full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/Filtering hosts.ps1
Filtering hosts.ps1
set-psdebug -strict Function Where-Host { <# .SYNOPSIS Filter hosts according to hostname resolution, ping reachability or WMI capability .DESCRIPTION Filter hostnames by hostname resolution, ping reachbility or WMI capabilities. Filter can be positive or negative. Positive filter includes hosts that can be reached at least at level X (X can be "DNS", "Ping" or "WMI"). Negative filter includes hosts that cannot be reached at level X (X can be the same as above). .EXAMPLE Get a list of hosts from Hosts.txt and keep only those who reply to WMI requests: Get-Content Hosts.txt | Filter-Host -Can WMI .INPUTTYPE String .PARAMETER Hostname Name of the host we want to know about its level of reachability .PARAMETER PingTimeout When pinging hosts, timeout after what we consider the host is unreachable .PARAMETER PingCount When pinging hosts, number of packets sent .PARAMETER Can Positive Filter. We keep hosts who DO reply to a certain level of request. "Can" parameter takes an argument that is the MINIMUM capacity we are looking to know about: - "DNS": the hostname can at least be resolved by DNS - "Ping": the host at least replies to ping requests - "WMI": the host at least replies to a WMI "List" request Only one argument can be given to "Can" parameter. Give the most elevated you want. .PARAMETER Cannot Negative Filter. We keep hosts who DO NOT reply to a certain level of request. "Cannot" parameter takes an argument that is the MAXIMUM capacity we are looking to know about: - "DNS": the hostname cannot be resolved by DNS - "Ping": the host doesn't reply to ping requests - "WMI": the host doesn't reply to a WMI "List" request Only one argument can be given to "Can" parameter. Give the less elevated you want. .PARAMETER Credential A PSCredential object used if you want to do WMI requests and you're not logged with a power user. See Get-Credential .RETURNVALUE For each object in the pipeline, the cmdlet returns the input object if filter matches, nothing if it doesn't. .EXAMPLE Get a list of hosts from Hosts.txt and keep only those who doesn't reply to ping requests: Get-Content Hosts.txt | Filter-Host -Cannot Ping .NOTES Author : Rafael Corvalan - rafael <a-t> corvalan [dot] net .LINK http://psh-xrt.blogspot.com #> [CmdletBinding(DefaultParameterSetName="PositiveFilter")] Param( [String] [Parameter(ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$True, Mandatory=$True)] [Alias("Host","Name")] $Hostname, [Alias("Timeout")] [Int]$PingTimeout = 200, [Alias("Count")] [Int]$PingCount = 2, [ValidateSet("DNS", "Ping", "WMI")] [Parameter(ParameterSetName="PositiveFilter")] [String] $Can = "Ping", [ValidateSet("DNS", "Ping", "WMI")] [Parameter(ParameterSetName="NegativeFilter")] [String] $Cannot, [System.Management.Automation.PSCredential] [Alias("PSCredential")] $Credential ) BEGIN { if (-not (Test-Path Variable:\\Can)) {$Can = ''} if (-not (Test-Path Variable:\\Cannot)) {$Cannot = ''} } Process { Write-Verbose "+ Processing host $Hostname" Write-Verbose " - Resolving host $Hostname" $rh = Resolve-Host $Hostname -ErrorAction SilentlyContinue -ErrorVariable err if ($err -ne $Null) { Write-Verbose('Cannot resolve host {0}. Message [{1}]' -f $Hostname, ($err -join '; ')) if ($Cannot -match '^DNS|Ping|WMI$') { return $_ } return } if ($Can -ieq 'DNS') {return $_} if ($Cannot -ieq 'DNS') {return} Write-Verbose " - Pinging host $Hostname" $ping = Ping-Host $Hostname -Quiet -Count $PingCount -Timeout $PingTimeout -ErrorAction SilentlyContinue -ErrorVariable err if ($err -ne $Null) { Write-Verbose('Error pinging host {0}. Message [{1}]' -f $Hostname, ($err -join '; ')) } elseif ($ping.Loss -eq 100) { Write-Verbose('Host {0} is unreachable by ping' -f $Hostname) } if ($err -ne $null -or $ping.Loss -eq 100) { if ($Cannot -match '^Ping|WMI$') {return $_ } else {return} } if ($Can -ieq 'Ping') {return $_} if ($Cannot -ieq 'Ping') {return} Write-Verbose " - WMI test on host $Hostname" if ($Credential -ne $Null) { Get-WMIObject -List -ComputerName $Hostname -Credential $Credential -ErrorAction SilentlyContinue -ErrorVariable err > $Null } else { Get-WMIObject -List -ComputerName $Hostname -ErrorAction SilentlyContinue -ErrorVariable err > $Null } if ($err -ne $Null) { Write-Verbose('Error querying WMI on host {0}. Message [{1}]' -f $Hostname, ($err -join '; ')) if ($Cannot -ieq 'WMI') {return $_} else {return} } if ($Can -ieq 'WMI') {return $_} else {return} } }
combined_dataset/train/non-malicious/1044.ps1
1044.ps1
[CmdletBinding()] param( ) Set-StrictMode -Version 'Latest' $ErrorActionPreference = 'Stop' $base64Snk = $env:SNK if( -not $base64Snk ) { return } $snkPath = Join-Path -Path $PSScriptRoot -ChildPath 'Source\Carbon.snk' Write-Verbose -Message ('Saving signing key to "{0}".' -f $snkPath) [IO.File]::WriteAllBytes($snkPath, [Convert]::FromBase64String($base64Snk))
combined_dataset/train/non-malicious/sample_66_77.ps1
sample_66_77.ps1
<policyDefinitionResources revision="1.0" schemaVersion="1.0"> <displayName> </displayName> <description> </description> <resources> <stringTable> <string id="LAPS">LAPS</string> <string id="LAPS_BackupDirectory">Настройка каталога резервного копирования паролей</string> <string id="LAPS_BackupDirectory_Help">Используйте этот параметр, чтобы настроить каталог, в который архивется пароль локальной учетной записи администратора. Допустимые параметры: 0=Отключено (резервное копирование пароля выполняться не будет) 1= Резервное копирование пароля для Azure Active Directory 2=Резервное копирование пароля в Active Directory Если этот параметр не указан, по умолчанию используется значение 0 (отключено). Если этот параметр имеет значение 1 и управляемое устройство не присоединено к Azure Active Directory, локальный пароль администратора не будет управляться. Если этот параметр имеет значение 2 и управляемое устройство не присоединено к Active Directory, локальный пароль администратора не будет управляться. Если этот параметр отключен или не настроен, пароль локального администратора не управляется. Дополнительные https://go.microsoft.com/fwlink/?linkid=2188435 см. в https://go.microsoft.com/fwlink/?linkid=2188435. </string> <string id="LAPS_BackupDirectoryDisabled">Отключено</string> <string id="LAPS_BackupDirectoryAzure">Azure Active Directory</string> <string id="LAPS_BackupDirectoryAD">Active Directory</string> <string id="LAPS_PasswordSettings">Параметры паролей</string> <string id="LAPS_PasswordSettings_Help">Настройка параметров паролей Сложность пароля: какие символы используются при создании нового пароля По умолчанию: большие буквы, маленькие буквы, цифры и специальные символы Длина пароля Минимум 8 символов Максимум 64 символа По умолчанию: 14 символов Возраст пароля в днях Минимум: 1 день (7 дней, если каталог резервного копирования настроен как Azure AD) Не более 365 дней По умолчанию: 30 дней Длина парольной фразы Минимум: 3 слова Максимум: 10 слов По умолчанию: 6 слов Дополнительные сведения см. на странице https://go.microsoft.com/fwlink/?linkid=2188435. Список парольных фраз взят из "Deep Dive. Новые списки слов EFF для случайных парольных фраз" от Electronic Frontier Foundation и используется под лицензией CC-BY-3.0 Attribution. Дополнительные сведения см. на странице https://go.microsoft.com/fwlink/?linkid=2255471. </string> <string id="LAPS_PwdComplexity_Item_1">Большие буквы</string> <string id="LAPS_PwdComplexity_Item_2">Большие и маленькие буквы</string> <string id="LAPS_PwdComplexity_Item_3">Большие буквы + маленькие буквы + цифры</string> <string id="LAPS_PwdComplexity_Item_4">Большие буквы + маленькие буквы + цифры + специальные знаки</string> <string id="LAPS_PwdComplexity_Item_5">Большие буквы + маленькие буквы + цифры + специальные знаки (улучшенная читаемость)</string> <string id="LAPS_PwdComplexity_Item_6">Парольная фраза (длинные слова)</string> <string id="LAPS_PwdComplexity_Item_7">Парольная фраза (короткие слова)</string> <string id="LAPS_PwdComplexity_Item_8">Парольная фраза (короткие слова с уникальными префиксами)</string> <string id="LAPS_AdminName">Имя учетной записи администратора для управления</string> <string id="LAPS_AdminName_Help">Этот параметр политики указывает пользовательское имя учетной записи администратора для управления паролем. Если этот параметр политики включен, LAPS будет управлять паролем для локальной учетной записи с этим именем. Если этот параметр политики отключен или не настроен, LAPS будет управлять паролем для известной учетной записи администратора. НЕ ВКЛЮЧАЙТЕ этот параметр политики для управления встроенной учетной записью администратора. Встроенная учетная запись администратора определяется автоматически по известному SID и не зависит от имени учетной записи. Дополнительные сведения см. по ссылку https://go.microsoft.com/fwlink/?linkid=2188435. </string> <string id="LAPS_DontAllowPwdExpirationBehindPolicy">Не разрешайте сроку действия пароля превышать время, требуемое политикой.</string> <string id="LAPS_DontAllowPwdExpirationBehindPolicy_Help">Если этот параметр включен или не задан, запланированный срок действия пароля превышает срок действия пароля, заданный политикой "Пароль Параметры". При обнаружении такого срока действия пароль немедленно меняется, а срок действия пароля определяется в соответствии с политикой. Если этот параметр отключен, срок действия пароля может быть больше, чем требуется политикой "Пароль Параметры". Дополнительные https://go.microsoft.com/fwlink/?linkid=2188435 см. в https://go.microsoft.com/fwlink/?linkid=2188435. </string> <string id="LAPS_ADPasswordEncryptionEnabled">Включить шифрование паролей</string> <string id="LAPS_ADPasswordEncryptionEnabled_Help">Если этот параметр включен, управляемый пароль шифруется перед отправкой в Active Directory. Включение этого параметра не действует, если 1) для пароля настроено резервное копирование в Active Directory; 2) режим работы домена Active Directory находится на Windows Server 2016 выше. Если этот параметр включен, а режим работы домена не превышает Windows Server 2016, пароль управляемой учетной записи шифруется. Если этот параметр включен, а режим работы домена меньше Windows Server 2016, пароль управляемой учетной записи не будет архивироваться в каталоге. Если этот параметр отключен, пароль управляемой учетной записи не шифруется. Этот параметр будет включен по умолчанию, если он не настроен. Дополнительные https://go.microsoft.com/fwlink/?linkid=2188435 см. в https://go.microsoft.com/fwlink/?linkid=2188435. </string> <string id="LAPS_ADPasswordEncryptionPrincipal">Настройка авторизованных дешифраторов паролей</string> <string id="LAPS_ADPasswordEncryptionPrincipal_Help">Настройте этот параметр для управления определенным пользователем или группой, которые авторизованы расшифровывать зашифрованные пароли. Настройка этого параметра не действует, если не включено шифрование пароля. Если этот параметр включен, зашифрованные пароли будут расшифровываться указанной группой. Если этот параметр отключен или не настроен, зашифрованные пароли будут расшифровываться группой администраторов домена. В этом параметре необходимо указать либо имя группы или пользователя с указанием домена, либо идентификатор безопасности в строковом формате. Допустимые примеры: contoso\LAPSAdmins lapsadmins@contoso.com S-1-5-21-2127521184-1604012920-1887927527-35197 Не заключайте имя пользователя\группы или идентификатор безопасности в кавычки или круглые скобки. Указанный пользователь или группа должны быть распознаваемы управляемым устройством, иначе пароли не будут сохранены. ПРИМЕЧАНИЕ. Этот параметр игнорируется, когда пароли учетных записей режима восстановления служб каталогов (DSRM) резервируются на контроллере домена. В данном случае этот параметр по умолчанию всегда соответствует группе "Администраторы домена" домена контроллера домена. Дополнительные сведения см. на странице "https://go.microsoft.com/fwlink/?linkid=2188435". </string> <string id="LAPS_ADEncryptedPasswordHistorySize">Настройка размера журнала зашифрованных паролей</string> <string id="LAPS_ADEncryptedPasswordHistorySize_Help">Используйте этот параметр, чтобы указать, сколько предыдущих зашифрованных паролей будет храниться в Active Directory. Настройка этого параметра не действует, если 1) пароль не настроен для резервного копирования в Active Directory и 2) не включено шифрование пароля. Если этот параметр включен, указанное количество старых паролей будет храниться в Active Directory. Если этот параметр отключен или не настроен, в Active Directory не будет храниться ни одного старого пароля. Этот параметр имеет минимально допустимое значение 0 паролей. Этот параметр имеет максимально допустимое значение 12 паролей. Дополнительные сведения см. по ссылке https://go.microsoft.com/fwlink/?linkid=2188435. </string> <string id="LAPS_ADBackupDSRMPassword">Включить резервное копирование паролей для учетных записей DSRM</string> <string id="LAPS_ADBackupDSRMPassword_Help">Если этот параметр включен, пароль учетной записи администратора DSRM будет управляться и архивироваться в Active Directory. Включение этого параметра не действует, если управляемое устройство не является контроллером домена и шифрование паролей также включено. Если этот параметр включен, резервное копирование пароля для учетной записи администратора DSRM на контроллере домена будет выполняться в Active Directory. Если этот параметр отключен или не настроен, резервное копирование пароля для учетной записи администратора DSRM на контроллере домена в Active Directory выполняться не будет. Дополнительные https://go.microsoft.com/fwlink/?linkid=2188435 см. в https://go.microsoft.com/fwlink/?linkid=2188435. </string> <string id="LAPS_PostAuthenticationActions">Действия после проверки подлинности</string> <string id="LAPS_PostAuthenticationActions_Help">Эта политика настраивает действия после проверки подлинности, которые будут выполняться после обнаружения проверки подлинности управляемой учетной записью. Льготный период: указывает количество времени (в часах) ожидания после проверки подлинности перед выполнением указанных действий после проверки подлинности. Если этот параметр включен и больше нуля, указанные действия после проверки подлинности будут выполняться по истечении льготного периода. Если этот параметр отключен или не настроен, указанные действия после проверки подлинности будут выполняться по истечении стандартного 24-часового льготного периода. Если этот параметр равен нулю, никакие действия после проверки подлинности выполняться не будут. Действия: указывает действия, которые следует предпринять по истечении льготного периода. Сброс пароля: по истечении льготного периода пароль управляемой учетной записи сбрасывается. Сброс пароля и выход из управляемой учетной записи: по истечении льготного периода пароль управляемой учетной записи сбрасывается, а для всех интерактивных сеансов входа с использованием управляемой учетной записи выполняется выход. Сброс пароля и перезагрузка: по истечении льготного периода пароль управляемой учетной записи сбрасывается, а управляемое устройство перезагружается. Сброс пароля, выход из управляемой учетной записи и завершение любых оставшихся процессов: по истечении льготного периода пароль управляемой учетной записи сбрасывается, для всех интерактивных сеансов входа с использованием управляемой учетной записи выполняется выход и завершаются любые оставшиеся сеансы. (ПРИМЕЧАНИЕ: после завершения любых интерактивных сеансов входа управляемая учетная запись может по-прежнему использовать другие сеансы с проверкой подлинности. Единственный надежный способ гарантировать, что предыдущий пароль используется дольше, — это перезагрузить устройство.) Если этот параметр отключен или не настроен, действиями после проверки подлинности по умолчанию будут: "Сброс пароля и выход из управляемой учетной записи". Примечание. Учетную запись DSRM на контроллерах домена нельзя настроить для действий после проверки подлинности. Эта политика не влияет на контроллеры домена и будет игнорироваться, даже если она настроена для контроллера домена. Подробнее см. по адресу https://go.microsoft.com/fwlink/?linkid=2188435. </string> <string id="PostAuthenticationActions_Item0">Отключено — не выполнять никаких действий</string> <string id="PostAuthenticationActions_Item1">Сброс пароля</string> <string id="PostAuthenticationActions_Item3">Сбросьте пароль и выйдите из управляемой учетной записи</string> <string id="PostAuthenticationActions_Item5">Сбросьте пароль и перезагрузите устройство</string> <string id="PostAuthenticationActions_Item11">Сбросьте пароль, выйдите из управляемой учетной записи и завершите все оставшиеся процессы</string> <string id="LAPS_AutomaticAccountManagementPolicy">Настройка автоматического управления учетными записями</string> <string id="LAPS_AutomaticAccountManagementPolicy_Help">Эта политика настраивает параметры политики автоматического управления учетной записью. Укажите целевую учетную запись для управления: указывает, следует ли управлять встроенной учетной записью администратора или настраиваемой учетной записью. Автоматическое имя учетной записи (или префикс имени): указывает имя или префикс имени, которое будет использовано для управляемой учетной записи. Если этот параметр политики настроен, Windows LAPS будет использовать его в качестве имени или префикса имени для целевой учетной записи. Если этот параметр политики не настроен, Windows LAPS будет использовать "WLapsAdmin" в качестве имени или префикса имени для целевой учетной записи. Примечание. Это имя используется как префикс, если настроена рандомизация имени учетной записи. См. комментарии ниже. Включить управляемую учетную запись: указывает, следует ли включить управляемую учетную запись. Если этот параметр политики настроен, Windows LAPS включит указанную управляемую учетную запись. Если этот параметр политики не настроен, Windows LAPS отключит указанную управляемую учетную запись. Примечание. Windows LAPS будет поддерживать пароль управляемой учетной записи и производить его периодическую смену независимо от того, находится ли учетная запись в состоянии "включено" или "отключено". Рандомизация имени управляемой учетной записи: указывает, должно ли имя управляемой учетной записи содержать случайный компонент (генерируемый случайным образом численный суффикс). Если этот параметр политики настроен, Windows LAPS добавит восьмизначный числовой суффикс (генерируемый случайным образом) к имени управляемой автоматической учетной записи и будет заново рандомизировать имя управляемой учетной записи при каждой регулярно проводимой очередной смене пароля. Если этот параметр политики не настроен, Windows LAPS будет использовать имя автоматической управляемой учетной записи в том виде, в каком оно настроено. Если настроен префикс имени автоматической управляемой учетной записи, Windows LAPS использует до 12 (двенадцати) начальных символов этого имени в качестве префикса для рандомизированного имени. Если имя автоматической управляемой учетной записи не настроено, Windows LAPS будет использовать в качестве префикса имени "WLapsAdmin". Примечание. Учетную запись DSRM на контроллерах домена нельзя настроить для автоматического управления учетными записями. Эта политика не влияет на контроллеры домена и будет проигнорирована, даже если настроена для контроллера домена. Подробнее см. на странице https://go.microsoft.com/fwlink/?linkid=2188435. </string> <string id="AutomaticAccountManagementTarget_Item0">Управление встроенной учетной записью администратора</string> <string id="AutomaticAccountManagementTarget_Item1">Управление настраиваемой учетной записью администратора</string> <string id="AutomaticAccountName_Help">Укажите имя или префикс имени учетной записи</string> <string id="AutomaticAccountNameRandomization_Help">Указывает, следует ли случайным образом указать имя автоматической учетной записи.</string> <string id="SUPPORTED_Windows10">Не менее Microsoft Windows 10 или более поздней версии</string> </stringTable> <presentationTable> <presentation id="LAPS_BackupDirectory"> <dropdownList refId="LAPS_BackupDirectory" defaultItem="1">Каталог резервного копирования</dropdownList> </presentation> <presentation id="LAPS_PasswordSettings"> <dropdownList refId="LAPS_PasswordComplexity" defaultItem="3">Сложность пароля</dropdownList> <decimalTextBox refId="LAPS_PasswordLength" defaultValue="14">Длина пароля</decimalTextBox> <decimalTextBox refId="LAPS_PasswordAgeDays" defaultValue="30">Срок действия пароля (в днях)</decimalTextBox> <decimalTextBox refId="LAPS_PassphraseLength" defaultValue="6">Длина парольной фразы (в словах)</decimalTextBox> </presentation> <presentation id="LAPS_AdminName"> <textBox refId="TEXT_AdminAccountName"> <label>Имя учетной записи администратора</label> </textBox> </presentation> <presentation id="LAPS_ADPasswordEncryptionPrincipal"> <textBox refId="TEXT_ADPasswordEncryptionPrincipal"> <label>Авторизованный дешифратор паролей</label> </textBox> </presentation> <presentation id="LAPS_ADEncryptedPasswordHistorySize"> <decimalTextBox refId="LAPS_ADEncryptedPasswordHistorySize_INT" defaultValue="0">Размер журнала зашифрованных паролей</decimalTextBox> </presentation> <presentation id="LAPS_PostAuthenticationActions"> <decimalTextBox refId="LAPS_PostAuthenticationResetDelay_INT" defaultValue="24">Льготный период (часы):</decimalTextBox> <dropdownList refId="LAPS_PostAuthenticationActions" defaultItem="2">Действия:</dropdownList> </presentation> <presentation id="LAPS_AutomaticAccountManagementPolicy"> <dropdownList refId="LAPS_AutomaticAccountManagementTarget" defaultItem="0">Укажите целевую учетную запись для управления:</dropdownList> <textBox refId="LAPS_AutomaticAccountManagementNameOrPrefix"> <label>Имя или префикс имени автоматической учетной записи</label> </textBox> <checkBox refId="LAPS_AutomaticAccountManagementEnableAccount">Включить управляемую учетную запись</checkBox> <checkBox refId="LAPS_AutomaticAccountManagementRandomizeName">Рандомизация имени управляемой учетной записи</checkBox> </presentation> </presentationTable> </resources> </policyDefinitionResources>
combined_dataset/train/non-malicious/2165.ps1
2165.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, ParameterSetName="AppName", HelpMessage="Specify the app name to search for within the App Store.")] [ValidateNotNullOrEmpty()] [ValidatePattern("^[A-Za-z\s]*$")] [string]$AppName, [parameter(Mandatory=$true, ParameterSetName="Url", HelpMessage="Specify the URL pointing to the app in the App Store.")] [ValidateNotNullOrEmpty()] [string]$URL, [parameter(Mandatory=$true, ParameterSetName="AppName", HelpMessage="Path to a folder where the app image will be downloaded to.")] [parameter(Mandatory=$true, ParameterSetName="Url")] [ValidateNotNullOrEmpty()] [ValidatePattern("^[A-Za-z]{1}:\\\w+")] [ValidateScript({ if ((Split-Path -Path $_ -Leaf).IndexOfAny([IO.Path]::GetInvalidFileNameChars()) -ge 0) { Throw "$(Split-Path -Path $_ -Leaf) contains invalid characters" } else { if (Test-Path -Path $_ -PathType Container) { return $true } else { Throw "Unable to locate part of or the whole specified path, specify a valid path" } } })] [string]$Path ) Process { $StoreAppName = ($AppName -replace " ", "+").ToLower() switch ($PSCmdlet.ParameterSetName) { "AppName" { $SearchURL = "https://itunes.apple.com/search?term=$($StoreAppName)&entity=software&limit=1" $SearchWebRequest = Invoke-WebRequest -Uri $SearchURL $AppLink = (ConvertFrom-Json -InputObject $SearchWebRequest).Results | Select-Object -ExpandProperty trackViewUrl } "Url" { $AppLink = $URL } } if ($AppLink -ne $null) { $WebRequest = Invoke-WebRequest -Uri $AppLink $AppIcon = $WebRequest.Images | Where-Object { ($_.Width -eq 175) -and ($_.Class -like "artwork") } if ($AppIcon -ne $null) { $WebClient = New-Object System.Net.WebClient $WebClient.DownloadFile($AppIcon."src-swap", "$($Path)\$($AppIcon.alt).jpg") $AppImage = [PSCustomObject]@{ ImageName = $AppIcon.alt ImagePath = "$($Path)\$($AppIcon.alt).jpg" } Write-Output -InputObject $AppImage } } else { Write-Warning -Message "Unable to determine app link for specified app: $($AppName)" } } End { $WebClient.Dispose() }
combined_dataset/train/non-malicious/Get-Codecs.ps1
Get-Codecs.ps1
