-7ED4-0000-8A8E-CAB597E3F8ED}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Navisworks Simulate 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskWorkflowsBuildingDesignSuite2013{ Set-Variable -Name GUID -Value "{06388E0D-A364-478B-8E40-7D76142A8DF2}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Workflows - Building Design Suite 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskNavisworksSimulate20132008DWGFileReader{ Set-Variable -Name GUID -Value "{4F744A9A-3067-4605-8864-DA1658059F0B}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Navisworks Simulate 2013 - 2008 DWG File Reader" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskNavisworksSimulate20132009DWGFileReader{ Set-Variable -Name GUID -Value "{07DC9A9D-1793-4EB4-AC1A-70750F9FB72B}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Navisworks Simulate 2013 - 2009 DWG File Reader" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskNavisworksSimulate20132010DWGFileReader{ Set-Variable -Name GUID -Value "{0D53A298-B2B7-4746-BB92-B757A6E559C3}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Navisworks Simulate 2013 - 2010 DWG File Reader" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskNavisworksSimulate20132011DWGFileReader{ Set-Variable -Name GUID -Value "{107CB1E9-DDA9-40B5-8A6D-325361402200}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Navisworks Simulate 2013 - 2011 DWG File Reader" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function Revit2013LanguagePackEnglish{ Set-Variable -Name GUID -Value "{7346B4A0-1300-0511-0409-705C0D862004}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Revit 2013 Language Pack - English" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskNavisworksSimulate20132012DWGFileReader{ Set-Variable -Name GUID -Value "{90A2F9D3-3E5E-4EF4-BC83-E7795CEF1A42}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Navisworks Simulate 2013 - 2012 DWG File Reader" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskNavisworksSimulate20132013DWGFileReader{ Set-Variable -Name GUID -Value "{CBED6FC7-FB20-4920-AA80-3D6F3459F902}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Navisworks Simulate 2013 - 2013 DWG File Reader" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskNavisworksSimulate2013EnglishLanguagePack{ Set-Variable -Name GUID -Value "{F17E30E2-7ED4-0409-8A8E-CAB597E3F8ED}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Navisworks Simulate 2013 English Language Pack" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } Function AutodeskSimulationCFD2013{ Set-Variable -Name GUID -Value "{1C11BFF1-1FA3-4AA9-AA15-9AA2BB921F9E}" -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Write-Host "Autodesk Simulation CFD 2013" $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force } AutoCAD2013English AutodeskRevitInteroperabilityfor3dsMaxand3dsMaxDesign201364-bit AutodeskShowcase201364-bit AutodeskDirectConnect201364-bit AutodeskSketchBookDesigner2013 AutodeskDesignReview201332-bit AutodeskInventorFusion2013 AutodeskMaterialLibrary201332-bit AutodeskMaterialLibraryBaseResolutionImageLibrary2013 AutodeskMaterialLibraryLowResolutionImageLibrary2013 AutodeskMaterialLibraryMediumResolutionImageLibrary2013 AutodeskContentService AutodeskSync AutodeskRevit2013 AutoCADArchitecture2013 AutodeskNavisworksSimulate2013 AutodeskWorkflowsBuildingDesignSuite2013 AutodeskNavisworksSimulate20132008DWGFileReader AutodeskNavisworksSimulate20132009DWGFileReader AutodeskNavisworksSimulate20132010DWGFileReader AutodeskNavisworksSimulate20132011DWGFileReader Revit2013LanguagePackEnglish AutodeskNavisworksSimulate20132012DWGFileReader AutodeskNavisworksSimulate20132013DWGFileReader AutodeskNavisworksSimulate2013EnglishLanguagePack AutodeskSimulationCFD2013
combined_dataset/train/non-malicious/GPRS Online log_6.ps1
GPRS Online log_6.ps1
<# .SYNOPSIS Get-GprsTime (V4.0 Update for Windows 7 and allow time correction) Check the total connect time of any GPRS devices from a specified date. Use 'Get-Help .\\Get-GprsTime -full' to view Help for this script. .DESCRIPTION Display all the GPRS modem Event Log entries. While applications issued by the mobile phone manufacturers will invariably monitor only their own usage, this will show any logged GPRS activity, be it via PCMCIA, USB, mobile phone, etc. Use the -Verbose switch for some extra information if desired. A default value can be set with the -Monthly switch but can be temporarily overridden with any -Start value and deleted by entering an invalid date. Now uses .NET Parse to use any culture date input. Switches -M and -S cannot be used together. A Balloon prompt will be issued in the Notification area for the 5 days before the nominal month end. NOTE: this can effectively be suppressed by using a value higher than the SIM card term, ie something like -Account 90 for a 30 day card which will override the default setting. Define a function in $profile to set any permanent switches, for example to remove 1hour 15 minutes from the total each time. function GPRS { Invoke-Expression ".\\Get-GprsTime -Adjust 1:15:00- $args" } .EXAMPLE .\\Get-GprsTime.ps1 -Monthly 4/8/2011 This will set the default search date to start from 4/8/2011 and is used to reset the start date each month for the average 30/31 day SIM card. .EXAMPLE .\\Get-GprsTime.ps1 -Start 12/07/2009 -Account 100 -Verbose Search from 12/07/2011 and also show (Verbose) details for each session. The Account switch will override any balloon prompt near the SIM expiry date. .EXAMPLE .\\Get-GprsTime.ps1 5/9/2011 -v Search one day only and show session details. .EXAMPLE .\\Get-GprsTime.ps1 -Today Show all sessions for today. This always defaults to verbose output. .EXAMPLE .\\Get-GprsTime.ps1 -Debug This shows the first available Event Log record & confirms switch settings. (Note that it will probably not be the first 'RemoteAccess' or 'RasClient' record). .EXAMPLE .\\Get-GprsTime -Adjust 1:20:00 If the same SIM card is used on another computer then such times will have to be added here manually (this should be put in a function in $profile so that it will automatically be included - see example above). To remove an amount of time, just put a '-' sign after the desired figure. .NOTES A shorter total time than that actually used will result if the Event Log does not contain earlier dates; just increase the log size in such a case. The author can be contacted at www.SeaStarDevelopment.Bravehost.com and a (binary compiled) Module version of this procedure is included in the file Gprs3xxx.zip download there; the execution time of the module being about 10 times faster than this script. Use '(measure-Command {.\\Get-GprsTime}).TotalSeconds' to confirm the times. For the Event Log to record connect & disconnect events, the modem software should be set to RAS rather than NDIS if possible. #> Param ([String] $start, [alias("PERIOD")][string] $adjust, [String] $monthly, [Int] $account = 0, [Switch] $today, [Switch] $verbose, [Switch] $debug) Trap [System.Management.Automation.MethodInvocationException] { [Int]$line = $error[0].InvocationInfo.ScriptLineNumber [System.Media.SystemSounds]::Hand.Play() if ($line -eq 205) { Write-Warning "[$name] Current GPRS variable has been deleted." $monthly = "" [Environment]::SetEnvironmentVariable("GPRS",$monthly,"User") } else { Write-Warning "[$name] Date is missing or invalid $SCRIPT:form" } exit 1 } #Establish the Operating System...We only need to confirm XP here. #The result will be written to the 'out' variable '$osv'. function Get-OSVersion($computer,[ref]$osv) { $os = Get-WmiObject -class Win32_OperatingSystem -computerName $computer Switch -regex ($os.Version) { '^5\\.1\\.(\\d{1,4})$' { $osv.value = "xp" } #Find XP & variants. default { $osv.value = "unknown" } } } $osv = $null Get-OSVersion -computer 'localhost' -osv ([ref]$osv) if ($osv -eq 'xp') { $logname = 'System' $connEvent = 20158 $discEvent = 20159 $source = 'RemoteAccess' } else { #Treat As Vista or Windows 7. $logname = 'Application' $connEvent = 20225 $discEvent = 20226 $source = 'RasClient' } $entryType = 'Information' $logEntry = $null $oldest = Get-eventlog -LogName $logname | #Get the earliest Log record. Sort-Object TimeGenerated | Select-Object -first 1 if ($oldest.TimeGenerated) { $logEntry = "System Event records available from - $($oldest.TimeGenerated.ToLongDateString())" } $name = $myInvocation.MyCommand $newLine = "[$name] The switches -Start and -Monthly can only be used separately." if ($debug) { $DebugPreference = 'Continue' } if ($start -and $monthly) { [System.Media.SystemSounds]::Hand.Play() Write-Warning "$newLine" exit 1 } $SCRIPT:form = "" #In certain cases Culture & UICulture can be different and have been known to # return conflicting results regarding '-is [DateTime]' queries, etc. if ($Host.CurrentCulture -eq $Host.CurrentUICulture) { $SCRIPT:form = '-Use format mm/dd/year' [Int]$culture = "{0:%d}" -f [DateTime] "6/5/2009" #Returns local day. if ($culture -eq 6) { $SCRIPT:form = '-Use format dd/mm/year' } } $ErrorActionPreference = 'SilentlyContinue' $VerbosePreference = 'SilentlyContinue' $WarningPreference = 'Continue' $conn = $disc = $default = $print = $null $timeNow = [DateTime]::Now $total = $timeNow - $timeNow #Set initial value to 00:00:00. $insert = "since" if ($verbose) { $VerbosePreference = 'Continue' } function CreditMsg ($value, $value2) { $value = [Math]::Abs($value) $prefix = "CURRENT" [DateTime] $creditDT = $value2 $creditDT = $creditDT.AddDays($value) #Add the -Account days. $thisDay = "{0:M/d/yyyy}" -f [DateTime]::Now #Force US format. #If we use '$number = $creditDT - (Get-Date)' instead of the line below we #can sometimes get a value of 1 returned instead 2, hence the above lines. $number = $creditDT - [DateTime] $thisDay [String] $credit = $creditDT $credit = $credit.Replace('00:00:00','') #Remove any trailing time. $credit = "{0:d}" -f [DateTime]$credit Switch($number.Days) { 1 {$prefix = "($value days) will expire tomorrow"; break} 0 {$prefix = "($value days) will expire today"; break} -1 {$prefix = "($value days) expired yesterday"; break} {($_ -lt 0)} {$prefix = "($value days) expired on $credit"; break} {($_ -le 5)} {$prefix = "($value days) will expire on $credit"} Default {$prefix = "CURRENT"} #Only come here if over 5 days. } return $prefix } function Interval ([String] $value) { Switch -regex ($value) { '^00?:00?:\\d+(.*)$' {$suffix = "seconds"; break} '^00?:\\d+:\\d+(.*)$' {$suffix = "minutes"; break} '^\\d+:\\d+:\\d+(.*)$' {$suffix = " hours"; break} '^(\\d+)\\D(\\d+)(.*)$' {$suffix = " hours" $pDays = $matches[1] $pHours = $matches[2] [string]$pMinSec = $matches[3] [string]$tHours = (([int]$pDays) * 24)+[int]$pHours $value = $tHours + $pminSec; break} default {$suffix = " hours"} #Should never come here! } return "$value $suffix" } function CheckSetting ($value) { if ($value) { #Correct for local culture. $print = $default.ToShortDateString() } else { $print = "(Value not set)" } return $print } #The Script effectively starts here............................................. $getGprs = [Environment]::GetEnvironmentVariable("GPRS","User") #First check for GPRS variable and change from US date format to current locale. if ([DateTime]::TryParse($getGprs, [Ref]$timeNow)) { #No error as date is valid. $default = "{0:d}" -f [datetime]$getGprs $default = [DateTime]::Parse($default) $checkParts = "{0:yyyy},{0:%M}" -f $default $times = $checkParts.Split(',') $dayCount = [DateTime]::DaysInMonth($times[0],$times[1]) #Range 28-31. if($account -eq 0) { $account = $dayCount $summary = "$($dayCount.ToString()) days" } else { $summary = "$($account.Tostring()) days" } $text = CreditMsg $account $getGprs #Check if within 5 days of expiry date. if ($text -ne "CURRENT") { [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") $objNotifyIcon = New-Object System.Windows.Forms.NotifyIcon $objNotifyIcon.Icon = [System.Drawing.SystemIcons]::Exclamation $objNotifyIcon.BalloonTipIcon = "Info" $objNotifyIcon.BalloonTipTitle = "GPRS online account" $objNotifyIcon.BalloonTipText = "Credit $text" $objNotifyIcon.Visible = $True $objNotifyIcon.ShowBalloonTip(10000) } } else { $summary = "(Days not set)" if ((!$today) -and (!$monthly) -and (!$start)) { [System.Media.SystemSounds]::Hand.Play() Write-Warning("Monthly date is either invalid or not set.") exit 1 } } if ($start) { $start = [DateTime]::Parse($start) #Trigger TRAP if invalid! [DateTime]$limit = $start $convert = "{0:D}" -f $limit $print = CheckSetting $default } if ($monthly) { $start = [DateTime]::Parse($monthly) #Trigger TRAP if invalid! Write-Output "Setting GPRS (monthly) environment variable to: $monthly" $gprs = [String]$start.Replace('00:00:00','') [Environment]::SetEnvironmentVariable("GPRS",$gprs,"User") [DateTime] $limit = $start #Change to required US date format. $convert = "{0:D}" -f $limit $print = $limit.ToShortDateString() $summary = "(Days undetermined)" #Will show next time around. } if ($today) { $verBosePreference = 'Continue' #Show VERBOSE by default. [DateTime] $limit = (Get-Date) $convert = "{0:D}" -f $limit $limit = $limit.Date #Override any start date if using -Today input. $insert = "for today" $print = CheckSetting $default } if ((!$today) -and (!$monthly) -and (!$start)) { if ($default) { $monthly = $default [DateTime] $limit = $monthly $convert = "{0:D}" -f $limit $print = CheckSetting $default } } $adjustment = $null #Otherwise 'Set-Strictmode -Version latest' will catch. if ($adjust) { $pattern = '^(\\d{1,3}):(\\d{1,2}):(\\d{1,2})-?$' if ($adjust -notmatch $pattern ) { Write-Warning "Invalid format - use <hours>:<minutes>:<seconds>" return } #Now create the 'adjustment' to add later. $adjustment = New-TimeSpan -hours $matches[1] -minutes $matches[2] -seconds $matches[3] $outString = $adjust.Replace('-','') $outString = interval $outString } Write-Verbose "All records $($insert.Replace('for ','')) - $convert" Write-Verbose "Script activation - User [$($env:UserName)] Computer [$($env:ComputerName)]" Write-Output "" Write-Output "Calculating total connect time of all GPRS modem devices..." #We cannot proceed beyond here without a valid $limit value. Write-Debug "Using - [Search date] $($limit.ToShortDateString()) [Account] $summary [GPRS Monthly] $print" if ($logEntry) { Write-Debug "$logEntry" } $lines = Get-EventLog $logname | Where-Object {($_.TimeGenerated -ge $limit) -and ` ($_.EventID -eq $discEvent -or $_.EventID -eq $connEvent)} if ($lines) { Write-Verbose "A total of $([Math]::Truncate($lines.Count/2)) online sessions extracted from the System Event Log." } else { Write-Output "(There are no events indicated in the System Event Log)" } $lines | ForEach-Object { try { $source = $_.Source } catch { return } if ($_.EventID -eq $discEvent) { #Event 20159 is Disconnect. $disc = $_.TimeGenerated } else { #Event 20158 is Connect. $conn = $_.TimeGenerated } #We are only interested in matching pairs of DISC/CONN... if ($disc -ne $null -and $conn -ne $null -and $disc -gt $conn) { $diff = $disc - $conn $total += $diff $convDisc = "{0:G}" -f $disc $convConn = "{0:G}" -f $conn $period = Interval $diff Write-Verbose "Disconnect at $convDisc. Online - $period" Write-Verbose " Connect at $convConn." } } #End ForEach if (!$source) { $source = '(Undetermined)' } Write-Verbose "Using local event source - System Event Log [$source]" $period = Interval $total function formatSpan ($timespan) { #Convert returns of '1.11:00:00'. $addHours = $timespan.Days * 24 $addHours+= $timespan.Hours $h = $addHours.ToString().PadLeft(2,'0') + ':' $m = $timespan.Minutes.ToString().PadLeft(2,'0') + ':' $s = $timespan.Seconds.ToString().PadLeft(2,'0') return $h + $m + $s } if ($adjustment -and ($total -match $pattern)) { $outDate = New-TimeSpan -hours $matches[1] -minutes $matches[2] -seconds $matches[3] if (!$adjust.EndsWith('-')) { $period = $outDate + $adjustment #The '-adjust' value added at start. $show = formatSpan $period $show = interval $show #Get hours,minutes suffix. Write-Output "Total online usage $insert $convert is $show" Write-Output "(Including $($outString.Replace(' ',' ')) adjustment time)" } else { if ($outDate.TotalSeconds -gt $adjustment.TotalSeconds) { $period = $outDate - $adjustment $show = formatSpan $period $show = interval $show Write-Output "Total online usage $insert $convert is $show" Write-Output "(Excluding $($outString.Replace(' ',' ')) adjustment time)" } else { Write-Output "Total online usage $insert $convert is $($period.ToString().Replace(' ',' '))." $adjust = $adjust.Replace('-','') Write-Warning "Invalid amount entered ($adjust) - no adjustment performed" } } } else { Write-OutPut "Total online usage $insert $convert is $($period.ToString().Replace(' ',' '))." } Write-Output ""
combined_dataset/train/non-malicious/sample_65_60.ps1
sample_65_60.ps1
<# .SYNOPSIS Queries and exports attached peripheral information .DESCRIPTION Queries and exports attached peripheral information for use in Microsoft Teams Bring Your Own Device (BYOD) data entry in the Pro Management Portal (PMP) for enhanced reporting .EXAMPLE .\Get-TeamsBYODRoomDevices.ps1 .NOTES Version: 1.0 Author: andthom@microsoft.com, rowille@microsoft.com Creation Date: March 2024 #> ## Disclaimer # (c)2024 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, # including URL and other Internet Web site references, may change without notice. You bear the risk of using it. # This document does not provide you with any legal rights to any intellectual property in any Microsoft product. # You may copy and use this document for your internal, reference purposes. You may modify this document for your internal purposes. $CurrentDevices = [Collections.Generic.HashSet[string]]::new([string[]]@((Get-PnpDevice -PresentOnly).DeviceID), [StringComparer]::OrdinalIgnoreCase) while ($true) { Write-Host "Found $($CurrentDevices.Count) devices currently." Write-Host "Please Connect The BYOD Room Devices Now" $null = Read-Host "Press Enter When Ready" Write-Host "Waiting 15 seconds for devices to be ready..." Start-Sleep -Seconds 15 Write-Host "Checking for new devices..." $NewDevices = [Collections.Generic.HashSet[string]]::new([string[]]@((Get-PnpDevice -PresentOnly).DeviceID), [StringComparer]::OrdinalIgnoreCase) $NewDevices.ExceptWith($CurrentDevices) if (!$NewDevices.Count) { Write-Host "No new devices found, Are you sure you connected the devices when prompted?" -ForegroundColor Red if (!$env:RUN_FOR_ALL_DEVICES -or $env:RUN_FOR_ALL_DEVICES -eq '0') { return } $NewDevices = $CurrentDevices } Write-Host "Found $($NewDevices.Count) new devices, getting device information..." $UPN = $null $DisplayName = $null $GroupID = $null while (!$UPN) { $UPN = Read-Host "Enter the BYOD Room Account's User Principal Name (UPN)" } $DisplayName = Read-Host "Enter the BYOD Room Account's Display Name (default: none)" $GroupID = Read-Host "Enter the Grouping ID to use for this data collection (default: none)" if (!$Local:OutputFilePath -or !(Test-Path $OutputFilePath)) { $DefaultFilePath = [Environment]::GetFolderPath('Desktop') $OutputFilePath = Read-Host "Enter the folder path where the PERIPHERALS.csv file will be saved (default: $DefaultFilePath)" if (!$OutputFilePath) { $OutputFilePath = $DefaultFilePath } $OutputFilePath = [IO.Path]::Combine($OutputFilePath, 'PERIPHERALS.csv') } else { Write-Host "Using the existing file $OutputFilePath to store the data." } Write-Host "Gathering peripheral data for the newly connected devices..." function Get-DeviceProperties { [CmdletBinding()] [OutputType([PSCustomObject])] param( [Parameter(Mandatory = $true, ValueFromPipeline, ValueFromPipelineByPropertyName, Position = 0)] [string] $DeviceID, [hashtable] $Properties = @{ 'DEVPKEY_NAME' = 'Name' 'DEVPKEY_Device_BusReportedDeviceDesc' = 'NameFromBus' 'DEVPKEY_Device_Service' = 'Service' 'DEVPKEY_Device_Class' = 'PNPClass' 'DEVPKEY_Device_Parent' = 'ParentID' } ) process { $Instance = [Management.ManagementObject]::new('Win32_PnPEntity.DeviceID="{0}"' -f $DeviceID.Replace('\','\\')) $params = $Instance.GetMethodParameters('GetDeviceProperties') $params['devicePropertyKeys'] = [string[]]$Properties.Keys $result = $Instance.InvokeMethod('GetDeviceProperties', $params, $null) $objHash = [ordered]@{ DeviceID = $DeviceID } foreach ($property in $result['deviceProperties']) { $name = $property['KeyName'] if ([string]::IsNullOrEmpty($name)) { $name = $property['key'] } $objHash[$Properties[$name]] = $property['Data'] } [PSCustomObject]$objHash } } $Devices = $NewDevices | Get-DeviceProperties $USBCompositeDevices = @($Devices | Where-Object { $_.PNPClass -in 'USB' }) $Stack = [Collections.Generic.Stack[object]]$USBCompositeDevices $ProcessedIDs = [Collections.Generic.HashSet[string]]::new([StringComparer]::OrdinalIgnoreCase) while ($Stack.Count) { $CurrentDevice = $Stack.Pop() if (!$ProcessedIDs.Add($CurrentDevice.DeviceID)) { continue } $Children = $Devices.Where({ $CurrentDevice.DeviceID -eq $_.ParentID }) $CurrentDevice | Add-Member -NotePropertyName Children -NotePropertyValue $Children foreach ($Child in $CurrentDevice.Children) { $Stack.Push($Child) $Devices = $Devices.Where({ $_.DeviceID -ne $Child.DeviceID }) } } Write-Host "Processing the discovered peripheral data..." try { $null = [Native.HID+DeviceInfo]::new() } catch { $Signature = @' const uint FILE_SHARE_READ = 0x00000001; const uint FILE_SHARE_WRITE = 0x00000002; const uint OPEN_EXISTING = 0x00000003; const uint GENERIC_READ = 0x80000000; const uint GENERIC_WRITE = 0x40000000; const uint FILE_FLAG_OVERLAPPED = 0x40000000; const int ERROR_INVALID_USER_BUFFER = 0x6F8; [DllImport("kernel32", SetLastError = true)] static extern SafeFileHandle CreateFile(string lpFileName, uint dwDesiredAccess, uint dwShareMode, IntPtr lpSecurityAttributes, uint dwCreationDisposition, uint dwFlagsAndAttributes, IntPtr hTemplateFile); [DllImport("kernel32", SetLastError = true)] static extern bool CloseHandle(IntPtr hObject); internal struct HIDD_ATTRIBUTES { public int Size; public ushort VendorID; public ushort ProductID; public ushort VersionNumber; public static HIDD_ATTRIBUTES Create() { return new HIDD_ATTRIBUTES() { Size = Marshal.SizeOf(typeof(HIDD_ATTRIBUTES)) }; } } static SafeFileHandle GetDeviceHandle(string lpFileName) { var hDevice = CreateFile(lpFileName, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, IntPtr.Zero, OPEN_EXISTING, FILE_FLAG_OVERLAPPED, IntPtr.Zero); if (Marshal.GetLastWin32Error() != 0) { return SafeFileHandle.Null; } return hDevice; } [DllImport("hid", SetLastError = true)] static extern bool HidD_GetAttributes(SafeFileHandle hidDeviceObject, out HIDD_ATTRIBUTES attributes); [DllImport("hid", SetLastError = true, CharSet = CharSet.Unicode)] static extern bool HidD_GetSerialNumberString(SafeFileHandle hidDeviceObject, StringBuilder buffer, int bufferLength); static string HIDGetSerialNumberString(SafeFileHandle hDevice) { var builder = new StringBuilder(256); while (builder.Capacity < 4094) { if (HidD_GetSerialNumberString(hDevice, builder, builder.Capacity)) return builder.ToString(); if (Marshal.GetLastWin32Error() != ERROR_INVALID_USER_BUFFER) break; builder.Capacity *= 2; } return null; } public static DeviceInfo GetHidDevice(string devicePath) { using (var hDevice = GetDeviceHandle(devicePath)) { if (hDevice.IsInvalid) return null; var attributes = HIDD_ATTRIBUTES.Create(); HidD_GetAttributes(hDevice, out attributes); if (Marshal.GetLastWin32Error() != 0) return null; return new DeviceInfo { SerialNumber = HIDGetSerialNumberString(hDevice), VendorId = attributes.VendorID, ProductId = attributes.ProductID, }; } } public class DeviceInfo { public string SerialNumber { get; set; } public ushort VendorId { get; set; } public ushort ProductId { get; set; } } internal static readonly IntPtr INVALID_HANDLE = new IntPtr(-1); public class SafeFileHandle : SafeHandle { public static readonly SafeFileHandle Invalid = new SafeFileHandle(); public static readonly SafeFileHandle Null = new SafeFileHandle(IntPtr.Zero, false); public SafeFileHandle() : base(INVALID_HANDLE, true) { } public SafeFileHandle(IntPtr preexistingHandle, bool ownsHandle = true) : base(INVALID_HANDLE, ownsHandle) { this.SetHandle(preexistingHandle); } public override bool IsInvalid { get { return this.handle == INVALID_HANDLE || this.handle == IntPtr.Zero; } } protected override bool ReleaseHandle() { return CloseHandle(this.handle); } } '@ Add-Type -MemberDefinition $Signature -Name HID -Namespace Native -UsingNamespace System.Text } $DeviceSerialNumbers = @{} $NewDevices | ForEach-Object { [Native.HID]::GetHidDevice('\\?\' + $_.Replace('\','#') + '#{4d1e55b2-f16f-11cf-88cb-001111000030}') } | Where-Object { $null -ne $_ } | ForEach-Object { $Lookup = "$($_.VendorId)-$($_.ProductId)" if ($DeviceSerialNumbers.ContainsKey($Lookup) -and $DeviceSerialNumbers[$Lookup] -ne $_.SerialNumber) { Write-Warning "Duplicate device found with Vendor ID: $($_.VendorId) and Product ID: $($_.ProductId). Changing serial number from $($DeviceSerialNumbers[$Lookup]) to $($_.SerialNumber)." } $DeviceSerialNumbers[$Lookup] = $_.SerialNumber } $USBDeviceIDPattern = 'VID_(?<vid>[0-9A-F]{4})&PID_(?<pid>[0-9A-F]{4})' $MediaDevices = foreach ($Device in $USBCompositeDevices | Where-Object { $_.Children | Where-Object { $_.PNPClass -in @('Image','Camera') -or ($_.Children | Where-Object { $_.PNPClass -eq 'AudioEndpoint' }) } }) { if ($Device.DeviceID -notmatch $USBDeviceIDPattern) { continue } $DeviceVID = [Int32]::Parse($Matches['vid'],[Globalization.NumberStyles]::AllowHexSpecifier) $DevicePID = [Int32]::Parse($Matches['pid'],[Globalization.NumberStyles]::AllowHexSpecifier) $DeviceSerialNumber = $DeviceSerialNumbers["$DeviceVID-$DevicePID"] $Camera = @($Device.Children | Where-Object { $_.PNPClass -in @('Camera','Image') } | Sort-Object DeviceID) $Audio = @($Device.Children | Where-Object { $_.Children | Where-Object { $_.PNPClass -eq 'AudioEndpoint' } } | Sort-Object DeviceID) $AudioEndpoints = @($Audio.Children | Where-Object { $_.PNPClass -eq 'AudioEndpoint' -and $_.DeviceID } | ForEach-Object { [PSCustomObject]@{Id=$_.DeviceID.Split('\',3)[2]; Name=$_.Name} }) $Speaker = @($AudioEndpoints | Where-Object { $_.Id.StartsWith('{0.0.0.') } | Sort-Object Id) $Microphone = @($AudioEndpoints | Where-Object { $_.Id.StartsWith('{0.0.1.') } | Sort-Object Id) if (!$Camera -and !$Speaker -and !$Microphone) { continue } $DeviceType = & { if ($Speaker -and !$Microphone -and !$Camera) { return 'Speaker' } if (!$Speaker -and $Microphone -and !$Camera) { return 'Microphone' } if (!$Speaker -and !$Microphone -and $Camera) { return 'Camera' } if ($Speaker -and $Microphone -and !$Camera) { return 'CompositeAudioDevice' } if ($Speaker -and $Microphone -and $Camera) { return 'CompositeAudioVideoDevice' } return 'CompositeVideoDevice' } $DeviceName = switch ($DeviceType) { 'Speaker' { $Speaker[0].Name } 'Microphone' { $Microphone[0].Name } 'Camera' { $Camera[0].Name } 'CompositeAudioDevice' { $(if (![string]::IsNullOrEmpty($Device.NameFromBus)) { $Device.NameFromBus } else { $Microphone[0].Name }) } 'CompositeVideoDevice' { 'Composite - ' + $(if (![string]::IsNullOrEmpty($Device.NameFromBus)) { $Device.NameFromBus } else { $Camera[0].Name }) } 'CompositeAudioVideoDevice' { $(if (![string]::IsNullOrEmpty($Device.NameFromBus)) { $Device.NameFromBus } else { $Camera[0].Name }) } default { $(if (![string]::IsNullOrEmpty($Device.NameFromBus)) { $Device.NameFromBus } else { $Device.Name }) } } [PSCustomObject][ordered]@{ 'Product ID' = "$DevicePID" 'Vendor ID' = "$DeviceVID" 'Serial Number' = "$DeviceSerialNumber" 'Peripheral Name' = "$DeviceName" 'Peripheral Type' = "$DeviceType" } } $MonitorDevices = foreach ($Device in $Devices | Where-Object { $_.PNPClass -eq 'Monitor' -and $_.DeviceID }) { $scope = [Management.ManagementScope]::new('root/WMI') $scope.Connect() $QueryString = 'SELECT InstanceName,ProductCodeID,ManufacturerName,SerialNumberID,UserFriendlyName FROM WmiMonitorID WHERE Active = TRUE AND InstanceName LIKE ''{0}%''' -f $Device.DeviceID.Replace('\','\\') $query = [Management.ObjectQuery]::new('WQL', $QueryString) $searcher = [Management.ManagementObjectSearcher]::new($scope, $query) $WmiMonitorID = try { $searcher.Get() | Select-Object -First 1 } catch {} if (!$WmiMonitorID) { continue } $QueryString = 'SELECT VideoOutputTechnology FROM WmiMonitorConnectionParams WHERE InstanceName LIKE ''{0}%''' -f $WmiMonitorID['InstanceName'].Replace('\','\\') $query = [Management.ObjectQuery]::new('WQL', $QueryString) $searcher = [Management.ManagementObjectSearcher]::new($scope, $query) $GoodOutputType = try { $searcher.Get() | Where-Object { $_['VideoOutputTechnology'] -notin @(6, 11, 13, 0x80000000) } } catch {} if (!$GoodOutputType -or $GoodOutputType.Count -eq 0) { continue } $DevicePID = [Convert]::ToUInt32([Text.Encoding]::ASCII.GetString($WmiMonitorID['ProductCodeID'], 0, 4), 16) $DeviceVID = ($WmiMonitorID['ManufacturerName'][0] - 64 -shl 10) -bor ($WmiMonitorID['ManufacturerName'][1] - 64 -shl 5) -bor ($WmiMonitorID['ManufacturerName'][2] - 64) $DeviceSerialNumber = [Text.Encoding]::ASCII.GetString($WmiMonitorID['SerialNumberID']).TrimEnd([char]0) $DeviceName = [Text.Encoding]::ASCII.GetString($WmiMonitorID['UserFriendlyName']).TrimEnd([char]0) [PSCustomObject][ordered]@{ 'Product ID' = "$DevicePID" 'Vendor ID' = "$DeviceVID" 'Serial Number' = "$DeviceSerialNumber" 'Peripheral Name' = "$DeviceName" 'Peripheral Type' = 'Screen' } } $DataToExport = @($MediaDevices) + $($MonitorDevices) | Select-Object @{ Name = 'Account'; Expression = { $UPN } }, @{ Name = 'Display Name'; Expression = { $DisplayName } }, *, @{ Name = 'GROUP_ID'; Expression = { $GroupID } } | Where-Object { $_.'Peripheral Type' -notin @('Unknown','Camera') } if ((Test-Path $OutputFilePath)) { while($true) { try { $CurrentContents = Import-Csv -Path $OutputFilePath -ErrorAction Stop break } catch [IO.IOException] { if (!(Test-Path $OutputFilePath)) { $CurrentContents = @() break } Write-Warning "The file $OutputFilePath is currently in use. Please close the file and press Enter to retry." $null = Read-Host } } $DataToExport = @($DataToExport) + @($CurrentContents) | Sort-Object -Property 'Product ID', 'Vendor ID', 'Serial Number', 'Peripheral Name', 'Peripheral Type', GROUP_ID -Unique } # Update the CSV file while($true) { try { $DataToExport | Export-Csv -Path $OutputFilePath -NoTypeInformation -ErrorAction Stop break } catch [IO.IOException] { Write-Warning "The file $OutputFilePath is currently in use. Please close the file and press Enter to retry." $null = Read-Host } } Write-Host "Your discovered peripheral data has been collected and exported to $OutputFilePath." -ForegroundColor Green Write-Host "Here is a preview of the results that were exported:" $DataToExport | Format-Table -AutoSize $Continue = Read-Host 'Are you finished collecting BYOD Rooms? (default: no)' if ($Continue -and $Continue[0] -eq 'y') { break } }
combined_dataset/train/non-malicious/Hex dump sample.ps1
Hex dump sample.ps1
C:\\WINDOWS\\system32 PS > hexdmp wsock32.dll 4d 5a 90 00 03 00 00 00 04 00 MZ........ 00 00 ff ff 00 00 b8 00 00 00 ..ˇˇ...... 00 00 00 00 40 00 00 00 00 00 .......... e0 00 00 00 0e 1f ba 0e 00 b4 ‡.....∫... 09 cd 21 b8 01 4c cd 21 54 68 .Õ...LÕ.Th 69 73 20 70 72 6f 67 72 61 6d is.program 20 63 61 6e 6e 6f 74 20 62 65 .cannot.be 20 72 75 6e 20 69 6e 20 44 4f .run.in.DO 53 20 6d 6f 64 65 2e 0d 0d 0a S.mode....
combined_dataset/train/non-malicious/938.ps1
938.ps1
$apiVersion = "2015-04-08" $resourceGroupName = "myResourceGroup" $accountName = "mycosmosaccount" $databaseName = "database1" $databaseThroughputResourceName = $accountName + "/gremlin/" + $databaseName + "/throughput" $databaseThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/settings" $graphName = "graph1" $graphThroughputResourceName = $accountName + "/gremlin/" + $databaseName + "/" + $graphName + "/throughput" $graphThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/graphs/settings" $throughput = 500 $updateResource = "database" $properties = @{ "resource"=@{"throughput"=$throughput} } if($updateResource -eq "database"){ Set-AzResource -ResourceType $databaseThroughputResourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName ` -Name $databaseThroughputResourceName -PropertyObject $properties } elseif($updateResource -eq "graph"){ Set-AzResource -ResourceType $graphThroughputResourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName ` -Name $graphThroughputResourceName -PropertyObject $properties } else { Write-Host("Must select database or graph") }
combined_dataset/train/non-malicious/Get-LocalGroupMembership.ps1
Get-LocalGroupMembership.ps1
# ############################################################################# # NAME: FUNCTION-Get-LocalGroupMembership.ps1 # # AUTHOR: Francois-Xavier Cat # DATE: 2012/12/27 # EMAIL: fxcat@lazywinadmin.com # WEBSITE: LazyWinAdmin.com # TWiTTER: @lazywinadm # # COMMENT: This function get the local group membership on a local or remote # machine using ADSI/WinNT. By default it will run on the localhost # and check the group "Administrators". # # VERSION HISTORY # 1.0 2012.12.27 Initial Version. # # ############################################################################# Function Get-LocalGroupMembership { <# .Synopsis Get the local group membership. .Description Get the local group membership. .Parameter ComputerName Name of the Computer to get group members. Default is "localhost". .Parameter GroupName Name of the GroupName to get members from. Default is "Administrators". .Example Get-LocalGroupMembership Description ----------- Get the Administrators group membership for the localhost .Example Get-LocalGroupMembership -ComputerName SERVER01 -GroupName "Remote Desktop Users" Description ----------- Get the membership for the the group "Remote Desktop Users" on the computer SERVER01 .OUTPUTS PSCustomObject .INPUTS Array .Link N/A .Notes NAME: Get-LocalGroupMembership AUTHOR: Francois-Xavier Cat WEBSITE: www.LazyWinAdmin.com #> [Cmdletbinding()] Param ( [Parameter(ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true)] [string]$ComputerName = $env:COMPUTERNAME, [string]$GroupName = "Administrators" ) # Create the array that will contains all the output of this function $Output = @() # Get the members for the group and computer specified $Group = [ADSI]"WinNT://$ComputerName/$GroupName" $Members = @($group.psbase.Invoke("Members")) # Format the Output $members | foreach { $name = $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null) $class = $_.GetType().InvokeMember("Class", 'GetProperty', $null, $_, $null) $path = $_.GetType().InvokeMember("ADsPath", 'GetProperty', $null, $_, $null) # Find out if this is a local or domain object if ($path -like "*/$ComputerName/*"){ $Type = "Local" } else {$Type = "Domain" } $Details = "" | Select ComputerName,Account,Class,Group,Path,Type $Details.ComputerName = $ComputerName $Details.Account = $name $Details.Class = $class $Details.Group = $GroupName $details.Path = $path $details.Type = $type # Send the current result to the $output variable $output = $output + $Details } # Finally show the Output to the user. $output }
combined_dataset/train/non-malicious/ConvertFrom-SDDL.ps1
ConvertFrom-SDDL.ps1
filter ConvertFrom-SDDL { <# .SYNOPSIS Convert a raw security descriptor from SDDL form to a parsed security descriptor. Author: Matthew Graeber (@mattifestation) .DESCRIPTION ConvertFrom-SDDL generates a parsed security descriptor based upon any string in raw security descriptor definition language (SDDL) form. ConvertFrom-SDDL will parse the SDDL regardless of the type of object the security descriptor represents. .PARAMETER RawSDDL Specifies the security descriptor in raw SDDL form. .EXAMPLE ConvertFrom-SDDL -RawSDDL 'D:PAI(A;;0xd01f01ff;;;SY)(A;;0xd01f01ff;;;BA)(A;;0x80120089;;;NS)' .EXAMPLE 'O:BAG:SYD:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0005;;;SY)(A;;0x5;;;BA)', 'O:BAG:SYD:PAI(D;OICI;FA;;;BG)(A;OICI;FA;;;BA)(A;OICIIO;FA;;;CO)(A;OICI;FA;;;SY)' | ConvertFrom-SDDL .INPUTS System.String ConvertFrom-SDDL accepts SDDL strings from the pipeline .OUTPUTS System.Management.Automation.PSObject .LINK http://www.exploit-monday.com #> Param ( [Parameter( Position = 0, Mandatory = $True, ValueFromPipeline = $True )] [ValidateNotNullOrEmpty()] [String[]] $RawSDDL ) Set-StrictMode -Version 2 # Get reference to sealed RawSecurityDescriptor class $RawSecurityDescriptor = [Int].Assembly.GetTypes() | ? { $_.FullName -eq 'System.Security.AccessControl.RawSecurityDescriptor' } # Create an instance of the RawSecurityDescriptor class based upon the provided raw SDDL try { $Sddl = [Activator]::CreateInstance($RawSecurityDescriptor, [Object[]] @($RawSDDL)) } catch [Management.Automation.MethodInvocationException] { throw $Error[0] } if ($Sddl.Group -eq $null) { $Group = $null } else { $SID = $Sddl.Group $Group = $SID.Translate([Security.Principal.NTAccount]).Value } if ($Sddl.Owner -eq $null) { $Owner = $null } else { $SID = $Sddl.Owner $Owner = $SID.Translate([Security.Principal.NTAccount]).Value } $ObjectProperties = @{ Group = $Group Owner = $Owner } if ($Sddl.DiscretionaryAcl -eq $null) { $Dacl = $null } else { $DaclArray = New-Object PSObject[](0) # System.Security.AccessControl.FileSystemRights contains the most generic forms of access rights. # Because we don't necessarily know the object type ahead of time, # this may lead to some false positives due to some overlap in access control types. $EnumValueStrings = [Enum]::GetNames([System.Security.AccessControl.FileSystemRights]) $EnumValues = $EnumValueStrings | % { [System.Security.AccessControl.FileSystemRights] $_ } foreach ($DaclEntry in $Sddl.DiscretionaryAcl) { $SID = $DaclEntry.SecurityIdentifier $Account = $SID.Translate([Security.Principal.NTAccount]).Value $Values = New-Object String[](0) # Resolve access mask foreach ($Value in $EnumValues) { if (($DaclEntry.Accessmask -band $Value) -eq $Value) { $Values += $Value.ToString() } } $Access = [Security.AccessControl.FileSystemRights] "$($Values -join ',')" $DaclTable = @{ Rights = $Access IdentityReference = $Account IsInherited = $DaclEntry.IsInherited InheritanceFlags = $DaclEntry.InheritanceFlags PropagationFlags = $DaclEntry.PropagationFlags } if ($DaclEntry.AceType.ToString().Contains('Allowed')) { $DaclTable['AccessControlType'] = [Security.AccessControl.AccessControlType]::Allow } else { $DaclTable['AccessControlType'] = [Security.AccessControl.AccessControlType]::Deny } $DaclArray += New-Object PSObject -Property $DaclTable } $Dacl = $DaclArray } $ObjectProperties['Access'] = $Dacl $SecurityDescriptor = New-Object PSObject -Property $ObjectProperties Write-Output $SecurityDescriptor }
combined_dataset/train/non-malicious/4428.ps1
4428.ps1
function Register-PSRepository { [CmdletBinding(DefaultParameterSetName = 'NameParameterSet', HelpUri = 'https://go.microsoft.com/fwlink/?LinkID=517129')] Param ( [Parameter(Mandatory = $true, Position = 0, ParameterSetName = 'NameParameterSet')] [ValidateNotNullOrEmpty()] [string] $Name, [Parameter(Mandatory = $true, Position = 1, ParameterSetName = 'NameParameterSet')] [ValidateNotNullOrEmpty()] [Uri] $SourceLocation, [Parameter(ParameterSetName = 'NameParameterSet')] [ValidateNotNullOrEmpty()] [Uri] $PublishLocation, [Parameter(ParameterSetName = 'NameParameterSet')] [ValidateNotNullOrEmpty()] [Uri] $ScriptSourceLocation, [Parameter(ParameterSetName = 'NameParameterSet')] [ValidateNotNullOrEmpty()] [Uri] $ScriptPublishLocation, [Parameter(ValueFromPipelineByPropertyName = $true, ParameterSetName = 'NameParameterSet')] [PSCredential] $Credential, [Parameter(Mandatory = $true, ParameterSetName = 'PSGalleryParameterSet')] [Switch] $Default, [Parameter()] [ValidateSet('Trusted', 'Untrusted')] [string] $InstallationPolicy = 'Untrusted', [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNullOrEmpty()] [Uri] $Proxy, [Parameter(ValueFromPipelineByPropertyName = $true)] [PSCredential] $ProxyCredential, [Parameter(ParameterSetName = 'NameParameterSet')] [ValidateNotNullOrEmpty()] [string] $PackageManagementProvider ) DynamicParam { if (Get-Variable -Name SourceLocation -ErrorAction SilentlyContinue) { Set-Variable -Name selectedProviderName -value $null -Scope 1 if (Get-Variable -Name PackageManagementProvider -ErrorAction SilentlyContinue) { $selectedProviderName = $PackageManagementProvider $null = Get-DynamicParameters -Location $SourceLocation -PackageManagementProvider ([REF]$selectedProviderName) } else { $dynamicParameters = Get-DynamicParameters -Location $SourceLocation -PackageManagementProvider ([REF]$selectedProviderName) Set-Variable -Name PackageManagementProvider -Value $selectedProviderName -Scope 1 $null = $dynamicParameters } } } Begin { Install-NuGetClientBinaries -CallerPSCmdlet $PSCmdlet -Proxy $Proxy -ProxyCredential $ProxyCredential if ($PackageManagementProvider) { $providers = PackageManagement\Get-PackageProvider | Where-Object { $_.Name -ne $script:PSModuleProviderName -and $_.Features.ContainsKey($script:SupportsPSModulesFeatureName) } if (-not $providers -or $providers.Name -notcontains $PackageManagementProvider) { $possibleProviderNames = $script:NuGetProviderName if ($providers) { $possibleProviderNames = ($providers.Name -join ',') } $message = $LocalizedData.InvalidPackageManagementProviderValue -f ($PackageManagementProvider, $possibleProviderNames, $script:NuGetProviderName) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $message ` -ErrorId "InvalidPackageManagementProviderValue" ` -CallerPSCmdlet $PSCmdlet ` -ErrorCategory InvalidArgument ` -ExceptionObject $PackageManagementProvider return } } } Process { if ($PSCmdlet.ParameterSetName -eq 'PSGalleryParameterSet') { if (-not $Default) { return } $PSBoundParameters['Name'] = $Script:PSGalleryModuleSource $null = $PSBoundParameters.Remove('Default') } else { if ($Name -eq $Script:PSGalleryModuleSource) { $message = $LocalizedData.UseDefaultParameterSetOnRegisterPSRepository ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $message ` -ErrorId 'UseDefaultParameterSetOnRegisterPSRepository' ` -CallerPSCmdlet $PSCmdlet ` -ErrorCategory InvalidArgument ` -ExceptionObject $Name return } $SourceLocation = Resolve-Location -Location (Get-LocationString -LocationUri $SourceLocation) ` -LocationParameterName 'SourceLocation' ` -Credential $Credential ` -Proxy $Proxy ` -ProxyCredential $ProxyCredential ` -CallerPSCmdlet $PSCmdlet if (-not $SourceLocation) { return } $pingResult = Ping-Endpoint -Endpoint (Get-LocationString -LocationUri $SourceLocation) -Credential $Credential -Proxy $Proxy -ProxyCredential $ProxyCredential $retrievedCredential = $null if (!$Credential -and $pingResult -and $pingResult.ContainsKey($Script:StatusCode) ` -and ($pingResult[$Script:StatusCode] -eq 401)) { $retrievedCredential = Get-CredsFromCredentialProvider -SourceLocation $SourceLocation $SourceLocation = Resolve-Location -Location (Get-LocationString -LocationUri $SourceLocation) ` -LocationParameterName 'SourceLocation' ` -Credential $retrievedCredential ` -Proxy $Proxy ` -ProxyCredential $ProxyCredential ` -CallerPSCmdlet $PSCmdlet if (-not $SourceLocation) { return } $pingResult = Ping-Endpoint -Endpoint (Get-LocationString -LocationUri $SourceLocation) -Credential $retrievedCredential -Proxy $Proxy -ProxyCredential $ProxyCredential if (!$retrievedCredential -or ($pingResult -and $pingResult.ContainsKey($Script:StatusCode) ` -and ($pingResult[$Script:StatusCode] -eq 401))) { $retriedRetrievedCredential = Get-CredsFromCredentialProvider -SourceLocation $SourceLocation -IsRetry $true $SourceLocation = Resolve-Location -Location (Get-LocationString -LocationUri $SourceLocation) ` -LocationParameterName 'SourceLocation' ` -Credential $retriedRetrievedCredential ` -Proxy $Proxy ` -ProxyCredential $ProxyCredential ` -CallerPSCmdlet $PSCmdlet if (-not $SourceLocation) { return } $pingResult = Ping-Endpoint -Endpoint (Get-LocationString -LocationUri $SourceLocation) -Credential $retrievedCredential -Proxy $Proxy -ProxyCredential $ProxyCredential if (!$retriedRetrievedCredential -or ($pingResult -and $pingResult.ContainsKey($Script:StatusCode) ` -and ($pingResult[$Script:StatusCode] -eq 401))) { $message = $LocalizedData.RepositoryCannotBeRegistered -f ($Name) Write-Error -Message $message -ErrorId "RepositoryCannotBeRegistered" -Category InvalidOperation return } } } $providerName = $null if ($PackageManagementProvider) { $providerName = $PackageManagementProvider } elseif ($selectedProviderName) { $providerName = $selectedProviderName } else { $providerName = Get-PackageManagementProviderName -Location $SourceLocation } if ($providerName) { $PSBoundParameters[$script:PackageManagementProviderParam] = $providerName } if ($PublishLocation) { $PSBoundParameters[$script:PublishLocation] = Get-LocationString -LocationUri $PublishLocation } if ($ScriptPublishLocation) { $PSBoundParameters[$script:ScriptPublishLocation] = Get-LocationString -LocationUri $ScriptPublishLocation } if ($ScriptSourceLocation) { $PSBoundParameters[$script:ScriptSourceLocation] = Get-LocationString -LocationUri $ScriptSourceLocation } $PSBoundParameters["Location"] = Get-LocationString -LocationUri $SourceLocation $null = $PSBoundParameters.Remove("SourceLocation") } if ($InstallationPolicy -eq "Trusted") { $PSBoundParameters['Trusted'] = $true } $null = $PSBoundParameters.Remove("InstallationPolicy") $PSBoundParameters["Provider"] = $script:PSModuleProviderName $PSBoundParameters["MessageResolver"] = $script:PackageManagementMessageResolverScriptBlock $null = PackageManagement\Register-PackageSource @PSBoundParameters $nugetCmd = Microsoft.PowerShell.Core\Get-Command -Name $script:NuGetExeName ` -ErrorAction SilentlyContinue -WarningAction SilentlyContinue if ($nugetCmd) { $nugetSourceExists = nuget sources list | where-object { $_.Trim() -in $SourceLocation } if (!$nugetSourceExists) { nuget sources add -name $Name -source $SourceLocation } } } }
combined_dataset/train/non-malicious/sample_25_61.ps1
sample_25_61.ps1
# # Module manifest for module 'OCI.PSModules.Waa' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waa.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5e9163aa-454b-4b6c-b240-a7136ba9f82a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waa Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waa.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWaaWebAppAcceleration', 'Get-OCIWaaWebAppAccelerationPoliciesList', 'Get-OCIWaaWebAppAccelerationPolicy', 'Get-OCIWaaWebAppAccelerationsList', 'Get-OCIWaaWorkRequest', 'Get-OCIWaaWorkRequestErrorsList', 'Get-OCIWaaWorkRequestLogsList', 'Get-OCIWaaWorkRequestsList', 'Invoke-OCIWaaPurgeWebAppAccelerationCache', 'Move-OCIWaaWebAppAccelerationCompartment', 'Move-OCIWaaWebAppAccelerationPolicyCompartment', 'New-OCIWaaWebAppAcceleration', 'New-OCIWaaWebAppAccelerationPolicy', 'Remove-OCIWaaWebAppAcceleration', 'Remove-OCIWaaWebAppAccelerationPolicy', 'Update-OCIWaaWebAppAcceleration', 'Update-OCIWaaWebAppAccelerationPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waa' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-UIChildItem.ps1
Get-UIChildItem.ps1
#requires -version 2.0 [CmdletBinding()] param($Path) <# Quick check to see if we have necessary module... #> if (!(Get-Module ShowUI)) { try { Import-Module ShowUI } catch { Write-Warning "Can't load ShowUI module. I quit! For more details about error use -Verbose parameter." Write-Verbose $_ } } <# Show UI builds UI structure... #> Show-UI -Parameters $Path { param ($Path) DockPanel -Height 400 { ScrollViewer { ItemsControl { <# Hash that will set common button's options and some effects... #> $Effect = @{ Effect = { New-Object Windows.Media.Effects.BlurEffect -Property @{ Radius = 3 } } On_MouseEnter = { $Clear = DoubleAnimation -From 3 -To 1 -Duration '0:0:0.5' $DependencyRadius = $This.Effect.GetType()::RadiusProperty $This.Effect.BeginAnimation($DependencyRadius,$Clear) } On_MouseLeave = { $Blur = DoubleAnimation -From 1 -To 3 -Duration '0:0:0.5' $DependencyRadius = $This.Effect.GetType()::RadiusProperty $This.Effect.BeginAnimation($DependencyRadius,$Blur) } } <# Time to read our folder. We ignore folders, only files will be listed. As you can see it's pretty easy to pass $Path parameter to UI, and it's not global... :) #> foreach ($File in Get-ChildItem $Path | where { !$_.PSIsContainer } ) { Button @Effect -Content $File.Name -On_Click ([scriptblock]::Create(@" Write-UIOutput $($File.FullName) `$ShowUI.ActiveWindow.Close() "@)) -ToolTip "File size: $($File.Length) bytes, Last modified: $($File.LastWriteTime.ToShortDateString())" } } # END ItemsControl } # END ScrollViewer } # END DockPanel } # END Show-UI
combined_dataset/train/non-malicious/sample_48_55.ps1
sample_48_55.ps1
# # Module manifest for module 'OCI.PSModules.Databasemigration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Databasemigration.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '75c40824-63ca-4f44-8abc-b6d5cb895ad8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Databasemigration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemigration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabasemigrationMigrationObjects', 'Connect-OCIDatabasemigrationionDiagnostics', 'Get-OCIDatabasemigrationAdvisorReport', 'Get-OCIDatabasemigrationAgent', 'Get-OCIDatabasemigrationAgentImagesList', 'Get-OCIDatabasemigrationAgentsList', 'Get-OCIDatabasemigrationConnection', 'Get-OCIDatabasemigrationConnectionsList', 'Get-OCIDatabasemigrationExcludedObjectsList', 'Get-OCIDatabasemigrationJob', 'Get-OCIDatabasemigrationJobOutputContent', 'Get-OCIDatabasemigrationJobOutputsList', 'Get-OCIDatabasemigrationJobsList', 'Get-OCIDatabasemigrationMigration', 'Get-OCIDatabasemigrationMigrationObjectsList', 'Get-OCIDatabasemigrationMigrationObjectTypesList', 'Get-OCIDatabasemigrationMigrationsList', 'Get-OCIDatabasemigrationWorkRequest', 'Get-OCIDatabasemigrationWorkRequestErrorsList', 'Get-OCIDatabasemigrationWorkRequestLogsList', 'Get-OCIDatabasemigrationWorkRequestsList', 'Invoke-OCIDatabasemigrationCloneMigration', 'Invoke-OCIDatabasemigrationEvaluateMigration', 'Invoke-OCIDatabasemigrationResumeJob', 'Invoke-OCIDatabasemigrationRetrieveSupportedPhases', 'Move-OCIDatabasemigrationAgentCompartment', 'Move-OCIDatabasemigrationConnectionCompartment', 'Move-OCIDatabasemigrationMigrationCompartment', 'New-OCIDatabasemigrationConnection', 'New-OCIDatabasemigrationMigration', 'Remove-OCIDatabasemigrationAgent', 'Remove-OCIDatabasemigrationConnection', 'Remove-OCIDatabasemigrationJob', 'Remove-OCIDatabasemigrationMigration', 'Remove-OCIDatabasemigrationMigrationObjects', 'Start-OCIDatabasemigrationMigration', 'Stop-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationAgent', 'Update-OCIDatabasemigrationConnection', 'Update-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationMigration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemigration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2348.ps1
2348.ps1
$sDefaultGpoGuid = '{F6FE3FDE-4CD0-455D-B9BC-D134111BBF09}'; $sDefaultGpoGuid = "*$($sDefaultGpoGuid)*"; $ErrorActionPreference = "Stop"; $aComputerGPOs = Get-ADObject -Filter {(ObjectClass -eq "groupPolicyContainer")} $test = @(); if ($aComputerGpos -ne $null) { $aReport = @() foreach ($oGpo in $aComputerGpos) { [XML]$xGpoReport = Get-GPOReport -Guid $oGpo.Name -ReportType XML; try { if (($xGpoReport.GPO.Computer.Enabled -eq 'true') -and (Test-Member $xGpoReport.GPO.Computer 'ExtensionData')) { $aSettings = @(); foreach ($oExt in $xGpoReport.GPO.Computer.ExtensionData) { $aSettings += $oExt.Extension.ChildNodes } if ($aSettings.Count -ne 0) { echo '11111111' echo "======NAME:$($xGpoReport.GPO.Name)=========" $aSettings echo '22222222' foreach ($oSetting in $aSettings) { if ($oSetting.Name -match '^q\d+:RegistrySetting') { $xGpoReport.GPO.Name } elseif ($oSetting.Name -notmatch '^q\d+') { } } } } } catch { Write-Error $_.Exception } } } $test | Select -Unique
combined_dataset/train/non-malicious/sample_49_36.ps1
sample_49_36.ps1
<# THE SCRIPT IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SCRIPT OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. .SYNOPSIS This script is used to start the configuration process for all supported AWS S3 logs sources. Log sources currently supported are: VPC flows, CloudTrail, GuardDuty .PARAMETER LogPath Specifies the path to save the script log. If not specified, the current path is used. .PARAMETER AwsLogType Specifies the Aws log type to configure. Valid options are: "VPC", "CloudTrail", "GuardDuty", "CustomLog" .EXAMPLE .\Config-AwsConnector.ps1 Executes the script with defaults #> [CmdletBinding()] param ( [Parameter()] [string] $LogPath=(Join-Path (Get-Location).Path Logs), [Parameter()] [ValidateSet("VPC","CloudTrail","GuardDuty", "CloudWatch", "CustomLog")][string]$AwsLogType ) # Include helper scripts . ".\Utils\HelperFunctions.ps1" . ".\Utils\AwsResourceCreator.ps1" . ".\Utils\CommonAwsPolicies.ps1" . ".\Utils\AwsPoliciesUpdate.ps1" . ".\Utils\AwsSentinelTag.ps1" . ".\Enviornment\EnviornmentConstants.ps1" # Verify that the AWS CLI is available if ($null -eq (Get-Command "aws" -ErrorAction SilentlyContinue)) { Write-Error "The AWS CLI is not available in the path" Write-Output "`nPlease install the latest AWS CLI from https://aws.amazon.com/cli/" Write-Output "If the CLI is already installed, make sure it is added to the path.`n" exit } # Setup basic logging New-Item -ItemType Directory -Force -Path $LogPath | Out-Null $TimeStamp = Get-Date -Format MMddHHmm $LogFileName = '{0}-{1}.csv' -f "AwsS3", $TimeStamp $LogFileName = Join-Path $LogPath $LogFileName Write-Log -Message "Starting ConfigAwsConnector at: $(Get-Date)" -LogFileName $LogFileName -Severity Information -LinePadding 2 Write-Log -Message "Log created: $LogFileName" -LogFileName $LogFileName -Severity Information -Indent 2 Write-Log -Message "To begin you will choose the AWS logs to configure." -LogFileName $LogFileName -Severity Information -LinePadding 2 # If LogType parameter was not specified, prompt the user to choose. if ($AwsLogType -eq "") { do { try { [ValidateSet("VPC","CloudTrail","GuardDuty", "CloudWatch", "CustomLog")]$AwsLogType = Read-ValidatedHost -Prompt "Please enter the AWS log type to configure (VPC, CloudTrail, GuardDuty, CloudWatch, CustomLog)" } catch{} } until ($?) } switch ($AwsLogType) { "VPC" {.\ConfigVpcFlowDataConnector.ps1; break} "CloudTrail" {.\ConfigCloudTrailDataConnector.ps1 ; break } "GuardDuty" {.\ConfigGuardDutyDataConnector.ps1 ; break } "CloudWatch" {.\ConfigCloudWatchDataConnector.ps1 ; break } "CustomLog" {.\ConfigCustomLogDataConnector.ps1 ; break } default {Write-Log -Message "Invalid log type" -LogFileName $LogFileName -Severity Error; exit} } Write-Host -NoNewLine `n`n'Press any key to continue...' $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown')
combined_dataset/train/non-malicious/sample_56_98.ps1
sample_56_98.ps1
# # Module manifest for module 'OCI.PSModules.Vault' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vault.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ba73e404-e836-4026-8200-8a6ebc3e6927' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vault Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vault.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVaultSecret', 'Get-OCIVaultSecretsList', 'Get-OCIVaultSecretVersion', 'Get-OCIVaultSecretVersionsList', 'Invoke-OCIVaultRotateSecret', 'Invoke-OCIVaultScheduleSecretDeletion', 'Invoke-OCIVaultScheduleSecretVersionDeletion', 'Move-OCIVaultSecretCompartment', 'New-OCIVaultSecret', 'Stop-OCIVaultSecretDeletion', 'Stop-OCIVaultSecretRotation', 'Stop-OCIVaultSecretVersionDeletion', 'Update-OCIVaultSecret' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vault' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Run-Query (SharePoint)_4.ps1
Run-Query (SharePoint)_4.ps1
function Run-Query($siteUrl, $queryText) { [reflection.assembly]::loadwithpartialname("microsoft.sharePOint") | out-null [reflection.assembly]::loadwithpartialname("microsoft.office.server") | out-null [reflection.assembly]::loadwithpartialname("microsoft.office.server.search") | out-null $s = [microsoft.sharepoint.spsite]$siteUrl $q = new-object microsoft.office.server.search.query.fulltextsqlquery -arg $s $q.querytext = $queryText $q.RowLimit = 100 $q.ResultTypes = "RelevantResults" $dt = $q.Execute() $r = $dt["RelevantResults"] $output = @() while ($r.Read()) { $o = new-object PSObject 0..($r.FieldCount-1) | foreach { add-member -inputObject $o -memberType "NoteProperty" -name $r.GetName($_) -value $r[$_].ToString() } $output += $o } return $output } @@ @@ @@#Sample usage: @@#Run-Query -siteUrl "http://dev/" -queryText "SELECT PreferredName, WorkPhone FROM SCOPE() WHERE ""scope""='People' AND PreferredName LIKE '%JIM%'" @@ @@
combined_dataset/train/non-malicious/2504.ps1
2504.ps1
[CmdletBinding()] param() cls [array]$Clients = @(); [array]$Clients = Invoke-SQLCMD -ServerInstance XUTILSQL2 -Database DexmaSites -Query "SELECT DISTINCT dv.dv_value AS DocServer , [ce].[DatabaseName] , [ce].[DatabaseServer] FROM [DexmaSites].dbo.[clients] AS c JOIN dexmaSites.dbo.client_data_xref cdx ON cdx.[cl_id] = c.[cl_id] JOIN dexmaSites.dbo.data_values dv ON cdx.dv_id = dv.dv_id JOIN dexmaSites.dbo.ClientEnvironment AS ce ON ce.[ClientID] = cdx.[cl_id] WHERE dv.di_id = 96 AND [ce].[EnvironmentID] = 13 ORDER BY [ce].[DatabaseName]" foreach ( $Client in $Clients ) { Write-Host "Beginning $($Client.DatabaseName)" -ForegroundColor DarkGray if (($Client.DocServer -eq "PADoc5") -or ($Client.DocServer -eq "PDocDirect10")) { Write-Verbose -Message "$($Client.DatabaseName) on $($Client.DocServer) has not been migrated to the new datacenter."; } else { Write-Verbose -Message "Beginning $($Client.DatabaseName)"; [array]$CopyFrom = @(); if (Test-Path -Path "\\PDocDirect10\$($Client.DatabaseName)") { Write-Verbose -Message "`t\\PDocDirect10\$($Client.DatabaseName) found, enumerating files(source)."; $CopyFrom += @(Get-ChildItem -path "\\PDocDirect10\$($Client.DatabaseName)\Billing\*" ) } if (Test-Path -Path "\\PADoc5\$($Client.DatabaseName)") { Write-Verbose -Message "`t\\PADoc5\$($Client.DatabaseName) folder found, enumerating files(source)."; $CopyFrom += @(Get-ChildItem -path "\\PADoc5\$($Client.DatabaseName)\Billing\*"); } $DestPath = "\\" + $Client.DocServer + "\" + $Client.DatabaseName + "\Billing"; [array]$CopyTo = @(); if (!(Test-Path -Path $DestPath)) { Write-Verbose -Message "`t$($DestPath) not found! Creating directory..."; New-Item -ItemType directory -Path $DestPath; if (!(Test-Path -Path $DestPath)) { Write-Verbose -Message "Failed creating $($DestPath)..."; continue; } else { Write-Verbose -Message "`t$($DestPath) created, enumerating files(dest)."; $CopyTo += @(Get-ChildItem -path "$DestPath\*"); } } else { Write-Verbose -Message "`t$($DestPath) found, enumerating files(dest)."; $CopyTo += @(Get-ChildItem -path "$DestPath\*"); } Write-Verbose -Message "`tComparing directory contents..."; $Files2Copy = Compare-Object -ReferenceObject $CopyFrom -DifferenceObject $CopyTo -Property name, length -PassThru | Where-Object {$_.SideIndicator -eq "<="}; if ($Files2Copy -ne $NULL) { foreach ($File in $Files2Copy) { Write-Verbose -Message "`tThis will copy File $($File.FullName) to $DestPath\$($File.Name)"; Copy-Item -Path $($File.FullName) -Destination $DestPath\$($File.Name) } } else { Write-Verbose -Message "`tNo files to copy for $($Client.DatabaseName)!"; } if ($Client.DocServer -eq "PDoc1") { $DropPath = "\\PDoc2\Relateprod\PrimeAlliance\" + $Client.DatabaseName + "\Billing"; } else { $DropPath = "\\PDoc1\Relateprod\PrimeAlliance\" + $Client.DatabaseName + "\Billing"; } if (Test-Path -Path $DropPath) { Write-Verbose -Message "`tDropping the $($DropPath) folder!"; Remove-Item -Recurse -Path $DropPath } else { Write-Verbose -Message "`tNo files to delete for $($Client.DatabaseName)!"; } Write-Verbose -Message "End $($Client.DatabaseName)"; } Write-Host "End $($Client.DatabaseName)" -ForegroundColor DarkGray }
combined_dataset/train/non-malicious/sample_7_63.ps1
sample_7_63.ps1
ConvertFrom-StringData @' id_adapterkb980486check=Checking 6to4 and physical adapters id_adapterkb980486checkdesc=Checking the number of 6to4 and physical adapters (KB 980486) '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDelKpUGGvRC0Ym # QzXXSwktyobma3eap5nGwNCbKf9b6KCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINVJ # NrHkV0e/rnV6ovXwQEOH1wY6RBAwqpvHItBymecpMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAm3XFZ2KOXTTqWabEJU2dpqVb0CzjWtOxEhFs # HDCGQBQkBtOdK/3bgMlDcNHgaagQhnVGJkVy+MZfpd5bmikvcqBcnC/UMdCAA/fY # Mj3lfD5emw3dJ8R82WSULLbvbQuUU+1k+6ZNsiydpY3e9HhWngmMSN1XyAUHdHJU # 524qD/UbRMnC4DBXJVnsYStnNxhb/OaJaXT3TtJP3lAAM9qSMaxdscRZLkak15ed # neiBkTdbwVhndHPV7Q8HGUZKM2AgFX8nui2OguzaMpeV9NOfAxn2kcFAIBSCBc8g # +F00Zn/PvV71eFtYPXFT1sf4hndDHhiCEhGPTajultwAXGYUvKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBKffctAO5NjwRpdgM8FvKQ6uzdA69cFvMh # fQqF3ivx4gIGZusyQ1cjGBMyMDI0MTAyODExNDA0MC4xNDZaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5 # aFrNDGHtAAEAAAH9MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjJEMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # oWWs+D+Ou4JjYnRHRedu0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQy # G2zpxYceTjIF7HiQWbt6FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+S # D0S+hTP1TCA/we38yZ3BEtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sK # ikeWDSnHQeTprO0zIm/btagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz # 7tURyiD3kOxNnw5ox1eZX/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6 # ++Wb6+1ltMCPoMJHUtPP3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk # 0IqxBDZgMoY+Ef7ffFRP2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x # /+QLE0pcSEh/XE1w1fcp6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0g # EDytapGn1ONjVkiKpVP2uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBH # dpl28+k+ZY6m4dPFnEoGcJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0 # oH7RKMQgmsy7CVD7v55dOhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTpDMXA4ZW8+yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAY9hYX+T5AmCrYGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+p # jlNv5XSXZrKGv8e4s5dJ5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSK # s2KlhYiqzbRe8QbMfKXEDtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/ # Zq+vO5523Jld6ssVuzs9uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTL # lOL8LpXooqnr+QLYE4BpUep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vS # heEkmjHA2zuM+Tgn4j5n+Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTO # fMqFa3Ab8KDKicmp0AthRNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUV # kSJ5Fo/ctfDSPdCTVaIXXF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/R # qTPvCyAhIxBVKfN/hfs4CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi # 6Guo+z3LPFl/exQaRubErsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs # +AOoWx24+XcyxpUkAajDhky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSK # oqtrjinRAsBUdoOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0 # MTAyOTA3NTMwM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEA # AgIJ5zAHAgEAAgISQjAKAgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQA/CC/LZ2oFgj4yM+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCW # F4kzzIktKGUnhyd/L3j7RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trn # zQMegLEIZHFbBaiR6h9j/oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fF # Mtqdncqg8a2hOSPYghtyl1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0un # mdz7ZrxHx5mL0kEArzE1Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6l # fDhbaf2LYZ2H/D5el6NP4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgW/Xtfh2nJNUYyNU+Zx+vicsICOLg/REyxUM52VbJtS8wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8l # RB4NRzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # /XP5aFrNDGHtAAEAAAH9MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FY # t/GwMA0GCSqGSIb3DQEBCwUABIICAJssQa/FxPn9SBfhic8qoyqAACatM1ZszB/o # BRXytEB2xbNnK6QKxcj/n0pvhGInLqKIf0c/zbfhsZEE/gMfZg7Pji50HK2xI4Zn # pWozfRmh3FHepXz5Z0yFhnjPSbXjRlNZeNrLC/MPzHO2uMXe4DeZh4E+X2+Epm+C # W32gEHazt6glhzlXqMwQr20/muWb9K6EvAXfBHro4oKybLPX73koaQ62LSqHqVsR # 5JbLMelWs4z4OZLx7ihDfQqrf16i7r5rWfHdrbe9rJf6ZGwAjHawcqjwheCaLdKl # e/rPQ0zk6dsRsnaeSBYpD9Cfo8QEBxOJHy4WZWXyMFPwk2tQju8rYOK/MnWiPguT # oYniDKe7a67a2qt5pAIgGR7QP5xGHxUCQ0s5x5w48/MGmdd+IaW1+BCdbk2UUbBj # b64gTGoPLeJuxcLW19GUJJeRSqcJMFZFN8Wl6LdNiWB4M21TV4mTdquMy+QLUsJa # h9U1nt7M5csN3SWVzLOtyf5zrKV5PuS1yq6iTfEJLmAT5NBxO0br4eWBJk6GwKuJ # 4SZ07ZVGl0G2vTnVb3xJ0btAXktHCCfmk8koBfX6Qnc9gLP0gtsL1xocWhsPniB/ # 5imazla9GDxQ3D9wgemUbzjYOLbBnuOzO2P7U0uQeuxM/TPx9GCRbpF01cqKsuRC # AIB3B40r # SIG # End signature block
combined_dataset/train/non-malicious/1798.ps1
1798.ps1
Describe "Get-ChildItem" -Tags "CI" { Context 'FileSystem provider' { BeforeAll { $item_a = "a3fe710a-31af-4834-bc29-d0b584589838" $item_B = "B1B691A9-B7B1-4584-AED7-5259511BEEC4" $item_c = "c283d143-2116-4809-bf11-4f7d61613f92" $item_D = "D39B4FD9-3E1D-4DD5-8718-22FE2C934CE3" $item_E = "EE150FEB-0F21-4AFF-8066-AF59E925810C" $item_F = ".F81D8514-8862-4227-B041-0529B1656A43" $item_G = "5560A62F-74F1-4FAE-9A23-F4EBD90D2676" $null = New-Item -Path $TestDrive -Name $item_a -ItemType "File" -Force $null = New-Item -Path $TestDrive -Name $item_B -ItemType "File" -Force $null = New-Item -Path $TestDrive -Name $item_c -ItemType "File" -Force $null = New-Item -Path $TestDrive -Name $item_D -ItemType "File" -Force $null = New-Item -Path $TestDrive -Name $item_E -ItemType "Directory" -Force $null = New-Item -Path $TestDrive -Name $item_F -ItemType "File" -Force | ForEach-Object {$_.Attributes = "hidden"} $null = New-Item -Path (Join-Path -Path $TestDrive -ChildPath $item_E) -Name $item_G -ItemType "File" -Force $searchRoot = Join-Path $TestDrive -ChildPath "TestPS" $file1 = Join-Path $searchRoot -ChildPath "D1" -AdditionalChildPath "File1.txt" $file2 = Join-Path $searchRoot -ChildPath "File1.txt" $PathWildCardTestCases = @( @{Parameters = @{Path = $searchRoot; Recurse = $true; Directory = $true }; ExpectedCount = 1; Title = "directory without wildcard"}, @{Parameters = @{Path = (Join-Path $searchRoot '*'); Recurse = $true; Directory = $true }; ExpectedCount = 1; Title = "directory with wildcard"}, @{Parameters = @{Path = $searchRoot; Recurse = $true; File = $true }; ExpectedCount = 1; Title = "file without wildcard"}, @{Parameters = @{Path = (Join-Path $searchRoot '*'); Recurse = $true; File = $true }; ExpectedCount = 1; Title = "file with wildcard"}, @{Parameters = @{Path = (Join-Path $searchRoot 'F*.txt'); Recurse = $true; File = $true }; ExpectedCount = 1; Title = "file with wildcard filename"} ) $SkipAppExeCLinks = $true if ($IsWindows -and (Get-ChildItem -Path ~\AppData\Local\Microsoft\WindowsApps\*.exe -ErrorAction Ignore) -ne $null) { $SkipAppExeCLinks = $false } } It "Should list the contents of the current folder" { (Get-ChildItem .).Name.Length | Should -BeGreaterThan 0 } It "Should list the contents of the root folder using Drive:\ notation" { (Get-ChildItem TestDrive:\).Name.Length | Should -BeGreaterThan 0 } It "Should list the contents of the root folder using Drive:\ notation from within another folder" { try { Push-Location -Path TestDrive:\$item_E (Get-ChildItem TestDrive:\ -File).Name.Length | Should -BeExactly 4 } finally { Pop-Location } } It "Should list the contents of the current folder using Drive: notation when in the root" { (Get-ChildItem TestDrive:).Name.Length | Should -BeGreaterThan 0 } It "Should list the contents of the current folder using Drive: notation when not in the root" { try { Push-Location -Path TestDrive:\$item_E (Get-ChildItem TestDrive:).Name | Should -BeExactly $item_G } finally { Pop-Location } } It "Should list the contents of the home directory" { Push-Location $HOME (Get-ChildItem .).Name.Length | Should -BeGreaterThan 0 Pop-Location } It "Should have all the proper fields and be populated" { $var = Get-Childitem . $var.Name.Length | Should -BeGreaterThan 0 $var.Mode.Length | Should -BeGreaterThan 0 $var.LastWriteTime | Should -BeGreaterThan 0 $var.Length.Length | Should -BeGreaterThan 0 } It "Should have mode property populated for protected files on Windows" -Skip:(!$IsWindows) { $files = Get-Childitem -Force ~\NT* $files.Count | Should -BeGreaterThan 0 foreach ($file in $files) { $file.Mode | Should -Not -BeNullOrEmpty } } It "Should list files in sorted order" { $files = Get-ChildItem -Path $TestDrive $files[0].Name | Should -Be $item_E $files[1].Name | Should -Be $item_a $files[2].Name | Should -Be $item_B $files[3].Name | Should -Be $item_c $files[4].Name | Should -Be $item_D } It "Should list hidden files as well when 'Force' parameter is used" { $files = Get-ChildItem -path $TestDrive -Force $files | Should -Not -BeNullOrEmpty $files.Count | Should -Be 6 $files.Name.Contains($item_F) | Should -BeTrue } It "Should list only hidden files when 'Hidden' parameter is used" { $files = Get-ChildItem -path $TestDrive -Hidden $files | Should -Not -BeNullOrEmpty $files.Count | Should -Be 1 $files[0].Name | Should -BeExactly $item_F } It "Should find the hidden file if specified with hidden switch" { $file = Get-ChildItem -Path (Join-Path $TestDrive $item_F) -Hidden $file | Should -Not -BeNullOrEmpty $file.Count | Should -Be 1 $file.Name | Should -BeExactly $item_F } It "Should list items in current directory only with depth set to 0" { (Get-ChildItem -Path $TestDrive -Depth 0).Count | Should -Be 5 (Get-ChildItem -Path $TestDrive -Depth 0 -Include *).Count | Should -Be 5 (Get-ChildItem -Path $TestDrive -Depth 0 -Exclude IntentionallyNonexistent).Count | Should -Be 5 } It "Should return items recursively when using 'Include' or 'Exclude' parameters" { (Get-ChildItem -Path $TestDrive -Depth 1).Count | Should -Be 6 (Get-ChildItem -Path $TestDrive -Depth 1 -Include $item_G).Count | Should -Be 1 (Get-ChildItem -Path $TestDrive -Depth 1 -Exclude $item_a).Count | Should -Be 5 } It "Should return items recursively when using 'Include' or 'Exclude' parameters with -LiteralPath" { (Get-ChildItem -LiteralPath $TestDrive -Recurse -Exclude *).Count | Should Be 0 (Get-ChildItem -LiteralPath $TestDrive -Recurse -Include *.dll).Count | Should Be (Get-ChildItem $TestDrive -Recurse -Include *.dll).Count (Get-ChildItem -LiteralPath $TestDrive -Depth 1 -Include $item_G).Count | Should Be 1 (Get-ChildItem -LiteralPath $TestDrive -Depth 1 -Exclude $item_a).Count | Should Be 5 } It "get-childitem path wildcard - <title>" -TestCases $PathWildCardTestCases { param($Parameters, $ExpectedCount) $null = New-Item $file1 -Force -ItemType File (Get-ChildItem @Parameters).Count | Should -Be $ExpectedCount } It "get-childitem with and without file in search root" { $null = New-Item $file2 -Force -ItemType File (Get-ChildItem -Path $searchRoot -File -Recurse).Count | Should -Be 2 (Get-ChildItem -Path $searchRoot -Directory -Recurse).Count | Should -Be 1 Remove-Item $file2 -ErrorAction SilentlyContinue -Force (Get-ChildItem -Path $searchRoot -File -Recurse).Count | Should -Be 1 (Get-ChildItem -Path $searchRoot -Directory -Recurse).Count | Should -Be 1 } It "Should give .sys file if the fullpath is specified with hidden and force parameter" -Pending { $file = Get-ChildItem -path "$env:SystemDrive\\pagefile.sys" -Hidden $file | Should not be $null $file.Count | Should be 1 $file.Name | Should be "pagefile.sys" } It "-Filter *. finds extension-less files" { $null = New-Item -Path TestDrive:/noextension -ItemType File (Get-ChildItem -File -LiteralPath TestDrive:/ -Filter noext*.*).Name | Should -BeExactly 'noextension' } It "Understand APPEXECLINKs" -Skip:($SkipAppExeCLinks) { $app = Get-ChildItem -Path ~\appdata\local\microsoft\windowsapps\*.exe | Select-Object -First 1 $app.Target | Should -Not -Be $app.FullName $app.LinkType | Should -BeExactly 'AppExeCLink' } It "Wildcard matching behavior is the same between -Path and -Include parameters when using escape characters" { $oldLocation = Get-Location try { Set-Location $TestDrive $expectedPath = 'a`[b]' $escapedPath = 'a```[b`]' New-Item -Type File $expectedPath -ErrorAction SilentlyContinue > $null $WithInclude = Get-ChildItem * -Include $escapedPath $WithPath = Get-ChildItem -Path $escapedPath $WithInclude.Name | Should -BeExactly $expectedPath $WithPath.Name | Should -BeExactly $expectedPath } finally { Set-Location $oldLocation } } } Context 'Env: Provider' { It 'can handle mixed case in Env variables' { try { $env:__FOOBAR = 'foo' $env:__foobar = 'bar' $foobar = Get-Childitem env: | Where-Object {$_.Name -eq '__foobar'} $count = if ($IsWindows) { 1 } else { 2 } ($foobar | Measure-Object).Count | Should -Be $count } catch { Get-ChildItem env: | Where-Object {$_.Name -eq '__foobar'} | Remove-Item -ErrorAction SilentlyContinue } } } } Describe "Get-ChildItem with special path" -Tags "CI" { BeforeAll { $bracketDirName = "Test[Dir]" $bracketDir = "Test``[Dir``]" $bracketPath = Join-Path $TestDrive $bracketDir $null = New-Item -Path $TestDrive -Name $bracketDirName -ItemType Directory -Force } It "Should list files in directory with name containing bracket char" { $null = New-Item -Path $bracketPath -Name file1.txt -ItemType File $null = New-Item -Path $bracketPath -Name file2.txt -ItemType File Get-ChildItem -Path $bracketPath | Should -HaveCount 2 } } Describe 'FileSystem Provider Formatting' -Tag "CI","RequireAdminOnWindows" { BeforeAll { $modeTestDir = New-Item -Path "$TestDrive/testmodedirectory" -ItemType Directory -Force $targetFile1 = New-Item -Path "$TestDrive/targetFile1" -ItemType File -Force $targetFile2 = New-Item -Path "$TestDrive/targetFile2" -ItemType File -Force $targetDir1 = New-Item -Path "$TestDrive/targetDir1" -ItemType Directory -Force $targetDir2 = New-Item -Path "$TestDrive/targetDir2" -ItemType Directory -Force $testcases = @( @{ expectedMode = "d----"; expectedModeWithoutHardlink = "d----"; itemType = "Directory"; itemName = "Directory"; fileAttributes = [System.IO.FileAttributes] "Directory"; target = $null } @{ expectedMode = "l----"; expectedModeWithoutHardlink = "l----"; itemType = "SymbolicLink"; itemName = "SymbolicLink-Directory"; fileAttributes = [System.IO.FileAttributes]::Directory -bor [System.IO.FileAttributes]::ReparsePoint; target = $targetDir2.FullName } ) if ($IsWindows) { $testcases += @{ expectedMode = "l----"; expectedModeWithoutHardlink = "l----"; itemType = "Junction"; itemName = "Junction-Directory"; fileAttributes = [System.IO.FileAttributes]::Directory -bor [System.IO.FileAttributes]::ReparsePoint; target = $targetDir1.FullName } $testcases += @{ expectedMode = "-a---"; expectedModeWithoutHardlink = "-a---"; itemType = "File"; itemName = "ArchiveFile"; fileAttributes = [System.IO.FileAttributes] "Archive"; target = $null } $testcases += @{ expectedMode = "la---"; expectedModeWithoutHardlink = "la---"; itemType = "SymbolicLink"; itemName = "SymbolicLink-File"; fileAttributes = [System.IO.FileAttributes]::Archive -bor [System.IO.FileAttributes]::ReparsePoint; target = $targetFile1.FullName } $testcases += @{ expectedMode = "la---"; expectedModeWithoutHardlink = "-a---"; itemType = "HardLink"; itemName = "HardLink"; fileAttributes = [System.IO.FileAttributes] "Archive"; target = $targetFile2.FullName } } } It 'Validate Mode property - <itemName>' -TestCases $testcases { param($expectedMode, $expectedModeWithoutHardlink, $itemType, $itemName, $fileAttributes, $target) $item = if ($target) { New-Item -Path $modeTestDir -Name $itemName -ItemType $itemType -Target $target } else { New-Item -Path $modeTestDir -Name $itemName -ItemType $itemType } $item | Should -BeOfType "System.IO.FileSystemInfo" $actualMode = [Microsoft.PowerShell.Commands.FileSystemProvider]::Mode($item) $actualMode | Should -BeExactly $expectedMode $actualModeWithoutHardlink = [Microsoft.PowerShell.Commands.FileSystemProvider]::ModeWithoutHardlink($item) $actualModeWithoutHardlink | Should -BeExactly $expectedModeWithoutHardlink $item.Attributes | Should -Be $fileAttributes } }
combined_dataset/train/non-malicious/sample_28_8.ps1
sample_28_8.ps1
# # Module manifest for module 'OCI.PSModules.Workrequests' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Workrequests.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'bfd147d7-2910-4621-842b-b948c79cda01' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Workrequests Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Workrequests.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWorkrequestsList', 'Get-OCIWorkrequestsWorkRequest', 'Get-OCIWorkrequestsWorkRequestErrorsList', 'Get-OCIWorkrequestsWorkRequestLogsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Workrequests' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2594.ps1
2594.ps1
param($Path = "C:\Users\mmessano\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows PowerShell.lnk" ) $Black = 0 $DarkBlue = 1 $DarkGreen = 2 $DarkCyan = 3 $DarkRed = 4 $DarkMagenta = 5 $DarkYellow = 6 $Gray = 7 $DarkGray = 8 $Blue = 9 $Green = 10 $Cyan = 11 $Red = 12 $Magenta = 13 $Yellow = 14 $White = 15 $lnk = E:\Dexma\powershell_bits\Get-Link.ps1 $Path $lnk.ConsoleColors[$Black] = " $lnk.ConsoleColors[$DarkBlue] = " $lnk.ConsoleColors[$DarkGreen] = " $lnk.ConsoleColors[$DarkCyan] = " $lnk.ConsoleColors[$DarkRed] = " $lnk.ConsoleColors[$DarkMagenta] = " $lnk.ConsoleColors[$DarkYellow] = " $lnk.ConsoleColors[$Gray] = " $lnk.ConsoleColors[$DarkGray] = " $lnk.ConsoleColors[$Blue] = " $lnk.ConsoleColors[$Green] = " $lnk.ConsoleColors[$Cyan] = " $lnk.ConsoleColors[$Red] = " $lnk.ConsoleColors[$Magenta] = " $lnk.ConsoleColors[$Yellow] = " $lnk.ConsoleColors[$White] = " $lnk.Save()
combined_dataset/train/non-malicious/1392.ps1
1392.ps1
function Set-CDotNetConnectionString { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [string] $Name, [Parameter(Mandatory=$true)] [string] $Value, [string] $ProviderName, [Switch] $Framework, [Switch] $Framework64, [Switch] $Clr2, [Switch] $Clr4 ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not ($Framework -or $Framework64) ) { Write-Error "You must supply either or both of the Framework and Framework64 switches." return } if( -not ($Clr2 -or $Clr4) ) { Write-Error "You must supply either or both of the Clr2 and Clr4 switches." return } $runtimes = @() if( $Clr2 ) { $runtimes += 'v2.0' } if( $Clr4 ) { $runtimes += 'v4.0' } $runtimes | ForEach-Object { $params = @{ FilePath = (Join-Path $CarbonBinDir 'Set-DotNetConnectionString.ps1' -Resolve); ArgumentList = @( (ConvertTo-CBase64 -Value $Name), (ConvertTo-CBase64 -Value $Value), (ConvertTo-CBase64 -Value $ProviderName) ); Runtime = $_; ExecutionPolicy = [Microsoft.PowerShell.ExecutionPolicy]::RemoteSigned; } if( $Framework ) { Invoke-CPowerShell @params -x86 } if( $Framework64 ) { Invoke-CPowerShell @params } } }
combined_dataset/train/non-malicious/3901.ps1
3901.ps1
function Test-RemoveComputeNodes { param([string]$poolId) $context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext $deallocationOption = ([Microsoft.Azure.Batch.Common.ComputeNodeRebootOption]::Terminate) $resizeTimeout = ([TimeSpan]::FromMinutes(8)) $computeNodes = Get-AzBatchComputeNode -PoolId $poolId -BatchContext $context $computeNodeId = $computeNodes[0].Id $computeNodeId2 = $computeNodes[1].Id Remove-AzBatchComputeNode -PoolId $poolId @($computeNodeId, $computeNodeId2) -Force -BatchContext $context $select = "id,state" $computeNodes = Get-AzBatchComputeNode -PoolId $poolId -Select $select -BatchContext $context $start = [DateTime]::Now $timeout = Compute-TestTimeout 30 $end = $start.AddSeconds($timeout) while ($computeNodes[0].State -ne 'LeavingPool' -and $computeNodes[1].State -ne 'LeavingPool') { if ([DateTime]::Now -gt $end) { throw [System.TimeoutException] "Timed out waiting for compute nodes to enter LeavingPool state" } Start-TestSleep 1000 $computeNodes = Get-AzBatchComputeNode -PoolId $poolId -Select $select -BatchContext $context } } function Test-RebootAndReimageComputeNode { param([string]$poolId, [string]$computeNodeId, [string]$computeNodeId2) $context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext $rebootOption = ([Microsoft.Azure.Batch.Common.ComputeNodeRebootOption]::Terminate) $reimageOption = ([Microsoft.Azure.Batch.Common.ComputeNodeReimageOption]::Terminate) Get-AzBatchComputeNode $poolId $computeNodeId -BatchContext $context | Restart-AzBatchComputeNode -RebootOption $rebootOption -BatchContext $context $computeNode = Get-AzBatchComputeNode -PoolId $poolId $computeNodeId -BatchContext $context Assert-AreEqual 'Rebooting' $computeNode.State Get-AzBatchComputeNode $poolId $computeNodeId2 -BatchContext $context | Reset-AzBatchComputeNode -ReimageOption $reimageOption -BatchContext $context $computeNode2 = Get-AzBatchComputeNode -PoolId $poolId $computeNodeId2 -BatchContext $context Assert-AreEqual 'Reimaging' $computeNode2.State } function Test-DisableAndEnableComputeNodeScheduling { param([string]$poolId, [string]$computeNodeId) $context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext $disableOption = ([Microsoft.Azure.Batch.Common.DisableComputeNodeSchedulingOption]::Terminate) Get-AzBatchComputeNode $poolId $computeNodeId -BatchContext $context | Disable-AzBatchComputeNodeScheduling -DisableSchedulingOption $disableOption -BatchContext $context $computeNode = Get-AzBatchComputeNode -PoolId $poolId $computeNodeId -Select "id,schedulingState" -BatchContext $context Assert-AreEqual 'Disabled' $computeNode.SchedulingState $computeNode | Enable-AzBatchComputeNodeScheduling -BatchContext $context $computeNode = Get-AzBatchComputeNode -PoolId $poolId $computeNodeId -Select "id,schedulingState" -BatchContext $context Assert-AreEqual 'Enabled' $computeNode.SchedulingState } function Test-GetRemoteLoginSettings { param([string]$poolId, [string]$computeNodeId) $context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext $remoteLoginSettings = Get-AzBatchComputeNode $poolId $computeNodeId -BatchContext $context | Get-AzBatchRemoteLoginSettings -BatchContext $context Assert-AreNotEqual $null $remoteLoginSettings.IPAddress Assert-AreNotEqual $null $remoteLoginSettings.Port }
combined_dataset/train/non-malicious/2760.ps1
2760.ps1
function Get-LogonSession { param ( [Parameter(Mandatory = $true)] [UInt32] $LogonId ) $LogonMap = @{} Get-WmiObject Win32_LoggedOnUser | %{ $Identity = $_.Antecedent | Select-String 'Domain="(.*)",Name="(.*)"' $LogonSession = $_.Dependent | Select-String 'LogonId="(\d+)"' $LogonMap[$LogonSession.Matches[0].Groups[1].Value] = New-Object PSObject -Property @{ Domain = $Identity.Matches[0].Groups[1].Value UserName = $Identity.Matches[0].Groups[2].Value } } Get-WmiObject Win32_LogonSession -Filter "LogonId = `"$($LogonId)`"" | %{ $LogonType = $Null switch($_.LogonType) { $null {$LogonType = 'None'} 0 { $LogonType = 'System' } 2 { $LogonType = 'Interactive' } 3 { $LogonType = 'Network' } 4 { $LogonType = 'Batch' } 5 { $LogonType = 'Service' } 6 { $LogonType = 'Proxy' } 7 { $LogonType = 'Unlock' } 8 { $LogonType = 'NetworkCleartext' } 9 { $LogonType = 'NewCredentials' } 10 { $LogonType = 'RemoteInteractive' } 11 { $LogonType = 'CachedInteractive' } 12 { $LogonType = 'CachedRemoteInteractive' } 13 { $LogonType = 'CachedUnlock' } default { $LogonType = $_.LogonType} } New-Object PSObject -Property @{ UserName = $LogonMap[$_.LogonId].UserName Domain = $LogonMap[$_.LogonId].Domain LogonId = $_.LogonId LogonType = $LogonType AuthenticationPackage = $_.AuthenticationPackage Caption = $_.Caption Description = $_.Description InstallDate = $_.InstallDate Name = $_.Name StartTime = $_.ConvertToDateTime($_.StartTime) } } } function New-InMemoryModule { Param ( [Parameter(Position = 0)] [ValidateNotNullOrEmpty()] [String] $ModuleName = [Guid]::NewGuid().ToString() ) $AppDomain = [Reflection.Assembly].Assembly.GetType('System.AppDomain').GetProperty('CurrentDomain').GetValue($null, @()) $LoadedAssemblies = $AppDomain.GetAssemblies() foreach ($Assembly in $LoadedAssemblies) { if ($Assembly.FullName -and ($Assembly.FullName.Split(',')[0] -eq $ModuleName)) { return $Assembly } } $DynAssembly = New-Object Reflection.AssemblyName($ModuleName) $Domain = $AppDomain $AssemblyBuilder = $Domain.DefineDynamicAssembly($DynAssembly, 'Run') $ModuleBuilder = $AssemblyBuilder.DefineDynamicModule($ModuleName, $False) return $ModuleBuilder } function func { Param ( [Parameter(Position = 0, Mandatory = $True)] [String] $DllName, [Parameter(Position = 1, Mandatory = $True)] [string] $FunctionName, [Parameter(Position = 2, Mandatory = $True)] [Type] $ReturnType, [Parameter(Position = 3)] [Type[]] $ParameterTypes, [Parameter(Position = 4)] [Runtime.InteropServices.CallingConvention] $NativeCallingConvention, [Parameter(Position = 5)] [Runtime.InteropServices.CharSet] $Charset, [String] $EntryPoint, [Switch] $SetLastError ) $Properties = @{ DllName = $DllName FunctionName = $FunctionName ReturnType = $ReturnType } if ($ParameterTypes) { $Properties['ParameterTypes'] = $ParameterTypes } if ($NativeCallingConvention) { $Properties['NativeCallingConvention'] = $NativeCallingConvention } if ($Charset) { $Properties['Charset'] = $Charset } if ($SetLastError) { $Properties['SetLastError'] = $SetLastError } if ($EntryPoint) { $Properties['EntryPoint'] = $EntryPoint } New-Object PSObject -Property $Properties } function Add-Win32Type { [OutputType([Hashtable])] Param( [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [String] $DllName, [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [String] $FunctionName, [Parameter(ValueFromPipelineByPropertyName = $True)] [String] $EntryPoint, [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [Type] $ReturnType, [Parameter(ValueFromPipelineByPropertyName = $True)] [Type[]] $ParameterTypes, [Parameter(ValueFromPipelineByPropertyName = $True)] [Runtime.InteropServices.CallingConvention] $NativeCallingConvention = [Runtime.InteropServices.CallingConvention]::StdCall, [Parameter(ValueFromPipelineByPropertyName = $True)] [Runtime.InteropServices.CharSet] $Charset = [Runtime.InteropServices.CharSet]::Auto, [Parameter(ValueFromPipelineByPropertyName = $True)] [Switch] $SetLastError, [Parameter(Mandatory = $True)] [ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] $Module, [ValidateNotNull()] [String] $Namespace = '' ) BEGIN { $TypeHash = @{} } PROCESS { if ($Module -is [Reflection.Assembly]) { if ($Namespace) { $TypeHash[$DllName] = $Module.GetType("$Namespace.$DllName") } else { $TypeHash[$DllName] = $Module.GetType($DllName) } } else { if (!$TypeHash.ContainsKey($DllName)) { if ($Namespace) { $TypeHash[$DllName] = $Module.DefineType("$Namespace.$DllName", 'Public,BeforeFieldInit') } else { $TypeHash[$DllName] = $Module.DefineType($DllName, 'Public,BeforeFieldInit') } } $Method = $TypeHash[$DllName].DefineMethod( $FunctionName, 'Public,Static,PinvokeImpl', $ReturnType, $ParameterTypes) $i = 1 foreach($Parameter in $ParameterTypes) { if ($Parameter.IsByRef) { [void] $Method.DefineParameter($i, 'Out', $null) } $i++ } $DllImport = [Runtime.InteropServices.DllImportAttribute] $SetLastErrorField = $DllImport.GetField('SetLastError') $CallingConventionField = $DllImport.GetField('CallingConvention') $CharsetField = $DllImport.GetField('CharSet') $EntryPointField = $DllImport.GetField('EntryPoint') if ($SetLastError) { $SLEValue = $True } else { $SLEValue = $False } if ($PSBoundParameters['EntryPoint']) { $ExportedFuncName = $EntryPoint } else { $ExportedFuncName = $FunctionName } $Constructor = [Runtime.InteropServices.DllImportAttribute].GetConstructor([String]) $DllImportAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($Constructor, $DllName, [Reflection.PropertyInfo[]] @(), [Object[]] @(), [Reflection.FieldInfo[]] @($SetLastErrorField, $CallingConventionField, $CharsetField, $EntryPointField), [Object[]] @($SLEValue, ([Runtime.InteropServices.CallingConvention] $NativeCallingConvention), ([Runtime.InteropServices.CharSet] $Charset), $ExportedFuncName)) $Method.SetCustomAttribute($DllImportAttribute) } } END { if ($Module -is [Reflection.Assembly]) { return $TypeHash } $ReturnTypes = @{} foreach ($Key in $TypeHash.Keys) { $Type = $TypeHash[$Key].CreateType() $ReturnTypes[$Key] = $Type } return $ReturnTypes } } function psenum { [OutputType([Type])] Param ( [Parameter(Position = 0, Mandatory = $True)] [ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] $Module, [Parameter(Position = 1, Mandatory = $True)] [ValidateNotNullOrEmpty()] [String] $FullName, [Parameter(Position = 2, Mandatory = $True)] [Type] $Type, [Parameter(Position = 3, Mandatory = $True)] [ValidateNotNullOrEmpty()] [Hashtable] $EnumElements, [Switch] $Bitfield ) if ($Module -is [Reflection.Assembly]) { return ($Module.GetType($FullName)) } $EnumType = $Type -as [Type] $EnumBuilder = $Module.DefineEnum($FullName, 'Public', $EnumType) if ($Bitfield) { $FlagsConstructor = [FlagsAttribute].GetConstructor(@()) $FlagsCustomAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($FlagsConstructor, @()) $EnumBuilder.SetCustomAttribute($FlagsCustomAttribute) } foreach ($Key in $EnumElements.Keys) { $null = $EnumBuilder.DefineLiteral($Key, $EnumElements[$Key] -as $EnumType) } $EnumBuilder.CreateType() } function field { Param ( [Parameter(Position = 0, Mandatory = $True)] [UInt16] $Position, [Parameter(Position = 1, Mandatory = $True)] [Type] $Type, [Parameter(Position = 2)] [UInt16] $Offset, [Object[]] $MarshalAs ) @{ Position = $Position Type = $Type -as [Type] Offset = $Offset MarshalAs = $MarshalAs } } function struct { [OutputType([Type])] Param ( [Parameter(Position = 1, Mandatory = $True)] [ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] $Module, [Parameter(Position = 2, Mandatory = $True)] [ValidateNotNullOrEmpty()] [String] $FullName, [Parameter(Position = 3, Mandatory = $True)] [ValidateNotNullOrEmpty()] [Hashtable] $StructFields, [Reflection.Emit.PackingSize] $PackingSize = [Reflection.Emit.PackingSize]::Unspecified, [Switch] $ExplicitLayout ) if ($Module -is [Reflection.Assembly]) { return ($Module.GetType($FullName)) } [Reflection.TypeAttributes] $StructAttributes = 'AnsiClass, Class, Public, Sealed, BeforeFieldInit' if ($ExplicitLayout) { $StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::ExplicitLayout } else { $StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::SequentialLayout } $StructBuilder = $Module.DefineType($FullName, $StructAttributes, [ValueType], $PackingSize) $ConstructorInfo = [Runtime.InteropServices.MarshalAsAttribute].GetConstructors()[0] $SizeConst = @([Runtime.InteropServices.MarshalAsAttribute].GetField('SizeConst')) $Fields = New-Object Hashtable[]($StructFields.Count) foreach ($Field in $StructFields.Keys) { $Index = $StructFields[$Field]['Position'] $Fields[$Index] = @{FieldName = $Field; Properties = $StructFields[$Field]} } foreach ($Field in $Fields) { $FieldName = $Field['FieldName'] $FieldProp = $Field['Properties'] $Offset = $FieldProp['Offset'] $Type = $FieldProp['Type'] $MarshalAs = $FieldProp['MarshalAs'] $NewField = $StructBuilder.DefineField($FieldName, $Type, 'Public') if ($MarshalAs) { $UnmanagedType = $MarshalAs[0] -as ([Runtime.InteropServices.UnmanagedType]) if ($MarshalAs[1]) { $Size = $MarshalAs[1] $AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo, $UnmanagedType, $SizeConst, @($Size)) } else { $AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo, [Object[]] @($UnmanagedType)) } $NewField.SetCustomAttribute($AttribBuilder) } if ($ExplicitLayout) { $NewField.SetOffset($Offset) } } $SizeMethod = $StructBuilder.DefineMethod('GetSize', 'Public, Static', [Int], [Type[]] @()) $ILGenerator = $SizeMethod.GetILGenerator() $ILGenerator.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder) $ILGenerator.Emit([Reflection.Emit.OpCodes]::Call, [Type].GetMethod('GetTypeFromHandle')) $ILGenerator.Emit([Reflection.Emit.OpCodes]::Call, [Runtime.InteropServices.Marshal].GetMethod('SizeOf', [Type[]] @([Type]))) $ILGenerator.Emit([Reflection.Emit.OpCodes]::Ret) $ImplicitConverter = $StructBuilder.DefineMethod('op_Implicit', 'PrivateScope, Public, Static, HideBySig, SpecialName', $StructBuilder, [Type[]] @([IntPtr])) $ILGenerator2 = $ImplicitConverter.GetILGenerator() $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Nop) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldarg_0) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call, [Type].GetMethod('GetTypeFromHandle')) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call, [Runtime.InteropServices.Marshal].GetMethod('PtrToStructure', [Type[]] @([IntPtr], [Type]))) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Unbox_Any, $StructBuilder) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ret) $StructBuilder.CreateType() } $Mod = New-InMemoryModule -ModuleName Thread $LuidAttributes = psenum $Mod Thread.LuidAttributes UInt32 @{ DISABLED = '0x00000000' SE_PRIVILEGE_ENABLED_BY_DEFAULT = '0x00000001' SE_PRIVILEGE_ENABLED = '0x00000002' SE_PRIVILEGE_REMOVED = '0x00000004' SE_PRIVILEGE_USED_FOR_ACCESS = '0x80000000' } -Bitfield $MemProtection = psenum $Mod Thread.MemProtection UInt32 @{ PAGE_EXECUTE = 0x10 PAGE_EXECUTE_READ = 0x20 PAGE_EXECUTE_READWRITE = 0x40 PAGE_EXECUTE_WRITECOPY = 0x80 PAGE_NOACCESS = 0x01 PAGE_READONLY = 0x02 PAGE_READWRITE = 0x04 PAGE_WRITECOPY = 0x08 PAGE_TARGETS_INVALID = 0x40000000 PAGE_TARGETS_NO_UPDATE = 0x40000000 PAGE_GUARD = 0x100 PAGE_NOCACHE = 0x200 PAGE_WRITECOMBINE = 0x400 } -Bitfield $MemState = psenum $Mod Thread.MemState UInt32 @{ MEM_COMMIT = 0x1000 MEM_RESERVE = 0x2000 MEM_FREE = 0x10000 } $MemType = psenum $Mod Thread.MemType UInt32 @{ MEM_PRIVATE = 0x20000 MEM_MAPPED = 0x40000 MEM_IMAGE = 0x1000000 } $SecurityEntity = psenum $Mod Thread.SecurityEntity UInt32 @{ SeCreateTokenPrivilege = 1 SeAssignPrimaryTokenPrivilege = 2 SeLockMemoryPrivilege = 3 SeIncreaseQuotaPrivilege = 4 SeUnsolicitedInputPrivilege = 5 SeMachineAccountPrivilege = 6 SeTcbPrivilege = 7 SeSecurityPrivilege = 8 SeTakeOwnershipPrivilege = 9 SeLoadDriverPrivilege = 10 SeSystemProfilePrivilege = 11 SeSystemtimePrivilege = 12 SeProfileSingleProcessPrivilege = 13 SeIncreaseBasePriorityPrivilege = 14 SeCreatePagefilePrivilege = 15 SeCreatePermanentPrivilege = 16 SeBackupPrivilege = 17 SeRestorePrivilege = 18 SeShutdownPrivilege = 19 SeDebugPrivilege = 20 SeAuditPrivilege = 21 SeSystemEnvironmentPrivilege = 22 SeChangeNotifyPrivilege = 23 SeRemoteShutdownPrivilege = 24 SeUndockPrivilege = 25 SeSyncAgentPrivilege = 26 SeEnableDelegationPrivilege = 27 SeManageVolumePrivilege = 28 SeImpersonatePrivilege = 29 SeCreateGlobalPrivilege = 30 SeTrustedCredManAccessPrivilege = 31 SeRelabelPrivilege = 32 SeIncreaseWorkingSetPrivilege = 33 SeTimeZonePrivilege = 34 SeCreateSymbolicLinkPrivilege = 35 } $SidNameUser = psenum $Mod Thread.SID_NAME_USE UInt32 @{ SidTypeUser = 1 SidTypeGroup = 2 SidTypeDomain = 3 SidTypeAlias = 4 SidTypeWellKnownGroup = 5 SidTypeDeletedAccount = 6 SidTypeInvalid = 7 SidTypeUnknown = 8 SidTypeComputer = 9 } $TokenInformationClass = psenum $Mod Thread.TOKEN_INFORMATION_CLASS UInt16 @{ TokenUser = 1 TokenGroups = 2 TokenPrivileges = 3 TokenOwner = 4 TokenPrimaryGroup = 5 TokenDefaultDacl = 6 TokenSource = 7 TokenType = 8 TokenImpersonationLevel = 9 TokenStatistics = 10 TokenRestrictedSids = 11 TokenSessionId = 12 TokenGroupsAndPrivileges = 13 TokenSessionReference = 14 TokenSandBoxInert = 15 TokenAuditPolicy = 16 TokenOrigin = 17 TokenElevationType = 18 TokenLinkedToken = 19 TokenElevation = 20 TokenHasRestrictions = 21 TokenAccessInformation = 22 TokenVirtualizationAllowed = 23 TokenVirtualizationEnabled = 24 TokenIntegrityLevel = 25 TokenUIAccess = 26 TokenMandatoryPolicy = 27 TokenLogonSid = 28 TokenIsAppContainer = 29 TokenCapabilities = 30 TokenAppContainerSid = 31 TokenAppContainerNumber = 32 TokenUserClaimAttributes = 33 TokenDeviceClaimAttributes = 34 TokenRestrictedUserClaimAttributes = 35 TokenRestrictedDeviceClaimAttributes = 36 TokenDeviceGroups = 37 TokenRestrictedDeviceGroups = 38 TokenSecurityAttributes = 39 TokenIsRestricted = 40 MaxTokenInfoClass = 41 } $LUID = struct $Mod Thread.Luid @{ LowPart = field 0 $SecurityEntity HighPart = field 1 Int32 } $LUID_AND_ATTRIBUTES = struct $Mod Thread.LuidAndAttributes @{ Luid = field 0 $LUID Attributes = field 1 UInt32 } $MEMORYBASICINFORMATION = struct $Mod Thread.MEMORY_BASIC_INFORMATION @{ BaseAddress = field 0 UIntPtr AllocationBase = field 1 UIntPtr AllocationProtect = field 2 UInt32 RegionSize = field 3 UIntPtr State = field 4 UInt32 Protect = field 5 UInt32 Type = field 6 UInt32 } $SID_AND_ATTRIBUTES = struct $Mod Thread.SidAndAttributes @{ Sid = field 0 IntPtr Attributes = field 1 UInt32 } $THREADENTRY32 = struct $Mod Thread.THREADENTRY32 @{ dwSize = field 0 UInt32 cntUsage = field 1 UInt32 th32ThreadID = field 2 UInt32 th32OwnerProcessID = field 3 UInt32 tpBasePri = field 4 UInt32 tpDeltaPri = field 5 UInt32 dwFlags = field 6 UInt32 } $TOKEN_MANDATORY_LABEL = struct $Mod Thread.TokenMandatoryLabel @{ Label = field 0 $SID_AND_ATTRIBUTES; } $TOKEN_ORIGIN = struct $Mod Thread.TokenOrigin @{ OriginatingLogonSession = field 0 UInt64 } $TOKEN_PRIVILEGES = struct $Mod Thread.TokenPrivileges @{ PrivilegeCount = field 0 UInt32 Privileges = field 1 $LUID_AND_ATTRIBUTES.MakeArrayType() -MarshalAs @('ByValArray', 50) } $TOKEN_USER = struct $Mod Thread.TOKEN_USER @{ User = field 0 $SID_AND_ATTRIBUTES } $FunctionDefinitions = @( (func kernel32 CloseHandle ([bool]) @( [IntPtr] ) -SetLastError), (func advapi32 ConvertSidToStringSid ([bool]) @( [IntPtr] [IntPtr].MakeByRefType() ) -SetLastError), (func kernel32 CreateToolhelp32Snapshot ([IntPtr]) @( [UInt32], [UInt32] ) -SetLastError), (func advapi32 GetTokenInformation ([bool]) @( [IntPtr], [Int32], [IntPtr], [UInt32], [UInt32].MakeByRefType() ) -SetLastError), (func ntdll NtQueryInformationThread ([UInt32]) @( [IntPtr], [Int32], [IntPtr], [Int32], [IntPtr] )), (func kernel32 OpenProcess ([IntPtr]) @( [UInt32], [bool], [UInt32] ) -SetLastError), (func advapi32 OpenProcessToken ([bool]) @( [IntPtr], [UInt32], [IntPtr].MakeByRefType() ) -SetLastError), (func kernel32 OpenThread ([IntPtr]) @( [UInt32], [bool], [UInt32] ) -SetLastError), (func advapi32 OpenThreadToken ([bool]) @( [IntPtr], [UInt32], [bool], [IntPtr].MakeByRefType() ) -SetLastError), (func kernel32 QueryFullProcessImageName ([bool]) @( [IntPtr] [UInt32] [System.Text.StringBuilder] [UInt32].MakeByRefType() ) -SetLastError), (func kernel32 ReadProcessMemory ([Bool]) @( [IntPtr], [IntPtr], [Byte[]], [Int], [Int].MakeByRefType() ) -SetLastError), (func kernel32 TerminateThread ([bool]) @( [IntPtr], [UInt32] ) -SetLastError), (func kernel32 Thread32First ([bool]) @( [IntPtr], $THREADENTRY32.MakeByRefType() ) -SetLastError) (func kernel32 Thread32Next ([bool]) @( [IntPtr], $THREADENTRY32.MakeByRefType() ) -SetLastError), (func kernel32 VirtualQueryEx ([Int32]) @( [IntPtr], [IntPtr], $MEMORYBASICINFORMATION.MakeByRefType(), [UInt32] ) -SetLastError) ) $Types = $FunctionDefinitions | Add-Win32Type -Module $Mod -Namespace 'Win32SysInfo' $Kernel32 = $Types['kernel32'] $Ntdll = $Types['ntdll'] $Advapi32 = $Types['advapi32'] $DELETE = 0x00010000 $READ_CONTROL = 0x00020000 $SYNCHRONIZE = 0x00100000 $WRITE_DAC = 0x00040000 $WRITE_OWNER = 0x00080000 $PROCESS_CREATE_PROCESS = 0x0080 $PROCESS_CREATE_THREAD = 0x0002 $PROCESS_DUP_HANDLE = 0x0040 $PROCESS_QUERY_INFORMATION = 0x0400 $PROCESS_QUERY_LIMITED_INFORMATION = 0x1000 $PROCESS_SET_INFORMATION = 0x0200 $PROCESS_SET_QUOTA = 0x0100 $PROCESS_SUSPEND_RESUME = 0x0800 $PROCESS_TERMINATE = 0x0001 $PROCESS_VM_OPERATION = 0x0008 $PROCESS_VM_READ = 0x0010 $PROCESS_VM_WRITE = 0x0020 $PROCESS_ALL_ACCESS = $DELETE -bor $READ_CONTROL -bor $SYNCHRONIZE -bor $WRITE_DAC -bor $WRITE_OWNER -bor $PROCESS_CREATE_PROCESS -bor $PROCESS_CREATE_THREAD -bor $PROCESS_DUP_HANDLE -bor $PROCESS_QUERY_INFORMATION -bor $PROCESS_QUERY_LIMITED_INFORMATION -bor $PROCESS_SET_INFORMATION -bor $PROCESS_SET_QUOTA -bor $PROCESS_SUSPEND_RESUME -bor $PROCESS_TERMINATE -bor $PROCESS_VM_OPERATION -bor $PROCESS_VM_READ -bor $PROCESS_VM_WRITE $THREAD_DIRECT_IMPERSONATION = 0x0200 $THREAD_GET_CONTEXT = 0x0008 $THREAD_IMPERSONATE = 0x0100 $THREAD_QUERY_INFORMATION = 0x0040 $THREAD_QUERY_LIMITED_INFORMATION = 0x0800 $THREAD_SET_CONTEXT = 0x0010 $THREAD_SET_INFORMATION = 0x0020 $THREAD_SET_LIMITED_INFORMATION = 0x0400 $THREAD_SET_THREAD_TOKEN = 0x0080 $THREAD_SUSPEND_RESUME = 0x0002 $THREAD_TERMINATE = 0x0001 $THREAD_ALL_ACCESS = $DELETE -bor $READ_CONTROL -bor $SYNCHRONIZE -bor $WRITE_DAC -bor $WRITE_OWNER -bor $THREAD_DIRECT_IMPERSONATION -bor $THREAD_GET_CONTEXT -bor $THREAD_IMPERSONATE -bor $THREAD_QUERY_INFORMATION -bor $THREAD_QUERY_LIMITED_INFORMATION -bor $THREAD_SET_CONTEXT -bor $THREAD_SET_LIMITED_INFORMATION -bor $THREAD_SET_THREAD_TOKEN -bor $THREAD_SUSPEND_RESUME -bor $THREAD_TERMINATE $STANDARD_RIGHTS_REQUIRED = 0x000F0000 $TOKEN_ASSIGN_PRIMARY = 0x0001 $TOKEN_DUPLICATE = 0x0002 $TOKEN_IMPERSONATE = 0x0004 $TOKEN_QUERY = 0x0008 $TOKEN_QUERY_SOURCE = 0x0010 $TOKEN_ADJUST_PRIVILEGES = 0x0020 $TOKEN_ADJUST_GROUPS = 0x0040 $TOKEN_ADJUST_DEFAULT = 0x0080 $TOKEN_ADJUST_SESSIONID = 0x0100 $TOKEN_ALL_ACCESS = $STANDARD_RIGHTS_REQUIRED -bor $TOKEN_ASSIGN_PRIMARY -bor $TOKEN_DUPLICATE -bor $TOKEN_IMPERSONATE -bor $TOKEN_QUERY -bor $TOKEN_QUERY_SOURCE -bor $TOKEN_ADJUST_PRIVILEGES -bor $TOKEN_ADJUST_GROUPS -bor $TOKEN_ADJUST_DEFAULT $UNTRUSTED_MANDATORY_LEVEL = "S-1-16-0" $LOW_MANDATORY_LEVEL = "S-1-16-4096" $MEDIUM_MANDATORY_LEVEL = "S-1-16-8192" $MEDIUM_PLUS_MANDATORY_LEVEL = "S-1-16-8448" $HIGH_MANDATORY_LEVEL = "S-1-16-12288" $SYSTEM_MANDATORY_LEVEL = "S-1-16-16384" $PROTECTED_PROCESS_MANDATORY_LEVEL = "S-1-16-20480" $SECURE_PROCESS_MANDATORY_LEVEL = "S-1-16-28672" function CloseHandle { param ( [Parameter(Mandatory = $true)] [IntPtr] $Handle ) $Success = $Kernel32::CloseHandle($Handle); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "Close Handle Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } } function ConvertSidToStringSid { param ( [Parameter(Mandatory = $true)] [IntPtr] $SidPointer ) $StringPtr = [IntPtr]::Zero $Success = $Advapi32::ConvertSidToStringSid($SidPointer, [ref]$StringPtr); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "ConvertSidToStringSid Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output ([System.Runtime.InteropServices.Marshal]::PtrToStringAuto($StringPtr)) } function CreateToolhelp32Snapshot { param ( [Parameter(Mandatory = $true)] [UInt32] $ProcessId, [Parameter(Mandatory = $true)] [UInt32] $Flags ) $hSnapshot = $Kernel32::CreateToolhelp32Snapshot($Flags, $ProcessId); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $hSnapshot) { Write-Debug "CreateToolhelp32Snapshot Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $hSnapshot } function GetTokenInformation { param ( [Parameter(Mandatory = $true)] [IntPtr] $TokenHandle, [Parameter(Mandatory = $true)] $TokenInformationClass ) $TokenPtrSize = 0 $Success = $Advapi32::GetTokenInformation($TokenHandle, $TokenInformationClass, 0, $TokenPtrSize, [ref]$TokenPtrSize) [IntPtr]$TokenPtr = [System.Runtime.InteropServices.Marshal]::AllocHGlobal($TokenPtrSize) $Success = $Advapi32::GetTokenInformation($TokenHandle, $TokenInformationClass, $TokenPtr, $TokenPtrSize, [ref]$TokenPtrSize); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if($Success) { switch($TokenInformationClass) { 1 { $TokenUser = $TokenPtr -as $TOKEN_USER ConvertSidToStringSid -SidPointer $TokenUser.User.Sid } 3 { $TokenPrivileges = $TokenPtr -as $TOKEN_PRIVILEGES $sb = New-Object System.Text.StringBuilder for($i=0; $i -lt $TokenPrivileges.PrivilegeCount; $i++) { if((($TokenPrivileges.Privileges[$i].Attributes -as $LuidAttributes) -band $LuidAttributes::SE_PRIVILEGE_ENABLED) -eq $LuidAttributes::SE_PRIVILEGE_ENABLED) { $sb.Append(", $($TokenPrivileges.Privileges[$i].Luid.LowPart.ToString())") | Out-Null } } Write-Output $sb.ToString().TrimStart(', ') } 17 { $TokenOrigin = $TokenPtr -as $LUID Write-Output (Get-LogonSession -LogonId $TokenOrigin.LowPart) } 22 { } 25 { $TokenIntegrity = $TokenPtr -as $TOKEN_MANDATORY_LABEL switch(ConvertSidToStringSid -SidPointer $TokenIntegrity.Label.Sid) { $UNTRUSTED_MANDATORY_LEVEL { Write-Output "UNTRUSTED_MANDATORY_LEVEL" } $LOW_MANDATORY_LEVEL { Write-Output "LOW_MANDATORY_LEVEL" } $MEDIUM_MANDATORY_LEVEL { Write-Output "MEDIUM_MANDATORY_LEVEL" } $MEDIUM_PLUS_MANDATORY_LEVEL { Write-Output "MEDIUM_PLUS_MANDATORY_LEVEL" } $HIGH_MANDATORY_LEVEL { Write-Output "HIGH_MANDATORY_LEVEL" } $SYSTEM_MANDATORY_LEVEL { Write-Output "SYSTEM_MANDATORY_LEVEL" } $PROTECTED_PROCESS_MANDATORY_LEVEL { Write-Output "PROTECTED_PROCESS_MANDATORY_LEVEL" } $SECURE_PROCESS_MANDATORY_LEVEL { Write-Output "SECURE_PROCESS_MANDATORY_LEVEL" } } } } } else { Write-Debug "GetTokenInformation Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } try { [System.Runtime.InteropServices.Marshal]::FreeHGlobal($TokenPtr) } catch { } } function NtQueryInformationThread { param ( [Parameter(Mandatory = $true)] [IntPtr] $ThreadHandle ) $buf = [System.Runtime.InteropServices.Marshal]::AllocHGlobal([IntPtr]::Size) $Success = $Ntdll::NtQueryInformationThread($ThreadHandle, 9, $buf, [IntPtr]::Size, [IntPtr]::Zero); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "NtQueryInformationThread Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output ([System.Runtime.InteropServices.Marshal]::ReadIntPtr($buf)) } function OpenProcess { param ( [Parameter(Mandatory = $true)] [UInt32] $ProcessId, [Parameter(Mandatory = $true)] [UInt32] $DesiredAccess, [Parameter()] [bool] $InheritHandle = $false ) $hProcess = $Kernel32::OpenProcess($DesiredAccess, $InheritHandle, $ProcessId); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if($hProcess -eq 0) { Write-Debug "OpenProcess Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $hProcess } function OpenProcessToken { param ( [Parameter(Mandatory = $true)] [IntPtr] $ProcessHandle, [Parameter(Mandatory = $true)] [UInt32] $DesiredAccess ) $hToken = [IntPtr]::Zero $Success = $Advapi32::OpenProcessToken($ProcessHandle, $DesiredAccess, [ref]$hToken); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "OpenProcessToken Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $hToken } function OpenThread { param ( [Parameter(Mandatory = $true)] [UInt32] $ThreadId, [Parameter(Mandatory = $true)] [UInt32] $DesiredAccess, [Parameter()] [bool] $InheritHandle = $false ) $hThread = $Kernel32::OpenThread($DesiredAccess, $InheritHandle, $ThreadId); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if($hThread -eq 0) { Write-Debug "OpenThread Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $hThread } function OpenThreadToken { param ( [Parameter(Mandatory = $true)] [IntPtr] $ThreadHandle, [Parameter(Mandatory = $true)] [UInt32] $DesiredAccess, [Parameter()] [bool] $OpenAsSelf = $false ) $hToken = [IntPtr]::Zero $Success = $Advapi32::OpenThreadToken($ThreadHandle, $DesiredAccess, $OpenAsSelf, [ref]$hToken); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "OpenThreadToken Error: $(([ComponentModel.Win32Exception] $LastError).Message)" throw "OpenThreadToken Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $hToken } function QueryFullProcessImageName { param ( [Parameter(Mandatory = $true)] [IntPtr] $ProcessHandle, [Parameter()] [UInt32] $Flags = 0 ) $capacity = 2048 $sb = New-Object -TypeName System.Text.StringBuilder($capacity) $Success = $Kernel32::QueryFullProcessImageName($ProcessHandle, $Flags, $sb, [ref]$capacity); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "QueryFullProcessImageName Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $sb.ToString() } function ReadProcessMemory { param ( [Parameter(Mandatory = $true)] [IntPtr] $ProcessHandle, [Parameter(Mandatory = $true)] [IntPtr] $BaseAddress, [Parameter(Mandatory = $true)] [Int] $Size ) $buf = New-Object byte[]($Size) [Int32]$NumberOfBytesRead = 0 $Success = $Kernel32::ReadProcessMemory($ProcessHandle, $BaseAddress, $buf, $buf.Length, [ref]$NumberOfBytesRead); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "ReadProcessMemory Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $buf } function TerminateThread { param ( [Parameter(Mandatory = $true)] [IntPtr] $ThreadHandle, [Parameter()] [UInt32] $ExitCode = 0 ) $Success = $Kernel32::TerminateThread($ThreadHandle, $ExitCode); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "TerminateThread Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } } function Thread32First { param ( [Parameter(Mandatory = $true)] [IntPtr] $SnapshotHandle ) $Thread = [Activator]::CreateInstance($THREADENTRY32) $Thread.dwSize = $THREADENTRY32::GetSize() $Success = $Kernel32::Thread32First($hSnapshot, [Ref]$Thread); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "Thread32First Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $Thread } function VirtualQueryEx { param ( [Parameter(Mandatory = $true)] [IntPtr] $ProcessHandle, [Parameter(Mandatory = $true)] [IntPtr] $BaseAddress ) $memory_basic_info = [Activator]::CreateInstance($MEMORYBASICINFORMATION) $Success = $Kernel32::VirtualQueryEx($ProcessHandle, $BaseAddress, [Ref]$memory_basic_info, $MEMORYBASICINFORMATION::GetSize()); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if(-not $Success) { Write-Debug "VirtualQueryEx Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } Write-Output $memory_basic_info } $hSnapshot = CreateToolhelp32Snapshot -ProcessId 0 -Flags 4 $Thread = Thread32First -SnapshotHandle $hSnapshot do { $proc = Get-Process -Id $Thread.th32OwnerProcessId if($Thread.th32OwnerProcessId -ne 0 -and $Thread.th32OwnerProcessId -ne 4) { $hThread = OpenThread -ThreadId $Thread.th32ThreadID -DesiredAccess $THREAD_ALL_ACCESS -InheritHandle $false if($hThread -ne 0) { $BaseAddress = NtQueryInformationThread -ThreadHandle $hThread $hProcess = OpenProcess -ProcessId $Thread.th32OwnerProcessID -DesiredAccess $PROCESS_ALL_ACCESS -InheritHandle $false if($hProcess -ne 0) { $memory_basic_info = VirtualQueryEx -ProcessHandle $hProcess -BaseAddress $BaseAddress $AllocatedMemoryProtection = $memory_basic_info.AllocationProtect -as $MemProtection $MemoryProtection = $memory_basic_info.Protect -as $MemProtection $MemoryState = $memory_basic_info.State -as $MemState $MemoryType = $memory_basic_info.Type -as $MemType if($MemoryState -eq $MemState::MEM_COMMIT -and $MemoryType -ne $MemType::MEM_IMAGE) { $buf = ReadProcessMemory -ProcessHandle $hProcess -BaseAddress $BaseAddress -Size 100 $proc = Get-WmiObject Win32_Process -Filter "ProcessId = '$($Thread.th32OwnerProcessID)'" $KernelPath = QueryFullProcessImageName -ProcessHandle $hProcess $PathMismatch = $proc.Path.ToLower() -ne $KernelPath.ToLower() try { $hThreadToken = OpenThreadToken -ThreadHandle $hThread -DesiredAccess $TOKEN_ALL_ACCESS $SID = GetTokenInformation -TokenHandle $hThreadToken -TokenInformationClass 1 $Privs = GetTokenInformation -TokenHandle $hThreadToken -TokenInformationClass 3 $LogonSession = GetTokenInformation -TokenHandle $hThreadToken -TokenInformationClass 17 $Integrity = GetTokenInformation -TokenHandle $hThreadToken -TokenInformationClass 25 $IsUniqueThreadToken = $true } catch { $hProcessToken = OpenProcessToken -ProcessHandle $hProcess -DesiredAccess $TOKEN_ALL_ACCESS $SID = GetTokenInformation -TokenHandle $hProcessToken -TokenInformationClass 1 $Privs = GetTokenInformation -TokenHandle $hProcessToken -TokenInformationClass 3 $LogonSession = GetTokenInformation -TokenHandle $hProcessToken -TokenInformationClass 17 $Integrity = GetTokenInformation -TokenHandle $hProcessToken -TokenInformationClass 25 $IsUniqueThreadToken = $false } $ThreadDetail = New-Object PSObject $ThreadDetail | Add-Member -MemberType Noteproperty -Name ProcessName -Value $proc.Name $ThreadDetail | Add-Member -MemberType Noteproperty -Name ProcessId -Value $proc.ProcessId $ThreadDetail | Add-Member -MemberType Noteproperty -Name Path -Value $proc.Path $ThreadDetail | Add-Member -MemberType Noteproperty -Name KernelPath -Value $KernelPath $ThreadDetail | Add-Member -MemberType Noteproperty -Name CommandLine -Value $proc.CommandLine $ThreadDetail | Add-Member -MemberType Noteproperty -Name PathMismatch -Value $PathMismatch $ThreadDetail | Add-Member -MemberType Noteproperty -Name ThreadId -Value $Thread.th32ThreadId $ThreadDetail | Add-Member -MemberType Noteproperty -Name AllocatedMemoryProtection -Value $AllocatedMemoryProtection $ThreadDetail | Add-Member -MemberType Noteproperty -Name MemoryProtection -Value $MemoryProtection $ThreadDetail | Add-Member -MemberType Noteproperty -Name MemoryState -Value $MemoryState $ThreadDetail | Add-Member -MemberType Noteproperty -Name MemoryType -Value $MemoryType $ThreadDetail | Add-Member -MemberType Noteproperty -Name BasePriority -Value $Thread.tpBasePri $ThreadDetail | Add-Member -MemberType Noteproperty -Name IsUniqueThreadToken -Value $IsUniqueThreadToken $ThreadDetail | Add-Member -MemberType Noteproperty -Name Integrity -Value $Integrity $ThreadDetail | Add-Member -MemberType Noteproperty -Name Privilege -Value $Privs $ThreadDetail | Add-Member -MemberType Noteproperty -Name LogonId -Value $LogonSession.LogonId $ThreadDetail | Add-Member -MemberType Noteproperty -Name SecurityIdentifier -Value $SID $ThreadDetail | Add-Member -MemberType Noteproperty -Name UserName -Value "$($LogonSession.Domain)\$($LogonSession.UserName)" $ThreadDetail | Add-Member -MemberType Noteproperty -Name LogonSessionStartTime -Value $LogonSession.StartTime $ThreadDetail | Add-Member -MemberType Noteproperty -Name LogonType -Value $LogonSession.LogonType $ThreadDetail | Add-Member -MemberType Noteproperty -Name AuthenticationPackage -Value $LogonSession.AuthenticationPackage $ThreadDetail | Add-Member -MemberType Noteproperty -Name BaseAddress -Value $BaseAddress $ThreadDetail | Add-Member -MemberType Noteproperty -Name Size -Value $memory_basic_info.RegionSize $ThreadDetail | Add-Member -MemberType Noteproperty -Name Bytes -Value $buf $ThreadDetail } CloseHandle($hProcess) } } CloseHandle($hThread) } } while($Kernel32::Thread32Next($hSnapshot, [ref]$Thread)) CloseHandle($hSnapshot)