[string[]]$key = "SOFTWARE\\Classes\\CLSID\\{083863F1-70DE-11d0-BD40-00A0C911CE86}\\Instance", "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Drivers32" function ModuleInfo([string]$path) { $item.SubItems.Add((gci $path).VersionInfo.CompanyName) $item.SubItems.Add((gci $path).VersionInfo.FileDescription) } function ItemsCount { $sbCount.Text = $lvPage1.Items.Count.ToString() + " item(s)" } $mnuScan_Click= { #clear both ListView before each scan $lvPage1.Items.Clear() $lvPage2.Items.Clear() <# Do not use Get-ChildItem cmdlet if you want quick scan! #> $reg = [Microsoft.Win32.Registry]::LocalMachine $rk = $reg.OpenSubKey($key[0]) $rk.GetSubKeyNames() | % { #adding name of filters $name = $reg.OpenSubKey($($key[0] + "\\" + $_)) $item = $lvPage1.Items.Add($name.GetValue("FriendlyName")) $name.Close() #adding its CLSID $item.SubItems.Add($_) #adding path and additional info of filters $path = $reg.OpenSubKey($("SOFTWARE\\Classes\\CLSID\\" + "\\" + $_ + "\\InprocServer32")) $item.SubItems.Add($path.GetValue("")) ModuleInfo($path.GetValue("")) $path.Close() } $rk.Close() $rk = $reg.OpenSubKey($key[1]) $rk.GetValueNames() | % { $item = $lvPage2.Items.Add($_) #hypothetical directory $file = $rk.GetValue($_) if (-not (Test-Path $file)) { #another possible directory of driver $pos = [Environment]::SystemDirectory + "\\" + $file if (Test-Path $pos) { $item.SubItems.Add($pos) ModuleInfo($pos) } } else { $item.SubItems.Add($file) ModuleInfo($file) } } $rk.Close() ItemsCount } $tcPage2_Enter= { $sbCount.Text = $lvPage2.Items.Count.ToString() + " item(s)" } #this is about form load function $frmMain_Load= { try { $icon = [Drawing.Icon]::ExtractAssociatedIcon($($pshome + "\\powershell.exe")) $pbImage.Image = $icon.ToBitmap() } catch {} } function frmMain_Show { Add-Type -AssemblyName System.Windows.Forms [Windows.Forms.Application]::EnableVisualStyles() $frmMain = New-Object Windows.Forms.Form $mnuMain = New-Object Windows.Forms.MainMenu $mnuFile = New-Object Windows.Forms.MenuItem $mnuScan = New-Object Windows.Forms.MenuItem $mnuExit = New-Object Windows.Forms.MenuItem $mnuHelp = New-Object Windows.Forms.MenuItem $mnuInfo = New-Object Windows.Forms.MenuItem $tabCtrl = New-Object Windows.Forms.TabControl $tcPage1 = New-Object Windows.Forms.TabPage $lvPage1 = New-Object Windows.Forms.ListView $chFName = New-Object Windows.Forms.ColumnHeader $chCLSID = New-Object Windows.Forms.ColumnHeader $chFPath = New-Object Windows.Forms.ColumnHeader $chFPubl = New-Object Windows.Forms.ColumnHeader $chFDesc = New-Object Windows.Forms.ColumnHeader $tcPage2 = New-Object Windows.Forms.TabPage $lvPage2 = New-Object Windows.Forms.ListView $chDName = New-Object Windows.Forms.ColumnHeader $chDPath = New-Object Windows.Forms.ColumnHeader $chDPubl = New-Object Windows.Forms.ColumnHeader $chDDesc = New-Object Windows.Forms.ColumnHeader $sbCount = New-Object Windows.Forms.StatusBar # #mnuMain # $mnuMain.MenuItems.AddRange(@($mnuFile, $mnuHelp)) # #mnuFile # $mnuFile.MenuItems.AddRange(@($mnuScan, $mnuExit)) $mnuFile.Text = "&File" # #mnuScan # $mnuScan.Shortcut = "F5" $mnuScan.Text = "&Scan" $mnuScan.Add_Click($mnuScan_Click) # #mnuExit # $mnuExit.Shortcut = "CtrlX" $mnuExit.Text = "E&xit" $mnuExit.Add_Click({$frmMain.Close()}) # #mnuHelp # $mnuHelp.MenuItems.AddRange(@($mnuInfo)) $mnuHelp.Text = "&Help" # #mnuInfo # $mnuInfo.Text = "About" $mnuInfo.Add_Click({frmAbout_Show}) # #tabCtrl # $tabCtrl.Controls.AddRange(@($tcPage1, $tcPage2)) $tabCtrl.Dock = "Fill" # #tcPage1 # $tcPage1.Controls.AddRange(@($lvPage1)) $tcPage1.Text = "DirectShow" $tcPage1.UseVisualStyleBackColor = $true $tcPage1.Add_Enter($tcPage1_Enter) # #lvPage1 # $lvPage1.AllowColumnReorder = $true $lvPage1.Columns.AddRange(@($chFName, $chCLSID, $chFPath, $chFPubl, $chFDesc)) $lvPage1.Dock = "Fill" $lvPage1.FullRowSelect = $true $lvPage1.GridLines = $false $lvPage1.MultiSelect = $false $lvPage1.ShowItemToolTips = $true $lvPage1.Sorting = "Ascending" $lvPage1.View = "Details" # #chFName # $chFName.Text = "Name" $chFName.Width = 110 # #chCLSID # $chCLSID.Text = "CLSID" $chCLSID.Width = 241 # #chFPath # $chFPath.Text = "Path" $chFPath.Width = 215 # #chFPubl # $chFPubl.Text = "Publisher" $chFPubl.Width = 145 # #chFDesc # $chFDesc.Text = "Description" $chFDesc.Width = 300 # #tcPage2 # $tcPage2.Controls.AddRange(@($lvPage2)) $tcPage2.Text = "Drivers" $tcPage2.UseVisualStyleBackColor = $true $tcPage2.Add_Enter($tcPage2_Enter) # #lvPage2 # $lvPage2.AllowColumnReorder = $true $lvPage2.Columns.AddRange(@($chDName, $chDPath, $chDPubl, $chDDesc)) $lvPage2.Dock = "Fill" $lvPage2.FullRowSelect = $true $lvPage2.GridLines = $false $lvPage2.MultiSelect = $false $lvPage2.ShowItemToolTips = $true $lvPage2.Sorting = "Ascending" $lvPage2.View = "Details" # #chDName # $chDName.Text = "Name" $chDName.Width = 100 # #chDPath # $chDPath.Text = "Path" $chDPath.Width = 210 # #chDPubl # $chDPubl.Text = "Publisher" $chDPubl.Width = 145 # #chDDesc # $chDDesc.Text = "Description" $chDDesc.Width = 300 # #sbCount # $sbCount.SizingGrip = $false # #frmMain # $frmMain.ClientSize = New-Object Drawing.Size(573, 217) $frmMain.Controls.AddRange(@($tabCtrl, $sbCount)) $frmMain.Menu = $mnuMain $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "Codecs" [void]$frmMain.ShowDialog() } function frmAbout_Show { $frmMain = New-Object Windows.Forms.Form $pbImage = New-Object Windows.Forms.PictureBox $lblName = New-Object Windows.Forms.Label $lblCopy = New-Object Windows.Forms.Label $btnExit = New-Object Windows.Forms.Button # #pbImage # $pbImage.Location = New-Object Drawing.Point(16, 16) $pbImage.Size = New-Object Drawing.Size(32, 32) $pbImage.SizeMode = "StretchImage" # #lblName # $lblName.Font = New-Object Drawing.Font("Microsoft Sans Serif", 9, [Drawing.FontStyle]::Bold) $lblName.Location = New-Object Drawing.Size(53, 19) $lblName.Size = New-Object Drawing.Size(360, 18) $lblName.Text = "Codecs v1.00" # #lblCopy # $lblCopy.Location = New-Object Drawing.Point(67, 37) $lblCopy.Size = New-Object Drawing.Size(360, 23) $lblCopy.Text = "(C) 2012 Greg Zakharov gregzakh@gmail.com" # #btnExit # $btnExit.Location = New-Object Drawing.Point(135, 67) $btnExit.Text = "OK" # #frmMain # $frmMain.AcceptButton = $btnExit $frmMain.CancelButton = $btnExit $frmMain.ClientSize = New-Object Drawing.Size(350, 110) $frmMain.ControlBox = $false $frmMain.Controls.AddRange(@($pbImage, $lblName, $lblCopy, $btnExit)) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.ShowInTaskbar = $false $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "About..." $frmMain.Add_Load($frmMain_Load) [void]$frmMain.ShowDialog() } frmMain_Show
combined_dataset/train/non-malicious/sample_42_71.ps1
sample_42_71.ps1
let resizeObserver; let observerAddRemove; export function FluentOverflowInitialize(dotNetHelper, id, isHorizontal, querySelector) { var localSelector = querySelector; if (!localSelector) { // cannot use :scope for node.matches() further down localSelector = ".fluent-overflow-item"; } // Create a Add/Remove Observer, started later observerAddRemove = new MutationObserver(mutations => { mutations.forEach(mutation => { // Only new node (type=childList) if (mutation.type !== 'childList' && (mutation.addedNodes.length > 0 || mutation.removedNodes.length > 0)) { return } // Only for localSelector element const node = mutation.addedNodes.length > 0 ? mutation.addedNodes[0] : mutation.removedNodes[0]; if (node.nodeType !== Node.ELEMENT_NODE || !node.matches(localSelector)) { return; } FluentOverflowResized(dotNetHelper, id, isHorizontal, querySelector); }); }); // Create a ResizeObserver, started later resizeObserver = new ResizeObserver((entries) => { FluentOverflowResized(dotNetHelper, id, isHorizontal, querySelector); }); // Start the resize observation var el = document.getElementById(id); if (el) { resizeObserver.observe(el); observerAddRemove.observe(el, { childList: true, subtree: false }); } } // When the Element[id] is resized, set overflow attribute to all element outside of this element. // Except for elements with fixed attribute. export function FluentOverflowResized(dotNetHelper, id, isHorizontal, querySelector) { let container = document.getElementById(id); // Container if (!container) return; if (!querySelector) { querySelector = ":scope .fluent-overflow-item"; } else { querySelector = ":scope " + querySelector; } let items = container.querySelectorAll(querySelector + ":not([fixed])"); // List of first level element of this container let fixedItems = container.querySelectorAll(querySelector + "[fixed]"); // List of element defined as fixed (not "overflowdable") let itemsTotalSize = 10; let containerMaxSize = isHorizontal ? container.offsetWidth : container.offsetHeight; let overflowChanged = false; let containerGap = parseFloat(window.getComputedStyle(container).gap); if (!containerGap) containerGap = 0; // Size of all fixed elements fixedItems.forEach(element => { element.overflowSize = isHorizontal ? getElementWidth(element) : getElementHeight(element); element.overflowSize += containerGap; itemsTotalSize += element.overflowSize; }); // Add overflow attribute, if the element is out of total size. items.forEach(element => { let isOverflow = element.hasAttribute("overflow"); // Compute element size (if not already set) // Save this element.size in the attribute 'overflowSize' if (!isOverflow) { element.overflowSize = isHorizontal ? getElementWidth(element) : getElementHeight(element); element.overflowSize += containerGap; } itemsTotalSize += element.overflowSize; // Only check for overflow if the container has a size if (containerMaxSize > 0) { if (itemsTotalSize > containerMaxSize) { // Add an attribute 'overflow' if (!isOverflow) { element.setAttribute("overflow", ""); overflowChanged = true; } } else { // Remove the attribute 'overflow' if (isOverflow) { element.removeAttribute("overflow"); overflowChanged = true; } } } }); // If an attribute 'overflow' has been added or removed, // raise a C# method if (overflowChanged) { let listOfOverflow = []; items.forEach(element => { listOfOverflow.push({ Id: element.id, Overflow: element.hasAttribute("overflow"), Text: element.innerText.trim() }); }); dotNetHelper.invokeMethodAsync("OverflowRaisedAsync", JSON.stringify(listOfOverflow)); } } export function FluentOverflowDispose(id) { let el = document.getElementById(id); if (el) { resizeObserver.unobserve(el); observerAddRemove.disconnect(); } } // Compute the element Width, including paddings, margins and borders. function getElementWidth(element) { var style = element.currentStyle || window.getComputedStyle(element); var width = element.offsetWidth; // Width including paddings and borders var margin = parseFloat(style.marginLeft) + parseFloat(style.marginRight); return width + margin; } // Compute the element Height, including paddings, margins and borders. function getElementHeight(element) { var style = element.currentStyle || window.getComputedStyle(element); var height = element.offsetHeight; // Height including paddings and borders var margin = parseFloat(style.marginTop) + parseFloat(style.marginBottom); return height + margin; } // SIG // Begin signature block // SIG // MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // OVSU4FwfxqCigUOdQy4t0+ZuqQForRPJCjbwpMZp72Cg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghoKMIIaBgIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCD7qfkVO3228H31OQ1IzQEEkmK54um1CnLg // SIG // rNpPYAMW+TBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBALs02E8S // SIG // R/7IshLNvgIAnNrPupoLI6vafBs5uacwa9gsODJqjHOE // SIG // i303ZgzTKwdq+V7DxBzBv1CtbFlhS37lNa6XP4JXNhRJ // SIG // PEC1djIRSSFDiNs0SyTNf8bTpOE1W7JIXvJOGW0XzJp1 // SIG // zdSNaFeeMfIghMCWSFAnAIM3KZt9Yrm1Yk96HzsaFWs1 // SIG // FeEzpTDRPhdYMBs7PzPTpqvBCXXFFIsTK1XgyGu1Kp+g // SIG // OjpmrMmRYZJ9d0X12iDPSKNp01sWqcdM/HU3WuKbuEuR // SIG // /mSbkrZVdl23rq9xd3GhrFqhRa1EAN0LF1/m8Tsm/69l // SIG // UvfFYGpSXH92z9N7Bm1WIoXbJb2hgheUMIIXkAYKKwYB // SIG // BAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdtMIIX // SIG // aQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN // SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgqbEtzQZzNhx0t0phWPu+ // SIG // nkEBctKm6hvoKotkNyHwL/oCBmYX3JEvYhgTMjAyNDA0 // SIG // MTQyMTIwMDQuNzM4WjAEgAIB9KCB0aSBzjCByzELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0 // SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo // SIG // aWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYD // SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl // SIG // oIIR6jCCByAwggUIoAMCAQICEzMAAAHr4BhstbbvOO0A // SIG // AQAAAeswDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTM0WhcN // SIG // MjUwMzA1MTg0NTM0WjCByzELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl // SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO // SIG // OkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG // SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEAwRVoIdpW4Fd3iadN // SIG // aKomhQbmGzXO4UippLbydeTawfwwW6FKMPFjzkz8W5+4 // SIG // HJiDhpsCZHfk8hceyjp868Z6Ad4br7/dX2blLoCLCk5w // SIG // L4NgVP53ze2c5/SpNZqbidu0usVAx+KHRYl+dSAnCpeh // SIG // BuHMSoHAwIp4oU/Ma6CVlQEy+6fG2358LHNaYoWZnLyL // SIG // mBp29U2PbZ6XQoVq/RAEbgqN04kRozNi6eKYk9pQ+YZ3 // SIG // d1Whk3qTasmpKZAhldPnCvFbvx5CGXb8vs+RC96I03RS // SIG // y+byfSAKIFn91wLt3e0qRWmqHosdHtaueQA/eGcAz/os // SIG // 6i2nbAUd7c46tkX6wjS/k5ov42pUbaPyem4eHz4RxE5w // SIG // wu/E9cn11EHRrZif7rSPwDcYux1fIAD84nfU2IzD22Kh // SIG // vMucc/oCP0hco/mirRx1pisxFz7bV8wHHsSdRB+8G7ol // SIG // ZN7BKzyvTC4NV2+oTORyFgNIxAGYShMneYR9lzIm82pG // SIG // 6drNhCUFmrEHOAzGhdRLENQs4ApQ2CGBuq1IbnXyO5PC // SIG // /SighLn0WyuZXUWDQKnXa/8kiX7mb9z0t/r7Q+l+qtR+ // SIG // FDpowynY6Ft6rOyUTGZh/X5BZDM2+mEs6+nl9S6GJtz6 // SIG // ztSXmuN0mM5Qd08/ODr7lUlezXInVbTaomXllqVY32r0 // SIG // fiY/yTkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBR0ngWs // SIG // 1lXMbuKk/TuY09gfqgHq4TAfBgNVHSMEGDAWgBSfpxVd // SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ // SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz // SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB // SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG // SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j // SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt // SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB // SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G // SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // g3TfL6D3fAvlVmT9/lvO3P0G3W1itLDrfWeJBDlp4Oyp // SIG // oflg9i5zyUySiBGsZ4jnLfcDICfMkMsEfFh4Azr28Kna // SIG // rC1GjODa3q7SOhSPa4Y4XmisTTZwWcx2Sw8JZC/bwhA3 // SIG // vUXNHRklXeQYNwlpJ1d7r1WrteBeeREk1iATWkEvQqaN // SIG // jqc93EYAGFX2ixRmwKzXEb0lr0lG3iNiA6kcQuMQW0Yj // SIG // UPtah1wwj59IRrF3y/spw2Z3An7Mza5YGU9uF4Ib082D // SIG // B3F4qC1WKP9h5MqMOnSO7lCyWysS1/MB4bIsK4lyAwp4 // SIG // y1bBtBOW0fNkIHLHhIcW1NndUVR3ELZFBO1vc8Wamev4 // SIG // z5mqI2YF0Dt9148Th2GFWvwV3CLrvEjMz44wAG7o8E2s // SIG // KWsywb/fey0QdGTmzXJCWMkEKRE0n5Td+o1vs+0f5xsi // SIG // akWdx7WdZV1tX+sxAgHj/vXcup5nAq1XDqm0B1+2a/Fj // SIG // 3IIRyQAA5ZuRMT4ecYtbTUZPouhdmvUqU3kJ2Vz+dMPi // SIG // aE8SEkKu7wYo9p4rQLEi2lXjKqD4vjV5U1DWdjXbWxa+ // SIG // iIq/WSvbn2s9xcX7w2aN+ubyzqM5kDnv2fqbuL2Ocz5r // SIG // TYlSHEJxcuyWTomVQyOWyHcEEWotqrhyiepbVHbItx4z // SIG // Z4nrhO9n0+HlocbZpzeR2AgwggdxMIIFWaADAgECAhMz // SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA // SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN // SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp // SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx // SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX // SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD // SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV // SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw // SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA // SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 // SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF // SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc // SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus // SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130 // SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI // SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes // SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp // SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+ // SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz // SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO // SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi // SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5 // SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q // SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H // SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG // SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE // SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf // SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG // SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw // SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv // SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH // SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f // SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK // SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu // SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w // SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq // SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 // SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT // SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL // SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l // SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ // SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz // SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7 // SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY // SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX // SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU // SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz // SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/ // SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1 // SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328 // SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG // SIG // ahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGkgc4w // SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n // SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p // SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV // SIG // BAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1RTAtRDk0 // SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAgAaJdbtcMMGI // SIG // FLVKMDJ6mL27pd6ggYMwgYCkfjB8MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T // SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOnG // SIG // T0IwIhgPMjAyNDA0MTQxMjQ5MDZaGA8yMDI0MDQxNTEy // SIG // NDkwNlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6cZP // SIG // QgIBADAHAgEAAgIOkDAHAgEAAgIUEDAKAgUA6cegwgIB // SIG // ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMC // SIG // oAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 // SIG // DQEBCwUAA4IBAQBwqqYuuhVqKc0pAUp1bHlJfp+UNC/Z // SIG // DeJoVoQuYX4IXtHUDJKE5Ovr9w/R1VHpWQ05kI6XxclV // SIG // crbFTN8mDRqOzOMB5qOITH60fHmSeTXg20y6TJEe77AB // SIG // EilrRmjW0vw/WrgnUrTE7qhxrCnmxDc34qliPCMWh52z // SIG // 3DayCciwoI9xyMfyyFqi4Hb7zL1XEnMWyJZKm44MOsFE // SIG // CXSBJDZwDr1VZxCXsmRELvHs64lxe+kAVpiQUSAwo3o/ // SIG // xpu99WfRgxuEh0EhNH4xIO/3RWT0cF5v74hDJyT+r4ID // SIG // AFDhj8BiG0be6CGWZqqKvWDs/7BfXrbjhLW6Ws2eYWUk // SIG // iBVRMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx // SIG // EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl // SIG // ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh // SIG // dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh // SIG // bXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAesw // SIG // DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzEN // SIG // BgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgPu+a // SIG // Gp8ilLRDML394PFnRbx6HeDCG9RYwhUhXkJAaBIwgfoG // SIG // CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDOt2u+X2kD // SIG // 4X/EgQ07ZNg0lICG3Ys17M++odSXYSws+DCBmDCBgKR+ // SIG // MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n // SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p // SIG // Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB // SIG // 6+AYbLW27zjtAAEAAAHrMCIEIPM5gZTPWQg2Z1FWI5sU // SIG // YN0/dV/LBIasPfKr8EWvjzSkMA0GCSqGSIb3DQEBCwUA // SIG // BIICADLSSz9BceflyOlbDy/Zu2ZYqMNlrvGhXJq4Le1H // SIG // I/mwgVvktsCe4jBxrOklWQM2/+oh0mUHuoGgNWl65CB/ // SIG // gaQ55mJPXNZR1J57KynKIxNPWPwyUDhzyUbIesv/PCMN // SIG // VvPkAuHTrE3PU8Twwyb8Br+XZ/qBXyAnJeKuHvOEPVun // SIG // 1DmsH833TI7a2DLxrA6QS7XlE5HsY2ArLgMReArqE3rZ // SIG // kP6KqN4k84XeTiokYoi1U9AUf65RwNtNe2FKLmM2FoIo // SIG // VabPtj/gt6LI4F4/W+6J3VgzZ893AN5hasJMqRl/Mu07 // SIG // HbXOPjrpdfM3DmVm7QDPPmCvIqrP2z74GYJFnwGy8hmV // SIG // bHAG9Lz1xwNP/+Xt//Nz+3BduzJ+7ZAYT88y9vY88lYk // SIG // XDu3GUQMU4MORSgqUmuw5X9e7vQQzF2/NthYYmCrN6fK // SIG // ZVHOvcK0zE5y6Jobu40sKmgFHUFJmDpTMai9lD+QNTsK // SIG // gsEeSgNKT/uaDv+h6mhMRBCR3fGwtCEI44+o3nQeK+v4 // SIG // ulAUISu8W3C8YymnWFsQD/DjB67CAD945no61fNYRSLA // SIG // 8WtgtNcJjv5NzgzKEdAFp0fhLvmfDkvs+ZtQkYuwxxok // SIG // IK65QDZTYnX0ICqKO93z+fkYuX5a11HI1KgZiLjCvfpD // SIG // 6TUS5CgE9ANJwchIJmkD8uja5hgF // SIG // End signature block
combined_dataset/train/non-malicious/sample_29_60.ps1
sample_29_60.ps1
# # Module manifest for module 'OCI.PSModules.Globallydistributeddatabase' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Globallydistributeddatabase.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '31a94d9b-5cc3-4808-88f0-6b82ed090ffe' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Globallydistributeddatabase Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Globallydistributeddatabase.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIGloballydistributeddatabaseNetwork', 'Get-OCIGloballydistributeddatabasePrivateEndpoint', 'Get-OCIGloballydistributeddatabasePrivateEndpointsList', 'Get-OCIGloballydistributeddatabaseShardedDatabase', 'Get-OCIGloballydistributeddatabaseShardedDatabasesList', 'Get-OCIGloballydistributeddatabaseWorkRequest', 'Get-OCIGloballydistributeddatabaseWorkRequestErrorsList', 'Get-OCIGloballydistributeddatabaseWorkRequestLogsList', 'Get-OCIGloballydistributeddatabaseWorkRequestsList', 'Invoke-OCIGloballydistributeddatabaseConfigureShardedDatabaseGsms', 'Invoke-OCIGloballydistributeddatabaseConfigureSharding', 'Invoke-OCIGloballydistributeddatabaseDownloadGsmCertificateSigningRequest', 'Invoke-OCIGloballydistributeddatabaseFetchConnectionString', 'Invoke-OCIGloballydistributeddatabaseFetchShardableCloudAutonomousVmClusters', 'Invoke-OCIGloballydistributeddatabasePatchShardedDatabase', 'Invoke-OCIGloballydistributeddatabasePrevalidateShardedDatabase', 'Move-OCIGloballydistributeddatabasePrivateEndpointCompartment', 'Move-OCIGloballydistributeddatabaseShardedDatabaseCompartment', 'New-OCIGloballydistributeddatabaseGsmCertificateSigningRequest', 'New-OCIGloballydistributeddatabasePrivateEndpoint', 'New-OCIGloballydistributeddatabaseShardedDatabase', 'New-OCIGloballydistributeddatabaseWallet', 'Remove-OCIGloballydistributeddatabasePrivateEndpoint', 'Remove-OCIGloballydistributeddatabaseShardedDatabase', 'Start-OCIGloballydistributeddatabaseShardedDatabase', 'Stop-OCIGloballydistributeddatabaseShardedDatabase', 'Update-OCIGloballydistributeddatabasePrivateEndpoint', 'Update-OCIGloballydistributeddatabaseShardedDatabase', 'Write-OCIGloballydistributeddatabaseSignedCertificateAndGenerateWallet' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Globallydistributeddatabase' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_23_43.ps1
sample_23_43.ps1
$ServerCertificateName = "CN=ServiceFabricServerCert" $ClientCertificateName = "CN=ServiceFabricClientCert" function IsSecurityX509([string]$ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $properties = $jsonConfig.properties if ($properties -ne $Null) { $security = $properties.security if ($security -ne $Null ) { $clusterCredentialType = $security.ClusterCredentialType return ($clusterCredentialType -ne $Null -And $clusterCredentialType -eq "X509") } } return $False } function IsLocalMachine([string] $MachineName) { return ($MachineName -eq $env:ComputerName) -Or ($MachineName -eq "localhost") } function GetHostName([string] $iPAddress) { $hostName = $iPAddress if ([bool]($iPAddress -as [ipaddress])) { $hostName = [System.Net.Dns]::GetHostByAddress($iPAddress).HostName } return $hostName } function IsThisMachineServer([string] $ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes Foreach ($node in $nodes) { $hostName = GetHostName -iPAddress $node.iPAddress if (IsLocalMachine -MachineName $hostName) { return $True; } } return $False } function InstallCertToLocal([string] $CertSetupScript) { invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ServerCertificateName'" invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ClientCertificateName'" $cerLoc = "cert:\LocalMachine\My" $cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ServerCertificateName*" } $serverthumbprint = $cert.Thumbprint $cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ClientCertificateName*" } $clientthumbprint = $cert.Thumbprint return $serverthumbprint,$clientthumbprint } function IsOneBox([string] $ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $machineNames = $nodes.iPAddress | select -uniq return ($machineNames.Count -eq 1) } function ExportCertificateToLocal([string]$PackageRoot, [string]$CertSetupScript, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$ClusterConfigFilePath) { $serverCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $serverThumbprint -Name "server" $clientCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $clientThumbprint -Name "client" Write-Host "Server certificate is exported to $($serverCertificate[0]) with the password $($serverCertificate[1])" Write-Host "Client certificate is exported to $($clientCertificate[0]) with the password $($clientCertificate[1])" # If the current machine is server, then remove the client cert. If the current machine is client, then remove server cert. if (IsThisMachineServer -ClusterConfigFilePath $ClusterConfigFilePath) { if (-Not (IsOneBox -ClusterConfigFilePath $ClusterConfigFilePath)) { Write-Host "Remove client certificate on localhost." invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ClientCertificateName'" } } else { Write-Host "Remove server certificate on localhost." invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ServerCertificateName'" } return $serverCertificate } function ExportCertificate([string]$PackageRoot, [string]$Thumbprint, [string] $Name) { $OutputCertificateFolder = Join-Path $PackageRoot "Certificates" if (-Not(Test-Path $OutputCertificateFolder)) { try { New-Item -ItemType Directory -Force -Path $OutputCertificateFolder -ErrorAction Stop | Out-Null } catch { Write-Error "Unable to create output certificate directory $OutputCertificateFolder. Error: $_" exit 1 } } $PfxFilePath = "$OutputCertificateFolder\$Name.pfx" $randomnum = Get-Random $pswd = ConvertTo-SecureString -String "$randomnum" -Force -AsPlainText Get-ChildItem -Path "cert:\localMachine\my\$Thumbprint" | Export-PfxCertificate -FilePath $PfxFilePath -Password $pswd > $null return $PfxFilePath,$randomnum } function ModifyJsonThumbprint([string]$ClusterConfigFilePath, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$OutputPath) { Write-Host "Modify thumbprint in $ClusterConfigFilePath" $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $securityCertInfo = New-Object -TypeName PSObject $certificate= New-Object –TypeName PSObject $certificate | Add-Member -Name "Thumbprint" -value "$ServerThumbprint" -MemberType NoteProperty $certificate | Add-Member -Name "X509StoreName" -value "My" -MemberType NoteProperty $clientcertificate = New-Object -TypeName PSObject $clientcertificate | Add-Member -Name "CertificateThumbprint" -value "$ClientThumbprint" -MemberType NoteProperty $clientcertificate | Add-Member -Name "IsAdmin" -value $true -MemberType NoteProperty $clientcertificateArray = @() $clientcertificateArray += $clientcertificate $securityCertInfo | Add-Member -Name "ClusterCertificate" -value $certificate -MemberType NoteProperty $securityCertInfo | Add-Member -Name "ServerCertificate" -value $certificate -MemberType NoteProperty $securityCertInfo | Add-Member -Name "ClientCertificateThumbprints" -value $clientcertificateArray -MemberType NoteProperty if (IsReverseProxyEndPointConfigured -ClusterConfigFilePath $ClusterConfigFilePath) { $securityCertInfo | Add-Member -Name "ReverseProxyCertificate" -value $certificate -MemberType NoteProperty } $jsonConfig.properties.security.CertificateInformation = $securityCertInfo $jsonObject = ConvertTo-Json $jsonConfig -Depth 10 $jsonObject > $OutputPath } function IsReverseProxyEndPointConfigured([string]$ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $properties = $jsonConfig.properties $nodetypes = $properties.nodetypes foreach($node in $nodes) { $nodetypeRef = $node.nodetypeRef foreach($nodetype in $nodetypes) { if ($nodetype.Name -eq $nodetypeRef) { if ($nodetype.reverseProxyEndpointPort -ne $Null) { return $True; } } } } return $False } function AddToTrustedHosts([string]$MachineName) { Write-Host "Adding $MachineName to TrustedHosts" Set-Item WSMan:\localhost\Client\TrustedHosts -Value "$MachineName" -Concatenate -Force } function InstallCertToRemote([string]$ClusterConfigFilePath, [string]$CertificatePath, [string]$Password) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $pswd = ConvertTo-SecureString -String $Password -Force -AsPlainText $certBytes = [System.IO.File]::ReadAllBytes($CertificatePath) $iPAddressList = $nodes.iPAddress | select -uniq Foreach ($iPAddress in $iPAddressList) { $machineName = GetHostName -iPAddress $iPAddress if (IsLocalMachine -MachineName $machineName) { Write-Host "Skipping certificate installation in $machineName." continue } AddToTrustedHosts -MachineName $machineName Write-Host "Connectting to $machineName" for($retry = 0; $retry -le 2; $retry ++) { Write-Host "Installing server certificate in $machineName for iteration $retry" Invoke-Command -ComputerName $machineName -ScriptBlock { param($pswd, $certBytes) Get-ChildItem -Path Cert:\LocalMachine\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force Get-ChildItem -Path Cert:\LocalMachine\root | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force Get-ChildItem -Path Cert:\CurrentUser\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force $certPath = [System.IO.Path]::GetTempFileName() [system.IO.file]::WriteAllBytes($certPath, $certBytes); Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\My -FilePath $certPath -Password $pswd > $null Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\root -FilePath $certPath -Password $pswd > $null Import-PfxCertificate -Exportable -CertStoreLocation Cert:\CurrentUser\My -FilePath $certPath -Password $pswd > $null } -ArgumentList $pswd,$certBytes if ($?) { Write-Host "Installed server certificate in $machineName" break } if ($retry -eq 2) { Write-Host "Installing server certificate in $machineName failed after 3 attemps" } else { Write-Host "Unable to intall server certificate in $machineName, retry after 30 seconds..." Start-Sleep -Seconds 30 } } } } # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBes9mKwSwmEyt5 # rlIN/UE8nv4hdY7kCy+udFdDWSrVDaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA+B+EZukwaT8LuzTsxMFVRL # J48wx+tVOjsI7NKS8YM/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkBHW6rSjAhaOM+iRr9TSC5ZGNtbJNXUrzrnPoqiyVgB5yQzA2OGnegVr # DT0rmyYlObUahXRvRRJxS9/sC2fRyWH0ENaZ9VN3vWud8ShN0s1weHCVWN9wKR4O # 0RpZByMbrz2vv7mr3YMeXfajH8hVndyjHKUHwkCf6R8OOKwW7IokiU/rm32hsqx3 # GYdLvtVlTlOWPPzymCs6AHb47f330Lv9PEp064ojyGNEAme3lFNbg7sJ22jn5IDD # IM/MJPqS81zSImej+NQ/IYOi9KtvxM5IJQf1Te2hiWi2WHtY7mRV9cEzZqNQCJ4p # 64k2PeEBglzgjw5Wl6tRuTFwSrM0xaGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDzs93g97dEi25QECWYQnj685YN+0NpiYsK2+PhwUGJVQIGZc4NjVQM # GBMyMDI0MDIxNTIxNDg0Ni40NDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHsMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP # MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XiMBDAiGA8yMDI0MDIxNTEzMTEz # MloYDzIwMjQwMjE2MTMxMTMyWjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpeIwE # AgEAMAkCAQACAQYCAf8wBwIBAAICEGUwCgIFAOl53YQCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAAyppjNtMaK3exqVr0XKhQZ3TH629EVMQIJF583jdnZjx # pxjkULaLAkHOj8taW1HyxQ/uFJaba7yTfns/CIuGc2nLuRAr1+puVtc2Te/EzKcr # OhXgOcoThxjGGsyjA1wf4emKeRYExK7zOeFc2W3QYrw/U0J9dTI6OSGE8Ir2G3Yz # e7rTQ1UivDBOp5HhjkvmNNPvBm1vfS6iE6xW5ku7KQPtzmY8qdcVtujTqXFmeo2F # pAhaVVTFDFka6QWr0nME3XR1uLQe3X/0xia0Fa+VTmnWURAAN3DOZw13Ilu0rYsg # 81lb9cTgwMnNpHGDLB6SWNJyzCDpZyWt0VW2MIcTBjGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB88UKQ64DzB0xAAEAAAHz # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIEbEpALSkvfhQn+NOIGg+92HAzrAKSBgLZr2OnYxltIE # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgGLzZNIu24bhWSnzAGYmT9P5E # CHzjWwb9oM7DGDo7YugwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAiBCAEb2+7Ts1WUcNQtYDML7vx8Jgp # 8YvKbMP/ElU6xdpRQTANBgkqhkiG9w0BAQsFAASCAgB0eKczg5dOdYccHFdJLu9a # 75AXT1vpr3I6Ds5LiU0+kWu+HgumgBnDrfP445L1RQqkOHlK6yi6dVspHf/vzttq # h0Z2QoeAVJIjEcaiypTAxbjGhCzj13WMRRo8ZE94N6nG/msnKGbgOJTl0IB9OXfz # Pxv65iOCVYWuLUXj++kbtWvUdnAwrQhMF4bvcoXG/l+7ZlXIhEWeJmHV1/ZW8vBl # Mqky/OL7ZFqSycG+01GPPgGJYqr/sqh/mVhm8ihjpYlS20a5PRdF6ZuppKKo9hQ2 # KEDTfjJst4kdPzYRK0Q9K2xwjiWHIkWOvBpBWOE7HB0HZc+AuXwNxLfpGvumriCL # Wbj16Nq6ktmlLb7y1JIUpijUMMa8X9H5Pq23Ko9FH9kh7vYYeUByejajjz3HnfTh # oQjAK34FjfBjShl61Iw/7G4yE4dNaFsxmE9htcvBwZbKBL16YUijhNKiWBzEvftB # dBIMrM+HFFGNPEVUvu4DPL9zRvJaguTFCwZV7HEArCxIQI6360Tj41u+Eehs/v2N # npI5AiQ9D4ZCZu0WJFdF8c5op7Si+YECQj7jHmIY3oyIdSre69+CDCJznl9YdBAP # 9X0q6NPtflV+FRTUDQ+reR5pDPY4hEyOtfbdc8Yy2hKBYvbxVjmciQ6cl8D03Tdf # lw38POMclcfUHgW5tf6+YA== # SIG # End signature block