combined_dataset/train/non-malicious/sample_56_81.ps1
sample_56_81.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Tests whether an output’s datasource is reachable and usable by the Azure Stream Analytics service. .Description Tests whether an output’s datasource is reachable and usable by the Azure Stream Analytics service. .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IOutput .Inputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IResourceTestStatus .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. DATASOURCE <IOutputDataSource>: Describes the data source that output will be written to. Required on PUT (CreateOrReplace) requests. Type <String>: Indicates the type of data source output will be written to. Required on PUT (CreateOrReplace) requests. INPUTOBJECT <IStreamAnalyticsIdentity>: Identity Parameter [ClusterName <String>]: The name of the cluster. [FunctionName <String>]: The name of the function. [Id <String>]: Resource identity path [InputName <String>]: The name of the input. [JobName <String>]: The name of the streaming job. [Location <String>]: The region in which to retrieve the subscription's quota information. You can find out which regions Azure Stream Analytics is supported in here: https://azure.microsoft.com/en-us/regions/ [OutputName <String>]: The name of the output. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [SubscriptionId <String>]: The ID of the target subscription. [TransformationName <String>]: The name of the transformation. OUTPUT <IOutput>: An output object, containing all information associated with the named output. All outputs are contained under a streaming job. [Datasource <IOutputDataSource>]: Describes the data source that output will be written to. Required on PUT (CreateOrReplace) requests. Type <String>: Indicates the type of data source output will be written to. Required on PUT (CreateOrReplace) requests. [ETag <String>]: [SerializationType <EventSerializationType?>]: Indicates the type of serialization that the input or output uses. Required on PUT (CreateOrReplace) requests. [SizeWindow <Single?>]: [TimeWindow <String>]: .Link https://learn.microsoft.com/powershell/module/az.streamanalytics/test-azstreamanalyticsoutput #> function Test-AzStreamAnalyticsOutput { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IResourceTestStatus])] [CmdletBinding(DefaultParameterSetName='TestExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='TestExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the streaming job. ${JobName}, [Parameter(ParameterSetName='TestExpanded', Mandatory)] [Alias('OutputName')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the output. ${Name}, [Parameter(ParameterSetName='TestExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='TestExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { $hasAsJob = $PSBoundParameters.Remove('AsJob') $null = $PSBoundParameters.Remove('WhatIf') $null = $PSBoundParameters.Remove('Confirm') $InputObject = Get-AzStreamAnalyticsOutput @PSBoundParameters $resourceId = $InputObject.Id $PSBoundParameters.Add("InputObject", $resourceId) $PSBoundParameters.Add("Output", $InputObject) if ($PSBoundParameters.ContainsKey("JobName")) { $null = $PSBoundParameters.Remove("JobName") } if ($PSBoundParameters.ContainsKey("Name")) { $null = $PSBoundParameters.Remove("Name") } if ($PSBoundParameters.ContainsKey("ResourceGroupName")) { $null = $PSBoundParameters.Remove("ResourceGroupName") } if ($PSBoundParameters.ContainsKey("SubscriptionId")) { $null = $PSBoundParameters.Remove("SubscriptionId") } if ($hasAsJob) { $PSBoundParameters.Add('AsJob', $true) } Az.StreamAnalytics.Internal\Test-AzStreamAnalyticsOutput @PSBoundParameters } } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCae/LokSBRlkmp # E8FbTx3gEKeHqusVcNDdUmZSoojEpKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINRg # tekkkmII/R24pD2Ctb2AOvTUQurUQrv+vVKaDQfnMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAdl1MLMFK0hY6Fs45VKEX/lgm4T+J5wKSq4yn # FbCd0dVrulFy4GA6bsxDXDyOCI7QKbUVB4zf7y4Iv4tXyTC+2Y8VC2pTQGDmvrb8 # GJdRbEhLEfwjDar4KHbuQ9Pea+PDsnOFNVJX3RJf9/0L1XUfiloH6Qk4xLCEN2I5 # oUZsHcXEFylXegcKjBueSTyD7Eu80d1lgUqJCKmfCDGVsU1GQ1RyPe0Y8jDO6a0l # ivH4P5ZzVJ5zWWj6egQRCuigrXhl5fmRu3rnG1VXvvsMSQ/LQZfmcTxoyGLC0iui # uuMhfXPBslbMPXfQThxwP3V9BOQm7mzYX5Uv39cXkKvTN0siGaGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCMEEsMoaPXtaZHmBYYRROqfPwQ4f9FP6Wk # ziBMIcOkwAIGZh/SmF+2GBMyMDI0MDQyMzEzMTUyNi45NDRaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA # 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7 # 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY # SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4 # dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq # cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE # izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J # VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/ # 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu # QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm # z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc # c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd # JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG # gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup # gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU # wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg # oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD # YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu # dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3 # 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu # uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD # C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY # FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD # d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQy # NDA5NDMyMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS # 7DAHAgEAAgISrzAKAgUA6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # ADCABKpo/NApeGAt90g97xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2f # GPvThUiQemQ8jwI/aA1i5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60 # f1cT69nPDTDg+i6ONCMmCZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA # AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQg0Q256WScT5hIqpaTDTKXyXz1Yj0Fmapg+vRvUxHC # HtEwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb # 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNaw # ncfq1eDXUwS6ExT0PRgiMA0GCSqGSIb3DQEBCwUABIICAGUkYnS4TFWfH7QTA8TS # yIQg3BWHqvp2EMmzXHFddctHZE2ghvOLPx5vH/N/jqBQ6BmjKRbjZgAJUrWKQVBL # 20h38vIUjzsLNnlH8X1335BZmI320E2cj7Wg+Ya/vJP3ULlixS+d5P/2oY2Iib31 # Ks/q7Mr3wKxlodRbCJP+e3T2PqRlI14IjqZqbZpd8CXzHAu4Of1JZm3JYPqmgqHT # DpsT6v84bCQdhDKhquAWajIMpfURyh6tGMlG7fdCafL1/K3hs29Y+mxJUy6M7vIj # +aJy1zaCU2KIdrm7xFDYxD3Js4fY2DEoLq9ThHJOlaV8RvicTPSFA52Wp976sA6L # WCECybILbxwj7F9tt9enGxRDojkcDCElrfezccFa0etFDunj4f1OwRSL1FsZu1V8 # Mdtfsed6WqpeYuVUMVN+86Rm680YC4eJ2xt48qw+fWChWgUZih9dTud3O+9Ck0S+ # KoJ2S1Py7PRAhGkgKpGpvJPH8SkYIImqie3bI5XR/bDg9ZvJ+ALw1IvvXysO0LLC # 6Pixu3DLprUZfohMlbxjaIErzhGeLoqMvsVHs7GaxWaKneTbPHIPXkswIL0eoNmJ # FaCN1jomuvRvwDs36MoF15NWzfb9Ik3/jsebue9PCCr6EYJFKayR7vWgmAVQ/tkW # xD04mVvuvaMoVepiexmoXkPT # SIG # End signature block
combined_dataset/train/non-malicious/ResetOutlookLivePassword.ps1
ResetOutlookLivePassword.ps1
function Reset-OutlookLivePassword { <# .SYNOPSIS Resets an Outlook Live account password. .DESCRIPTION The Reset-OutlookLivePassword function resets an Outlook Live (Live@edu) acccount password. A remote session is opened to the Outlook Live service. Connecting to the remote service requires administrative credentials to Outlook Live. The function optionally stores the credential for subsequent use with the SaveCredential parameter. The stored credential is protected using the Windows Data Protection API (DPAPI). .PARAMETER Identity Specifies the identity of the Outlook Live user account. Acceptable values include: * User principal name (UPN) .PARAMETER Password Specifies a new password for the account. A plain text string may be supplied or by not specifing the parameter a prompt for secure entry will appear. .PARAMETER ResetPasswordOnNextLogon Specifies that the user will be forced to reset their password at next logon. .PARAMETER Credential Specifies a credential for connecting to the Outlook Live remote session. .PARAMETER SaveCredential Specifies that the credential provided to connect to the Outlook Live remote session will be saved for subsequent use. The Windows Data Protection API (DPAPI) is used to encrypt the password string representation. .EXAMPLE Reset-OutlookLivePassword unique.name@mydomain.edu Resets the Outlook Live password on the account unique.name@mydomain.edu to the password specified in a secure entry prompt. .EXAMPLE Reset-OutlookLivePassword unique.name@mydomain.edu -Password HelloDave Resets the Outlook Live password on the account unique.name@mydomain.edu to the password HelloDave. .EXAMPLE Reset-OutlookLivePassword unique.name@mydomain.edu -Password HelloDave -SaveCredential Resets the Outlook Live password on the account unique.name@mydomain.edu to the password HelloDave and saves the remote session credential. .INPUTS System.String, System.Security.SecureString .OUTPUTS None .NOTES Name: Reset-OutlookLivePassword Author: Rich Kusak Created: 2010-07-30 LastEdit: 2011-08-28 16:27 Version: 2.0.0.0 .LINK http://outlookliveanswers.com/forums/p/10/15.aspx #> [CmdletBinding(DefaultParameterSetName='Default', SupportsShouldProcess=$true)] param ( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] [string]$Identity, [Parameter(ValueFromPipelineByPropertyName=$true)] [ValidateScript({ if ($_ -is [System.String] -or $_ -is [System.Security.SecureString]) {$true} else { throw "The argument '$_' is not of type System.String or System.Security.SecureString." } })] $Password = (Read-Host 'Enter New Password' -AsSecureString), [Parameter(ValueFromPipelineByPropertyName=$true)] [switch]$ResetPasswordOnNextLogon, [Parameter(ParameterSetName='Default', ValueFromPipelineByPropertyName=$true)] [Parameter(ParameterSetName='Save', Mandatory=$true, ValueFromPipelineByPropertyName=$true)] [System.Management.Automation.PSCredential]$Credential, [Parameter(ParameterSetName='Save', ValueFromPipelineByPropertyName=$true)] [switch]$SaveCredential ) begin { function Save-Credential { param ($Path, $Credential) if (Test-Path $Path) { $attribs = [IO.FileAttributes]('Normal') Set-ItemProperty $Path -Name Attributes -Value $attribs -Force } New-Object PSObject -Property @{ 'UserName' = $Credential.UserName 'Password' = $Credential.Password | ConvertFrom-SecureString } | Export-Csv $Path -NoTypeInformation -Force $attribs = [IO.FileAttributes]('Hidden', 'ReadOnly') Set-ItemProperty $Path -Name Attributes -Value $attribs -Force } # function Save-Credential # The location where a credential will be saved $psFolder = Split-Path $PROFILE $credFile = Join-Path $psFolder -ChildPath 'b94437da-2522-4bd4-903f-4b3f8ec7132a.csv' if (Test-Path $credFile) { if ($Credential -and $SaveCredential) { Write-Warning 'A saved credential already exists.' do { $prompt = Read-Host 'Do you want to overwrite the saved credential? (Y)es or (N)o.' } until ('^Yes$|^No$' -match $prompt) } switch ($prompt) { {$_ -match 'Y'} { Write-Debug "Performing operation 'Save-Credential' on target '$credFile'." Save-Credential -Path $credFile -Credential $Credential $importedCredFile = Import-Csv $credFile $liveUserName = $importedCredFile.UserName $livePassword = $importedCredFile.Password | ConvertTo-SecureString break } {$_ -match 'N'} { $liveUserName = $Credential.UserName $livePassword = $Credential.Password break } default { $importedCredFile = Import-Csv $credFile $liveUserName = $importedCredFile.UserName $livePassword = $importedCredFile.Password | ConvertTo-SecureString } } # switch $liveCred = New-Object System.Management.Automation.PSCredential($liveUserName, $livePassword) } else { if (-not $Credential) { try { $Credential = Get-Credential -ErrorAction Stop } catch { throw $_ } } $liveCred = New-Object System.Management.Automation.PSCredential($Credential.UserName, $Credential.Password) if ($SaveCredential) { if (-not (Test-Path $psFolder)) { New-Item $psFolder -ItemType Directory -Force | Out-Null } Write-Debug "Performing operation 'Save-Credential' on target '$credFile'." Save-Credential -Path $credFile -Credential $Credential } } # Remote session parameters $connectionUri = 'https://ps.outlook.com/powershell/' $newPSSessionParameters = @{ 'ConfigurationName' = 'Microsoft.Exchange' 'ConnectionUri' = $connectionUri 'Credential' = $liveCred 'Authentication' = 'Basic' 'AllowRedirection' = $true } try { Write-Debug "Performing operation 'New-PSSession' on target '$connectionUri'." $session = New-PSSession @newPSSessionParameters -ErrorAction Stop Write-Verbose "Successfully opened new remote session to '$connectionUri'." if ($PSBoundParameters['Verbose']) { $session Write-Host } } catch { throw $_ } } # begin process { if ($Password -is [System.String]) { Write-Debug "Performing operation 'ConvertTo-SecureString' on target 'Password'." $Password = $Password | ConvertTo-SecureString -AsPlainText -Force } if ($PSBoundParameters['WarningAction']) { $WarningAction = $PSBoundParameters['WarningAction'] } else { $WarningAction = $WarningPreference } if ($PSBoundParameters['WhatIf']) { $WhatIf = $PSBoundParameters['WhatIf'] } else { $WhatIf = $WhatIfPreference } $setMailboxParameters = @{ 'Identity' = $Identity 'Password' = $Password 'ResetPasswordOnNextLogon' = $ResetPasswordOnNextLogon 'WarningAction' = $WarningAction 'WhatIf' = $WhatIf } try { Write-Debug "Performing operation 'Invoke-Command' on target '$($session.ComputerName)'." # Invoke remote command to set a new password Invoke-Command -Session $session -ArgumentList $setMailboxParameters -ErrorAction Stop -ScriptBlock { param ($setMailboxParameters) Set-Mailbox @setMailboxParameters } } catch { return Write-Error $_ } } # process end { Write-Debug "Performing operation 'Remove-PSSession' on target '$($session.ComputerName)'." # Close the remote session Remove-PSSession $session -ErrorAction Stop -WhatIf:$false Write-Verbose "Successfully removed remote session to '$connectionUri'." } # end } # function Reset-OutlookLivePassword
combined_dataset/train/non-malicious/537.ps1
537.ps1
function Add-SPOTextFieldtoList { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string] $listTitle, [Parameter(Mandatory=$true, Position=2)] [string] $fieldName ) $newField = "<Field Type='Text' DisplayName='$fieldName' Name='$fieldName' required='FALSE' />" Add-SPOField $listTitle $fieldName $newField }
combined_dataset/train/non-malicious/copy-data.ps1
copy-data.ps1
function copy-data { param($source, $dest) $counter = 0 $files = Get-ChildItem $source -Force -Recurse foreach($file in $files) { $status = "Copying file {0} of {1}: {2}" -f $counter, $files.count, $file.name Write-Progress -Activity "Copyng Files" -Status $status -PercentComplete ($counter/$files.count * 100) Copy-Item $file.pspath $dest -Force $counter++ } }
combined_dataset/train/non-malicious/LibraryPrompt.ps1
LibraryPrompt.ps1
##############################################################################\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\nSet-StrictMode -Version Latest\n\nfunction Prompt\n{\n $id = 1\n $historyItem = Get-History -Count 1\n if($historyItem)\n {\n $id = $historyItem.Id + 1\n }\n\n Write-Host -ForegroundColor DarkGray "`n[$(Get-Location)]"\n Write-Host -NoNewLine "PS:$id > "\n $host.UI.RawUI.WindowTitle = "$(Get-Location)"\n\n "`b"\n}
combined_dataset/train/non-malicious/sample_7_48.ps1
sample_7_48.ps1
#************************************************ # TS_ClusterCAUWMINamespaceCheck.ps1 # Version 1.0.1 # Date: 1/16/2013 # Author: v-kaw # Description: [Idea ID 6519] [Windows] Invalid Class error on 2012 Clusters (SDP) # Rule number: 6519 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=6519 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 6519 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ClusterCAUWMINamespaceCheck" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function IsCluster #Check if this machine is cluster. { $ClusterKeyName = "HKLM:\Cluster" if (Test-Path -Path $ClusterKeyName) { return $true } else { return $false } } Function AppliesToSystem { #Add your logic here to specify on which environments this rule will appy return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2) -and (IsCluster) ) #win8 } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ if($_.Exception.ErrorCode -ne $null) { $Script:ErrorCode = "0X{0:X}" -f $_.Exception.ErrorCode } elseif ($_.Exception.HResult -ne $null) { $Script:ErrorCode = "0X{0:X}" -f $_.Exception.HResult } elseif (($_.Exception -eq $null) -and ($_.HResult -ne $null)) { $Script:ErrorCode = "0X{0:X}" -f $_.HResult } if ($_.Exception.Message -ne $null) { $Script:ErrorMessage = $_.Exception.Message } elseif ($_.ErrorDetails.Message -ne $null) { $Script:ErrorMessage = $_.ErrorDetails.Message } elseif($_.FullyQualifiedErrorId -ne $null) { $Script:ErrorMessage = $_.FullyQualifiedErrorId } continue } $Error.Clear() $Scope = [System.Management.ManagementScope] "\\.\root\Microsoft\Windows\ClusterUpdate" $Scope.Connect() if ($Error.Count -eq 0) { $query = [System.Management.ObjectQuery] "Select * from MSFT_CAUNode" $Searcher = New-Object System.Management.ManagementObjectSearcher $Searcher.Scope = $Scope $Searcher.Query = $query $Searcher.Get() } if ($Error.Count -gt 0) { $RootCauseDetected = $true $InformationCollected | add-member -membertype noteproperty -name "Cluster Node" -value $ComputerName $InformationCollected | add-member -membertype noteproperty -name "WMI namespace" -value 'root\Microsoft\Windows\ClusterUpdate' $InformationCollected | add-member -membertype noteproperty -name "WMI Class" -value 'MSFT_CAUNode' $InformationCollected | add-member -membertype noteproperty -name "Error accessing Class" -value $Script:ErrorMessage $InformationCollected | add-member -membertype noteproperty -name "Exception code" -value $Script:ErrorCode } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB+CPouWGtLilfA # nnLCONmz6uCGVOjFVZTqS9cY5RmcpKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFP4WgDEPcbiop4FMOA14jJm # Oa+e4EYgd3bC7NtyS5jyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAUfb2B3M6ayTC4FwCjVOeiAV5Symx5uZlrWjuraZY7jJpbrPkIDFSRiGO # rlGkBy//V71xKdgkuJJSWhlsvSV6G0v/KGoLaSfLPZNCwX059AiICVCEV0GnGYkf # p50zdLQlQF1Ip/gGwxJmk59H+e8xvL3KhmDCCfCccW9SwQ5UfcdNmP3ytC952rNM # Qc4LmfDIiTLPzS6EoSlKWj3W8upnIquzjzyaNF/h2dLoqMjen+QTjNEYrUvrZOv0 # FchZMKN3vIg14aa3/XKT8YoLFEepr4v3zj6PuDyobTVVM6okIPvAG0wM8gtVHugX # mgTU98+7V68D5bfeh9mNwrL1B2Qy2aGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAlCjvdYghahAcoYuvvVe4hJoPbaS2XKQq/D+dk8WsBOgIGZxp1kNwj # GBMyMDI0MTAyODExNDA0MC43MDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1 # NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP # AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU # 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt # n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp # un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q # lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld # HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDHtxO58ehri6G5lDzDowdfYxhpSOi/O/m7amXccc4HBjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo # rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn # cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAPMhc0ABoA1rRbkDKbEcPrVa/ # +oM/znyEElOFfbXEdX7GAKo4hp4STN+lXVBPph/2eH+QNwCcojrY0ek/umaV87IK # j6CbzfmwLnKKhZQFPP8oV3MUYWL/0gtl0KWBQdEkIKtYL1dKPqugiBwCPMN2J6Vb # RrTJPiqS69AOxyRPJBmnZQ3VJ8NG5PoaZeLiHVkIjNS1EBW5YlmTEmzZI8YfgAiE # p+z5o40JsDSfcLLRkMwKQ0vkyu1z8GeLYlx77nvRF4AmF5HKlhEvWoCatjBZHhZR # Y3uA9mqzg8S/IV5HEO0ggCtSlWCVW/h+uz3uI3Zfs6uEKSm/cP9Puu+cMS57Pdtg # 7n8vninwJDEwqdiIz18cxIlsszlK2y/o7dWA2Kd8zpih8rLU48MaDJrNNHsFNKzx # HSnSKT/w8AaL8EfBj4zoxmi9g4sKWfVPO9N6zvm2cYAdaVBw+JMUM/cFXuQjCYQ4 # qoo5dqFroTNxDQB8bPvT2qYNQnebVQdBObq9isIH8mX8c7+N/hqcZuiWJLlKNo+2 # HSsaWd23EjfF1BHa9eIHemj3N6ebcYArojxFY4/LtTunUTtg44sPrsHbBvVcAbjs # ySk3WCjqFGQ604oXuS6mSf8yBjgSbB9A3mQQsAGZ8FDKElUXUN6mRudRmgeHRG4K # VbwPiqpINDvxwNJ1DMo= # SIG # End signature block
combined_dataset/train/non-malicious/4401.ps1
4401.ps1
function Add-ArgumentCompleter() { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string[]]$cmdlets, [Parameter(Mandatory=$true)] [string]$parameterName ) try { if(Get-Command -Name Register-ArgumentCompleter -ErrorAction SilentlyContinue) { Register-ArgumentCompleter -CommandName $cmdlets -ParameterName $parameterName -ScriptBlock { param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameter) Get-PSRepository -Name "$wordTocomplete*"-ErrorAction SilentlyContinue -WarningAction SilentlyContinue | Foreach-Object { [System.Management.Automation.CompletionResult]::new($_.Name, $_.Name, 'ParameterValue', $_.Name) } } } } catch { Write-Debug -Message "Error registering argument completer: $_" } }
combined_dataset/train/non-malicious/sample_4_79.ps1
sample_4_79.ps1
# # Module manifest for module 'OCI.PSModules.Datacatalog' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datacatalog.dll' # Version number of this module. ModuleVersion = '92.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f0444859-1d26-4a2d-8bcd-5551939e4f94' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datacatalog Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datacatalog.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatacatalogCatalogLock', 'Add-OCIDatacatalogCatalogPrivateEndpointLock', 'Add-OCIDatacatalogDataSelectorPatterns', 'Add-OCIDatacatalogMetastoreLock', 'Confirm-OCIDatacatalogConnection', 'Confirm-OCIDatacatalogPattern', 'DisMount-OCIDatacatalogCatalogPrivateEndpoint', 'Export-OCIDatacatalogGlossary', 'Get-OCIDatacatalogAggregatedPhysicalEntitiesList', 'Get-OCIDatacatalogAttribute', 'Get-OCIDatacatalogAttributesList', 'Get-OCIDatacatalogAttributeTag', 'Get-OCIDatacatalogAttributeTagsList', 'Get-OCIDatacatalogCatalog', 'Get-OCIDatacatalogCatalogPrivateEndpoint', 'Get-OCIDatacatalogCatalogPrivateEndpointsList', 'Get-OCIDatacatalogCatalogsList', 'Get-OCIDatacatalogConnection', 'Get-OCIDatacatalogConnectionsList', 'Get-OCIDatacatalogCustomPropertiesList', 'Get-OCIDatacatalogCustomProperty', 'Get-OCIDatacatalogDataAsset', 'Get-OCIDatacatalogDataAssetsList', 'Get-OCIDatacatalogDataAssetTag', 'Get-OCIDatacatalogDataAssetTagsList', 'Get-OCIDatacatalogDerivedLogicalEntitiesList', 'Get-OCIDatacatalogEntitiesList', 'Get-OCIDatacatalogEntity', 'Get-OCIDatacatalogEntityTag', 'Get-OCIDatacatalogEntityTagsList', 'Get-OCIDatacatalogFolder', 'Get-OCIDatacatalogFoldersList', 'Get-OCIDatacatalogFolderTag', 'Get-OCIDatacatalogFolderTagsList', 'Get-OCIDatacatalogGlossariesList', 'Get-OCIDatacatalogGlossary', 'Get-OCIDatacatalogJob', 'Get-OCIDatacatalogJobDefinition', 'Get-OCIDatacatalogJobDefinitionsList', 'Get-OCIDatacatalogJobExecution', 'Get-OCIDatacatalogJobExecutionsList', 'Get-OCIDatacatalogJobLog', 'Get-OCIDatacatalogJobLogsList', 'Get-OCIDatacatalogJobMetrics', 'Get-OCIDatacatalogJobMetricsList', 'Get-OCIDatacatalogJobsList', 'Get-OCIDatacatalogMetastore', 'Get-OCIDatacatalogMetastoresList', 'Get-OCIDatacatalogNamespace', 'Get-OCIDatacatalogNamespacesList', 'Get-OCIDatacatalogPattern', 'Get-OCIDatacatalogPatternsList', 'Get-OCIDatacatalogRulesList', 'Get-OCIDatacatalogTagsList', 'Get-OCIDatacatalogTerm', 'Get-OCIDatacatalogTermRelationship', 'Get-OCIDatacatalogTermRelationshipsList', 'Get-OCIDatacatalogTermsList', 'Get-OCIDatacatalogType', 'Get-OCIDatacatalogTypesList', 'Get-OCIDatacatalogWorkRequest', 'Get-OCIDatacatalogWorkRequestErrorsList', 'Get-OCIDatacatalogWorkRequestLogsList', 'Get-OCIDatacatalogWorkRequestsList', 'Import-OCIDatacatalogConnection', 'Import-OCIDatacatalogDataAsset', 'Import-OCIDatacatalogGlossary', 'Import-OCIDatacatalogLineage', 'Invoke-OCIDatacatalogAssociateCustomProperty', 'Invoke-OCIDatacatalogAsynchronousExportDataAsset', 'Invoke-OCIDatacatalogAsynchronousExportGlossary', 'Invoke-OCIDatacatalogDisassociateCustomProperty', 'Invoke-OCIDatacatalogExpandTreeForGlossary', 'Invoke-OCIDatacatalogFetchEntityLineage', 'Invoke-OCIDatacatalogObjectStats', 'Invoke-OCIDatacatalogParseConnection', 'Invoke-OCIDatacatalogProcessRecommendation', 'Invoke-OCIDatacatalogRecommendations', 'Invoke-OCIDatacatalogSearchCriteria', 'Invoke-OCIDatacatalogSuggestMatches', 'Invoke-OCIDatacatalogSynchronousExportDataAsset', 'Invoke-OCIDatacatalogTestConnection', 'Invoke-OCIDatacatalogUsers', 'Mount-OCIDatacatalogCatalogPrivateEndpoint', 'Move-OCIDatacatalogCatalogCompartment', 'Move-OCIDatacatalogCatalogPrivateEndpointCompartment', 'Move-OCIDatacatalogMetastoreCompartment', 'New-OCIDatacatalogAttribute', 'New-OCIDatacatalogAttributeTag', 'New-OCIDatacatalogCatalog', 'New-OCIDatacatalogCatalogPrivateEndpoint', 'New-OCIDatacatalogConnection', 'New-OCIDatacatalogCustomProperty', 'New-OCIDatacatalogDataAsset', 'New-OCIDatacatalogDataAssetTag', 'New-OCIDatacatalogEntity', 'New-OCIDatacatalogEntityTag', 'New-OCIDatacatalogFolder', 'New-OCIDatacatalogFolderTag', 'New-OCIDatacatalogGlossary', 'New-OCIDatacatalogJob', 'New-OCIDatacatalogJobDefinition', 'New-OCIDatacatalogJobExecution', 'New-OCIDatacatalogMetastore', 'New-OCIDatacatalogNamespace', 'New-OCIDatacatalogPattern', 'New-OCIDatacatalogTerm', 'New-OCIDatacatalogTermRelationship', 'Remove-OCIDatacatalogAttribute', 'Remove-OCIDatacatalogAttributeTag', 'Remove-OCIDatacatalogCatalog', 'Remove-OCIDatacatalogCatalogLock', 'Remove-OCIDatacatalogCatalogPrivateEndpoint', 'Remove-OCIDatacatalogCatalogPrivateEndpointLock', 'Remove-OCIDatacatalogConnection', 'Remove-OCIDatacatalogCustomProperty', 'Remove-OCIDatacatalogDataAsset', 'Remove-OCIDatacatalogDataAssetTag', 'Remove-OCIDatacatalogDataSelectorPatterns', 'Remove-OCIDatacatalogEntity', 'Remove-OCIDatacatalogEntityTag', 'Remove-OCIDatacatalogFolder', 'Remove-OCIDatacatalogFolderTag', 'Remove-OCIDatacatalogGlossary', 'Remove-OCIDatacatalogJob', 'Remove-OCIDatacatalogJobDefinition', 'Remove-OCIDatacatalogMetastore', 'Remove-OCIDatacatalogMetastoreLock', 'Remove-OCIDatacatalogNamespace', 'Remove-OCIDatacatalogPattern', 'Remove-OCIDatacatalogTerm', 'Remove-OCIDatacatalogTermRelationship', 'Update-OCIDatacatalogAttribute', 'Update-OCIDatacatalogCatalog', 'Update-OCIDatacatalogCatalogPrivateEndpoint', 'Update-OCIDatacatalogConnection', 'Update-OCIDatacatalogCustomProperty', 'Update-OCIDatacatalogDataAsset', 'Update-OCIDatacatalogEntity', 'Update-OCIDatacatalogFolder', 'Update-OCIDatacatalogGlossary', 'Update-OCIDatacatalogJob', 'Update-OCIDatacatalogJobDefinition', 'Update-OCIDatacatalogMetastore', 'Update-OCIDatacatalogNamespace', 'Update-OCIDatacatalogPattern', 'Update-OCIDatacatalogTerm', 'Update-OCIDatacatalogTermRelationship', 'Write-OCIDatacatalogCredentials' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datacatalog' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/328.ps1
328.ps1
function ConvertFrom-PSFArray { [CmdletBinding()] param ( [Parameter(Position = 0)] [string] $JoinBy = ', ', [Parameter(Position = 1)] [string[]] $PropertyName = '*', [Parameter(ValueFromPipeline = $true)] $InputObject ) process { $props = [ordered]@{ } foreach ($property in $InputObject.PSObject.Properties) { if ($property.Value -isnot [System.Collections.ICollection]) { $props[$property.Name] = $property.Value continue } $found = $false foreach ($name in $PropertyName) { if ($property.Name -like $name) { $found = $true break } } if (-not $found) { $props[$property.Name] = $property.Value continue } $props[$property.Name] = $property.Value -join $JoinBy } [PSCustomObject]$props } }
combined_dataset/train/non-malicious/sample_31_96.ps1
sample_31_96.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Get ticket details for an Azure subscription. Support ticket data is available for 18 months after ticket creation. If a ticket was created more than 18 months ago, a request for data might cause an error. If no parameters are specified, then this command will retrieve all tickets created in the last week by default. .Description Get ticket details for an Azure subscription. Support ticket data is available for 18 months after ticket creation. If a ticket was created more than 18 months ago, a request for data might cause an error. If no parameters are specified, then this command will retrieve all tickets created in the last week by default. .Example {{ Add code here }} .Example {{ Add code here }} .Outputs Microsoft.Azure.PowerShell.Cmdlets.Support.Models.ISupportTicketDetails .Link https://learn.microsoft.com/powershell/module/az.support/get-azsupportticket #> function Get-AzSupportTicket { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Support.Models.ISupportTicketDetails])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] param( [Parameter(ParameterSetName='Get', Mandatory)] [Alias('SupportTicketName')] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Path')] [System.String] # Support ticket name. ${Name}, [Parameter(ParameterSetName='Get')] [Parameter(ParameterSetName='List')] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Support.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String[]] # Azure subscription Id. ${SubscriptionId}, [Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Support.Models.ISupportIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='List')] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Query')] [System.String] # The filter to apply on the operation. # We support 'odata v4.0' filter semantics. # [Learn more](https://docs.microsoft.com/odata/concepts/queryoptions-overview). # _Status_, _ServiceId_, and _ProblemClassificationId_ filters can only be used with Equals ('eq') operator. # For _CreatedDate_ filter, the supported operators are Greater Than ('gt') and Greater Than or Equals ('ge'). # When using both filters, combine them using the logical 'AND'. ${Filter}, [Parameter(ParameterSetName='List')] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Query')] [System.Int32] # The number of values to return in the collection. # Default is 25 and max is 100. ${Top}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Support.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Support.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { If($PSCmdlet.ParameterSetName -eq 'List' -and !$PSBoundParameters.ContainsKey('Top') -and !$PSBoundParameters.ContainsKey('Filter')){ $OneWeekAgo = (Get-Date).AddDays(-7).ToString("yyyy-MM-ddTHH:mm:ssZ") $Filter = "CreatedDate ge $($OneWeekAgo)" $PSBoundParameters.Add('Filter', $Filter) } Az.Support.internal\Get-AzSupportTicket @PSBoundParameters } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAhtxmyAxwYPY/G # JF8j6FZeEnqI2AqJeDY1YRZfRYpvQqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICnB83T7gD+P0PxrsfsGp1hF # WRHD3YC4OiRQg7vO5VkQMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJUW9QDgiQ00+AeY2Khl54ojke/sPys5SvQwk7Jrj4J9yPg8Ex6N4fh1H # a6sjEOSz3c6zB9LFKpzsKHTcwS4JPJq4+Kt274iPG/lvDt2L32FwWQXhi43Q0g3G # SbgepQzKBRcaQjxDmajWNOFGv0NGdlVe8ENFaRLsZZzQGN83Jd1i4FB9IrEljqmX # 156qjR/QQnloIO9aHmy++yxiFZyVU3P/s6xdcQNPpwu03I126FYeehSMFd/3SkKT # LJnCtvVEH6XK8Lr9B9jJ6WrySwi1jmPdr9+KH6lIJji1CeXElIuFyS4YMIkyQc9v # ZbqOkRL7gnm6rOek1MRhTduozo2Ec6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBuyc05O1PEQvOvacXbfufusIh0KQH6YgYqVf9YVveNjAIGZjOaa5w7 # GBMyMDI0MDUxNjA2NDIxMy43OThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kajAiGA8yMDI0MDUxNjAxNDgy # NloYDzIwMjQwNTE3MDE0ODI2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+Rq # AgEAMAoCAQACAgS3AgH/MAcCAQACAhN0MAoCBQDp8TXqAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBALtBSk4n+rSTeMZQUhoJ92GGdhj/jk7xMXLu2WF7hT9p # RDrcDzyuPb/LrKVcqHr4jQhbjki+rY8hL06zkH6nseJ4W068zeChPtNs0nsSbTn9 # fL7U3Q5uvHvrDEJFj6ivToez8EGBaaWb51Kly8UVOgxOTO3KwBHEs7ASmVVF9gpc # dCFtHBgAUd43l6hy/lD4Gvmq4IsGPqhaqsHhRNDH2F+zUNNjXhRCJZ6P3WSCCQru # var3pvQfoHziPJR+Xxe9ctl6PScXAGjGlDc8M3j7XOpxTK34C/cH5Rslt5NQXCcb # bG4EqFc/jGvGhsnvCA8iS3LYRtbP6pOe0WWEB+QfGRwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCB19PJvJoIewYrIgGv6zMLnja8nmwwuy9pRqAXcZ8qN # /zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgcg/hgnHklArzGbBkon+iztsk # ir9etKkTtBy2hJg2l+MwDQYJKoZIhvcNAQELBQAEggIAfqfjxhHIC4Kjzy93jrCS # OIzUPtrXOtMeMrJ8fir9wKsCGG/af+/D1E5lv/VY2uGQuIA45V8HCh7e+oB6mMOs # YwDseYPUZ69JBFryrizE6VXWhxPW3im3WrMb7+ITZzgw/0BvGN+esyMTARVEO3St # 6/ah7SbKVGM+w3xtV/fLF5KNfJ5NXuQU+o3qFbuOqs9IDq9AXKmj9TNPU52LIf8N # UoyO8WC3YOrhj/IJ1KMJ0D1vcCrnwPr+zlogLtrbSldK3cQd1eZpbmMlPLxOHN6x # AuPEfJOtsmZCAEETLYkVC+rZOAJLxGEZKw8h3gR5XisFTqrm8xU0vyVpoPTf78RD # sHPPTSKdPoSQmnP8adN6rtX7Uj1137RhFggLqyK7xdil2KvfLKZVC8B/0SJEffoO # NQxCPzfzzWgYIXydWCgKFT7/ymZekuAbUhgrAuH2RYspQQE3DbbxD4WkdHDpCBs7 # RO2JuuQE0cCggaRZR5+9HJCJ+Z5ZmKotIJTZ6wqdnB8K3unT+sIP7o8+aj0RdHti # 6fqjN+BwqzFSlH81cTnBEjYN19LGBgy3n5dofzzS6ASy9tujtysN9rR9jnA78ybt # 4dwlc480QojJNgECc+BWix08Yyv/8kp973l/+pfxyYpy+VFflhDnMGB4MaYR5v0F # Nt2pWpybg/ki/vDcw1A4o+U= # SIG # End signature block
combined_dataset/train/non-malicious/4475.ps1
4475.ps1
configuration PSRepository_RemoveRepositoryConfig { param ( [Parameter()] [System.String[]] $NodeName = 'localhost', [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $RepositoryName ) Import-DscResource -ModuleName 'PowerShellGet' Node $nodeName { PSRepository 'AddRepository' { Ensure = 'Absent' Name = $RepositoryName } } }
combined_dataset/train/non-malicious/2550.ps1
2550.ps1
cls function Backup-SMCReplication { param ([string ] $sqlServer , [string] $outputDirectory ) Import-Module Repl [string] $path = "$outputDirectory\$((get-date).toString('yyyy-MMM-dd'))\" if ( -not (test-path $path)) { New-Item $path -ItemType Directory | Out-Null } foreach($publication in Get-ReplPublication $sqlServer) { [string] $fileName = "{0}{1}.sql" -f $path,$publication.DatabaseName.Replace(" ", "") $fileName = "{0}Create_{1}_{2}.sql" -f $path,$publication.DatabaseName.Replace(" ", ""),$publication.Name.Replace(" ", "") $publication.Script([Microsoft.SqlServer.Replication.scriptoptions]::Creation ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::EnableReplicationDB ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeCreateLogreaderAgent ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeCreateQueuereaderAgent ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludePublicationAccesses ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeCreateSnapshotAgent ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeArticles ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludePublisherSideSubscriptions ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeSubscriberSideSubscriptions ) | Out-File $fileName } } function Delete-SMCReplication() { param ([string ] $sqlServer , [string] $outputDirectory ) Import-Module Repl [string] $path = "$outputDirectory\$((get-date).toString('yyyy-MMM-dd'))\" if ( -not (test-path $path)) { New-Item $path -ItemType Directory | Out-Null } foreach($publication in Get-ReplPublication $sqlServer) { [string] $fileName = "{0}{1}.sql" -f $path,$publication.DatabaseName.Replace(" ", "") $fileName = "{0}Delete_{1}_{2}.sql" -f $path,$publication.DatabaseName.Replace(" ", ""),$publication.Name.Replace(" ", "") $publication.Script([Microsoft.SqlServer.Replication.scriptoptions]::Deletion ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeDisableReplicationDB ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludePublisherSideSubscriptions ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeSubscriberSideSubscriptions ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeArticles ` -bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeReplicationJobs ) | Out-File $fileName } } Backup-SMCReplication -sqlServer PSQLDLS30 -outputDirectory e:\Dexma\logs Delete-SMCReplication -sqlServer PSQLDLS30 -outputDirectory e:\Dexma\logs
combined_dataset/train/non-malicious/sample_55_44.ps1
sample_55_44.ps1
Get-Module | ForEach-Object { Remove-Module -Name $_.Name -Force } $PSModuleAutoloadingPreference = 'none' Import-Module Microsoft.PowerShell.Utility #Enforcing default PSModulePath to avoid getting unexpected modules to run instead of built-in modules $env:PSModulePath = "C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules" $resultOutputDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult" function CheckAuthenticodeSignature($pathToCheck) { if (test-path $resultOutputDir -ErrorAction SilentlyContinue) { $issuerInfo = "$resultOutputDir\issuerInfo.txt" } else { $issuerInfo = "$PSScriptRoot\issuerInfo.txt" } if ($pathToCheck) { if (Test-Path -path $pathToCheck -ErrorAction SilentlyContinue) { $AuthenticodeSig = (Get-AuthenticodeSignature -FilePath $pathToCheck) $cert = $AuthenticodeSig.SignerCertificate $FileInfo = (get-command $pathToCheck).FileVersionInfo $issuer = $cert.Issuer #OS is older than 2016 and some built-in processes will not be signed if (($OSBuild -lt 14393) -and (!$AuthenticodeSig.SignerCertificate)) { if (($FileInfo.CompanyName -eq "Microsoft Corporation")) { return } else { Write-Error "Script execution terminated because a process or script that does not have any signature was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } } #check if valid if ($AuthenticodeSig.Status -ne "Valid") { Write-Error "Script execution terminated because a process or script that does not have a valid Signature was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } #check issuer if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) { Write-Error "Script execution terminated because a process or script that is not Microsoft signed was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } if ($AuthenticodeSig.IsOSBinary -ne "True") { #If revocation is offline then test below will fail if (!$LegacyOS) { $IsOnline = (Get-NetConnectionProfile).IPv4Connectivity -like "*Internet*" } $EKUArray = @('1.3.6.1.5.5.7.3.3', '1.3.6.1.4.1.311.76.47.1') if ($IsOnline) { $IsWindowsSystemComponent = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.10.3.6" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable OsCertWarnVar -ErrorVariable OsCertErrVar) $IsMicrosoftPublisher = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.76.8.1" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable MsPublisherWarnVar -ErrorVariable MsPublisherErrVar) $TrustedEKU = (Test-Certificate -Cert $cert -EKU $EKUArray -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable EKUWarnVar -ErrorVariable EKUErrVar) if (($IsWindowsSystemComponent -eq $False) -and ($IsMicrosoftPublisher -eq $False) -and ($TrustedEKU -eq $False)) { #Defender AV and some OS processes will have an old signature if older version is installed #Ignore if cert is OK and only signature is old if (($OsCertWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($MsPublisherWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($OsCertWarnVar -like "*CERT_TRUST_IS_OFFLINE_REVOCATION*") -or ($MsPublisherWarnVar -like "CERT_TRUST_IS_OFFLINE_REVOCATION")) { return } Write-Error "Script execution terminated because the process or script certificate failed trust check" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } } } } else { Write-Error ("Path " + $pathToCheck + " was not found") | Out-File $issuerInfo -append } } } function Download-WebFile($ClientAnalyzer) { Write-host -ForegroundColor Green "Downloading MDEClientAnalyzer from: " $ClientAnalyzer Import-Module BitsTransfer $BitsJob = Start-BitsTransfer -source $ClientAnalyzer -Destination "$DlZipFile" -Description "Downloading additional files" -RetryTimeout 60 -RetryInterval 60 -ErrorAction SilentlyContinue } [int]$OSBuild = [system.environment]::OSVersion.Version.Build if ($OSBuild -le "7601") { $LegacyOS = "True" } $DownloadDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads" $DlZipFile = Join-Path $DownloadDir "MDEClientAnalyzerPreview.zip" $MDECADir = Join-Path $DownloadDir "MDECA" CheckAuthenticodeSignature $MyInvocation.MyCommand.Path if (!(test-path -path "$DlZipFile")) { Download-WebFile "https://aka.ms/betamdeanalyzer" } if (test-path -path "$DlZipFile") { if (Test-Path -LiteralPath $MDECADir -PathType Container) { Remove-Item -LiteralPath $MDECADir -Recurse -Force -ErrorAction SilentlyContinue } [System.Reflection.Assembly]::LoadWithPartialName("system.IO.Compression.FileSystem") | Out-Null [System.IO.Compression.ZipFile]::ExtractToDirectory($DlZipFile, $MDECADir) | Out-Null CheckAuthenticodeSignature "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1" &powershell -ExecutionPolicy Bypass "& 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1' -outputDir 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA' -r -l -e -v -m 60" } # SIG # Begin signature block # MIIn4AYJKoZIhvcNAQcCoIIn0TCCJ80CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBh6K+9LnSOaSFb # DqH52sNLOvS/D+YWN4eCYZVvPmT8hKCCDZcwggYVMIID/aADAgECAhMzAAADz7d0 # vUQxddCTAAAAAAPPMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwMjIyMTkwNzUzWhcNMjUwMjE5MTkwNzUzWjCBlDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWlj # cm9zb2Z0IFdpbmRvd3MgRGVmZW5kZXIgQWR2YW5jZWQgVGhyZWF0IFByb3RlY3Rp # b24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDwAPmxMmR9a92NX/Lv # 2PmaySDZqZUANxu28n+GqAuhMRrC8/v5HrKeebKt+6wqnp28fO1jvJ5OlBIrirN7 # KUiSUH86mvByCFnIwIkKcusZbgEF+v15S0jRExa5C9lC+kDVYtlSCnPEdx/tkKLN # QQMmSroC3baj7y0WIvBfZ1l4x2qyDhFC/5plmMfD8TSfl3sN4twBiXAcpJ/SES50 # QbLahl/MTsVA2UEo7ygPJIrmci8wvD0Kt1pfkwbB3eiK4Vatr0VoJujRucjGT322 # m/9vH6p4Y5suUJMo9196/ze8hA8bqH+5NdU+DeRLrV/UzVat1Xs/Wm6kPK8GgTPL # H+M9AgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBggrBgEFBQcDAwYKKwYBBAGCN0wv # ATAdBgNVHQ4EFgQU10vjUl0bvgJvpCFtGT8ECb23+CAwRQYDVR0RBD4wPKQ6MDgx # HjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMNNDUxODk0 # KzUwMjA2OTAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8E # TTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9N # aWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBR # BggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAw # DQYJKoZIhvcNAQELBQADggIBAHcmfqgz/boPmZhEOAtYI5wj3mRicbSQwDQcGZfK # 8I1WdILE80dhNGqgtVvxO5v5/PyjBJY5HV9HxxCzdVVj60PYAwzoyfTIZF+0hPrh # l6JkjfckCiy9qsONVkL6SDJH6a+Xf4penA2ge9WM3XLR5BUQH538wx4w+VswV1QX # hKsAMGAvxBG8EzIFTMRXMoKy/RYZ1FSig96mdJRb9Zh4o37XcyAgSxlbiv50vu3X # MGNXRZJY0/PdB6Du55mI0WfJDaKBJuDShBMLOjDRX8UEWjy3rqGTjVVLYhK4mWq6 # I/1bIZlgkKBFnUMFbVvtSWDP13FgyGIVDk5YB5s2XmSC6hTfXAHakSpLfFeZ1VK5 # /pRMdhxEenleDdsgksd9idt+U7YxgjZ6gfdGuWgj9ZNi8Ef4ILoA5fkUGIIP14a7 # j2SUsaYvJKw/5aiVHRza+Q9gbDpNcsR5WbhhcSAnkFmi7ZkmJKHVlkUqAUDbP8WB # yz/bq6m/HCHELfFfsG4HMvOfLSTVhKfXPptRzN4N5m2AZX423KM2zhqzPjCWNWce # /jqhUKtbyMuPPqqo+eaoYi+ZzaEqirxAmPF6Nz3VIncZppzm451L2Uu05NwN1T5m # ZbiGW2WW1Iz50ofUKACCqThHMtSh4fOdq0OiKaqQz3S5BGdoXdPPOKgXxOtfaMpr # C3SrMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj # cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4 # MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBD # QSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3Y # bqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUB # FDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnbo # MlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT # +OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuy # e4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEh # NSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2 # z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3 # s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78Ic # V9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E # 11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5P # M4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcV # AQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBL # hklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggr # BgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsG # AQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwA # ZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0G # CSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDB # ZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc # 8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYq # wooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu # 5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWI # UUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXh # j38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yH # PgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtI # EJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4Guzq # N5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgR # MiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQ # zTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEC # EzMAAAPPt3S9RDF10JMAAAAAA88wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcN # AQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUw # LwYJKoZIhvcNAQkEMSIEINPVW4eNb62pVHPCHLNw2kRazX2OxQPyNu7pgho0kzJP # MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAHGP3LVQJDodF # 7VxQIm7lTL30lgkgHiMv1z0WiSr6uKpcV3Gou9cpChPKESnMUi88SiHLOE14W9A6 # vYJEdLhh94sSde4ttvGT/PTuVttVJoMw76Q33HYEktDc48YW7Pa5IiLo6iZjpYYB # V/X+4aR6cZCgbdZoSLXk5WIbZQOvruUaM8G/5zPSDITSjez7+GNubQ33UGkA9UwY # J4c9FJ6wvUncAM9L0DIsqSeZP9jt0m2OLU3IHeGAJPcktQDMcg5AR7MfE69xDayH # JDUXRLJ+grqIzzb25tyAYXXwUeA52OdiJmr3AkfSKa7G2zjjI/q0GLXfF3QrwpZt # MbmN9HcXGaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCC # FwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgE # ggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBeD/nfKw0o # Z2OVrXWt4R/2fih9AoPS3uJlz7Rt/5elFAIGZk4IIh6dGBMyMDI0MDUyOTE0MzYz # NS44MDlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z # IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJB # MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycw # ggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUw # MTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVk # MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVP # UC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB # 2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUs # JXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zo # P/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo # 0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEU # nfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo # 83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2f # iN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xr # vWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrr # nZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9 # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo # +kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7y # ISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24b # bqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5U # MnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYD # ZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76 # YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjM # bL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9 # NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLb # RomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHky # sribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1o # bDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQw # ggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM # aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO # AwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOoBF9gwIhgPMjAyNDA1 # MjkxMDU2MjRaGA8yMDI0MDUzMDEwNTYyNFowdDA6BgorBgEEAYRZCgQBMSwwKjAK # AgUA6gEX2AIBADAHAgEAAgIRcDAHAgEAAgIhazAKAgUA6gJpWAIBADA2BgorBgEE # AYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYag # MA0GCSqGSIb3DQEBBQUAA4GBAJsO3dDsgUvjGEEaSuQUhPtT9xBjIKs/ifz5R1OF # yfiv35tjABMoWRo6JdqUy403V7EP+t5GXW4UdjaUOFE1lqfyH8DKFja2/N6DzeDU # NdojR8HDgEu9Ce1ThrHKZ7SUJmcfc1S+b8BfTGgYIkW1NPsPw7oZoD3c+o+gBX4y # iRwjMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC # EzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3 # DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQghECzG0kkr4lAZvSP # RZUu2W8+ZSjxUCPgITiB50vn9oMwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9 # BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIE # IN4KjELBbS4DF0pIdilyyYClewKopigXjvX6nXMPfKJSMA0GCSqGSIb3DQEBCwUA # BIICACDzBguIsJLR4mtjI5fnSrvSVdo95ls9AQZ9q54aWqeq5GTvlbb2bhqwN2U3 # npAKa4fxRNGnMI2hsXtt1rayu6OS261rdFG4FDe6JBn13VT+Y81QM3zJ6pLVtJ4G # qXpKAjxp1V+MWnwWeRKL+Zrv3Gb62AeE8beyUYxedMIfqFLaX4EPlkjvDIGz1xrV # VcyFUbH45DzLzmcMZQQYiJF1m5hxXeN3FXtjuXZttX7gNJwIU7/iJRcE+JWtYbuh # BS+WivZHuIP1dKIO+sCdcuCO+zVEagsRwEOmwgt8VtW2b2yzn04URz3Km2EKssy8 # 7LJobpXd8FkPza7Bjq0+6zJ0fvuDH7PS83BV1GKpomAaadFv9ch0C74OUkVogtC4 # EvW/fpq37+ndkfQeKRFZiOEYnhGM8VHsnHnt4MfcGZhVDDmTSFyCTQrQdoWU9e04 # Bajdmkc0Vknh1dHqG3DqSk34ZNgWLgSohy93S+jUNcxwKL6pqF2BD6LM7uJ2k55R # d5E7kel5YZyoNMjQZmHCANwx7HaA1pg9C1CHurYBl4sfmqs9qklkrwtE9ZmBSvbB # xGbK8TUwBGlVIX16xjQtVJV7JXYrk+P0S6G4BZUg9J1qrqIlPsH+4rLl6JVxwYyy # n8vx/QePbMceu4/qmm1ELr1Y6oLGTLxtcm00Y7dtnQ09inXq # SIG # End signature block
combined_dataset/train/non-malicious/sample_21_92.ps1
sample_21_92.ps1
# # Module manifest for module 'OCI.PSModules.Dashboardservice' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dashboardservice.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'cd6937ca-f4c2-4263-82d8-c6bec6fbadc4' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dashboardservice Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dashboardservice.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDashboardserviceDashboard', 'Get-OCIDashboardserviceDashboardGroup', 'Get-OCIDashboardserviceDashboardGroupsList', 'Get-OCIDashboardserviceDashboardsList', 'Move-OCIDashboardserviceDashboardGroup', 'Move-OCIDashboardserviceDashboardGroupCompartment', 'New-OCIDashboardserviceDashboard', 'New-OCIDashboardserviceDashboardGroup', 'Remove-OCIDashboardserviceDashboard', 'Remove-OCIDashboardserviceDashboardGroup', 'Update-OCIDashboardserviceDashboard', 'Update-OCIDashboardserviceDashboardGroup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dashboardservice' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_67_60.ps1
sample_67_60.ps1
# # Module manifest for module 'OCI.PSModules.Osmanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osmanagement.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '08aa2c02-1476-4491-ace6-a15dc5ef7b7f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osmanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIOsmanagementPackagesToSoftwareSource', 'Disable-OCIOsmanagementModuleStreamOnManagedInstance', 'DisMount-OCIOsmanagementChildSoftwareSourceFromManagedInstance', 'DisMount-OCIOsmanagementManagedInstanceFromManagedInstanceGroup', 'DisMount-OCIOsmanagementParentSoftwareSourceFromManagedInstance', 'Enable-OCIOsmanagementModuleStreamOnManagedInstance', 'Get-OCIOsmanagementAvailablePackagesForManagedInstanceList', 'Get-OCIOsmanagementAvailableSoftwareSourcesForManagedInstanceList', 'Get-OCIOsmanagementAvailableUpdatesForManagedInstanceList', 'Get-OCIOsmanagementAvailableWindowsUpdatesForManagedInstanceList', 'Get-OCIOsmanagementErrataList', 'Get-OCIOsmanagementErratum', 'Get-OCIOsmanagementEvent', 'Get-OCIOsmanagementEventContent', 'Get-OCIOsmanagementEventReport', 'Get-OCIOsmanagementEventsList', 'Get-OCIOsmanagementManagedInstance', 'Get-OCIOsmanagementManagedInstanceErrataList', 'Get-OCIOsmanagementManagedInstanceGroup', 'Get-OCIOsmanagementManagedInstanceGroupsList', 'Get-OCIOsmanagementManagedInstancesList', 'Get-OCIOsmanagementModuleStream', 'Get-OCIOsmanagementModuleStreamProfile', 'Get-OCIOsmanagementModuleStreamProfilesList', 'Get-OCIOsmanagementModuleStreamProfilesOnManagedInstanceList', 'Get-OCIOsmanagementModuleStreamsList', 'Get-OCIOsmanagementModuleStreamsOnManagedInstanceList', 'Get-OCIOsmanagementPackagesInstalledOnManagedInstanceList', 'Get-OCIOsmanagementRelatedEventsList', 'Get-OCIOsmanagementScheduledJob', 'Get-OCIOsmanagementScheduledJobsList', 'Get-OCIOsmanagementSoftwarePackage', 'Get-OCIOsmanagementSoftwareSource', 'Get-OCIOsmanagementSoftwareSourcePackagesList', 'Get-OCIOsmanagementSoftwareSourcesList', 'Get-OCIOsmanagementUpcomingScheduledJobsList', 'Get-OCIOsmanagementWindowsUpdate', 'Get-OCIOsmanagementWindowsUpdatesInstalledOnManagedInstanceList', 'Get-OCIOsmanagementWindowsUpdatesList', 'Get-OCIOsmanagementWorkRequest', 'Get-OCIOsmanagementWorkRequestErrorsList', 'Get-OCIOsmanagementWorkRequestLogsList', 'Get-OCIOsmanagementWorkRequestsList', 'Invoke-OCIOsmanagementInstallAllPackageUpdatesOnManagedInstance', 'Invoke-OCIOsmanagementInstallAllUpdatesOnManagedInstanceGroup', 'Invoke-OCIOsmanagementInstallAllWindowsUpdatesOnManagedInstance', 'Invoke-OCIOsmanagementInstallModuleStreamProfileOnManagedInstance', 'Invoke-OCIOsmanagementInstallPackageOnManagedInstance', 'Invoke-OCIOsmanagementInstallPackageUpdateOnManagedInstance', 'Invoke-OCIOsmanagementInstallWindowsUpdateOnManagedInstance', 'Invoke-OCIOsmanagementManageModuleStreamsOnManagedInstance', 'Invoke-OCIOsmanagementRunScheduledJobNow', 'Invoke-OCIOsmanagementSearchSoftwarePackages', 'Invoke-OCIOsmanagementSkipNextScheduledJobExecution', 'Invoke-OCIOsmanagementSwitchModuleStreamOnManagedInstance', 'Mount-OCIOsmanagementChildSoftwareSourceToManagedInstance', 'Mount-OCIOsmanagementManagedInstanceToManagedInstanceGroup', 'Mount-OCIOsmanagementParentSoftwareSourceToManagedInstance', 'Move-OCIOsmanagementManagedInstanceGroupCompartment', 'Move-OCIOsmanagementScheduledJobCompartment', 'Move-OCIOsmanagementSoftwareSourceCompartment', 'New-OCIOsmanagementManagedInstanceGroup', 'New-OCIOsmanagementScheduledJob', 'New-OCIOsmanagementSoftwareSource', 'Remove-OCIOsmanagementEventContent', 'Remove-OCIOsmanagementManagedInstanceGroup', 'Remove-OCIOsmanagementModuleStreamProfileFromManagedInstance', 'Remove-OCIOsmanagementPackageFromManagedInstance', 'Remove-OCIOsmanagementPackagesFromSoftwareSource', 'Remove-OCIOsmanagementScheduledJob', 'Remove-OCIOsmanagementSoftwareSource', 'Update-OCIOsmanagementEvent', 'Update-OCIOsmanagementManagedInstance', 'Update-OCIOsmanagementManagedInstanceGroup', 'Update-OCIOsmanagementScheduledJob', 'Update-OCIOsmanagementSoftwareSource', 'Write-OCIOsmanagementEventContent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_32_60.ps1
sample_32_60.ps1
# virtualenv activation module # Activate with `overlay use activate.nu` # Deactivate with `deactivate`, as usual # # To customize the overlay name, you can call `overlay use activate.nu as foo`, # but then simply `deactivate` won't work because it is just an alias to hide # the "activate" overlay. You'd need to call `overlay hide foo` manually. export-env { def is-string [x] { ($x | describe) == 'string' } def has-env [...names] { $names | each {|n| $n in $env } | all {|i| $i == true} } # Emulates a `test -z`, but btter as it handles e.g 'false' def is-env-true [name: string] { if (has-env $name) { # Try to parse 'true', '0', '1', and fail if not convertible let parsed = (do -i { $env | get $name | into bool }) if ($parsed | describe) == 'bool' { $parsed } else { not ($env | get -i $name | is-empty) } } else { false } } let virtual_env = 'C:\Users\caleb\coding\projects\work\policy_engine_extension\.nox\setup' let bin = 'Scripts' let is_windows = ($nu.os-info.family) == 'windows' let path_name = (if (has-env 'Path') { 'Path' } else { 'PATH' } ) let venv_path = ([$virtual_env $bin] | path join) let new_path = ($env | get $path_name | prepend $venv_path) # If there is no default prompt, then use the env name instead let virtual_env_prompt = (if ('' | is-empty) { ($virtual_env | path basename) } else { '' }) let new_env = { $path_name : $new_path VIRTUAL_ENV : $virtual_env VIRTUAL_ENV_PROMPT : $virtual_env_prompt } let new_env = (if (is-env-true 'VIRTUAL_ENV_DISABLE_PROMPT') { $new_env } else { # Creating the new prompt for the session let virtual_prefix = $'(char lparen)($virtual_env_prompt)(char rparen) ' # Back up the old prompt builder let old_prompt_command = (if (has-env 'PROMPT_COMMAND') { $env.PROMPT_COMMAND } else { '' }) let new_prompt = (if (has-env 'PROMPT_COMMAND') { if 'closure' in ($old_prompt_command | describe) { {|| $'($virtual_prefix)(do $old_prompt_command)' } } else { {|| $'($virtual_prefix)($old_prompt_command)' } } } else { {|| $'($virtual_prefix)' } }) $new_env | merge { PROMPT_COMMAND : $new_prompt VIRTUAL_PREFIX : $virtual_prefix } }) # Environment variables that will be loaded as the virtual env load-env $new_env } export alias pydoc = python -m pydoc export alias deactivate = overlay hide activate
combined_dataset/train/non-malicious/sample_16_37.ps1