combined_dataset/train/non-malicious/Connect-VMHost_1.ps1
Connect-VMHost_1.ps1
#requires -version 2 #requires -pssnapin VMware.VimAutomation.Core Function Connect-VMHost { <# .Summary Used to Connect a disconnected host to vCenter. .Parameter VMHost VMHost to reconnect to virtual center .Example Get-VMHost | Where-Object {$_.state -eq "Disconnected"} | Connect-VMHost Will Attempt to reconnect any host that are currently disconnected. .Example Connect-VMHost -Name ESX1.get-admin.local Will reconnect ESX1 to vCenter #> [CmdletBinding( SupportsShouldProcess=$True, SupportsTransactions=$False, ConfirmImpact="low", DefaultParameterSetName="ByString" )] Param( [Parameter( Mandatory=$True, Valuefrompipeline=$true, ParameterSetName="ByObj" )] [VMware.VimAutomation.Client20.VMHostImpl[]] $VMHost, [Parameter( Mandatory=$True, Position=0, ParameterSetName="ByString" )] [string[]] $Name ) Begin { IF ($Name) { $VMHost = $Name|%{ Get-VMHost -Name $_ } } } process { Foreach ($VMHostImpl in ($VMHost|Get-View)) { $ReconnectSpec = New-Object VMware.Vim.HostConnectSpec $ReconnectSpec.HostName = $VMHostImpl.Summary.Config.Name $ReconnectSpec.Port = $VMHostImpl.Summary.Config.Port $ReconnectSpec.Force = $true if ($pscmdlet.ShouldProcess($VMHostImpl.name)) { $VMHostImpl.ReconnectHost_Task($ReconnectSpec) } } } }
combined_dataset/train/non-malicious/sample_3_59.ps1
sample_3_59.ps1
ConvertFrom-StringData @' id_sbsl_mcafee_eepc_slowboot_sd=McAfee Endpoint Encryption for PCs (EEPC) may cause slow boot or delay between CTRL+ALT+DEL and Credential logon dialog '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAS4gijXRn1eN+F # BzJHTefl+Sm2IjB79+PBdhnda/O3kaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICyVyiVplklUbu1030EM0lDb # rJb1PlR5wLtpKm5vsGWOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJbadNWkyD5r0NR7/5e8nAItN0xhtfMmB8XLhLTN5lEFYZr0ubnU2CSm8 # iI0+FMUaafppAlwA3bnnhBVvG39jgmbL6qauF/RoJHH2NGo6IorhGm0gbspnZqvD # V502plLSv1xSIP1B5GnAAaRTsDnBS27TYlvxNtpuNjZvQjyE2AWH7of/8WjAxDuy # +1tDqq/NRAKTDzuO+8JANVIzNz2mbrqEFvyBseC2OY16iT1VMD5LV1ED1yJTJ26g # bwSqribYXuus1+2w8W26IVCSVmdY7fTlAqJpJVOKRG3vykQUWB1uqsmK70HWV7CN # /ywHuefQ1Sb/c5Iv9GQuION8gdJirqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAAp0Cd1W0ZRtXiZPXsGGhm3H2cU5PnX13xzLY9lzchBwIGZuspkdKf # GBMyMDI0MTAyODExNDA0MC4yODFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C # u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx # /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV # V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR # 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp # gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo # j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4 # yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm # TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi # wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd # 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s # huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q # lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG # l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc # 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A # /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl # SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4 # gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG # 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt # oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc # 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn # ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq # Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/ # R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0MTAyOTA3MTU1NlowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEAAgIYGzAHAgEAAgITTTAK # AgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCdo1/IodMsNY0I # gWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbggj5TzOyaNz/noIF8rSswo # SMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQFD26RPCKzj29tv+B+uFY # o+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZRY6ZoVliBz9eAi7lBW9k # ULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0pcf9UEdis9BF366M8Ktt # 8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yqF0TVFbiwLm8UNadYHPkb # zTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgeQDm0hBhjWpM # 5vsHBZmEJywEojN0kT9ign2a+fv6t0cwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4 # MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6crrSMA0GCSqGSIb3DQEB # CwUABIICAEKY2ddqCESwO/4iJSPAjE3BwjwE1OOqu8SQDJ6vfajtrDt8pp6kIDfh # mtewJ1WgyBxyX7CfZKiy8cOieQh5nVK81CvNBJKqofkjT1PaVceXuFR6LTJooom0 # tDUM69B6nA6uETEDiA1C5j/kZ5QcDthi66k1eOwMlBOl4r1xztHW3CN5vdsMPOlN # czKhb9jTc1/dNwQGvdc0vad5Tam7pZMkzi5nuVGreERb2eUY3Ado4v6I1WWeQUMs # BjB3uIXIH513YrFq8q78appqq2IvZKAy1wWKCN+KLtpj5zcJtvkMQrJxRDVsGXCI # OIE4pAQlAh/WMzu9fyuQxIqckZLXYHp00k0VfI/w5BpMCOxFtvJFEQTFoiVWgmeb # I5XjxERx9XggDH5b0kxEAcYQoWDTwoRiRavEW3/UFtv1E8SyhPe4zmgRttC8zJut # tv5m6H5ZGkqcPuZ/4NIYvNZ19q2kibI8iLCgQSezUDTDeRLUNRB/1AA6FWl8UDEg # j7bupMnf2tzEcB+dLBwXthHtSpdpj9cnkkAJ76CTRKZa6gmVUHQOn47gnnP9cARI # rHIkz5dJ9F+Hp+j8nWTAj8HSrcDCl/KlBdm+eIrCvMj1Eu9gjz5nePCudQmEmmas # 3d0deal5MlppKGR3/IgXKOf5gjaid/b69RGoRp1dmY4cFrDAAGjB # SIG # End signature block
combined_dataset/train/non-malicious/sample_5_53.ps1
sample_5_53.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIImGwYJKoZIhvcNAQcCoIImDDCCJggCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa # HjCCGhoCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3 # RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq # tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7 # EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/ # 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt # SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC # F60wghepBgorBgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL # JZwfEO4YeUvzRyzBGzb6/QIGZutJ48scGBMyMDI0MTAwOTE3MjE1Ni4yMTZaMASA # AgH0oIHZpIHWMIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgEC # AhMzAAAB/xI4fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzEx # OVowgdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNV # BAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A # MIICCgKCAgEAyeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKY # Hd/9db+g3z4dU4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wf # lDAY1tu9CQqhhxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmW # iYgfX0R+bDAnncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYg # Ww8PGBUO0vTMKjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT # 1cZAqGyEhT7L0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAy # g6zmE5p3fONr9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8O # OXf8JxTYWIqfRuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D # 1J7PQJAJObbiaboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfN # zhXgLDEwb6dA4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxf # WzXN6sPJMy49tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOC # AUkwggFFMB0GA1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAW # gBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0 # YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUF # BzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jv # c29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8E # AjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkq # hkiG9w0BAQsFAAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K # /DNMzLliYQUAp6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1 # iU/Yk0eutPyfOievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8pp # ZwLghT4z3mkGZjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrO # XRpyXrTKUPe3kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxc # yffwXhLu9HMU3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRy # q5QPYPJHGA0Ty0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js24 # 9bqQOYPdpyOdgRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe # 9WqdSezh8tytuulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4H # Pzd+S0bBN3A3XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5 # OePyjnTaItTSY4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIw # ggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA # MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQD # EylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0y # MTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0 # ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveV # U3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTI # cVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36M # EBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI # NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxP # LOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2l # IH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDy # t0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymei # XtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1 # GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgV # GD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQB # gjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTu # MB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsG # AQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH # AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1Ud # EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYD # VR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwv # cHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEB # BE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9j # ZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQAD # ggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/ # 2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvono # aeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRW # qveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8Atq # gcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7 # hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkct # wRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu # +yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FB # SX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/ # Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ # 8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEw # ggEBoYHZpIHWMIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA # qROMbMS8JcUlcnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOqwzeYwIhgPMjAyNDEwMDkwOTM5 # NTBaGA8yMDI0MTAxMDA5Mzk1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6rDN # 5gIBADAHAgEAAgIS0DAHAgEAAgIS/jAKAgUA6rIfZgIBADA2BgorBgEEAYRZCgQC # MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG # SIb3DQEBCwUAA4IBAQBLCRbXud9m2v2bjrBy7Jvt49d5yTngqV6Bt966YGxjqzBG # ULq3aPCeJy6fapHtYDQMwygtp/aGKqiVCsdcR4DNpmnLcukcyRj0J4czIDw1+ki0 # agiZ8nyanM9sn1iYZr+C+57I6D3bef4TPPg0gTSpaAO1bzPkpAzs62fnpfa8RbJ5 # mIBpgF1jKkaJaIZsK+Vp8Ppw5+sDnunnjTRPyawdj43e/kbvOm9rBhcZOf26XgB+ # WB0FfgZQIAKTIFflpZinBaRCJbWVOcKHsplj2UaO+4TrshyCTKDQeMqxToSdUHTQ # feyiv9prjUkGvqa0YzfJZ+Hq25M2azwxJmbPW2fbMYIEDTCCBAkCAQEwgZMwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8w # DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv # BgkqhkiG9w0BCQQxIgQgJrw+Nhz0ZUNcsvdWvaGXXCZlqvBawH44LFHauS97MNkw # gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuM # aVOI3qDjSEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwAhMzAAAB/xI4fPfBZdahAAEAAAH/MCIEILPlFszD9PesFJXDx8ZRYglYRgUN # 1GSNjGSgO6pqsj2wMA0GCSqGSIb3DQEBCwUABIICAJcQToCcMvR+OUZQYK2XunZm # v/PzNeF4nJspUedJ84xAsRcQgnmGuD3h9R9rIzSE1m+h22uf0nuo/iyajTpQImdm # 2EePrVYTSQtDYJ7ZvDsw5ronnFWxzShUjsSKm24SwP+b8uHrA6OoxbAzWo1jDE+t # pQHkg+7e7hxxwcNiRyNxKDfovblbuZSj8EjP9FmLMeJOV9TIcgE64ehPu7KvxoBA # oD1u1BHEPfnbSXe/oiRkDL9RYCPRSaCr2IESot3h+XgFvvwY7clTbno1R7z1u6dS # tSd9/sN30jn/YR9OF6CeTjg4rlL4mLou/AimbUmpuIWlc0Q7Tje6z06VDz0/ZuS6 # 07aFxzgxfvRGp0paqakPBOZaOy/NhryYDvJ8bcc2HmeJwShYM0GuVuLh//VSIeOo # rAd5ML59rIjKtmje/szwNBu2UCRqRWekHFCbMsEOmzWVM+0d16dj2CW+FymWimgF # RZ36nIqRxLXrcPHTqtwKOi4It0AHhwIWs5RkW2Tj1Yc7L1YZi4Ekl9+eRoILkqBy # 1hpKxvSa65phk+xevJmaeTsJUHyEK2nRkKzf6zj/NBNCtrqf+ikMB4SUeTT/vL44 # Z+IrUqDZn+pv7nbYu9mPY4RESzB6tXI1nn7crwGxzMzpsTcYYozTuS09NOaHNmuy # GAJAQ1VNEpitjF5kHveE # SIG # End signature block
combined_dataset/train/non-malicious/sample_54_32.ps1
sample_54_32.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../which/bin/which.js" $args } else { & "$basedir/node$exe" "$basedir/../which/bin/which.js" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../which/bin/which.js" $args } else { & "node$exe" "$basedir/../which/bin/which.js" $args } $ret=$LASTEXITCODE } exit $ret # SIG # Begin signature block # MIIn1AYJKoZIhvcNAQcCoIInxTCCJ8ECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD2ksuU5m/g2bf+ # RdBifYXvkeqsFujnPtMgyMDpX/cKQqCCDYswggYJMIID8aADAgECAhMzAAADhNlo # fWbMdUuhAAAAAAOEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwNzEzMjM0NTM4WhcNMjQwOTE1MjM0NTM4WjCBiDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj # cm9zb2Z0IDNyZCBQYXJ0eSBBcHBsaWNhdGlvbiBDb21wb25lbnQwggEiMA0GCSqG # SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDOcuqjP/XRg6pKFeMaWfpMTgEZTBne4mxd # XcEiErb/lZ9Yfxgxa8WhOA66XU+usOUDmo6z/WpI3KVFIuf4MrHh76xAL/HypU9b # H7hvCG40do0YQxmymk+O25zXQ6Z0QKyKhDNU7K79OVWiE/QNRPXDxXj65HTqT2qb # 5dVzDziesfrFpzzrkHtOzBikEEFl1oZfmZOy3lSeiiaVLwkgaoPpYMDK+WbANGXQ # LQ6aP5vyWDtknjDP2F9gjp6j+Q67bCBjIs8FpdH2IN6HAvE3X/E4YOIOrZY2JYUz # 9poFh1rrjkGuM4CT2tzdqhfkB28QOnuhEyJ+AmB3B01oL9ahNSiZAgMBAAGjggFz # MIIBbzAfBgNVHSUEGDAWBgorBgEEAYI3TBEBBggrBgEFBQcDAzAdBgNVHQ4EFgQU # HNwWRAxH9Xw4ZX9wXRlFc716vLwwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMNMjMxNTIyKzUwMTE0ODAfBgNV # HSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0Ey # MDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZF # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQ # Q0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQEL # BQADggIBACe+otxvOu3z6TOJ95EbPptRocynVoyom18xquOJSKeqDNItu2pmyVpa # iZDhPstLyuo0mXyNLPh3TAl+botuUfpFZDOGzgmqWVBrdHQxsu3t++x6Gw0BJfQv # n/c0/lU/jRTRTAp7S7jAqjqpyMc0yvrrL6xvUNn3rkLkdy2yXDHWpHdEx5JdpJDp # gn5j1tv3GGdteYdhZlb2HolacViuJSbeMdG5sDDspcw8xY1Ds4FMXq7MYqLYQsr8 # KwXJZ95SboZ09V/5MOwpKGGhle0Bc5nAErdJBNjjaBLBMGDig9OV0Z3ZIfY4jOFl # eTEsK5LOTQtSaNVD4rbG+QnMsweLag7qVM7z5IeOqE7UY/CfCEksl+hrKc3MBvdc # yPcJ289x3gRkOH09FIjRIAfFpBDSkPj4HW5LKqNSv3AbFluKx6ZgbNYhwHxQSxDq # YsTlAjtnbMjYI2RTrSIMjgGYRvfwa57ypyPdlyzm14Q5UNggsWyr1Og+QbQeW6+R # CG6FuV/nEAYrMgeHlMQBd50aVhTdBeq5CR3Gz6q4aVL7nEdDR6eYuL0U1e4EoL2O # YBok3y4rBL3r57nLEEZ6xMGAe5eHBPtgcuPw5S/aJDropeu+4BXSi5R/qGktTkbK # flJMAlfXHL6a64o88h8i8ZZ4HHHM41qxMB52j9bgaCCQFJFlLJPvMIIHejCCBWKg # AwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3Qg # Q2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYw # NzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjAN # BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGf # Qhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRg # JGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NE # t13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnn # Db6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+E # GvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+t # GSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxh # H2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AV # s70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f # 7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3D # KI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9Jaw # vEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1Ud # DgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRy # LToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDEx # XzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0 # cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDEx # XzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/ # BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2Nz # L3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAA # bwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUA # A4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+ # vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4H # Limb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6 # aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiX # mE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn # +N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAq # ZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5h # YbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/ # RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXm # r/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMyk # XcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEB # MIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNV # BAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOE2Wh9Zsx1 # S6EAAAAAA4QwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQB # gjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkE # MSIEINHHRjbLeUFexoxjnLvklJ7YbhYs4NLDTwPoOAxaRFwRMEIGCisGAQQBgjcC # AQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAfVLnD37kOb2Lro10xYIbw+sda5il # J8FCXfzxbUQ7faoIqFJOTxpK1CPCo6lEza0YQW1RDcmdlJDdQzcRg0MaTJOaN9H6 # hCUoSBzvb/dCP3nZvq3fsjDOEPmESfPTWY5BZBHWTumj9iDdsWeYTFI/hjDEdo3l # HtH7lSNqHsSLW1Mq8jsRiepT23mPBmr8UihJM/7OfAs3rZuyYYGq9a62myFUYMlu # BtmzRjZKBxG6mUq5nHhIoNCwW9pJQqyNhYrZwg1NLfl7uj4bEDlIlBYUqg2jBlcd # HrfrWAxYhklyTwu1AgsjLMhntuihwb0pcxE3vJC/fgi1cqRdKb1J8CgcfaGCFykw # ghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8w # DQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYK # KwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDxE4VovnjM4NAStuh9Rp2VtM2b # fRK2ScVXBvGBn3VdJgIGZk31ElN7GBMyMDI0MDUyNDIxMjMxNi4zNjVaMASAAgH0 # oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0w # KwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAk # BgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxN # aWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMA # AAHdXVcdldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC # ggIBAKhOA5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T # 52HXbN2g7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLa # iAaobE5vFJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3e # aryH+AKmv6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6N # VnXMYOTRKuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHU # pcHSODujlFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl # 3hUKtuzYC1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+ # YcvBM834bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi # 5Sa/ubGuYEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz # 5WW7BA4wpmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXe # PT6hMF0Il598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIB # RTAdBgNVHQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cV # XQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5t # aWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUy # MFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQ # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQl # MjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAW # BgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcN # AQELBQADggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo # 1Ooc9Shyvxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+ # O4VLS0LSmb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1 # zGpQ7HTxvfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJ # NAF+5/5qBk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAqu # BiDkYQ5kVfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNly # EHHbQZDmi9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/v # dYUqaJspupBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6 # hUDBBkvYh+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3 # KgqjqDOWInVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FC # qY1sDUKUhRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCC # BVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj # cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMw # MTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3mi # y9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+ # Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3 # oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+ # tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0 # hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLN # ueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZ # nkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n # 6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC # 4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vc # G9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtF # tvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEE # BQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNV # HQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3 # TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br # aW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkG # CSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8E # BTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRP # ME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1 # Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEww # SgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCd # VX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQ # dTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnu # e99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYo # VSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlC # GVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZ # lvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ # ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtq # RRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+ # y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgk # NWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqK # Oghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB # 2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG # A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD # VQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXb # NaDPxnyiDbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMDANBgkqhkiG9w0BAQUFAAIFAOn7FiowIhgPMjAyNDA1MjQyMTM1MzhaGA8y # MDI0MDUyNTIxMzUzOFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6fsWKgIBADAH # AgEAAgIA/zAHAgEAAgISkzAKAgUA6fxnqgIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # BQUAA4GBAKXmu6NuxwyfiUHWiVR0xKeUcfNWSw8QSeDv/phwcdUWvGh9sY+yRQeQ # ncY7SkO+LDygNU9F/a7hA25U7qE6VnV+EgZ8JetkssWOXI8KCtZmNRS0vyT8km+e # uwc5mW8XPyCR5IrpX95Wo6Ua0+vFGoKg3Suv9IPLoG6Opz+eNXiQMYIEDTCCBAkC # AQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldSt # qhsAAQAAAd0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG # 9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgbELtoqo9jUafzcR9ti5h/v5IANOJ+305 # HCjjVo3XwCAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZ # nHtH0Vk37UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 # YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIP9ip0qf5vILy8YS # jcFhpRSQ6yeG1/aEKlvUmFwEgK86MA0GCSqGSIb3DQEBCwUABIICAFx3LQeXsZxf # ecU6CILMJFR/uMj4dV1/PkzYns0I/r7yFerxUkzpKTfeq09nnt55bHO94tN4yBzA # gJM2IJT9Gro0lHKD5JPWeKDuVvfIQpfTsQZQhI0jcZSjrv5KYJ5Lq2fU2VORPzrB # sN/fPuMSf91u+qxOD6+AtgmpR7naJ8nb2BpXkrG7mzNxW5nxFJ6XWxnAspam12kj # 2POvXajRQ6PQEUeAR8YyrQBYDb8N1+kRcbhhloeplVpEaONTIz9Fe37GElb8MGus # 3sPT2f3UtRoRAhlN3/Q0PKI9Kq+EG0Y303JgYz0npvKmvOR2n8z6oJAUHpBW6Vzz # IXsiQOMQEzB1PqBN08wIcxk9Z8qb5NIwAuoc+OpurJph/gWi0JCnJfVfCiFUMCbU # hOWdwVFGuvJkkBcyNZjC4M8UI+NlWe+cI18z7zdU8D33iUb4TsKpVS0uvAtP9p2F # 0yMzFVk6BfOOJQPkPWlAl9dpORVDH9+PftPzrTadhpZ/i/KYwDmBnGJNMAT6kxie # vMYhYxLlbBZS8SYQ0qX54oTAjnA8ZrQwEjko09kV8SiNvkhKkiwr+Y1QwKHEcZSC # aCfqPR9OvQjU5LoWrkk1oL0FDQnmvZEj6znjySfH2U6eUhT0+cM5POIxTJmEKP+k # 4YEsRYSVE1g+YanutMG3MHU7Wya8naIb # SIG # End signature block
combined_dataset/train/non-malicious/sample_58_49.ps1
sample_58_49.ps1
#!/usr/bin/env pwsh $PlaywrightFileName = Join-Path $PSScriptRoot "Microsoft.Playwright.dll" [Reflection.Assembly]::LoadFile($PlaywrightFileName) | Out-Null exit [Microsoft.Playwright.Program]::Main($args) # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCoJjGbg2OY61ib # Kwt3GCNoKEhugpoxT6j0VnwLrTwJMaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFVpdfgk6vo1WeGDLQ9ZujwX # D0DmghRyBza6020VaYxOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAGW+oEuwliHbutmeBVtvPgl8vA8LyG9b/efwXnCM4qPhwnhPMB7eT9wH/ # KTM4I149kZshGl+1cwD+YEBIpPmkBlFH5LgCIK9Dr35SqEozApzteUvZwLt5m04D # Qoc0mX9Zb3Z3ef5EQLJbjTC7Ncy/PzRkvZ4V4UOKRdY3TEoOo+pVSJRBeran9Fc/ # gPhnuoAup+SgQrvNQKVQdcdvBAcbcBg85hXV7saKGAciPDx4KmuufNYTrVmgipiU # 1jvE0A0BoWXx5BRFI+5FYX6ePlB2OZxTO8ZPwN0JYOLbUlQe0Q99VBjfiIsge0sA # +4WVv/M/bQ5jGVOK/jS5hUik+HsQXaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAKeTn41FqYye5qiLkZ40DQ+iDJoq7ApLAn++ImSULLbgIGZk4HtKLo # GBMyMDI0MDUyMzE2MzYzMC42MThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOn515cwIhgPMjAyNDA1MjMyMjU2MjNaGA8yMDI0MDUyNDIyNTYyM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fnXlwIBADAHAgEAAgIFrTAHAgEAAgIRbDAKAgUA # 6fspFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKLbQP2o2oYY1JaYkMBF # HiXZsY2dNr0/C09TcOY4okFr9EZPWBhZV6P4pxnyiT+JFBgNnCf0rV64BS/LAdL4 # 8OdF6LLw39eOQ+18pq+ruk244YALqUlezhsROCUuwWIopCP+4iHJ7w8/yqUgEXj6 # UhTVXf80wr/97vE9Q0CeAeQuMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgPW4H6K1duXqId3eHmcPv6qrS+d8fAOL/zD5jGSnEpugwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIKYxqWzLp6lAlWWdYPqylv8UYBtFQXVckK407fyIPsfd # MA0GCSqGSIb3DQEBCwUABIICAA61xAy+yGXJyCIx8YftPmLUn/sWurYVyAM/X2Di # 8+rEDuCvbrCHvcApeZXm3iOq+e8q2OQYCOsc/Rt1ck7uPyI+d9TrgUMMIhNoXTPM # udTlsY+Ws6oSJVA7dXNkXfXG0cBm0FgRSF/G+E/joSbanwL726Av8cBLwO8ZknlO # v9Zsvog6s6YMfcKM9Fv2grGzR4j1Dx/ijOD08mUEzrJtlMvbWvH3U6RMyqJr7ZLe # JlSX5b+JPyDg3gEnKdQ6elT4AjiLnpW7B6wK3VchtDWKTUXx3crUKHDnYhBwNacH # oeMUJy88vKFeRYpcQ5pzFoSsGyPntc/yldcSBKd6Uxf5FYbIr+4+mwhloUZKTp6l # wWJxACbLYTNemG6Uv79PyHcH+FdJ88bE0Ce++tQP3CIZS0nOyUJgrgHLaIc1z1v5 # HCGaEIEjPZHBRBvwy+eWXJfccYPGBSNe6UBoUoaQtaS7NWDqAvFiv5vUpf6JE4jL # k3xtiz2nMHcxeAFyeL4oKhbkSFsGWexxyyeiyNuazKqw7tBbczt96v5tewpDwi27 # HqWOwce4l204lclzQRXYc6YuvRCJ33ycqABNL9rqSDtAbeT5ATGpPU5KpRQ89DEu # c4vG3Ixi2dkjBb12k/3gwQxWyeM/2tIXRKCz36JrfRpNeXeTOA7JOPb0iVWyJRRU # RbJm # SIG # End signature block
combined_dataset/train/non-malicious/ffdb7026-570c-4644-8a9f-b2c8fcdabfd5.ps1
ffdb7026-570c-4644-8a9f-b2c8fcdabfd5.ps1
# Code to auto update the Address policy, GAL, OAB and storage groups and mailbox databases of an Exchange 2007 server by John McLear # This code is good for hosting providers or people who wish to use lots of storage groups and mailbox databases. # # Thanks to Joel Bennett (Jaykul) for general scripting help and the friendly folks in #powershell - freenode # # I rewrote this and didnt test before publishing so there may be some syntax errors. # # Created 07/09/2008 ################################################################################################################################# param([string]$fullname, [string]$mail2, [string]$typeofcustomer) # PRE REQ - Create a container in your address lists called "Generic Address Book" or something similar - this is where we will store address lists! # - Create a public folder database on your MB server - In $publicfolderDatabase our example is in storage group sg0 called Public Folder. # We need to set some things manually too! $yourinternaldomain = "domain.com" # ie contoso.com $OABDistributionServer = "CASserver" # Your CAS server responsible for OAB distribution $MailboxServer = "MBserver" # Shortname of your MailboxServer $PublicFolderDatabase = $MailboxServer + '\\sg0\\Public Folder' # The Path to your public folder used for Address List distribution $LogFilePath = "d:\\Program Files\\Microsoft\\Exchange Server\\Mailbox\\First Storage Group\\" # Where we will put the log files $AdminName = "CN=Servers,CN=Exchange Administrative Group (TESTING23TESTY),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=contoso,DC=com" # This needs to be changed echo "Fullname: $fullname" # full name of customer - this must be a unique value) echo "Domain name: $mail2" # customers domain name ie fraggle.com echo "Type of customer (1 is basic, 2 is standard, 3 is premium): $typeofcustomer" # Basically a premium customer will get their own mailboxdatabase - a basic or standard will share in one big database (know why before you use this!) echo "Your internal domain: $yourinternaldomain" # The internal domain you set # Lets go! ###################### Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin # Loads exchange snap ins new-AcceptedDomain -Name $mail2 -DomainName $mail2 -DomainType 'Authoritative' # Creates an accepted domain new-EmailAddressPolicy -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Priority 'Lowest' -EnabledEmailAddressTemplates SMTP:%m@$mail2,smtp:%g@$mail2,smtp:%1g.%s@$mail2,smtp:%m@$yourinternaldomain # Creates a new address policy giving - you may wish to modify this to suit set-EmailAddressPolicy -Identity $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Priority 'Lowest' -EnabledEmailAddressTemplates SMTP:%m@$mail2,smtp:%g@$mail2,smtp:%1g.%s@$mail2,smtp:%m@$yourinternaldomain # Modifies the new address policy giving - you may wish to modify this to suit - Why modify? You may wish to update this at some point and its best practice to have a set command imho new-GlobalAddressList -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname # Create a new GAL new-AddressList -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Container '\\Generic Address Book' # Create a new address list in the Generic Address Book container - Modify your container to suit! $fullname2 = '\\Generic Address book\\' + $fullname # You may wish to modify the above to suit $OABPoint = $OABdistributionServer + '\\OAB (Default Web Site)' # You may wish to modify the above line to suit but I doubt it. new-OfflineAddressBook -Name $fullname -Server $pinkyring -AddressLists $fullname2 -PublicFolderDistributionEnabled $false -VirtualDirectories $OABPoint # Create a new Offline Address Book Set-OfflineAddressBook -Identity $fullname -versions Version3, Version4 -PublicFolderDistributionEnabled $true -AddressLists $fullname2 # Set the OAB to V3, 4 and Public folder distribution. Update-EmailAddressPolicy -Identity $fullname # Update the Email Address Policy Set-MailboxDatabase -Identity $fullname -OfflineAddressBook $fullname -PublicFolderDatabase $PublicFolderDatabase # Set the Mailbox database of the customer to use the public folder database you created $maildb = Get-MailboxDataBase | Select-String $fullname echo $maildb if ($maildb -match "sg") # if there is a database for the fullname value then { echo "not making the DB" } else { if ($typeofcustomer -match "3") # and if the type of customer is 3 (premium) { echo "making the DB" # this customer must be premium! good for them!! $i = 1 for( $i=0; $i -lt 50; $i++ ) # for each count 1 to 50 { $maildb = Get-MailboxDataBase | Select-String $fullname echo $maildb if ($maildb -match "sg") # Check for a database { echo "database located" } # if database is found then do nothing else { new-storagegroup sg$i # creating 50 storage groups new-mailboxdatabase -StorageGroup $MailboxServer\\sg$i -Name $fullname -EdbFilePath $LogFilePath + '\\' + $fullname.edb # make a database on the server - we need to add incrementation on servername here.. mount-database -Identity "CN=$fullname,CN=sg$i,CN=InformationStore,CN=$MailboxServer,$AdminName" # mount the database $i++ # increase the storage group by 1 } } Set-MailboxDatabase -Identity $fullname -PublicFolderDatabase $PublicFolderDatabase # set the public folder } else { echo "customer is a basic or standard customer so we are going to not create a DB" Set-MailboxDatabase -Identity $fullname -OfflineAddressBook $fullname -PublicFolderDatabase $PublicFolderDatabase } }
combined_dataset/train/non-malicious/1979.ps1
1979.ps1
Describe "CliXml test" -Tags "CI" { BeforeAll { $testFilePath = Join-Path "testdrive:\" "testCliXml" $subFilePath = Join-Path $testFilePath ".test" if(test-path $testFilePath) { Remove-Item $testFilePath -Force -Recurse } New-Item -Path $testFilePath -ItemType Directory | Out-Null New-Item -Path $subFilePath -ItemType Directory | Out-Null Push-Location $testFilePath class TestData { [string] $testName [object] $inputObject [string] $expectedError [string] $testFile TestData($name, $file, $inputObj, $error) { $this.testName = $name $this.inputObject = $inputObj $this.expectedError = $error $this.testFile = $file } } } AfterAll { Pop-Location } Context "Export-CliXml" { BeforeAll { $gpsList = Get-Process pwsh $gps = $gpsList | Select-Object -First 1 $filePath = Join-Path $subFilePath 'gps.xml' $testData = @() $testData += [TestData]::new("with path as Null", [NullString]::Value, $gps, "ParameterArgumentValidationErrorNullNotAllowed,Microsoft.PowerShell.Commands.ExportClixmlCommand") $testData += [TestData]::new("with path as Empty string", "", $gps, "ParameterArgumentValidationErrorEmptyStringNotAllowed,Microsoft.PowerShell.Commands.ExportClixmlCommand") $testData += [TestData]::new("with path as non filesystem provider", "env:\", $gps, "ReadWriteFileNotFileSystemProvider,Microsoft.PowerShell.Commands.ExportClixmlCommand") } AfterEach { Remove-Item $filePath -Force -ErrorAction SilentlyContinue } $testData | ForEach-Object { It "$($_.testName)" { $test = $_ { Export-Clixml -Depth 1 -LiteralPath $test.testFile -InputObject $test.inputObject -Force } | Should -Throw -ErrorId $test.expectedError } } It "can be created with literal path" { $filePath = Join-Path $subFilePath 'gps.xml' Export-Clixml -Depth 1 -LiteralPath $filePath -InputObject ($gpsList | Select-Object -First 1) $filePath | Should -Exist $fileContent = Get-Content $filePath $isExisted = $false foreach($item in $fileContent) { foreach($gpsItem in $gpsList) { $checkId = $gpsItem.Id if (($null -ne $(Select-String -InputObject $item -SimpleMatch $checkId)) -and ($null -ne $(Select-String -InputObject $item -SimpleMatch "Id"))) { $isExisted = $true break; } } } $isExisted | Should -BeTrue } It "can be created with literal path using pipeline" { $filePath = Join-Path $subFilePath 'gps.xml' ($gpsList | Select-Object -First 1) | Export-Clixml -Depth 1 -LiteralPath $filePath $filePath | Should -Exist $fileContent = Get-Content $filePath $isExisted = $false foreach($item in $fileContent) { foreach($gpsItem in $gpsList) { $checkId = $gpsItem.Id if (($null -ne $(Select-String -InputObject $item -SimpleMatch $checkId)) -and ($null -ne $(Select-String -InputObject $item -SimpleMatch "Id"))) { $isExisted = $true break; } } } $isExisted | Should -BeTrue } } Context "Import-CliXML" { BeforeAll { $gpsList = Get-Process pwsh $gps = $gpsList | Select-Object -First 1 $filePath = Join-Path $subFilePath 'gps.xml' $testData = @() $testData += [TestData]::new("with path as Null", [NullString]::Value, $null, "ParameterArgumentValidationErrorNullNotAllowed,Microsoft.PowerShell.Commands.ImportClixmlCommand") $testData += [TestData]::new("with path as Empty string", "", $null, "ParameterArgumentValidationErrorEmptyStringNotAllowed,Microsoft.PowerShell.Commands.ImportClixmlCommand") $testData += [TestData]::new("with path as non filesystem provider", "env:\", $null, "ReadWriteFileNotFileSystemProvider,Microsoft.PowerShell.Commands.ImportClixmlCommand") } $testData | ForEach-Object { It "$($_.testName)" { $test = $_ { Import-Clixml -LiteralPath $test.testFile } | Should -Throw -ErrorId $test.expectedError } } It "can import from a literal path" { Export-Clixml -Depth 1 -LiteralPath $filePath -InputObject $gps $filePath | Should -Exist $fileContent = Get-Content $filePath $fileContent | Should -Not -Be $null $importedProcess = Import-Clixml $filePath $importedProcess.ProcessName | Should -Not -BeNullOrEmpty $gps.ProcessName | Should -Be $importedProcess.ProcessName $importedProcess.Id | Should -Not -BeNullOrEmpty $gps.Id | Should -Be $importedProcess.Id } It "can import from a literal path using pipeline" { $gps | Export-Clixml -Depth 1 -LiteralPath $filePath $filePath | Should -Exist $fileContent = Get-Content $filePath $fileContent | Should -Not -Be $null $importedProcess = Import-Clixml $filePath $importedProcess.ProcessName | Should -Not -BeNullOrEmpty $gps.ProcessName | Should -Be $importedProcess.ProcessName $importedProcess.Id | Should -Not -BeNullOrEmpty $gps.Id | Should -Be $importedProcess.Id } It "test follow-up for WinBlue: 161470 - Export-CliXml errors in WhatIf scenarios" { $testPath = "testdrive:\Bug161470NonExistPath.txt" Export-Clixml -Path $testPath -InputObject "string" -WhatIf $testPath | Should -Not -Exist } It "should import PSCredential" { $UserName = "Foo" $pass = ConvertTo-SecureString (New-RandomHexString) -AsPlainText -Force $cred = [PSCredential]::new($UserName, $pass) $path = "$testdrive/cred.xml" $cred | Export-Clixml -Path $path $cred = Import-Clixml -Path $path $cred.UserName | Should -BeExactly "Foo" $cred.Password | Should -BeOfType "System.Security.SecureString" } } } Describe "Deserializing corrupted Cim classes should not instantiate non-Cim types" -Tags "Feature","Slow" { BeforeAll { $shouldRunTest = $IsWindows -and ((Get-Command calc.exe -ErrorAction SilentlyContinue) -ne $null) $skipNotWindows = ! $shouldRunTest if ( $shouldRunTest ) { (Get-Process -Name 'win32calc','calculator' 2> $null) | Stop-Process -Force -ErrorAction SilentlyContinue } } AfterAll { if ( $shouldRunTest ) { (Get-Process -Name 'win32calc','calculator' 2> $null) | Stop-Process -Force -ErrorAction SilentlyContinue } } It "Verifies that importing the corrupted Cim class does not launch calc.exe" -skip:$skipNotWindows { Import-Clixml -Path (Join-Path $PSScriptRoot "assets\CorruptedCim.clixml") $calcProc = $null $count = 0 while (!$calcProc -and ($count++ -lt 20)) { $calcProc = Get-Process -Name 'win32calc','calculator' 2> $null Start-Sleep -Milliseconds 500 } $calcProc | Should -BeNullOrEmpty } }
combined_dataset/train/non-malicious/2792.ps1
2792.ps1
if (Get-Command logparser.exe) { $lpquery = @" SELECT COUNT(IpAddr, Mac, Type) as ct, IpAddr, Mac, Type FROM *arp.csv GROUP BY IpAddr, Mac, Type ORDER BY ct ASC "@ & logparser -stats:off -i:csv -dtlines:0 -rtp:-1 "$lpquery" } else { $ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName) "${ScriptName} requires logparser.exe in the path." }
combined_dataset/train/non-malicious/Set-Wallpaper (CTP3)_2.ps1
Set-Wallpaper (CTP3)_2.ps1
#requires -version 2.0 ## Set-Wallpaper - set your windows desktop wallpaper ################################################################################################### ## Usage: ## Set-Wallpaper "C:\\Users\\Joel\\Pictures\\Wallpaper\\Dual Monitor\\mandolux-tiger.jpg" "Tile" ## ls *.jpg | get-random | Set-Wallpaper ## ls *.jpg | get-random | Set-Wallpaper -Style "Stretch" ################################################################################################### ## History: ## v0.5 First release (on #PowerShell@irc.freenode.net) ## v1.0 Public release (http://www.poshcode.org/488) ## - Added Style: Tile|Center|Stretch ## v1.1 (http://poshcode.org/491) ## - Added "NoChange" style to just use the style setting already set ## - Made the Style parameter to the cmdlet optional ## v2.0 This Release ## - Updated for CTP3, and made it run as a script instead of a function. ################################################################################################### [CmdletBinding()] Param( [Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true)] [Alias("FullName")] [string] $Path , [Parameter(Position=1, Mandatory=$false)] $Style = "NoChange" ) BEGIN { try { $WP = [Wallpaper.Setter] } catch { $WP = add-type @" using System; using System.Runtime.InteropServices; using Microsoft.Win32; namespace Wallpaper { public enum Style : int { Tile, Center, Stretch, NoChange } public class Setter { public const int SetDesktopWallpaper = 20; public const int UpdateIniFile = 0x01; public const int SendWinIniChange = 0x02; [DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)] private static extern int SystemParametersInfo (int uAction, int uParam, string lpvParam, int fuWinIni); public static void SetWallpaper ( string path, Wallpaper.Style style ) { SystemParametersInfo( SetDesktopWallpaper, 0, path, UpdateIniFile | SendWinIniChange ); RegistryKey key = Registry.CurrentUser.OpenSubKey("Control Panel\\\\Desktop", true); switch( style ) { case Style.Stretch : key.SetValue(@"WallpaperStyle", "2") ; key.SetValue(@"TileWallpaper", "0") ; break; case Style.Center : key.SetValue(@"WallpaperStyle", "1") ; key.SetValue(@"TileWallpaper", "0") ; break; case Style.Tile : key.SetValue(@"WallpaperStyle", "1") ; key.SetValue(@"TileWallpaper", "1") ; break; case Style.NoChange : break; } key.Close(); } } } "@ -Passthru } } PROCESS { Write-Verbose "Setting Wallpaper ($Style) to $(Convert-Path $Path)" $WP::SetWallpaper( (Convert-Path $Path), $Style ) }
combined_dataset/train/non-malicious/sample_9_73.ps1
sample_9_73.ps1
#************************************************ # TS_MCALite.ps1 # Version 1.0.1 # Date: 7/17/2012 # Author: tspring # Description: [Idea ID 4796] [Windows] MaxConcurrentApi Problem Detection Lite # Rule number: 4796 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=4796 #************************************************ # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 4796 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_MaxConcurrentApiLite" $PublicContent = "http://support.microsoft.com/kb/975363" $Verbosity = "Error" $Visibility = "4" $SupportTopicsID = "18542" $Title = $ScriptStrings.ID_MaxConcurrentApiLite_ST $InformationCollected = new-object PSObject $IssueDetected = $False # *************************** # Data Gathering # *************************** Function AppliesToSystem{ $RuleApplicable = $false $cs = Get-CimInstance -class win32_computersystem $DomainRole = $cs.domainrole if ($DomainRole -le 1){ #MaxConcurrentApi outages do not apply to workstations. $RuleApplicable = $false }else{ if ($OSVersion.Major -lt 6){ $OS = Get-CimInstance -Class Win32_OperatingSystem $sp = $OS.ServicePackMajorVersion #Hotfix Check for presence of Netlogon Performance Counters: KB928576 if ($sp -ge 2){ if ((CheckMinimalFileVersion "$System32Folder\Nlperf.dll" 5 2 3790 4106) -and (CheckMinimalFileVersion "$System32Folder\Netapi32.dll" 5 2 3790 4106) -and (CheckMinimalFileVersion "$System32Folder\Netlogon.dll" 5 2 3790 4106)) {$RuleApplicable = $True}} if ($sp -le 1){ if ((CheckMinimalFileVersion "$System32Folder\Nlperf.dll" 5 2 3790 2962) -and (CheckMinimalFileVersion "$System32Folder\Netapi32.dll" 5 2 3790 2962) -and (CheckMinimalFileVersion "$System32Folder\Netlogon.dll" 5 2 3790 2962)) {$RuleApplicable = $True} } }else{$RuleApplicable = $True} } if ($RuleApplicable -eq $True){ Write-DiagProgress -Activity $ScriptStrings.ID_MCALite_Status -Status $ScriptStrings.ID_MCALite_Wait return $True } } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem){ function MCAProblemCheckLite { param($InstanceName) $DetectionTime = Get-Date $ProblemDetected = $False $SA = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Semaphore Acquires", $InstanceName) $ST = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Semaphore Timeouts", $InstanceName) $SW = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Semaphore Waiters", $InstanceName) $SH = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Semaphore Holders", $InstanceName) $ASHT = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Average Semaphore Hold Time", $InstanceName) $SemAcquires = $SA.NextValue() $SemTimeouts = $ST.NextValue() $SemWaiters = $SW.NextValue() $SemHolders = $SH.NextValue() $SemHoldTime = $ASHT.NextValue() #Detect problems. Exclude false positives if the counter has seen the buffer overrun bug from KB2685888. if ((($SemWaiters -gt 0) -and (-not($SemWaiters -gt 4294000000))) -or (($SemTimeouts -gt 0) -and (-not($SemTimeouts -gt 4294000000)))){ $ProblemDetected = $true } $ReturnValues = new-object PSObject $InstanceName = $InstanceName.replace('\','') #Determine how long the computer has been running since last reboot. $wmi = Get-CimInstance -Class Win32_OperatingSystem -ComputerName $ComputerName $LocalDateTime = $wmi.LocalDateTime $Uptime = $wmi.ConvertToDateTime($wmi.LocalDateTime) - $wmi.ConvertToDateTime($wmi.LastBootUpTime) $Days = $Uptime.Days.ToString() $Hours = $Uptime.Hours.ToString() $UpTimeStatement = $Days + " days " + $Hours + " hours" add-member -inputobject $ReturnValues -membertype noteproperty -name "Detection Time" -value $DetectionTime add-member -inputobject $ReturnValues -membertype noteproperty -name "Time Since Last Reboot" -value $UpTimeStatement add-member -inputobject $ReturnValues -membertype noteproperty -name "Trust Secure Channel To" -value $InstanceName add-member -inputobject $ReturnValues -membertype noteproperty -name "Client Timeouts (over life of secure channel)" -value $SemTimeouts add-member -inputobject $ReturnValues -membertype noteproperty -name "Clients Currently Waiting" -value $SemWaiters add-member -inputobject $ReturnValues -membertype noteproperty -name "MaxConcurrentApi Thread Uses (Semaphore Acquires over life of secure channel)" -value $SemAcquires add-member -inputobject $ReturnValues -membertype noteproperty -name "Semaphore Holders" -value $SemHolders add-member -inputobject $ReturnValues -membertype noteproperty -name "Average Semaphore Hold Time" -value $SemHoldTime add-member -inputobject $ReturnValues -membertype noteproperty -name "Problem Detected" -value $ProblemDetected return $ReturnValues } function GetSecureChannelNames { #Returns an array of secure channel names from the Netlogon performannce counter. $Instances = New-Object System.Diagnostics.PerformanceCounterCategory("Netlogon") $AllInstanceNames = $Instances.GetInstanceNames() return $AllInstanceNames } $SCNames = GetSecureChannelNames $LoopCounter = $SCNames.Count for ($i = 0; $i -lt $LoopCounter; $i++){ $InformationCollected = MCAProblemCheckLite ($SCNames[$i]) if ($InformationCollected."Problem Detected" -eq $true){ $IssueDetected = $True Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title -MessageVersion 2 } } } # ********************* # Root Cause processing # ********************* if ($IssueDetected -eq $true){ # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $True }else{ # Green Light Update-DiagRootCause -id $RootCauseName -Detected $False } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBW4lYWe/crdhSt # x6OpSEPrv5sbxx0oQ2FG0U/hdMTjG6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKj4icJqRWSyqHa1zTQEpmAc # 2t4D+nZxhRt+0XvNTzlOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEACFYcszD0SAW+8LGv7Mhba7G2lIvEH+VxJfKXHMHSU3w9uBKQN6XMWhTS # SWbi5QN6CaTCEaYDr9svFVJmJi8iywqeYKZeeOKAAlaC3QI8BZPFInr8GSHdBN2R # jTspQxbwFLSpXxTvl4nTtTGrwWwypeLLUSjyIBA0hbtpe3PRj+INXWV0vp0lTJ/U # CtPPdV1AcB4oai5VB3WkyN4EpQf6zPyJShxVO4a1/d5Hfv//p0L0mnh1jHN+ylbY # KepRGxQjZUd4kDNqCCarJiFCk4DDykkPWmaBy/d0ENxgl5geHoMLVUq+WMmFtGOW # 0UijLwmp9lrc6Vn5jBguzxaeI9i5dKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCARNI2OhRF0AJyRx4IDpLrjOQBtY23bE6KaOGXg8MJnvwIGZv8ZfhGP # GBMyMDI0MTAyODExNDAzOS44MzRaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMvJmpUXSLBAAEAAAH2MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZCMDUt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0UJeLMR/N9WPBZhuKVFF # +eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5AjaVh19ZVjDChHzimxsoaXx # Nu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7VONShujl1NCMkcgSrPdmd # /8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzmkWJD0N+60IiogFBzg3yI # SsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK/nV/aXjuo9LMrrRmn44o # YYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2VmbNWCjQWq5G4YkrcqbPMa # x7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL0hjxg44kpQn384V46o+z # dQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6wGOrPfzIm0FdOn+xFo48E # Rl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBcEFTOvS9E0diNu1eocw+Z # Ckz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25gD8tO9zJg6g6fRpaZc43 # 9mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2HWfMoqqd9uiQ0hTUEhG4 # 4FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRIwZsJuOcJ # fScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA13kBirH1cHu1 # WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTYxaPfp2IVFdgjaMaBi81w # B8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuwgdIdQvqE0h8VQ5QW5sDV # 4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB71a7dB9zgHOkW0hgUEeWO # 9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NTEU/4vlvsRIMWT0jsnNI7 # 1jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3hOLblC1vxM3+wMyOh97aF # Os7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDkC9AxXYB3yEtuwMs7pRWL # yxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWiCVslJbFIIB/4Alv+jQJS # KAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEPcEzG1dO9zIa1Mp32J+zz # W3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJm41ErdiTjAmdClen9yl6 # HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFBtQNEzcCdh1GYw/6nzzNN # t+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a06JFIuGFHIj/I+36ggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0MTAyOTEwMTYxNVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEAAgIV+jAHAgEAAgISoDAK # AgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBpUFU4+vZJFyUm # Vb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGXevIycaqI5McGg28UnXlT # 85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQuxkh2lsfu3f8RO+rHyvy # oc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMIGgIOURNjC5+mH+r4R0gk # grO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnExw84j1PW/7aPVhavzoHfT # 0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6jvcBxO0h6Uf9FkqnHwg7B # sMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgFyzh2WOUI5MH # lu6IdOWVbPgoS58tc2C5MUlVxJBbPzAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+LlQjG2ojCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLBAAEAAAH2 # MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhIwwAlMA0GCSqGSIb3DQEB # CwUABIICABwGwYhXm+S3XuF4XtDa79djUfPU6e9Xd5Qr4TliC/7ZeJKdhAoy6HS4 # /mV5qrrOLPhnSzcpju2LKFQT+/np3b+1Al8ebf+wMeXQ6v1i5Sq6mkchjhuB85zO # VAUeYG4xYzRr/IIC8JGzJghpsxvSNxC8rB0ei8wNs8rEffCvAK80OHQWqTNGNF03 # TVl0Z4KNhnw3G+mUc0uf08JnFfRP3lO447jm8ufSmf5G01p+XKD4lInJxaPSjkmz # 1HrYzqoCfTdT3Dez5aKUdiehH90s1Pcvu3+ifLSvfzkJIaBI2t2yRyfuG2Mg+NJc # tNSpFTa66stu+HOKjtUS3vHuUlnyZGZzqTyysQV7bBdfgc/AP5+ePb3D1DlLf/Sh # auGbQfNRUafbaQQSBlSwkpO/XyOGfdKopcn8FlkTqolpjOYRkOgdB7mZuZ8b8EwZ # pUFuqUwM/VL96HsCKKxWrAB+khSVY3trDs4sbLFvHmbKFeFJuuT/GjRZG/857Hmg # KhVyg6y8Mnfli4jAaSkigjWg1qFmI+MDlMRwgr/RNq3ZpaEn6q5wckX1jw3ax/lq # g53D0tK+ya+TA/tujN497ASy/0WWRFqhth+jqnG+HoJEnwhfVmz9f0PuDpuXwOsE # iLLL9IXcJeaEVOZGQe7c5Fh89lCKtF2tYBDZzbEjCjCXO75fMCZw # SIG # End signature block