sample_16_37.ps1
# # Module manifest for module 'OCI.PSModules.Budget' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Budget.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f606310f-04b6-4c8e-bdd7-235e79ecc908' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Budget Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Budget.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIBudget', 'Get-OCIBudgetAlertRule', 'Get-OCIBudgetAlertRulesList', 'Get-OCIBudgetsList', 'New-OCIBudget', 'New-OCIBudgetAlertRule', 'Remove-OCIBudget', 'Remove-OCIBudgetAlertRule', 'Update-OCIBudget', 'Update-OCIBudgetAlertRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Budget' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_50_14.ps1
sample_50_14.ps1
# # Module manifest for module 'OCI.PSModules.Dts' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dts.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '08adf9d8-a13f-4a0f-896f-df35c155c839' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dts Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dts.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'DisMount-OCIDtsDevicesFromTransferPackage', 'Get-OCIDtsApplianceExportJob', 'Get-OCIDtsApplianceExportJobsList', 'Get-OCIDtsShippingVendorsList', 'Get-OCIDtsTransferAppliance', 'Get-OCIDtsTransferApplianceCertificateAuthorityCertificate', 'Get-OCIDtsTransferApplianceEncryptionPassphrase', 'Get-OCIDtsTransferApplianceEntitlement', 'Get-OCIDtsTransferApplianceEntitlementList', 'Get-OCIDtsTransferAppliancesList', 'Get-OCIDtsTransferDevice', 'Get-OCIDtsTransferDevicesList', 'Get-OCIDtsTransferJob', 'Get-OCIDtsTransferJobsList', 'Get-OCIDtsTransferPackage', 'Get-OCIDtsTransferPackagesList', 'Mount-OCIDtsDevicesToTransferPackage', 'Move-OCIDtsApplianceExportJobCompartment', 'Move-OCIDtsTransferJobCompartment', 'New-OCIDtsApplianceExportJob', 'New-OCIDtsTransferAppliance', 'New-OCIDtsTransferApplianceAdminCredentials', 'New-OCIDtsTransferApplianceEntitlement', 'New-OCIDtsTransferDevice', 'New-OCIDtsTransferJob', 'New-OCIDtsTransferPackage', 'Remove-OCIDtsApplianceExportJob', 'Remove-OCIDtsTransferAppliance', 'Remove-OCIDtsTransferDevice', 'Remove-OCIDtsTransferJob', 'Remove-OCIDtsTransferPackage', 'Update-OCIDtsApplianceExportJob', 'Update-OCIDtsTransferAppliance', 'Update-OCIDtsTransferDevice', 'Update-OCIDtsTransferJob', 'Update-OCIDtsTransferPackage' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dts' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_14_14.ps1
sample_14_14.ps1
/* eslint-disable no-undef */ var plugin = require("plugin-vs-v2"); if (typeof plugin != "undefined") { plugin.Messaging.addEventListener("pluginready", function () { setHtmlText(); }); } function setHtmlText() { // resource strings used by docker.web.default.html setTextContent("#dockerWebCoreOverviewHeader", "DockerWebCoreOverviewHeader"); setTextContent("#dockerWebCoreSubTitle", "DockerWebCoreSubTitle"); setTextContent("#containersHeader", "ContainersHeader"); setTextContent("#containerToolsOverview", "ContainerToolsOverview"); setTextContent("#browseDocsText", "BrowseDocsText"); setTextContent("#publishToAppServicesText", "PublishToAppServicesText"); setAltText("#containersAltText", "ContainersHeader"); } // SIG // Begin signature block // SIG // MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // GAQuvgtekkZEIZtqYXCbSXOEVvMNrmRZYGfFdJLjfMeg // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghmeMIIZmgIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDC6BSCCobI6RTo // SIG // TIpZcyrnQyg6Uk/RoaZIJZZyg5KuUzBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBADQsj8KVLEh7cAA4CPiDuHgReAa4ZdMU // SIG // 580nMCyq6zjDNTYbPGPU+DfGDJIGsKpQHIzq0SPBE7Li // SIG // hqsAuYUWtjHMaUiOmi9HSWl9k2xojKT3xkvEu5oMhZhv // SIG // qbrqEio8OYKy8PL5NnEo41tkTmgWCM5Spmg4FeEg552l // SIG // BoLqt8C6ULXtlP7smZvr0sxzPHQbRNh5Q2mVSSHnfRWq // SIG // +pJhTAdsKc0pjN4hScU4kfRjQJGmJ5tcNhD4pAAY/jFo // SIG // LVWA+m87SfFqiKy/JBQIo4g2WnetOoTonuQ6u9xzpzp5 // SIG // kW5LBIpv+9fNpqiCXcbAMZcjkFdDYMV72dTniGsUf+Gm // SIG // ZCKhghcoMIIXJAYKKwYBBAGCNwMDATGCFxQwghcQBgkq // SIG // hkiG9w0BBwKgghcBMIIW/QIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBWQYLKoZIhvcNAQkQAQSgggFIBIIBRDCCAUAC // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // yO7S9XjO3XTw3x3L3mEcHY+7GkGyc++59JlNvv9Se/sC // SIG // BmYgLEuaPBgTMjAyNDA0MTcyMTI2NTUuNzU0WjAEgAIB // SIG // 9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG // SIG // A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u // SIG // cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT // SIG // TjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9z // SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEXcwggcnMIIF // SIG // D6ADAgECAhMzAAAB3MHgjMJfWF6OAAEAAAHcMA0GCSqG // SIG // SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwMB4XDTIzMTAxMjE5MDcwNloXDTI1MDExMDE5MDcw // SIG // NlowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT // SIG // JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt // SIG // aXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4 // SIG // Mi00QkZELUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBU // SIG // aW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB // SIG // AQUAA4ICDwAwggIKAoICAQCLyLMgNbI4PZEiic3pa1Fh // SIG // eUoamFi/N2pp90hOSciFT1Auxeqk3C6YYR2fYnX9tX9E // SIG // Whq1PBB8nRfDcTzEdilTYgLQhjyWvJFdQhr5923hgdpt // SIG // pbZqiWpxu9ZgMsK5CgE2J4sCiz0CydNBJF8OU0sH5iV2 // SIG // 3YECxZR8nwOSoPqVLCV86rppCLxK9A1z76bQBqpHRSys // SIG // KOAU5RIJ783k317pM1/L0LUwC31Sbk1IEVO86D/0RVrd // SIG // 1moGoWelJaCNBQvF5QUA1Q1+SXjBLMe44CQ3RJyuOGPI // SIG // B7hFkQ6vkhvV6NBiDo4rk1g+br975RJiAMkf+60hb3C5 // SIG // 8AKjHanMv4qkDzJQznHdAG54j/ImtQUBFJ32U91Mciva // SIG // ywf0kYij8hw5YPKFsF8or9/mxgenZnTOtbq+p1LXw3+d // SIG // ZT3CoSuFaPN6ThNf54lpVZxB0FfTSefw21Eqltkak1Gt // SIG // jtirr7MkRjBIIxiQNdv0qq0apbxNn4jeWZmVbakj1miG // SIG // rMe2tBgfn3U8PoHkZ+jKNkuvv22RMEv9CCeYHChopzW3 // SIG // 8kNca71lz7V8yjn45Ie+Ykbl6LqxlT0apJs+VGM/kecm // SIG // zCVo/pn3Bqs9oV1fImZwmQwa652Yr5xKwjIeRZX4POPe // SIG // qU9KYY1Ex9hgoRyLxOEg0pNocFj/7hwfYBLPKf/T3v5r // SIG // fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOhz0gXdDnxF // SIG // 97jVrHZEq2lBnt3bMB8GA1UdIwQYMBaAFJ+nFV0AXmJd // SIG // g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js // SIG // L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy // SIG // MDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB // SIG // BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt // SIG // cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC // SIG // MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0P // SIG // AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDZ62/B // SIG // MK/Hl/x9bCrd658Ew8eAKoB25DDUKPpFBsAiDV0t8tRl // SIG // HHarCv0dYOk3+7TcdatDaSpNSU7qVCXx3RMSrZLoRwPv // SIG // NpU+8iEqf2O+HaidN0Qk+EPvKKEF0zM8YnsHxK1S7fFn // SIG // n3m53Ek9IusqSr/O6QmJMTNuG26mzP1fjOVQaaQlLO0f // SIG // nBE4s/8xANQG2S/74l7R5q8gNAhnfj7fXPmnbGH5u6nu // SIG // VDJ0tH/2CZhBDJBKhlws8iyvnYflLBYtHeJZHXBPmauS // SIG // TYyB3rF9cM7RlQLb19A2A2XTdlmdZJPoTjG5VFfy/J9W // SIG // Fs4T/+V0J2JdNwH1xK5/tRGrcpYn83dwoSdcbhhu+mG1 // SIG // oIkV5w7wosA6r1CXr1UWNasuMuL5VSmkobW3X4D8hnni // SIG // f2HEgTjTnNAzU1m4zGy+dKniBAtJR0qS9q0WDVbt4bB8 // SIG // xvJ+buQkGoz8MfT86bGSHhUzR8lRepLoyOFaPTbzv8xf // SIG // DreOCDI+DO1F/WWuEMBn+Qe9ceezo2l+d4MU+L86B7xA // SIG // Vxfagph0YFwS20aJiXw5+tGpc7+3aQlUCLkNOtp8iGSp // SIG // 7F8c7ihW9E411sOjhaRtW7I16TqOQzB5MrK4m8R6K+GM // SIG // +XWY1chwDciqNG0qwJVXooXGhuRe+EmU/BbchwFuiIC3 // SIG // OcP9w/kdaGw4SmdtVjCCB3EwggVZoAMCAQICEzMAAAAV // SIG // xedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgx // SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u // SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jv // SIG // c29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy // SIG // MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy // SIG // NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd // SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi // SIG // MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM // SIG // 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/ // SIG // bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1 // SIG // jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx // SIG // XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41 // SIG // JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP // SIG // 1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3j // SIG // tIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF // SIG // 50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg // SIG // 3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F // SIG // 37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 // SIG // lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM // SIG // jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX // SIG // pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJ // SIG // YfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF // SIG // ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e // SIG // FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB // SIG // BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS // SIG // /mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A // SIG // XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB // SIG // BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBv // SIG // c2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZ // SIG // BgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E // SIG // BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW // SIG // gBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN // SIG // MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v // SIG // cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx // SIG // MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG // SIG // AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v // SIG // cGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz // SIG // LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf // SIG // ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx // SIG // Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6 // SIG // th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I // SIG // dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq // SIG // 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBew // SIG // VIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7 // SIG // bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa // SIG // 2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzH // SIG // VG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZ // SIG // c9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakUR // SIG // R6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs // SIG // QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi // SIG // excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN // SIG // uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/ // SIG // OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd // SIG // VTNYs6FwZvKhggLTMIICPAIBATCCAQChgdikgdUwgdIx // SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u // SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv // SIG // c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm // SIG // MCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4Mi00QkZE // SIG // LUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0 // SIG // YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVABw5/3M/ // SIG // t8kZCFAiX0my93Y50BKmoIGDMIGApH4wfDELMAkGA1UE // SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV // SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD // SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC // SIG // BQDpyqrKMCIYDzIwMjQwNDE4MDQwODQyWhgPMjAyNDA0 // SIG // MTkwNDA4NDJaMHMwOQYKKwYBBAGEWQoEATErMCkwCgIF // SIG // AOnKqsoCAQAwBgIBAAIBBjAHAgEAAgIRNTAKAgUA6cv8 // SIG // SgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ // SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG // SIG // SIb3DQEBBQUAA4GBADvB/kvKuu5jQuuCElGcGOKzKibd // SIG // yApYjGGsK6Ip6g7AC2ocajfMRc42ddqTM/kdCe77GLUb // SIG // IQx3MFSqTjyzkcdwvnyoCiCgo9RQkVIBhvG8S8dj6YJF // SIG // ECbKIQ5QwkqJ8qLrSJr6aUnjt/hJCw/Vy/VnHo5CP3le // SIG // Mcb39Y/07JZNMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE // SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV // SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD // SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4A // SIG // AQAAAdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3 // SIG // DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx // SIG // IgQgnwTTuhWwPS1+RxQO6QgtQqaQRKfsKtm9xjUStKs8 // SIG // PIIwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBT // SIG // pxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIINNzCB // SIG // mDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX // SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD // SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV // SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw // SIG // AhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIK7Knhy+5Jk1 // SIG // e+2mA/Vx/77ILaIcPA78iOcmmf1Q2FZuMA0GCSqGSIb3 // SIG // DQEBCwUABIICADY1QQ9Tu4BQfc+n4VID3+ywsCaX8/ol // SIG // C9QpWQKjtUSIEssmgCWiL+C81IXmUIxgUjSMQ0wpjmXr // SIG // dCIIHywLzRzOOY4NRGVEzu07suhknvY/lJrF7XOABYjh // SIG // wNizD1YIgkNpH7vbFz6ND+4I/dTctNkhRqnhn+6JakoQ // SIG // j3J9lbbnQAiTsrEDROjWP/IL9sUtmGJZ3UfTLdyc33DN // SIG // UIAwu1Phg2luyYHmukj8LNKR7jWqUSJHHHYtKdoX68EF // SIG // yRLr7MJP8ab2tbnHdyg451ViatVKJmlIuhfYBRJRSYOm // SIG // XC/0ql+OJqdJXlHAZCEk++OtO3p6dY9la5bsYLUhAQ3c // SIG // KN6Um6qu+eLdfusmlQVppVpSSNGjJFI0CjRLgVMtCu2J // SIG // UBIy5maxqZAHk/yPpyjVuzCRxvwgyikF/PWvCdlL/sF0 // SIG // N/ADTMrEePelGGSsWvoDJIaiXP0te13nevqN+Z4Va7Bl // SIG // q3r89kXpxGI/El4kQ9JKWoXdN/ybbYngXLMu2+qhO9hV // SIG // d27WMOfJvpRr2AKqtHIkXOes8D+yfK2jceqb4Wu/aaBq // SIG // SF7Y4eNRz169fvNTohAAgUm+l+Uwb7zewwX+G2A1+XfV // SIG // eVHNegBRrluuMf3UmJZtAqnWUJWM9hgrpZAHgZnzY8iO // SIG // xKw8i6oXexLlzjDSadR7O45eyT1t/qc0mxg3 // SIG // End signature block
combined_dataset/train/non-malicious/sample_18_18.ps1
sample_18_18.ps1
# # Module manifest for module 'OCI.PSModules.Apmtraces' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmtraces.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b8a6f9e5-94d6-4c39-9ded-9767df367b9b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmtraces Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmtraces.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmtracesAggregatedSnapshot', 'Get-OCIApmtracesQuickPicksList', 'Get-OCIApmtracesSpan', 'Get-OCIApmtracesStatusAutoActivate', 'Get-OCIApmtracesTrace', 'Get-OCIApmtracesTraceSnapshot', 'Invoke-OCIApmtracesBulkActivateAttribute', 'Invoke-OCIApmtracesBulkDeActivateAttribute', 'Invoke-OCIApmtracesBulkPinAttribute', 'Invoke-OCIApmtracesBulkUnpinAttribute', 'Invoke-OCIApmtracesBulkUpdateAttribute', 'Invoke-OCIApmtracesBulkUpdateAttributeNotes', 'Invoke-OCIApmtracesQuery', 'Write-OCIApmtracesToggleAutoActivate' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmtraces' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_44_89.ps1
sample_44_89.ps1
/////////////////////////////////////////////////////////////////////////////// // Helper to set a designer prop /////////////////////////////////////////////////////////////////////////////// function setDesignerProp(tname, ttype, tvalue) { var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0); trait.value = tvalue; } /////////////////////////////////////////////////////////////////////////////// // Toggle button and gobal state /////////////////////////////////////////////////////////////////////////////// var ct = command.getTrait("state"); if (ct.value == 0) { ct.value = 2; setDesignerProp("usePivot", "bool", true); } else { ct.value = 0; setDesignerProp("usePivot", "bool", false); } // SIG // Begin signature block // SIG // MIInwAYJKoZIhvcNAQcCoIInsTCCJ60CAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // PDMvLmanc11riSBVp0P+WoGIAYCKjTZlRpjiyHdgRrmg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmiMIIZngIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCB213bC9hhAMPnnw4uG/KdH8f2tkQYcBffM // SIG // djP98n/UGDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAB8fp/9r // SIG // 6nUGxntJnR8iTgr5ROwvmv3aAMTzwNOWTBEIcWcx/8Yd // SIG // 5qibqp2IPkUhBOvxSK1w5IkxlFxp9q5Q0n4/pniaW3q9 // SIG // EiEuT4xPbjQa6E699lgsVl7F/Mb1Riu9+P2HuSugpnFg // SIG // y7nvHqJynZRT7Ol7WJBXb0ZT3QhI29oNuUHRBWSSwLBV // SIG // SpqkdVQQ6mk381+JVfuVQzZlvdEWAfCjQi99bnsgeHLL // SIG // r3Qml6ZDtOyIlcMSu7YL6KDW2Ai30yNWU/QqFgqNHxhn // SIG // XoXCfU8aJ6m1Iu1o9JRXAouPj7Q256huKPvCyEJGtiLF // SIG // OwNXbhgcd1Ct/4rGymrUNWjmHcChghcsMIIXKAYKKwYB // SIG // BAGCNwMDATGCFxgwghcUBgkqhkiG9w0BBwKgghcFMIIX // SIG // AQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgMsFj2LFjbuSOne2WFVWG // SIG // j9aW3F1YXyggYMlNXHJmnl8CBmXV/QtzJBgTMjAyNDAz // SIG // MDEwMDM1NDAuODY0WjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlD // SIG // MzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXswggcnMIIFD6ADAgECAhMzAAAB5Y9q // SIG // wPM9tAujAAEAAAHlMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDczNVoXDTI1MDExMDE5MDczNVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQCpe+A62rtjuiy6yTtx8k7zvWl2ov/3jcj+TC1ma5lB // SIG // jTiTD8DCNPFfcwX0TzXLnK3iGEsiR45DCFBprodKz1ef // SIG // 9vlAixqzdT++5/X6v5nc1zDdRc6mjx3ShJSp3iUPEenD // SIG // +Ha7thspprda6xnDXvNNAnA+nfzXaKJppHdfelajrY2R // SIG // QNV1rvhrBQXlh4ns/z5ZanDP3lp7ZEDLNJStM5gnx/gb // SIG // u4tYfhQ0UfBe1s1K/+zN44VXT6QH6ts2AgPGVSzYBIs2 // SIG // PrxZoMfsw7rlPxgoQyu5JQ3AsPv4FaBLkjpeXJULMnVk // SIG // IySV+2dslftSguhtSVaqT93aSjwD/+LnTaqUeRyHm/E2 // SIG // tSX40VM0r96ko3ucvUWE/wI1jWEO4LHs7g1jP/HGddZH // SIG // KNSb1MjkPMfyQ5DBakkcI9b/pnOiyipY//3Vghvx8Paa // SIG // XZViV+qbA3rELkEexVe3gqlf5X2o6C6Tzcf/cxdXb/Ml // SIG // wXc5liT3gontl2kJ6wCg6pRt817sfbTUJs9i/ek3cZyD // SIG // tjhpmMQQAGQFqCm5rWCPgos+AmMjtBZuWd0+NGuXeyib // SIG // n7Regk6HHHP1Kf46RX0IrS343e9XEvnCwnqEPqtJ9CAC // SIG // 71fmnGxDaLkjq47/0LWOBSIx5SOc3ScyZxrJFSeaM4Y4 // SIG // tGEbHL9VsCRQLssgjELy3Zj3XQIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFN//n4e7TXMxInxF5QkIBTl4DIeqMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQAz+sIThYw9WnfBpBCfaCwbr345 // SIG // 3TMhkPUeB4ASkpT7d6WtF1S3IpqyZQ5yhoBQYlsCOlzo // SIG // MPNoXaJQ4jAwSy1kTEyR1lXlGNYFOFwfDjiMQXPf0PN8 // SIG // 29XNEVhLqYAuPCPm/tsdlTYBiVLECMj0dj4l0IU+T8nq // SIG // zIGoPTkqHUIxcKTXRoq52tq6VdtxFMBXjuft6El+CXgj // SIG // Wb4MlDsyqcjL6lWrm6PhpX/6bH1ubSHDI2VbdHpbMH6t // SIG // KiTUIKGIqW2k77+8ZosVCRk24sWIn08AIrz3CjXXorGZ // SIG // rbbOzh2wDO/eWbyi0hKl4kVIw2Gcnh8gMrDBAC2yIXV4 // SIG // BxIetCqGcs5QV891cRIqxO54bnDcDNrVYjpcCOxJHlOY // SIG // bnXLZ1whueSbjMP8G+3O9USopmQPyl5VqZgb5CZAdAWR // SIG // EvDghg3fs2P0/QZ06fLIt+k6pfOFX6WHvYh5suz6qsaj // SIG // Bdgp+KtmtJhDJ6Qa7gxhP4EfXPElSdp7ZAEcuUn5brif // SIG // zAetckb09ZlMd5cqaTttnj4wY58KBL1cWw409Y4XTDXX // SIG // rzrg3iRs0SyvRzZkwwvk3WUJY/lTICJvGXhCETRdKGr4 // SIG // hfkGXFGS1s1m2Kusg6JPBGShYkUeaLQaBi72mBacQWVB // SIG // PJpyyrg5WKG468Ye5Z8K8Vf3zMtBfX0qNicRZrS4LTCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLXMIIC // SIG // QAIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVAPeNohrmBa7BOMM1g3fORKTOkYsK // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpiwX+MCIYDzIwMjQw // SIG // MjI5MjEzMjQ2WhgPMjAyNDAzMDEyMTMyNDZaMHcwPQYK // SIG // KwYBBAGEWQoEATEvMC0wCgIFAOmLBf4CAQAwCgIBAAIC // SIG // BsQCAf8wBwIBAAICEVkwCgIFAOmMV34CAQAwNgYKKwYB // SIG // BAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC // SIG // AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOB // SIG // gQAZVQHxg/uoo2KNV18cEUkgFMJjaGwt+yaH9pj5rhOZ // SIG // oE1/Vz7cciJoC3DNBniilo5vDfAr5Oju8NN+kzPH2oRZ // SIG // dZSBkxtMMwDmsLJAfxNvSLj7pzimGs2gDKPXWFej5iw6 // SIG // 72btFp+PbwAE43eMlYvWcFPiNJlUD54RYXmN2QeMiTGC // SIG // BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYD // SIG // VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k // SIG // MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x // SIG // JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD // SIG // QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMA0GCWCG // SIG // SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZI // SIG // hvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIBvPCPvz+8ev // SIG // TpZNeyWwgZcIv1q7XGoPNRyrR4rjdjlNMIH6BgsqhkiG // SIG // 9w0BCRACLzGB6jCB5zCB5DCBvQQgFanT//6o8RhYXtmG // SIG // 6BF3m/CP6QKH9NQsIW8VB/VOve0wgZgwgYCkfjB8MQsw // SIG // CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ // SIG // MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z // SIG // b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDz // SIG // PbQLowABAAAB5TAiBCAuRswFvFekiXsari1IVoGwc47g // SIG // Gy4afDN8N5NXBd97gjANBgkqhkiG9w0BAQsFAASCAgB/ // SIG // P1j+y7muH3Xz3jedSK5nR2kHkcEuCAsGWHB+/AZikbUT // SIG // N1eWT2yzMlBYm0855xpFzmHAQHRSPvbwIMY8ufNRrQTW // SIG // J84h6VpoG+AjDywy8O1SIO0bGNgm+B7GP62d1IJJdBQD // SIG // yzY9jcMT5eMOpecYg6iWnPVWgdG/ZXJWOEjX5pPPNNf5 // SIG // Bh5tnhO3cle14DxnzSW/ATBxxmWste0XFzsLawT9r4bH // SIG // D469MjFAUL2RpbSygB7uHzf3KbkGKMdq9ZIw0NVlOtyl // SIG // zLPkXpa7llRN1T6dSSKGoG3wJ+lTTFKJEbFPz7tn5Uq8 // SIG // nGhLfUMRSBt/RDWgmw4/mWi7EOPfFZZVAGprFaM0k/aG // SIG // osviyHFfQ6ojchoU+jx4HjI8O2i15e2TlyzaAqLc2J2S // SIG // /3daKxyVao0a55rD8DEmtUK3PrNu/M3ITwKbbyAPq0Mg // SIG // aLu/Gk/ghOIEHeMVx4apxTE0l4z+Ql09Y92Au7WGvvOL // SIG // bquhfe06/OmdXoHgPJLFqKnRVb5zWRCQOvZU7/GcFVll // SIG // LMJD9C/J5Wzfh99rMi9lgyezelUpbArIx+RFncKwPi4O // SIG // Hj6mN0vmTErUZSpIp2lr8DJC4s69Dbm6xHn6e113qS5k // SIG // RUtBhaE5JRywEnM3YeN2Ws2KqJnsQAPJl3U0tqxtuOSF // SIG // jfLQTKgNULMXvciRioMDZw== // SIG // End signature block
combined_dataset/train/non-malicious/2150.ps1
2150.ps1
$powershellexe = (get-process -id $PID).mainmodule.filename Describe "Clone array" -Tags "CI" { It "Cast in target expr" { (([int[]](42)).clone()) | Should -Be 42 (([int[]](1..5)).clone()).Length | Should -Be 5 (([int[]](1..5)).clone()).GetType() | Should -Be ([int[]]) } It "Cast not in target expr" { $e = [int[]](42) $e.Clone() | Should -Be 42 $e = [int[]](1..5) $e.Clone().Length | Should -Be 5 $e.Clone().GetType() | Should -Be ([int[]]) } } Describe "Set fields through PSMemberInfo" -Tags "CI" { Add-Type @" public struct AStruct { public string s; } "@ It "via cast" { ([AStruct]@{s = "abc" }).s | Should -BeExactly "abc" } It "via new-object" { (new-object AStruct -prop @{s="abc"}).s | Should -BeExactly "abc" } It "via PSObject" { $x = [AStruct]::new() $x.psobject.properties['s'].Value = 'abc' $x.s | Should -Be "abc" } } Describe "MSFT:3309783" -Tags "CI" { It "Run in another process" { & $powershellexe -noprofile -command "[psobject] | ForEach-Object FullName" | Should -Be System.Management.Automation.PSObject } It "Run in current process" { [psobject] | ForEach-Object FullName | Should -Be System.Management.Automation.PSObject } It "Pipe objects derived from PSObject" { class MyPsObj : PSObject { MyPsObj($obj) : base($obj) { } [string] ToString() { return "MyObj: " + $this.psobject.BaseObject } } [MyPsObj]::new("abc").psobject.ToString() | Should -Be "MyObj: abc" [MyPsObj]::new("def") | Out-String | ForEach-Object Trim | Should -Be "MyObj: def" } } Describe "ScriptBlockAst.GetScriptBlock throws on error" -Tags "CI" { $e = $null It "with parse error" { $ast = [System.Management.Automation.Language.Parser]::ParseInput('function ', [ref]$null, [ref]$e) { $ast.GetScriptBlock() } | Should -Throw -ErrorId "PSInvalidOperationException" } It "with semantic errors" { $ast = [System.Management.Automation.Language.Parser]::ParseInput('function foo{param()begin{}end{[ref][ref]1}dynamicparam{}}', [ref]$null, [ref]$e) { $ast.GetScriptBlock() } | Should -Throw -ErrorId "PSInvalidOperationException" { $ast.EndBlock.Statements[0].Body.GetScriptBlock() } | Should -Throw -ErrorId "PSInvalidOperationException" } } Describe "Hashtable key property syntax" -Tags "CI" { $script = @' $hash = New-Object hashtable $key = [ConsoleColor]::Red $null = $hash.$key $hash = @{} $hash.$key = 'Hello' $hash.$key '@ It "In current process" { Invoke-Expression $script | Should -BeExactly 'Hello' } It "In different process" { $bytes = [System.Text.Encoding]::Unicode.GetBytes($script) & $powershellexe -noprofile -encodedCommand ([Convert]::ToBase64String($bytes)) | Should -BeExactly 'Hello' } } Describe "Assign automatic variables" -Tags "CI" { $autos = '_', 'args', 'this', 'input', 'pscmdlet', 'psboundparameters', 'myinvocation', 'psscriptroot', 'pscommandpath' foreach ($auto in $autos) { It "Assign auto w/ invalid type constraint - $auto" { { & ([ScriptBlock]::Create("[datetime]`$$auto = 1")) } | Should -Throw $auto { . ([ScriptBlock]::Create("[datetime]`$$auto = 1")) } | Should -Throw $auto { & ([ScriptBlock]::Create("[runspace]`$$auto = 1")) } | Should -Throw $auto { . ([ScriptBlock]::Create("[runspace]`$$auto = 1")) } | Should -Throw $auto { & ([ScriptBlock]::Create("[notexist]`$$auto = 1")) } | Should -Throw $auto { . ([ScriptBlock]::Create("[notexist]`$$auto = 1")) } | Should -Throw $auto } } foreach ($auto in $autos) { It "Assign auto w/o type constraint - $auto" { & ([ScriptBlock]::Create("`$$auto = 1; `$$auto")) | Should -Be 1 . ([ScriptBlock]::Create("`$$auto = 1; `$$auto")) | Should -Be 1 } } It "Assign auto w/ correct type constraint" { & { [object]$_ = 1; $_ } | Should -Be 1 & { [object[]]$args = 1; $args } | Should -Be 1 & { [object]$this = 1; $this } | Should -Be 1 & { [object]$input = 1; $input } | Should -Be 1 & { [System.Management.Automation.InvocationInfo]$myInvocation = $myInvocation; $myInvocation.Line } | Should -Match Automation.InvocationInfo & { [string]$PSScriptRoot = 'abc'; $PSScriptRoot } | Should -BeExactly 'abc' & { [string]$PSCommandPath = 'abc'; $PSCommandPath } | Should -BeExactly 'abc' } } Describe "Assign readonly/constant variables" -Tags "CI" { $testCase = @( @{ sb_wo_conversion = { $? = 1 }; name = '$? = 1' } @{ sb_wo_conversion = { $HOME = 1 }; name = '$HOME = 1' } @{ sb_wo_conversion = { $PID = 1 }; name = '$PID = 1' } ) It "Assign readonly/constant variables w/o type constraint - '<name>'" -TestCases $testCase { param($sb_wo_conversion) { & $sb_wo_conversion } | Should -Throw -ErrorId "VariableNotWritable" { . $sb_wo_conversion } | Should -Throw -ErrorId "VariableNotWritable" } $testCase = @( @{ sb_w_conversion = { [datetime]$? = 1 }; name = '[datetime]$? = 1' } @{ sb_w_conversion = { [datetime]$HOME = 1 }; name = '[datetime]$HOME = 1' } @{ sb_w_conversion = { [datetime]$PID = 1 }; name = '[datetime]$PID = 1' } ) It "Assign readonly/constant variables w/ type constraint - '<name>'" -TestCases $testCase { param($sb_w_conversion) { & $sb_w_conversion } | Should -Throw -ErrorId "VariableNotWritable" { . $sb_w_conversion } | Should -Throw -ErrorId "VariableNotWritable" } } Describe "Attribute error position" -Tags "CI" { It "Ambiguous overloads" { $e = { & { param( [ValidateNotNull(1,2,3,4)] $param ) } } | Should -Throw -PassThru -ErrorId 'MethodCountCouldNotFindBest' $e.InvocationInfo.Line | Should -Match ValidateNotNull } } Describe "Multiple alias attributes" -Tags "CI" { It "basic test" { function foo { param( [alias('aa')] [alias('bb')] $cc ) $cc } foo -aa 1 | Should -Be 1 foo -bb 2 | Should -Be 2 foo -cc 3 | Should -Be 3 } } Describe "Members of System.Type" -Tags "CI" { It "Members in public classes derived from System.Type should be found" { class MyType : System.Collections.IEnumerable { [System.Collections.IEnumerator] GetEnumerator() { return $null } } [type] | Get-Member ImplementedInterfaces | Should -Be 'System.Collections.Generic.IEnumerable[type] ImplementedInterfaces {get;}' [MyType].ImplementedInterfaces | Should -Be System.Collections.IEnumerable } } Describe "Hash expression with if statement as value" -Tags "CI" { BeforeAll { $hash1 = @{ a = if (1) {'a'} b = 'b' c = if (0) {2} elseif (1) {'c'} d = 'd' e = if (0) {2} elseif (0) {2} else {'e'} f = 'f' g = if (0) {2} else {'g'} h = 'h' } $hash2 = @{ a = if (1) {'a'} b = 'b' c = if (0) {2} elseif (1) {'c'} d = 'd' e = if (0) {2} elseif (0) {2} else {'e'} f = 'f' g = if (0) {2} else {'g'} h = 'h' } $hash3 = @{ a = if (1) { 'a' } b = 'b' c = if (0) { 2 } elseif (1) { 'c' } d = 'd' e = if (0) { 2 } elseif (0) { 2 } else { 'e' } f = 'f' g = if (0) { 2 } else { 'g' } h = 'h' } $testCases = @( @{ name = "No extra new lines"; hash = $hash1 } @{ name = "With extra new lines"; hash = $hash2 } @{ name = "With expanded if-statement"; hash = $hash3 } ) } It "Key-value pairs after an if-statement-value in a HashExpression should continue to be parsed - <name>" -TestCases $testCases { param($hash) $hash['a'] | Should -BeExactly 'a' $hash['b'] | Should -BeExactly 'b' $hash['c'] | Should -BeExactly 'c' $hash['d'] | Should -BeExactly 'd' $hash['e'] | Should -BeExactly 'e' $hash['f'] | Should -BeExactly 'f' $hash['g'] | Should -BeExactly 'g' $hash['h'] | Should -BeExactly 'h' } } Describe "Support case-insensitive comparison in Posix locale" -Tag CI { It "Hashtable is case insensitive" -Skip:($IsWindows) { try { $oldCulture = [System.Globalization.CultureInfo]::CurrentCulture [System.Globalization.CultureInfo]::CurrentCulture = [System.Globalization.CultureInfo]::new('en-US-POSIX') @{h=1}.H | Should -Be 1 -Because 'hashtables should be case insensitive in en-US-POSIX culture' } finally { [System.Globalization.CultureInfo]::CurrentCulture = $oldCulture } } It "Wildcard support case-insensitive matching" -Skip:($IsWindows) { try { $oldCulture = [System.Globalization.CultureInfo]::CurrentCulture [System.Globalization.CultureInfo]::CurrentCulture = [System.Globalization.CultureInfo]::new('en-US-POSIX') $wildcard1 = [WildcardPattern]::new("AbC*", [System.Management.Automation.WildcardOptions]::IgnoreCase) $wildcard1.IsMatch("abcd") | Should -BeTrue $wildcard2 = [WildcardPattern]::new("DeF", [System.Management.Automation.WildcardOptions]::IgnoreCase); $wildcard2.IsMatch("def") | Should -BeTrue } finally { [System.Globalization.CultureInfo]::CurrentCulture = $oldCulture } } }
combined_dataset/train/non-malicious/Get-FSMORoleOwner_2.ps1
Get-FSMORoleOwner_2.ps1
Function Get-FSMORoleOwner { <# .SYNOPSIS Retrieves the list of FSMO role owners of a forest and domain .DESCRIPTION Retrieves the list of FSMO role owners of a forest and domain .NOTES Name: Get-FSMORoleOwner Author: Boe Prox DateCreated: 06/9/2011 .EXAMPLE Get-FSMORoleOwner DomainNamingMaster : dc1.rivendell.com Domain : rivendell.com RIDOwner : dc1.rivendell.com Forest : rivendell.com InfrastructureOwner : dc1.rivendell.com SchemaMaster : dc1.rivendell.com PDCOwner : dc1.rivendell.com Description ----------- Retrieves the FSMO role owners each domain in a forest. Also lists the domain and forest. #> [cmdletbinding()] Param () Try { $forest = [system.directoryservices.activedirectory.Forest]::GetCurrentForest() ForEach ($domain in $forest.domains) { $forestproperties = @{ Forest = $Forest.name Domain = $domain.name SchemaMaster = $forest.SchemaRoleOwner DomainNamingMaster = $forest.NamingRoleOwner RIDOwner = $Domain.RidRoleOwner PDCOwner = $Domain.PdcRoleOwner InfrastructureOwner = $Domain.InfrastructureRoleOwner } $newobject = New-Object PSObject -Property $forestproperties $newobject.PSTypeNames.Insert(0,"ForestRoles") $newobject } } Catch { Write-Warning "$($Error)" } }
combined_dataset/train/non-malicious/2389.ps1
2389.ps1
param($scan_results_file) $download_path = 'C:\Documents and Settings\abertram\Desktop\CONFIGMANAGER Vulnerabilities' $mht_contents = gc $scan_results_file $ie = New-Object -ComObject 'InternetExplorer.Application' $webclient = New-Object System.Net.WebClient $ie.Navigate2('file:///C:\Documents and Settings\abertram\Desktop\CONFIGMANAGER Vulnerabilities\Scan_Results_unnhs_tw1_20131121_scan_1385046170_57428.mht') $links = $ie.Document.getElementsByTagName('a') | ? {($_.innertext -like '*Windows Server 2012*') -and ($_.innertext -notlike '*Core*') -and ($_.href -like 'http://*')} | select -ExpandProperty href foreach ($link in $links) { $r = Invoke-WebRequest -Uri $link -UseBasicParsing $r.Links | ? {$_.outerhtml -like '*<span>Download</span>*'} | % { $_.href $y = Invoke-WebRequest "http://www.microsoft.com$($_.href)" -UseBasicParsing } $y.Links | ? {$_.outerhtml -like '*Click Here*'} | select -first 1 | % {$webclient.DownloadFile($_.href,"$download_path\$(split-path $_.href -Leaf)")} }
combined_dataset/train/non-malicious/sample_15_70.ps1
sample_15_70.ps1
# # Module manifest for module 'OCI.PSModules.Visualbuilder' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Visualbuilder.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '30071ced-fbc1-4b5d-9ea5-b0fb2ecea5bc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Visualbuilder Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Visualbuilder.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVisualbuilderVbInstance', 'Get-OCIVisualbuilderVbInstancesList', 'Get-OCIVisualbuilderWorkRequest', 'Get-OCIVisualbuilderWorkRequestErrorsList', 'Get-OCIVisualbuilderWorkRequestLogsList', 'Get-OCIVisualbuilderWorkRequestsList', 'Invoke-OCIVisualbuilderRequestSummarizedApplications', 'Move-OCIVisualbuilderVbInstanceCompartment', 'New-OCIVisualbuilderVbInstance', 'Remove-OCIVisualbuilderVbInstance', 'Start-OCIVisualbuilderVbInstance', 'Stop-OCIVisualbuilderVbInstance', 'Update-OCIVisualbuilderVbInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Visualbuilder' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2842.ps1
2842.ps1
function Test-ModuleVersion { [CmdletBinding()] param ( [string]$currentVersion, [string]$minimumVersion, [string]$maximumVersion, [string]$lessThanVersion ) begin { } process { $result = $true if("$minimumVersion$maximumVersion$lessthanVersion" -eq ''){ return $true } if(![string]::IsNullOrEmpty($currentVersion)) { if($currentVersion.ToString().Length -eq 1) { [version]$currentVersion = "$currentVersion.0" } else { [version]$currentVersion = $currentVersion } } if(![string]::IsNullOrEmpty($minimumVersion)) { if($minimumVersion.ToString().Length -eq 1){ [version]$minimumVersion = "$minimumVersion.0" } else { [version]$minimumVersion = $minimumVersion } if($currentVersion.CompareTo($minimumVersion) -lt 0){ $result = $false } } if(![string]::IsNullOrEmpty($maximumVersion)) { if($maximumVersion.ToString().Length -eq 1) { [version]$maximumVersion = "$maximumVersion.0" } else { [version]$maximumVersion = $maximumVersion } if ($currentVersion.CompareTo($maximumVersion) -gt 0) { $result = $false } } if(![string]::IsNullOrEmpty($lessThanVersion)) { if($lessThanVersion.ToString().Length -eq 1) { [version]$lessThanVersion = "$lessThanVersion.0" } else { [version]$lessThanVersion = $lessThanVersion } if($currentVersion.CompareTo($lessThanVersion) -ge 0) { $result = $false } } Write-Output $result } end { } }
combined_dataset/train/non-malicious/sample_62_12.ps1
sample_62_12.ps1
Import-LocalizedData -BindingVariable VvsTxt -FileName AzStackHci.MOCStack.Strings.psd1 function Test-MOCStackVolume { <# .SYNOPSIS Verify if the available free space in the volume, meets the size threshold required by MOCStack during the deployment scenario. .DESCRIPTION Verify if the available free space in the volume meets the size threshold required by MOCStack during the deployment scenario. .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc .PARAMETER PhysicalDriveLetter Specify PhysicalDriveLetter used to validation MOCStack Volume. Default C drive is used as MOCStack volume. #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false)] [string[]] $OperationType, [Parameter(Mandatory=$false, ParameterSetName="DefaultSet")] [string] $PhysicalDriveLetter = "C" ) try { $defalutHC4MOCStackVolumeSize = 50 $defalutVMMOCStackVolumeSize = 20 Log-Info -Message ($VvsTxt.MOCStackVolumeStartInfo) -Type Info Log-Info -Message ($VvsTxt.MOCStackVolumeDriveInfo -f $PhysicalDriveLetter) $lowDiskMsg = ($VvsTxt.LowDiskSpaceMsg -f $PhysicalDriveLetter) # Scriptblock to test MOCStackVolumeSize on each server $testVolumeSb = { $AdditionalData = @() $status = "SUCCESS" $errorMsg = $null $hardwareType = $null $expectedMOCStackVolumeSizeInGB = $args[0] $freeSpaceInGB = 1 $resourceMsg = $null try { # Check if env is Virtual $hardwareType = (Get-WmiObject -Class Win32_ComputerSystem).Model if ($hardwareType -eq "Virtual Machine") { $expectedMOCStackVolumeSizeInGB = $args[1] } # Check free space on physical volume $totalFreeSpace = (Get-Volume -DriveLetter $args[2]).SizeRemaining $freeSpaceInGB = [int]($totalFreeSpace / 1GB) if ($freeSpaceInGB -lt $expectedMOCStackVolumeSizeInGB) { $resourceMsg = "MOCStack volume '$($args[2])' needs, $($expectedMOCStackVolumeSizeInGB) GB free space." throw $args[3] } } catch { $errorMsg = $_.Exception.Message $resourceMsg = "Error occurred in Environment Validator MOCStack Volume test." $status = "FAILURE" } finally { $AdditionalData = @{ HardwareType = $hardwareType ExpectedMOCStackVolumeSize = $expectedMOCStackVolumeSizeInGB CurrentMOCStackVolumeSize = $freeSpaceInGB Status = $status Source = $ENV:COMPUTERNAME Resource = $resourceMsg Detail = $errorMsg } } return $AdditionalData } # Run scriptblock $MOCStackVolumeSizeResult = Invoke-Command -Session $PsSession -ScriptBlock $testVolumeSb -ArgumentList $defalutHC4MOCStackVolumeSize, $defalutVMMOCStackVolumeSize, $PhysicalDriveLetter, $lowDiskMsg # build result foreach ($result in $MOCStackVolumeSizeResult) { $params = @{ Name = 'AzStackHci_MOCStack_Volume' Title = 'MOCStack Volume Requirement' DisplayName = 'MOCStack Volume Requirement {0}' -f $result.Source Severity = 'CRITICAL' Description = 'Test to check MOCStack volume ({0}) size requirement ({1}) is met' -f $PhysicalDriveLetter, $MOCStackVolumeSizeResult.ExpectedMOCStackVolumeSize Tags = @{ OperationType = $OperationType } Remediation = 'Free up disk space for MOCStack Volume' TargetResourceID = "$($result.Source)/$PhysicalDriveLetter" TargetResourceName = $PhysicalDriveLetter TargetResourceType = 'Computer' Timestamp = [datetime]::UtcNow Status = $result.Status AdditionalData = $result HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw $_ } } function Test-MOCStackCPUCore { <# .SYNOPSIS Verify if the host node meets the minimum CPU count requirement for MOCStack configuration .DESCRIPTION Verify if the host node meets the minimum CPU count requirement for MOCStack configuration .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false)] [string[]] $OperationType ) try { $defalutCPUCount = 4 Log-Info -Message ($VvsTxt.MOCStackCPUStartInfo) -Type Info $lowCpuMsg = ($lvsTxt.LowCPuMsg) # Scriptblock to test MOCStackCpu core on each server $testCpuSb = { $AdditionalData = @() $status = "SUCCESS" $errorMsg = $null $hardwareType = $null $expectedMOCStackCpuCoreCount = $args[0] $resourceMsg = $null $cpuCount = 1 try { # Check CPU core count on each machince $cpuCount = $((Get-CimInstance -ClassName Win32_Processor -Property NumberOfCores).NumberOfCores | Measure-Object -Sum).Sum if ($cpuCount -lt $expectedMOCStackCpuCoreCount) { $resourceMsg = "MOCStack CPU validation expects at least the host to have $($expectedMOCStackCpuCoreCount) cores." throw $args[1] } } catch { $errorMsg = $_.Exception.Message $resourceMsg = "Error occurred in Environment Validator MOCStack Cpu test." $status = "FAILURE" } finally { $AdditionalData = @{ HardwareType = $hardwareType ExpectedMOCStackCPUCoreCount = $expectedMOCStackCpuCoreCount CurrentMOCStackCPUCoreCount = $cpuCount Status = $status Source = $ENV:COMPUTERNAME Resource = $resourceMsg Detail = $errorMsg } } return $AdditionalData } # Run scriptblock $MOCStackCPUResult = Invoke-Command -Session $PsSession -ScriptBlock $testCpuSb -ArgumentList $defalutCPUCount, $lowCpuMsg # build result foreach ($result in $MOCStackCPUResult) { $params = @{ Name = 'AzStackHci_MOCStack_CpuCoreCount' Title = 'MOCStack CPU Requirement' DisplayName = 'MOCStack CPU Requirement {0}' -f $result.Source Severity = 'CRITICAL' Description = 'Test to check MOCStack CPU core count ({0}) requirement is met' -f $defalutCPUCount Tags = @{ OperationType = $OperationType } Remediation = 'Upgrage the node CPU core configuration' TargetResourceID = $result.Source TargetResourceName = $result.Source TargetResourceType = 'Computer' Timestamp = [datetime]::UtcNow Status = $result.Status AdditionalData = $result HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw $_ } } function Test-MOCStackMemory { <# .SYNOPSIS Verify physical memory ie RAM of the node satisfies the minimum requirements of MOCStack. .DESCRIPTION Verify physical memory ie RAM of the node satisfies the minimum requirements of MOCStack. .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false)] [string[]] $OperationType ) try { $defalutRAMSizeInGB = 8 Log-Info -Message ($VvsTxt.MOCStackMemoryStartInfo) -Type Info $lowMemoryMsg = ($VvsTxt.LowMemoryMsg) # Scriptblock to test physical memory on each server $testRAMSb = { $AdditionalData = @() $status = "SUCCESS" $errorMsg = $null $hardwareType = $null $expectedRAMSizeInGB = $args[0] $freeSpaceInGB = 1 $resourceMsg = $null try { # Check physical memory size $totalRAM = (Get-CimInstance Win32_PhysicalMemory | Measure-Object -Property capacity -Sum).sum $totalRAMInGB = [int]($totalRAM / 1GB) if ($totalRAMInGB -lt $defalutRAMSize) { $resourceMsg = "MOCStack physical memory size validation expects at least the host to have $($expectedRAMSizeInGB) GB." throw $args[1] } } catch { $errorMsg = $_.Exception.Message $resourceMsg = "Error occurred in Environment Validator MOCStack physical memory size test." $status = "FAILURE" } finally { $AdditionalData += @{ HardwareType = $hardwareType ExpectedMOCStackRAM = $expectedRAMSizeInGB CurrentMOCStackRAM = $totalRAMInGB Status = $status Source = $ENV:COMPUTERNAME Resource = $resourceMsg Detail = $errorMsg } } return $AdditionalData } # Run scriptblock $MOCStackRAMSizeResult = Invoke-Command -Session $PsSession -ScriptBlock $testRAMSb -ArgumentList $defalutRAMSizeInGB, $lowMemoryMsg # build result foreach ($result in $MOCStackRAMSizeResult) { $params = @{ Name = 'AzStackHci_MOCStack_RAM_Size' Title = 'MOCStack RAM Requirement' DisplayName = 'MOCStack RAM Requirement {0}' -f $result.Source Severity = 'CRITICAL' Description = 'Test to check MOCStack RAM ({0}) requirement is met' -f $defalutRAMSizeInGB Tags = @{ OperationType = $OperationType } Remediation = 'Upgrage the node PhysicalMemory configuration' TargetResourceID = $result.Source TargetResourceName = $result.Source TargetResourceType = 'Computer' Timestamp = [datetime]::UtcNow Status = $result.Status AdditionalData = $result HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw $_ } } function Test-MOCStackNetworkPort { <# .SYNOPSIS Verify that the required network ports for MOCStack are open. .DESCRIPTION Verify that the required network ports for MOCStack are open. .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false)] [string[]] $OperationType ) try { # Don't do this test in a proxy environment if (Get-IsProxyEnabled) { return } $portList = '443','80' Log-Info -Message ($VvsTxt.MOCStackPortInfo) -Type Info $disabledPortMsg = ($VvsTxt.DisablePortMsg) # Scriptblock to test network port on each server $testPortSb = { $AdditionalData = @() $status = "SUCCESS" $errorMsg = $null $hardwareType = $null $expectedPortList = $args[0] $failedPort = $null $resourceMsg = $null try { # Check each network port is enabled on the node foreach ($port in $expectedPortList) { # Added retry logic $retryCount = 0 $tcpSucceeded = $false while (!$tcpSucceeded -and $retryCount -lt 5) { $tcpSucceeded = Test-NetConnection -Port $port -InformationLevel Quiet $retryCount ++ } # Validate the TCP connection if($tcpSucceeded -ne $true) { $failedPort += " $port," $status = "FAILURE" } } # Check overall network port enable status if ($status -eq 'FAILURE') { $resourceMsg = "The network port validation for MOCStack requires $($failedPort) to be enabled." throw $args[1] } } catch { $errorMsg = $_.Exception.Message $resourceMsg = "Error occurred in Environment Validator MOCStack network port test." $status = "FAILURE" } finally { $AdditionalData += @{ HardwareType = $hardwareType ExpectedEnablePort = $portList DisablePort = $FailedPort Status = $status Source = $ENV:COMPUTERNAME Resource = $resourceMsg Detail = $errorMsg } } return $AdditionalData } # Run scriptblock $MOCStackPortResult = Invoke-Command -Session $PsSession -ScriptBlock $testPortSb -ArgumentList $portList, $disabledPortMsg # build result foreach ($result in $MOCStackPortResult) { # build result $params = @{ Name = 'AzStackHci_MOCStack_Network_Port' Title = 'MOCStack Network Port Requirement' DisplayName = 'MOCStack Network Port Requirement {0}' -f $result.Source Severity = 'CRITICAL' Description = 'Test to check MOCStack Network Port requirement is met' Tags = @{ OperationType = $OperationType } Remediation = 'Enable the mandatory network port required for MOCStack' TargetResourceID = $result.Source TargetResourceName = $result.Source TargetResourceType = 'Computer' Timestamp = [datetime]::UtcNow Status = $result.Status AdditionalData = $result HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw $_ } } function Test-MOCStackFirewallUrl { <# .SYNOPSIS Verify that the necessary URL for MOCStack is added to the allowlist in the firewall. .DESCRIPTION Verify that the necessary URL for MOCStack is added to the allowlist in the firewall. .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false)] [string[]] $OperationType ) # This test has been converted to a service-defined target towards an external endpoint using connectivity validator try { Log-Info -Message ($VvsTxt.MOCStackFirewallURLInfo) -Type Info $MOCStackURLResult = Invoke-AzStackHciConnectivityValidation -Exclude (Get-AzStackHciConnectivityServiceName | ? {$_ -ne 'MOC Stack'}) -PassThru | Where-Object Name -like *MOCStack* # build result foreach ($result in $MOCStackURLResult) { $params = @{ Name = 'AzStackHci_MOCStack_Firewall_URL' Title = 'MOCStack Firewall URL allowed list Requirement' DisplayName = 'MOCStack Firewall URL allowed list Requirement {0}' -f $result.AdditionalData.Source Severity = 'WARNING' Description = 'Test to check MOCStack Firewall URL allowed list requirement is met' Tags = @{ OperationType = $OperationType } Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/manage/azure-arc-vm-management-prerequisites#firewall-url-requirements' TargetResourceID = $result.TargetResourceID TargetResourceName = $result.TargetResourceName TargetResourceType = $result.TargetResourceType Timestamp = [datetime]::UtcNow Status = $result.Status AdditionalData = $result.AdditionalData HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw $_ } } function Test-MOCStackNodeAgents { <# .SYNOPSIS Verify MOC NodeAgent Service is up and running. .DESCRIPTION Verify MOC NodeAgent Service is up and running. .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false)] [string[]] $OperationType ) try { Log-Info -Message ($VvsTxt.MOCStackNodeAgentInfo) -Type Info $nodeAgentFailMsg = ($VvsTxt.NodeAgentFail) # Scriptblock to check MOC Node agent service on each server $testNodeAgentSb = { $AdditionalData = @() $status = "SUCCESS" $errorMsg = $null $hardwareType = $null $expectedAgentState = 'Running' $currentAgentStatus = $null $resourceMsg = $null try { # Check Node agent service is in running state $currentAgentStatus = $(Get-Service -Name 'wssdagent' | Select Status).Status if($currentAgentStatus -ne $expectedAgentState) { $status = "FAILURE" $resourceMsg = "On node $($ENV:COMPUTERNAME), MOC NodeAgent service is in $($currentAgentStatus) status" throw $args[0] } } catch { $errorMsg = $_.Exception.Message $resourceMsg = "Error occurred in Environment Validator MOCStack Node Agent test." $status = "FAILURE" } finally { $AdditionalData += @{ HardwareType = $hardwareType Status = $status Source = $ENV:COMPUTERNAME Resource = $resourceMsg Detail = $errorMsg } } return $AdditionalData } # Run scriptblock $MOCStackNodeAgentResult = Invoke-Command -Session $PsSession -ScriptBlock $testNodeAgentSb -ArgumentList $nodeAgentFailMsg # build result foreach ($result in $MOCStackNodeAgentResult) { $params = @{ Name = 'AzStackHci_MOCStack_NodeAgent_Service' Title = 'MOCStack Node agent Service State' DisplayName = 'MOCStack Node agent Service State {0}' -f $result.Source Severity = 'CRITICAL' Description = 'Test to check if the MOCStack NodeAgent service is in the expected running state' Tags = @{ OperationType = $OperationType } Remediation = 'Ensure the MOC NodeAgent service is in Online state' TargetResourceID = $result.Source TargetResourceName = $result.Source TargetResourceType = 'Computer' Timestamp = [datetime]::UtcNow Status = $result.Status AdditionalData = $result HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw $_ } } function Test-MOCStackCloudAgent { <# .SYNOPSIS Verify MOC CloudAgent Service is in an online state. .DESCRIPTION Verify MOC CloudAgent Service is in an online state. .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false)] [string[]] $OperationType ) try { Log-Info -Message ($VvsTxt.MOCStackCloudAgentInfo) -Type Info $cloudAgentFailMsg = ($VvsTxt.CloudAgentFail) # Scriptblock to check MOC cloud agent service state $testCloudAgentSb = { $AdditionalData = @() $status = "SUCCESS" $errorMsg = $null $hardwareType = $null $expectedCloudAgentState = 'Online' $currentCloudAgentStatus = $null $resourceMsg = $null try { # Check Cloud agent service is in Online state $currentCloudAgentStatus = $(Get-ClusterResource -Name 'MOC Cloud Agent Service' | select State).State if($currentCloudAgentStatus -ne $expectedCloudAgentState) { $status = "FAILURE" $resourceMsg = "MOC CloudAgent service is in $($currentCloudAgentStatus) state" throw $args[0] } } catch { $errorMsg = $_.Exception.Message $resourceMsg = "Error occurred in Environment Validator MOCStack CloudAgent Agent test." $status = "FAILURE" } finally { $AdditionalData += @{ HardwareType = $hardwareType Status = $status Source = $ENV:COMPUTERNAME Resource = $resourceMsg Detail = $errorMsg } } return $AdditionalData } # Run scriptblock $MOCStackCloudAgentResult = Invoke-Command -Session $PsSession -ScriptBlock $testCloudAgentSb -ArgumentList $cloudAgentFailMsg # build result foreach ($result in $MOCStackCloudAgentResult) { $params = @{ Name = 'AzStackHci_MOCStack_CloudAgent_Service' Title = 'MOCStack CloudAgent Service State' DisplayName = 'MOCStack CloudAgent Service State {0}' -f $result.Source Severity = 'CRITICAL' Description = 'Test to check if the MOCStack CloudAgent service is in the expected running state' Tags = @{ OperationType = $OperationType } Remediation = 'Ensure the MOC CloudAgent service is in Online state' TargetResourceID = $result.Source TargetResourceName = $result.Source TargetResourceType = 'Computer' Timestamp = [datetime]::UtcNow Status = $result.Status AdditionalData = $result HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw $_ } } function Test-MOCStackClusterNode { <# .SYNOPSIS Verify cluster node is up and running. .DESCRIPTION Verify cluster node is up and running. .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false)] [string[]] $OperationType ) try { Log-Info -Message ($VvsTxt.ClusterNodeInfo) -Type Info $clusterNodeFailMsg = ($VvsTxt.ClusterNodeFail) # Scriptblock to check cluster node state $testClusterNodeSb = { $AdditionalData = @() $status = "SUCCESS" $errorMsg = $null $hardwareType = $null $expectedClusterNodeState = 'Up' $offlineNode = $null $resourceMsg = $null try { # Check cluster node state is up and running $offlineNode = $(Get-ClusterNode | Where State -ne $expectedClusterNodeState) if($offlineNode -ne $null -and $offlineNode.count -gt 0) { $status = "FAILURE" $resourceMsg = "Cluster node $($offlineNode.Name), in $($offlineNode.State) state" throw $args[0] } } catch { $errorMsg = $_.Exception.Message $resourceMsg = "Error occurred in Environment Validator MOCStack Cluster Node test." $status = "FAILURE" } finally { $AdditionalData += @{ HardwareType = $hardwareType Status = $status Source = $ENV:COMPUTERNAME Resource = $resourceMsg Detail = $errorMsg } } return $AdditionalData } # Run scriptblock $MOCStackClusterNodeResult = Invoke-Command -Session $PsSession -ScriptBlock $testClusterNodeSb -ArgumentList $cloudAgentFailMsg # build result foreach ($result in $MOCStackClusterNodeResult) { $params = @{ Name = 'AzStackHci_MOCStack_ClusterNode_State' Title = 'MOCStack Cluster Node State' DisplayName = 'MOCStack Cluster Node State {0}' -f $result.Source Severity = 'CRITICAL' Description = 'Test to check if the cluster node is in the expected up state' Tags = @{ OperationType = $OperationType } Remediation = 'Ensure the MOC CloudAgent service is in Online state' TargetResourceID = $result.Source TargetResourceName = $result.Source TargetResourceType = 'Computer' Timestamp = [datetime]::UtcNow Status = $result.Status AdditionalData = $result HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw $_ } } Export-ModuleMember -Function Test-MOCStackCPUCore Export-ModuleMember -Function Test-MOCStackMemory Export-ModuleMember -Function Test-MOCStackNetworkPort Export-ModuleMember -Function Test-MOCStackFirewallUrl Export-ModuleMember -Function Test-MOCStackClusterNode Export-ModuleMember -Function Test-MOCStackCloudAgent Export-ModuleMember -Function Test-MOCStackNodeAgents # Excluding Volume check function #Export-ModuleMember -Function Test-MOCStackVolume # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDqB6i/7brzZldn # 0CQ+AHn2fVgShjCYslub1iE6zGmtLaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIECugvZEj3HE0SOnWJJoCXje # oGVu2GwKqIWl/8e1X0xqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAXr8hShm58+u6r+rHThXFZLU+p6oT/21KH6/4OKhq7Q8HsqiVQ3IsW9cK # BkdBmK3bAfX/DZ3zYjSmz5UKlzRNZ4BiKOcPEwXvNqsvQ6Y0t4KbKewM1PUw3nBA # ow5FBiZQ4Gmj6pvPVwi0fYAXF4sEbuD/Ng4uOzNCSBTeiwfK1uNnygvvKXHvKjEp # QhEt1iSG1Wi1/PhH1pji3UN23oRftqwQvowu4v2l1lCtavTaJK0dvNBEpgD5OxjT # /IZN5kx2zb9FQfOGQW/bsybSAYimEaqtRCzeNyUqtn+VU+3jgXwek2JVL8jiL1WE # MqF2CTnv2WsMxEAWQ5UIKeFe6tNt4KGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA9IF8hhZE/HEUiZJDzh83+bJyLNyYrCq3XPKvrEdjMvwIGZkYiWzfe # GBMyMDI0MDUxNjE4NDQzNi4wOTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHsMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP # MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6fCg2TAiGA8yMDI0MDUxNjE1MTIy # NVoYDzIwMjQwNTE3MTUxMjI1WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDp8KDZ # AgEAMAkCAQACATcCAf8wBwIBAAICEuYwCgIFAOnx8lkCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAePV51DW0f865fIazZKp1tXZGs4fFq7oHQO66OZOUjZ+2 # o4/BNqFf6E8vU3FkWVyrZujrYsR6Hy7FS/4iyoAHmmvqRNgfvWpJnGxfXHozA3Sg # H5zj6V6l/+QIwlW1uru2ZmIOpetcmudGdYVD1uur/PL0prDEqRPD8paKJCxKBgWA # 5VSijQQNKQ1V7YCA4pTTKewv4hoLSAgqWO2vVqXlEZV71Yt9Lapg+fuCWNVc+ihM # D5/6vKz7b6b5ir5QO42oTxaU9XUQeXIqzkQzFrIPrla2FAsMQlzfU9exa9cdsE+9 # BOnRQsaGENvNxI0xBqJ3WuyuXnXmQo0pBit52yZ7qzGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB8Cp8HVk75h+tAAEAAAHw # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEID83q5+ycrjYhZRq7WF4sehDsi2UySIQ9L+Pkm6oqbRF # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgXAGao6Vy/eRTuYAHmxZHvhAU # CJLqZv4IzpqycUBlS4swgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB8DAiBCAKYc5/DT+Isk5fFZhPzToAI+1Z # gbu5VQpXnTMQ+fUWyjANBgkqhkiG9w0BAQsFAASCAgA+C6+XsH4ziu74FGKq6Eh1 # pryIyq9qndei2uiWiv7V785bXr2odJsbv1CaNIQx8eF300xaDd25UmM5vow3TEAM # VlwESBSzEATi0cHUJNTBd1oIScJOUgLdWeHKzp/maSy0M/KN+p8vDqkydGitAt0H # 6IaAzzlHGg5EqB+pQ6aAwTdPwoG9APmhFtP9s0s/KwpoT69rKdWAWgRR0cCkLPQ8 # JfmneWUBbwxM7jSeD2Z+dC/cUNtfurxopgquXWQQHeTTpSwo0eBaAmDnjOuunr4+ # gvfCOsEMMpVSGb4T5Aky5ou8v1JOJSEEErq94A5dqDHsq5utvBRiKxWzgjfKhs2t # RwPHCL0pqpEc7KVjPgyNvCs/FzrP0v1QcBahxOyyEJ3dm+mo7R6dS1vENormSDlF # xaIQrOXJ0l6mKLpk/pSsn7UEHAl/ZJIxVoeGyLNL0EjhrbRl2fe87tzCKBjIqUBA # y+0Iu1AUcVs7SqyATID/x6bQaZ3MRmlpc7CuvB+jyNPn0n/2YhFrxjItAovOWyy8 # XfIM9rNnDBJfUvaPE0APnKFoV4H9W2m1NSRjUlWr1yTGz3jQzn8/GHLRdqHhjkUm # O/EzamK45zYqPbRFvAEihLcB64bG7JbLF5HDTuA+xKAoNXgSFS9bIgufd2z7JDW6 # 7+TT13FIFQXRwXZ3TKInpw== # SIG # End signature block
combined_dataset/train/non-malicious/2229.ps1
2229.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer ) Begin { try { Write-Verbose -Message "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug -Message "SiteCode: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine SiteCode" ; break } } Process { Write-Verbose -Message "Querying for packages in a failed distribution state" $DistributionFailures = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_PackageStatusDistPointsSummarizer -Filter "(State = '1') OR (State = '2') OR (State = '3') OR (State = '7') OR (State = '8')" if ($DistributionFailures -ne $null) { foreach ($ContentFailure in $DistributionFailures) { Write-Verbose -Message "Found package '$($ContentFailure.PackageID)', will attempt to refresh" $DistributionPoints = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_DistributionPoint -Filter "(SiteCode = '$($ContentFailure.SiteCode)') AND (PackageID = '$($ContentFailure.PackageID)')" if ($DistributionPoints -ne $null) { foreach ($DistributionPoint in $DistributionPoints) { if ($DistributionPoint.ServerNALPath -eq $ContentFailure.ServerNALPath) { $DistributionPoint.RefreshNow = $true $DistributionPoint.Put() | Out-Null Write-Verbose -Message "Successfully refreshed package '$($ContentFailure.PackageID)'" } } } else { Write-Output -InputObject "No Distribution Points found for package '$($ContentFailure.PackageID)'" } } } else { Write-Output -InputObject "There where no unsuccessful content distributions found" } }
combined_dataset/train/non-malicious/2100.ps1
2100.ps1
Describe "Error position Tests" -Tags "CI" { BeforeAll { $switch_condition_script = @' $test = 1 switch ($null[0]) { "a" {}; } '@ $for_expression_initializer_script = @' $test = 1 for ($null[0]; $test -gt 1;) { } '@ $for_pipeline_initializer_script = @' $test = 1 for (Test-Path $null -ErrorAction Stop; $test -gt 1;) { } '@ $for_expression_condition_script = @' $test = 1 for (;$null[0];) { } '@ $for_pipeline_condition_script = @' $test = 1 for (;Test-Path $null -ErrorAction Stop;) { } '@ $do_while_expression_condition_script = @' $test = 1 do {} while ($null[0]) '@ $do_while_pipeline_condition_script = @' $test = 1 do {} while (Test-Path $null -ErrorAction Stop) '@ $do_until_expression_condition_script = @' $test = 1 do {} until ($null[0]) '@ $do_until_pipeline_condition_script = @' $test = 1 do {} until (Test-Path $null -ErrorAction Stop) '@ $testCases = @( @{ Name = "switch condition"; FileName = "SwitchError2.ps1"; Script = $switch_condition_script; MatchText = "SwitchError2.ps1: line 2" } @{ Name = "for statement expression initializer"; FileName = "ForError1.ps1"; Script = $for_expression_initializer_script; MatchText = "ForError1.ps1: line 2" } @{ Name = "for statement pipeline initializer"; FileName = "ForError2.ps1"; Script = $for_pipeline_initializer_script; MatchText = "ForError2.ps1: line 2" } @{ Name = "for statement expression condition"; FileName = "ForError3.ps1"; Script = $for_expression_condition_script; MatchText = "ForError3.ps1: line 2" } @{ Name = "for statement pipeline condition"; FileName = "ForError4.ps1"; Script = $for_pipeline_condition_script; MatchText = "ForError4.ps1: line 2" } @{ Name = "do-while statement expression condition"; FileName = "DoWhileError1.ps1"; Script = $do_while_expression_condition_script; MatchText = "DoWhileError1.ps1: line 3" } @{ Name = "do-while statement pipeline condition"; FileName = "DoWhileError2.ps1"; Script = $do_while_pipeline_condition_script; MatchText = "DoWhileError2.ps1: line 3" } @{ Name = "do-until statement expression condition"; FileName = "DoUntilError1.ps1"; Script = $do_until_expression_condition_script; MatchText = "DoUntilError1.ps1: line 3" } @{ Name = "do-until statement pipeline condition"; FileName = "DoUntilError2.ps1"; Script = $do_until_pipeline_condition_script; MatchText = "DoUntilError2.ps1: line 3" } ) } It "<Name> evaluation failure should report correct error position" -TestCases $testCases { param($FileName, $Script, $MatchText) $testFile = Join-Path $TestDrive $FileName Set-Content -Path $testFile -Encoding Ascii -Value $Script try { & $testFile } catch { $errorRecord = $_ } $errorRecord | Should -Not -BeNullOrEmpty $errorRecord.ScriptStackTrace | Should -Match $MatchText } It "switch condition MoveNext failure should report correct error position" { $code = @' using System; using System.Collections.Generic; namespace SwitchTest { public class Test { public static IEnumerable<string> GetName() { yield return "Hello world"; throw new ArgumentException(); } } } '@ $testFile = Join-Path $TestDrive "SwitchError1.ps1" Set-Content -Path $testFile -Encoding Ascii -Value @' $test = 1 $enumerable = [SwitchTest.Test]::GetName() switch ($enumerable) { "hello world" { $test = 1; $_ } "Yay" { $test = 2; $_ } } '@ if (-not ("SwitchTest.Test" -as [type])) { Add-Type -TypeDefinition $code } try { & $testFile > $null } catch { $errorRecord = $_ } $errorRecord | Should -Not -BeNullOrEmpty $errorRecord.ScriptStackTrace | Should -Match "SwitchError1.ps1: line 3" } }
combined_dataset/train/non-malicious/1749.ps1
1749.ps1
Import-Module Docker Pull-ContainerImage hello-world Run-ContainerImage hello-world cls Get-Container | Where-Object State -eq "exited" Get-Container | Where-Object State -eq "exited" | Remove-Container Remove-ContainerImage hello-world Get-ContainerImage
combined_dataset/train/non-malicious/sample_25_94.ps1
sample_25_94.ps1
$ErrorActionPreference = 'Stop' <# .Synopsis Returns payload information from glcm. This info is required to send a heart beat request to AA #> function Get-HeartbeatInfo { [CmdletBinding()] param() $glcm = Get-DscLocalConfigurationManager $configurationName = "" $aaServerUrls = New-Object System.Collections.ArrayList if($glcm.ReportManagers) { $serverUrl = $glcm.ReportManagers.ServerURL if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } if($glcm.ResourceModuleManagers) { $serverUrl = $glcm.ResourceModuleManagers.ServerURL if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } if($glcm.ConfigurationDownloadManagers) { $serverUrl = $glcm.ConfigurationDownloadManagers.ServerURL try { #get configuration name if available if($glcm.ConfigurationDownloadManagers.CimClass -and $glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties) { $configurationNamesExists = ($glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)['ConfigurationNames'] if($configurationNamesExists) { $configurationName = [string]($glcm.ConfigurationDownloadManagers.configurationNames) } } } catch { Write-Verbose "[WARNING] Could not retrieve ConfigurationNames from glcm $_ ..." } if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } $registrationMetaData = @{ NodeConfigurationName = $configurationName ConfigurationMode = $glcm.ConfigurationMode ConfigurationModeFrequencyMins = $glcm.ConfigurationModeFrequencyMins RefreshFrequencyMins = $glcm.RefreshFrequencyMins RebootNodeIfNeeded = $glcm.RebootNodeIfNeeded ActionAfterReboot = $glcm.ActionAfterReboot AllowModuleOverwrite = $glcm.AllowModuleOverWrite } return @{ ServerUrls = $aaServerUrls RegistrationMetaData = $registrationMetaData } } function Test-Command { param ( [String] $Name ) return ($null -ne (Get-Command -Name $Name -ErrorAction Continue 2> $null)) } function GetComputerInfoEditionId { param() $windowsEditionId = $null if(Test-Command -Name Get-ComputerInfo) { $windowsEditionId = Get-ComputerInfo -Property WindowsEditionId -ErrorAction SilentlyContinue } return $windowsEditionId } function GetEditionId { param() $windowsEditionId = $null if(Test-Command -Name Get-ItemPropertyValue) { $windowsEditionId = Get-ItemPropertyValue 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId } elseif(Test-Command -Name Get-ItemProperty) { if($editionId = Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId -ErrorAction SilentlyContinue) { $windowsEditionId = $editionId.EditionID } } return $windowsEditionId } <# .synopsis Returns windows edition id For e.g. on Nano Server returns - ServerDatacenterNano on Windows Client - Enterprise #> function Get-WindowsEdition { param() $windowsEditionId = GetEditionId if(!$windowsEditionId) { if($windowsEditionId = GetComputerInfoEditionId) { $windowsEditionId = $windowsEditionId.WindowsEditionId } } return $windowsEditionId } <# .Synopsis Returns OS major minor version #> function GetOSVersion { [CmdletBinding()] param() $majorVersion = "" $minorVersion = "" if(Test-Command -Name Get-CimInstance) { $os = Get-CimInstance Win32_OperatingSystem } else { $os = Get-WmiObject Win32_OperatingSystem } $version = $os.Version if($version) { # On PS/.NET 2.0, [System.Version] doesn't have a Parse method if ($version -match '^(?<major>[0-9]+)\.(?<minor>[0-9]+)(\.[0-9]+)*$') { $majorVersion = [int]::Parse($matches['major']) $minorVersion = [int]::Parse($matches['minor']) } else { Write-Verbose "Invalid OS version: $version ..." } } @{ Major = $majorVersion Minor = $minorVersion } } <# .Synopsis Returns VM UUID #> function Get-VMUUId { [CmdletBinding()] param() $vmuuid = "" $status = "success" try { if(Test-Command -Name Get-CimInstance) { $computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct } else { $computerSystemProduct = Get-WmiObject Win32_ComputerSystemProduct } if($computerSystemProduct) { $vmuuid = $computerSystemProduct.UUID } Write-Verbose "VMUUId is $vmuuid ..." } catch { Write-Verbose "[WARNING] An error occurred while retrieving VM UUID $_ ..." $status = "error" } return @{ VMUUID = $vmuuid Status = $status } } <# .Synopsis Returns OS profile object #> function Get-OSProfile { [CmdletBinding()] param() $osName = Get-WindowsEdition $osVersion = GetOSVersion return @{ Name = $osName Type = "Windows" MajorVersion = $osVersion["Major"] MinorVersion = $osVersion["Minor"] VMUUID = (Get-VMUUId).VMUUID } } function GetCimClass { [CmdletBinding()] param( [String] $ClassName, [String] $Namespace ) return (Get-CimClass -ClassName MSFT_DSCMetaConfiguration -Namespace root/microsoft/windows/desiredstateconfiguration -ErrorAction Continue) } <# .Synopsis Retrieves DSC agent id. Returns an empty string if agent id is not available #> function Get-DscAgentId { [CmdletBinding()] param() $agentID = "" $status = "success" #AgentID is not available in wmf 4.0. So return blank agent id if the property does not exists try { if($getlcm = GetCimClass) { if($getlcm -and $getlcm.CimClassProperties -and ($getlcm.CimClassProperties)['AgentId']) { $agentID = (Get-DscLocalConfigurationManager).AgentId } } Write-Verbose "AgentID is $agentID ..." } catch { Write-Verbose "[WARNING] An error occurred while retrieving agent ID $_ ..." $status = "error" } return @{ AgentID = $agentID Status = $status } } <# .Synopsis Returns OAAS certificate from the local machine that is used to authenticate with AA pull server #> function Get-OAASCertificate { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$ServerUrl ) $subject = 'CN=' + $ServerUrl $certificate = Get-ChildItem Cert:\LocalMachine\My | ? Subject -eq $subject | Select-Object -First 1 if (!$certificate) { throw "Failed to retrieve the OAAS certificate for heartbeat api request [ServerURL]: $ServerUrl ..." } return $certificate } <# .Synopsis Returns OAAS endpoint #> function GetOAASEndpoint { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $AgentId, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ServerURL ) return ($ServerURL + "/Nodes(AgentId='" + $AgentId + "')/ExtendedProperties") } function SendWebRequest { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Uri, [Parameter(Mandatory=$true)] [System.Security.Cryptography.X509Certificates.X509Certificate] $Certificate, [Parameter(Mandatory=$true)] [hashtable] $Payload ) $jsonPayload = ConvertTo-Json $Payload -Depth 10 try { $response = Invoke-WebRequest ` -Uri ([Uri] $Uri) ` -ContentType 'application/json' ` -Method Post ` -Certificate $Certificate ` -Headers @{ "protocolversion" = "2.0" } ` -Body $jsonPayload ` -UseBasicParsing return $response } finally { [System.Net.ServicePointManager]::CertificatePolicy = $null } } <# .Synopsis Invokes AA server heartbeat endpoint to send the heartbeat request #> function Send-HeartbeatRequest { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ServerURL, [Parameter(Mandatory=$true)] [hashtable] $Payload ) $agentId = (Get-DscAgentId)["AgentID"] $accountId = Split-Path -Path $ServerURL -Leaf $certificate = Get-OAASCertificate -ServerUrl $ServerURL $endpoint = GetOAASEndpoint -AgentId $agentId -ServerURL $ServerURL try { $response = SendWebRequest -Uri $endpoint -Certificate $certificate -Payload $Payload Write-Verbose "Heartbeat is sent successfully" return } catch { #No retries when status code is 400,401,403,404 $message = "Invoking heartbeat web request failed for registration url {0}: {1}" -f ($ServerURL, $_.ToString().TrimEnd()) Write-Verbose $message } } <# .Synopsis Send Guest config heartbeat #> function Send-Heartbeat { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateSet('GCAgentStart')] [string]$Event ) try { Write-Verbose "[INFO] Event $Event" -Verbose if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) { Write-Verbose "[ERROR] DSC is not installed ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } # Get dsc local configuration manager properties $heartbeatInfo = Get-HeartbeatInfo $serverUrls = $heartbeatInfo["ServerUrls"] if(!$serverUrls) { Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } else { for ($i = 0; $i -lt $serverUrls.Count; $i++) { if(-not $serverUrls.ToLower().Contains('agentservice')) { Write-Verbose "[ERROR] Node is not registered to AA Server. Server URI : $serverUrls ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } } } $extnInfo = @{ Name = "Microsoft.Powershell.DSC" Version = "2.77.0.0" } # Get OS Profile $osProfile = Get-OSProfile # Get OMS cloud if $omsCloudId = '7783-7084-3265-9085-8269-3286-77' # Create request payload $payload = @{ OMSCloudId = $omsCloudId TimeStamp = (Get-Date -UFormat '%Y%m%d-%H%M%S') VMResourceId = "" ExtensionStatusEvent = $Event ExtensionInformation = $extnInfo OSProfile = $osProfile LCMMetaData = $heartbeatInfo["RegistrationMetaData"] } # For each server that VM is registered to, send heartbeat request to AA foreach($serverURL in $serverUrls) { Send-HeartbeatRequest -ServerURL $serverURL -Payload $payload } } catch { Write-Verbose "[ERROR] occurred while sending heartbeat event: $Event ... $_" } } <# .Synopsis Verify if DSC is enabled #> function Test-AutomationDscRegistration { [CmdletBinding()] param( ) try { if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) { Write-Verbose "[ERROR] DSC is not installed ..." -Verbose exit 1 } # Get dsc local configuration manager properties $heartbeatInfo = Get-HeartbeatInfo $serverUrls = $heartbeatInfo["ServerUrls"] if(!$serverUrls) { Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose exit 1 } else { $foundUrl = $false for ($i = 0; $i -lt $serverUrls.Count; $i++) { if($serverUrls.ToLower().Contains('agentsvc')) { $foundUrl = $true Write-Verbose "DSC is registered to pull server ..." -Verbose exit 0 } } } } catch { Write-Verbose "[ERROR] occurred ... $_" -Verbose } Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose exit 1 } function IsFileOlderThanOneHour { [CmdletBinding()] param( [String] $Path ) $lastWrite = (get-item $Path).LastWriteTime $timespan = New-TimeSpan -Days 0 -Hours 1 -Minutes 0 if (((Get-Date) - $lastWrite) -lt $timespan) { return $false } return $true } <# .Synopsis Verify if ChangeTracking/Inventory is enabled ChangeTracking solution saves the inventory and changetracking states under '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\CT*' or '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\FCT*' locations. this functions checks when these state files are modified. if the state files are modified recently (within an hour) then this is considered as the solution is enabled otherwise disabled. #> function Test-ChangeTrackingEnabled { [CmdletBinding()] param( ) try { $mmaServiceStateFolder = Join-Path $env:ProgramFiles 'Microsoft Monitoring Agent\Agent\Health Service State' if(-not(Test-Path $mmaServiceStateFolder)) { Write-Verbose "$mmaServiceStateFolder does not exist" exit 1 } $changeTrackingFolder = Get-ChildItem "$mmaServiceStateFolder\CT*" if($changeTrackingFolder -ne $null) { $chWorkFolder = "$changeTrackingFolder\work" $serviceInventoryFile = "$chWorkFolder\ServiceInventory\ServiceInventory.json" $serviceStateFile = "$chWorkFolder\ServiceState\ServiceState.json" if(Test-Path $serviceInventoryFile) { if(-not(IsFileOlderThanOneHour -Path $serviceInventoryFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $serviceStateFile) { if(-not(IsFileOlderThanOneHour -Path $serviceStateFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } } $fileCTFolder = Get-ChildItem "$mmaServiceStateFolder\FCT*" if($fileCTFolder -ne $null) { $fctWorkFolder = "$fileCTFolder\work" $changedFilesFile = "$fctWorkFolder\ChangedFiles\localhost.json" $changeTrackingFile = "$fctWorkFolder\localhost.json" $inventoryFile = "$fctWorkFolder\Inventory\localhost.json" if(Test-Path $changedFilesFile) { if(-not(IsFileOlderThanOneHour -Path $changedFilesFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $changeTrackingFile) { if(-not(IsFileOlderThanOneHour -Path $changeTrackingFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $inventoryFile) { if(-not(IsFileOlderThanOneHour -Path $inventoryFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } } } catch { Write-Verbose "[ERROR] occurred ... $_" -Verbose } Write-Verbose "ChangeTracking is not enabled ..." -Verbose exit 1 } Export-ModuleMember -Function @('Send-Heartbeat','Test-AutomationDscRegistration', 'Test-ChangeTrackingEnabled') # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEi08uUxmuV/k+ # eFo9XbeS5D+NnbKbBMmE5ssq40SCKaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5+ # n+JMdZ50mpD1HGFaizpLLsNtiYBwj2i4vCIuf9wLMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAVtWuIrH3Uo3uiqZCVzU0HjwjrWQYHBKKC8U6 # YY7qvR7/4zll2Jz5PDyYXGyvyJspYAKui84cIXTowzPIft+KtidKuZBfdBdnU0vj # WKPu2bpVlDwA4AKXfaAqI0cfk0+qT3T/4fIiadkOXCIxZxRAVNXZ5RIrs77sJ6U/ # /MDRPbaxB8P0F93ObaYXBAc451uVHVZos/UX9x6cT3z83FzVzt+9WDAwCzoj9AhN # tq5tjYV0+Ctd4T87qU8HpwLqv9cEmsHtpq7S8ijDGYyMyFzWwSZFBONZSupi1Fgc # OxOmc9ouG1mCtKjajMaA5syeX0iqyi0k/Bp3KyrUUTVcGYfTWqGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAj4A+fljOBK/mIX/N9vYRJ9jzy47NpOu1k # RwTKMt0fcgIGZdZC0Z8eGBMyMDI0MDIyNjAzMDQwNS44OTlaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM # wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI # syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra # GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn # iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF # LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl # BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7 # rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg # 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db # USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f # dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV # PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph # jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g # 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT # MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz # /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d # h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW # zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1 # qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h # sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q # wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06 # 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0 # bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf # SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOmGBzEwIhgPMjAyNDAyMjYwMjM2MzNaGA8yMDI0MDIy # NzAyMzYzM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6YYHMQIBADAHAgEAAgIG # YjAHAgEAAgISXTAKAgUA6YdYsQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AFziVfKhzH8C5tk9Ngesn5o6OzOQc45fgVf1wxLfLUQTak7Hboqjtix92IfPgniu # knFGxy2cXurrQ6FgAe+NyF3Z7i5Wqb3204BvryFcf8lVwiMibYu5nmoYFLwDlK85 # HcaYIECIFS+XEcUFpdFu1FT7oixQ8D5cw/C/JYJ20O31MYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA # AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgan4eRbiNbjRH7lVoSU2b7L1uEE0gFZV8q12kTzgZ # 8uwwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0 # Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIO6pHfeF8DwlV54k8jT4OXrX # hMgGWk9tjRDdjqTvbKO8MA0GCSqGSIb3DQEBCwUABIICADbS3823QH5wlnssMnic # Ftp6FqA1DEi5/ck8sKZLN0msuQMT0qLJQuEdgBQa+H4E61W0yWEpQNq1xz9c4kDo # qQZCtrf75EQeuvm1qHD8v+QZBZhGSjkLQKYVumr9EhJ8plpy+0hjaZb6IwUR5OeH # yzLJJaTWVvOBpVyMJv+URHRGICgI5E7x1pFjrNbfowkC5QCqwYwMV7WVtyxlHHvv # TFEaoKfrmxrBEq2YeZSPJy5vGQTjvJ4HHVqOM/Oq+Wso0c0t7fZwSBhcatzsLpRL # iSZYcQOrhLjfudtzU5pA5UjqT5r2YWDsHd8V3c39dz01WYNtmqN+7NHphRnZy4aX # JcxQvU8ptv3PRjJqIc3vu8d5fpHxzG/SvVyNddnMLaQ8C2kA11eZmVD2Py5lT08d # nAeOHrZ+T7Bntajz37IahdEdWCjEXyklHzHJj+AZAQ08W9j84B8pZh7M1Gh/k1sr # QC/YicraRUB7/57QFhN2rvxmTKAO8dq4yY/XvTq1TEgqRe+CCoKtV+J7POkQ8nwN # Zl30bGrVNi975zpgE6xjppjq1EEzRdKYfcx2lkDvLdKo/LwxHRNlh4U3q9bv0zVw # IWrh67mwQYdeGTAlQMny0tsZf2HUFijZZDCTPXitylebuuFqTAnyKnj1gIruWsrY # GX5fLBTi9f7F9RFuOs8Bxoki # SIG # End signature block
combined_dataset/train/non-malicious/sample_45_35.ps1
sample_45_35.ps1
/* SPDX-License-Identifier: GPL-2.0 */ /* * Copyright (c) 2012-2014,2018,2020 The Linux Foundation. All rights reserved. */ #ifndef _DT_BINDINGS_QCOM_SPMI_VADC_H #define _DT_BINDINGS_QCOM_SPMI_VADC_H /* Voltage ADC channels */ #define VADC_USBIN 0x00 #define VADC_DCIN 0x01 #define VADC_VCHG_SNS 0x02 #define VADC_SPARE1_03 0x03 #define VADC_USB_ID_MV 0x04 #define VADC_VCOIN 0x05 #define VADC_VBAT_SNS 0x06 #define VADC_VSYS 0x07 #define VADC_DIE_TEMP 0x08 #define VADC_REF_625MV 0x09 #define VADC_REF_1250MV 0x0a #define VADC_CHG_TEMP 0x0b #define VADC_SPARE1 0x0c #define VADC_SPARE2 0x0d #define VADC_GND_REF 0x0e #define VADC_VDD_VADC 0x0f #define VADC_P_MUX1_1_1 0x10 #define VADC_P_MUX2_1_1 0x11 #define VADC_P_MUX3_1_1 0x12 #define VADC_P_MUX4_1_1 0x13 #define VADC_P_MUX5_1_1 0x14 #define VADC_P_MUX6_1_1 0x15 #define VADC_P_MUX7_1_1 0x16 #define VADC_P_MUX8_1_1 0x17 #define VADC_P_MUX9_1_1 0x18 #define VADC_P_MUX10_1_1 0x19 #define VADC_P_MUX11_1_1 0x1a #define VADC_P_MUX12_1_1 0x1b #define VADC_P_MUX13_1_1 0x1c #define VADC_P_MUX14_1_1 0x1d #define VADC_P_MUX15_1_1 0x1e #define VADC_P_MUX16_1_1 0x1f #define VADC_P_MUX1_1_3 0x20 #define VADC_P_MUX2_1_3 0x21 #define VADC_P_MUX3_1_3 0x22 #define VADC_P_MUX4_1_3 0x23 #define VADC_P_MUX5_1_3 0x24 #define VADC_P_MUX6_1_3 0x25 #define VADC_P_MUX7_1_3 0x26 #define VADC_P_MUX8_1_3 0x27 #define VADC_P_MUX9_1_3 0x28 #define VADC_P_MUX10_1_3 0x29 #define VADC_P_MUX11_1_3 0x2a #define VADC_P_MUX12_1_3 0x2b #define VADC_P_MUX13_1_3 0x2c #define VADC_P_MUX14_1_3 0x2d #define VADC_P_MUX15_1_3 0x2e #define VADC_P_MUX16_1_3 0x2f #define VADC_LR_MUX1_BAT_THERM 0x30 #define VADC_LR_MUX2_BAT_ID 0x31 #define VADC_LR_MUX3_XO_THERM 0x32 #define VADC_LR_MUX4_AMUX_THM1 0x33 #define VADC_LR_MUX5_AMUX_THM2 0x34 #define VADC_LR_MUX6_AMUX_THM3 0x35 #define VADC_LR_MUX7_HW_ID 0x36 #define VADC_LR_MUX8_AMUX_THM4 0x37 #define VADC_LR_MUX9_AMUX_THM5 0x38 #define VADC_LR_MUX10_USB_ID 0x39 #define VADC_AMUX_PU1 0x3a #define VADC_AMUX_PU2 0x3b #define VADC_LR_MUX3_BUF_XO_THERM 0x3c #define VADC_LR_MUX1_PU1_BAT_THERM 0x70 #define VADC_LR_MUX2_PU1_BAT_ID 0x71 #define VADC_LR_MUX3_PU1_XO_THERM 0x72 #define VADC_LR_MUX4_PU1_AMUX_THM1 0x73 #define VADC_LR_MUX5_PU1_AMUX_THM2 0x74 #define VADC_LR_MUX6_PU1_AMUX_THM3 0x75 #define VADC_LR_MUX7_PU1_AMUX_HW_ID 0x76 #define VADC_LR_MUX8_PU1_AMUX_THM4 0x77 #define VADC_LR_MUX9_PU1_AMUX_THM5 0x78 #define VADC_LR_MUX10_PU1_AMUX_USB_ID 0x79 #define VADC_LR_MUX3_BUF_PU1_XO_THERM 0x7c #define VADC_LR_MUX1_PU2_BAT_THERM 0xb0 #define VADC_LR_MUX2_PU2_BAT_ID 0xb1 #define VADC_LR_MUX3_PU2_XO_THERM 0xb2 #define VADC_LR_MUX4_PU2_AMUX_THM1 0xb3 #define VADC_LR_MUX5_PU2_AMUX_THM2 0xb4 #define VADC_LR_MUX6_PU2_AMUX_THM3 0xb5 #define VADC_LR_MUX7_PU2_AMUX_HW_ID 0xb6 #define VADC_LR_MUX8_PU2_AMUX_THM4 0xb7 #define VADC_LR_MUX9_PU2_AMUX_THM5 0xb8 #define VADC_LR_MUX10_PU2_AMUX_USB_ID 0xb9 #define VADC_LR_MUX3_BUF_PU2_XO_THERM 0xbc #define VADC_LR_MUX1_PU1_PU2_BAT_THERM 0xf0 #define VADC_LR_MUX2_PU1_PU2_BAT_ID 0xf1 #define VADC_LR_MUX3_PU1_PU2_XO_THERM 0xf2 #define VADC_LR_MUX4_PU1_PU2_AMUX_THM1 0xf3 #define VADC_LR_MUX5_PU1_PU2_AMUX_THM2 0xf4 #define VADC_LR_MUX6_PU1_PU2_AMUX_THM3 0xf5 #define VADC_LR_MUX7_PU1_PU2_AMUX_HW_ID 0xf6 #define VADC_LR_MUX8_PU1_PU2_AMUX_THM4 0xf7 #define VADC_LR_MUX9_PU1_PU2_AMUX_THM5 0xf8 #define VADC_LR_MUX10_PU1_PU2_AMUX_USB_ID 0xf9 #define VADC_LR_MUX3_BUF_PU1_PU2_XO_THERM 0xfc /* ADC channels for SPMI PMIC5 */ #define ADC5_REF_GND 0x00 #define ADC5_1P25VREF 0x01 #define ADC5_VREF_VADC 0x02 #define ADC5_VREF_VADC5_DIV_3 0x82 #define ADC5_VPH_PWR 0x83 #define ADC5_VBAT_SNS 0x84 #define ADC5_VCOIN 0x85 #define ADC5_DIE_TEMP 0x06 #define ADC5_USB_IN_I 0x07 #define ADC5_USB_IN_V_16 0x08 #define ADC5_CHG_TEMP 0x09 #define ADC5_BAT_THERM 0x0a #define ADC5_BAT_ID 0x0b #define ADC5_XO_THERM 0x0c #define ADC5_AMUX_THM1 0x0d #define ADC5_AMUX_THM2 0x0e #define ADC5_AMUX_THM3 0x0f #define ADC5_AMUX_THM4 0x10 #define ADC5_AMUX_THM5 0x11 #define ADC5_GPIO1 0x12 #define ADC5_GPIO2 0x13 #define ADC5_GPIO3 0x14 #define ADC5_GPIO4 0x15 #define ADC5_GPIO5 0x16 #define ADC5_GPIO6 0x17 #define ADC5_GPIO7 0x18 #define ADC5_SBUx 0x99 #define ADC5_MID_CHG_DIV6 0x1e #define ADC5_OFF 0xff /* 30k pull-up1 */ #define ADC5_BAT_THERM_30K_PU 0x2a #define ADC5_BAT_ID_30K_PU 0x2b #define ADC5_XO_THERM_30K_PU 0x2c #define ADC5_AMUX_THM1_30K_PU 0x2d #define ADC5_AMUX_THM2_30K_PU 0x2e #define ADC5_AMUX_THM3_30K_PU 0x2f #define ADC5_AMUX_THM4_30K_PU 0x30 #define ADC5_AMUX_THM5_30K_PU 0x31 #define ADC5_GPIO1_30K_PU 0x32 #define ADC5_GPIO2_30K_PU 0x33 #define ADC5_GPIO3_30K_PU 0x34 #define ADC5_GPIO4_30K_PU 0x35 #define ADC5_GPIO5_30K_PU 0x36 #define ADC5_GPIO6_30K_PU 0x37 #define ADC5_GPIO7_30K_PU 0x38 #define ADC5_SBUx_30K_PU 0x39 /* 100k pull-up2 */ #define ADC5_BAT_THERM_100K_PU 0x4a #define ADC5_BAT_ID_100K_PU 0x4b #define ADC5_XO_THERM_100K_PU 0x4c #define ADC5_AMUX_THM1_100K_PU 0x4d #define ADC5_AMUX_THM2_100K_PU 0x4e #define ADC5_AMUX_THM3_100K_PU 0x4f #define ADC5_AMUX_THM4_100K_PU 0x50 #define ADC5_AMUX_THM5_100K_PU 0x51 #define ADC5_GPIO1_100K_PU 0x52 #define ADC5_GPIO2_100K_PU 0x53 #define ADC5_GPIO3_100K_PU 0x54 #define ADC5_GPIO4_100K_PU 0x55 #define ADC5_GPIO5_100K_PU 0x56 #define ADC5_GPIO6_100K_PU 0x57 #define ADC5_GPIO7_100K_PU 0x58 #define ADC5_SBUx_100K_PU 0x59 /* 400k pull-up3 */ #define ADC5_BAT_THERM_400K_PU 0x6a #define ADC5_BAT_ID_400K_PU 0x6b #define ADC5_XO_THERM_400K_PU 0x6c #define ADC5_AMUX_THM1_400K_PU 0x6d #define ADC5_AMUX_THM2_400K_PU 0x6e #define ADC5_AMUX_THM3_400K_PU 0x6f #define ADC5_AMUX_THM4_400K_PU 0x70 #define ADC5_AMUX_THM5_400K_PU 0x71 #define ADC5_GPIO1_400K_PU 0x72 #define ADC5_GPIO2_400K_PU 0x73 #define ADC5_GPIO3_400K_PU 0x74 #define ADC5_GPIO4_400K_PU 0x75 #define ADC5_GPIO5_400K_PU 0x76 #define ADC5_GPIO6_400K_PU 0x77 #define ADC5_GPIO7_400K_PU 0x78 #define ADC5_SBUx_400K_PU 0x79 /* 1/3 Divider */ #define ADC5_GPIO1_DIV3 0x92 #define ADC5_GPIO2_DIV3 0x93 #define ADC5_GPIO3_DIV3 0x94 #define ADC5_GPIO4_DIV3 0x95 #define ADC5_GPIO5_DIV3 0x96 #define ADC5_GPIO6_DIV3 0x97 #define ADC5_GPIO7_DIV3 0x98 #define ADC5_SBUx_DIV3 0x99 /* Current and combined current/voltage channels */ #define ADC5_INT_EXT_ISENSE 0xa1 #define ADC5_PARALLEL_ISENSE 0xa5 #define ADC5_CUR_REPLICA_VDS 0xa7 #define ADC5_CUR_SENS_BATFET_VDS_OFFSET 0xa9 #define ADC5_CUR_SENS_REPLICA_VDS_OFFSET 0xab #define ADC5_EXT_SENS_OFFSET 0xad #define ADC5_INT_EXT_ISENSE_VBAT_VDATA 0xb0 #define ADC5_INT_EXT_ISENSE_VBAT_IDATA 0xb1 #define ADC5_EXT_ISENSE_VBAT_VDATA 0xb2 #define ADC5_EXT_ISENSE_VBAT_IDATA 0xb3 #define ADC5_PARALLEL_ISENSE_VBAT_VDATA 0xb4 #define ADC5_PARALLEL_ISENSE_VBAT_IDATA 0xb5 #define ADC5_MAX_CHANNEL 0xc0 /* ADC channels for ADC for PMIC7 */ #define ADC7_REF_GND 0x00 #define ADC7_1P25VREF 0x01 #define ADC7_VREF_VADC 0x02 #define ADC7_DIE_TEMP 0x03 #define ADC7_AMUX_THM1 0x04 #define ADC7_AMUX_THM2 0x05 #define ADC7_AMUX_THM3 0x06 #define ADC7_AMUX_THM4 0x07 #define ADC7_AMUX_THM5 0x08 #define ADC7_AMUX_THM6 0x09 #define ADC7_GPIO1 0x0a #define ADC7_GPIO2 0x0b #define ADC7_GPIO3 0x0c #define ADC7_GPIO4 0x0d #define ADC7_SMB_TEMP 0x06 #define ADC7_CHG_TEMP 0x10 #define ADC7_USB_IN_V_16 0x11 #define ADC7_VDC_16 0x12 #define ADC7_CC1_ID 0x13 #define ADC7_VREF_BAT_THERM 0x15 #define ADC7_IIN_FB 0x17 #define ADC7_ICHG_SMB 0x18 #define ADC7_IIN_SMB 0x19 /* 30k pull-up1 */ #define ADC7_AMUX_THM1_30K_PU 0x24 #define ADC7_AMUX_THM2_30K_PU 0x25 #define ADC7_AMUX_THM3_30K_PU 0x26 #define ADC7_AMUX_THM4_30K_PU 0x27 #define ADC7_AMUX_THM5_30K_PU 0x28 #define ADC7_AMUX_THM6_30K_PU 0x29 #define ADC7_GPIO1_30K_PU 0x2a #define ADC7_GPIO2_30K_PU 0x2b #define ADC7_GPIO3_30K_PU 0x2c #define ADC7_GPIO4_30K_PU 0x2d #define ADC7_CC1_ID_30K_PU 0x33 /* 100k pull-up2 */ #define ADC7_AMUX_THM1_100K_PU 0x44 #define ADC7_AMUX_THM2_100K_PU 0x45 #define ADC7_AMUX_THM3_100K_PU 0x46 #define ADC7_AMUX_THM4_100K_PU 0x47 #define ADC7_AMUX_THM5_100K_PU 0x48 #define ADC7_AMUX_THM6_100K_PU 0x49 #define ADC7_GPIO1_100K_PU 0x4a #define ADC7_GPIO2_100K_PU 0x4b #define ADC7_GPIO3_100K_PU 0x4c #define ADC7_GPIO4_100K_PU 0x4d #define ADC7_CC1_ID_100K_PU 0x53 /* 400k pull-up3 */ #define ADC7_AMUX_THM1_400K_PU 0x64 #define ADC7_AMUX_THM2_400K_PU 0x65 #define ADC7_AMUX_THM3_400K_PU 0x66 #define ADC7_AMUX_THM4_400K_PU 0x67 #define ADC7_AMUX_THM5_400K_PU 0x68 #define ADC7_AMUX_THM6_400K_PU 0x69 #define ADC7_GPIO1_400K_PU 0x6a #define ADC7_GPIO2_400K_PU 0x6b #define ADC7_GPIO3_400K_PU 0x6c #define ADC7_GPIO4_400K_PU 0x6d #define ADC7_CC1_ID_400K_PU 0x73 /* 1/3 Divider */ #define ADC7_GPIO1_DIV3 0x8a #define ADC7_GPIO2_DIV3 0x8b #define ADC7_GPIO3_DIV3 0x8c #define ADC7_GPIO4_DIV3 0x8d #define ADC7_VPH_PWR 0x8e #define ADC7_VBAT_SNS 0x8f #define ADC7_SBUx 0x94 #define ADC7_VBAT_2S_MID 0x96 #endif /* _DT_BINDINGS_QCOM_SPMI_VADC_H */
combined_dataset/train/non-malicious/sample_63_47.ps1
sample_63_47.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ function Remove-ServiceFabricApplicationType { <# .SYNOPSIS Removes all the applications for the specified service fabric application type & version and unregisters the applications type and version. .DESCRIPTION Removes all the applications for the specified service fabric application type & version and unregisters the applications type and version. .NOTES WARNING: This script file is invoked by Visual Studio. Its parameters must not be altered. .PARAMETER ApplicationTypeName The name of the application type to remove. .PARAMETER ApplicationTypeVersion The version of the application type to remove. .EXAMPLE Remove-ApplicationType.ps1 -ApplicationTypeName 'MyApplicationType' -ApplicationTypeVersion '1.0.0.0' #> Param ( [Parameter(Mandatory=$true)] [String] $ApplicationTypeName, [Parameter(Mandatory=$true)] [String] $ApplicationTypeVersion ) Write-Host "Removing application type..." try { [void](Test-ServiceFabricClusterConnection) } catch { Write-Warning "Unable to Verify connection to Service Fabric cluster." throw } $nodes = Get-ServiceFabricNode foreach ($app in Get-ServiceFabricApplication) { if ($app.ApplicationTypeName -eq $ApplicationTypeName -and $app.ApplicationTypeVersion -eq $ApplicationTypeVersion) { try { $app | Remove-ServiceFabricApplication -Force } catch [System.TimeoutException] { # Catch operation timeout and continue with force remove replica. } foreach ($node in $nodes) { [void](Get-ServiceFabricDeployedReplica -NodeName $node.NodeName -ApplicationName $app.ApplicationName | Remove-ServiceFabricReplica -NodeName $node.NodeName -ForceRemove) } } } $reg = Get-ServiceFabricApplicationType -ApplicationTypeName $ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $ApplicationTypeVersion } if ($reg) { $reg | Unregister-ServiceFabricApplicationType -ApplicationTypeVersion $ApplicationTypeVersion -Force } Write-Host "Finished removing the application type" } # SIG # Begin signature block # MIInkwYJKoZIhvcNAQcCoIInhDCCJ4ACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDzslfuKADb8KjT # nAcLb76G3U3PWS65zaDijbWow04TEKCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGXMwghlvAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPMCYqkzFtPBEdDyJm1qDx6/ # ukQg7tah6lzToJW7YJeqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAFNcDIGwYzpqOAl3Kobv/qPkvlM6mEAY4ijiylZ9H+1ETzKGaYS07ifj3 # tnJeUk1IfASwttw8c+vNSK07t5ukBynX4IifD/OeB7e3kg9fjreU7//+csZvzljI # X3WEohlMpw/Itp74tUvVXIAsW+TX9YVtMoPGfJtdLzuVVFVAr4U+h7SJE+B9El/I # s0X8Ifxyrr/oPK8oHIpxSOREtiKWMLd+dawAG/pA8buVr0lZZA9BeTtOaafHYqbz # NkGBPTNwBaE0CiNjoIdWurW/o5eQ2cunTuDJ6qH9NnWrUACMqKNUsvKp8syUzl/u # EDq4Tib8Bd3T1UMEnbOWk42b3icrUaGCFv0wghb5BgorBgEEAYI3AwMBMYIW6TCC # FuUGCSqGSIb3DQEHAqCCFtYwghbSAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDGh9ixrxVVUBy6Rj9IbH4c1Zr0dZ4zafX9OCRJVODJiwIGZGzYjfnK # GBMyMDIzMDUzMTIxMzUwOS4wOTZaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyMjY0LUUz # M0UtNzgwQzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EVQwggcMMIIE9KADAgECAhMzAAABwT6gg5zgCa/FAAEAAAHBMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMTEwNDE5MDEy # N1oXDTI0MDIwMjE5MDEyN1owgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjIyNjQtRTMzRS03ODBDMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5LHXMydw2hUC4pJU0I5uPJnMeRm8LKC4xaIDu3Fxx3Ip # Z/We2qXLj4NOmow/WPFeY4vaT4/S4T9xoDsFGg5wEJM6OLZVfa7BUNu0tDt4rkl7 # QBYNHzz6pcr9bwaq2qm7x6P9yi5W0Y8sjoj+QTgtmmXoxCoNXhJ1oG6GbqADQXDZ # kTcDjIAiteE6TxrhBpIb7e6upifTGZNfcChPfuzHq61FSIwJ0XCxcaR1BwAlSKhb # /NUOuQGPr9Zzd6OnIcA+RctxwKgfOKB9aWEEHlt0jhKKgpEBvcJnMMP+WaTwmMho # b1e+hoCEFx/nI0YHupi6082kFdNFraE72msOYQrwrUyWCeSmN202LZDpTzxZVty6 # QrBOk+f+BErsR+M5evkKuUTWVJHI3vtNgb6K5+gk6EuQw0ocsDdspiPp+qlxBaW5 # 0yUbr6wnfzYjJh7QkPcfBIZbJAhWQHaV0uS3T7OkObdCssCRMWH7VWUAeSbemuUq # OXCR7rdpFTfY/SXKO9lCIQBAQSh+wzwh5Zv1b+jT2zWwVl82By3YHmST8b8CKnRX # SCjLtgoyy7ERLwkbzPIkCfBXcyVneC1w2/wUnqPiAjK0wQfztfXFfoMQr8YUcLHn # Atek8OVNPuRIV6bcERbF6rtFXmnjjD4ZwVxIZ/HM4cjeVGsEwkFA9XTzqX9W1P8C # AwEAAaOCATYwggEyMB0GA1UdDgQWBBRfr2MJ6x7yE+gP5uX9xWGTwpRC+jAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC # AQBfuiaBgsecHvM90RZiTDlfHblL09r9X+5q9ckuMR0Bs1Sr5B2MALhT5Y0R3ggL # ufRX6RQQbSc7WxRXIMr5tFEgB5zy/7Yg81Cn2dhTf1GzjCb7/n3wtJSGtr2QwHsa # 1ehYWdMfi+ETLoEX1G79VPFrs0t6Giwpr74tv+CLE3s6m10VOwe80wP4yuT3eiFf # qRV8poUFSdL2wclgQKoSwbCpbJlNC/ESaDQbbQFli9uO5j2f/G7S4TMG/gyyxvMQ # 5QJui9Fw2s7qklmozQoX2Ah4aKubKe9/VZveiETNYl1AZPj0kj1g51VNyWjvHw+H # z1xZekWIpfMXQEi0wrGdWeiW4i8l92rY3ZbdHsErFYqzh6FRFOeXgazNsfkLmwy+ # TK17mA7CTEUzaAWMq5+f9K4Y/3mhB4r6UristkWpdkPWEo8b9tbkdKSY00E+FS5D # UtjgAdCaRBNaBu8cFYCbErh9roWDxc+Isv8yMQAUDuEwXSy0ExnIAlcVIrhzL40O # sG2ca5R5BgAevGP1Hj9ej4l/y+Sh0HVcN9N6LmPDmI/MaU2rEZ7Y+jRfCZ1d+l5D # ESdLXIxDTysYXkT+3VM/1zh6y2s0Zsb/3vPaGnp2zejwf2YlGWl1XpChNZTelF5e # OCCfSzUUn3qHe7IyyDKhahgbnKpmwcEkMVBs+RHbVkNWqDCCB3EwggVZoAMCAQIC # EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS # b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX # DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC # 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG # Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP # 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P # XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361 # VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB # Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9 # X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e # wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw # wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr # 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e # FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj # BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n # FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw # PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j # cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH # hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF # BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl # ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf # ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC # j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu # 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/ # GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D # YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO # xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO # Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I # 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0 # zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM # mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT # TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLLMIICNAIBATCB+KGB0KSBzTCByjEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj # cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF # U046MjI2NC1FMzNFLTc4MEMxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAESKOtSK7RVVK+Si+aqFd0YSY+VPoIGD # MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF # BQACBQDoIeLMMCIYDzIwMjMwNTMxMjMxNDIwWhgPMjAyMzA2MDEyMzE0MjBaMHQw # OgYKKwYBBAGEWQoEATEsMCowCgIFAOgh4swCAQAwBwIBAAICF5kwBwIBAAICEgMw # CgIFAOgjNEwCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgC # AQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAI073ht76u6uGg # BObBcAoxrKpXb7tTugFx3/Z7+p13UcZqpIvPlf7d43ggVy57tCr5tubej8FzTeGN # CU/jE/crjOPa3ii7kQQQdNKFIE8VSKbYtxYQbcL1GXu1m7KI7HTMi2ldziQGTPHT # vDATpblx3NCwSps85Pt7neROMDZVVjGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABwT6gg5zgCa/FAAEAAAHBMA0GCWCGSAFl # AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN # AQkEMSIEIF+/cAkn9regwX8LdM2mR1+ARWxolPpwv9QGUz2AsqfyMIH6BgsqhkiG # 9w0BCRACLzGB6jCB5zCB5DCBvQQgCrkg6tgYHeSgIsN3opR2z7EExWA0YkirkvVY # STBgdtQwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AcE+oIOc4AmvxQABAAABwTAiBCD63vRfvzO9mZRBN93AhOi8UtC0RwZaMQTxosCv # w4ZH2zANBgkqhkiG9w0BAQsFAASCAgA8kRDud+B2/a4giPQ4Ni5N0Zt6LBXBQ7hp # WAEOvItEmMQ7bAqlvQqxt/fop+DGjzaTqEAiLjNYmj3GBJEmUzNa4VFDCQvyeo8C # 5gzedp1ip3o/jIZtaEFs+OJk0IYGs59RGEXPH3SFFxGZnt5ipdl4MUUVj9hHfwWD # B4DVxKzMq9sYuYJFG5CnBmKdP9IXTkCP1t89/ODyaNqNRfWBmzwqw/97nBB+neJW # ZyqKeIRnMnm+iOcytfO/QC4e/0QgXvKv4h37oTijZrBEaf6yPHUdIy+68qNZR9PQ # 8k43tYCr3cKzHi8FZFQgf/EIUitg60ptt37qfljURRC7W0rPL3OC0Vi5o88/uQlE # v7RQ4pROScFQj9hKpJ6YpUrmcupWx0GUlQgSxjQDEXhezQewFAMxvQ3QVMMa2B/F # CSo+XvaAM9cRFlvyWVkuxpc3Z3Kv84ygbVaV0LToG86adBZVuuDHV3g7qLxAeVZp # GSsNJcWs+RYCouZkwjEWcv/+IRnm6l62fdycUm6XxQA4mh2q3LZ8L2mrmc0BJ9x6 # lKdkmXEuPKdtgAt58AEtNKcZyGeq0Il9IkAlkQr/RxHwjyxVHHfvua00mm7o207A # wh5dKKmQjNvYfe+HiqK4xY7UuuJRzebStdgWP5ABFb01WgpageNjVfbHdgLcjmGZ # KXmeLPeT+Q== # SIG # End signature block
combined_dataset/train/non-malicious/sample_31_48.ps1
sample_31_48.ps1
# # Module manifest for module 'OCI.PSModules.Ailanguage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ailanguage.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f9edfadc-7cd9-4f7a-8258-fc0671fb808f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ailanguage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ailanguage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAilanguageEndpoint', 'Get-OCIAilanguageEndpointsList', 'Get-OCIAilanguageEvaluationResultsList', 'Get-OCIAilanguageJob', 'Get-OCIAilanguageJobsList', 'Get-OCIAilanguageModel', 'Get-OCIAilanguageModelsList', 'Get-OCIAilanguageModelType', 'Get-OCIAilanguageProject', 'Get-OCIAilanguageProjectsList', 'Get-OCIAilanguageWorkRequest', 'Get-OCIAilanguageWorkRequestErrorsList', 'Get-OCIAilanguageWorkRequestLogsList', 'Get-OCIAilanguageWorkRequestsList', 'Invoke-OCIAilanguageBatchDetectDominantLanguage', 'Invoke-OCIAilanguageBatchDetectHealthEntity', 'Invoke-OCIAilanguageBatchDetectLanguageEntities', 'Invoke-OCIAilanguageBatchDetectLanguageKeyPhrases', 'Invoke-OCIAilanguageBatchDetectLanguagePiiEntities', 'Invoke-OCIAilanguageBatchDetectLanguageSentiments', 'Invoke-OCIAilanguageBatchDetectLanguageTextClassification', 'Invoke-OCIAilanguageBatchLanguageTranslation', 'Invoke-OCIAilanguageDetectDominantLanguage', 'Invoke-OCIAilanguageDetectLanguageEntities', 'Invoke-OCIAilanguageDetectLanguageKeyPhrases', 'Invoke-OCIAilanguageDetectLanguageSentiments', 'Invoke-OCIAilanguageDetectLanguageTextClassification', 'Move-OCIAilanguageEndpointCompartment', 'Move-OCIAilanguageJobCompartment', 'Move-OCIAilanguageModelCompartment', 'Move-OCIAilanguageProjectCompartment', 'New-OCIAilanguageEndpoint', 'New-OCIAilanguageJob', 'New-OCIAilanguageModel', 'New-OCIAilanguageProject', 'Remove-OCIAilanguageEndpoint', 'Remove-OCIAilanguageJob', 'Remove-OCIAilanguageModel', 'Remove-OCIAilanguageProject', 'Stop-OCIAilanguageJob', 'Update-OCIAilanguageEndpoint', 'Update-OCIAilanguageJob', 'Update-OCIAilanguageModel', 'Update-OCIAilanguageProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ailanguage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Set-WebConfig_1.ps1
Set-WebConfig_1.ps1
function Set-WebConfigSqlConnectionString { param( [switch]$help, [string]$configfile = $(read-host "Please enter a web.config file to read"), [string]$connectionString = $(read-host "Please enter a connection string"), [switch]$backup = $TRUE ) $usage = "`$conString = `"Data Source=MyDBname;Initial Catalog=serverName;Integrated Security=True;User Instance=True`"`n" $usage += "`"Set-WebConfigSqlConnectionString -configfile `"C:\\Inetpub\\wwwroot\\myapp\\web.config`" -connectionString `$conString" if ($help) {Write-Host $usage} $webConfigPath = (Resolve-Path $configfile).Path $backup = $webConfigPath + ".bak" # Get the content of the config file and cast it to XML and save a backup copy labeled .bak $xml = [xml](get-content $webConfigPath) #save a backup copy if requested if ($backup) {$xml.Save($backup)} $root = $xml.get_DocumentElement(); $root.connectionStrings.add.connectionString = $connectionString # Save it $xml.Save($webConfigPath) }
combined_dataset/train/non-malicious/688.ps1
688.ps1
function Register-RsPowerBI { [CmdletBinding(SupportsShouldProcess = $true, ConfirmImpact = 'Medium')] param ( [Parameter(Mandatory = $True)] [string] $ClientId, [Parameter(Mandatory = $True)] [string] $ClientSecret, [Parameter(Mandatory = $True)] [string] $AppObjectId, [Parameter(Mandatory = $True)] [string] $TenantName, [Parameter(Mandatory = $True)] [string] $TenantId, [string] $ResourceUrl = 'https://analysis.windows.net/powerbi/api', [string] $AuthUrl = 'https://login.windows.net/common/oauth2/authorize', [string] $TokenUrl = 'https://login.microsoftonline.com/common/oauth2/token', [Parameter(Mandatory = $True)] [string] $RedirectUrls, [Alias('SqlServerInstance')] [string] $ReportServerInstance, [Alias('SqlServerVersion')] [Microsoft.ReportingServicesTools.SqlServerVersion] $ReportServerVersion, [string] $ComputerName, [System.Management.Automation.PSCredential] $Credential ) if ($PSCmdlet.ShouldProcess((Get-ShouldProcessTargetWmi -BoundParameters $PSBoundParameters), "Registering PowerBI for SQL Server Instance")) { $rsWmiObject = New-RsConfigurationSettingObjectHelper -BoundParameters $PSBoundParameters Write-Verbose "Configuring Power BI ..." $configureResult = $rsWmiObject.SavePowerBIInformation($ClientId, $ClientSecret, $AppObjectId, $TenantName, $TenantId, $ResourceUrl, $AuthUrl, $TokenUrl, $RedirectUrls) if ($configureResult.HRESULT -eq 0) { Write-Verbose "Configuring Power BI ... Success!" } else { throw "Failed to register PowerBI for server instance: $ReportServerInstance. Errors: $($configureResult.ExtendedErrors)" } } } New-Alias -Name "Register-PowerBI" -Value "Register-RsPowerBI" -Scope Global
combined_dataset/train/non-malicious/sample_56_2.ps1
sample_56_2.ps1
# # Module manifest for module 'OCI.PSModules.Functions' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Functions.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Functions Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList', 'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList', 'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList', 'Get-OCIFunctionsPbfListingVersion', 'Get-OCIFunctionsPbfListingVersionsList', 'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction', 'Move-OCIFunctionsApplicationCompartment', 'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction', 'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction', 'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_21_36.ps1
sample_21_36.ps1
ConvertFrom-StringData @' id_officeinv=Collecting Office inventory '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBo2EP+d3PakosN # lVFQxSdqPIYUqMpDzbNG/OqK/TD90qCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL98IJmNl/PlgQ6Dws2cFzkx # Ep2duDgVdB7nTTqsRKuIMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArnG1yeyA6Y1rt8HKeOC+GnTo63YVXtXPfEwjKG3jdiuUP6TYwJ03wtLb # CT2UVet6YIQ/EX4CNg7sPGMStfds43mcbqMfus5dCxOEw/6ULxWh/F7eeyuxh3lP # bvy8gYiZCHsFoc8O7zeGbC3w3gyqA9nFACqWFaYhG8WIV68IBHW1SD2CoSfidann # RbbqTcZBb6zXFjmOn3fxaXfjFAfd3EY2q+0ktQ6weY76nVt9/TxCjpW7LDynlUV8 # 62IkVuRfIyV9U61MOCjtWxUarrdZmDuvy3oNj2GWT0Rp/H/LBzn48t8P4yIIlm9L # Rz/TPm68/gJQSL34AGjSGGHRTHZ5yaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDloOhOS4VIrYBlfnz3uLluPF7YWsD2sZ12wyZtdhnZ4gIGZxp6XqTZ # GBMyMDI0MTAyODExNDA0My4yNTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB # /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv # g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV # ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5 # hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d # 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f # PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj # +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5 # hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb # K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6 # YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J # OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9 # Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre # rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55 # ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH # XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb # KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP # maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY # yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr # 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA # sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4 # vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh # xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA # Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smV3jAiGA8yMDI0MTAyODA0NDcy # NloYDzIwMjQxMDI5MDQ0NzI2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZXe # AgEAMAcCAQACAiCYMAcCAQACAhOLMAoCBQDqyudeAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAEFghDjhxi2TSq7RRxDW8oDboQrBl/FnL9GFyUGkxt5Hz/YP # xhSGpJ8w4/Uc7LKfS5rtB+7Ou2rGzeojlAdVUArx1kj94wVSPeBrEy9PBwhiSqDW # DINZjAa60rf5xjy9lMiQcK54bc21WGJa4ZlGC9qrcYoQpLqiwuYZS76Io7iSbtEh # MY/0WpMko/8XFost2uITk8Hh2RjhtVnZ4rJ1N1+/2kZobq1RJX7cvC0OFH4gYrGg # GJDLvaPbnwgdNz88IdYs1Nch8qdg7r8oBSko61ML576CxdcnSGw9Vpf07jA/s0Rm # Tcg81r/kwthHbYIWPw+cOA4BYp09eecPmASoKj8xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCBiSSLFiSEnXu8fdsdg58wkP5hKsNRQhkKCwGCZKawGMjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSUgIbd # izXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgWXKlh2TCsXUYprvY+OJSRQQYCPt9 # 9/x5xOK3eVkF+jEwDQYJKoZIhvcNAQELBQAEggIAJOOzIzyVZDdkd0GnyCzLEizM # FX8YV7/YlEXUC2ny8XupQYOBaB6HiPN+sM6s4So2Orr5xZtBHAeVsnIj/yQ/8yPj # VFAQVqU/idJIWfHsJ4Kj65JrHlvEJ8xCDLTiRv5QHRD6PCRrNdyCL7khDOd+ZkRd # cufeBF4ZAYJwyyV8mi9RwneofctR8v5DfJYsJFF19sfmwNkky2JHahkwIU5GufpD # +bV1eAO7XxbpyKHjgIqxDWzGzJmnojRn/lkOoTHXLSNCB0HZ/DCH3IOVl+unHNPe # 32OBJnOyivpOHq2g7bZlcBFBdBG8LidNRfINNdWOPAhP15uRbTT3+Mvkln8Z8TDT # uAH985jy7mxqsPASLi/7Yu4dXQcKUl4Ya7t8X89sMkVwKfZZ3H9Ozrc2PoPdvvwa # 6MoOZLwwjCjId3iq0+D4WH7XvKv0FBfKiQC/SJ1HbrSMLSqJFpXtuIt8zyi6Ol4D # SWafZllN+0+OpQHB89731TlP6deHL08wf3/cQ7WIC5cw6xKTtOMjrINll8aNuRak # nlcMS4yX4HSK5m3wIEgUIN9Xrl3MH9V01R4a5NOJg1YQ8W6lyF8ATiIVL8KgGOLy # 5bP5ydGV6dMXaUheCw7jBe6dYfS4PTP55d1aIOb+YXTVGvJJMi3Evkz19QI7+C8f # KJLKLcP9tD1IQKHge8w= # SIG # End signature block
combined_dataset/train/non-malicious/sample_1_42.ps1
sample_1_42.ps1
ConvertFrom-StringData @' id_certs=Certificate information id_certsdesc=Collecting information on installed certificates '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBWfKjLlRxXAbXG # 8W8RTTxYsTY9l3OjO+Lu72y05dUX/6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPaW1HfzXkF1Ff1xe9hDLxN+ # +HKgFO8ooY8pbpoQ3M7aMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZbA7h1yGxgHPD6/Grzk33DXWqpVZGMo2pd+lIuu6YDJb79njzHFC28Kf # qCLbpYWmJsdYHXD4m49p9FNQSPXtxvKDE3R/uBhS59nhYwz8N4gjxjmz4V1JnZQy # FVoKXLk/F//o0NFuEPriTjG4QgVbQvnpsiT/fOP9LmEljHw+4F2nA2+5B83oGUfT # 85JRJyMj+xR3M9JgNUkjomqiJUz9ESadB2kZcuVzIWerL8lq6abdJFo81bUisN0B # qa5A2BC68kINFuKfn1Zz/R7vx4kbO4pPb48YsXdRKHh62jm+6qU1Uh5lronjsP78 # Q94O49Ghfe84xwBlmowY3UwbbJzsGKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCC5NOVJG7WR/TyXS6M6FqKVNgh5hYTs2l6rNEvSamqtqAIGZusiCs65 # GBMyMDI0MTAyODExNDA0MS44OThaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91ggdQTK+8L0AAEAAAH3MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM2MDUt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0OdHTBNom6/uXKaEKP9r # PITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3k6EQlwqy6ROz42e0R5eD # W+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW2NcWUJW3Qo2AuJ0HOtbl # SpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8U6DRccQm1FdhmPKgDzgc # fDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFHTDkGLdpnDV5FXjVObAgb # SM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn1uA8hRhj09Hs33HRevt4 # oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE4feEkuz7TAwgkRBcUzLg # Q4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPXD9It2ez+mqEzgFRRsJGL # tcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pIvA5irlal7qFhkAeeeZqm # op8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJQAQkllKsI+UJqGq9rmRA # BJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9GqtDx3/aU+yqNRcB8w0tS # XUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTfRqQzP3m9 # PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAN0ajafILeL6S # QIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAbQxTrqnXvVWWeNst5YQD8 # saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXLzJXKhZM09ouPwNsrn8YO # LIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0G5lcQknAXqHa9nQdWp1Z # xXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWtqyLMl65TW6wRM7XlF7Y+ # PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9ba43UU6TgzVZaBm8VaA0w # SwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjBVXm8KVDn2cML9IvRK02s # 941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aMH5xa1Zjb/K8u9f9M05U0 # /bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2NiOcYTGV/DcLrLCBK2zG5 # 03FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG85anlhhGxxBQ5mFsJGkB # n0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5VVN36CO1kDU4ABkSYTXOM # 8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNBjmM7/nqw3bgrEOaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0MTAyOTA2NDM1MFowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEAAgIPIDAHAgEAAgIT5zAK # AgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBaN24RfbEDYuiZ # zqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yduik5ad6IJA7n3eXZZvkf # ovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0GfRa6QSb/KpHS+RGIAeR # p0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578OFTecSrudpM+HrP9rwux # bsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI/x2UnsP+/eCeuyNqOYe6 # VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRNky50Lo7MnEMgN3LQB6Hb # 4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg7y9SlNKEtywF # JmZrI+rPV/tw4zK63LgBuH3zQNXOqOMwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5SoIH5Z4jCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB91ggdQTK+8L0AAEAAAH3 # MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/bgvEVMA0GCSqGSIb3DQEB # CwUABIICAAp8Yl6E0ZN+9GwNb1JI1eJnG3CW/yq2qe9YsODtENYi114A7j0mTSfH # 2BzvFlWtgLQ9akKc9pfJz24vhJKSzJuX/u9+K/aboRY9ErbT7D9B9l7rsK8tJJ/I # tHbM0vt4KZ2paMJucxT+dWev98IPUP9pqwJsHsfyDEghWAONWcZnw0r/dqCLx427 # Wf8bwT1Nx7bDQwPz+8wcXirtB5Qb/h3u7I4a3SdWX9UIJ1vj0VU8V6AlTR5eFcI4 # Hfueh5n/sNoWdjNzrOFbQSh+maY4CaaYsjv/h+lPAxGdsO0ZI6nzsXrMv0eQZ0E8 # QMMy3G3xliyLzbcWe7UIjkvkxaElmgd5KDjBqOwMQzX0sIcKT0U3fgVTUrKKFuI3 # uT6Ed1sseBCCxdgKnNOWp02+0Y/jC+pwfFXvO3I/gE/5WLNux3zmHUwrGva+3+Wv # qZg5EBIGex7kYu8WA5coZsHPm1BRLOX/+YWH5+fXecMoSl47ooD346PvSysH7feG # vb3N5vtlNoDJks6/ZuXfx26Twlv25LtzmnZUOCXTa+Jh8oaQOebXa0qoc+tEouEc # rNEhXYWLD3D/icm2tbWXXUz3LbfxGzIQ7mDH9880VubQIJzG1I05SefIsyT9MOWo # MDeLfhSOXtOS/jmCoDicdct9HZnUCu++rHC8BQm9HANzmPexRNPY # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_25.ps1
sample_49_25.ps1