combined_dataset/train/non-malicious/757.ps1
757.ps1
$null = New-Item -Path "$PSScriptRoot\foo[1].txt" -Force Import-Module $PSScriptRoot\..\SampleModule.psd1 $WorkspaceRoot = Convert-Path $PSScriptRoot/.. Set-Location $WorkspaceRoot Describe 'Verify Path Processing for Non-existing Paths Allowed Impl' { It 'Processes non-wildcard absolute path to non-existing file via -Path param' { New-File -Path $WorkspaceRoot\ReadmeNew.md | Should Be "$WorkspaceRoot\READMENew.md" } It 'Processes multiple absolute paths via -Path param' { New-File -Path $WorkspaceRoot\Readme.md, $WorkspaceRoot\XYZZY.ps1 | Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\XYZZY.ps1") } It 'Processes relative path via -Path param' { New-File -Path ..\Examples\READMENew.md | Should Be "$WorkspaceRoot\READMENew.md" } It 'Processes multiple relative path via -Path param' { New-File -Path ..\Examples\README.md, XYZZY.ps1 | Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\XYZZY.ps1") } It 'Should accept pipeline input to Path' { Get-ChildItem -LiteralPath "$WorkspaceRoot\Tests\foo[1].txt" | New-File | Should Be "$PSScriptRoot\foo[1].txt" } } Describe 'Verify Path Processing for NO Wildcards Allowed Impl' { It 'Processes non-wildcard absolute path via -Path param' { Import-FileNoWildcard -Path $WorkspaceRoot\Readme.md | Should Be "$WorkspaceRoot\README.md" } It 'Processes multiple absolute paths via -Path param' { Import-FileNoWildcard -Path $WorkspaceRoot\Readme.md, $WorkspaceRoot\PathProcessingWildcards.ps1 | Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\PathProcessingWildcards.ps1") } It 'Processes relative path via -Path param' { Import-FileNoWildcard -Path ..\examples\README.md | Should Be "$WorkspaceRoot\README.md" } It 'Processes multiple relative path via -Path param' { Import-FileNoWildcard -Path ..\examples\README.md, .vscode\launch.json | Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\.vscode\launch.json") } It 'Should accept pipeline input to Path' { Get-ChildItem -LiteralPath "$WorkspaceRoot\Tests\foo[1].txt" | Import-FileNoWildcard | Should Be "$PSScriptRoot\foo[1].txt" } } Describe 'Verify Path Processing for Wildcards Allowed Impl' { It 'Processes non-wildcard absolute path via -Path param' { Import-FileWildcard -Path $WorkspaceRoot\Readme.md | Should Be "$WorkspaceRoot\README.md" } It 'Processes multiple absolute paths via -Path param' { Import-FileWildcard -Path $WorkspaceRoot\Readme.md, $WorkspaceRoot\PathProcessingWildcards.ps1 | Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\PathProcessingWildcards.ps1") } It 'Processes wildcard absolute path via -Path param' { $files = Import-FileWildcard -Path $WorkspaceRoot\*.psd1 $files.Count | Should Be 2 $files[0] | Should Be "$WorkspaceRoot\PSScriptAnalyzerSettings.psd1" $files[1] | Should Be "$WorkspaceRoot\SampleModule.psd1" } It 'Processes wildcard relative path via -Path param' { $files = Import-FileWildcard -Path *.psd1 $files.Count | Should Be 2 $files[0] | Should Be "$WorkspaceRoot\PSScriptAnalyzerSettings.psd1" $files[1] | Should Be "$WorkspaceRoot\SampleModule.psd1" } It 'Processes relative path via -Path param' { Import-FileWildcard -Path ..\examples\README.md | Should Be "$WorkspaceRoot\README.md" } It 'Processes multiple relative path via -Path param' { Import-FileWildcard -Path ..\examples\README.md, .vscode\launch.json | Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\.vscode\launch.json") } It 'DefaultParameterSet should be Path' { $files = Import-FileWildcard *.psd1 $files.Count | Should Be 2 $files[0] | Should Be "$WorkspaceRoot\PSScriptAnalyzerSettings.psd1" $files[1] | Should Be "$WorkspaceRoot\SampleModule.psd1" } It 'Should process absolute literal paths via -LiteralPath param'{ Import-FileWildcard -LiteralPath "$PSScriptRoot\foo[1].txt" | Should Be "$PSScriptRoot\foo[1].txt" } It 'Should process relative literal paths via -LiteralPath param'{ Import-FileWildcard -LiteralPath "..\examples\Tests\foo[1].txt" | Should Be "$PSScriptRoot\foo[1].txt" } It 'Should process multiple literal paths via -LiteralPath param'{ Import-FileWildcard -LiteralPath "..\examples\Tests\foo[1].txt", "$WorkspaceRoot\README.md" | Should Be @("$PSScriptRoot\foo[1].txt", "$WorkspaceRoot\README.md") } It 'Should accept pipeline input to LiteralPath' { Get-ChildItem -LiteralPath "$WorkspaceRoot\Tests\foo[1].txt" | Import-FileWildcard | Should Be "$PSScriptRoot\foo[1].txt" } }
combined_dataset/train/non-malicious/1381.ps1
1381.ps1
function Set-CSslCertificateBinding { [CmdletBinding(SupportsShouldProcess=$true)] [OutputType([Carbon.Certificates.SslCertificateBinding])] param( [IPAddress] $IPAddress = '0.0.0.0', [UInt16] $Port = 443, [Parameter(Mandatory=$true)] [Guid] $ApplicationID, [Parameter(Mandatory=$true)] [ValidatePattern("^[0-9a-f]{40}$")] [string] $Thumbprint, [Switch] $PassThru ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( $IPAddress.AddressFamily -eq [Net.Sockets.AddressFamily]::InterNetworkV6 ) { $ipPort = '[{0}]:{1}' -f $IPAddress,$Port } else { $ipPort = '{0}:{1}' -f $IPAddress,$Port } Remove-CSslCertificateBinding -IPAddress $IPAddress -Port $Port $action = 'creating SSL certificate binding' if( $pscmdlet.ShouldProcess( $IPPort, $action ) ) { $appID = $ApplicationID.ToString('B') Invoke-ConsoleCommand -Target $ipPort -Action $action -ScriptBlock { netsh http add sslcert ipport=$ipPort certhash=$Thumbprint appid=$appID } if( $PassThru ) { Get-CSslCertificateBinding -IPAddress $IPAddress -Port $Port } } }
combined_dataset/train/non-malicious/sample_66_55.ps1
sample_66_55.ps1
<# .Synopsis Activate a Python virtual environment for the current PowerShell session. .Description Pushes the python executable for a virtual environment to the front of the $Env:PATH environment variable and sets the prompt to signify that you are in a Python virtual environment. Makes use of the command line switches as well as the `pyvenv.cfg` file values present in the virtual environment. .Parameter VenvDir Path to the directory that contains the virtual environment to activate. The default value for this is the parent of the directory that the Activate.ps1 script is located within. .Parameter Prompt The prompt prefix to display when this virtual environment is activated. By default, this prompt is the name of the virtual environment folder (VenvDir) surrounded by parentheses and followed by a single space (ie. '(.venv) '). .Example Activate.ps1 Activates the Python virtual environment that contains the Activate.ps1 script. .Example Activate.ps1 -Verbose Activates the Python virtual environment that contains the Activate.ps1 script, and shows extra information about the activation as it executes. .Example Activate.ps1 -VenvDir C:\Users\MyUser\Common\.venv Activates the Python virtual environment located in the specified location. .Example Activate.ps1 -Prompt "MyPython" Activates the Python virtual environment that contains the Activate.ps1 script, and prefixes the current prompt with the specified string (surrounded in parentheses) while the virtual environment is active. .Notes On Windows, it may be required to enable this Activate.ps1 script by setting the execution policy for the user. You can do this by issuing the following PowerShell command: PS C:\> Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser For more information on Execution Policies: https://go.microsoft.com/fwlink/?LinkID=135170 #> Param( [Parameter(Mandatory = $false)] [String] $VenvDir, [Parameter(Mandatory = $false)] [String] $Prompt ) <# Function declarations --------------------------------------------------- #> <# .Synopsis Remove all shell session elements added by the Activate script, including the addition of the virtual environment's Python executable from the beginning of the PATH variable. .Parameter NonDestructive If present, do not remove this function from the global namespace for the session. #> function global:deactivate ([switch]$NonDestructive) { # Revert to original values # The prior prompt: if (Test-Path -Path Function:_OLD_VIRTUAL_PROMPT) { Copy-Item -Path Function:_OLD_VIRTUAL_PROMPT -Destination Function:prompt Remove-Item -Path Function:_OLD_VIRTUAL_PROMPT } # The prior PYTHONHOME: if (Test-Path -Path Env:_OLD_VIRTUAL_PYTHONHOME) { Copy-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME -Destination Env:PYTHONHOME Remove-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME } # The prior PATH: if (Test-Path -Path Env:_OLD_VIRTUAL_PATH) { Copy-Item -Path Env:_OLD_VIRTUAL_PATH -Destination Env:PATH Remove-Item -Path Env:_OLD_VIRTUAL_PATH } # Just remove the VIRTUAL_ENV altogether: if (Test-Path -Path Env:VIRTUAL_ENV) { Remove-Item -Path env:VIRTUAL_ENV } # Just remove VIRTUAL_ENV_PROMPT altogether. if (Test-Path -Path Env:VIRTUAL_ENV_PROMPT) { Remove-Item -Path env:VIRTUAL_ENV_PROMPT } # Just remove the _PYTHON_VENV_PROMPT_PREFIX altogether: if (Get-Variable -Name "_PYTHON_VENV_PROMPT_PREFIX" -ErrorAction SilentlyContinue) { Remove-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Scope Global -Force } # Leave deactivate function in the global namespace if requested: if (-not $NonDestructive) { Remove-Item -Path function:deactivate } } <# .Description Get-PyVenvConfig parses the values from the pyvenv.cfg file located in the given folder, and returns them in a map. For each line in the pyvenv.cfg file, if that line can be parsed into exactly two strings separated by `=` (with any amount of whitespace surrounding the =) then it is considered a `key = value` line. The left hand string is the key, the right hand is the value. If the value starts with a `'` or a `"` then the first and last character is stripped from the value before being captured. .Parameter ConfigDir Path to the directory that contains the `pyvenv.cfg` file. #> function Get-PyVenvConfig( [String] $ConfigDir ) { Write-Verbose "Given ConfigDir=$ConfigDir, obtain values in pyvenv.cfg" # Ensure the file exists, and issue a warning if it doesn't (but still allow the function to continue). $pyvenvConfigPath = Join-Path -Resolve -Path $ConfigDir -ChildPath 'pyvenv.cfg' -ErrorAction Continue # An empty map will be returned if no config file is found. $pyvenvConfig = @{ } if ($pyvenvConfigPath) { Write-Verbose "File exists, parse `key = value` lines" $pyvenvConfigContent = Get-Content -Path $pyvenvConfigPath $pyvenvConfigContent | ForEach-Object { $keyval = $PSItem -split "\s*=\s*", 2 if ($keyval[0] -and $keyval[1]) { $val = $keyval[1] # Remove extraneous quotations around a string value. if ("'""".Contains($val.Substring(0, 1))) { $val = $val.Substring(1, $val.Length - 2) } $pyvenvConfig[$keyval[0]] = $val Write-Verbose "Adding Key: '$($keyval[0])'='$val'" } } } return $pyvenvConfig } <# Begin Activate script --------------------------------------------------- #> # Determine the containing directory of this script $VenvExecPath = Split-Path -Parent $MyInvocation.MyCommand.Definition $VenvExecDir = Get-Item -Path $VenvExecPath Write-Verbose "Activation script is located in path: '$VenvExecPath'" Write-Verbose "VenvExecDir Fullname: '$($VenvExecDir.FullName)" Write-Verbose "VenvExecDir Name: '$($VenvExecDir.Name)" # Set values required in priority: CmdLine, ConfigFile, Default # First, get the location of the virtual environment, it might not be # VenvExecDir if specified on the command line. if ($VenvDir) { Write-Verbose "VenvDir given as parameter, using '$VenvDir' to determine values" } else { Write-Verbose "VenvDir not given as a parameter, using parent directory name as VenvDir." $VenvDir = $VenvExecDir.Parent.FullName.TrimEnd("\\/") Write-Verbose "VenvDir=$VenvDir" } # Next, read the `pyvenv.cfg` file to determine any required value such # as `prompt`. $pyvenvCfg = Get-PyVenvConfig -ConfigDir $VenvDir # Next, set the prompt from the command line, or the config file, or # just use the name of the virtual environment folder. if ($Prompt) { Write-Verbose "Prompt specified as argument, using '$Prompt'" } else { Write-Verbose "Prompt not specified as argument to script, checking pyvenv.cfg value" if ($pyvenvCfg -and $pyvenvCfg['prompt']) { Write-Verbose " Setting based on value in pyvenv.cfg='$($pyvenvCfg['prompt'])'" $Prompt = $pyvenvCfg['prompt']; } else { Write-Verbose " Setting prompt based on parent's directory's name. (Is the directory name passed to venv module when creating the virtual environment)" Write-Verbose " Got leaf-name of $VenvDir='$(Split-Path -Path $venvDir -Leaf)'" $Prompt = Split-Path -Path $venvDir -Leaf } } Write-Verbose "Prompt = '$Prompt'" Write-Verbose "VenvDir='$VenvDir'" # Deactivate any currently active virtual environment, but leave the # deactivate function in place. deactivate -nondestructive # Now set the environment variable VIRTUAL_ENV, used by many tools to determine # that there is an activated venv. $env:VIRTUAL_ENV = $VenvDir $env:VIRTUAL_ENV_PROMPT = $Prompt if (-not $Env:VIRTUAL_ENV_DISABLE_PROMPT) { Write-Verbose "Setting prompt to '$Prompt'" # Set the prompt to include the env name # Make sure _OLD_VIRTUAL_PROMPT is global function global:_OLD_VIRTUAL_PROMPT { "" } Copy-Item -Path function:prompt -Destination function:_OLD_VIRTUAL_PROMPT New-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Description "Python virtual environment prompt prefix" -Scope Global -Option ReadOnly -Visibility Public -Value $Prompt function global:prompt { Write-Host -NoNewline -ForegroundColor Green "($_PYTHON_VENV_PROMPT_PREFIX) " _OLD_VIRTUAL_PROMPT } } # Clear PYTHONHOME if (Test-Path -Path Env:PYTHONHOME) { Copy-Item -Path Env:PYTHONHOME -Destination Env:_OLD_VIRTUAL_PYTHONHOME Remove-Item -Path Env:PYTHONHOME } # Add the venv to the PATH Copy-Item -Path Env:PATH -Destination Env:_OLD_VIRTUAL_PATH $Env:PATH = "$VenvExecDir$([System.IO.Path]::PathSeparator)$Env:PATH" # SIG # Begin signature block # MIIvKgYJKoZIhvcNAQcCoIIvGzCCLxcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBALKwKRFIhr2RY # IW/WJLd9pc8a9sj/IoThKU92fTfKsKCCE8MwggWQMIIDeKADAgECAhAFmxtXno4h # MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z # ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z # G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ # anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s # Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL # 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb # BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3 # JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c # AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx # YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0 # viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL # T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud # EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf # Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk # aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS # PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK # 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB # cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp # 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg # dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri # RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7 # 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5 # nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3 # i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H # EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G # CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C # 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce # 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da # E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T # SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA # FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh # D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM # 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z # 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05 # huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY # mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP # /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T # AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD # VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG # A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV # HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU # cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN # BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry # sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL # IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf # Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh # OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh # dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV # 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j # wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH # Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC # XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l # /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW # eE4wggd3MIIFX6ADAgECAhAHHxQbizANJfMU6yMM0NHdMA0GCSqGSIb3DQEBCwUA # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwHhcNMjIwMTE3MDAwMDAwWhcNMjUwMTE1MjM1OTU5WjB8MQsw # CQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29uMRIwEAYDVQQHEwlCZWF2ZXJ0b24x # IzAhBgNVBAoTGlB5dGhvbiBTb2Z0d2FyZSBGb3VuZGF0aW9uMSMwIQYDVQQDExpQ # eXRob24gU29mdHdhcmUgRm91bmRhdGlvbjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAKgc0BTT+iKbtK6f2mr9pNMUTcAJxKdsuOiSYgDFfwhjQy89koM7 # uP+QV/gwx8MzEt3c9tLJvDccVWQ8H7mVsk/K+X+IufBLCgUi0GGAZUegEAeRlSXx # xhYScr818ma8EvGIZdiSOhqjYc4KnfgfIS4RLtZSrDFG2tN16yS8skFa3IHyvWdb # D9PvZ4iYNAS4pjYDRjT/9uzPZ4Pan+53xZIcDgjiTwOh8VGuppxcia6a7xCyKoOA # GjvCyQsj5223v1/Ig7Dp9mGI+nh1E3IwmyTIIuVHyK6Lqu352diDY+iCMpk9Zanm # SjmB+GMVs+H/gOiofjjtf6oz0ki3rb7sQ8fTnonIL9dyGTJ0ZFYKeb6BLA66d2GA # LwxZhLe5WH4Np9HcyXHACkppsE6ynYjTOd7+jN1PRJahN1oERzTzEiV6nCO1M3U1 # HbPTGyq52IMFSBM2/07WTJSbOeXjvYR7aUxK9/ZkJiacl2iZI7IWe7JKhHohqKuc # eQNyOzxTakLcRkzynvIrk33R9YVqtB4L6wtFxhUjvDnQg16xot2KVPdfyPAWd81w # tZADmrUtsZ9qG79x1hBdyOl4vUtVPECuyhCxaw+faVjumapPUnwo8ygflJJ74J+B # Yxf6UuD7m8yzsfXWkdv52DjL74TxzuFTLHPyARWCSCAbzn3ZIly+qIqDAgMBAAGj # ggIGMIICAjAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4E # FgQUt/1Teh2XDuUj2WW3siYWJgkZHA8wDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQM # MAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0wgaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRp # Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNI # QTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRwOi8vY3JsNC5kaWdpY2VydC5jb20v # RGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0Ex # LmNybDA+BgNVHSAENzA1MDMGBmeBDAEEATApMCcGCCsGAQUFBwIBFhtodHRwOi8v # d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUF # BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu # aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZI # hvcNAQELBQADggIBABxv4AeV/5ltkELHSC63fXAFYS5tadcWTiNc2rskrNLrfH1N # s0vgSZFoQxYBFKI159E8oQQ1SKbTEubZ/B9kmHPhprHya08+VVzxC88pOEvz68nA # 82oEM09584aILqYmj8Pj7h/kmZNzuEL7WiwFa/U1hX+XiWfLIJQsAHBla0i7QRF2 # de8/VSF0XXFa2kBQ6aiTsiLyKPNbaNtbcucaUdn6vVUS5izWOXM95BSkFSKdE45O # q3FForNJXjBvSCpwcP36WklaHL+aHu1upIhCTUkzTHMh8b86WmjRUqbrnvdyR2yd # I5l1OqcMBjkpPpIV6wcc+KY/RH2xvVuuoHjlUjwq2bHiNoX+W1scCpnA8YTs2d50 # jDHUgwUo+ciwpffH0Riq132NFmrH3r67VaN3TuBxjI8SIZM58WEDkbeoriDk3hxU # 8ZWV7b8AW6oyVBGfM06UgkfMb58h+tJPrFx8VI/WLq1dTqMfZOm5cuclMnUHs2uq # rRNtnV8UfidPBL4ZHkTcClQbCoz0UbLhkiDvIS00Dn+BBcxw/TKqVL4Oaz3bkMSs # M46LciTeucHY9ExRVt3zy7i149sd+F4QozPqn7FrSVHXmem3r7bjyHTxOgqxRCVa # 18Vtx7P/8bYSBeS+WHCKcliFCecspusCDSlnRUjZwyPdP0VHxaZg2unjHY3rMYIa # vTCCGrkCAQEwfTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu # Yy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJT # QTQwOTYgU0hBMzg0IDIwMjEgQ0ExAhAHHxQbizANJfMU6yMM0NHdMA0GCWCGSAFl # AwQCAQUAoIHOMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcC # AQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAqV3t0Ut29nKA9Aib3 # hB5YJarT1GGdhakqzlHz+gumODBiBgorBgEEAYI3AgEMMVQwUqBMgEoAQgB1AGkA # bAB0ADoAIABSAGUAbABlAGEAcwBlAF8AdgAzAC4AMQAzAC4AMAByAGMAMQBfADIA # MAAyADQAMAA3ADMAMQAuADAAMaECgAAwDQYJKoZIhvcNAQEBBQAEggIAFxu82YvE # 47pbLsDEwG4qWNhP6nfRcp2qGGUIMjKB8wI8srCVc0VQ29FkU6mNZ8sR6VYKCvjr # XHmilJyHd8uaoMvQNUPAtHiZDF6cguXN0ta1USxL+S8oinShAnfxWE3vTbvD0Nlb # wPheRk8mRUJwDnH1Un9HChnvxRzqpcyqIphKWKimZ2U/NgVrIrljQCNZfzaMwT23 # XiCUW3LfZH5g8GlwqOjPGpwsvZ5WWTkAOmnKU8w8KSHRnNvxBAK8JrhfC53dQR25 # IH4oFl5sET0aM16g7w0KUCF0tmh98n4PlYewovzLWHwBxL+7xIZvzfWvjew9Yz2b # v93UoeX7so/i0ttMyneYf8hOiRGjeQsCdnaWAL5raf+Zy9dfD0IsoLAwz+wA8tnd # dbfdSmikEYnaJtW2iu/v7Y3PEazJvDay+ydgOkNiEypIWb5ajHWsxcwQNWssctSo # u8+jpWPbLuWJciQ536h42+pIvGCU0hjNde/qp/N3ZY8iLnf8Tmj8VPD/jYUpceYr # FS18GwtlgXf1vm6i6EkaDrke0bV/QBOzCftMZ6+DoamxIyJyWCvHySa8wCDML7iI # ZJo9W40+oEZugj9614bmrtYIPcCWt134cgUjeTtvLiejCUfue1P3RfOtfJ+0K1Dv # 0EAwDQf/xM8CLeUVYfA1U1f2hOitMHlHdG2hghdAMIIXPAYKKwYBBAGCNwMDATGC # FywwghcoBgkqhkiG9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgG # CyqGSIb3DQEJEAEEoGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEF # AAQgOglg5NmloxH/nfFVDW3EoNbYH6ZJigJSmLk76M+M92QCEQD8KuCgcoyMXmTQ # tBID26GpGA8yMDI0MDczMTIxNTc0NlqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85Sd # CDmmv9s/X+VhFjANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UE # ChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQg # UlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoX # DTM0MTAxMzIzNTk1OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0 # LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJ # KoZIhvcNAQEBBQADggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEO # CdwvSKOXejsqnGfcYhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrH # mjsvlmbjaedp/lvD1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvK # Xd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+ # 3RChG4PBuOZSlbVH13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV # 5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0 # +9S769SgLDSb495uZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzh # Ua+0rRUGFOpiCBPTaR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/ # eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7 # UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlw # Jw1Pt7U20clfCKRwo+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQ # ofM604qDy0B7AgMBAAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEE # AjALBglghkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8w # HQYDVR0OBBYEFKW27xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuG # SWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQw # OTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQG # CCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKG # TGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJT # QTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIB # AIEa1t6gqbWYF7xwjU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEv # GN1Ott5s1+FgnCvt7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcig # LiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvE # xnvPnPp44pMadqJpddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W # 8oM3NG6wQSbd3lqXTzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MA # cN7MmJ4ZiQPq1JE3701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arA # VeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6c # Kmx5AdzaROY63jg7B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygW # y2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9O # TH0eaHDAdwrUAuBcYLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8 # WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQ # BzY3tyRUfNhHrP0oZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEV # MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t # MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAw # MDAwWhcNMzcwMzIyMjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln # aUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5 # NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A # MIICCgKCAgEAxoY1BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYR # oUQVQl+kiPNo+n3znIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CE # iiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCH # RgB720RBidx8ald68Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5K # fc71ORJn7w6lY2zkpsUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDni # pUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2 # nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp # 88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1C # vwWcZklSUPRR8zZJTYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+ # 0wOI/rOP015LdhJRk8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl2 # 7KtdRnXiYKNYCQEoAA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOC # AV0wggFZMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaa # L3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1Ud # DwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkw # JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcw # AoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJv # b3RHNC5jcnQwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQu # Y29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwB # BAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ # ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvX # bYf6hCAlNDFnzbYSlm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tP # iix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCy # Xen/KFSJ8NWKcXZl2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpF # yd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3 # fpNTrDsdCEkPlM05et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t # 5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejx # mF/7K9h+8kaddSweJywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxah # ZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAA # zV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vup # L0QVSucTDh3bNzgaoSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghA # GFowDQYJKoZIhvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lD # ZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGln # aUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEw # OTIzNTk1OVowYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ # MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1 # c3RlZCBSb290IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQ # c2jeu+RdSjwwIjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW # 61bGl20dq7J58soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU # 0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzr # yc/NrDRAX7F6Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17c # jo+A2raRmECQecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypu # kQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaP # ZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUl # ibaaRBkrfsCUtNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESV # GnZifvaAsPvoZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2 # QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZF # X50g/KEexcCPorF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1Ud # EwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1Ud # IwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5Bggr # BgEFBQcBAQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNv # bTBDBggrBgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lD # ZXJ0QXNzdXJlZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8v # Y3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEG # A1UdIAQKMAgwBgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0 # Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+A # ufih9/Jy3iS8UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51P # pwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix # 3P0c2PR3WlxUjG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVV # a88nq2x2zm8jLfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6pe # KOK5lDGCA3YwggNyAgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lD # ZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYg # U0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgB # ZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcN # AQkFMQ8XDTI0MDczMTIxNTc0NlowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvAr # MsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZIhvcNAQkEMSIEICJNuOBm20PsFwZIuGMp # UCOdnLFn+ButQWj5RTYhntv0MDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3t # dCLM0dRAV2hBNm+CitpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICAJ30 # pPKEM1aCouyY6kDaq9gyv1dyXy7pdQlLY2qMW9m+7BiVyWmKbQ4V1sEcaSiARw/S # +ndR1Dud+CW2hgLbFULYFVTvJo2YhSYQ/y0tisSyR8L71lGbDvCucJFkO2tiSP2m # SOVMnr+v7sSrbrdlXBoJ8velGw4btK1u6MMoEdnjAXQxPDrGyRuYIwM8JZM0mJxL # iEueb5et9jeOwRWnEKbkeU9eQLWlH8Kw/jWJmXEqAdagWn92WmKLHuLiSyVbBYNX # 6yO/qmkdJ7gj3l1L1KBGD+aNov+Pa+Dl+XaThy2erFX1sXtdSTLPYh+d6G5avJih # EmsSxGiXC35R4r9TbMsdV0tYchUtq+cEQIEv5lfGH0oFB3KIMakypw+uKVfPvtax # C7WRFh/30rOdpedG2OemRBSnyR1YzI/Dr60KdhWvIoX1plzXvIeNwzBK90paUXYG # ut5momzWOb6ck6OeWAeh4788Axrd2gEvXJuBc6mtNlTcIPWesFj6IEF58CFv329r # mxVkLpnuVEJHZV0qzb/UBHUOSgCTDc3JqhKsxff2OamdH23rrZ/sToDWfxL/wSEQ # QPQPP8glqey2iF9j/l0um3UFy0WwFvXWkIK2xq8d8Z+eHH6v6RRQ8hYxm9o6TtZ6 # nz7meSQ53s1WqgLLzsN8VP3o6cIJg5f0GmKeHkCh # SIG # End signature block