enum RepairAction { Repair = 1 Reset SilentUpdate } Set-Variable RECOVERY_VERSION -Option Constant -Value 1 Set-Variable SkypeUserAccountName -Option Constant -Value "Skype" Set-Variable WINDOWS_VERSION_MAJOR -Option Constant -Value 10 Set-Variable WINDOWS_VERSION_MINOR -Option Constant -Value 0 Set-Variable WINDOWS_VERSION_BUILD_RS1 -Option Constant -Value 14393 Set-Variable WINDOWS_VERSION_BUILD_RS2 -Option Constant -Value 15063 Set-Variable WINDOWS_VERSION_BUILD_RS3 -Option Constant -Value 16299 Set-Variable WINDOWS_VERSION_BUILD_RS3_REQUIRED_UBR -Option Constant -Value 192 $RestartOnExit = $false $RemoveAdminScriptsOnExit = $false $AdminHookScriptsPath = [System.IO.Path]::Combine($SystemDrive, "Rigel", "AdminHookScripts") Function ExitRecoveryTool { if ($RemoveAdminScriptsOnExit) { Write-Host "Clearing AdminHookScripts..." $SystemDrive = Join-Path "${env:SystemDrive}" "" $targetPath = $AdminHookScriptsPath Get-ChildItem -Path $targetPath | Remove-Item -Force -Recurse Write-Host "OK" } if ($RestartOnExit) { Write-Host "Initiating restart..." Restart-Computer -Force Write-Host "OK" } Exit } Function GetSkypeInstallFolder { $SrsPackage = (Get-AppxPackage Microsoft.SkypeRoomSystem -AllUsers ` | Where-Object { $_ -ne $null -and !([string]::IsNullOrEmpty($_.InstallLocation)) } ` | ForEach-Object { [PsCustomObject]@{"Version"=([Version]$_.Version); "Package"=$_} } ` | Sort-Object -Property Version -Descending ` | Select-Object -First 1).Package return $SrsPackage.InstallLocation } Function ReplaceFolder { Param ( [String]$SourceFolder, [String]$TargetFolder ) Write-Host "Replacing $TargetFolder with $SourceFolder..." if ($(Test-Path -Path $SourceFolder) -eq $false) { Write-Host "ERROR: Cannot find $SourceFolder" ExitRecoveryTool } Write-Host "Found $SourceFolder " if (Test-Path -Path $TargetFolder) { Write-Host "Deleting existing folder $TargetFolder" Remove-Item -Path $TargetFolder -Force -Recurse if (!$?) { Write-Host "ERROR: Aborting operation because we failed to remove $TargetFolder" ExitRecoveryTool } Write-Host "Deleted $TargetFolder" } Write-Host "Copying $SourceFolder to $TargetFolder" Copy-Item -Recurse -Path $SourceFolder -Destination $TargetFolder if (!$?) { Write-Host "ERROR: Aborting operation because we failed to copy $SourceFolder to $TargetFolder" ExitRecoveryTool } Write-Host "OK" } Function DisableAppLocker { Write-Host "Disabling AppLocker..." # Set permissive policy Out-File -FilePath "$Env:temp\tempPolicy.xml" -Encoding ascii -InputObject '<AppLockerPolicy Version="1"><RuleCollection Type="Appx" EnforcementMode="Enabled" /><RuleCollection Type="Dll" EnforcementMode="NotConfigured" /><RuleCollection Type="Exe" EnforcementMode="Enabled" /><RuleCollection Type="Msi" EnforcementMode="NotConfigured" /><RuleCollection Type="Script" EnforcementMode="NotConfigured" /></AppLockerPolicy>' Set-AppLockerPolicy -XmlPolicy "$Env:temp\tempPolicy.xml" if (!$?) { Write-Host "ERROR: Failed to set AppLocker policy" ExitRecoveryTool } # Turn off everything Out-File -FilePath "$Env:temp\tempPolicy.xml" -Encoding ascii -InputObject '<AppLockerPolicy Version="1"><RuleCollection Type="Appx" EnforcementMode="NotConfigured" /><RuleCollection Type="Dll" EnforcementMode="NotConfigured" /><RuleCollection Type="Exe" EnforcementMode="NotConfigured" /><RuleCollection Type="Msi" EnforcementMode="NotConfigured" /><RuleCollection Type="Script" EnforcementMode="NotConfigured" /></AppLockerPolicy>' Set-AppLockerPolicy -XmlPolicy "$Env:temp\tempPolicy.xml" if (!$?) { Write-Host "ERROR: Failed to set AppLocker policy" ExitRecoveryTool } # Clear out old policies $path = [IO.Path]::Combine($Env:windir,"System32","AppLocker","*.AppLocker") Remove-Item -Force -Path $path if (!$?) { Write-Host "ERROR: Failed to remove all .AppLocker files that match $path. Please delete all contents under $path and try again." ExitRecoveryTool } Write-Host "OK" } Function EnableWindowsFeatures { # Make sure embedded shell launcher enabled Write-Host "Enabling Windows Feature: Client-EmbeddedShellLauncher..." Enable-WindowsOptionalFeature -Online -FeatureName "Client-EmbeddedShellLauncher" -All if (!$?) { Write-Host "ERROR: Aborting operation because we failed to enable Windows feature Embedded Shell Launcher" ExitRecoveryTool } Write-Host "OK" Write-Host "Enabling Windows Feature: Client-KeyboardFilter..." Enable-WindowsOptionalFeature -Online -FeatureName "Client-KeyboardFilter" -All if (!$?) { Write-Host "ERROR: Aborting operation because we failed to enable Windows feature Client-KeyboardFilter" ExitRecoveryTool } Write-Host "OK" } Function RemoveScheduledTasks { #Remove Existing Scheduled tasks Write-Host "Removing old scheduled tasks..." Get-ScheduledTask -TaskPath "\Microsoft\Skype\" -ErrorAction SilentlyContinue | Unregister-ScheduledTask -Confirm:$false Write-Host "OK" } Function RemoveEventLogs { #Remove Old Event Logs Write-Host "Removing old event logs..." Remove-EventLog -LogName "Skype Room System" -ErrorAction SilentlyContinue Remove-EventLog -LogName "ScriptLaunch" -ErrorAction SilentlyContinue Write-Host "OK" } Function RemoveRecoveryFolder { #Delete older recovery folder $targetPath = 'C:\Recovery\OEM\$oem$\$1\Rigel' Write-Host "Deleting old recovery folder $targetPath..." if (Test-Path -Path $targetPath) { Remove-Item -Path $targetPath -Force -Recurse if (!$?) { Write-Host "ERROR: Aborting operation because we failed to remove $targetPath" ExitRecoveryTool } } Write-Host "OK" } Function StopSrsForAllUsers { Write-Host "Stopping all instances of SkypeRoomSystem..." Get-Process -Name "Watchdog" -ErrorAction SilentlyContinue | Stop-Process -Force Get-Process -Name "Microsoft.SkypeRoomSystem" -ErrorAction SilentlyContinue | Stop-Process -Force Write-Host "OK" } Function ForceAppRegistration { Write-Host "Registering app package for Skype user..." $appLocation = GetSkypeInstallFolder if ($appLocation -eq $null) { Write-Host "ERROR: Microsoft.SkypeRoomSystem is not installed" ExitRecoveryTool } $appxManifest = "$appLocation\AppxManifest.xml" #Register for Skype user reg.exe add "HKLM\System\CurrentControlSet\Control\Lsa" /f /v "LimitBlankPasswordUse" /t REG_DWORD /d 0 $creds = New-Object System.Management.Automation.PSCredential ("Skype", (new-object System.Security.SecureString)) start-process -FilePath powershell.exe -wait -Credential $creds -ArgumentList @("Add-AppxPackage","-Register","-Path","`'$appxManifest`'", "-DisableDevelopmentMode") reg.exe add "HKLM\System\CurrentControlSet\Control\Lsa" /f /v "LimitBlankPasswordUse" /t REG_DWORD /d 1 Write-Host "OK" } Function CheckSkypeUser { Write-Host "Checking for Skype user account..." $skypeUserFound = $false $localUsers = Get-WmiObject -Class Win32_UserAccount -Filter "LocalAccount='True'" ForEach ($user in $localUsers) { if ($user.Name -eq $SkypeUserAccountName) { $skypeUserFound = $true } } if ($skypeUserFound -eq $false) { Write-Host "ERROR: The Skype user account cannot be found. Please run this tool again and choose the Reset System option." ExitRecoveryTool } Write-Host "Skype user found" } Function CheckWindowsUpdates { Write-Host "Checking if required Windows updates are installed..." $osVer = [System.Environment]::OSVersion.Version; $releaseId = Get-ItemPropertyValue -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" -Name "UBR" # RS1 Check if (($osVer.Major -eq $WINDOWS_VERSION_MAJOR) -and ($osVer.Minor -eq $WINDOWS_VERSION_MINOR) -and ($osVer.Build -eq $WINDOWS_VERSION_BUILD_RS1)) { Write-Host "Windows 10 1607 is no longer supported, please update to a newer release of Windows 10 and try again. See http://aka.ms/srsupdate for assistance." ExitRecoveryTool } # RS3 Check if (($osVer.Major -eq $WINDOWS_VERSION_MAJOR) -and ($osVer.Minor -eq $WINDOWS_VERSION_MINOR) -and ($osVer.Build -eq $WINDOWS_VERSION_BUILD_RS3)) { if (($releaseId -eq $null) -or ($releaseId -lt $WINDOWS_VERSION_BUILD_RS3_REQUIRED_UBR)) { Write-Host "ERROR: Latest Windows Updates are not installed, please install lastest cumulative updates." ExitRecoveryTool } } Write-Host "Found acceptable Windows OS version $osVer with Release Id $releaseId" } Function StartLogging { $SystemDrive = Join-Path "${env:SystemDrive}" "" $srcLocal = [IO.Path]::Combine($SystemDrive, "Users", "Skype", "AppData", "Local") $recoveryLogDir = [IO.Path]::Combine($srcLocal, "Packages", "Microsoft.SkypeRoomSystem_8wekyb3d8bbwe", "LocalState", "Tracing", "RecoveryTool") # Create log directory if (!(Test-Path -Path $recoveryLogDir)){ New-Item -ItemType Directory -Force -Path $recoveryLogDir } # Delete old log files $MaxOldFiles = 9 $logFiles = Get-ChildItem -Filter "RecoveryTool*.log" -Path $recoveryLogDir | Sort-Object -Property Name -Descending if ($logFiles.Count -gt $MaxOldFiles) { for ($i = $MaxOldFiles; $i -lt $logFiles.Count; $i++) { Remove-Item -Force -Path "$($logFiles[$i].FullName)" } } # Start Transcript $logFilePath = [IO.Path]::Combine($recoveryLogDir,"RecoveryTool-$([DateTime]::Now.ToString("yyyy.MM.dd-HH.mm.ss")).log") Start-Transcript -Path $logFilePath } Function ReplaceTextInFile { Param( $FilePath, $ItemsToReplace ) $content = "" if (Test-Path -Path $FilePath) { $content = Get-Content -Path $FilePath | Out-String } Foreach ($item in $ItemsToReplace) { $old = $item[0] $new = $item[1] if ($content.Contains($old)) { Write-Host "Replacing `"$old`" in $FilePath with `"$new`"" $content = $content.Replace($old,$new) } else { Write-Host "WARNING: Could not find `"$old`" in $FilePath to replace with `"$new`"" } } return $content } Function GetSkypeSid { $SkypeUser = New-Object System.Security.Principal.NTAccount("Skype") $SkypeSid = $SkypeUser.Translate([System.Security.Principal.SecurityIdentifier]) return $SkypeSid } Function ApplySkypeUserReg { Write-Host "Apply Skype User Registry Settings..." # Get Skype User SID $SkypeSid = GetSkypeSid # Check if Skype User Registry Hive is Loaded New-PSDrive -PSProvider Registry -Name HKU -Root HKEY_USERS $SkypeRegistryLoaded = Test-Path -Path "HKU:\$SkypeSid" # Load Skype Registry if necessary if (!$SkypeRegistryLoaded) { Write-Host "Mounting Skype user registry." reg.exe load HKU\$SkypeSid $Env:SystemDrive\Users\Skype\NTUSER.DAT } else { Write-Host "Skype user registry already loaded" } # Delete Registry Settings that may on the system $regVal = Get-ItemProperty -Path "HKU:\$SkypeSid\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "SkypeRoomSystemLaunch" -ErrorAction SilentlyContinue if ($regVal -ne $null) { Remove-ItemProperty -Path "HKU:\$SkypeSid\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "SkypeRoomSystemLaunch" -Force } # Apply Modified SkypeUserReg from AdminHookScripts $SystemDrive = Join-Path "${env:SystemDrive}" "" $OverridePath = [IO.Path]::Combine($SystemDrive, "Rigel", "AdminHookScripts") $SkypeUserRegPath = [IO.Path]::Combine($OverridePath, "SkypeUser.reg") if ($(Test-Path $SkypeUserRegPath)) { # Apply Registry settings reg.exe import $SkypeUserRegPath if (!$?) { Write-Host "ERROR: Failed to apply $SkypeUserRegPath" ExitRecoveryTool } else { Write-Host "Successfully imported $SkypeUserRegPath" } } # Unload Skype Registry if necessary if (!$SkypeRegistryLoaded) { reg.exe unload HKU\$SkypeSid } Write-Host "OK" } Function IsProvisioningCurrent { $isCurrent = $null Write-Host "Checking current provisioning version..." $currentProvisioning = Get-ItemPropertyValue -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem" -Name "ProvisioningVersion" -ErrorAction SilentlyContinue if (($currentProvisioning -eq $null) -or ($currentProvisioning -lt 5)) { $isCurrent = $false Write-Host "Your system provisioning version $currentProvisioning is out of date." } else { $isCurrent = $true Write-Host "Your system provisioning version $currentProvisioning is current." } return $isCurrent } Function ExtractSrsApp { Param( [String]$TargetFolder ) if (Test-Path $TargetFolder){ Write-Host "Removing previous temp app folder $TargetFolder..." Remove-Item -Path $TargetFolder -Force -Recurse if (!$?) { Write-Host "ERROR: Aborting operation because we failed to remove folder $TargetFolder" ExitRecoveryTool } Write-Host "OK" } # Extract app package to App Temp Folder $packageFolderPath = [io.path]::Combine($PSScriptRoot,'$oem$','$1','Rigel','x64','Ship','AppPackages') $packagePath = Get-Item "$packageFolderPath\*\*.appx" if ($packagePath -eq $null) { Write-Host "ERROR: Aborting operation because app package cannot be found in $packageFolderPath" ExitRecoveryTool } Write-Host "Extracting $packagePath to $TargetFolder..." Add-Type -assembly "System.Io.Compression.Filesystem" [io.compression.zipfile]::ExtractToDirectory($packagePath,$TargetFolder) if (!$?) { Write-Host "ERROR: Aborting operation because we failed to extract $packagePath to $TargetFolder" ExitRecoveryTool } Write-Host "OK" } Function ModifyScript { Param ( $FilePath, $ItemsToReplace ) Write-Host "Modifying $FilePath" if (Test-Path -Path $FilePath) { Write-Host "Found $FilePath" $content = ReplaceTextInFile -FilePath $FilePath -ItemsToReplace $ItemsToReplace Out-File -Force -FilePath $FilePath -InputObject $content -Encoding ascii if (!$?) { Write-Host "ERROR: Failed to apply edits to $FilePath" ExitRecoveryTool } Write-Host "Successfully modified $FilePath" } else { Write-Host "WARNING: Failed to find file $FilePath" } } Function SetupProvisioningCustomizations { Write-Host "Customizing setup scripts..." $SystemDrive = Join-Path "${env:SystemDrive}" "" $ScriptPath = $AdminHookScriptsPath # Modify Initialize.ps1 $initializePath = [io.path]::Combine($ScriptPath,"Initialize.ps1") $itemsToReplace = @( ('reg.exe load HKU\Skype $Env:SystemDrive\Users\Skype\NTUSER.DAT',""), ('$SkypeUserReg = (Join-Path $PSScriptRoot SkypeUser.reg)',""), ('reg.exe import "$SkypeUserReg"',""), ('reg.exe unload HKU\Skype',""), ('Get-ChildItem $Env:SystemDrive\Users\Skype\AppData\Local\Microsoft\Windows\WinX\* -Include *.lnk -Recurse | Remove-Item',"")) ModifyScript -File $initializePath -ItemsToReplace $itemsToReplace # Modify Config.cmd $configPath = [io.path]::Combine($ScriptPath,"Config.cmd") $itemsToReplace = @( ('powershell -executionpolicy unrestricted %~dp0UpdatePrivilegeGroupMembership.ps1 -Sid S-1-5-32-545 -Privilege SeInteractiveLogonRight',""), ('powershell -executionpolicy unrestricted %~dp0UpdatePrivilegeGroupMembership.ps1 -Account Skype -Privilege SeInteractiveLogonRight -Add',""), ('powershell -executionpolicy unrestricted %~dp0UpdatePrivilegeGroupMembership.ps1 -RemoveAll -Privilege SeNetworkLogonRight',""), ('powershell -executionpolicy unrestricted %~dp0UpdatePrivilegeGroupMembership.ps1 -Account Administrators -Privilege SeNetworkLogonRight -Add',""), ('mkdir %SystemRoot%\System32\GroupPolicyUsers\S-1-5-32-545\User\',""), ('powershell -executionpolicy unrestricted %~dp0textpol.ps1 %~dp0Registry.pol.txt %SystemRoot%\System32\GroupPolicyUsers\S-1-5-32-545\User\Registry.pol',""), ('copy /y %~dp0gpt.ini %SystemRoot%\System32\GroupPolicyUsers\S-1-5-32-545\',""), ('net accounts /maxpwage:unlimited',""), ('wmic useraccount set PasswordExpires=FALSE',"")) ModifyScript -File $configPath -ItemsToReplace $itemsToReplace # Modify SkypeUser.reg $SkypeSid = GetSkypeSid $skypeUserRegPath = [io.path]::Combine($ScriptPath,"SkypeUser.reg") $itemsToReplace = @( ('[-HKEY_USERS\Skype\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]',""), ("HKEY_USERS\Skype","HKEY_USERS\$SkypeSid")) ModifyScript -File $skypeUserRegPath -ItemsToReplace $itemsToReplace Write-Host "OK" } Function DeploySetupScripts { Param ( [Bool]$UseInstalledApp ) Write-Host "Deploying setup scripts..." # Determine source to copy from $SourcePath = "" if ($UseInstalledApp) { Write-Host "Deploying from installed app package..." #Get installed app location $appLocation = GetSkypeInstallFolder if ($appLocation -eq $null) { Write-Host "ERROR: Microsoft.SkypeRoomSystem is not installed" ExitRecoveryTool } #Path is "Scripts" folder inside app $SourcePath = [System.IO.Path]::Combine($appLocation,"Scripts") } else { # Extract app package $TEMP_APP_FOLDER = "RigelAppTemp" $tempAppPath = [io.path]::Combine($env:TEMP,$TEMP_APP_FOLDER) Write-Host "Extracting app from $tempAppPath" ExtractSrsApp -TargetFolder $tempAppPath # Path is "Scripts" folder inside expanded app $SourcePath = [System.IO.Path]::Combine($tempAppPath,"Scripts") } Write-Host "Deploying from $SourcePath" # Copy Files $SystemDrive = Join-Path "${env:SystemDrive}" "" $TargetPath = $AdminHookScriptsPath ReplaceFolder -SourceFolder $SourcePath -TargetFolder $TargetPath # Apply Modifications SetupProvisioningCustomizations Write-Host "OK" } Function ReplaceRigelFolder { # Update Entire Rigel Folder $source = [IO.Path]::Combine($PSScriptRoot,'$oem$','$1','Rigel','x64') $SystemDrive = Join-Path "${env:SystemDrive}" "" $target = [io.path]::Combine($SystemDrive,"Rigel","x64") ReplaceFolder -SourceFolder $source -TargetFolder $target } function Dismount-Registry { param( [String]$MountPoint ) # Open handles from non-cleaned-up objects can prevent the hive from dismounting. [gc]::Collect() & reg.exe unload $MountPoint if ($LASTEXITCODE -ne 0) { Write-Error "Failed to unload registry" return } } Function CopyTelemetryId { Write-Host "Porting existing telemetry id..." $TelemetryName = "DeviceId" $TelemetryPath = "Registry::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem" $MountPoint = "HKLM\SkypeAppSettings" $SystemDrive = Join-Path "${env:SystemDrive}" "" $SettingsFile = [io.path]::Combine($SystemDrive,"Users","Skype","AppData","Local","Packages","Microsoft.SkypeRoomSystem_8wekyb3d8bbwe","Settings","settings.dat") # Check if it already exists $currentId = Get-ItemProperty -Path $TelemetryPath -Name $TelemetryName -ErrorAction SilentlyContinue if (!([string]::IsNullOrEmpty($currentId))) { Write-Host "Telemetry Id already exists at $TelemetryPath $TelemetryName" return } # Attempt to load Skype registry & reg.exe load $MountPoint "$SettingsFile" if ($LASTEXITCODE -ne 0) { Write-Error "Failed to load registry." return } Write-Host "Successfully mounted $SettingsFile at $MountPoint" # Check if DeviceId exists in mounted registry $currentId = Get-ItemProperty -Path "Registry::$MountPoint\Localstate" -Name $TelemetryName -ErrorAction SilentlyContinue if ($currentId -eq $null) { Write-Host "App settings does not contain a $TelemetryName property to copy" return } Write-Host "Confirmed $MountPoint\LocalState $TelemetryName exists" # Use reg query to read registry because PowerShell doesn't like reading registry data items of REG_NONE/Unknown type. $queryResult = & reg.exe query $MountPoint\LocalState /v $TelemetryName if ($LASTEXITCODE -ne 0) { Write-Error "Failed to read Device ID: reg command error" Dismount-Registry $MountPoint return } if ($queryResult -eq $null -or $queryResult.Count -eq 0) { Write-Error "Failed to read device ID: no data returned" Dismount-Registry $MountPoint return } Write-Host "Reg query result is $queryResult" # Parse "reg query" output into just the data's value. # The output contains multiple lines including a leading whitespace, the line # we want starts with $TelemetryName. That line, once selected, then needs to be split # based on space into three fields -- data name, data type, data value. The last # field is the one we want. This is safe to perform on these setting values, # because they are provided to us in hex form. # Parse out hex data from query $dataHex = $queryResult ` | ForEach-Object { $_.Trim() } ` | Where-Object { $_.StartsWith($TelemetryName) } ` | Select-Object -First 1 ` | ForEach-Object { $_.Split(" ",3,[stringsplitoptions]::RemoveEmptyEntries) } ` | Select-Object -Last 1 Write-Host "Hex data is $dataHex" # Convert the hex nibbles, two at a time, into an array of bytes. [byte[]]$dataBytes = $dataHex -split "(..)" ` | Where-Object { !([string]::IsNullOrEmpty($_)) } ` | ForEach-Object { [convert]::ToByte($_,16) } # Convert the bytes to a string, and discard everything after the null terminator. $foundDeviceId = [System.Text.Encoding]::Unicode.GetString($dataBytes).Split("`0") | Select-Object -First 1 Write-Host "Found DeviceId string $foundDeviceId" # Set DeviceId in registry if (!(Test-Path -Path $TelemetryPath)) { New-Item -Path $TelemetryPath -Force } Set-ItemProperty -Path $TelemetryPath -Name $TelemetryName -Value "$foundDeviceId" if (!$?) { Write-Host "Failed to write $foundDeviceId to $TelemetryPath $TelemetryName" Dismount-Registry $MountPoint return } Write-Host "Successfully migrated telemetry id $foundDeviceId" Dismount-Registry $MountPoint Write-Host "OK" } Function RefreshAppAndProvisioning { CheckWindowsUpdates CheckSkypeUser StopSrsForAllUsers EnableWindowsFeatures ReplaceRigelFolder DeploySetupScripts -UseInstalledApp $false DisableAppLocker RemoveScheduledTasks RemoveEventLogs RemoveRecoveryFolder #Run final setup.ps1 Write-Host "Running setup..." $workingDirectory = [io.path]::Combine("$env:SystemDrive\","Rigel") Set-Location $workingDirectory & "C:\Rigel\x64\Scripts\Provisioning\FinalSetup.ps1" Write-Host "OK" #Make sure App is Registered ForceAppRegistration #Apply Skype User Reg ApplySkypeUserReg #Migrate existing telemetry id CopyTelemetryId #Upgrade registry to show provisioning was upgraded Set-ItemProperty -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem" -Name "ProvisioningUpgradeMethod" -Value "Repair v$RECOVERY_VERSION" } Function CopyScriptLaunchFromInstalledApp { # Deploy ScriptLaunch.ps1 Write-Host "Deploying ScriptLaunch.ps1..." $appLocation = GetSkypeInstallFolder if ($appLocation -eq $null) { Write-Host "ERROR: Microsoft.SkypeRoomSystem is not installed" ExitRecoveryTool } $source = [IO.Path]::Combine($appLocation,"RecoveryTool","ScriptLaunch.ps1") $SystemDrive = Join-Path "${env:SystemDrive}" "" $target = [io.path]::Combine($SystemDrive,"Rigel","x64","Scripts","Provisioning","ScriptLaunch.ps1") Write-Host "Copying $source to $target" Copy-Item -Force -Path $source -Destination $target if (!$?) { Write-Host "ERROR: Failed to deploy $source to $target" ExitRecoveryTool } Write-Host "OK" } Function CreateAdminHooksFolder { Write-Host "Creating AdminHooks folder..." $adminHooksPath = [io.path]::Combine("$env:SystemDrive\","Rigel","AdminHookScripts") if ($(Test-Path $adminHooksPath) -eq $false) { Write-Host "Creating new folder because no existing folder detected" mkdir "$adminHooksPath" } ICacls $adminHooksPath /reset ICacls $adminHooksPath /Grant Administrators:`(OI`)`(CI`)F System:`(OI`)`(CI`)RX Users:`(OI`)`(CI`)RX /inheritance:r ICacls $adminHooksPath\* /reset /T Write-Host "OK" } Function SilentUpdateSetHklmRegKeys { # Set HKLM Reg Keys Write-Host "Apply HKLM User Registry Settings..." # Make sure HKLM\Software\Microsoft\SkypeRoomSystem exists if ($(Test-Path -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\") -eq $false) { New-Item -Force -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\" -Name "SkypeRoomSystem" } # Make sure HKLM\Software\Microsoft\SkypeRoomSystem\HasRun is empty if (Test-Path -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\HasRun\") { Remove-Item -Force -Recurse -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\HasRun\" } New-Item -Force -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\" -Name "HasRun" # Configure system to use user specified shell Set-ItemProperty -Force -Path "REGISTRY::HKLM\Software\Microsoft\Windows NT\CurrentVersion\IniFileMapping\system.ini\boot\" -Name "Shell" -Value "USR:Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon" # Configure default shell in case no user specified shell is present Set-ItemProperty -Force -Path "REGISTRY::HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\" -Name "Shell" -Value "Explorer.exe" # Set Provisioning version Set-ItemProperty -Force -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\" -Name "ProvisioningVersion" -Value 6 Write-Host "OK" } Function SilentUpdateSetSkypeUserRegKeys { Write-Host "Updating Skype user reg keys..." # Get Skype Sid $SkypeSid = GetSkypeSid # Check if Skype User Registry Hive is Loaded New-PSDrive -PSProvider Registry -Name HKU -Root HKEY_USERS $SkypeRegistryLoaded = Test-Path -Path "HKU:\$SkypeSid" # Load Skype Registry if necessary if (!$SkypeRegistryLoaded) { Write-Host "Mounting Skype user registry." reg.exe load HKU\$SkypeSid $Env:SystemDrive\Users\Skype\NTUSER.DAT } else { Write-Host "Skype user registry already loaded" } # Delete Old Run Key Remove-ItemProperty -Force -Path "HKU:\$SkypeSid\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "SkypeRoomSystemLaunch" -ErrorAction SilentlyContinue # Unload Skype Registry if necessary if (!$SkypeRegistryLoaded) { reg.exe unload HKU\$SkypeSid } Write-Host "OK" } Function DisarmSkypeDailyMaintenance { Write-Host "Disarming old SkypeDailyMaintenance.ps1..." $SystemDrive = Join-Path "${env:SystemDrive}" "" $target = [io.path]::Combine($SystemDrive,"Rigel","x64","Scripts","Provisioning","SkypeDailyMaintenance.ps1") Out-File -FilePath "$target" -Encoding ascii -InputObject '' Write-Host "OK" } Function SilentUpdate { CheckSkypeUser StopSrsForAllUsers CopyScriptLaunchFromInstalledApp DisableAppLocker DisarmSkypeDailyMaintenance # Create ScriptLaunch event log that normally happens in FinalSetup.ps1 New-EventLog -LogName "ScriptLaunch" -Source "ScriptLaunch" Limit-EventLog -LogName "ScriptLaunch" -MaximumSize 15168KB # Get path to Scripts folder in Skype App Package Write-Host "Get path to scripts folder..." $appFolder = GetSkypeInstallFolder if ($appFolder -eq $null) { Write-Host "ERROR: Cannot find SkypeRoomSystem app folder" ExitRecoveryTool } $scriptsFolder = [io.path]::Combine($appFolder,"Scripts") Write-Host "Path to scripts folder is $scriptsFolder" Write-Host "OK" # Schedule the NightlyReboot.ps1 entry hook Write-Host "Creating Nightly Reboot task..." $NightlyRebootTaskXmlPath = (Join-Path $scriptsFolder NightlyRebootTask.xml) schtasks.exe /create /xml "$NightlyRebootTaskXmlPath" /tn Microsoft\Skype\NightlyReboot Write-Host "OK" # Schedule the Logon.ps1 entry hook Write-Host "Creating Logon task..." $LogonTaskXmlPath = (Join-Path $scriptsFolder LogonTask.xml) schtasks.exe /create /xml "$LogonTaskXmlPath" /tn Microsoft\Skype\Logon Write-Host "OK" # Set the start menu layout to reference only our app. # This is necessary for our app to survive the sysprep /generalize process. Write-Host "Pin SkypeRoomSystem app to start menu..." $StartLayout = (Join-Path $scriptsFolder LayoutModification.xml) Import-StartLayout -LayoutPath $StartLayout -MountPath $Env:SystemDrive\ Write-Host "OK" CreateAdminHooksFolder SilentUpdateSetSkypeUserRegKeys SilentUpdateSetHklmRegKeys #Migrate existing telemetry id CopyTelemetryId #Upgrade registry to show provisioning was upgraded Set-ItemProperty -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem" -Name "ProvisioningUpgradeMethod" -Value "SilentUpdate v$RECOVERY_VERSION" } Function IsNonUserSelectableOption { Param( [Nullable[RepairAction]]$Selection ) if ($Selection -eq [RepairAction]::SilentUpdate) { return $true } return $false } Function Get-RepairAction { param( [Nullable[RepairAction]]$RepairAction = $null ) if (IsNonUserSelectableOption -Selection $RepairAction) { return $RepairAction } while (($RepairAction -eq $null) -or (IsNonUserSelectableOption -Selection $RepairAction)) { [RepairAction].GetEnumValues() | ForEach-Object { if (!(IsNonUserSelectableOption -Selection $_)) { Write-Host ("[{0}] {1}" -f [int]$_, $_) }} $selection = Read-Host -Prompt "Please choose an option" try { $RepairAction = [RepairAction]$selection } catch {} } return $RepairAction } # Make sure we are elevated $isElevated = ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator") if (!$isElevated) { Write-Host "ERROR: Aborting operation because elevated privileges are not available. Please run this script as Administrator." ExitRecoveryTool } # Start Logging StartLogging # Detect the command $selection = Get-RepairAction @ARGS # Do System Repair if ($selection -eq [RepairAction]::Repair) { RefreshAppAndProvisioning # Repair complete Write-Host "" Write-Host "---------------------------------------------------" Write-Host "-- REPAIR COMPLETE. PLEASE RESTART THE SYSTEM. --" Write-Host "---------------------------------------------------" Write-Host "" ExitRecoveryTool } # Do BackgroundRepair if ($selection -eq [RepairAction]::SilentUpdate) { # Trigger restart on exit $RestartOnExit = $true # Perform repair is provisioning is out of date if ($(IsProvisioningCurrent) -eq $false) { SilentUpdate } ExitRecoveryTool } # Do System Reset #Check current Windows Version Write-Host "Checking current Windows installation..." CheckWindowsUpdates Write-Host "OK" # Get correct provisioning folder for Windows Version Write-Host "Verifying Windows Version..." $ProvisioningFolderPathForCurrentOS = "" $osVer = [System.Environment]::OSVersion.Version; switch ($osVer.Build) { $WINDOWS_VERSION_BUILD_RS3 { $ProvisioningFolderPathForCurrentOS = [io.path]::Combine($PSScriptRoot,'Provisioning','RS3') } $WINDOWS_VERSION_BUILD_RS2 { $ProvisioningFolderPathForCurrentOS = [io.path]::Combine($PSScriptRoot,'Provisioning','RS2') } default { Write-Host "The current Windows version $($osVer.ToString()) is not supported." ExitRecoveryTool } } Write-Host "OK" # Check Windows Edition Write-Host "Verifying Windows Edition..." $edition = (Get-WmiObject Win32_OperatingSystem).OperatingSystemSKU if ($edition -ne 4) { Write-Host "ERROR: The current OS edition is not supported. Windows Enterprise or Windows IoT Enterprise is required." ExitRecoveryTool } Write-Host "OK" Write-Host "" Write-Host "========================" Write-Host "OS Requirements Verified" Write-Host "========================" Write-Host "" # Remove any previous App Temp Folder $TEMP_APP_FOLDER = "RigelAppTemp" $tempAppPath = [io.path]::Combine($env:TEMP,$TEMP_APP_FOLDER) ExtractSrsApp -TargetFolder $tempAppPath Write-Host "" Write-Host "==========================" Write-Host "App Successfully Extracted" Write-Host "==========================" Write-Host "" # Verify necessary items are present $itemsToVerify = @( [io.path]::Combine($PSScriptRoot,'$oem$','$1','Rigel','x64','Ship','AppPackages','SkypeRoomSystem'), $ProvisioningFolderPathForCurrentOS, [io.path]::Combine($tempAppPath,'Scripts','EnableCustomizationsAfterRecovery.cmd'), [io.path]::Combine($tempAppPath,'Scripts','ResetConfig.xml') ) ForEach ($item in $itemsToVerify) { Write-Host "Verifying $item..." if (!$(Test-Path $item)) { Write-Host "ERROR: Aborting operation because the following item cannot be found: $item" ExitRecoveryTool } Write-Host "OK" } Write-Host "" Write-Host "======================================" Write-Host "Necessary items verified to be present" Write-Host "======================================" Write-Host "" # Remove any previous staging directory $STAGING_DIRECTORY = "OEM_TEMP" $stagingDir = [io.path]::Combine("$env:SystemDrive\",'Recovery',$STAGING_DIRECTORY) if (Test-Path ($stagingDir)) { Write-Host "Removing old staging directory $stagingDir..." Remove-Item -Path $stagingDir -Recurse -Force if (!$?) { Write-Host "ERROR: Aborting operation because we failed to remove old staging directory $stagingDir" ExitRecoveryTool } Write-Host "OK" } # Copy New items to Staging Directory $itemsToCopy = @( ([io.path]::Combine($PSScriptRoot,'$oem$','$1','Rigel','x64','Ship','AppPackages','SkypeRoomSystem'), [io.path]::Combine($stagingDir,'$oem$','$1','Rigel','x64','Ship','AppPackages','SkypeRoomSystem')), ($ProvisioningFolderPathForCurrentOS, [io.path]::Combine($stagingDir,'$oem$','$1','Rigel','x64','Scripts','Provisioning')), ([io.path]::Combine($ProvisioningFolderPathForCurrentOS,'AutoUnattend.xml'), [io.path]::Combine($stagingDir,'AutoUnattend.xml')), ([io.path]::Combine($tempAppPath,'Scripts','EnableCustomizationsAfterRecovery.cmd'), [io.path]::Combine($stagingDir,'EnableCustomizationsAfterRecovery.cmd')), ([io.path]::Combine($tempAppPath,'Scripts','ResetConfig.xml'), [io.path]::Combine($stagingDir,'ResetConfig.xml')) ) foreach ($item in $itemsToCopy) { $source = $item[0] $target = $item[1] Write-Host "Copying $source to $target..." Copy-Item -Recurse -Path $source -Destination $target if (!$?) { Write-Host "ERROR: Aborting operation because we failed to copy $source to $target" ExitRecoveryTool } Write-Host "OK" } Write-Host "" Write-Host "=========================" Write-Host "Items successfully staged" Write-Host "=========================" Write-Host "" # Setup Autounattend file $autoUnattendPath = [io.path]::Combine($stagingDir,'AutoUnattend.xml') $autoUnattendInProvisioningPath = [io.path]::Combine($stagingDir,'$oem$','$1','Rigel','x64','scripts','provisioning','AutoUnattend.xml') $autoUnattendXml = New-Object XML Write-Host "Loading AutoUnattend.xml file..." $autoUnattendXml.Load($autoUnattendPath) if (!$?) { Write-Host "ERROR: Aborting operation because we failed to load $autoUnattendPath" ExitRecoveryTool } $ns = New-Object Xml.XmlNamespaceManager $autoUnattendXml.NameTable $ns.AddNamespace("ns","urn:schemas-microsoft-com:unattend") Write-Host "OK" # Check features are present if ($autoUnattendXml.unattend.servicing.package.ChildNodes -ne $null) { Write-Host "Inspecting installed Windows Features..." $featureNodes = $autoUnattendXml.SelectNodes("//ns:unattend/ns:servicing/ns:package/ns:selection",$ns) foreach ($node in $featureNodes) { $feature = Get-WindowsOptionalFeature -Online -FeatureName $node.name if ($feature -ne $null) { Write-Host "Found $($node.name)" } else { if ($node.state -eq $false) { Write-Host "INFO: Removing command to disable feature $($node.name) because it is not installed" $autoUnattendXml.unattend.servicing.package.RemoveChild($node) | Out-Null } else { Write-Host "ERROR: Aborting operation because the required Windows Feature $($node.name) is not installed" ExitRecoveryTool } } } Write-Host "OK" } $fixNode = $autoUnattendXml.SelectSingleNode('//ns:unattend/ns:settings/ns:component/ns:RunSynchronous/ns:RunSynchronousCommand/ns:Path[contains(text(),"/generalize")]',$ns) if ($fixNode -ne $null) { Write-Host "Fixing up AutoUnattend.xml..." $fixNode.'#text' = $fixNode.'#text'.Replace("/generalize","") Write-Host "OK" } $packageName = "" Get-WindowsPackage -online | ForEach-Object { if ($_.PackageName.Contains("Microsoft-Windows-Foundation-Package")) {$packageName = $_.PackageName}} if ($packageName.Length -gt 0) { $packageVersion = $packageName.Substring($packageName.LastIndexOf('~')+1) $fixNode = $autoUnattendXml.SelectSingleNode("//ns:unattend/ns:servicing/ns:package/ns:assemblyIdentity",$ns) $fixNode.version = $packageVersion } Write-Host "Saving AutoUnattend.xml..." $autoUnattendXml.Save($autoUnattendPath) if (!$?) { Write-Host "ERROR: Aborting operation because we failed to write to $autoUnattendPath" ExitRecoveryTool } #Persist modified autounattend.xml for future resets Copy-Item -Path $autoUnattendPath -Destination $autoUnattendInProvisioningPath -Force if (!$?) { Write-Host "ERROR: Aborting operation because we failed to write to $autoUnattendInProvisioningPath" ExitRecoveryTool } Write-Host "OK" Write-Host "" Write-Host "=======================" Write-Host "AutoUnattend is updated" Write-Host "=======================" Write-Host "" # Backup old recovery directory if it exists $recoveryDir = [io.path]::Combine("$env:SystemDrive\",'Recovery') $oemDir = [io.path]::Combine($recoveryDir,'OEM') $oldOemDir = [io.path]::Combine($recoveryDir,"OEM.$(Get-Date -Format "yyyy-MM-dd-HH.mm.ss")") if (Test-Path $oemDir) { Write-Host "Renaming $oemDir to $oldOemDir..." Rename-Item -Path $oemDir -NewName $oldOemDir Write-Host "OK" } # Swap in new recovery directory Write-Host "Renaming $stagingDir directory to $oemDir..." Rename-Item -Path $stagingDir -NewName $oemDir Write-Host "OK" Write-Host "" Write-Host "==========================" Write-Host "Recovery Directory Updated" Write-Host "==========================" Write-Host "" Write-Host "" Write-Host "" Write-Host 'OPERATION COMPLETE: Please use Windows to "Reset This PC" and choose option to "Remove Everything"' Write-Host "" Write-Host 'NOTE: If Windows Reset fails because Windows Recovery Environment is not enabled, do the following:' Write-Host '1) Go to "Settings->System->About" to verify device encryption is turned OFF. If device encryption is ON, turn it OFF and wait for decryption to complete.' Write-Host '2) Start an elevated command prompt and run "reagentc.exe /enable"' Write-Host '3) Use Windows to "Reset This PC" and choose option to "Remove Everything"' Write-Host "" ExitRecoveryTool
combined_dataset/train/non-malicious/1677.ps1
1677.ps1
function Add-LocalAdmin { param ( [string]$comp, [string]$sam, [string]$domain = $env:USERDOMAIN ) if ($comp -match '^\s*$') { throw "Comp not found '$comp'" } if ($sam -match '^\s*$') { throw "Sam not acceptable '$sam'" } ([adsi]"WinNT://$comp/Administrators").add("WinNT://$domain/$sam") }
combined_dataset/train/non-malicious/PowerShell Template_7.ps1
PowerShell Template_7.ps1
Function new-script { $strName = $env:username $date = get-date -format d $name = Read-Host "Filename" $email = Read-Host "eMail Address" $file = New-Item -type file "c:\\Scripts\\$name.ps1" -force add-content $file "#==========================================================================" add-content $file "#" add-content $file "# NAME: $name.ps1" add-content $file "#" add-content $file "# AUTHOR: $strName" add-content $file "# EMAIL: $email" add-content $file "#" add-content $file "# COMMENT: " add-content $file "#" add-content $file "# You have a royalty-free right to use, modify, reproduce, and" add-content $file "# distribute this script file in any way you find useful, provided that" add-content $file "# you agree that the creator, owner above has no warranty, obligations," add-content $file "# or liability for such use." add-content $file "#" add-content $file "# VERSION HISTORY:" add-content $file "# 1.0 $date - Initial release" add-content $file "#" add-content $file "#==========================================================================" ii $file }
combined_dataset/train/non-malicious/sample_35_83.ps1
sample_35_83.ps1
# # Module manifest for module 'OCI.PSModules.Generativeaiinference' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Generativeaiinference.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '59f586b4-fbb6-47fb-9d66-75ada44be30d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Generativeaiinference Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeaiinference.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Invoke-OCIGenerativeaiinferenceEmbedText', 'Invoke-OCIGenerativeaiinferenceSummarizeText', 'New-OCIGenerativeaiinferenceText' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeaiinference' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_8_77.ps1
sample_8_77.ps1
PARAM($XMLFilename) . ./utils_cts.ps1 SkipSecondExecution trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ continue } if (Test-Path ($XMLFilename)) { $AlertDisplay = "Performance Monitor Warning" [xml] $ReportXML = Get-Content -Path $XMLFilename foreach ($Table in $ReportXML.SelectNodes("/Report/Section[@name='advice']/Table")) { if ($Table.name -eq "warning") { $ItemNumber = 0 $AlertSeverity = "Warning" foreach ($Item in $Table.SelectNodes("Item")) { $MSG_Summary = new-object PSObject $ItemNumber ++ foreach ($Data in $Item.SelectNodes("Data")) { $ColumnName = "Details" if ($null -ne $Data.img) { $AlertSeverity = $Data.img } if ($Data.name -eq "severity") { $AlertDisplay = $Data.Get_InnerText() } elseif ($Data.name -eq "warning") { $WarningMsg = $Data.Get_InnerText() } else { $WarningMsg = $Data.Get_InnerText() $ColumnName = ($Data.name.Substring(0,1).ToUpper()) + $Data.name.Substring(1,$Data.name.Length -1) } switch ($AlertSeverity) { "warning" { $AlertVerbosity = "Warning" } "error" { $AlertVerbosity = "Error" } default { $AlertVerbosity = "Informational" } } if ($ColumnName -ne 'Related') { add-member -inputobject $MSG_Summary -membertype noteproperty -name $ColumnName -value $WarningMsg } } if (($MSG_Summary | Get-Member).Count -gt 4) { $MSG_Summary | ConvertTo-Xml2 | update-diagreport -ID ("MSG_" + $ItemNumber.ToString() + "_" + (Get-Random) + "_Details") -name $AlertDisplay -verbosity $AlertVerbosity } else { "There is nothing to add. XML: " + $Table.get_InnerXML() } } } } # $XMLFilename| Remove-Item } else { "Error: $XMLFilename does not exist" | WriteTo-StdOut } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9H5aCP4z+BoXW # Qxe3ddsAYNVW9E/eUi7A/fuXSeJoaKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKzf # eyrzxN2b8Tu1Fh+EJCt4IQtCOYJ7YSyPBIb5jhZvMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAZDOvoZgYDv1l+krt4Sr7syA16kiB784nnxcf # 3mLUa8qhuBIjb31vqejrZKP+e8CFHwNlSspJiJowd4jEtHRgnNSsXVAc/WhagKgv # XCnajaT8tIMja55WKQklbIu9g6o1ptmTPIwntiaoUZsEdSmaIOYPyC2RT1xB7AyA # pfbiunQojO9J/60+7k33FrOrTXQHFUigAHzYgLaQuHy7+kF5Sn07IOZgIupn9D/l # g+tv3bllBQtC7trlli5nrRVn1Jc+LOYhAxWJREqk5alPh1tBcxBQc+kxopGcQ6+j # nuOiDwW/g0NeSlCfsXNYV0DlH+LjEEfe0Z7iEzd/8Q+nqTsBr6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBeEsSjvtb4XefIDReGfHaHDlgy76x9FFNg # xrf5o3MfdAIGZuto66JBGBMyMDI0MTAyODExNDA0MS40ODhaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgnQhaqwPWDqsqzVGOzoCq4Ofojw9O7o78LlE1xk7zUlQwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAF3srx+15IM0cbxhzdQtK9R59MoS1vYx # YPoXAGsord0SfEykMTSbcH/z73pffGJsPSm6gIdG1n2Zu6WRzC6avdFICnheQS6g # S6kZ42o4dbuSRZMcpnJU6PxJBQaOx0+s6RxA5IiA4pMIai3/HCIRHboveLyO7lve # sZvO6dFKzucf+nuiTpwjTm9T1rLFj0rYA4eXcu3BBO4cLAurFiwe4t6Wb/pFKQFY # CvreqWiiyzeSGxzKUtIhuTXNZm2An2HtfBo1N1vUyEm7muiJphFh7xGNFm1+BIzJ # /3JbL5JxjAWddmk0svwRdNQ/+FZgBqo66RePMbxWida1+eD0A91jsNrg04oIxm7D # W3CEraTCX7b4jChG6AEuHY50nSFefIFKIBj5o0pT/zOxbmhAlEgFPlA4cSrJ9a+W # Zv9lr1mZArdsrwOiU8NdGTdNWlvtYLgiOhat2ZBUbyyn/DqY33oT9I6fFkYpWylb # 3I98DKwgXnsEltJCX0uOjMuxYMSlvK8lSdxkXJY+iYuDJK2C77fe7Bdao+8RZuRL # GEd7ySguTHQYX7ZVggtD/9WW5vXfuysvejTLiQrv64bHpBFulo4LV2m4PZMAK3dh # nNaQDX/4Jv38IUsUZKezszoMfU0+6++WgHOayVaL40/dw7/3Zm2lPeRXxzkMVPo/ # /F64Jb4qA80G # SIG # End signature block
combined_dataset/train/non-malicious/sample_12_18.ps1
sample_12_18.ps1
##---------------------------------------------------------------------------- ## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved. ##---------------------------------------------------------------------------- # Import string constants . ./StringConstants.ps1 Stop-Service -Name $ServiceConstants.serviceName # SIG # Begin signature block # MIIoIgYJKoZIhvcNAQcCoIIoEzCCKA8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAW7wwqQJ4OHGcv # 6bLN7vx21lDcEnYp8vpAWEb+0YOYFqCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc # TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z # NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0 # JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr # Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF # LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F # LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh # 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ # wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay # g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI # YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp # QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro # OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB # WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+ # YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P # AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk # BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC # hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v # dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED # MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql # +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF # UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h # mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw # YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld # AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw # 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP # LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE # QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn # KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji # WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq # yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G # CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx # MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW # QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0 # aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH # zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9 # hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB # UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t # 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g # fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu # j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP # cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc # aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC # AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE # FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI # KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E # BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN # aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp # Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0 # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5 # NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw # AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v # Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu # Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB # CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH # fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY # SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs # X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G # Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j # +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB # Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl # EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet # ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF # xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM # aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGeowghnm # AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw # PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2 # IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF # AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE # MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAS # smX1d620XZjZ7nRh//JATWCW3XKXO16V9PuN9wb59jANBgkqhkiG9w0BAQEFAASC # AYBs6wN8g3lv+5iR6ZT/tsdTc9+/zrkZaV77f2gJ2rGZXmevQ6+quX2Oem2UODSd # dG9uz+KPRTwzcQ/CBiBVocvmhdB5rKe84vFjp+rbP7cHICsdnhAukiDDwFIPkHe8 # 8gOLY1RBA25iSc4UGidpcGt2qx1Z2Ji0aRqiY2vdPheI76WIMGTT7knFOzTQEkZl # VVxxlx5NGmU9jE22pmQ4kt3ylKoGASZ43omj0VAPpdPue3sq00p69NkAAKkwDAYw # ylWrZYOt6T6nEA+zgOEzvbV0dj0NYRy9tHpF2GVawI1oJG/woDa4HRjZDYkOIii/ # GX689G9NS+t8C6lK9UOi5qmY89EnTGihNP8Scz94r4Nle/ubjhyg1w1Cww1Zivne # 5u4rrD+S1xG5HLBa+2WVcWpD2Zx+laMML5y3L/GNswRg+7/9XHG1rNoxKdm95EH1 # uj+6F4mnA6kVwhHCOtsFBb0WENTsHMQgL1HG/t5AO0RS+qvTkzWa8kmKhUhXWra8 # tLShghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG9w0BBwKgghcZMIIX # FQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEEoGkEZzBlAgEBBglg # hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgJycv/TLLs/RksM5GDdfg6HtjLtvD # 8v5WTI448DYPaYsCEQDY7rEwXOK5cqOd1ytPs7InGA8yMDI0MDkyMDA5NTUzOFqg # ghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjANBgkqhkiG9w0BAQsF # ADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNV # BAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1w # aW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1OVowSDELMAkGA1UE # BhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2Vy # dCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfcYhVYwamTEafNqrJq # 3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD1isgHMGXlLSlUIHy # z8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkP # G2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH13gpOWvgeFmX40Qr # StWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52 # fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495uZBkHNwGRDxy1Uc2q # TGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPTaR58ZE2dD9/O0V6M # qqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZW # pST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM # /vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRwo+wK8REuZODLIivK # 8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMBAAGjggGLMIIBhzAO # BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEF # BQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwHwYDVR0jBBgw # FoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW27xPn783QZKHVVqll # MaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNv # bS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5j # cmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5k # aWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0 # LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdD # QS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xwjU+KPGic2CX/yyzk # zepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt7T1IjrhrunxdvcJh # N2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703 # DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJpddNQ5EQSviANnqlE # 0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqXTzON1I13fXVFoaVY # JmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3701S88lgIcRWR+3a # EUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhf # ysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7B145WPR8czFVoIAR # yxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6r # r3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBcYLso/zjlUlrWrBci # I0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZ # rZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0oZipeWzANBgkqhkiG # 9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkw # FwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVz # dGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIyMjM1OTU5WjBjMQsw # CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRp # Z2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENB # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1BkmzwT1ySVFVxyUD # xPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3znIkLf50fng8zH1AT # CyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW # 1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald68Dd5n12sy+iEZLRS # 8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zkpsUdzTYNXNXmG6jB # ZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCY # Jn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucf # WmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLc # GEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJTYsg0ixXNXkrqPNF # YLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJRk8mMDDtbiiKowSYI # +RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEoAA6EVO7O6V3IXjAS # vUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1UdEwEB/wQIMAYBAf8C # AQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX # 44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggr # BgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3Nw # LmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNl # cnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYDVR0fBDwwOjA4oDag # NIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RH # NC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3 # DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJL # Kftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYSlm/EUExiHQwIgqgW # valWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2M # vGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl2szwcqMj+sAngkSu # mScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJ # xLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05et3/JWOZJyw9P2un # 8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SV # e+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSweJywm228Vex4Ziza4 # k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJ # Dwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr # 5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzgaoSv27dZ8/DCCBY0w # ggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcNAQEMBQAwZTELMAkG # A1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRp # Z2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENB # MB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjELMAkGA1UEBhMCVVMx # FTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNv # bTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0MIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBpM+zCpyUuySE98orY # WcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR0uRf1gU8Ug9SH8ae # FaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckg # HWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53yEioZldXn1RYjgwr # t0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4x7axxLVqGDgDEI3Y # 1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjX # WkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIb # Zpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJhbesz2cXfSwQAzH0c # lcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz0YkH4b235kOkGLim # dwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIW # IgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+CiaZ9eRpL5gdLfXZ # qbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX # 44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3z # bcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGG # GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL2Nh # Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNydDBF # BgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl # cnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYEVR0gADANBgkqhkiG # 9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviH # GmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPITtAq3votVs/59Pes # MHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3 # A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/voVA9/HYJaISfb8rb # II01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+cWojayL/ErhULSd+ # 2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNyAgEBMHcwYzELMAkG # A1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdp # Q2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQ # BUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMx # DQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDkyMDA5NTUzOFowKwYL # KoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZI # hvcNAQkEMSIEIJ6vzYzS37Xy9GHCtReQ6tUGLASl3FidbzMGWhV9rSweMDcGCyqG # SIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+CitpVmq4zFq9NGprU # DHgoMA0GCSqGSIb3DQEBAQUABIICAI3lmFvoMG/s+IpgKF8RfaZJo34x0D7U/+Q+ # BLirQTEZrQRiqV5O0oo0IWaFEhfrasyv/WCH49cM3S4Ro9LtH90zE3jIpK7vNBCH # 5W5mS78qfDZrnXUOknXKWqdZsRql26SpKIzJcFhaJ+6iDKj42szk7GzacThuIYOK # 2t81QvuC2LaeCOs8K5zRrDJmbFylrS1LoaSxslq1gMx7udwoCrmlaCRFfrQcI/D6 # mWP6O7dKOyDp8clqfVNiQdYsWAYpZGjQaO7WXFmuIx25wesgg9bpu5PVYMJ/UNHk # I6QsWy+HavwFhATSYnjWWt5QhczpYc3/+ChsWKK7v8tTrfUW4Qq4v3OkJBMU7Gtu # q3l6WyYjgDx35VBeYFND6SVx6NhmCmSD+8ikWiF5klSh192YE2wTrlf05AlofyTy # whDCROLw7bDWkx6Jmt9HZCtE+A3Atxyc98Z8+bpamU/gw179qYTs+9D/6PixnQ5v # ez0u0GCKlpyGFsBYmmL0wrQH80/+kzzRzuUbJHSqkgFeMiQPcEgsmWFXqQPQuyD3 # wCI7RiSoR0VRtrzWVoJZO3GRVQBs+70ykMJsMFpGV/PeTelPDbftdOIGmy/rY4YB # iy4JuBgdRHFeUWScDGjMw4SyqlFWyxHeRaaycLNJY1WnXVjD5jvA0SZfgKEX7BfX # a0bx3+GP # SIG # End signature block
combined_dataset/train/non-malicious/Import-ADUser.ps1
Import-ADUser.ps1
#############################################################################\n##\n## Import-AdUser\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n#############################################################################\n\n<#\n\n.SYNOPSIS\n\nCreate users in Active Directory from the content of a CSV.\n\n.DESCRIPTION\n\nIn the user CSV, One column must be named "CN" for the user name.\nAll other columns represent properties in Active Directory for that user.\n\nFor example:\nCN,userPrincipalName,displayName,manager\nMyerKen,Ken.Myer@fabrikam.com,Ken Myer,\nDoeJane,Jane.Doe@fabrikam.com,Jane Doe,"CN=MyerKen,OU=West,OU=Sales,DC=..."\nSmithRobin,Robin.Smith@fabrikam.com,Robin Smith,"CN=MyerKen,OU=West,OU=..."\n\n.EXAMPLE\n\nPS >$container = "LDAP://localhost:389/ou=West,ou=Sales,dc=Fabrikam,dc=COM"\nPS >Import-ADUser.ps1 $container .\\users.csv\n\n#>\n\nparam(\n ## The container in which to import users\n ## For example:\n ## "LDAP://localhost:389/ou=West,ou=Sales,dc=Fabrikam,dc=COM)")\n [Parameter(Mandatory = $true)]\n $Container,\n\n ## The path to the CSV that contains the user records\n [Parameter(Mandatory = $true)]\n $Path\n)\n\nSet-StrictMode -Off\n\n## Bind to the container\n$userContainer = [adsi] $container\n\n## Ensure that the container was valid\nif(-not $userContainer.Name)\n{\n Write-Error "Could not connect to $container"\n return\n}\n\n## Load the CSV\n$users = @(Import-Csv $Path)\nif($users.Count -eq 0)\n{\n return\n}\n\n## Go through each user from the CSV\nforeach($user in $users)\n{\n ## Pull out the name, and create that user\n $username = $user.CN\n $newUser = $userContainer.Create("User", "CN=$username")\n\n ## Go through each of the properties from the CSV, and set its value\n ## on the user\n foreach($property in $user.PsObject.Properties)\n {\n ## Skip the property if it was the CN property that sets the\n ## user name\n if($property.Name -eq "CN")\n {\n continue\n }\n\n ## Ensure they specified a value for the property\n if(-not $property.Value)\n {\n continue\n }\n\n ## Set the value of the property\n $newUser.Put($property.Name, $property.Value)\n }\n\n ## Finalize the information in Active Directory\n $newUser.SetInfo()\n}
combined_dataset/train/non-malicious/sample_51_93.ps1
sample_51_93.ps1
# # Module manifest for module 'OCI.PSModules.Limits' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Limits.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2639cc9c-eb7c-4e6a-9e53-b91506263439' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Limits Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Limits.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCILimitsQuotaLock', 'Get-OCILimitsLimitDefinitionsList', 'Get-OCILimitsLimitValuesList', 'Get-OCILimitsQuota', 'Get-OCILimitsQuotasList', 'Get-OCILimitsResourceAvailability', 'Get-OCILimitsServicesList', 'New-OCILimitsQuota', 'Remove-OCILimitsQuota', 'Remove-OCILimitsQuotaLock', 'Update-OCILimitsQuota' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Limits' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Resolve-Aliases 1.7.ps1
Resolve-Aliases 1.7.ps1
#requires -version 2.0 ## ResolveAliases Module v 1.6 ######################################################################################################################## ## Sample Use: ## Resolve-Aliases Script.ps1 | Set-Content Script.Resolved.ps1 ## ls *.ps1 | Resolve-Aliases -Inplace ######################################################################################################################## ## Version History ## 1.0 - First Version. "It worked on my sample script" ## 1.1 - Now it parses the $(...) blocks inside strings ## 1.2 - Some tweaks to spacing and indenting (I really gotta get some more test case scripts) ## 1.3 - I went back to processing the whole script at once (instead of a line at a time) ## Processing a line at a time makes it impossible to handle Here-Strings... ## I'm considering maybe processing the tokens backwards, replacing just the tokens that need it ## That would mean I could get rid of all the normalizing code, and leave the whitespace as-is ## 1.4 - Now resolves parameters too ## 1.5 - Fixed several bugs with command resolution (the ? => ForEach-Object problem) ## - Refactored the Resolve-Line filter right out of existence ## - Created a test script for validation, and ## 1.6 - Added resolving parameter ALIASES instead of just short-forms ## 1.7 - Minor tweak to make it work in CTP3 ## ## * *TODO:* Put back the -FullPath option to resolve cmdlets with their snapin path ## * *TODO:* Add an option to put #requires statements at the top for each snapin used ######################################################################################################################## function which { PARAM( [string]$command ) # aliases, functions, cmdlets, scripts, executables, normal files $cmds = @(Get-Command $command -EA "SilentlyContinue") if($cmds.Count -gt 1) { $cmd = @( $cmds | Where-Object { $_.Name -match "^$([Regex]::Escape($command))" })[0] } else { $cmd = $cmds[0] } if(!$cmd) { $cmd = @(Get-Command "Get-$command" -EA "SilentlyContinue" | Where-Object { $_.Name -match "^Get-$([Regex]::Escape($command))" })[0] } if( $cmd.CommandType -eq "Alias" ) { $cmd = which $cmd.Definition } return $cmd } function Resolve-Aliases { [CmdletBinding(ConfirmImpact="low",DefaultParameterSetName="Files")] Param ( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Text")] [string]$Line , [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Files")] [Alias("FullName","PSChildName","PSPath")] [IO.FileInfo]$File , [Parameter(Position=1, ParameterSetName="Files")] [Switch]$InPlace ) BEGIN { Write-Debug $PSCmdlet.ParameterSetName } PROCESS { if($PSCmdlet.ParameterSetName -eq "Files") { if($File -is [System.IO.FileInfo]){ $Line = ((Get-Content $File) -join "`n") } else { throw "We can't resolve a whole folder at once yet" } } $Tokens = [System.Management.Automation.PSParser]::Tokenize($Line,[ref]$null) for($t = $Tokens.Count; $t -ge 0; $t--) { $token = $Tokens[$t] # DEBUG $token | fl * | out-host switch($token.Type) { "Command" { $cmd = which $token.Content Write-Debug "Command $($token.Content) => $($cmd.Name)" #if($cmd.CommandType -eq "Alias") { $Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, $cmd.Name ) #} } "CommandParameter" { Write-Debug "Parameter $($token.Content)" for($c = $t; $c -ge 0; $c--) { if( $Tokens[$c].Type -eq "Command" ) { $cmd = which $Tokens[$c].Content # if($cmd.CommandType -eq "Alias") { # $cmd = @(which $cmd.Definition)[0] # } $short = $token.Content -replace "^-?","^" Write-Debug "Parameter $short" $parameters = $cmd.ParameterSets | Select -expand Parameters $param = @($parameters | Where-Object { $_.Name -match $short -or $_.Aliases -match $short} | Select -Expand Name -Unique) if($param.Count -eq 1) { $Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, "-$($param[0])" ) } break } } } } } switch($PSCmdlet.ParameterSetName) { "Text" { $Line } "Files" { switch($File.GetType()) { "System.IO.FileInfo" { if($InPlace) { $Line | Set-Content $File } else { $Line } } default { throw "We can't resolve a whole folder at once yet" } } } default { throw "ParameterSet: $($PSCmdlet.ParameterSetName)" } } } }
combined_dataset/train/non-malicious/240.ps1
240.ps1
function Get-SCSMObjectPrefix { [OutputType([psobject])] param ( [ValidateSet( 'DependentActivity', 'ManualActivity', 'ParallelActivity', 'ReviewActivity', 'RunbookAutomationActivity', 'SequentialActivity', 'IncidentRequest', 'ServiceRequest', 'Change', 'Knowledge', 'Problem', 'Release' )] [string]$ClassName ) BEGIN { Import-Module -Name Smlets $ActivitySettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ActivitySettings") $ChangeSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ChangeSettings") $KnowledgedSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.KnowledgeSettings") $ProblemSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ProblemSettings") $ReleaseSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ReleaseSettings") $ServiceRequestSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ServiceRequestSettings") $IncidentRequestSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.WorkItem.Incident.GeneralSetting") } PROCESS { Switch ($ClassName) { "DependentActivity" { $ActivitySettingsObj.SystemWorkItemActivityDependentActivityIdPrefix } "ManualActivity" { $ActivitySettingsObj.SystemWorkItemActivityManualActivityIdPrefix } "ParallelActivity" { $ActivitySettingsObj.SystemWorkItemActivityParallelActivityIdPrefix } "ReviewActivity" { $ActivitySettingsObj.SystemWorkItemActivityReviewActivityIdPrefix } "RunbookAutomationActivity" { $ActivitySettingsObj.MicrosoftSystemCenterOrchestratorRunbookAutomationActivityBaseIdPrefix } "SequentialActivity" { $ActivitySettingsObj.SystemWorkItemActivitySequentialActivityIdPrefix } "IncidentRequest" { $IncidentRequestSettingsObj.PrefixForId } "ServiceRequest" { $ServiceRequestSettingsObj.ServiceRequestPrefix } "Change" { $ChangeSettingsObj.SystemWorkItemChangeRequestIdPrefix } "Knowledge" { $KnowledgedSettingsObj.SystemKnowledgeArticleIdPrefix } "Problem" { $ProblemSettingsObj.ProblemIdPrefix } "Release" { $ReleaseSettingsObj.SystemWorkItemReleaseRecordIdPrefix } default { [pscustomobject][ordered]@{ "DependentActivity" = $ActivitySettingsObj.SystemWorkItemActivityDependentActivityIdPrefix "ManualActivity" = $ActivitySettingsObj.SystemWorkItemActivityManualActivityIdPrefix "ParallelActivity" = $ActivitySettingsObj.SystemWorkItemActivityParallelActivityIdPrefix "ReviewActivity" = $ActivitySettingsObj.SystemWorkItemActivityReviewActivityIdPrefix "RunbookAutomationActivity" = $ActivitySettingsObj.MicrosoftSystemCenterOrchestratorRunbookAutomationActivityBaseIdPrefix "SequentialActivity" = $ActivitySettingsObj.SystemWorkItemActivitySequentialActivityIdPrefix "IncidentRequest" = $IncidentRequestSettingsObj.PrefixForId "ServiceRequest" = $ServiceRequestSettingsObj.ServiceRequestPrefix "Change" = $ChangeSettingsObj.SystemWorkItemChangeRequestIdPrefix "Knowledge" = $KnowledgedSettingsObj.SystemKnowledgeArticleIdPrefix "Problem" = $ProblemSettingsObj.ProblemIdPrefix "Release" = $ReleaseSettingsObj.SystemWorkItemReleaseRecordIdPrefix } } } } }
combined_dataset/train/non-malicious/New-Struct_1.ps1
New-Struct_1.ps1
## New-Struct ## Creates a Struct class and emits it into memory ## The Struct includes a constructor which takes the parameters in order... ## ## Usage: ## # Assuming you have a csv file with no header and columns: artist,name,length ## New-Struct Song @{ ## Artist=[string]; ## Name=[string]; ## Length=[TimeSpan]; ## } ## $songs = gc C:\\Scripts\\songlist.csv | % { new-object Song @($_ -split ",") } ## function New-Struct { param([string]$Name,[HashTable]$Properties) switch($Properties.Keys){{$_ -isnot [String]}{throw "Invalid Syntax"}} switch($Properties.Values){{$_ -isnot [type]}{throw "Invalid Syntax"}} # CODE GENERATION MAGIKS! $code = @" using System; public struct $Name { $($Properties.Keys | % { " public {0} {1};`n" -f $Properties[$_],($_.ToUpper()[0] + $_.SubString(1)) }) public $Name ($( [String]::join(',',($Properties.Keys | % { "{0} {1}" -f $Properties[$_],($_.ToLower()) })) )) { $($Properties.Keys | % { " {0} = {1};`n" -f ($_.ToUpper()[0] + $_.SubString(1)),($_.ToLower()) }) } } "@ ## Obtains an ICodeCompiler from a CodeDomProvider class. $provider = New-Object Microsoft.CSharp.CSharpCodeProvider ## Get the location for System.Management.Automation DLL $dllName = [PsObject].Assembly.Location ## Configure the compiler parameters $compilerParameters = New-Object System.CodeDom.Compiler.CompilerParameters $assemblies = @("System.dll", $dllName) $compilerParameters.ReferencedAssemblies.AddRange($assemblies) $compilerParameters.IncludeDebugInformation = $true $compilerParameters.GenerateInMemory = $true $compilerResults = $provider.CompileAssemblyFromSource($compilerParameters, $code) if($compilerResults.Errors.Count -gt 0) { $compilerResults.Errors | % { Write-Error $_.Line + ":`t" + $_.ErrorText } } }
combined_dataset/train/non-malicious/117.ps1
117.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-AADUser(){ [cmdletbinding()] param ( $userPrincipalName, $Property ) $graphApiVersion = "v1.0" $User_resource = "users" try { if($userPrincipalName -eq "" -or $userPrincipalName -eq $null){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } else { if($Property -eq "" -or $Property -eq $null){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)/$userPrincipalName" Write-Verbose $uri Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)/$userPrincipalName/$Property" Write-Verbose $uri (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-AADGroup(){ [cmdletbinding()] param ( $GroupName, $id, [switch]$Members ) $graphApiVersion = "v1.0" $Group_resource = "groups" try { if($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } elseif($GroupName -eq "" -or $GroupName -eq $null){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } else { if(!$Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } elseif($Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" $Group = (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value if($Group){ $GID = $Group.id $Group.displayName write-host $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-AADDevice(){ [cmdletbinding()] param ( $DeviceID ) $graphApiVersion = "v1.0" $Resource = "devices" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)?`$filter=deviceId eq '$DeviceID'" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).value } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Add-AADGroupMember(){ [cmdletbinding()] param ( $GroupId, $AADMemberId ) $graphApiVersion = "v1.0" $Resource = "groups" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource/$GroupId/members/`$ref" $JSON = @" { "@odata.id": "https://graph.microsoft.com/v1.0/directoryObjects/$AADMemberId" } "@ Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $Json -ContentType "application/json" } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-ManagedDevices(){ [cmdletbinding()] param ( [switch]$IncludeEAS, [switch]$ExcludeMDM ) $graphApiVersion = "beta" $Resource = "deviceManagement/managedDevices" try { $Count_Params = 0 if($IncludeEAS.IsPresent){ $Count_Params++ } if($ExcludeMDM.IsPresent){ $Count_Params++ } if($Count_Params -gt 1){ write-warning "Multiple parameters set, specify a single parameter -IncludeEAS, -ExcludeMDM or no parameter against the function" Write-Host break } elseif($IncludeEAS){ $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource" } elseif($ExcludeMDM){ $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=managementAgent eq 'eas'" } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=managementAgent eq 'mdm' and managementAgent eq 'easmdm'" Write-Warning "EAS Devices are excluded by default, please use -IncludeEAS if you want to include those devices" Write-Host } (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $AADGroup = Read-Host -Prompt "Enter the Azure AD device group name where devices will be assigned as members" $GroupId = (get-AADGroup -GroupName "$AADGroup").id if($GroupId -eq $null -or $GroupId -eq ""){ Write-Host "AAD Group - '$AADGroup' doesn't exist, please specify a valid AAD Group..." -ForegroundColor Red Write-Host exit } else { $GroupMembers = Get-AADGroup -GroupName "$AADGroup" -Members } $FilterName = Read-Host -Prompt "Specify the Azure AD display name search string" if($FilterName -eq "" -or $FilterName -eq $null){ Write-Host Write-Host "A string is required to identify the set of users." -ForegroundColor Red Write-Host break } $count = 0 $countAdded = 0 Write-Host Write-Host "Checking if any Managed Devices are registered with Intune..." -ForegroundColor Cyan Write-Host $Devices = Get-ManagedDevices if($Devices){ Write-Host "Intune Managed Devices found..." -ForegroundColor Yellow Write-Host foreach($Device in $Devices){ $DeviceID = $Device.id $AAD_DeviceID = $Device.azureActiveDirectoryDeviceId $LSD = $Device.lastSyncDateTime $userId = $Device.userPrincipalName $User = Get-AADUser -userPrincipalName $userId if(($User.displayName).contains("$FilterName")){ Write-Host "----------------------------------------------------" Write-Host write-host "Device Name:"$Device.deviceName -f Green write-host "Management State:"$Device.managementState write-host "Operating System:"$Device.operatingSystem write-host "Device Type:"$Device.deviceType write-host "Last Sync Date Time:"$Device.lastSyncDateTime write-host "Jail Broken:"$Device.jailBroken write-host "Compliance State:"$Device.complianceState write-host "Enrollment Type:"$Device.enrollmentType write-host "AAD Registered:"$Device.aadRegistered Write-Host "UPN:"$Device.userPrincipalName write-host write-host "User Details:" -f Green write-host "User Display Name:"$User.displayName Write-Host "Adding user device" $Device.deviceName "to AAD Group $AADGroup..." -ForegroundColor Yellow $AAD_Device = Get-AADDevice -DeviceID $AAD_DeviceID $AAD_Id = $AAD_Device.id if($GroupMembers.id -contains $AAD_Id){ Write-Host "Device already exists in AAD Group..." -ForegroundColor Red $countAdded++ } else { Write-Host "Adding Device to AAD Group..." -ForegroundColor Yellow Add-AADGroupMember -GroupId $GroupId -AADMemberId $AAD_Id $count++ } Write-Host } } Write-Host "----------------------------------------------------" Write-Host Write-Host "$count devices added to AAD Group '$AADGroup' with filter '$filterName'..." -ForegroundColor Green Write-Host "$countAdded devices already in AAD Group '$AADGroup' with filter '$filterName'..." -ForegroundColor Yellow Write-Host } else { write-host "No Intune Managed Devices found..." -f green Write-Host }
combined_dataset/train/non-malicious/sample_41_83.ps1
sample_41_83.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIIllgYJKoZIhvcNAQcCoIIlhzCCJYMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mTCCGZUCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3 # RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq # tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7 # EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/ # 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt # SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC # FygwghckBgorBgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL # JZwfEO4YeUvzRyzBGzb6/QIGZbql/Em5GBIyMDI0MDIyMTA3MjkwOC4wMVowBIAC # AfSggdikgdUwgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # LTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm # MCQGA1UECxMdVGhhbGVzIFRTUyBFU046RkM0MS00QkQ0LUQyMjAxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgIT # MwAAAeKZmZXx3OMg6wABAAAB4jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEwMTIxOTA3MjVaFw0yNTAxMTAxOTA3MjVa # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAtWO1mFX6QWZvxwpCmDabOKwOVEj3vwZvZqYa9sCYJ3TglUZ5N79AbMzw # ptCswOiXsMLuNLTcmRys+xaL1alXCwhyRFDwCRfWJ0Eb0eHIKykBq9+6/PnmSGXt # us9DHsf31QluwTfAyamYlqw9amAXTnNmW+lZANQsNwhjKXmVcjgdVnk3oxLFY7zP # Baviv3GQyZRezsgLEMmvlrf1JJ48AlEjLOdohzRbNnowVxNHMss3I8ETgqtW/UsV # 33oU3EDPCd61J4+DzwSZF7OvZPcdMUSWd4lfJBh3phDt4IhzvKWVahjTcISD2CGi # un2pQpwFR8VxLhcSV/cZIRGeXMmwruz9kY9Th1odPaNYahiFrZAI6aSCM6YEUKpA # UXAWaw+tmPh5CzNjGrhzgeo+dS7iFPhqqm9Rneog5dt3JTjak0v3dyfSs9NOV45S # w5BuC+VF22EUIF6nF9vqduynd9xlo8F9Nu1dVryctC4wIGrJ+x5u6qdvCP6UdB+o # qmK+nJ3soJYAKiPvxdTBirLUfJidK1OZ7hP28rq7Y78pOF9E54keJKDjjKYWP7fg # hwUSE+iBoq802xNWbhBuqmELKSevAHKqisEIsfpuWVG0kwnCa7sZF1NCwjHYcwqq # mES2lKbXPe58BJ0+uA+GxAhEWQdka6KEvUmOPgu7cJsCaFrSU6sCAwEAAaOCAUkw # ggFFMB0GA1UdDgQWBBREhA4R2r7tB2yWm0mIJE2leAnaBTAfBgNVHSMEGDAWgBSf # pxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w # JTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAC # hlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29m # dCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAA # MBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG # 9w0BAQsFAAOCAgEA5FREMatVFNue6V+yDZxOzLKHthe+FVTs1kyQhMBBiwUQ9WC9 # K+ILKWvlqneRrvpjPS3/qXG5zMjrDu1eryfhbFRSByPnACGc2iuGcPyWNiptyTft # +CBgrf7ATAuE/U8YLm29crTFiiZTWdT6Vc7L1lGdKEj8dl0WvDayuC2xtajD04y4 # ANLmWDuiStdrZ1oI4afG5oPUg77rkTuq/Y7RbSwaPsBZ06M12l7E+uykvYoRw4x4 # lWaST87SBqeEXPMcCdaO01ad5TXVZDoHG/w6k3V9j3DNCiLJyC844kz3eh3nkQZ5 # fF8Xxuh8tWVQTfMiKShJ537yzrU0M/7H1EzJrabAr9izXF28OVlMed0gqyx+a7e+ # 79r4EV/a4ijJxVO8FCm/92tEkPrx6jjTWaQJEWSbL/4GZCVGvHatqmoC7mTQ16/6 # JR0FQqZf+I5opnvm+5CDuEKIEDnEiblkhcNKVfjvDAVqvf8GBPCe0yr2trpBEB5L # +j+5haSa+q8TwCrfxCYqBOIGdZJL+5U9xocTICufIWHkb6p4IaYvjgx8ScUSHFze # xo+ZeF7oyFKAIgYlRkMDvffqdAPx+fjLrnfgt6X4u5PkXlsW3SYvB34fkbEbM5tm # ab9zekRa0e/W6Dt1L8N+tx3WyfYTiCThbUvWN1EFsr3HCQybBj4Idl4xK8Ewggdx # MIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGI # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN # aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5 # MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciEL # eaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa # 4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxR # MTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEByd # Uv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi9 # 47SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi # ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+ # /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY # 7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtco # dgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH # 29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94 # q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcV # AQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0G # A1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQB # gjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v # cGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgw # GQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB # /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f # BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJv # ZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4w # TDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIB # AJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRs # fNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6 # Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveV # tihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKB # GUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoy # GtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE # cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU # a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+ # k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0 # +CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cir # Ooo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEA # oYHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0w # KwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAk # BgNVBAsTHVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxN # aWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAWm5lp # +nRuekl0iF+IHV3ylOiGb6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA6X+AFzAiGA8yMDI0MDIyMTAzNDYzMVoY # DzIwMjQwMjIyMDM0NjMxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpf4AXAgEA # MAcCAQACAh5yMAcCAQACAhFnMAoCBQDpgNGXAgEAMDYGCisGAQQBhFkKBAIxKDAm # MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN # AQEFBQADgYEAxGcZAoFeXbm0lSQcN8Ii+gQFo+lM2tRNqdOYlFFNPU7xJ4Lw9Y67 # jm2t9W//iJj6K88iWRalx/8BcaWPo729WgTLvx4YfmI6ypuIu4rOPlE+YdA7hnz/ # w0EFGCiyUWOWHvHsZkjbauU2GtBCp+N4bEb01+9j5pGQeTKaIyK6shQxggQNMIIE # CQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw # JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeKZmZXx # 3OMg6wABAAAB4jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqG # SIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCB8ktuaSiTkHlGMsDLd+eJk1xuWpAnK # 3AHzWxyywJgJOTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICuJKkoQ/Sa4 # xsFQRM4Ogvh3ktToj9uO5whmQ4kIj3//MIGYMIGApH4wfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwIgQgip5HuJg0dybm # 2DGucdSAdFUqvt3kdMKJWSPdl6NuwcYwDQYJKoZIhvcNAQELBQAEggIAVVucEcXx # ySMHsYHgPC7skc+sQcQ7EFmXGs9NuQAD/ShwuDdASBA8mhTOYH1fVUlAoXgTifAu # pLo8OA+h8R6K3ahZMbNTURgAKzXAlwFeyCpqwmjLYA9730U20FnMd++zlOJFBK/C # rosaN6PNrcLWCpbCIVtlznGx+X33ILTO8WxhElSl6ttq6g4VarGwvpB9cDuqILIP # xCYlXmlQuiQWzhb+cC2AziyC3XKiTwMbMSc9hlKnTOj1yBzywngrwTyJeBDCQb+n # ZSOpjB40+IbCtIJ4CROkbbQnQ/ozJq0DZFf8cgb8HnOQ7DC/O6UIXQVkoIm5vOiI # VjJtdLmZIHvDj259oBgWdhr3GHPji5an2ZVZ6vWiH3MgQ3qiCJIO5O6VgwD6RHpl # JYDL8O6FntkuhhD1yGhaNQtAE9pX/pHTwdgroF4VIGR1YHaWiMygXZDduCwUgcXS # Po8Y0AEFml1ajqgUspgPDLRuTSBCM1mlBt7SQbj0aF9K9O8DNLknHgOTgk+zbw0I # iNwmXPOo8aQsXbNesF7hgYBHQb3+wUFV9KBu6vq0MCsiFAMo71sHRTvNtAhKtNoQ # c0aYoxfY8EPWX87iNKSct3eZTMMk8K1sBcuCG2F37ESWbiLiFJVpAM9yN10sOTNO # Ls9C9ghKwvUpEDxB9PBpQjPkQ3exnOTrNtY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_27_46.ps1
sample_27_46.ps1
@{ GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-Acl", "Set-Acl", "Get-PfxCertificate", "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "Get-AuthenticodeSignature", "Set-AuthenticodeSignature", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-CmsMessage", "Unprotect-CmsMessage", "Protect-CmsMessage" , "New-FileCatalog" , "Test-FileCatalog" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD++xTkW7oivoiQ # gqU/R85f/MwSI1hVEeaegSriXP6+BqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFh1eRlM7vpfcyNRhGD2p01b # 7R1UWqEpDNm2QYTPq7fWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAXspH6BNY7nbQAAzC1kvWt9mAW2aV64hI290LtAjJOjj9tyjJNAREJUod # Ti94rwhNCwq2Qpv0KJBSuHJ1XYbEkLboaiEPI/5smx7L4A+eGYgZ0dGNoCpVWYpe # FgCRxD0fAmKZ8Ed3S54uX3J+EfpMXkrPhjkfKNvropz0oK7MeUXy74sWd1lUaIpQ # 5smOjzDyQijq8o2dIo6S2GoxZiRcq8wgpT0UY7lhySgmkFFZiU5CUm7xEkHB0rWR # TpDsR3r6kTAX9miBICR+sR/V6zs03MTba8DNLXGLxKq0pdHkclj8ohNFmYDsjewl # /irOwKDbn8oN3G2ptSd59iFx7s5GoqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBghnvISx3TWuYdWp0s1Tt43KKzwQFCwn2wxdlvF7cmhwIGZc4rEAPw # GBMyMDI0MDIyMDE4MTg0My45OTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X9A8TAiGA8yMDI0MDIyMDE1MTcw # NVoYDzIwMjQwMjIxMTUxNzA1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpf0Dx # AgEAMAoCAQACAgjVAgH/MAcCAQACAhOtMAoCBQDpgJJxAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAE+gQPeZ+1/8UmDTu/iwG2OPrgCoLD4sJulVcxKqKOTS # 7Ezst3KQTTif6AAf14TBO7QucyoofmwOoWOnDH/6j6VREPUxNxvxwtB1pmpHdIvj # 5tN9HaSDg3DuaQIWdx9xlAlEIHlqwNwUloanyqAJQoht7StV8PigjykbwUdUz6I4 # A/ahhVP/fpF2LCZ0XfRfdLSpSSNOfhtdiKbqeZ81G1mtA62ZqpE2kgyjzOzAXqTS # /HDs2qxc1q4cGHBSjHr11I2VxKUzHds8XtxAFl1JoNInmbr4lZn+wqMY0NvW1Lgm # 9kj7CesrwN1DmUZ7+veolNirH3+N2RMYyhHPjqA/YPMxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB # 7TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCByoVvnou+zXqw6phSC4HAOYSmV+42kKco0+gAG6bN6 # sTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrI # wrsSDrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgTN+DWnwSIDCPoA2pkntJYGyJ # qZnJLcOa/o4e8mNk6gYwDQYJKoZIhvcNAQELBQAEggIAbc40VIkIDzagsbmb2xgR # S8kxINu/NahK4zni3ONZgLy/DPxAqOqosbMM0t3QYLuNVVG3te2SyUOpwO+Tuq0Z # 7Kt0dbbl06mWW7z2lMs0tHCEPOO8gC334pWdC+X5oZdLk4YULFdDd1ajruzS2QxG # MBEh3ZTEKelno1CpI87nzTi5Z2yumud2HZq0pEftBt86TNUbEz3aW30GvgbOmIlB # yuQDbibTvdVChERgyWtNERAWPN8HEtu5aqC3m/TY/rg1n2+u3OY3MwJb7clMwNyT # WOrOvYJ+EZKB76SJ89yAWcxeCHyU1ezWe17vePB/k5BsrAgwT+yw/AJ/GdSLFlth # RL64ortCDT+4blTDK0TMwpwwCDGhCPdgKv4+vIf0Vn4bnqBj4Jq9PtZz5ZiGtkh6 # u0TfOfnmcDUms7O3PyYD7NopWHBv7OHHmdArKHVXi7plH7RCMECUJBDjEZAJL9po # 1vewhLK5hUabdqLI7v7D9jqK2ETpLwBbtIWIqZ6z9Wy4NjDIms8G8TM6em2S73ep # s/pCaS5OkWndFCfYaFCgIU4yc1l97jvZ3ONwmuHIvPccRNa1IlIrmkbTaWp/g2oZ # SRpOB4pTd1QXB4Qmd/qIYh6J9sN2cEJr9vHn9QUg09WQyV09pGBVyaOpY+A/Vn2L # 6jGFLrwUehFqUcOnh71Qz5A= # SIG # End signature block
combined_dataset/train/non-malicious/Move-VMThin SVMotion.ps1
Move-VMThin SVMotion.ps1
function Move-VMThin { PARAM( [Parameter(Mandatory=$true,ValueFromPipeline=$true,HelpMessage="Virtual Machine Objects to Migrate")] [ValidateNotNullOrEmpty()] [System.String]$VM ,[Parameter(Mandatory=$true,HelpMessage="Destination Datastore")] [ValidateNotNullOrEmpty()] [System.String]$Datastore ) Begin { #Nothing Necessary to process } #Begin Process { #Prepare Migration info, uses .NET API to specify a transformation to thin disk $vmView = Get-View -ViewType VirtualMachine -Filter @{"Name" = "$VM"} $dsView = Get-View -ViewType Datastore -Filter @{"Name" = "$Datastore"} #Abort Migration if free space on destination datastore is less than 50GB if (($dsView.info.freespace / 1GB) -lt 50) {throw "Move-ThinVM ERROR: Destination Datastore $Datastore has less than 50GB of free space. This script requires at least 50GB of free space for safety. Please free up space or use the VMWare Client to perform this Migration"} #Prepare VM Relocation Specificatoin $spec = New-Object VMware.Vim.VirtualMachineRelocateSpec $spec.datastore = $dsView.MoRef $spec.transform = "sparse" #Perform Migration $vmView.RelocateVM($spec, $null) } #Process }
combined_dataset/train/non-malicious/Robocopy Wrapper.ps1
Robocopy Wrapper.ps1
function Copy-Robocopy { param ( [Parameter(Position=0, Mandatory=$true)] [String] $Source, [Parameter(Position=1, Mandatory=$true)] [String] $Target, [Parameter(Position=2, Mandatory=$false)] [String[]] $Files = @("*.*"), [Parameter(Position=3, Mandatory=$false)] [String] $Options = "" ) # Result $Result = @{ "Params" = @{} "Timing" = @{} "Result" = @{} } # Define Log File $LogFile = $ENV:TEMP + "\\Robocopy." + (Get-Date -UFormat "%Y%m%d.%H%M%S") + "." + (Get-Random -Minimum 1000 -Maximum 9999) + ".log" # Remove Wrong Options $Options = $Options.Replace('/NJH', "") $Options = $Options.Replace('/NJS', "") # Start Process $Duration = Measure-Command { Start-Process -FilePath 'ROBOCOPY' -ArgumentList ('"' + $Source + '" "' + $Target + '" "' + [String]::Join('" "', $Files) + '" ' + $Options) -RedirectStandardOutput $LogFile -NoNewWindow -Wait } # Import Robocopy Log $Robocopy = Get-Content -Path $LogFile # Line Numbers $LineHeaderFirst = (0..($Robocopy.Count - 1) | Where-Object { $Robocopy[$_] -eq "-------------------------------------------------------------------------------" })[0] $LineHeaderLast = (0..($Robocopy.Count - 1) | Where-Object { $Robocopy[$_] -eq "------------------------------------------------------------------------------" })[0] $LineFooterFirst = (($Robocopy.Count - 1)..0 | Where-Object { $Robocopy[$_] -eq "------------------------------------------------------------------------------" })[0] $LineFooterLast = ($Robocopy.Count - 1) # Result Params $Result["Params"]["Source"] = ([String]($Robocopy[$LineHeaderFirst + 5].Split(":", 2)[1].Trim())) $Result["Params"]["Target"] = ([String]($Robocopy[$LineHeaderFirst + 6].Split(":", 2)[1].Trim())) $Result["Params"]["Files"] = ([String]::Join(", ", (($LineHeaderFirst + 8)..($LineHeaderLast - 4) | ForEach-Object { $Robocopy[$_].Split(":", 2)[-1].Trim() }))) $Result["Params"]["Options"] = ([String]($Robocopy[$LineHeaderLast - 2].Split(":", 2)[1].Trim())) # Result Timing $Result["Timing"]["Duration"] = ([String]($Duration)) $Result["Timing"]["Started"] = ([String](Get-Date -Date $Robocopy[$LineHeaderFirst + 4].Split(":", 2)[1].Trim())) $Result["Timing"]["Ended"] = ([String](Get-Date -Date $Robocopy[$LineFooterLast - 1].Split(":", 2)[1].Trim())) # Result Result for ($Line = ($LineFooterFirst + 3); $Line -le ($LineFooterFirst + 6); $Line++) { $Key = $Robocopy[$Line].Substring(02,07).Trim() $Result["Result"][$Key] = @{} for ($Col = 10; $Col -le 60; $Col += 10) { $Title = $Robocopy[$LineFooterFirst + 2].Substring($Col, 10).Trim() $Title = $Title.Substring(0,1).ToUpper() + $Title.Substring(1).ToLower() $Result["Result"][$Key][$Title] = $Robocopy[$Line].Substring($Col, 10).Trim() } } # Return return $Result }
combined_dataset/train/non-malicious/5a74e43a-a30a-486b-a5a6-349644cb654a.ps1
5a74e43a-a30a-486b-a5a6-349644cb654a.ps1
#You'll need admin perms on all the servers to run this... Write-Host "ComputerName in White, then Local Groups in Green, Local Groups' Members in White" #This feeds the script a list of server names (ServerList.txt, placed in the same directory) #for which I want the Local Groups and all those groups' Members. $x = Get-Content ServerList.txt # this feeds each servername, one by one, into the process... foreach ($j in $x) { #The server name becomes variable $strComputer $strComputer = "$j" #The Server name then becomes the variable $strComputer, and its name #is printed out in all CAPS $computer = [ADSI]("WinNT://" + $strComputer + ",computer") $g = $computer.name.ToString() $g.ToUpper(); " " #The local security groups on the Server is then found, #and fed to the array $a $group = $computer.psbase.children | where{$_.psbase.schemaclassname -eq "group"} $a = @() foreach ($member in $group.psbase.syncroot) {$a += $member.name } #Each Local Group Member is then printed (in white,and with a space) underneath its Group's name #(Group name printed in green) foreach ($i in $a) { $group =[ADSI]"WinNT://$j/$i" Write-Host "$i" -fore green $members = @($group.psbase.Invoke("Members")) $members | foreach { Write-Host " ",$_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)} } Write-host " " Write-host " " Write-host " " }
combined_dataset/train/non-malicious/ESXiMgmt module sample 3.ps1
ESXiMgmt module sample 3.ps1
####################################################################################################################### # File: ESXiMgmt_machines_poweroff_sample.ps1 # # Author: Alexander Petrovskiy # # Publisher: Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com # # Copyright: © 2011 Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com. All rights reserved. # # Prerequisites: The module was tested with Vmware ESXi 4.1 U1 on the server side and # # Vmware PowerCLI 4.1 U1 # # plink.exe 0.60.0.0 # # Usage: To load this module run the following instruction: # # Import-Module -Name ESXiMgmt -Force # # Please provide feedback in the SoftwareTestingUsingPowerShell.WordPress.Com blog. # ####################################################################################################################### param([string]$Server, [string]$User, [string]$Password, [string]$DatastoreName, [string]$MachinePrefix, [int]$OperationTimeout ) # USAGE: .\\ESXiMgmt_machines_poweroff_sample.ps1 192.168.1.1 root 123 datastore3 XPSP2 10 cls Set-StrictMode -Version Latest Import-Module ESXiMgmt -Force; Connect-ESXi -Server $Server -Port 443 ` -Protocol HTTPS -User $User -Password $Password ` -DatastoreName $DatastoreName; $VerbosePreference = [System.Management.Automation.ActionPreference]::Continue; $VMs = Get-VM * foreach($vm in $VMs) { if ($vm.Name -like "$($MachinePrefix)*" -and ` $vm.PowerState -eq 1) #PoweredOn { Write-Verbose "$($vm.Name) is stopping"; Stop-ESXiVM -Server $Server ` -User $User -Password $Password ` -Id (Get-ESXiVMId $vm); sleep -Seconds $OperationTimeout; } } Disconnect-ESXi # to restart virtual machines instead of shutdown them # simply call the ESXiMgmt_machines_poweron_sample.ps1 script: # USAGE: .\\ESXiMgmt_machines_poweron_sample.ps1 192.168.1.1 root 123 datastore3 host1ds3 XPSP2 300
combined_dataset/train/non-malicious/sample_58_72.ps1
sample_58_72.ps1
@{ GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiHmazz1gQ06K # unvXv+rGMEHONdPsUaRwD11+c7rHFaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBNd88v60ME/cMf1rqdBP4T3 # 9yMm5kc3mIDQApOzrnFZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAVfJ1ILiIhHa334FkEGyThAKw4Uxh4Ma9O6/FkNz2Gqc3x/tho9yTLI1Q # N/AneW+ULsb3H37YAKrBCJrDtzhz2OMgAjiZKA9Lifc4lwZAs1sd2Zf6/kDBKLed # pTWdMX4lcgqSjGRXDlXg2PHQZxSkL338yQqcHGqXp5UVN2tRNfmyrfUI0QsDztLe # aVV0pe/gQKEZDGT7lJrGUkuGhJF/sdBM6vk8GITG7zws6MkvNhWlrxVp3EUz5Cl/ # mHeYldjCgflhnT1JRIqFpkIBq9ycwvmLuVGswJ7oYfPv66Lq/eDCTKprx0nND3Nz # DInWgWetIXPB50DZuke+gahaHfC49aGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCzJOs/FZX9ZlLhlluLF1pb/dOVfZC5cEes0rrG4txjAwIGZkXwf3mV # GBMyMDI0MDYxMzAzMjE0My4yNTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hSuNDAiGA8yMDI0MDYxMjIzMzEw # MFoYDzIwMjQwNjEzMjMzMTAwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFK40 # AgEAMAcCAQACAhzxMAcCAQACAhONMAoCBQDqFf+0AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBABAuYguPMidY9IQ12NdIKL3WDNmh2a8R0r6YLsCfz60P4dn5 # 9cKQKDMFxcoe6vR8yhniFlgCP5ZoaOvQfveZCJtImb+kNevTS4+LKjbCXnX/Cxj8 # prEywCleY3qnhfE8WCZEEFWdIblwN62k43CJOkw8CqK6MxbXcIQaHMgaRwJ2eD4B # 5DBcRRewj7UNplZQE3BoYruC+Ox5upozY+z+x07TvYEZq9yzEDCnhStE+Fgft2uc # HFnTWSTCcj3FrWy89MO4x7/vg2zKl4CXu/zWJ/BPlMFqXxL9mp+DYrMNOjYcGDvs # gNm1NrAfLoFJWDf/PUKF9cOgdsK5fE/EpDhyy3UxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAZjVvWv0yZElvadKOjA2KJHD8fAdsXonk2zJiIwqdFNjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ # IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgMMw2VuPSoE7p6mVCdjxgFZzvQHCr # mI2TiclrRCVLYwkwDQYJKoZIhvcNAQELBQAEggIADFwXZAql+ynNwiuxwTihMb0e # GWcyujphB/wPYlO3CkCYkETYtzmronFPeNgM0FUam9GAYq7UqatQ/eaez2WqclXc # x8lSVmRGt2BVep1tcoNx5bGyF4lkVJC4BKU+3TumZVmIH0hX9TWPSx1ANnrsvWnJ # gcefVJDigLSLJIBcjlpBdVCgGt3Ke1oR7aiJzqTyLPBWrtioNvsBVsBTvtM8Dgob # EYTxQwkCZm3r2vKfB8jZu1Hu5nGrBka/xVZbzG9T4UcjXLSaZL2kOgyqGUl+rLSa # XWPXGBnyXYBhWwfDrYZI9LalHfWjbGDkX0jhs1uri60xfvF5o37uUnUSW4gilsiT # wWerU0wLwDIopt3LcqC7tmGQpcqjcDMojRSv6cgzPip4CcMynYPZawLaqxv48MJq # HyV4TVH1Ltj587BnrtO2oisrvUyAZMlBWOq1aAUXzju0468G25Ck0hS5mGQdO33C # 4gczgedIZI21Jft8806MTVE5JXD4V06ZFRNIzaQAay7Ww4sl5gWHrrhYph5v7mf6 # /I4O1R2mhRAKpeqqXu79Uv4hy7W7fezFCGonNvbcran4kPNcQLY/4WiaXnBo6ume # +K+IqQy3pSjkGqsbCY5+YrtC1dGngdFQeWNr6xeVO5OlhPbhgqNuisAz3WK0wd/N # k3WLKV7BMU1y9mVpvCo= # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_5.ps1
sample_49_5.ps1
# # Module manifest for module 'OCI.PSModules.Oce' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Oce.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '044c91ad-abeb-41a8-9bf6-cf7d46964003' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Oce Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oce.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOceInstance', 'Get-OCIOceInstancesList', 'Get-OCIOceWorkRequest', 'Get-OCIOceWorkRequestErrorsList', 'Get-OCIOceWorkRequestLogsList', 'Get-OCIOceWorkRequestsList', 'Move-OCIOceInstanceCompartment', 'New-OCIOceInstance', 'Remove-OCIOceInstance', 'Update-OCIOceInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oce' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_66_90.ps1
sample_66_90.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis API to register a new machine and thereby create a tracked resource in ARM .Description API to register a new machine and thereby create a tracked resource in ARM #> function Connect-AzConnectedMachine { [CmdletBinding()] param( [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Path')] [System.String] # The name of the resource group you want to add the machine to. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the subscription you want to add the machine to. ${SubscriptionId}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Body')] [System.String] # The location for the created ConnectedMachine. ${Location}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Path')] [System.String] # The name that will be used for this machine. The hostname is used by default. ${Name}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Alias('Session')] [ValidateNotNull()] [System.Management.Automation.Runspaces.PSSession[]] # When specified, the command that onboards machines to Azure will be run within each PSSession. NOTE: This only works on Windows for now. ${PSSession}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Models.ITrackedResourceTags]))] [System.Collections.Hashtable] # Resource tags. ${Tag}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) try { $Account = [Microsoft.Azure.Commands.Common.Authentication.Abstractions.AzureRmProfileProvider]::Instance.Profile.DefaultContext.Account $Env = [Microsoft.Azure.Commands.Common.Authentication.Abstractions.AzureEnvironment]::PublicEnvironments[[Microsoft.Azure.Commands.Common.Authentication.Abstractions.EnvironmentName]::AzureCloud] $TenantId = [Microsoft.Azure.Commands.Common.Authentication.Abstractions.AzureRmProfileProvider]::Instance.Profile.DefaultContext.Tenant.Id $PromptBehavior = [Microsoft.Azure.Commands.Common.Authentication.ShowDialog]::Never $Token = [Microsoft.Azure.Commands.Common.Authentication.AzureSession]::Instance.AuthenticationFactory.Authenticate($account, $env, $tenantId, $null, $promptBehavior, $null) $AccessToken = $Token.AccessToken } catch { throw 'Error retrieving access token. Are you logged in? (Run Connect-AzAccount)' } if (!$AccessToken) { throw 'Error retrieving access token. Are you logged in? (Run Connect-AzAccount)' } $azcmagentArgs = [System.Collections.Generic.List[string]]@( 'connect' '--access-token' $AccessToken '--tenant-id' $TenantId '--subscription-id' $SubscriptionId '--resource-group' $ResourceGroupName '--location' $Location ) if ($Name) { $azcmagentArgs.Add('--resource-name') $azcmagentArgs.Add($Name) } if ($Tag) { $azcmagentArgs.Add('--tags') # Build tag string $tagStrings = foreach ($key in $Tag.Keys) { $t = $key if ($Tag[$key] -and $Tag[$key].GetType() -eq [string]) { $t += "=$($Tag[$key])" } $t } $azcmagentArgs.Add([string]::Join(',', $tagStrings)) } $script = { if ($IsMacOS) { throw "Registration doesn't work on macOS. Only Linux and Windows are supported." } if ($IsLinux) { # Download the installation package Invoke-RestMethod -Uri https://aka.ms/azcmagent -OutFile ~/install_linux_azcmagent.sh -UseBasicParsing # Install the hybrid agent $installArgs = if ($Proxy) { '--proxy', $P.ToString() } else { @() } bash ~/install_linux_azcmagent.sh @installArgs | ForEach-Object { Write-Host $_ } # Set executable path $azcmagentPath = "azcmagent" } else { Invoke-RestMethod -Uri https://aka.ms/AzureConnectedMachineAgent -OutFile AzureConnectedMachineAgent.msi -UseBasicParsing # Install the package msiexec /i AzureConnectedMachineAgent.msi /l*v installationlog.txt /qn | ForEach-Object { Write-Host $_ } if ($Proxy) { [System.Environment]::SetEnvironmentVariable("https_proxy", $Proxy.ToString(), "Machine") } # Set executable path $azcmagentPath = "$env:ProgramFiles\AzureConnectedMachineAgent\azcmagent.exe" } # Run connect command if ($IsLinux) { sudo $azcmagentPath @args | ForEach-Object { Write-Host $_ } } else { & $azcmagentPath @args | ForEach-Object { Write-Host $_ } } if ($LASTEXITCODE -ne 0) { throw "azcmagent exited with a non-zero exit code: $LASTEXITCODE" } $showResult = if ($IsLinux) { sudo $azcmagentPath show } else { # Windows & $azcmagentPath show } # Combine the output into one string [string]::Join("`n", $showResult) } if ($PSSession) { $scriptWithUsings = { if ($IsLinux) { Write-Error "Linux PSSessions are not supported because PowerShell doesn't support sudo password prompts over PSSessions. (PowerShell issue #1527)" return } $Proxy = $using:Proxy $script = $using:script Invoke-Command -ScriptBlock ([scriptblock]::Create($script)) -ArgumentList $args } $showResult = Invoke-Command -ScriptBlock $scriptWithUsings -Session $PSSession -ArgumentList $azcmagentArgs } else { $showResult = & $script $azcmagentArgs } # Handle show result by getting the name and getting the machine object $showResult | ForEach-Object { # Get name of machine registered $selectStrResult = $_ | Select-String -Pattern "^Resource Name\s+: (?<resourceName>.*)\n" $Name = $selectStrResult.Matches.Groups | Where-Object Name -EQ resourceName | Select-Object -ExpandProperty Value # Return the ConnectedMachine object. Get-AzConnectedMachine -Name $Name -ResourceGroupName $ResourceGroupName -SubscriptionId $SubscriptionId } } # SIG # Begin signature block # MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAviGcSnDOVecYN # v6UEFSZZX/njqI30dP5bffsgAJKTlaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICXI # oS+cAqkbsjX64ZG3hDb/toRSHxt51jKxJVfVePh6MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAHbq20JXDe6rK/Vg7sCEgE10XgwRl1CiQ8vc4 # bBWO1FR0BkaIJU0rHwI95DEoD2H5Bd8RDk9LVazdSAGjH4GHnENOhSDQrj0blocw # wsW8WdYQ5qYihKAy/0A4HOdcbvz153ZsrvdkdZq2ZLB8ao+/xiPGkudoYsrIQTLC # Rai82rf2F+i76V0cLBzXmFn0FRCE8g4EZXn7+G0BPJ7UvvReR9hDBMebKZe5/qu3 # kleYiZG9Ur/Uv6TsLNBhe1hpxxoAiaGAUGIXIZzrtOJ8gD7Tu17f8Mdy2OpVYSlb # y8uL4FOsHVF8U/tsmK1c96yXNsf6+n2HqL9TrLAlUut+upfN0KGCFywwghcoBgor # BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBWFR66bWE4kmWU+LbrHGyrFJIhvpHKwPNr # 572LgXBofgIGZlPWmKseGBMyMDI0MDUyOTA1NDEyMS40ODZaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHenkie # lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB # 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU # IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo # KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn # vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 # RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 # OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS # qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 # G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ # 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy # k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK # IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu # y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X # EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi # D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S # QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY # huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 # 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg # Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r # rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg # 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH # doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy # 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOoA9/MwIhgPMjAyNDA1MjkwODQwMTlaGA8yMDI0MDUz # MDA4NDAxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6gD38wIBADAKAgEAAgIM # uAIB/zAHAgEAAgISjTAKAgUA6gJJcwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBAIEUqCR84pJJqoTCVd9uZNjk7+SK2bzodtyDoYMxv3ZZJi/nn7fGeogtCjR5 # +R6P+ko6e4Niq774YCDLDIewP26eu055sArtr0wHt/UKWIoWCSa9LUsvc5vrNQYB # nZURI0DRkLz/27nFQckYSzsEwTK3fBKs1DCsGzvChMLzojh0MYIEDTCCBAkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0A # AQAAAd4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQgaGI6iB+4CdVgQvQBUItTRlZk9MLIZUS+DVmX # 8dbEAWcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/m # C3MgrT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIGucVMt0tqgotrpNH0qI # ipz8e4uJs49SUZGgKgoC+kXxMA0GCSqGSIb3DQEBCwUABIICABWukE59j35DzDdw # Pbfvu3Eur4N7Dfmt5m8OoJD4+VSQIBYqWclb9W8Y0PdQZcTyVB/67tH3jpMISQLZ # QAY0CuAYFAEfrztHGWfz630OsFy2wvXtH+TLoLPKaSmrfTIxwWc27aVDmUwHvf2L # jFF+Az2USJlwqRsju244gCjSbLJGCuKVLaasNATzcKkmuPv4OnvoEvocVDtVWMAB # S0Gv6MKBbomp1+Cc6aYhrIFHY6a3c4B3RXZdN1asYEoXw4qaCbF74jrvtK+NqdpW # KpAO+nsZsX5cuyffB55uoOsN+Dwkcg7jGjGI7gD/TDnn3t5/ZwFARjqlT8dFex0s # 6sS3yftkJCsOXqvKTQ664CWRrEZH56bqg1vnrtF8zYTwhGR7U7kjQImn1bh1xlR1 # xL8oVf/Z7C4S4I0Yv7JJcZBV64Q+AwHp5IAtLmZhkaES3myz3rWUJbE1gBU3n2DU # Qc3HvKNXR8AySrLk5Rc6M5jqDVMC59Hngob9jRbuF4F+/IMVCffIxLhVj61Aox35 # 5rm5xOva8ls4zXNrfzywZPN3ZGa4X9S38GsT0wcBX9CsqAcdVJBg/aIIS+rdGgbq # abYwKbKmZwp3+cUSeI75Fi3G0GELm5XEr3HAAfFffTZ4wDNrAzZw4nYFsTn8kyHm # 6xI8g76QZGeyLOnNbOCPg9Uo0T4F # SIG # End signature block
combined_dataset/train/non-malicious/sample_41_5.ps1
sample_41_5.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2022 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope="function")] [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "", Scope="function")] Param() #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Get-IntelEthernetSetting { [CmdletBinding()] Param( [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory = $false, Position=0, ValueFromPipeline = $true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null, [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $DisplayName = '', [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $RegistryKeyword = '' ) Begin { $AdapterName = $Name $script:ErrorMessagesGet = @() $script:WarningMessagesGet = @() $FinalObject = @() GetIntelEthernetDevices @('icei*', 'i40ei*') if ($script:SupportedAdapters) { $script:MSNetAdapters = Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue } $script:MSNetAdvProperty = @(Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue) } Process { $Adapters = $Adapter $PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesGet) $AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesGet)) do { if (!(ValidateSettingParams $DisplayName $RegistryKeyword)) { break } foreach ($a in $AdapterNamesArray) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:WarningMessagesGet += $TmpStatusMsg } $FinalObject += GetAdapterSettings $a $DisplayName $RegistryKeyword } } while ($false) } End { $FinalObject | Sort-Object -Property 'DisplayName' foreach ($WarningMessage in $script:WarningMessagesGet) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesGet) { Write-Error $ErrorMessage } } } function ValidateSettingParams($DisplayName, $RegistryKeyword) { $result = $true if (-not [string]::IsNullOrEmpty($DisplayName) -and -not [string]::IsNullOrEmpty($RegistryKeyword)) { $script:ErrorMessagesGet += $Messages.InvalidParams $result = $false } return $result } # SIG # Begin signature block # MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAvC0HuIwgJYKI6 # Wrabiy8hSC7k79LdToDq4slv1BTRdqCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIIKCQTBdpraRCCdL8CZuiYaJ # OAa9VSX2ZccE36RD8ovLMA0GCSqGSIb3DQEBAQUABIIBgEUD3iPBQugWayIb5tgV # lKl6JXcMXh0s1RILk0TeYxOtnzEme/fbdRQvQdna5e7TIoxon8kPrsW7x6YsWG9q # BZiU68cwpjso+ID0OIOaB5bDI5GvZWznsEzTWj8MSkOXk0WnGkgMAvTRF7mUsAFQ # 8oSAkOxBUo64IV8qqnjYmkeCcHYNuS6JMrMzCPLFlfbxM8pfb06EnvDYM5ha917E # 2TvQwpl8qXduXjvNAz2sJBxoRE5wQZoHpQ59EAvD9OJoWwCbhizZDmzozOPNP536 # dcb1YHTt48a+V26pnhIU4QYmcmRZy6BUpsBui11tbjj8gYdTuUNC0oAYpL/5WCD7 # WQU46ehtPFalk+GCcSx3HcR02t8Td7OARHW0U0PR052eA1gq5WsA29ozYZgzg12+ # wLDvbhwNL+/Rvd4LEzgxWlOSfX5VVmFfh84pOtfpugpTlGZiNGa4cf//EzskLBPA # 6leh0efYUySSYxr9m3CwDWVFT4ZzWWBQKKJHyYBIfy1J2qGCE08wghNLBgorBgEE # AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD # BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIBW3nH3iGqIibbC24f0WRYPkYriHv8DnThXTRyC1Wgd2 # AhUA+JQENxg5j8VN8gSDKVe4orMTn20YDzIwMjQwMzE4MTgyMzUzWqBupGwwajEL # MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp # Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT # aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq # hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j # aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0 # ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw # NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE # CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD # DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk # is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB # IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc # rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN # 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7 # HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl # TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY # B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re # DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE # qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT # cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP # 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf # BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD # AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g # BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0 # aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j # cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr # BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v # U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov # L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD # Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf # +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66 # kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s # IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1 # RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T # jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01 # 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA # bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP # jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV # Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8 # KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2 # p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l # dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF # UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh # dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE # pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0 # RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray # cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv # f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi # nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1 # r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F # GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs # dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm # /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA # V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID # AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD # VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV # HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw # BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j # b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB # BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v # VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v # Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB # kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk # VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w # QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb # sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB # c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah # c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M # 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0 # PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x # uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx # py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu # tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC # R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y # ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT # QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC # AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF # MQ8XDTI0MDMxODE4MjM1M1owPwYJKoZIhvcNAQkEMTIEMFk7x7Wi6gxYv8Tg/xlT # +nAPs+J87Iso5NWEpLs3R2PHHQBIfnkzsnUYUGnm18iMRTCB7QYLKoZIhvcNAQkQ # Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB # VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV # U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp # Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF # AASCAgAXHS47lC5AslVEPDnPdCea52i+1jETBskbJ+GxEHMQe0R24ig/FGEDmHgW # 1bVwNrwLWTqSfZqwxsQdnIxGcGb4cYOOR+DLHU69mLL9reBQ4/Sits3pPEBH/cSp # hZ/3tc+feda4IiS5vjR/rHzAsHL5Q29wTlvxiOX+gz8E5B4AkNGlZ8uGIHYQ48sz # mf+Z5RvsRdkcBRLFeo8KYkGe+cDBBWYo87qLaIjauIpEyZ/BfdV9b/fxfXMOIr3y # ETF0nZ6TDt+Z3aUd3J3GLyGlKkVUkJfgrM8CMWbkxtH7OOGHeQlE+E3S5nGrF0HT # c/bv6jH2xX3fXkYoaNFEgOeD42GjEeTLsrv+ZAydIYP4QRjSXeBD8tVOkbUwlgEq # zx3yXRBxmTyorjTUTL3m+puNAKtDfOtxdnTsnHqIMhTyQFUW99RS0W3eSRY/bMSG # AywqzITiHwx9G/6hT9PP0dluDzIjBo30aoIXaMYqjfb9sUSnjsKrwCm4ulpMiYPY # PNxHaIN9nmGyaneZZD7abZUbFcZgSTKj2FBI551pmdEGtYWYpS6o3arjEe92o1ty # g5JtdeW9FyKTG6i1Omznsyb+V+cfeRiRUpzJ0CIN/xyoP6EL006RGMWc1w+YJm/X # 0/0n2nRHDS9yWKzwgwm6Vvl3bPVG2gGdY/o8WV20YvBxN9XObw== # SIG # End signature block
combined_dataset/train/non-malicious/Backup Cisco UCS FI.ps1
Backup Cisco UCS FI.ps1
<# .Synopsis Does a backup of a single UCS target. .Description Uses the UCS PowerTool cmdlet 'Backup-Ucs' and does all four types of UCS backup. Filenames include the UCS name, date/time stamp, and backup type. The backup directory is set by a variable in the script. If it doesn't exist the script will create. Since the backup files are XML I recommend enabling compression on the directory. .Parameter Ucs The UCS environment to backup. This can be either an IP address or the DNS name. .Parameter CredentialFile The location of the credential file to log on to the UCSM with. Defaults to the current directory. .Example Backup-mUcs.ps1 -Ucs ucspoc -CredentialPath C:\\Temp\\credentials.enc.xml .Notes NAME: Backup-mUcs.ps1 AUTHOR: Chris Monahan LASTEDIT: 10/2/2012 KEYWORDS: UCS, PowerTool .Link http://batchlife.wordpress.com/2012/11/14/powershell-script-to-backup/ Requires -Powershell Version 2.0 Requires -Cisco PowerTool Version 0.99 Requires -Hal Rottenberg's PsCredential functions: http://poshcode.org/501 & http://halr9000.com/article/531 #> <# Instructions for one time setup are at the bottom of the script #> param($Ucs=$null, $CredentialFile=$null) if ($Ucs -eq $null) { Write-Host "Enter the name/address of the UCS you're backing up" -BackgroundColor DarkYellow -ForegroundColor DarkRed; break } if ($CredentialFile -eq $null) { Write-Host "Enter path to the credential file." -BackgroundColor DarkYellow -ForegroundColor DarkRed; break } #----------------------------- # Prep #----------------------------- #Static parameters Set-Variable -Name ScriptDir -Value "\\\\server\\share" -Scope Local Set-Variable -Name BackupPath -Value "C:\\Backups\\UCSM_Configuration_Backups" -Scope Local Set-Variable -Name BackupTypes -Value ('config-system','config-logical','config-all','full-state') Write-Verbose "`nStatic parameters`n-----------------`nScriptDir = $($ScriptDir)`nBackupPath = $($BackupPath)`nBackupTypes = $($BackupTypes)`n" $errmailTo = "name@address" $errmailFrom = "name@address" $errmailSMTP = "emailserver" If ( !(Test-Path $BackupPath) ) { mkdir $BackupPath } . $ScriptDir\\Hals_PSCredentials.ps1 $UcsCred = Import-PsCredential -Path $CredentialFile #----------------------------- # Start doing the real work. #----------------------------- # Connect to the UCS Connect-Ucs -Name $Ucs -Credential $UcsCred -ErrorVariable errConnectingUcs| select Ucs,UserName,Version if ($errConnectingUcs -ne $null) { $errmailBody = @() $errmailBody += "$(Get-Now) - Error connecting to UCS`n`n" $errmailBody += $errConnectingUcs Send-MailMessage -From $errmailFrom -To $errmailTo -Subject "Backup-mUcs Error-- Failed connecting to $($Ucs)" -Body ($errmailBody | Out-String) -SmtpServer $errmailSMTP break } # Get one of each type of UCS backup. ForEach ($type in $backuptypes) { Backup-Ucs -Type $type -PreservePooledValues -PathPattern ($BackupPath + '\\${ucs}_${yyyy}${MM}${dd}_${HH}${mm}_' + $type + '.xml') -ErrorVariable errBackupUcs if ($errBackupUcs -ne $null) { $errmailBody = @() $errmailBody += "$(Get-Now) - Error running backup of type $($type)`n`n" $errmailBody += $error[0] Send-MailMessage -From $errmailFrom -To $errmailTo -Subject "Backup-mUcs Error-- On $($Ucs) backup of type $($type) failed" -Body ($errmailBody | Out-String) -SmtpServer $errmailSMTP } } # Don't leave a stale session on the UCS Disconnect-Ucs <# One time setup 1- Copy script to SCRIPTHOST server for the datacenter you're working in. $> copy \\\\server\\share\\Hals_PSCredentials.ps1 C:\\Scripts 2- Log on locally to the SCRIPTHOST with the service account the script will run under in Task Scheduler. 3- If necessary install the Cisco PowerTool module and configure it to load automatically in the PowerShell profile. a- The PowerTool module can be copied from \\\\server\\share\\Modules to the same directory on the local scripthost. b- The PowerShell profile may not exist yet. If it doesn't create file in the path specified by the "$profile" variable. $> notepad $profile 1- Add the line "Import-Module C:\\Ops\\Modules\\CiscoUCSPowerTool\\CiscoUcsPS.psd1" 2- Save and exit the file 4- Create the credential file containing the UCS login credentials to use in the script. The credential file can only opened by the Windows user account that created it. That's why you have to log on with the Windows service account used to run the task in Task Scheduler. The Windows credentials encrypt the file, and inside the file are the UCS login username and password. You can store the credential files in any directory you want. The directory in the example is for demonstration. $> mkdir C:\\Scripts\\CredentialFiles $> . \\\\server\\share\\Hals_PSCredentials.ps1 $> $creds = Get-Credential # Username/password to login to the UCS with. $> Export-PSCredential -Credential $creds -Path C:\\Scripts\\CredentialFiles\\somename.enc.xml 5- Copy \\\\vmscripthost201\\C$\\Scripts\\Run_Backup-mUcs.ps1 to the vmscripthost you're setting up. a- This is the wrapper script that will be put into Task Scheduler. It will call Backup-mUcs.ps1 for each UCS environment to be backed up. b- Edit the script so that it has the correct UCS DNS name(s) or IP address(es) for the datacenter you're configuring this for. 6- Test the script interactively first by running Backup-mUcs.ps1 and then by running Run_Backup-mUcs.ps1. 7- Add Run_Backup-mUcs.ps1 into Task Scheduler and test. a- For now copy the Task Scheduler settings for the job from what's in the \\\\server Task Scheduler. May put the full instructions in later. 8- Verify the scripthost server is getting backed up somehow. Preferably as a normal OS level full backup by the backup group. The size of the backups for our UCS's so far for four UCS environments is 12MB a day. #>
combined_dataset/train/non-malicious/1201.ps1
1201.ps1