combined_dataset/train/non-malicious/911.ps1
911.ps1
Add-WindowsFeature Web-Server Get-Disk | Where partitionstyle -eq 'raw' | Initialize-Disk -PartitionStyle MBR -PassThru | New-Partition -AssignDriveLetter -UseMaximumSize | Format-Volume -FileSystem NTFS -NewFileSystemLabel "myDataDisk" -Confirm:$false
combined_dataset/train/non-malicious/sample_1_80.ps1
sample_1_80.ps1
param( [string]$DataPath, ` [switch]$AcceptEula, ` [switch]$Trace, ` [switch]$Logs, ` [switch]$Activity, ` [switch]$Fwd, ` [switch]$FwdCli, ` [switch]$RemShell, ` [switch]$HTTPSYS, ` [switch]$WinHTTP, ` [switch]$CAPI, ` [switch]$Kerberos, ` [switch]$NTLM, ` [switch]$PKU2U, ` [switch]$Schannel, ` [switch]$EventLog, ` [switch]$WMI, ` [switch]$Network, ` [switch]$PerfMon, ` [switch]$Kernel ) $version = "WinRM-Collect (20230601)" $DiagVersion = "WinRM-Diag (20230515)" # by Gianni Bragante - gbrag@microsoft.com Function Write-Diag { param( [string] $msg ) $msg = (get-date).ToString("yyyyMMdd HH:mm:ss.fff") + " " + $msg Write-Host $msg $msg | Out-File -FilePath $diagfile -Append } Function WinRMTraceCapture { Invoke-CustomCommand ("logman create trace 'WinRM-Trace' -ow -o '" + $TracesDir + "\WinRM-Trace-$env:COMPUTERNAME.etl" + "' -p 'Microsoft-Windows-WinRM' 0xffffffffffffffff 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 4096 -ets") Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{04C6E16D-B99F-4A3A-9B3E-B8325BBC781E}' 0xffffffffffffffff 0xff -ets" # Windows Remote Management Trace if (-not $Activity -or $Fwd) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{699E309C-E782-4400-98C8-E21D162D7B7B}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Forwarding Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B977CF02-76F6-DF84-CC1A-6A4B232322B6}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-EventCollector } if (-not $Activity -or $RemShell) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{F1CAB2C0-8BEB-4FA2-90E1-8F17E0ACDD5D}' 0xffffffffffffffff 0xff -ets" # RemoteShellClient Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{03992646-3DFE-4477-80E3-85936ACE7ABB}' 0xffffffffffffffff 0xff -ets" # RemoteShell } Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{72B18662-744E-4A68-B816-8D562289A850}' 0xffffffffffffffff 0xff -ets" # Windows HTTP Services Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{DD5EF90A-6398-47A4-AD34-4DCECDEF795F}' 0xffffffffffffffff 0xff -ets" # HTTP Service Trace if ($HTTPSYS) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{F5344219-87A4-4399-B14A-E59CD118ABB8}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Http-SQM-Provider Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{08F93B14-1608-4A72-9CFA-457EECEDBBA7}' 0xffffffffffffffff 0xff -ets" # WebIo Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{C42A2738-2333-40A5-A32F-6ACC36449DCC}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-HttpLog Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{7B6BC78C-898B-4170-BBF8-1A469EA43FC5}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-HttpEvent Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{20F61733-57F1-4127-9F48-4AB7A9308AE2}' 0xffffffffffffffff 0xff -ets" # HttpSysGuid Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B1945E15-4933-460F-8103-AA611DDB663A}' 0xffffffffffffffff 0xff -ets" # HttpSysProvider } if (-not $Activity -or $WinHTTP) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{7D44233D-3055-4B9C-BA64-0D47CA40A232}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-WinHttp Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B3A7698A-0C45-44DA-B73D-E181C9B5C8E6}' 0xffffffffffffffff 0xff -ets" # WinHttp } if (-not $Activity -or $CAPI) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{5BBCA4A8-B209-48DC-A8C7-B23D3E5216FB}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-CAPI2 } if (-not $Activity -or $Kerberos) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6B510852-3583-4E2D-AFFE-A67F9F223438}' 0xffffffffffffffff 0xff -ets" # Kerberos Authentication Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{BBA3ADD2-C229-4CDB-AE2B-57EB6966B0C4}' 0xffffffffffffffff 0xff -ets" # Kerberos Client Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{98E6CFCB-EE0A-41E0-A57B-622D4E1B30B1}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Security-Kerberos } if (-not $Activity -or $CredSSP) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6165F3E2-AE38-45D4-9B23-6B4818758BD9}' 0xffffffffffffffff 0xff -ets" # TSPkg } if (-not $Activity -or $NTLM) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{AC43300D-5FCC-4800-8E99-1BD3F85F0320}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-NTLM Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{C92CF544-91B3-4DC0-8E11-C580339A0BF8}' 0xffffffffffffffff 0xff -ets" # NTLM Security Protocol Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{5BBB6C18-AA45-49B1-A15F-085F7ED0AA90}' 0xffffffffffffffff 0xff -ets" # NTLM Authentication } if ($PKU2U) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{2A6FAF47-5449-4805-89A3-A504F3E221A6}' 0xffffffffffffffff 0xff -ets" # Pku2u Authentication Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B1108F75-3252-4B66-9239-80FD47E06494}' 0xffffffffffffffff 0xff -ets" # IdentityCommonLib Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{D93FE84A-795E-4608-80EC-CE29A96C8658}' 0xffffffffffffffff 0xff -ets" # IdentityListenerControlGuid Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{82C7D3DF-434D-44FC-A7CC-453A8075144E}' 0xffffffffffffffff 0xff -ets" # IDStore } if (-not $Activity -or $Schannel) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{1F678132-5938-4686-9FDC-C8FF68F15C85}' 0xffffffffffffffff 0xff -ets" # Schannel Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{37D2C3CD-C5D4-4587-8531-4696C44244C8}' 0xffffffffffffffff 0xff -ets" # SchannelWppGuid } if ($FwdCli) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{9D11915C-C654-4D73-A6D6-591570E011A0}' 0xffffffffffffffff 0xff -ets" # EvtFwdrWpp Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6FCDF39A-EF67-483D-A661-76D715C6B008}' 0xffffffffffffffff 0xff -ets" # ForwarderTrace } if ($FwdCli -or $EventLog) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{FC65DDD8-D6EF-4962-83D5-6E5CFE9CE148}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Eventlog Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B0CA1D82-539D-4FB0-944B-1620C6E86231}' 0xffffffffffffffff 0xff -ets" # EventlogTrace } if ($WMI) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{1418EF04-B0B4-4623-BF7E-D74AB47BBDAA}' 0xffffffffffffffff 0xff -ets" # WMI-Activity } if ($Network) { Invoke-CustomCommand ("netsh trace start capture=yes scenario=netconnection maxsize=2048 report=disabled tracefile='" + $TracesDir + "NETCAP-" + $env:COMPUTERNAME + ".etl'") } if ($Kernel) { Invoke-CustomCommand ("logman create trace 'NT Kernel Logger' -ow -o '" + $TracesDir + "\WinRM-Trace-kernel-$env:COMPUTERNAME.etl" + "' -p '{9E814AAD-3204-11D2-9A82-006008A86939}' 0x1 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 512 -ets") } if ($PerfMon) { Invoke-CustomCommand ("Logman create counter 'WinRM-Trace-PerfMon' -f bincirc -max 2048 -c '\Process(*)\*' '\Processor(*)\*' '\PhysicalDisk(*)\*' '\Event Tracing for Windows Session(EventLog-*)\Events Lost' '\Event Tracing for Windows Session(EventLog-*)\Events Logged per sec' '\HTTP Service Request Queues(*)\*' -si 00:00:01 -o '" + $TracesDir + "WinRM-trace-$env:COMPUTERNAME.blg'") Invoke-CustomCommand ("logman start 'WinRM-Trace-PerfMon'") } Write-Log "Trace capture started" read-host "Press ENTER to stop the capture" Invoke-CustomCommand "logman stop 'WinRM-Trace' -ets" if ($Network) { Invoke-CustomCommand "netsh trace stop" } if ($Kernel) { Invoke-CustomCommand "logman stop 'NT Kernel Logger' -ets" } if ($PerfMon) { Invoke-CustomCommand ("logman stop 'WinRM-Trace-PerfMon'") Invoke-CustomCommand ("logman delete 'WinRM-Trace-PerfMon'") } Invoke-CustomCommand "tasklist /svc" -DestinationFile ("Traces\tasklist-$env:COMPUTERNAME.txt") } Function GetPlugins{ # This function is a contribution from Ga�tan Rabier param( [string] $WinRMPluginPath = "WSMan:\localhost\plugin" ) Write-Log ("Parsing plugins from path " + $WinRMPluginPath) $WinRMPlugins = Get-ChildItem $WinRMPluginPath foreach ($Plugin in $WinRMPlugins) { $PluginName = $Plugin.Name $PluginURIs = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources).Name $PluginDLL = (Get-ChildItem $WinRMPluginPath\$PluginName\Filename).Value $PluginName | Out-File -FilePath ($resDir + "\Plugins.txt") -Append (" DLL: " + $PluginDLL) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append foreach ($PluginURI in $PluginURIs) { $Capability = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Capability).Value $SecurityContainerName = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Security).Name $SecurityContainer = Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Security\$SecurityContainerName $SecuritySddl = ($SecurityContainer |Where-Object {$_.Name -eq 'Sddl'}).Value $SecuritySddlConverted = (ConvertFrom-SddlString $SecuritySddl).DiscretionaryAcl $ResourceURI = ($SecurityContainer | Where-Object {$_.Name -eq 'ParentResourceUri'}).Value (" URI: " + $ResourceURI) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append (" Capabilities: " + $Capability) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append (" Security descriptor : " + $SecuritySddlConverted) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append " " | Out-File -FilePath ($resDir + "\Plugins.txt") -Append Remove-Variable SecurityContainerName,SecurityContainer,ResourceURI,Capability,SecuritySddlConverted,SecuritySddl } } } Function EvtLogDetails { param( [string] $LogName ) Write-Log ("Collecting the details for the " + $LogName + " log") $cmd = "wevtutil gl " + $logname + " >>""" + $resDir + "\EventLogs.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append Write-Log ("Collecting the details for the " + $LogName + " log") $cmd = "wevtutil gli " + $logname + " >>""" + $resDir + "\EventLogs.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append "" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append if ($logname -ne "ForwardedEvents") { $evt = (Get-WinEvent -Logname $LogName -MaxEvents 1 -Oldest) "Oldest " + $evt.TimeCreated + " (" + $evt.RecordID + ")" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append $evt = (Get-WinEvent -Logname $LogName -MaxEvents 1) "Newest " + $evt.TimeCreated + " (" + $evt.RecordID + ")" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append "" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append } } Function GetStore($store) { $certlist = Get-ChildItem ("Cert:\LocalMachine\" + $store) foreach ($cert in $certlist) { $EKU = "" foreach ($item in $cert.EnhancedKeyUsageList) { if ($item.FriendlyName) { $EKU += $item.FriendlyName + " / " } else { $EKU += $item.ObjectId + " / " } } $row = $tbcert.NewRow() foreach ($ext in $cert.Extensions) { if ($ext.oid.value -eq "2.5.29.14") { $row.SubjectKeyIdentifier = $ext.SubjectKeyIdentifier.ToLower() } elseif (($ext.oid.value -eq "2.5.29.35") -or ($ext.oid.value -eq "2.5.29.1")) { $asn = New-Object Security.Cryptography.AsnEncodedData ($ext.oid,$ext.RawData) $aki = $asn.Format($true).ToString().Replace(" ","") $aki = (($aki -split '\n')[0]).Replace("KeyID=","").Trim() $row.AuthorityKeyIdentifier = $aki } elseif (($ext.oid.value -eq "1.3.6.1.4.1.311.21.7") -or ($ext.oid.value -eq "1.3.6.1.4.1.311.20.2")) { $asn = New-Object Security.Cryptography.AsnEncodedData ($ext.oid,$ext.RawData) $tmpl = $asn.Format($true).ToString().Replace(" ","") $template = (($tmpl -split '\n')[0]).Replace("Template=","").Trim() $row.Template = $template } } if ($EKU) {$EKU = $eku.Substring(0, $eku.Length-3)} $row.Store = $store $row.Thumbprint = $cert.Thumbprint.ToLower() $row.Subject = $cert.Subject $row.Issuer = $cert.Issuer $row.NotAfter = $cert.NotAfter $row.EnhancedKeyUsage = $EKU $row.SerialNumber = $cert.SerialNumber.ToLower() $tbcert.Rows.Add($row) } } Function ChkCert($cert, $store, $descr) { $cert = $cert.ToLower() if ($cert) { if ("0123456789abcdef".Contains($cert[0])) { $aCert = $tbCert.Select("Thumbprint = '" + $cert + "' and $store") if ($aCert.Count -gt 0) { Write-Diag ("[INFO] The $descr certificate was found, the subject is " + $aCert[0].Subject) if (($aCert[0].NotAfter) -gt (Get-Date)) { Write-Diag ("[INFO] The $descr certificate will expire on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } else { Write-Diag ("[ERROR] The $descr certificate expired on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } } else { Write-Diag "[ERROR] The certificate with thumbprint $cert was not found in $store" } } else { Write-Diag "[ERROR] Invalid character in the $cert certificate thumbprint $cert" } } else { Write-Diag "[ERROR] The thumbprint of $descr certificate is empty" } } Function GetSubVal { param( [string]$SubName, [string]$SubValue) $SubProp = (Get-Item -Path ("HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions\" + $SubName) | Get-ItemProperty) if ($SubProp.($SubValue)) { return $SubProp.($SubValue) } else { $cm = $SubProp.ConfigurationMode $subVal = (Get-Item -Path ("HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\ConfigurationModes\" + $cm) | Get-ItemProperty) return $SubVal.($SubValue) } } Function GetOwnerCim{ param( $prc ) $ret = Invoke-CimMethod -InputObject $prc -MethodName GetOwner return ($ret.Domain + "\" + $ret.User) } Function GetOwnerWmi{ param( $prc ) $ret = $prc.GetOwner() return ($ret.Domain + "\" + $ret.User) } $myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent() $myWindowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($myWindowsID) $adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator if (-not $myWindowsPrincipal.IsInRole($adminRole)) { Write-Output "This script needs to be run as Administrator" exit } $global:Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path $resName = "WinRM-Results-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss) if ($DataPath) { if (-not (Test-Path $DataPath)) { Write-Host "The folder $DataPath does not exist" exit } $global:resDir = $DataPath + "\" + $resName } else { $global:resDir = $global:Root + "\" + $resName } if ($DataPath) { if (-not (Test-Path $DataPath)) { Write-Host "The folder $DataPath does not exist" exit } $global:resDir = $DataPath + "\" + $resName } else { $global:resDir = $global:Root + "\" + $resName } $diagfile = $global:resDir + "\WinRM-Diag.txt" $global:outfile = $global:resDir + "\script-output.txt" $global:errfile = $global:resDir + "\script-errors.txt" Import-Module ($global:Root + "\Collect-Commons.psm1") -Force -DisableNameChecking if (-not $Trace -and -not $Logs) { Write-Host "WinRM-Collect: a data collection tools for WinRM troubleshooting" Write-Host "" Write-Host "Usage:" Write-Host "WinRM-Collect -Logs" Write-Host " Collects dumps, logs, registry keys, command outputs" Write-Host "" Write-Host "WinRM-Collect -Trace [[-Activity][-Fwd][-RemShell][-HTTP][-CAPI][-Kerberos][-CredSSP][-NTLM][-Schannel]] [-FwdCli][-EventLog][-Network][-Kernel][-PerfMon]" Write-Host " Collects live trace" Write-Host "" Write-Host "WinRM-Collect -Logs -Trace [[-Activity][-Fwd][-RemShell][-HTTP][-CAPI][-Kerberos][-CredSSP][-NTLM][-Schannel]] [-FwdCli][-EventLog][-Network][-Kernel][-PerfMon]" Write-Host " Collects live trace then -Logs data" Write-Host "" Write-Host "Parameters for -Trace :" Write-Host " -Activity : Only trace WinRM basic log, less detailed and less noisy)" Write-Host " -Fwd : Event Log Forwarding (enabled by default without -Activity)" Write-Host " -RemShell : Remote Shell (enabled by default without -Activity)" Write-Host " -HTTPSYS : HTTP.SYS tracing" Write-Host " o If specified advanced HTTP.SYS tracing is enabled" Write-Host " o If not specified basic HTTP.SYS tracing is enabled" Write-Host " o With -Activity no HTTPS.SYS tracing, unless specified" Write-Host " -WinHTTP : WinHTTP (enabled by default without -Activity)" Write-Host " -CAPI : CAPI (enabled by default without -Activity)" Write-Host " -Kerberos : Kerberos (enabled by default without -Activity)" Write-Host " -CredSSP : CredSSP (enabled by default without -Activity)" Write-Host " -NTLM : NTLM (enabled by default without -Activity)" Write-Host " -Schannel : Schannel (enabled by default without -Activity)" Write-Host " -WMI : WMI activity" Write-Host "" Write-Host " -FwdCli : Additional client side treacing for EventLog forwarding" Write-Host " -EventLog : Event Log tracing (included in -FwdCli)" Write-Host " -Network : Network capture" Write-Host " -Kernel : Kernel Trace for process start and stop" Write-Host " -PerfMon : Performance counters" Write-Host "" exit } $RdrOut = " >>""" + $global:outfile + """" $RdrErr = " 2>>""" + $global:errfile + """" $fqdn = [System.Net.Dns]::GetHostByName(($env:computerName)).HostName $OSVer = ([environment]::OSVersion.Version.Major) + ([environment]::OSVersion.Version.Minor) /10 New-Item -itemtype directory -path $global:resDir | Out-Null Write-Log $version if ($AcceptEula) { Write-Log "AcceptEula switch specified, silently continuing" $eulaAccepted = ShowEULAIfNeeded "WinRM-Collect" 2 } else { $eulaAccepted = ShowEULAIfNeeded "WinRM-Collect" 0 if($eulaAccepted -ne "Yes") { Write-Log "EULA declined, exiting" exit } } Write-Log "EULA accepted, continuing" if ($Trace) { $TracesDir = $global:resDir + "\Traces\" New-Item -itemtype directory -path $TracesDir | Out-Null WinRMTraceCapture if (-not $Logs) { exit } } "Logman create counter FwdEvtPerf -o """ + $global:resDir + "\FwdEvtPerf.blg"" -f bin -v mmddhhmm -c ""\Process(*)\*"" ""\Processor(*)\*"" ""\PhysicalDisk(*)\*"" ""\Event Tracing for Windows Session(EventLog-*)\Events Lost"" ""\Event Tracing for Windows Session(EventLog-*)\Events Logged per sec"" ""\HTTP Service Request Queues(*)\*"" -si 00:00:01" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii "Logman start FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii "timeout 60" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii "Logman stop FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii "Logman delete FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii $cmd = $global:resDir + "\WEF-Perf.bat" Write-Log $cmd Start-Process $cmd -WindowStyle Minimized Write-Log "Retrieving WinRM configuration" $config = Get-ChildItem WSMan:\localhost\ -Recurse -ErrorAction Continue 2>>$global:errfile if (!$config) { Write-Log ("Cannot connect to localhost, trying with FQDN " + $fqdn) Connect-WSMan -ComputerName $fqdn -ErrorAction Continue 2>>$global:errfile $config = Get-ChildItem WSMan:\$fqdn -Recurse -ErrorAction Continue 2>>$global:errfile GetPlugins -WinRMPluginPath (WSMan:\$fqdn\Plugin) Disconnect-WSMan -ComputerName $fqdn -ErrorAction Continue 2>>$global:errfile } else { GetPlugins } $config | out-string -Width 500 | out-file -FilePath ($global:resDir + "\WinRM-config.txt") Write-Log "winrm get winrm/config" $cmd = "winrm get winrm/config >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "winrm e winrm/config/listener" $cmd = "winrm e winrm/config/listener >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "winrm enum winrm/config/service/certmapping" $cmd = "winrm enum winrm/config/service/certmapping >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "Collecting dump of the svchost process hosting the WinRM service" $pidWinRM = FindServicePid "WinRM" if ($pidWinRM) { CreateProcDump $pidWinRM $global:resDir "svchost-WinRM" } Write-Log "Collecing the dumps of wsmprovhost.exe processes" $list = get-process -Name "wsmprovhost" -ErrorAction SilentlyContinue 2>>$global:errfile if (($list | Measure-Object).count -gt 0) { foreach ($proc in $list) { Write-Log ("Found wsmprovhost.exe with PID " + $proc.Id) CreateProcDump $proc.id $global:resDir } } else { Write-Log "No wsmprovhost.exe processes found" } if ($pidWinRM) { Write-Log ("The PID of the WinRM service is: " + $pidWinRM) $pidWEC = FindServicePid "WecSvc" if ($pidWEC) { Write-Log ("The PID of the WecSvc service is: " + $pidWEC) if ($pidWinRM -ne $pidWEC) { Write-Log "WinRM and WecSvc are not in the same process" CreateProcDump $pidWEC $global:resDir "scvhost-WEC" } } } Write-Log "Collecting dump of the SME.exe process" $proc = get-process "SME" -ErrorAction SilentlyContinue if ($proc) { Write-Log "Process SME.EXE found with PID $proc.id" CreateProcDump $proc.id $global:resDir } FileVersion -Filepath ($env:windir + "\system32\wsmsvc.dll") -Log $true FileVersion -Filepath ($env:windir + "\system32\pwrshplugin.dll") -Log $true if (Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions) { Write-Log "Retrieving subscriptions configuration" $cmd = "wecutil es 2>>""" + $global:errfile + """" Write-log $cmd $subList = Invoke-Expression $cmd if ($subList -gt "") { foreach($sub in $subList) { Write-Log "Subscription: " + $sub ("Subscription: " + $sub) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append "-----------------------" | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append $cmd = "wecutil gs """ + $sub + """ /f:xml" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append $cmd = "wecutil gr """ + $sub + """" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append " " | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append } } } Write-Log "Listing members of Event Log Readers group" $cmd = "net localgroup ""Event Log Readers"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append if ($OSVer -le 6.3) { Write-Log "Listing members of WinRMRemoteWMIUsers__ group" $cmd = "net localgroup ""WinRMRemoteWMIUsers__"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append } else { Write-Log "Listing members of Remote Management Users group" $cmd = "net localgroup ""Remote Management Users"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append } Write-Log "Listing members of Windows Admin Center CredSSP Administrators group" $cmd = "net localgroup ""Windows Admin Center CredSSP Administrators"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append (" ") | Out-File -FilePath ($global:resDir + "\Groups.txt") -Append ($group + " = " + $strSID) | Out-File -FilePath ($global:resDir + "\Groups.txt") -Append Write-Log "Getting the output of WHOAMI /all" $cmd = "WHOAMI /all >>""" + $global:resDir + "\WHOAMI.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "Get-Culture output" "Get-Culture" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-Culture | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Exporting registry key HKEY_USERS\S-1-5-20\Control Panel\International" $cmd = "reg export ""HKEY_USERS\S-1-5-20\Control Panel\International"" """ + $global:resDir + "\InternationalNetworkService.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Get-WinSystemLocale output" "Get-WinSystemLocale" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinSystemLocale | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinHomeLocation output" "Get-WinHomeLocation" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinHomeLocation | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinUILanguageOverride output" "Get-WinUILanguageOverride" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinUILanguageOverride | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinUserLanguageList output" "Get-WinUserLanguageList" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinUserLanguageList | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinAcceptLanguageFromLanguageListOptOut output" "Get-WinAcceptLanguageFromLanguageListOptOut" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinAcceptLanguageFromLanguageListOptOut | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinCultureFromLanguageListOptOut output" "Get-Get-WinCultureFromLanguageListOptOut" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinCultureFromLanguageListOptOut | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinDefaultInputMethodOverride output" "Get-WinDefaultInputMethodOverride" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinDefaultInputMethodOverride | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinLanguageBarOption output" "Get-WinLanguageBarOption" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinLanguageBarOption | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-NetConnectionProfile output" Get-NetConnectionProfile | Out-File -FilePath ($global:resDir + "\NetConnectionProfile.txt") -Append Write-Log "Get-WSManCredSSP output" Get-WSManCredSSP | Out-File -FilePath ($global:resDir + "\WSManCredSSP.txt") -Append Write-Log "Exporting firewall rules" $cmd = "netsh advfirewall firewall show rule name=all >""" + $global:resDir + "\FirewallRules.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Invoke-CustomCommand -Command "netstat -anob" -DestinationFile "netstat.txt" Invoke-CustomCommand -Command "ipconfig /all" -DestinationFile "ipconfig.txt" Invoke-CustomCommand -Command "auditpol /get /category:*" -DestinationFile "auditpol.txt" Write-Log "Copying hosts and lmhosts" if (Test-path -path C:\Windows\system32\drivers\etc\hosts) { Copy-Item C:\Windows\system32\drivers\etc\hosts $global:resDir\hosts.txt -ErrorAction Continue 2>>$global:errfile } if (Test-Path -Path C:\Windows\system32\drivers\etc\lmhosts) { Copy-Item C:\Windows\system32\drivers\etc\lmhosts $global:resDir\lmhosts.txt -ErrorAction Continue 2>>$global:errfile } $dir = $env:windir + "\system32\logfiles\HTTPERR" if (Test-Path -path $dir) { $last = Get-ChildItem -path ($dir) | Sort-Object CreationTime -Descending | Select-Object Name -First 1 Copy-Item ($dir + "\" + $last.name) $global:resDir\httperr.log -ErrorAction Continue 2>>$global:errfile } Write-Log "WinHTTP proxy configuration" $cmd = "netsh winhttp show proxy >""" + $global:resDir + "\WinHTTP-Proxy.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "NSLookup WPAD" "------------------" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append "NSLookup WPAD" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append "" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append $cmd = "nslookup wpad >>""" + $global:resDir + "\WinHTTP-Proxy.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM" $cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM """ + $global:resDir + "\WinRM.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN """+ $global:resDir + "\WSMAN.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd if (Test-Path HKLM:\Software\Policies\Microsoft\Windows\WinRM) { Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM" $cmd = "reg export HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM """+ $global:resDir + "\WinRM-Policies.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd } else { Write-Log "The registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM is not present" } Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System """+ $global:resDir + "\System-Policies.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector """+ $global:resDir + "\EventCollector.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventForwarding" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventForwarding """+ $global:resDir + "\EventForwarding.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog """+ $global:resDir + "\EventLog-Policies.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL" $cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL """+ $global:resDir + "\SCHANNEL.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography" $cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography """+ $global:resDir + "\Cryptography.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography """+ $global:resDir + "\Cryptography-Policy.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa" $cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa """+ $global:resDir + "\LSA.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP" $cmd = "reg export HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP """+ $global:resDir + "\HTTP.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd if (Test-Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials) { Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials """+ $global:resDir + "\AllowFreshCredentials.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd } else { Write-Log "The registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials is not present" } Export-EventLog "System" Export-EventLog "Application" Export-EventLog "Microsoft-Windows-CAPI2/Operational" Export-EventLog "Microsoft-Windows-WinRM/Operational" Export-EventLog "Microsoft-Windows-EventCollector/Operational" Export-EventLog "Microsoft-Windows-Forwarding/Operational" Export-EventLog "Microsoft-Windows-PowerShell/Operational" Export-EventLog "Windows PowerShell" Export-EventLog "PowerShellCore/Operational" Export-EventLog "Microsoft-Windows-GroupPolicy/Operational" Export-EventLog "Microsoft-Windows-Kernel-EventTracing/Admin" Export-EventLog "Microsoft-ServerManagementExperience" Export-EventLog "Microsoft-Windows-ServerManager-ConfigureSMRemoting/Operational" Export-EventLog "Microsoft-Windows-ServerManager-DeploymentProvider/Operational" Export-EventLog "Microsoft-Windows-ServerManager-MgmtProvider/Operational" Export-EventLog "Microsoft-Windows-ServerManager-MultiMachine/Operational" Export-EventLog "Microsoft-Windows-FileServices-ServerManager-EventProvider/Operational" EvtLogDetails "Application" EvtLogDetails "System" EvtLogDetails "Security" EvtLogDetails "ForwardedEvents" Write-Log "Autologgers configuration" Get-AutologgerConfig -Name EventLog-ForwardedEvents -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append Get-AutologgerConfig -Name EventLog-System -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append Get-AutologgerConfig -Name EventLog-Security -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append Get-AutologgerConfig -Name EventLog-Application -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append if ($OSVer -gt 6.1 ) { Write-Log "Copying ServerManager configuration" copy-item $env:APPDATA\Microsoft\Windows\ServerManager\ServerList.xml $global:resDir\ServerList.xml -ErrorAction Continue 2>>$global:errfile Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\ServicingStorage\ServerComponentCache" $cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\ServicingStorage\ServerComponentCache"" """ + $global:resDir + "\ServerComponentCache.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd } Write-Log "Get-Module output" Get-Module -ListAvailable | Out-File -FilePath ($global:resDir + "\Get-Module.txt") Write-Log "Exporting netsh http settings" $cmd = "netsh http show sslcert >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "netsh http show urlacl >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "netsh http show servicestate >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "netsh http show iplisten >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd if (Test-Path HKLM:\SOFTWARE\Microsoft\InetStp) { Write-Log "Exporting IIS configuration" $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list app >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list apppool >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list site >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list module >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list wp >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list vdir >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list config >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd } else { Write-Log "IIS is not installed" } if (Test-Path -Path ($env:windir + "\System32\inetsrv\Config\ApplicationHost.config")) { Write-Log "IIS ApplicationHost.config" Copy-Item "C:\Windows\System32\inetsrv\Config\ApplicationHost.config" ($global:resDir + "\ApplicationHost.config") } $cmd = "setspn -L " + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching HTTP/" + $env:computername + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -Q HTTP/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching HTTP/" + $fqdn + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -Q HTTP/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching HTTP/" + $env:computername + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -F -Q HTTP/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching HTTP/" + $fqdn + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -F -Q HTTP/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching WSMAN/" + $env:computername + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -Q WSMAN/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching WSMAN/" + $fqdn + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -Q WSMAN/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching WSMAN/" + $env:computername + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -F -Q WSMAN/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching WSMAN/" + $fqdn + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -F -Q WSMAN/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append Write-Log "Collecting certificates details" $cmd = "Certutil -verifystore -v MY > """ + $global:resDir + "\Certificates-My.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "Certutil -verifystore -v ROOT > """ + $global:resDir + "\Certificates-Root.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "Certutil -verifystore -v CA > """ + $global:resDir + "\Certificates-Intermediate.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $tbCert = New-Object system.Data.DataTable $col = New-Object system.Data.DataColumn Store,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn Thumbprint,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn Subject,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn Issuer,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn NotAfter,([DateTime]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn IssuerThumbprint,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn EnhancedKeyUsage,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn SerialNumber,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn SubjectKeyIdentifier,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn AuthorityKeyIdentifier,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn Template,([string]); $tbCert.Columns.Add($col) GetStore "My" GetStore "CA" GetStore "Root" Write-Log "Matching issuer thumbprints" $aCert = $tbCert.Select("Store = 'My' or Store = 'CA'") foreach ($cert in $aCert) { $aIssuer = $tbCert.Select("SubjectKeyIdentifier = '" + ($cert.AuthorityKeyIdentifier).tostring() + "'") if ($aIssuer.Count -gt 0) { $cert.IssuerThumbprint = ($aIssuer[0].Thumbprint).ToString() } } $tbcert | Export-Csv ($global:resDir + "\certificates.tsv") -noType -Delimiter "`t" Write-Log "PowerShell version" $PSVersionTable | Out-File -FilePath ($global:resDir + "\PSVersion.txt") -Append Write-Log "Collecting details about running processes" if (ListProcsAndSvcs) { CollectSystemInfoWMI ExecQuery -Namespace "root\cimv2" -Query "select * from Win32_Product" | Sort-Object Name | Format-Table -AutoSize -Property Name, Version, Vendor, InstallDate | Out-String -Width 400 | Out-File -FilePath ($global:resDir + "\products.txt") Write-Log "Collecting the list of installed hotfixes" Get-HotFix -ErrorAction SilentlyContinue 2>>$global:errfile | Sort-Object -Property InstalledOn -ErrorAction Ignore | Out-File $global:resDir\hotfixes.txt Write-Log "Collecing GPResult output" $cmd = "gpresult /h """ + $global:resDir + "\gpresult.html""" + $RdrErr write-log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append $cmd = "gpresult /r >""" + $global:resDir + "\gpresult.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append } else { Write-Log "WMI is not working" $proc = Get-Process | Where-Object {$_.Name -ne "Idle"} $proc | Format-Table -AutoSize -property id, name, @{N="WorkingSet";E={"{0:N0}" -f ($_.workingset/1kb)};a="right"}, @{N="VM Size";E={"{0:N0}" -f ($_.VirtualMemorySize/1kb)};a="right"}, @{N="Proc time";E={($_.TotalProcessorTime.ToString().substring(0,8))}}, @{N="Threads";E={$_.threads.count}}, @{N="Handles";E={($_.HandleCount)}}, StartTime, Path | Out-String -Width 300 | Out-File -FilePath ($global:resDir + "\processes.txt") CollectSystemInfoNoWMI } Write-Diag ("[INFO] " + $DiagVersion) # Diag start function New-UrlAcl { New-Object psobject -Property @{ Protocol = '' Host = '' Port = 0 Path = '' Url = '' Users = @() } } function New-UrlAclUser { New-Object psobject -Property @{ Name = '' Listen = $false Delegate = $false SSDL = '' } } function Get-UrlAcl { # Taken from https://www.powershellgallery.com/packages/HttpSys/1.0.1/Content/Get-UrlAcl.ps1 and modified to also run on PowerShell 4 [CmdletBinding()] param( [parameter(Position=0)] [string]$Url, [parameter()] [int[]]$Port, [string]$HostName, [string]$Protocol ) $cmd = "netsh http show urlacl" if (-not [string]::IsNullOrWhiteSpace($Url)){ $cmd += " url=$Url" } $result = Invoke-Expression $cmd $result = $result | Select-Object -Skip 4 $items = @() $item = New-UrlAcl $user = New-UrlAclUser for ($i = 0; $i -lt $result.Length; $i++){ $line = $result[$i] if ([string]::IsNullOrWhiteSpace($line)){ continue; } $splitIndex = $line.IndexOf(": "); $key = $line.Substring(0,$splitIndex).Trim(); $value = $line.Substring($splitIndex + 2); if ($key -eq "Reserved Url"){ $item = New-UrlAcl $protocolSplitIndex = $value.IndexOf("://"); $item.Protocol = $value.Substring(0, $protocolSplitIndex) $remainder = $value.Substring($protocolSplitIndex + 3) $pathSplitIndex = $remainder.IndexOf("/") $hostDetails = $remainder.Substring(0, $pathSplitIndex) $hostParts = $hostDetails.Split(':') $item.Host = $hostParts[0] $item.Port = $hostParts[1] $item.Path = $remainder.Substring($pathSplitIndex) $item.Url = $value $items += $item } if ($key -eq "User"){ $user = New-UrlAclUser $user.Name = $value $item.Users += $user } if ($key -eq "Listen"){ $user.Listen = if ($value -eq "Yes") { $true } else { $false } } if ($key -eq "Delegate"){ $user.Delegate = if ($value -eq "Yes") { $true } else { $false } } if ($key -eq "SDDL"){ $user.SSDL = $value } } if (-not [string]::IsNullOrWhiteSpace($HostName)){ $items = $items | Where-Object { $_.Host -eq $HostName } } if (-not [string]::IsNullOrWhiteSpace($Protocol)){ $items = $items | Where-Object { $_.Protocol -eq $Protocol } } if ($null -ne $Port){ if ($Port -isnot [System.Array]){ $Port = @($Port) } if ($Port.Length -ge 0){ $items = $items | Where-Object { $Port -contains $_.Port } } } return $items } Write-Diag "Retrieving URLACL information" $urlACL = Get-UrlAcl Write-Diag "[INFO] Checking HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\ClientAuthTrustMode" $ClientAuthTrustMode = (Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel" | Select-Object -ExpandProperty "ClientAuthTrustMode" -ErrorAction SilentlyContinue) if ($ClientAuthTrustMode -eq $null -or $ClientAuthTrustMode -eq 0) { Write-Diag "[WARNING] 0 Machine Trust (default) - Requires that the client certificate is issued by a certificate in the Trusted Issuers list." } elseif ($ClientAuthTrustMode -eq 1) { Write-Diag "[WARNING] 1 Exclusive Root Trust - Requires that a client certificate chains to a root certificate contained in the caller-specified trusted issuer store. The certificate must also be issued by an issuer in the Trusted Issuers list" } elseif ($ClientAuthTrustMode -eq 2) { Write-Diag "[INFO] 2 Exclusive CA Trust - Requires that a client certificate chain to either an intermediate CA certificate or root certificate in the caller-specified trusted issuer store." } else { Write-Diag ("[ERROR] Invalid value " + $ClientAuthTrustMode) } $OSVer = [environment]::OSVersion.Version.Major + [environment]::OSVersion.Version.Minor * 0.1 $subDom = $false $subWG = $false $Subscriptions = Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions foreach ($sub in $Subscriptions) { Write-Diag ("[INFO] Found subscription " + $sub.PSChildname) $SubProp = ($sub | Get-ItemProperty) Write-Diag ("[INFO] SubscriptionType = " + $SubProp.SubscriptionType + ", ConfigurationMode = " + $SubProp.ConfigurationMode) Write-Diag ("[INFO] MaxLatencyTime = " + (GetSubVal $sub.PSChildname "MaxLatencyTime") + ", HeartBeatInterval = " + (GetSubVal $sub.PSChildname "HeartBeatInterval")) $logFile = (GetSubVal $sub.PSChildname "LogFile") if ($logFile -ne "ForwardedEvents") { Write-Diag ("[WARNING] LogFile = " + $logFile + ", this is a CUSTOM LOG") } else { Write-Diag ("[INFO] LogFile = " + $logFile) } if ($SubProp.AllowedSourceDomainComputers) { Write-Diag "[INFO] AllowedSourceDomainComputers" $ACL = (FindSep -FindIn $SubProp.AllowedSourceDomainComputers -Left ":P" -Right ")S:").replace(")(", ",").Split(",") foreach ($ACE in $ACL) { $SID = FindSep -FindIn $ACE -left ";;;" $objSID = New-Object System.Security.Principal.SecurityIdentifier($SID) $group = $objSID.Translate( [System.Security.Principal.NTAccount]).Value Write-Diag "[INFO] $group ($SID)" } } if ($SubProp.Locale) { if ($SubProp.Locale -eq "en-US") { Write-Diag "[INFO] The subscription's locale is set to en-US" } else { Write-Diag ("[WARNING] The subscription's locale is set to " + $SubProp.Locale) } } else { Write-Diag "[INFO] The subscription's locale is not set, the default locale will be used." } if ($SubProp.AllowedSubjects) { $subWG = $true Write-Diag "[INFO] Listed non-domain computers:" $list = $SubProp.AllowedSubjects -split "," foreach ($item in $list) { Write-Diag ("[INFO] " + $item) } } else { Write-Diag "[INFO] No non-domain computers listed, that's ok if this is not a collector in workgroup environment" } if ($SubProp.AllowedIssuerCAs) { $subWG = $true Write-Diag "[INFO] Listed Issuer CAs:" $list = $SubProp.AllowedIssuerCAs -split "," foreach ($item in $list) { Write-Diag ("[INFO] " + $item) ChkCert -cert $item -store "(Store = 'CA' or Store = 'Root')" -descr "Issuer CA" } } else { Write-Diag "[INFO] No Issuer CAs listed, that's ok if this is not a collector in workgroup environment" } $RegKey = (($sub.Name).replace("HKEY_LOCAL_MACHINE\","HKLM:\") + "\EventSources") if (Test-Path -Path $RegKey) { $sources = Get-ChildItem -Path $RegKey if ($sources.Count -gt 4000) { Write-Diag ("[WARNING] There are " + $sources.Count + " sources for this subscription") } else { Write-Diag ("[INFO] There are " + $sources.Count + " sources for this subscription") } } else { Write-Diag ("[INFO] No sources found for the subscription " + $sub.Name) } } if ($Subscriptions) { $EventLost = (Get-Counter "\\$env:computername\Event Tracing for Windows Session(EventLog-ForwardedEvents)\Events Lost").CounterSamples[0].CookedValue if ($EventLost -gt 100) { Write-Diag ("[WARNING] " + $EventLost + " events lost for EventLog-ForwardedEvents") } else { Write-Diag ("[INFO] " + $EventLost + " events lost for EventLog-ForwardedEvents") } } if ($OSVer -gt 6.1) { Write-Diag "[INFO] Retrieving machine's IP addresses" $iplist = Get-NetIPAddress } $pol = Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service -Name HttpCompatibilityListener -ErrorAction SilentlyContinue if ($pol) { if ($pol.HttpCompatibilityListener -eq 1) { Write-Diag ("[WARNING] HTTP Compatibility listener (port 80) is enabled") } } $pol = Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service -Name HttpsCompatibilityListener -ErrorAction SilentlyContinue if ($pol) { if ($pol.HttpsCompatibilityListener -eq 1) { Write-Diag ("[WARNING] HTTPS Compatibility listener (port 443) is enabled") } } Write-Diag "[INFO] Browsing listeners" $HTTPListenerFound = $false $listeners = Get-ChildItem WSMan:\localhost\Listener foreach ($listener in $listeners) { Write-Diag ("[INFO] Inspecting listener " + $listener.Name) $prop = Get-ChildItem $listener.PSPath if ($listener.keys[0] -eq "Transport=HTTP") { $HTTPListenerFound = $true } foreach ($value in $prop) { if ($value.Name -eq "CertificateThumbprint") { if ($listener.keys[0].Contains("HTTPS")) { $HTTPSListenerFound = $true Write-Diag "[INFO] Found HTTPS listener" $listenerThumbprint = $value.Value.ToLower() Write-Diag "[INFO] Found listener certificate $listenerThumbprint" if ($listenerThumbprint) { ChkCert -cert $listenerThumbprint -descr "listener" -store "Store = 'My'" } } } if ($value.Name.Contains("ListeningOn")) { $ip = ($value.value).ToString() Write-Diag "[INFO] Listening on $ip" if ($OSVer -gt 6.1) { if (($iplist | Where-Object {$_.IPAddress -eq $ip } | measure-object).Count -eq 0 ) { Write-Diag "[ERROR] IP address $ip not found" } } } } } if ($HTTPListenerFound) { Write-Diag ("[INFO] HTTP listener found") $HTTPURLACL = ($urlACL | Where-Object Port -eq 5985) if ($HTTPURLACL) { Write-Diag "[INFO] URLACL for port 5985 is present" if ($HTTPURLACL.Protocol -ne "http") { Write-Diag ("[ERROR] The protocol for port 5985 is not HTTP (" + $HTTPURLACL.Protocol + ")") } if ($HTTPURLACL.Users | Where-Object Name -eq "NT SERVICE\WinRM") { Write-Diag ("[INFO] NT SERVICE\WinRM has permissions on port 5985") } else { Write-Diag ("[ERROR] NT SERVICE\WinRM is missing permissions on port 5985") } if ($HTTPURLACL.Users | Where-Object Name -eq "NT SERVICE\Wecsvc") { Write-Diag ("[INFO] NT SERVICE\Wecsvc has permissions on port 5985") } else { Write-Diag ("[ERROR] NT SERVICE\Wecsvc is missing permissions on port 5985") } } else { Write-Diag "[ERROR] HTTP Listener found but URLACL for port 5985 is missing" } } else { Write-Diag ("[ERROR] The HTTP listener is missing") } if ($HTTPSListenerFound) { Write-Diag ("[INFO] HTTP listener found") $HTTPSURLACL = ($urlACL | Where-Object Port -eq 5986) if ($HTTPSURLACL) { Write-Diag "[INFO] URLACL for port 5986 is present" if ($HTTPSURLACL.Protocol -ne "https") { Write-Diag ("[ERROR] The protocol for port 5986 is not HTTPS (" + $HTTPSURLACL.Protocol + ")") } if ($HTTPSURLACL.Users | Where-Object Name -eq "NT SERVICE\WinRM") { Write-Diag ("[INFO] NT SERVICE\WinRM has permissions on port 5986") } else { Write-Diag ("[ERROR] NT SERVICE\WinRM is missing permissions on port 5986") } if ($HTTPSURLACL.Users | Where-Object Name -eq "NT SERVICE\Wecsvc") { Write-Diag ("[INFO] NT SERVICE\Wecsvc has permissions on port 5986") } else { Write-Diag ("[ERROR] NT SERVICE\Wecsvc is missing permissions on port 5986") } } else { Write-Diag "[ERROR] HTTPS Listener found but URLACL for port 5986 is missing" } } $svccert = Get-Item WSMan:\localhost\Service\CertificateThumbprint if ($svccert.value ) { Write-Diag ("[INFO] The Service Certificate thumbprint is " + $svccert.value) ChkCert -cert $svccert.value -descr "Service" -store "Store = 'My'" } $remoteaccess = Get-Item WSMan:\localhost\Service\AllowRemoteAccess if ($remoteaccess.Value -eq "true") { Write-Diag "[INFO] AllowRemoteAccess = true" } elseif ($remoteaccess.Value -eq "false") { Write-Diag "[ERROR] AllowRemoteAccess = false, this machine will not accept remote WinRM connections" } else { Write-Diag "[ERROR] AllowRemoteAccess has an invalid value" } $ipfilter = Get-Item WSMan:\localhost\Service\IPv4Filter if ($ipfilter.Value) { if ($ipfilter.Value -eq "*") { Write-Diag "[INFO] IPv4Filter = *" } else { Write-Diag ("[WARNING] IPv4Filter = " + $ipfilter.Value) } } else { Write-Diag ("[WARNING] IPv4Filter is empty, WinRM will not listen on IPv4") } $ipfilter = Get-Item WSMan:\localhost\Service\IPv6Filter if ($ipfilter.Value) { if ($ipfilter.Value -eq "*") { Write-Diag "[INFO] IPv6Filter = *" } else { Write-Diag ("[WARNING] IPv6Filter = " + $ipfilter.Value) } } else { Write-Diag ("[WARNING] IPv6Filter is empty, WinRM will not listen on IPv6") } if (Test-Path -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager") { $isForwarder = $True $MaxFwd = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding').MaxForwardingRate if ($MaxFwd) { Write-Diag ("[ERROR] HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\MaxForwardingRate is set to " + $MaxFwd + ". This functionality is broken, see Bug 33554568. Remove the setting Configure Forwarder Resource Usage from the GPO to avoid performance issues") } $RegKey = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager') Write-Diag "[INFO] Enumerating SubscriptionManager URLs at HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager" $RegKey.PSObject.Properties | ForEach-Object { If($_.Name -notlike '*PS*'){ Write-Diag ("[INFO] " + $_.Name + " " + $_.Value) $IssuerCA = (FindSep -FindIn $_.Value -Left "IssuerCA=" -Right ",").ToLower() if (-not $IssuerCA) { $IssuerCA = (FindSep -FindIn $_.Value -Left "IssuerCA=" -Right "").ToLower() } if ($IssuerCA) { if ("0123456789abcdef".Contains($IssuerCA[0])) { Write-Diag ("[INFO] Found issuer CA certificate thumbprint " + $IssuerCA) $aCert = $tbCert.Select("Thumbprint = '" + $IssuerCA + "' and (Store = 'CA' or Store = 'Root')") if ($aCert.Count -eq 0) { Write-Diag "[ERROR] The Issuer CA certificate was not found in CA or Root stores" } else { Write-Diag ("[INFO] Issuer CA certificate found in store " + $aCert[0].Store + ", subject = " + $aCert[0].Subject) if (($aCert[0].NotAfter) -gt (Get-Date)) { Write-Diag ("[INFO] The Issuer CA certificate will expire on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } else { Write-Diag ("[ERROR] The Issuer CA certificate expired on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } } $aCliCert = $tbCert.Select("IssuerThumbprint = '" + $IssuerCA + "' and Store = 'My'") if ($aCliCert.Count -eq 0) { Write-Diag "[ERROR] Cannot find any certificate issued by this Issuer CA" } else { if ($PSVersionTable.psversion.ToString() -ge "3.0") { Write-Diag "[INFO] Listing available client certificates from this IssuerCA" $num = 0 foreach ($cert in $aCliCert) { if ($cert.EnhancedKeyUsage.Contains("Client Authentication")) { Write-Diag ("[INFO] Found client certificate " + $cert.Thumbprint + " " + $cert.Subject) if (($Cert.NotAfter) -gt (Get-Date)) { Write-Diag ("[INFO] The client certificate will expire on " + $cert.NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } else { Write-Diag ("[ERROR] The client certificate expired on " + $cert.NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } $certobj = Get-Item ("CERT:\Localmachine\My\" + $cert.Thumbprint) $keypath = [io.path]::combine("$env:ProgramData\microsoft\crypto\rsa\machinekeys", $certobj.privatekey.cspkeycontainerinfo.uniquekeycontainername) if ([io.file]::exists($keypath)) { $acl = ((get-acl -path $keypath).Access | Where-Object {$_.IdentityReference -eq "NT AUTHORITY\NETWORK SERVICE"}) if ($acl) { $rights = $acl.FileSystemRights.ToString() if ($rights.contains("Read") -or $rights.contains("FullControl") ) { Write-Diag ("[INFO] The NETWORK SERVICE account has permissions on the private key of this certificate: " + $rights) } else { Write-Diag ("[ERROR] Incorrect permissions for the NETWORK SERVICE on the private key of this certificate: " + $rights) } } else { Write-Diag "[ERROR] Missing permissions for the NETWORK SERVICE account on the private key of this certificate" } } else { Write-Diag "[ERROR] Cannot find the private key" } $num++ } } if ($num -eq 0) { Write-Diag "[ERROR] Cannot find any client certificate issued by this Issuer CA" } elseif ($num -gt 1) { Write-Diag "[WARNING] More than one client certificate issued by this Issuer CA, the first certificate will be used by WinRM" } } } } else { Write-Diag "[ERROR] Invalid character for the IssuerCA certificate in the SubscriptionManager URL" } } } } $RegKey = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding') if ($regkey.MaxForwardingRate) { Write-Diag "[ERROR] MaxForwardingRate is configured, this feature does not work. Please remove this setting and see bug 33554568" } } else { $isForwarder = $false Write-Diag "[INFO] No SubscriptionManager URL configured. It's ok if this machine is not supposed to forward events." } if ((Get-CimInstance -ClassName