if( Test-Path -Path 'env:APPVEYOR' ) { Write-Warning -Message 'Can''t test Initialize-Lcm under AppVeyor.' return } $originalLcm = $null $tempDir = $null $privateKeyPath = Join-Path -Path $PSScriptRoot -ChildPath '..\Cryptography\CarbonTestPrivateKey.pfx' -Resolve $publicKeyPath = Join-Path -Path $PSScriptRoot -ChildPath '..\Cryptography\CarbonTestPublicKey.cer' -Resolve $publicKey = $null $certPath = $null $userName = $CarbonTestUser.UserName $password = 'Aa1Bb2Cc3Dd4' function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) $tempDir = New-TempDirectory -Prefix $PSCommandPath } function Stop-TestFixture { Uninstall-Directory -Path $tempDir -Recurse } function Start-Test { $originalLcm = Get-DscLocalConfigurationManager Uninstall-TestLcmCertificate } function Stop-Test { configuration SetPullMode { Set-StrictMode -Off $customData = @{ } foreach( $item in $originalLcm.DownloadManagerCustomData ) { $customData[$item.key] = $item.value } node 'localhost' { LocalConfigurationManager { AllowModuleOverwrite = $originalLcm.AllowModuleOverwrite; ConfigurationMode = $originalLcm.ConfigurationMode; ConfigurationID = $originalLcm.ConfigurationID; ConfigurationModeFrequencyMins = $originalLcm.ConfigurationModeFrequencyMins; CertificateID = $originalLcm.CertificateID; DownloadManagerName = $originalLcm.DownloadManagerName; DownloadManagerCustomData = $customData RefreshMode = $originalLcm.RefreshMode; RefreshFrequencyMins = $originalLcm.RefreshFrequencyMins; RebootNodeIfNeeded = $originalLcm.RebootNodeIfNeeded; } } } $outputPath = Join-Path -Path $tempDir -ChildPath 'originalLcm' & SetPullMode -OutputPath $outputPath Set-DscLocalConfigurationManager -Path $outputPath Uninstall-TestLcmCertificate } function Uninstall-TestLcmCertificate { $script:publicKey = Get-Certificate -Path $publicKeyPath Assert-NotNull $publicKey $script:certPath = Join-Path -Path 'cert:\LocalMachine\My' -ChildPath $publicKey.Thumbprint if( (Test-Path -Path $certPath -PathType Leaf) ) { Uninstall-Certificate -Thumbprint $publicKey.Thumbprint -StoreLocation LocalMachine -StoreName My } } function Test-ShouldConfigurePushMode { $lcm = Get-DscLocalConfigurationManager $rebootIfNeeded = -not $lcm.RebootNodeIfNeeded $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath -RebootIfNeeded Assert-NoError Assert-NotNull $lcm Assert-Equal $lcm.CertificateID $publicKey.Thumbprint Assert-True $lcm.RebootNodeIfNeeded Assert-Equal 'Push' $lcm.RefreshMode Assert-True (Test-Path -Path $certPath -PathType Leaf) } function Test-ShouldPreserveCertificateIDWhenCertFileNotGiven { $lcm = Get-DscLocalConfigurationManager $rebootIfNeeded = -not $lcm.RebootNodeIfNeeded $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertificateID 'fubar' -CertFile $privateKeyPath -RebootIfNeeded Assert-NoError Assert-Equal $publicKey.Thumbprint $lcm.CertificateID $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertificateID $publicKey.Thumbprint -RebootIfNeeded Assert-Equal $publicKey.Thumbprint $lcm.CertificateID } function Test-ShouldValidateCertFilePath { $originalLcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile 'C:\jdskfjsdflkfjksdlf.pfx' -ErrorAction SilentlyContinue Assert-Error -Last -Regex 'not found' Assert-Null $lcm Assert-Equal $originalLcm.CertificateID (Get-DscLocalConfigurationManager).CertificateID } function Test-ShouldHandleFileThatIsNotACertificate { $originalLcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $PSCommandPath -ErrorAction SilentlyContinue Assert-Error -Last -Regex 'Failed to create X509Certificate2 object' Assert-Null $lcm Assert-Equal $originalLcm.CertificateID (Get-DscLocalConfigurationManager).CertificateID } function Test-ShouldHandleRelativeCertFilePath { Push-Location -Path $PSScriptRoot try { $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile (Resolve-Path -Path $privateKeyPath -Relative) Assert-NoError Assert-NotNull $lcm Assert-Equal $publicKey.Thumbprint $lcm.CertificateID } finally { Pop-Location } } function Test-ShouldValidateCertHasPrivateKey { $originalLcm = Get-DscLocalConfigurationManager $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $publicKeyPath -ErrorAction SilentlyContinue Assert-Error -Last -Regex 'does not have a private key' Assert-Null $lcm Assert-Equal $originalLcm.CertificateID (Get-DscLocalConfigurationManager).CertificateID } function Test-ShouldClearUnprovidedPushValues { $originalLcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath -RebootIfNeeded $lcm = Initialize-Lcm -Push -ComputerName 'localhost' Assert-NoError Assert-NotNull $lcm Assert-Null $lcm.CertificateID Assert-False $lcm.RebootNodeIfNeeded } function Test-ShouldValidateComputerName { $lcm = Initialize-Lcm -Push -ComputerName 'fubar' -ErrorAction SilentlyContinue Assert-Error -Last -Regex 'not found or is unreachable' Assert-Null $lcm } function Test-ShouldUploadCertificateWithSecureStringAndPlaintextPasswords { $securePrivateKeyPath = Join-Path -Path $PSScriptRoot -ChildPath '..\Cryptography\CarbonTestPrivateKey2.pfx' $securePrivateKeyPasswod = 'fubar' $securePrivateKeySecurePassword = ConvertTo-SecureString -String $securePrivateKeyPasswod -AsPlainText -Force $securePrivateKey = Get-Certificate -Path $securePrivateKeyPath -Password $securePrivateKeyPasswod Assert-NotNull $securePrivateKey Uninstall-Certificate -Thumbprint $securePrivateKey.Thumbprint -StoreLocation LocalMachine -StoreName My $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $securePrivateKeyPath -CertPassword $securePrivateKeyPasswod Assert-NoError $lcm $secureCertPath = Join-Path -Path 'cert:\LocalMachine\My' -ChildPath $securePrivateKey.Thumbprint Assert-True (Test-Path -Path $secureCertPath -PathType Leaf) Assert-Equal $securePrivateKey.Thumbprint $lcm.CertificateID Uninstall-Certificate -Thumbprint $securePrivateKey.Thumbprint -StoreLocation LocalMachine -StoreName My $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $securePrivateKeyPath -CertPassword $securePrivateKeySecurePassword Assert-NoError $lcm Assert-True (Test-Path -Path $secureCertPath -PathType Leaf) Assert-Equal $securePrivateKey.Thumbprint $lcm.CertificateID } function Test-ShouldSupportWhatIf { $lcm = Initialize-Lcm -Push -ComputerName 'localhost' $lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath -WhatIf Assert-NotNull $lcm Assert-Null $lcm.CertificateID Assert-False (Test-Path -Path $certPath -PathType Leaf) } function Test-ShouldConfigureFileDownloadManager { $Global:Error.Clear() $configID = [Guid]::NewGuid() $lcm = Initialize-Lcm -SourcePath $PSScriptRoot ` -ConfigurationID $configID ` -ComputerName 'localhost' ` -AllowModuleOverwrite ` -CertFile $privateKeyPath ` -ConfigurationMode ApplyOnly ` -RebootIfNeeded ` -RefreshIntervalMinutes 35 ` -ConfigurationFrequency 3 ` -LcmCredential $CarbonTestUser ` -ErrorAction SilentlyContinue if( [Environment]::OSVersion.Version.Major -ge 10 ) { Assert-Error ('can''t configure\b.*\bmanager') return } Assert-NoError Assert-NotNull $lcm Assert-Equal $configID $lcm.ConfigurationID Assert-True $lcm.AllowModuleOverwrite Assert-True $lcm.RebootNodeIfNeeded Assert-Equal 'ApplyOnly' $lcm.ConfigurationMode Assert-Equal 35 $lcm.RefreshFrequencyMins Assert-Equal 105 $lcm.ConfigurationModeFrequencyMins Assert-Equal 'DscFileDownloadManager' $lcm.DownloadManagerName Assert-Equal $PSScriptRoot $lcm.DownloadManagerCustomData[0].value Assert-Equal $username $lcm.Credential.UserName Assert-Equal $publicKey.Thumbprint $lcm.CertificateID Assert-Equal 'Pull' $lcm.RefreshMode $configID = [Guid]::NewGuid().ToString() $lcm = Initialize-Lcm -SourcePath $env:TEMP -ConfigurationID $configID -ConfigurationMode ApplyAndMonitor -ComputerName 'localhost' Assert-NoError Assert-NotNull $lcm Assert-Equal $configID $lcm.ConfigurationID Assert-False $lcm.AllowModuleOverwrite Assert-False $lcm.RebootNodeIfNeeded Assert-Equal 'ApplyAndMonitor' $lcm.ConfigurationMode Assert-Equal 30 $lcm.RefreshFrequencyMins Assert-Equal 30 $lcm.ConfigurationModeFrequencyMins Assert-Equal 'DscFileDownloadManager' $lcm.DownloadManagerName Assert-Equal $env:TEMP $lcm.DownloadManagerCustomData[0].value Assert-Null $lcm.CertificateID Assert-Null $lcm.Credential Assert-Equal 'Pull' $lcm.RefreshMode } function Test-ShouldConfigureWebDownloadManager { $Global:Error.Clear() $configID = [Guid]::NewGuid() $lcm = Initialize-Lcm -ServerUrl 'http://localhost:8976' ` -AllowUnsecureConnection ` -ConfigurationID $configID ` -ComputerName 'localhost' ` -AllowModuleOverwrite ` -CertFile $privateKeyPath ` -ConfigurationMode ApplyOnly ` -RebootIfNeeded ` -RefreshIntervalMinutes 40 ` -ConfigurationFrequency 3 ` -LcmCredential $CarbonTestUser ` -ErrorAction SilentlyContinue if( [Environment]::OSVersion.Version.Major -ge 10 ) { Assert-Error ('can''t configure\b.*\bmanager') return } Assert-NoError Assert-NotNull $lcm Assert-Equal $configID $lcm.ConfigurationID Assert-True $lcm.AllowModuleOverwrite Assert-True $lcm.RebootNodeIfNeeded Assert-Equal 'ApplyOnly' $lcm.ConfigurationMode Assert-Equal 40 $lcm.RefreshFrequencyMins Assert-Equal 120 $lcm.ConfigurationModeFrequencyMins Assert-Equal 'WebDownloadManager' $lcm.DownloadManagerName Assert-Equal 'http://localhost:8976' $lcm.DownloadManagerCustomData[0].value Assert-Equal 'True' $lcm.DownloadManagerCustomData[1].value Assert-Equal $username $lcm.Credential.UserName Assert-Equal $publicKey.Thumbprint $lcm.CertificateID Assert-Equal 'Pull' $lcm.RefreshMode $configID = [Guid]::NewGuid().ToString() $lcm = Initialize-Lcm -ServerUrl 'https://localhost:6798' -ConfigurationID $configID -ConfigurationMode ApplyAndMonitor -ComputerName 'localhost' Assert-NoError Assert-NotNull $lcm Assert-Equal $configID $lcm.ConfigurationID Assert-False $lcm.AllowModuleOverwrite Assert-False $lcm.RebootNodeIfNeeded Assert-Equal 'ApplyAndMonitor' $lcm.ConfigurationMode Assert-Equal 30 $lcm.RefreshFrequencyMins Assert-Equal 30 $lcm.ConfigurationModeFrequencyMins Assert-Equal 'WebDownloadManager' $lcm.DownloadManagerName Assert-Equal 'https://localhost:6798' $lcm.DownloadManagerCustomData[0].value Assert-Equal 'False' $lcm.DownloadManagerCustomData[1].value Assert-Null $lcm.Credential Assert-Null $lcm.CertificateID Assert-Equal 'Pull' $lcm.RefreshMode } if( [Environment]::OSVersion.Version.Major -lt 10 ) { function Test-ShouldClearPullValuesWhenSwitchingToPush { $configID = [Guid]::NewGuid() $lcm = Initialize-Lcm -SourcePath $PSScriptRoot ` -ConfigurationID $configID ` -ComputerName 'localhost' ` -AllowModuleOverwrite ` -CertFile $privateKeyPath ` -ConfigurationMode ApplyOnly ` -RebootIfNeeded ` -RefreshIntervalMinutes 45 ` -ConfigurationFrequency 3 ` -LcmCredential $CarbonTestUser Assert-NoError Assert-NotNull $lcm $lcm = Initialize-Lcm -Push -ComputerName 'localhost' Assert-NoError Assert-NotNull $lcm Assert-Null $lcm.ConfigurationID Assert-Equal 'False' $lcm.AllowModuleOverwrite Assert-Equal 'False' $lcm.RebootNodeIfNeeded Assert-Equal 'ApplyAndMonitor' $lcm.ConfigurationMode Assert-NotEqual (45 * 3) $lcm.RefreshFrequencyMins Assert-NotEqual 45 $lcm.ConfigurationModeFrequencyMins Assert-Null $lcm.DownloadManagerName Assert-Null $lcm.DownloadManagerCustomData Assert-Null $lcm.Credential Assert-Null $lcm.CertificateID Assert-Equal 'Push' $lcm.RefreshMode } }
combined_dataset/train/non-malicious/VMWare Quick Migration.ps1
VMWare Quick Migration.ps1
######################################### #Name: VMWare Quick Migration Function #Author: Justin Grote <jgrote NOSPAMAT enpointe DOT com> #Credit: Inspired by Mike DiPetrillo's Quick Migration Script: http://www.mikedipetrillo.com/mikedvirtualization/2008/10/quick-migration-for-vmware-the-power-of-powershell.html #Version: 0.1 #Last Revised: 31 July 2009 # #Description: Performs the fucntional equivalent of a Hyper-V Quick Migration by suspending a VM, # moving it to a new host, and resuming it. This does not require vMotion licensing. # it works by providing required VM objects via the pipeline or the second argument, # and specifying the Destination host in the first argument. # The commeand accepts both text strings and VMHost objects for the VMHost Parameter # #Prerequisites: # Powershell v1 # VMWare PowerCLI 4.0 (May work with earlier version but not tested) # #Instructions to Install: Save this script and import into your session with, for example, . C:\\temp\\quickmigrate.ps1 # You can also include it in your PowerCLI profile to have it automatically included. #Command Usage: get-vm MyTestVM | Quick-MigrateVM "MyTestHost2" ######################################### function QuickMigrate-VM { PARAM( $NewVMHost = "" , [VMware.VimAutomation.Client20.VirtualMachineImpl]$VMsToMigrate = $null ) BEGIN { if (!$NewVMHost){ Write-Error "No Destination VMHost Specified. You must specify a host to migrate to. `n Example: Get-VM `"Test`" | QuickMigrate-VM `"Host1`"" break } elseif ($VMsToMigrate) { Write-Output $InputObject | &($MyInvocation.InvocationName) -NewVMHost $newVMHost } else { #If NewVMHost was provided as a String, convert it into a VMHost Object. if ($NewVMHost.GetType().Name -eq "String") { set-variable -name destinationVMHost -value (get-vmhost $NewVMHost) -scope 1 } #Make sure that we have a VMHost object to work with. if (! $destinationVMHost -or (! $destinationVMHost.GetType().Name -eq "VMHostImpl")) { write-error "Destination VM Host was not found or you provided the wrong object type. Please provide a VMHostImpl object or specify the fully qualified name of a VM Host" break } write-host -fore white "===Begin Quick Migration===" } } PROCESS { $step = 0 $skip = $false #In the Event of an error, output the error, and skip the rest of the current item. #This is a workaround for the fact that "continue" doesn't work in a function process loop. trap { write-host -fore yellow "`tSKIPPED: "$_.Exception.Message set-variable -name skip -value ($true) -scope 1 continue } $vmToMigrate = $_ ### Validation Checks if($_ -is [VMware.VimAutomation.Client20.VirtualMachineImpl]) { write-host -fore white "Quick Migrating $($vmToMigrate.Name) to $NewVMHost..." } else { throw "Object Passed was not a Virtual Machine object. Object must be of type VMware.VimAutomation.Client20.VirtualMachineImpl." } # Check for connected devices if (! $skip -and (get-cddrive $vmToMigrate).ConnectionState.Connected -ieq "TRUE") { throw "Connected CD Drive. Please disconnect and try again." } if (! $skip -and (get-floppydrive $vmToMigrate).ConnectionState.Connected -ieq "TRUE") { throw "Connected Floppy Drive. Please disconnect and try again." } # Make sure the current VM Host and the Destination Host are different. $sourceVMHost = get-vmhost -vm $vmToMigrate if (! $skip -and ($sourceVMHost.Name -eq $destinationVMHost.Name)) { throw "Source and Destination Hosts are the same." } ###Validation Complete, begin Migration if (! $skip) { $step++ write-host -fore cyan "`t$($step. Suspending" $vmToMigrate.Name"..." $suspend = Suspend-VM -VM $vmToMigrate -confirm:$false } if (! $skip) { $step++ write-host -fore cyan "`t($step). Moving" $vmToMigrate.Name "to" $destinationVMHost.Name"..." $migrate = Get-VM $vmToMigrate | Move-VM -Destination $destinationVMHost } if (! $skip) { $step++ write-host -fore cyan "`t($step). Resuming" $vmToMigrate.Name"..." $resume = Start-VM -VM $vmToMigrate } write-host -fore green "`tCOMPLETED" } END { write-host -fore white "===END Quick Migration===" } }
combined_dataset/train/non-malicious/596.ps1
596.ps1
function Run-SQLServerAgentJob{ [CmdletBinding()] param( [Parameter(Mandatory = $true)] [String] $JobName, [Parameter(Mandatory = $false)] [String] $Hostname = $env:COMPUTERNAME, [Parameter(Mandatory=$false)] [ScriptBlock] $LogScriptBlock = {Write-Host $Message} ) [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.Smo") | Out-Null [Microsoft.SqlServer.Management.Smo.Server]$SqlServer = New-Object Microsoft.SqlServer.Management.Smo.Server $HostName if(-not $SqlServer.Urn){ throw "The hostname provided is not a valid SQL Server instance. Did you mistype the alias or forget to add the instance name?" } $Job = $SqlServer.JobServer.Jobs | where{ $_.Name -eq $JobName } if(-not $Job){ throw "No such job on the server."; } Write-Host "Executing job: $JobName"; $Job.Start(); }
combined_dataset/train/non-malicious/sample_7_45.ps1
sample_7_45.ps1
# # Module manifest for module 'OCI.PSModules.Onesubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Onesubscription.dll' # Version number of this module. ModuleVersion = '92.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '22bf5ba6-749f-401c-8b99-0cf5afbd2958' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Onesubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Onesubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOnesubscriptionAggregatedComputedUsagesList', 'Get-OCIOnesubscriptionBillingSchedulesList', 'Get-OCIOnesubscriptionCommitment', 'Get-OCIOnesubscriptionCommitmentsList', 'Get-OCIOnesubscriptionComputedUsage', 'Get-OCIOnesubscriptionComputedUsagesList', 'Get-OCIOnesubscriptionInvoicelineComputedUsagesList', 'Get-OCIOnesubscriptionInvoicesList', 'Get-OCIOnesubscriptionOrganizationSubscriptionsList', 'Get-OCIOnesubscriptionRateCardsList', 'Get-OCIOnesubscriptionSubscribedService', 'Get-OCIOnesubscriptionSubscribedServicesList', 'Get-OCIOnesubscriptionSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Onesubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1523.ps1
1523.ps1
function Assert-GreaterThan { [CmdletBinding()] param( [Parameter(Position=0)] [object] $InputObject, [Parameter(Position=1)] [object] $LowerBound, [Parameter(Position=2)] [string] $Message ) Set-StrictMode -Version 'Latest' if( -not ($InputObject -gt $LowerBound ) ) { Fail "'$InputObject' is not greater than '$LowerBound': $message" } }
combined_dataset/train/non-malicious/sample_28_97.ps1
sample_28_97.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis List the available operations supported by the Microsoft.EventGrid resource provider. .Description List the available operations supported by the Microsoft.EventGrid resource provider. .Example {{ Add code here }} .Example {{ Add code here }} .Outputs Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.IOperation .Link https://learn.microsoft.com/powershell/module/az.eventgrid/get-azeventgridoperation #> function Get-AzEventGridOperation { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.IOperation])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] param( [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ List = 'Az.EventGrid.private\Get-AzEventGridOperation_List'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # SIG # Begin signature block # MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBRHs6SUZUubli+ # zKJVUFugVbNqYtbADlTgHfLfekV1a6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILo6GLnKGK1NvuAjvKJli9lY # 1/UelGi0ZAN3EYdyF/YXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAkNqzc0s0Mv984S/37jPrKWQ+Vg/r3dybjFCWeZbtvP/byc5wVCqlt8c # 1o4Z8O8a60NU4z9SAzJ03m7V4CDJ3tN9SRV8netns3qrCFeikXRyJdNoFqoxEdzd # jVDzSwUtw5umAJTm2/t6NFnK9Myelj3dN5c72IPGG0eHBbq/8UWTl6J86VZNKkPi # rC8iXa7sz/UAA5AQUGVrCFuIabYop+hK1FiFbtCcU/D0vihL3o7p+UhDFFc7QEBL # wmvOLtDJwCpPsScey5P39fqo+P301nUcCFkbWOEBUxCw9YF4cqqeWLFAgwsajQvO # WBXIyob2t/p72LMkriAQhycig9/oB6GCFygwghckBgorBgEEAYI3AwMBMYIXFDCC # FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCKjAZgMl/lEuFtQkn3UOJatxz5bCI7vrODczbwF1i4+AIGZjOrur94 # GBIyMDI0MDUxNjA2NDIxMy4zOFowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # ODZERi00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAd1dVx2V1K2qGwABAAAB3TANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw # MTIxOTA3MDlaFw0yNTAxMTAxOTA3MDlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJC # Qy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqE4DlETqLnecdREfiWd8oun7 # 0m+Km5O1y1qKsLExRKs9LLkJYrYO2uJA/5PnYdds3aDsCS1DWlBltMMYXMrp3Te9 # hg2sI+4kr49Gw/YU9UOMFfLmastEXMgcctqIBqhsTm8Um6jFnRlZ0owKzxpyOEdS # Z9pj7v38JHu434Hj7GMmrC92lT+anSYCrd5qvIf4Aqa/qWStA3zOCtxsKAfCyq++ # pPqUQWpimLu4qfswBhtJ4t7Skx1q1XkRbo1Wdcxg5NEq4Y9/J8Ep1KG5qUujzyQb # upraZsDmXvv5fTokB6wySjJivj/0KAMWMdSlwdI4O6OUUEoyLXrzNF0t6t2lbRsF # f0QO7HbMEwxoQrw3LFrAIS4Crv77uS0UBuXeFQq27NgLUVRm5SXYGrpTXtLgIqyp # HeK0tP2o1xvakAniOsgN2WXlOCip5/mCm/5hy8EzzfhtcU3DK13e6MMPbg/0N3zF # 9Um+6aOwFBCQrlP+rLcetAny53WcdK+0VWLlJr+5sa5gSlLyAXoYNY3n8pu94WR2 # yhNUg+jymRaGM+zRDucDn64HFAHjOWMSMrPlZbsEDjCmYWbbh+EGZGNXg1un6fvx # yACO8NJ9OUDoNgFy/aTHUkfZ0iFpGdJ45d49PqEwXQiXn3wsy7SvDflWJRZwBCRQ # 1RPFGeoYXHPnD5m6wwMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRuovW2jI9R2kXL # IdIMpaPQjiXD8TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEALlTZsg0uBcgdZsxy # pW5/2ORRP8rzPIsG+7mHwmuphHbP95o7bKjU6hz1KHK/Ft70ZkO7uSRTPFLInUhm # SxlnDoUOrrJk1Pc8SMASdESlEEvxL6ZteD47hUtLQtKZvxchmIuxqpnR8MRy/cd4 # D7/L+oqcJBaReCGloQzAYxDNGSEbBwZ1evXMalDsdPG9+7nvEXFlfUyQqdYUQ0nq # 6t37i15SBePSeAg7H/+Xdcwrce3xPb7O8Yk0AX7n/moGTuevTv3MgJsVe/G2J003 # l6hd1b72sAiRL5QYPX0Bl0Gu23p1n450Cq4GIORhDmRV9QwpLfXIdA4aCYXG4I7N # OlYdqWuql0iWWzLwo2yPlT2w42JYB3082XIQcdtBkOaL38E2U5jJO3Rh6EtsOi+Z # lQ1rOTv0538D3XuaoJ1OqsTHAEZQ9sw/7+91hSpomym6kGdS2M5//voMCFXLx797 # rNH3w+SmWaWI7ZusvdDesPr5kJV2sYz1GbqFQMEGS9iH5iOYZ1xDkcHpZP1F5zz6 # oMeZuEuFfhl1pqt3n85d4tuDHZ/svhBBCPcqCqOoM5YidWE0TWBi1NYsd7jzzZ3+ # Tsu6LQrWDwRmsoPuZo6uwkso8qV6Bx4n0UKpjWwNQpSFFrQQdRb5mQouWiEqtLsX # CN2sg1aQ8GBtDOcKN0TabjtCNNswggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2 # REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQA2I0cZZds1oM/GfKINsQ5yJKMWEKCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6e/1MTAiGA8yMDI0MDUxNjExMDAwMVoYDzIwMjQwNTE3MTEwMDAxWjB0MDoGCisG # AQQBhFkKBAExLDAqMAoCBQDp7/UxAgEAMAcCAQACAg1SMAcCAQACAhKrMAoCBQDp # 8UaxAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAQsMRAONVITufCmmSZjnw # jC6Z0K5HH+bL/tumfGmFgybZ/z5fwTwzUrk/27d9nlkxq0Yp3Pk2x26i8cZYizPV # dF53XxemeViEF6kNhi2Oea419DRw3LA5fsYJG/qFNZYXUIvMtJw/tiTILIJppKBQ # OgdpF/JPXaWLmrIW6csgF80xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T # dGFtcCBQQ0EgMjAxMAITMwAAAd1dVx2V1K2qGwABAAAB3TANBglghkgBZQMEAgEF # AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi # BCDfZSxcrS6+2XTQrexvvXdtt0DNdZrBczLZ4Jxq00BcsjCB+gYLKoZIhvcNAQkQ # Ai8xgeowgecwgeQwgb0EIGH/Di2aZaxPeJmce0fRWTftQI3TaVHFj5GI43rAMWNm # MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcd # ldStqhsAAQAAAd0wIgQgCt9IYpRHgxbrBBuklb2PUHAuxJsw7YIVBMm0gRczAvgw # DQYJKoZIhvcNAQELBQAEggIAgPh0okQ6lyazpHvzQBjHvAocu6eWhc/OLiJOVpmx # R9hOjthnZLMc4Qe5i3JFnIVTRXO9Nqxc7kLxEMSgHEUdhAhmquQzlCViRqEQ3DF4 # ZeCXG4eTCLV6yDMWE6G8FeWuYVKz9utel/W5HG66QkRm383pcjZH8uwNNHziU0cW # zU06I8Lr6RXzCZRGct4s1FcAZMsMXYfSXggFf6gq3LgjYTKrmvx6jcJN9lwteLXx # ZIcoZ0oj6DMLubYLY4+YiAibHjGCFD3C8vAaGWb4fwB8hDD3a5jv3+dKvlwkniuF # QCGINJBACIfgFsDTDWK45yqBnAuzftHbH2G7Fkk6L5+y0iAgGks2fXAe+ZCuRufr # uCT/EjRs8yAsQkCdatk/Mz9qWswYtfU6EFKw12HNFTfOBavsuKp6CDL4xwVsLTEc # AAlcQn9J90b+Fr6Gei0BG6kgR97WbGqEQ6HG8ViDUmgu9O51SOo5tkJJRbTG3fAe # JBHir91CoMyzwoYP9XOtSjTgIe6d/012O5aJbH10DkaaVmFI99efUtQo/+UJ3Olg # hbfrKd0N7CKDnz/hZd500k+zmJo5us2b+UrHxoC6fnICKX4f/ZYQV5x+kGBVyTUL # SBFYlTXfF2QuQ/o6Gve003wAhscXsgSydvyOfeSBRmKSFOeJQIpbXyUKUMiRR6HB # UWA= # SIG # End signature block
combined_dataset/train/non-malicious/2735.ps1
2735.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$True,Position=0)] [String]$LogName ) Get-WinEvent -LogName $LogName
combined_dataset/train/non-malicious/sample_43_48.ps1
sample_43_48.ps1
# # Module manifest for module 'OCI.PSModules.Datacatalog' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datacatalog.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f0444859-1d26-4a2d-8bcd-5551939e4f94' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datacatalog Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datacatalog.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatacatalogCatalogLock', 'Add-OCIDatacatalogCatalogPrivateEndpointLock', 'Add-OCIDatacatalogDataSelectorPatterns', 'Add-OCIDatacatalogMetastoreLock', 'Confirm-OCIDatacatalogConnection', 'Confirm-OCIDatacatalogPattern', 'DisMount-OCIDatacatalogCatalogPrivateEndpoint', 'Export-OCIDatacatalogGlossary', 'Get-OCIDatacatalogAggregatedPhysicalEntitiesList', 'Get-OCIDatacatalogAttribute', 'Get-OCIDatacatalogAttributesList', 'Get-OCIDatacatalogAttributeTag', 'Get-OCIDatacatalogAttributeTagsList', 'Get-OCIDatacatalogCatalog', 'Get-OCIDatacatalogCatalogPrivateEndpoint', 'Get-OCIDatacatalogCatalogPrivateEndpointsList', 'Get-OCIDatacatalogCatalogsList', 'Get-OCIDatacatalogConnection', 'Get-OCIDatacatalogConnectionsList', 'Get-OCIDatacatalogCustomPropertiesList', 'Get-OCIDatacatalogCustomProperty', 'Get-OCIDatacatalogDataAsset', 'Get-OCIDatacatalogDataAssetsList', 'Get-OCIDatacatalogDataAssetTag', 'Get-OCIDatacatalogDataAssetTagsList', 'Get-OCIDatacatalogDerivedLogicalEntitiesList', 'Get-OCIDatacatalogEntitiesList', 'Get-OCIDatacatalogEntity', 'Get-OCIDatacatalogEntityTag', 'Get-OCIDatacatalogEntityTagsList', 'Get-OCIDatacatalogFolder', 'Get-OCIDatacatalogFoldersList', 'Get-OCIDatacatalogFolderTag', 'Get-OCIDatacatalogFolderTagsList', 'Get-OCIDatacatalogGlossariesList', 'Get-OCIDatacatalogGlossary', 'Get-OCIDatacatalogJob', 'Get-OCIDatacatalogJobDefinition', 'Get-OCIDatacatalogJobDefinitionsList', 'Get-OCIDatacatalogJobExecution', 'Get-OCIDatacatalogJobExecutionsList', 'Get-OCIDatacatalogJobLog', 'Get-OCIDatacatalogJobLogsList', 'Get-OCIDatacatalogJobMetrics', 'Get-OCIDatacatalogJobMetricsList', 'Get-OCIDatacatalogJobsList', 'Get-OCIDatacatalogMetastore', 'Get-OCIDatacatalogMetastoresList', 'Get-OCIDatacatalogNamespace', 'Get-OCIDatacatalogNamespacesList', 'Get-OCIDatacatalogPattern', 'Get-OCIDatacatalogPatternsList', 'Get-OCIDatacatalogRulesList', 'Get-OCIDatacatalogTagsList', 'Get-OCIDatacatalogTerm', 'Get-OCIDatacatalogTermRelationship', 'Get-OCIDatacatalogTermRelationshipsList', 'Get-OCIDatacatalogTermsList', 'Get-OCIDatacatalogType', 'Get-OCIDatacatalogTypesList', 'Get-OCIDatacatalogWorkRequest', 'Get-OCIDatacatalogWorkRequestErrorsList', 'Get-OCIDatacatalogWorkRequestLogsList', 'Get-OCIDatacatalogWorkRequestsList', 'Import-OCIDatacatalogConnection', 'Import-OCIDatacatalogDataAsset', 'Import-OCIDatacatalogGlossary', 'Invoke-OCIDatacatalogAssociateCustomProperty', 'Invoke-OCIDatacatalogAsynchronousExportGlossary', 'Invoke-OCIDatacatalogDisassociateCustomProperty', 'Invoke-OCIDatacatalogExpandTreeForGlossary', 'Invoke-OCIDatacatalogFetchEntityLineage', 'Invoke-OCIDatacatalogObjectStats', 'Invoke-OCIDatacatalogParseConnection', 'Invoke-OCIDatacatalogProcessRecommendation', 'Invoke-OCIDatacatalogRecommendations', 'Invoke-OCIDatacatalogSearchCriteria', 'Invoke-OCIDatacatalogSuggestMatches', 'Invoke-OCIDatacatalogSynchronousExportDataAsset', 'Invoke-OCIDatacatalogTestConnection', 'Invoke-OCIDatacatalogUsers', 'Mount-OCIDatacatalogCatalogPrivateEndpoint', 'Move-OCIDatacatalogCatalogCompartment', 'Move-OCIDatacatalogCatalogPrivateEndpointCompartment', 'Move-OCIDatacatalogMetastoreCompartment', 'New-OCIDatacatalogAttribute', 'New-OCIDatacatalogAttributeTag', 'New-OCIDatacatalogCatalog', 'New-OCIDatacatalogCatalogPrivateEndpoint', 'New-OCIDatacatalogConnection', 'New-OCIDatacatalogCustomProperty', 'New-OCIDatacatalogDataAsset', 'New-OCIDatacatalogDataAssetTag', 'New-OCIDatacatalogEntity', 'New-OCIDatacatalogEntityTag', 'New-OCIDatacatalogFolder', 'New-OCIDatacatalogFolderTag', 'New-OCIDatacatalogGlossary', 'New-OCIDatacatalogJob', 'New-OCIDatacatalogJobDefinition', 'New-OCIDatacatalogJobExecution', 'New-OCIDatacatalogMetastore', 'New-OCIDatacatalogNamespace', 'New-OCIDatacatalogPattern', 'New-OCIDatacatalogTerm', 'New-OCIDatacatalogTermRelationship', 'Remove-OCIDatacatalogAttribute', 'Remove-OCIDatacatalogAttributeTag', 'Remove-OCIDatacatalogCatalog', 'Remove-OCIDatacatalogCatalogLock', 'Remove-OCIDatacatalogCatalogPrivateEndpoint', 'Remove-OCIDatacatalogCatalogPrivateEndpointLock', 'Remove-OCIDatacatalogConnection', 'Remove-OCIDatacatalogCustomProperty', 'Remove-OCIDatacatalogDataAsset', 'Remove-OCIDatacatalogDataAssetTag', 'Remove-OCIDatacatalogDataSelectorPatterns', 'Remove-OCIDatacatalogEntity', 'Remove-OCIDatacatalogEntityTag', 'Remove-OCIDatacatalogFolder', 'Remove-OCIDatacatalogFolderTag', 'Remove-OCIDatacatalogGlossary', 'Remove-OCIDatacatalogJob', 'Remove-OCIDatacatalogJobDefinition', 'Remove-OCIDatacatalogMetastore', 'Remove-OCIDatacatalogMetastoreLock', 'Remove-OCIDatacatalogNamespace', 'Remove-OCIDatacatalogPattern', 'Remove-OCIDatacatalogTerm', 'Remove-OCIDatacatalogTermRelationship', 'Update-OCIDatacatalogAttribute', 'Update-OCIDatacatalogCatalog', 'Update-OCIDatacatalogCatalogPrivateEndpoint', 'Update-OCIDatacatalogConnection', 'Update-OCIDatacatalogCustomProperty', 'Update-OCIDatacatalogDataAsset', 'Update-OCIDatacatalogEntity', 'Update-OCIDatacatalogFolder', 'Update-OCIDatacatalogGlossary', 'Update-OCIDatacatalogJob', 'Update-OCIDatacatalogJobDefinition', 'Update-OCIDatacatalogMetastore', 'Update-OCIDatacatalogNamespace', 'Update-OCIDatacatalogPattern', 'Update-OCIDatacatalogTerm', 'Update-OCIDatacatalogTermRelationship', 'Write-OCIDatacatalogCredentials' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datacatalog' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_43_5.ps1
sample_43_5.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. ##################################################################################################### # # Registers the WinRM endpoint for this instance of PowerShell. # # If the parameters '-PowerShellHome' were specified, it means that the script will be registering # an instance of PowerShell from another instance of PowerShell. # # If no parameter is specified, it means that this instance of PowerShell is registering itself. # # Assumptions: # 1. The CoreCLR and the the PowerShell assemblies are side-by-side in $PSHOME # 2. Plugins are registered by version number. Only one plugin can be automatically registered # per PowerShell version. However, multiple endpoints may be manually registered for a given # plugin. # ##################################################################################################### [CmdletBinding(DefaultParameterSetName = "NotByPath")] param ( [parameter(Mandatory = $true, ParameterSetName = "ByPath")] [switch]$Force, [string] $PowerShellHome ) Set-StrictMode -Version 3.0 if (! ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Write-Error "WinRM registration requires Administrator rights. To run this cmdlet, start PowerShell with the `"Run as administrator`" option." return } function Register-WinRmPlugin { param ( # # Expected Example: # %windir%\\system32\\PowerShell\\6.0.0\\pwrshplugin.dll # [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginAbsolutePath, # # Expected Example: powershell.6.0.0-beta.3 # [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginEndpointName ) $regKey = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN\Plugin\$pluginEndpointName" $pluginArchitecture = "64" if ($env:PROCESSOR_ARCHITECTURE -match "x86" -or $env:PROCESSOR_ARCHITECTURE -eq "ARM") { $pluginArchitecture = "32" } $regKeyValueFormatString = @" <PlugInConfiguration xmlns="http://schemas.microsoft.com/wbem/wsman/1/config/PluginConfiguration" Name="{0}" Filename="{1}" SDKVersion="2" XmlRenderingType="text" Enabled="True" OutputBufferingMode="Block" ProcessIdleTimeoutSec="0" Architecture="{2}" UseSharedProcess="false" RunAsUser="" RunAsPassword="" AutoRestart="false"> <InitializationParameters> <Param Name="PSVersion" Value="7.0"/> </InitializationParameters> <Resources> <Resource ResourceUri="http://schemas.microsoft.com/powershell/{0}" SupportsOptions="true" ExactMatch="true"> <Security Uri="http://schemas.microsoft.com/powershell/{0}" ExactMatch="true" Sddl="O:NSG:BAD:P(A;;GA;;;BA)S:P(AU;FA;GA;;;WD)(AU;SA;GXGW;;;WD)"/> <Capability Type="Shell"/> </Resource> </Resources> <Quotas IdleTimeoutms="7200000" MaxConcurrentUsers="5" MaxProcessesPerShell="15" MaxMemoryPerShellMB="1024" MaxShellsPerUser="25" MaxConcurrentCommandsPerShell="1000" MaxShells="25" MaxIdleTimeoutms="43200000"/> </PlugInConfiguration> "@ $valueString = $regKeyValueFormatString -f $pluginEndpointName, $pluginAbsolutePath, $pluginArchitecture New-Item $regKey -Force > $null New-ItemProperty -Path $regKey -Name ConfigXML -Value $valueString > $null } function New-PluginConfigFile { [CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")] param ( [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginFile, [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $targetPsHomeDir ) # This always overwrites the file with a new version of it if the # script is invoked multiple times. Set-Content -Path $pluginFile -Value "PSHOMEDIR=$targetPsHomeDir" -ErrorAction Stop Add-Content -Path $pluginFile -Value "CORECLRDIR=$targetPsHomeDir" -ErrorAction Stop Write-Verbose "Created Plugin Config File: $pluginFile" -Verbose } function Install-PluginEndpoint { [CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")] param ( [Parameter()] [bool] $Force, [switch] $VersionIndependent ) ###################### # # # Install the plugin # # # ###################### if (-not [String]::IsNullOrEmpty($PowerShellHome)) { $targetPsHome = $PowerShellHome $targetPsVersion = & "$targetPsHome\pwsh" -NoProfile -Command '$PSVersionTable.PSVersion.ToString()' } else { ## Get the PSHome and PSVersion using the current powershell instance $targetPsHome = $PSHOME $targetPsVersion = $PSVersionTable.PSVersion.ToString() } Write-Verbose "PowerShellHome: $targetPsHome" -Verbose # For default, not tied to the specific version endpoint, we apply # only first number in the PSVersion string to the endpoint name. # Example name: 'PowerShell.6'. if ($VersionIndependent) { $dotPos = $targetPsVersion.IndexOf(".") if ($dotPos -ne -1) { $targetPsVersion = $targetPsVersion.Substring(0, $dotPos) } } Write-Verbose "Using PowerShell Version: $targetPsVersion" -Verbose $pluginEndpointName = "PowerShell.$targetPsVersion" $endPoint = Get-PSSessionConfiguration $pluginEndpointName -Force:$Force -ErrorAction silentlycontinue 2>&1 # If endpoint exists and -Force parameter was not used, the endpoint would not be overwritten. if ($endpoint -and !$Force) { Write-Error -Category ResourceExists -ErrorId "PSSessionConfigurationExists" -Message "Endpoint $pluginEndpointName already exists." return } if (!$PSCmdlet.ShouldProcess($pluginEndpointName)) { return } if ($PSVersionTable.PSVersion -lt "6.0") { # This script is primarily used from Windows PowerShell for Win10 IoT and NanoServer to setup PSCore6 remoting endpoint # so it's ok to hardcode to 'C:\Windows' for those systems $pluginBasePath = Join-Path "C:\Windows\System32\PowerShell" $targetPsVersion } else { $pluginBasePath = Join-Path ([System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::Windows) + "\System32\PowerShell") $targetPsVersion } $resolvedPluginAbsolutePath = "" if (! (Test-Path $pluginBasePath)) { Write-Verbose "Creating $pluginBasePath" $resolvedPluginAbsolutePath = New-Item -Type Directory -Path $pluginBasePath } else { $resolvedPluginAbsolutePath = Resolve-Path $pluginBasePath } $pluginPath = Join-Path $resolvedPluginAbsolutePath "pwrshplugin.dll" # This is forced to ensure the the file is placed correctly Copy-Item $targetPsHome\pwrshplugin.dll $resolvedPluginAbsolutePath -Force -Verbose -ErrorAction Stop $pluginFile = Join-Path $resolvedPluginAbsolutePath "RemotePowerShellConfig.txt" New-PluginConfigFile $pluginFile (Resolve-Path $targetPsHome) # Register the plugin Register-WinRmPlugin $pluginPath $pluginEndpointName #################################################################### # # # Validations to confirm that everything was registered correctly. # # # #################################################################### if (! (Test-Path $pluginFile)) { throw "WinRM Plugin configuration file not created. Expected = $pluginFile" } if (! (Test-Path $resolvedPluginAbsolutePath\pwrshplugin.dll)) { throw "WinRM Plugin DLL missing. Expected = $resolvedPluginAbsolutePath\pwrshplugin.dll" } try { Write-Host "`nGet-PSSessionConfiguration $pluginEndpointName" -ForegroundColor "green" Get-PSSessionConfiguration $pluginEndpointName -ErrorAction Stop } catch [Microsoft.PowerShell.Commands.WriteErrorException] { throw "No remoting session configuration matches the name $pluginEndpointName." } } Install-PluginEndpoint -Force $Force Install-PluginEndpoint -Force $Force -VersionIndependent Write-Host "Restarting WinRM to ensure that the plugin configuration change takes effect.`nThis is required for WinRM running on Windows SKUs prior to Windows 10." -ForegroundColor Magenta Restart-Service winrm # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCfOFoH3rP/kr2E # 0Q4vJtNjsECNzfLCg+aNt7OyJJ4h56CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC31kIv83vnF6L5j9IMOo5zK # LpBkr5/aZ0ovb5/+9Z+bMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjMS5yIZzMfDtLc9BCK3HVW5TIIw+CEWMUDUlyBjxFef8v1nSXW8LdoVN # ja27usqFa1JBV01jywlcPoR+fNjNrILB6PGoIS6NnXF1NlGgwKNnh7AQ4GCFRnPJ # LjxScUM127K01SdAdbJHRSm5IPFBhGla29kQRmGBgLESLFun1HvUBEpa6ia22e+z # D00UCaIDkw/6MNnbNDs2LP3lSq1DSLBStcJukOakrl9/xwn9k4lYfp5rU6gkOWlE # jo6QZ/JoOM5sSDLi0mWN0adXPngUNXX5PEaTyy4mj0OCzv3U4K65eYssD6NszuV8 # evP0iO7SBTq9rnPiSERiY8e2zaOoKaGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCiTFkxKhXyXMJotWHYNCUp/9qZZebWWvClXyuBUrmA4AIGZc5J2ESr # GBIyMDI0MDIyMDE4MTgzOC43OFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # Ee0wggcgMIIFCKADAgECAhMzAAAB7gXTAjCymp2nAAEAAAHuMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU0 # NFoXDTI1MDMwNTE4NDU0NFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAL7xvKXXooSJrzEpLi9UvtEQ45HsvNgItcS1aB6rI5WW # vO4TP4CgJri0EYRKNsdNcQJ4w7A/1M94popqV9NTldIaOkmGkbHn1/EwmhNhY/PM # PQ7ZECXIGY4EGaIsNdENAkvVG24CO8KIu6VVB6I8jxXv4eFNHf3VNsLVt5LHBd90 # ompjWieMNrCoMkCa3CwD+CapeAfAX19lZzApK5eJkFNtTl9ybduGGVE3Dl3Tgt3X # llbNWX9UOn+JF6sajYiz/RbCf9rd4Y50eu9/Aht+TqVWrBs1ATXU552fa69GMpYT # B6tcvvQ64Nny8vPGvLTIR29DyTL5V+ryZ8RdL3Ttjus38dhfpwKwLayjJcbc7AK0 # sDujT/6Qolm46sPkdStLPeR+qAOWZbLrvPxlk+OSIMLV1hbWM3vu3mJKXlanUcoG # nslTxGJEj69jaLVxvlfZESTDdas1b+Nuh9cSz23huB37JTyyAqf0y1WdDrmzpAbv # Yz/JpRkbYcwjfW2b2aigfb288E72MMw4i7QvDNROQhZ+WB3+8RZ9M1w9YRCPt+xa # 5KhW4ne4GrA2ZFKmZAPNJ8xojO7KzSm9XWMVaq2rDAJxpj9Zexv9rGTEH/MJN0dI # FQnxObeLg8z2ySK6ddj5xKofnyNaSkdtssDc5+yzt74lsyMqZN1yOZKRvmg3ypTX # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUEIjNPxrZ3CCevfvF37a/X9x2pggwHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAHdnIC9rYQo5ZJWkGdiTNfx/wZmNo6znvsX2 # jXgCeH2UrLq1LfjBeg9cTJCnW/WIjusnNlUbuulTOdrLaf1yx+fenrLuRiQeq1K6 # AIaZOKIGTCEV9IHIo8jTwySWC8m8pNlvrvfIZ+kXA+NDBl4joQ+P84C2liRPshRe # oySLUJEwkqB5jjBREJxwi6N1ZGShW/gner/zsoTSo9CYBH1+ow3GMjdkKVXEDjCI # ze01WVFsX1KCk6eNWjc/8jmnwl3jWE1JULH/yPeoztotIq0PM4RQ2z5m2OHOeZmB # R3v8BYcOHAEd0vntMj2HueJmR85k5edxiwrEbiCvJOyFTobqwBilup0wT/7+DW56 # vtUYgdS0urdbQCebyUB9L0+q2GyRm3ngkXbwId2wWr/tdUG0WXEv8qBxDKUk2eJr # 5qeLFQbrTJQO3cUwZIkjfjEb00ezPcGmpJa54a0mFDlk3QryO7S81WAX4O/TmyKs # +DR+1Ip/0VUQKn3ejyiAXjyOHwJP8HfaXPUPpOu6TgTNzDsTU6G04x/sMeA8xZ/p # Y51id/4dpInHtlNcImxbmg6QzSwuK3EGlKkZyPZiOc3OcKmwQ9lq3SH7p3u6VFpZ # HlEcBTIUVD2NFrspZo0Z0QtOz6cdKViNh5CkrlBJeOKB0qUtA8GVf73M6gYAmGhl # +umOridAMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw # ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIij # ptU29+UXFtRYINDdhgrLo76ToIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpf1/BMCIYDzIwMjQwMjIwMTcyODMz # WhgPMjAyNDAyMjExNzI4MzNaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl/X8EC # AQAwCgIBAAICDykCAf8wBwIBAAICE+QwCgIFAOmAsUECAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAP4MGy6jRs9gZgUhfL9bfFnh86TShav6+WtXKANlNJnwL # v7KraLZuQGmxmHgQ2sPpg4IMfvc20ZAr0nJL6nFsaFUWmbDIVOX7iY1Ik6uHw9y7 # FR84WX1rZWKeRTswYjdqx6zWEycv4y31hSz0SUYzI51G/AipdEIxhcFR2c6nnGlk # Yw2GPrS80E6AeXYUAlWJd/xn2scu+Wr6QtRbsatZhOYi36y5QKEfiTK3KFGYbMlU # PKFH6VIlqdIrJ0xQtbngbEgQVhjDjXzQ+hJBErf/BxWokL5klC4G3SJZnjxzwmh6 # D2IBuckP32ZX75KoP1HY7m/d/zHXsbN2J/1fnukaMTGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7gXTAjCymp2nAAEAAAHu # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIBX20C6NOe9PKJzA0r7KkTYKbJ8omtbfWlmHAEbpYK9O # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgT1B3FJWF+r5V1/4M+z7kQiQH # P2gJL85B+UeRVGF+MCEwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAiBCDsAt/A8mSZlBS8tGMxkoqq3BBt # ygVOGucZYtyT5TcVEDANBgkqhkiG9w0BAQsFAASCAgCylMHfXzQHzDBgDFuj4SOy # M0kCYkFTWskfBbXImF7mHgwWGQorZG4bQn5Iv6E1HnsxNYhBS/hGvr+d/J4sSr9x # n/4Onr6JkN2VTThFLuu05VvAS5uljaH0OvbsnvuD2TbT/qcV2MUkERkWA8t34Z4Y # BxnC51rWwfDj1JsbCjxskQ8LWo5x9gLUVfv9eUMv4bCbdc/UyY+y/Akb/n/Sq4rc # CjbH0JTtoi33FjzkD2GEP22bEj/nfpYu22KCseN1tFPX3DPvhP2NQ37+CBjaow/m # eAM8C1YcbZZckfRdyCWuZcdmzqC7FLmYTd06NimuHmbASQdg9sra6blclYVB32Va # pEBj0wuA90PRtNQHStDDwrtoyDufhp+2XbT5KpVLqkKPal67+N0fr4vY2sjDsyYg # Syh39d1i4/xbR8ENMY5YWslAZ51YRloOXkcFLUGTFbN3iQyYc+pm8tEv1tt0mM4S # amJYy6EikYG39skzstTOov5KlPifAs0zMJAzO9mZLId/2nk9jhB7gLoY4Zv6ShMX # JNT78t9RQJNCp6bx3I7dJHGexmBrdc813wpdXqHW75gcVDV77/GwjpYCw2D7qdVB # H9S+Bk0NP8u91Ci3TLR87+Z7foZU/d03lU5o8TskVOy/GVItnuXjvLs0woiYcl9r # nbQMd4l/cUa4Jkq/pEj0rw== # SIG # End signature block
combined_dataset/train/non-malicious/sample_22_45.ps1
sample_22_45.ps1
# # Module manifest for module 'OCI.PSModules.Operatoraccesscontrol' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment', 'Get-OCIOperatoraccesscontrolAccessRequest', 'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList', 'Get-OCIOperatoraccesscontrolAccessRequestsList', 'Get-OCIOperatoraccesscontrolAssignmentValidationStatus', 'Get-OCIOperatoraccesscontrolAuditLogReport', 'Get-OCIOperatoraccesscontrolInteractionsList', 'Get-OCIOperatoraccesscontrolOperatorAction', 'Get-OCIOperatoraccesscontrolOperatorActionsList', 'Get-OCIOperatoraccesscontrolOperatorControl', 'Get-OCIOperatoraccesscontrolOperatorControlAssignment', 'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList', 'Get-OCIOperatoraccesscontrolOperatorControlsList', 'Invoke-OCIOperatoraccesscontrolApproveAccessRequest', 'Invoke-OCIOperatoraccesscontrolInteractionRequest', 'Invoke-OCIOperatoraccesscontrolRejectAccessRequest', 'Invoke-OCIOperatoraccesscontrolReviewAccessRequest', 'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest', 'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment', 'Move-OCIOperatoraccesscontrolOperatorControlCompartment', 'New-OCIOperatoraccesscontrolOperatorControl', 'New-OCIOperatoraccesscontrolOperatorControlAssignment', 'Remove-OCIOperatoraccesscontrolOperatorControl', 'Remove-OCIOperatoraccesscontrolOperatorControlAssignment', 'Update-OCIOperatoraccesscontrolOperatorControl', 'Update-OCIOperatoraccesscontrolOperatorControlAssignment' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1116.ps1
1116.ps1
$appPoolName = 'Carbon-Get-IisWebsite' $siteName = 'Carbon-Get-IisWebsite' function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { Install-IisAppPool -Name $appPoolName $bindings = @( 'http/*:8401:', 'https/*:8401:', 'http/1.2.3.4:80:', "http/5.6.7.8:80:$siteName" ) Install-IisWebsite -Name $siteName -Bindings $bindings -Path $TestDir -AppPoolName $appPoolName } function Stop-Test { Remove-IisWebsite -Name $siteName } function Test-ShouldReturnNullForNonExistentWebsite { $website = Get-IisWebsite -SiteName 'ISureHopeIDoNotExist' Assert-Null $website } function Test-ShouldGetWebsiteDetails { $website = Get-IisWebsite -SiteName $siteName Assert-NotNull $website Assert-Equal $siteName $website.Name 'site name not set' Assert-True ($website.ID -gt 0) 'site ID not set' Assert-Equal 4 $website.Bindings.Count 'site bindings not set' Assert-Equal 'http' $website.Bindings[0].Protocol Assert-Equal '0.0.0.0' $website.Bindings[0].Endpoint.Address Assert-Equal 8401 $website.Bindings[0].Endpoint.Port Assert-Empty $website.Bindings[0].Host Assert-Equal 'https' $website.Bindings[1].Protocol Assert-Equal '0.0.0.0' $website.Bindings[1].Endpoint.Address Assert-Equal 8401 $website.Bindings[1].Endpoint.Port Assert-Empty $website.Bindings[1].Host Assert-Equal 'http' $website.Bindings[2].Protocol Assert-Equal '1.2.3.4' $website.Bindings[2].Endpoint.Address Assert-Equal 80 $website.Bindings[2].Endpoint.Port Assert-Empty $website.Bindings[2].Host Assert-Equal 'http' $website.Bindings[3].Protocol Assert-Equal '5.6.7.8' $website.Bindings[3].Endpoint.Address Assert-Equal 80 $website.Bindings[3].Endpoint.Port Assert-Equal $siteName $website.Bindings[3].Host "bindings[3] host name" $physicalPath = $website.Applications | Where-Object { $_.Path -eq '/' } | Select-Object -ExpandProperty VirtualDirectories | Where-Object { $_.Path -eq '/' } | Select-Object -ExpandProperty PhysicalPath Assert-Equal $physicalPath $website.PhysicalPath Assert-ServerManagerMember -Website $website } function Test-ShouldGetAllWebsites { $foundAtLeastOne = $false $foundTestWebsite = $false Get-IisWebsite | ForEach-Object { $foundAtLeastOne = $true Assert-ServerManagerMember -Website $_ if( $_.Name -eq $siteName ) { $foundTestWebsite = $true } } Assert-True $foundAtLeastOne Assert-True $foundTestWebsite } function Assert-ServerManagerMember { param( $Website ) Assert-NotNull ($Website.ServerManager) 'no server manager property' Assert-NotNull ($Website | Get-Member | Where-Object { $_.Name -eq 'CommitChanges' -and $_.MemberType -eq 'ScriptMethod' }) 'no CommitChanges method' }
combined_dataset/train/non-malicious/Get-Parameter 2.2.ps1
Get-Parameter 2.2.ps1
#Requires -version 2.0 #.Synopsis # Enumerates the parameters of one or more commands #.Notes # With many thanks to Hal Rottenberg, Oisin Grehan and Shay Levy # Version 0.80 - April 2008 - By Hal Rottenberg http://poshcode.org/186 # Version 0.81 - May 2008 - By Hal Rottenberg http://poshcode.org/255 # Version 0.90 - June 2008 - By Hal Rottenberg http://poshcode.org/445 # Version 0.91 - June 2008 - By Oisin Grehan http://poshcode.org/446 # Version 0.92 - April 2008 - By Hal Rottenberg http://poshcode.org/549 # - Added resolving aliases and avoided empty output # Version 0.93 - Sept 24, 2009 - By Hal Rottenberg http://poshcode.org/1344 # Version 1.0 - Jan 19, 2010 - By Joel Bennett http://poshcode.org/1592 # - Merged Oisin and Hal's code with my own implementation # - Added calculation of dynamic paramters # Version 2.0 - July 22, 2010 - By Joel Bennett http://poshcode.org/get/2005 # - Now uses FormatData so the output is objects # - Added calculation of shortest names to the aliases (idea from Shay Levy http://poshcode.org/1982, but with a correct implementation) # Version 2.1 - July 22, 2010 - By Joel Bennett http://poshcode.org/2007 # - Fixed Help for SCRIPT file (script help must be separated from #Requires by an emtpy line) # - Fleshed out and added dates to this version history after Bergle's criticism ;) # Version 2.2 - July 29, 2010 - By Joel Bennett (This Version) # - Fixed a major bug which caused Get-Parameters to delete all the parameters from the CommandInfo # #.Description # Lists all the parameters of a command, by ParameterSet, including their aliases, type, etc. # # By default, formats the output to tables grouped by command and parameter set #.Example # Get-Command Select-Xml | Get-Parameter #.Example # Get-Parameter Select-Xml #.Parameter Name # The name of the command to get parameters for #.Parameter ModuleName # The name of the module which contains the command (this is for scoping) #.Parameter Force # Forces including the CommonParameters in the output [CmdletBinding()] ##This is just script-file nesting stuff, so that you can call the SCRIPT, and after it defines the global function, it will call it. param ( [Parameter(Position=1,ValueFromPipelineByPropertyName=$true,Mandatory=$true)] [string[]]$Name , [Parameter(Position=2,ValueFromPipelineByPropertyName=$true,Mandatory=$false)] $ModuleName , [switch]$Force ) Function global:Get-Parameter { #.Synopsis # Enumerates the parameters of one or more commands #.Description # Lists all the parameters of a command, by ParameterSet, including their aliases, type, etc. # # By default, formats the output to tables grouped by command and parameter set #.Example # Get-Command Select-Xml | Get-Parameter #.Example # Get-Parameter Select-Xml #.Parameter Name # The name of the command to get parameters for #.Parameter ModuleName # The name of the module which contains the command (this is for scoping) #.Parameter Force # Forces including the CommonParameters in the output [CmdletBinding()] param ( [Parameter(Position=1,ValueFromPipelineByPropertyName=$true,Mandatory=$true)] [string[]]$Name , [Parameter(Position=2,ValueFromPipelineByPropertyName=$true,Mandatory=$false)] $ModuleName , [switch]$Force ) begin { $PropertySet = @( "Name", @{n="Position";e={if($_.Position -lt 0){"Named"}else{$_.Position}}}, "Aliases", @{n="Short";e={$_.Name}}, @{n="Type";e={$_.ParameterType.Name}}, @{n="ParameterSet";e={$paramset}}, @{n="Command";e={$command}}, @{n="Mandatory";e={$_.IsMandatory}}, @{n="Provider";e={$_.DynamicProvider}}, @{n="ValueFromPipeline";e={$_.ValueFromPipeline}}, @{n="ValueFromPipelineByPropertyName";e={$_.ValueFromPipelineByPropertyName}} ) function Join-Object { Param( [Parameter(Position=0)] $First , [Parameter(ValueFromPipeline=$true,Position=1)] $Second ) begin { [string[]] $p1 = $First | gm -type Properties | select -expand Name } process { $Output = $First | Select $p1 foreach($p in $Second | gm -type Properties | Where { $p1 -notcontains $_.Name } | select -expand Name) { Add-Member -in $Output -type NoteProperty -name $p -value $Second."$p" } $Output } } } process{ foreach($cmd in $Name) { if($ModuleName) { $cmd = "$ModuleName\\$cmd" } $commands = @(Get-Command $cmd) foreach($command in $commands) { # resolve aliases (an alias can point to another alias) while ($command.CommandType -eq "Alias") { $command = @(Get-Command ($command.definition))[0] } if (-not $command) { continue } $Parameters = @{} foreach($provider in Get-PSProvider) { $drive = "{0}\\{1}::\\" -f $provider.ModuleName, $provider.Name Write-Verbose ("Get-Command $command -Args $drive | Select -Expand Parameters") [Array]$MoreParameters = (Get-Command $command -Args $drive).Parameters.Values [Array]$Dynamic = $MoreParameters | Where { $_.IsDynamic } foreach($p in $MoreParameters | Where { $Dynamic -notcontains $_ } ){ $Parameters.($p.Name) = $p } # Write-Verbose "Drive: $Drive | Parameters: $($Parameters.Count)" if($dynamic) { foreach($d in $dynamic) { if(Get-Member -input $Parameters.($d.Name) -Name DynamicProvider) { Write-Debug ("ADD:" + $d.Name + " " + $provider.Name) $Parameters.($d.Name).DynamicProvider += $provider.Name } else { Write-Debug ("CREATE:" + $d.Name + " " + $provider.Name) $Parameters.($d.Name) = $Parameters.($d.Name) | Add-Member NoteProperty DynamicProvider @($provider.Name) -Passthru } } } } ## Calculate the shortest distinct parameter name -- do this BEFORE removing the common parameters or else. foreach($p in $($Parameters.Keys)) { $shortest="^" foreach($char in [char[]]$p) { $shortest += $char $Matches = ($Parameters.Keys -match $Shortest).Count Write-Debug "$($shortest.SubString(1)) $Matches" if($Matches -eq 1) { $Parameters.$p = $Parameters.$p | Add-Member NoteProperty Aliases ($Parameters.$p.Aliases + @($shortest.SubString(1).ToLower($PSUICulture))) -Force -Passthru break } } } Write-Verbose "Parameters: $($Parameters.Count)`n $($Parameters | ft | out-string)" foreach ($paramset in @($command.ParameterSets | Select -Expand "Name")){ foreach($parameter in $Parameters.Keys | Sort) { Write-Verbose "Parameter: $Parameter" if(!$Force -and ($Parameters.$Parameter.aliases -match "vb|db|ea|wa|ev|wv|ov|ob|wi|cf")) { continue } if($Parameters.$Parameter.ParameterSets.ContainsKey($paramset) -or $Parameters.$Parameter.ParameterSets.ContainsKey("__AllParameterSets")) { if($Parameters.$Parameter.ParameterSets.ContainsKey($paramset)) { $output = Join-Object $Parameters.$Parameter $Parameters.$Parameter.ParameterSets.$paramSet } else { $output = Join-Object $Parameters.$Parameter $Parameters.$Parameter.ParameterSets.__AllParameterSets } Write-Output $Output | Select-Object $PropertySet | ForEach { $null = $_.PSTypeNames.Insert(0,"System.Management.Automation.ParameterMetadata") $null = $_.PSTypeNames.Insert(0,"System.Management.Automation.ParameterMetadataEx") Write-Verbose "$(($_.PSTypeNames.GetEnumerator()) -join ", ")" $_ } } } } } } } } # Since you can't update format data without a file that has a ps1xml ending, let's make one up... $tempFile = "$([IO.Path]::GetTempFileName()).ps1xml" Set-Content $tempFile @' <?xml version="1.0" encoding="utf-8" ?> <Configuration> <Controls> <Control> <Name>ParameterGroupingFormat</Name> <CustomControl> <CustomEntries> <CustomEntry> <CustomItem> <Frame> <LeftIndent>4</LeftIndent> <CustomItem> <Text>Command: </Text> <ExpressionBinding> <ScriptBlock>"{0}/{1}" -f $(if($_.command.ModuleName){$_.command.ModuleName}else{$_.Command.CommandType.ToString()+":"}),$_.command.Name</ScriptBlock> </ExpressionBinding> <NewLine/> <Text>Set: </Text> <ExpressionBinding> <ScriptBlock>if($_.ParameterSet -eq "__AllParameterSets"){"Default"}else{$_.ParameterSet}</ScriptBlock> </ExpressionBinding> <NewLine/> </CustomItem> </Frame> </CustomItem> </CustomEntry> </CustomEntries> </CustomControl> </Control> </Controls> <ViewDefinitions> <View> <Name>ParameterMetadataEx</Name> <ViewSelectedBy> <TypeName>System.Management.Automation.ParameterMetadataEx</TypeName> </ViewSelectedBy> <GroupBy> <PropertyName>ParameterSet</PropertyName> <CustomControlName>ParameterGroupingFormat</CustomControlName> </GroupBy> <TableControl> <TableHeaders> <TableColumnHeader> <Label>Name</Label> <Width>22</Width> </TableColumnHeader> <TableColumnHeader> <Label>Aliases</Label> <Width>12</Width> </TableColumnHeader> <TableColumnHeader> <Label>Position</Label> <Width>8</Width> </TableColumnHeader> <TableColumnHeader> <Label>Mandatory</Label> <Width>9</Width> </TableColumnHeader> <TableColumnHeader> <Label>Pipeline</Label> <Width>8</Width> </TableColumnHeader> <TableColumnHeader> <Label>ByName</Label> <Width>6</Width> </TableColumnHeader> <TableColumnHeader> <Label>Provider</Label> <Width>15</Width> </TableColumnHeader> <TableColumnHeader> <Label>Type</Label> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>Name</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>Aliases</PropertyName> </TableColumnItem> <TableColumnItem> <!--PropertyName>Position</PropertyName--> <ScriptBlock>if($_.Position -lt 0){"Named"}else{$_.Position}</ScriptBlock> </TableColumnItem> <TableColumnItem> <PropertyName>Mandatory</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>ValueFromPipeline</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>ValueFromPipelineByPropertyName</PropertyName> </TableColumnItem> <TableColumnItem> <!--PropertyName>Provider</PropertyName--> <ScriptBlock>if($_.Provider){$_.Provider}else{"All"}</ScriptBlock> </TableColumnItem> <TableColumnItem> <PropertyName>Type</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> </ViewDefinitions> </Configuration> '@ Update-FormatData -Append $tempFile # This is nested stuff, so that you can call the SCRIPT, and after it defines the global function, we will call that. Get-Parameter @PSBoundParameters
combined_dataset/train/non-malicious/sample_3_57.ps1
sample_3_57.ps1
ConvertFrom-StringData @' id_ctswinsock=Winsock Component id_ctswinsockdescription=Collects information about the Winsock component. '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBDE8S8bKEeIzjh # VOioyoakP/JSa7mnkeOIMMJeUzFwGaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIkzO5UNSkQCqNtjfTSAW5L8 # uyNUPaFZrLgWfbWGWlPOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEADBsA6ZaiTBwRGl9FIsxZqf2Mgoj1DwprH1YD9+OMdHaGW6JM77LuW2FN # 8LuO89SezJ2bDFsC/gmDB83AB4Hw4wiOIdq/Um7kyCgEuDc8GL+nGNcbSi5CMMVO # X+wB8FnG2uNIKiQTFs+yCc2vSF51LbQktXuIooECoWFIaH5jqXhwFYxfVLcmtuLv # g8o4Gd9pmXmpfG4nmvteN4YJ7fxHcR6j91mdaA4LFbIcSpnBRF1Dr9s+nQHQ5hqu # 1Q7LBdNJNpwqIoI8JqtdbFw7IvIPYyht97ppHBFTgE+BNTxGU3xlPQYBA/IKFRPz # 1zsRW7mDxDTR7HZFuLmNly0rf+ovuKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDw0PGr7Jk1wSRiJFme2HrWyD1bc6MWXRMVDKOwWL9QTgIGZxp9zspx # GBMyMDI0MTAyODExNDA0OC4xMzlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw # N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP # AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0 # ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA # AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4 # fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6 # IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR # AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDv7wZ3wPtBtnDiYsV0l70Y9FSaSmQXyTecA4iVATwR # cDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a # AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAlEW4lrfWFxdKMmb1KteH # uQpe9luxEm33ErJO1eCMOpXM6YN2g8Q8i5gpzOUd2p4M7ucKzOLXJFqmBVDseRwo # xs4ofBB7V6w/L5lQx/FUMRKJyP1YXTUnri/61fZIESOWEE1ym3M52E0Bp5cmWMs7 # 3tz4gtcrlWM3L2ehiaPy/jgAkErY6Epg/Abe4NUAYGXoyAD/PG7oIBxeDttPhsWe # gvDbRbtTndAYvC4IosRBpsgUSmfWwuWVxr7LNZ5+emxkvanJ19xKnCnllfnbmt2s # 8/K87tE+jrDtV3s3LhvTjKOP4GgjBN3kddsJgogf2zZU3yTTh3k31Q1PktSv0bAj # clbWoXxNs3JGdTYCGzirDgJVyEwzQg/WVFgvcobZwFOGvDPEzA9TTd3o4zVQY4YZ # Zm6DsFCUby6HpDOHdwu+s6RTccYBT9Y7XQj0FVknYPzIOIPDSyvY9SQSMatI8/gL # sWEJKEID6CcjGf+e3srA9vdwdVAtRKtWozxf68aj/Ym3fzOEgGUKDgseigYmXi7I # TeYozoczV0KyhLkJEyZYGnzQiRMlhRaObbmV01PtNPGwrpkNNYYfUrkO9ydQ8+TQ # C2GnS+uA2wuR25+JP3JCvZ8v4mD5u5r6u+cikwMlMaepFBa+u0P9qI4pv2B0/fdn # mZ+SHf/ZvCuj9ZrbaH/QFEU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_28_4.ps1
sample_28_4.ps1
# Localized 08/28/2023 11:37 AM (GMT) 303:7.0.30723 cl_localizationdata.psd1 ConvertFrom-StringData @' ###PSLOC Troubleshoot_Title=Fejlfinding Troubleshoot_DetectNetworkCache=Kontrollerer netværkscache for Windows-medieafspiller ... Resolution_Title=Løsning Resolution_ResetConfiguration=Nulstiller alle konfigurationsindstillinger... Resolution_ResetNetworkCache=Nulstiller konfigurationer af netværkscachen... BinaryPath=Binær sti Version=Version Report_Name_WMPInformation=Analyseret version Report_Description_WMPInformation=Oplysninger om Windows-medieafspiller Report_Name_NetWorkCachedFile=Cachelagret konfiguration Report_Description_NetWorkCachedFile=Oplysninger om konfiguration af netværkscache for Windows-medieafspiller ###PSLOC '@