Win32_ComputerSystem).PartOfDomain) { $search = New-Object DirectoryServices.DirectorySearcher([ADSI]"GC://$env:USERDNSDOMAIN") # The SPN is searched in the forest connecting to a Global catalog $SPNReg = "" $SPN = "HTTP/" + $env:COMPUTERNAME Write-Diag ("[INFO] Searching for the SPN $SPN") $search.filter = "(servicePrincipalName=$SPN)" $results = $search.Findall() if ($results.count -gt 0) { foreach ($result in $results) { Write-Diag ("[INFO] The SPN HTTP/$env:COMPUTERNAME is registered for DNS name = " + $result.properties.dnshostname + ", DN = " + $result.properties.distinguishedname + ", Category = " + $result.properties.objectcategory) if ($result.properties.objectcategory[0].Contains("Computer")) { if (-not $result.properties.dnshostname[0].Contains($env:COMPUTERNAME)) { Write-Diag ("[ERROR] The The SPN $SPN is registered for different DNS host name: " + $result.properties.dnshostname[0]) $SPNReg = "OTHER" } } else { Write-Diag "[ERROR] The The SPN $SPN is NOT registered for a computer account" $SPNReg = "OTHER" } } if ($results.count -gt 1) { Write-Diag "[ERROR] The The SPN $SPN is duplicate" } } else { Write-Diag "[INFO] The The SPN $SPN was not found. That's ok, the SPN HOST/$env:COMPUTERNAME will be used" } $SPN = "HTTP/" + $env:COMPUTERNAME + ":5985" Write-Diag ("[INFO] Searching for the SPN $SPN") $search.filter = "(servicePrincipalName=$SPN)" $results = $search.Findall() if ($results.count -gt 0) { foreach ($result in $results) { Write-Diag ("[INFO] The SPN HTTP/$env:COMPUTERNAME is registered for DNS name = " + $result.properties.dnshostname + ", DN = " + $result.properties.distinguishedname + ", Category = " + $result.properties.objectcategory) if ($result.properties.objectcategory[0].Contains("Computer")) { if (-not $result.properties.dnshostname[0].Contains($env:COMPUTERNAME)) { Write-Diag ("[ERROR] The The SPN $SPN is registered for different DNS host name: " + $result.properties.dnshostname[0]) } } else { Write-Diag "[ERROR] The The SPN $SPN is NOT registered for a computer account" } } if ($results.count -gt 1) { Write-Diag "[ERROR] The The SPN $SPN is duplicate" } } else { if ($SPNReg -eq "OTHER") { Write-Diag "[WARNING] The The SPN $SPN was not found. It is required to accept WinRM connections since the HTTP/$env:COMPUTERNAME is reqistered to another name" } } if ($OSVer -le 6.3) { Write-Diag "[INFO] Checking the WinRMRemoteWMIUsers__ group" $search = New-Object DirectoryServices.DirectorySearcher([ADSI]"") # This is a Domain local group, therefore we need to collect to a non-global catalog $search.filter = "(samaccountname=WinRMRemoteWMIUsers__)" $results = $search.Findall() if ($results.count -gt 0) { Write-Diag ("[INFO] Found " + $results.Properties.distinguishedname) if ($results.Properties.grouptype -eq -2147483644) { Write-Diag "[INFO] WinRMRemoteWMIUsers__ is a Domain local group" } elseif ($results.Properties.grouptype -eq -2147483646) { Write-Diag "[WARNING] WinRMRemoteWMIUsers__ is a Global group" } elseif ($results.Properties.grouptype -eq -2147483640) { Write-Diag "[WARNING] WinRMRemoteWMIUsers__ is a Universal group" } if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") { Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is also present as machine local group" } } else { Write-Diag "[WARNING] The WinRMRemoteWMIUsers__ was not found in the domain" if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") { Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is present as machine local group" } else { Write-Diag "[ERROR] The group WinRMRemoteWMIUsers__ is not even present as machine local group" } } } if ((Get-ChildItem WSMan:\localhost\Service\Auth\Kerberos).value -eq "true") { Write-Diag "[INFO] Kerberos authentication is enabled for the service" } else { Write-Diag "[WARNING] Kerberos authentication is disabled for the service" } } else { Write-Diag "[INFO] The machine is not joined to a domain" if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") { Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is present as machine local group" } else { Write-Diag "[ERROR] The group WinRMRemoteWMIUsers__ is not present as machine local group" } if ((Get-ChildItem WSMan:\localhost\Service\Auth\Certificate).value -eq "false") { Write-Diag "[WARNING] Certificate authentication is disabled for the service" } else { Write-Diag "[INFO] Certificate authentication is enabled for the service" } } $HHTPParam = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" if (($HHTPParam.MaxFieldLength -gt 0) -and ($HHTPParam.MaxRequestBytes -gt 0)) { Write-Diag ("[INFO] HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\MaxFieldLength = " + $HHTPParam.MaxFieldLength) Write-Diag ("[INFO] HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\MaxRequestBytes = " + $HHTPParam.MaxRequestBytes) } else { Write-Diag ("[WARNING] MaxFieldLength and/or MaxRequestBytes are not defined in HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters. This may cause the request to fail with error 400 in complex AD environemnts. See KB 820129") } $iplisten = (Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" | Select-Object -ExpandProperty "ListenOnlyList" -ErrorAction SilentlyContinue) if ($iplisten) { Write-Diag ("[WARNING] The IPLISTEN list is not empty, the listed addresses are " + $iplisten) } else { Write-Diag "[INFO] The IPLISTEN list is empty. That's ok: WinRM will listen on all IP addresses" } $binval = (Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" -Name WinHttpSettings).WinHttPSettings $proxylength = $binval[12] if ($proxylength -gt 0) { $proxy = -join ($binval[(12+3+1)..(12+3+1+$proxylength-1)] | % {([char]$_)}) Write-Diag ("[WARNING] A NETSH WINHTTP proxy is configured: " + $proxy) $bypasslength = $binval[(12+3+1+$proxylength)] if ($bypasslength -gt 0) { $bypasslist = -join ($binval[(12+3+1+$proxylength+3+1)..(12+3+1+$proxylength+3+1+$bypasslength)] | % {([char]$_)}) Write-Diag ("[WARNING] Bypass list: " + $bypasslist) } else { Write-Diag "[WARNING] No bypass list is configured" } Write-Diag "[WARNING] WinRM does not work very well through proxies, make sure that the target machine is in the bypass list or remove the proxy" } else { Write-Diag "[INFO] No NETSH WINHTTP proxy is configured" } $th = (get-item WSMan:\localhost\Client\TrustedHosts).value if ($th) { Write-Diag ("[INFO] TrustedHosts contains: $th") } else { Write-Diag ("[INFO] TrustedHosts is not configured, it's ok it this machine is not supposed to connect to other machines using NTLM") } $psver = $PSVersionTable.PSVersion.Major.ToString() + $PSVersionTable.PSVersion.Minor.ToString() if ($psver -eq "50") { Write-Diag ("[WARNING] Windows Management Framework version " + $PSVersionTable.PSVersion.ToString() + " is no longer supported") } else { Write-Diag ("[INFO] Windows Management Framework version is " + $PSVersionTable.PSVersion.ToString() ) } $clientcert = Get-ChildItem WSMan:\localhost\ClientCertificate if ($clientcert.Count -gt 0) { Write-Diag "[INFO] Client certificate mappings" foreach ($certmap in $clientcert) { Write-Diag ("[INFO] Certificate mapping " + $certmap.Name) $prop = Get-ChildItem $certmap.PSPath foreach ($value in $prop) { Write-Diag ("[INFO] " + $value.Name + " " + $value.Value) if ($value.Name -eq "Issuer") { ChkCert -cert $value.Value -descr "mapping" -store "(Store = 'Root' or Store = 'CA')" } elseif ($value.Name -eq "UserName") { $usr = Get-CimInstance -ClassName Win32_UserAccount | Where-Object {$_.Name -eq $value.value} if ($usr) { if ($usr.Disabled) { Write-Diag ("[ERROR] The local user account " + $value.value + " is disabled") } else { Write-Diag ("[INFO] The local user account " + $value.value + " is enabled") } } else { Write-Diag ("[ERROR] The local user account " + $value.value + " does not exist") } } elseif ($value.Name -eq "Subject") { if ($value.Value[0] -eq '"') { Write-Diag "[ERROR] The subject does not have to be included in double quotes" } } } } } else { if ($subWG) { Write-Diag "[ERROR] No client certificate mapping configured" } } $aCert = $tbCert.Select("Store = 'Root' and Subject <> Issuer") if ($aCert.Count -gt 0) { Write-Diag "[ERROR] Found for non-Root certificates in the Root store" foreach ($cert in $acert) { Write-Diag ("[ERROR] Misplaced certificate " + $cert.Subject) } } if ($isForwarder) { $evtLogReaders = (Get-CimInstance -Query ("Associators of {Win32_Group.Domain='" + $env:COMPUTERNAME + "',Name='Event Log Readers'} where Role=GroupComponent") | Where {$_.Name -eq "NETWORK SERVICE"} | Measure-Object) if ($evtLogReaders.Count -gt 0) { Write-Diag "[INFO] The NETWORK SERVICE account is member of the Event Log Readers group" } else { Write-Diag "[WARNING] The NETWORK SERVICE account is NOT member of the Event Log Readers group, the events in the Security log cannot be forwarded" } } $fwrules = (Get-NetFirewallPortFilter -Protocol TCP | Where { $_.localport -eq "5986" } | Get-NetFirewallRule) if ($fwrules.count -eq 0) { Write-Diag "[INFO] No firewall rule for port 5986" } else { Write-Diag "[INFO] Found firewall rule for port 5986" } $dir = $env:windir + "\system32\logfiles\HTTPERR" if (Test-Path -path $dir) { $httperrfiles = Get-ChildItem -path ($dir) if ($httperrfiles.Count -gt 100) { Write-Diag ("[WARNING] There are " + $httperrfiles.Count + " files in the folder " + $dir) } else { Write-Diag ("[INFO] There are " + $httperrfiles.Count + " files in the folder " + $dir) } $size = 0 foreach ($file in $httperrfiles) { $size += $file.Length } $size = [System.Math]::Ceiling($size / 1024 / 1024) # Convert to MB if ($size -gt 100) { Write-Diag ("[WARNING] The folder " + $dir + " is using " + $size.ToString() + " MB of disk space") } else { Write-Diag ("[INFO] The folder " + $dir + " is using " + $size.ToString() + " MB of disk space") } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBdQdZ0sQcyhlnp # vvn1S21gHDnw/ueJT0fNTnjQ7oTrAqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDgs # at8ygU0by9RLfSDiOz9PULyupwmhKNIdeckk6iZLMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAQ+S8XwU4Xj35nZRsBqdjuU5fSU0mhruDmTZc # iQOuEvQQlTDPWR5B2sBBY77p1H/x060HLLvyTka6zb5lOsZM5ySOybTCxT5iPyGh # 2kkx+RWvOzhKP7HWIjc/JduH+mdFXnXmAqkI4cTuS6llkMg0Z2e1ePQBPFI4wVHL # ByO4E2eQpNAWv2UH7n2ZvSxUA+rspUsU7p8HAaFPuKcvGoSrhnhjj1NJ/NzIm1L/ # pF3R6n3EU3N/i6QuJavnqyFpkMqLUndDA73BEl8MYouzrjQydbZ3pT/4WVRsOJbW # IBzETGmOJO0dGDaWH6sTpSQqa2XT+HIhIBzKHEeT5PkUYQS44aGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC4AH+XHdOXCmpmB9uXm8B1zuRUGkuAuOwf # J5FNprRBhQIGZxqPlgPeGBMyMDI0MTAyODExMzUyNi4xMTdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwAB # AAAB7jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7R # EOOR7LzYCLXEtWgeqyOVlrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XS # GjpJhpGx59fxMJoTYWPzzD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V # 7+HhTR391TbC1beSxwXfdKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBT # bU5fcm3bhhlRNw5d04Ld15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6l # VqwbNQE11Oedn2uvRjKWEwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7r # N/HYX6cCsC2soyXG3OwCtLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC # 1dYW1jN77t5iSl5Wp1HKBp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd # +yU8sgKn9MtVnQ65s6QG72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIW # flgd/vEWfTNcPWEQj7fsWuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwC # caY/WXsb/axkxB/zCTdHSBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+ # JbMjKmTdcjmSkb5oN8qU1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwg # nr37xd+2v1/cdqYIMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSV # pBnYkzX8f8GZjaOs577F9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUzna # y2n9csfn3p6y7kYkHqtSugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPj # QwZeI6EPj/OAtpYkT7IUXqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQ # mAR9fqMNxjI3ZClVxA4wiM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7a # LSKtDzOEUNs+ZtjhznmZgUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTs # hU6G6sAYpbqdME/+/g1uer7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/ # 7XVBtFlxL/KgcQylJNnia+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5 # ZN0K8ju0vNVgF+Dv05sirPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4E # zcw7E1OhtOMf7DHgPMWf6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnN # znCpsEPZat0h+6d7ulRaWR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXji # gdKlLQPBlX+9zOoGAJhoZfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCIo6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrGDAi # GA8yMDI0MTAyODA2MTgwMFoYDzIwMjQxMDI5MDYxODAwWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyasYAgEAMAcCAQACAhINMAcCAQACAhMsMAoCBQDqyvyYAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAHjcl4rNXBxwyM5fS8nqOw6x8lf # 1RsFqQupShcrwC+zbx/3nFA5U2pjnyqIPRnRv3+YzZWJA86L/bFfrALFHwZFiQib # UCGunT1/7Sen3zbENCSolEjbtbHq62lXAEPeaATVETrPsonHGiwNLftMdCmo39FT # NyrlQhHRdbBt3uFBhI9545thuGJ2/+0UmSqnPkdqfpFJFQTpQULXBp1kWqWbUOh4 # XKgSaYo4MltD4LJV2caY2i1Bat6OItzYNOIJyQHt76CRJn1pmJGtL23JryESkqvd # MvekGpYuJDAsdSRy3PnzQRmMvOjZNt00Ur8dcXWMGrJ8g/ynoU/qpDG9BucxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F # 0wIwspqdpwABAAAB7jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDCpMtE5sDGkFRq8ps0d0sVW8kY # Qfm6dTpZLxtCtnmtbDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSV # hfq+Vdf+DPs+5EIkBz9oCS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQg4YrvCq7S # HssHwwbzF6sjf+O1VKt3mZP5Sd8ekjKw0bQwDQYJKoZIhvcNAQELBQAEggIAZVk5 # NKOrMSpxjoZqxYACi9Ic6Cx7JoRQS5amTLY/o+4eDWGby3CZrdF2nE6Xmv/N3ECN # tsCRcFMvJJaHDVag1NRqcGJK3VD0sd3SPeRR1sJ8OxkrJfB3JRqvYH1NhI9vzQN/ # tVBdhO0pAqBnGviTBoWeiRlD18pwEFdmsKApCZOlIwFr5O7AyOi16E7el+emZamn # /c8ijnE+i/RzHYyKUud3KJ4KThdX175zH3217wVtFeHDE83qZ9V3Nls6E5mP4gn8 # bGZ1ISWqANHmiRZrr1N4vK7SoNIKpvaAjdUCoyNcU13JwnPqq0VCWJNaLxyPc1bU # uNBBV3xkGo+avCz4u1uMnmlY3HXUTVrENnz5/9RqifJuHYFdnlI2Q2Mluf4ellRF # 0GD7/0v93eBZemPO66TzKsZBRU3RIfTUtx37x8NACFR+MgDX0TVtKrxcFz1fc3Tb # bG4OF3w4tIowQCbrBLfGCSvwl22k4bD1kCpjQGVS1wR3V+48hMSl6lD6oUlb8lOu # C3SraiQGEL5yOZZBTn7Doyd3DfaO603556WoEf3FSUwBuxokqexzXiHOhj/O1oOn # hQ5XqhHNUr86s60HMLs69uX68NXlag8p8vrTA71V+hvOc9cpANHwUJNTTBNsuVXB # fBX5h5xykiDX6cBYeQu1Gieqq5F1GKYZul+fwEs= # SIG # End signature block
combined_dataset/train/non-malicious/ConvertFrom-Hashtable.ps1
ConvertFrom-Hashtable.ps1
# function ConvertFrom-Hashtable { PARAM([[HashTable]$hashtable,[switch]$combine) BEGIN { $output = New-Object PSObject } PROCESS { if($_) { $hashtable = $_; if(!$combine) { $output = New-Object PSObject } } $hashtable.GetEnumerator() | ForEach-Object { Add-Member -inputObject $object ` -memberType NoteProperty -name $_.Name -value $_.Value } $object } #}
combined_dataset/train/non-malicious/sample_49_49.ps1
sample_49_49.ps1
# # Module manifest for module 'PowerShellEditorServices' # # Generated by: daviwil # # Generated on: 5/12/2016 # @{ # Script module or binary module file associated with this manifest. RootModule = 'PowerShellEditorServices.Commands.psm1' # Version number of this module. ModuleVersion = '0.2.0' # ID used to uniquely identify this module GUID = '6064d846-0fa0-4b6d-afc1-11e5bed3c4a9' # Author of this module Author = 'Microsoft' # Company or vendor of this module CompanyName = 'Microsoft' # Copyright statement for this module Copyright = '(c) 2021 Microsoft Corporation.' # Description of the functionality provided by this module Description = 'Provides internal commands for PowerShell Editor Services that only work in an editor session.' # Minimum version of the Windows PowerShell engine required by this module # PowerShellVersion = '' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = @('PowerShellEditorServices.Commands.types.ps1xml') # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @('Register-EditorCommand', 'Unregister-EditorCommand', 'Set-ScriptExtent', 'Find-Ast', 'Import-EditorCommand', 'ConvertFrom-ScriptExtent', 'ConvertTo-ScriptExtent', 'Get-Token', 'Out-CurrentFile', 'Join-ScriptExtent', 'Test-ScriptExtent', 'Open-EditorFile', 'New-EditorFile', 'Clear-Host') # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @('psedit', 'cls', 'clear') # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. LicenseUri = 'https://github.com/PowerShell/PowerShellEditorServices/blob/main/LICENSE' # A URL to the main website for this project. ProjectUri = 'https://github.com/PowerShell/PowerShellEditorServices' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBt+StcIVetuDby # 902lajDQ2qQXiESCCdRNEF0UMzYjVaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA4/y/sjLlmRsXzwQDnkVkt2 # laMBz4sMvyjZSuD010l/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEApVQBOEHKsYp6AN9492pFm7QfEciuc3KK/tVTDD/bff0mfoxdhyAd7Dtc # CzglZaOq48xU63d1uR1+fa6zsjZWtBZEfk49HKvI31BDn5Ov43D1iLBZkVyzqtm6 # GnXC83TlHesfJg8GTFo/+9dKPZTFSuPYul+0t3TpFxn4scG7jxH/25R/HlW4tyoQ # 0Xz4A28rAMsBPdZRUTX8F6WEuFHaeKzM35gTYb+DpMEoMpQaGn8K6zjx/IUJVUzd # 0fkFJ2jqPh4hkDgGyhQN/eEB6TOB3/dSJdzsbyyZwsWXT7/izzQjLRLOwcCmmI7t # OBRGpUS1j96Uwwrhm2jV9kcHyG4tlaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAGCnzhXJYggcppY91fQtCs5rdqsG0zwsazz8ATZjsOyAIGZjOZuljh # GBMyMDI0MDUwMzIzMzAxOS4xMTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6d9ptjAiGA8yMDI0MDUwMzEzNDgz # OFoYDzIwMjQwNTA0MTM0ODM4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp32m2 # AgEAMAcCAQACAhJJMAcCAQACAhNiMAoCBQDp4Ls2AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBACy1q2ghc4PlvMHrXkPPZpeX1RzSukofAZf+weOzlWP+Gh9M # f8s6FvNU9PR4xkznPMg84mMYtiSGIty1A6urnSNPRuvssbpdvcRa0W/ez2R6SJCp # atb8Bb16rBQ/kinFJHLSFJSDZOkvXRF2omT26IPhaFJNKOBYhATLoWa8jIgANUB3 # H1nsHnTnMV3vio4+9KL/q95cp2LryfDWYeafFILy9z/wy2Sq9C6ric2dUiTuuJjs # OvjKobUeNj9oc6RaIyxoxuZEL1wJj1l6/OrVIyYADsbfFBJ/pz//XDsn0TZhHpoB # sJHGJIRijeH/wlNmRDE/xQcvuVHXVRep+/B20FoxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAWYmlnCAoyxzgmOEfxGooQycC0W2scEyhYTw97h11KLDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s # uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgtrKJnf3CDPZH5DRV77sxxZCw6OjO # MlFDRyAgvKXVtS8wDQYJKoZIhvcNAQELBQAEggIAjP48ytL1tK/ELM0zDKLSCy79 # 2w/WsYMkkmdZYxh4DU+g8ZiduXWGyOWQ1qzz/skwpGMebm7hAfaFtnM9fWdTZ2N2 # dmJDzZkDV1Rz2Xcc3pvFM8VewhhfSr9lSyZUTXR/jGFzGYAGxBOD0Erjpwq9Ecjn # WYANUTMb+/zASrB85guzAFtRbHHLOyzt5y+f3S3raRbX1fCgDUsbNUxXGxbBs411 # Wdpl9KOX+J6nn6CIZDLb9eOW6o/EgbN/EvdaM4fGUeg5S8OWH9swaFtP2rPaCrDJ # wDkUfwYv+Uo9PE7DUUqtQr+6vXNUqay9CZPJtoOWPh8iGYzXMum+Oudmzkf9miJs # Y7xmMM4Lx1Rizb5AXdDvqaIrwT7DG+q1oWiqUQNQEGDY52bDfCGKA0uloWOvv44B # xX+YIdwq6KjOTmVZT5dJgNcWm7QkVRMq5N1PB/7nlFaIVy5ReyDZitG3GmBKzYvX # tplL7Sv8T/OKcVJoXmA4pPio5vO9fx16zoGHd/wdqmj06LXLM9YMYvNNBDxuv3u+ # /e3JJBRkZh96pWWn+ATeH6JR8eZh2J4E4iJHXn8xA0GuedrmeYJ9rlt912fZ7vZE # 6lXCihr4+4quqwJj+noPvkyggFRbh9zAURRTQVCOpYam+9bzpXx11sf1BcC3jyDj # r4Ba++PzF5kL2udJ5T0= # SIG # End signature block
combined_dataset/train/non-malicious/sample_11_79.ps1
sample_11_79.ps1
ConvertFrom-StringData @' id_dirs=Collecting Directory Output '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDRy8kiReDoGdLC # nmSgV1SViLYbdod1BeCf8iKRZsAJtqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBwB # ZDzd/IrSeeruLyCzZiqCAvZKGi1ApCKiuD7chcsIMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAZtGcrd0+tY4usurqqCX+xfKvLXHtdQSQnTFP # m7u6E/v1izNTFC7ZjhQZjd/L9mbXmCjb4f+9wDLCdGR4QQoePp5kyMLkmcy2GWbo # AGQJgunjdS3Twv2UhfZmWpe7TkQxydZuck5xd4EX1r8g0zdVBc9bMlPplVNftOLy # tuDEr6MQWh4z4I2diFtgtdwqlAywDJAthsVXgqU1RaG8iF0E9Sb94KOuMr2yIROf # 43hEtGSe3HnHkoKKi4dbF2qHNQIfJ0b6dz0Si8a7PDaGTHtBh0sATGMkzJ0p93lS # uFQxg3qq43RNIQiB8q2OqIz/cIwNRX5W1GarvXFU49luMB0tYqGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCm5CJj8meudkiiZ+1tUol6WZsmMR1Dn49u # vGi6ufHIfwIGZut+oGF8GBMyMDI0MTAyODExNDA0MS40MjZaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big # r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF # RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts # urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF # 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83 # 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ # t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l # RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT # shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+ # vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7 # 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A # SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt # weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc # D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL # 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO # RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H # WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn # jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va # iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC # 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K # tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW # wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w # fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0 # MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA # AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l # eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L # fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M # Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a # tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao # 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgQAEbR2o6Z0O2ZqRgmkfVo836d1HJm1HoCWlGfuvKOGMwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3 # d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU # R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICAIaHRV5jbKejQs0Y+CU8XmdbyojZOL0e # E81EkTTvayD7SzrYEVzdp4gjlgrfjY49YrdFvP53p73VpwWBK/YhOV4Ii0iSXWDF # XLKsb93aduoCEiFpOdsv6jBrDJB61zG5WQxDoS2hIuvFW5W3Lgj2oEgRWsK9FdV6 # dTWQgcadz7HBzEvVf3nNVXUi6uaSCrGsFIrwkfSpYJywj4CWa1mNRlz8FmU4AZzp # m9JDWYKDzjCjvB56KbM0IvkQtAm3e6XQPNtpy6+iWT/3ESkFvp7Wd4R78zRMmIEk # rfEfQB6nVhhn0KZNUe/fBYpfvOd9ncDzzMr6aQ93JiLmkbi6KqzcApHjTSR/NC/p # mbz6sAjTBYxLTRZHMpRT0kFQzhqmadp1Nl/STWXlGVOwtRIs0qBv5lwYQ41JkD5u # 4nQG1IorPHEzEryB3rhmWWDMCbp1WNc+pET3j9qmiAGdLvXe+RpxbnJ+8k1NgQsg # vH7qWc41fEv4TuVXhUaew8p5srBFSyeCC1cA8BWqbB3ynroVRaBMuLZo/9FirCK0 # kklZfBiTbW2/wLY9dXtO7W/k89a6/waZOv5X6MsYELuODCDAlheVDMcq/t38h7Gm # QXwTQ6PDV0Bn10S+YoBLLj1uWNOaO7ZzjoUl4HctXBlTzzKiqvqr3NgktSbuab/T # oldl5wZYej3h # SIG # End signature block
combined_dataset/train/non-malicious/sample_20_64.ps1
sample_20_64.ps1
# # Module manifest for module 'OCI.PSModules.Opa' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opa.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b3b17045-1e55-4c1b-8e02-641f25d4bb58' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opa Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opa.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOpaInstance', 'Get-OCIOpaInstancesList', 'Get-OCIOpaWorkRequest', 'Get-OCIOpaWorkRequestErrorsList', 'Get-OCIOpaWorkRequestLogsList', 'Get-OCIOpaWorkRequestsList', 'Move-OCIOpaInstanceCompartment', 'New-OCIOpaInstance', 'Remove-OCIOpaInstance', 'Stop-OCIOpaWorkRequest', 'Update-OCIOpaInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opa' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Convert-BounceToX_5.ps1
Convert-BounceToX_5.ps1
# $Id: Convert-BounceToX500.ps1 610 2010-11-16 00:39:19Z jon $ # $Revision: 610 $ #.Synopsis # Convert Bounce to X500 #.Description # Convert URL Encoded address in a Bounce message to an X500 address # that can be added as an alias to the mail-enabled object #.Parameter bounceAddress # URL Encoded bounce message address# #.Example # Convert-BounceToX500 "IMCEAEX-_O=CONTOSO_OU=First+20Administrative+20Group_cn=Recipients_cn=john+5Fjacob+2Esmith@contoso.com" #.Example # "IMCEAEX-_O=CONTOSO_OU=First+20Administrative+20Group_cn=Recipients_cn=john+5Fjacob+2Esmith@contoso.com"|Convert-BounceToX500 [CmdletBinding()] PARAM ( [Parameter(Mandatory=$true,ValueFromPipeline=$true)][string]$bounceAddress ) BEGIN { Add-Type -AssemblyName System.Web|Out-Null } PROCESS { if($_) {$bounceAddress = $_} $bounceAddress = $bounceAddress -Replace "%2B","%" # This is a urlEncoded "+" $bounceAddress = $bounceAddress -Replace "%3D","=" $bounceAddress = $bounceAddress -Replace "\\+","%" $bounceAddress = $bounceAddress -Replace "_O=","/O=" $bounceAddress = $bounceAddress -Replace "_OU=","/OU=" $bounceAddress = $bounceAddress -Replace "_CN=","/CN=" if([Web.HttpUtility]::UrlDecode($bounceAddress) -match "(/o=.*)@[\\w\\d.]+$"){$matches[1]} }
combined_dataset/train/non-malicious/1185.ps1
1185.ps1
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) function Start-Test { $dir = Join-Path -Path $env:TEMP -ChildPath ([IO.Path]::GetRandomFileName()) Install-Directory -Path $dir } function Stop-Test { if( (Test-Path -Path $dir -PathType Container) ) { Remove-Item -Path $dir -Recurse } } function Test-ShouldRemoveDirectory { Uninstall-Directory -Path $dir Assert-NoError Assert-DirectoryDoesNotExist $dir } function Test-ShouldHandleDirectoryThatDoesNotExist { Uninstall-Directory -Path $dir Uninstall-Directory -Path $dir Assert-NoError Assert-DirectoryDoesNotExist $dir } function Test-ShouldDeleteRecursively { $filePath = Join-Path -Path $dir -ChildPath 'file' New-Item -Path $filePath -ItemType 'File' Uninstall-Directory -Path $dir -Recurse Assert-NoError Assert-DirectoryDoesNotExist $dir }
combined_dataset/train/non-malicious/sample_21_62.ps1
sample_21_62.ps1
# # Module manifest for module 'OCI.PSModules.Databasemanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Databasemanagement.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0faf82fb-82c6-40fe-bbd2-87626481a704' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Databasemanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabasemanagementDataFiles', 'Add-OCIDatabasemanagementManagedDatabaseToManagedDatabaseGroup', 'Add-OCIDatabasemanagementmTasks', 'Confirm-OCIDatabasemanagementBasicFilter', 'Disable-OCIDatabasemanagementAutomaticInitialPlanCapture', 'Disable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask', 'Disable-OCIDatabasemanagementExternalDbSystemDatabaseManagement', 'Disable-OCIDatabasemanagementExternalDbSystemStackMonitoring', 'Disable-OCIDatabasemanagementExternalExadataInfrastructureManagement', 'Disable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask', 'Disable-OCIDatabasemanagementSqlPlanBaselinesUsage', 'Edit-OCIDatabasemanagementSnapshotSettings', 'Enable-OCIDatabasemanagementAutomaticInitialPlanCapture', 'Enable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask', 'Enable-OCIDatabasemanagementExternalDbSystemDatabaseManagement', 'Enable-OCIDatabasemanagementExternalDbSystemStackMonitoring', 'Enable-OCIDatabasemanagementExternalExadataInfrastructureManagement', 'Enable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask', 'Enable-OCIDatabasemanagementSqlPlanBaselinesUsage', 'Get-OCIDatabasemanagementAlertLogsList', 'Get-OCIDatabasemanagementAsmPropertiesList', 'Get-OCIDatabasemanagementAssociatedDatabasesList', 'Get-OCIDatabasemanagementAttentionLogsList', 'Get-OCIDatabasemanagementAwrDbReport', 'Get-OCIDatabasemanagementAwrDbsList', 'Get-OCIDatabasemanagementAwrDbSnapshotsList', 'Get-OCIDatabasemanagementAwrDbSqlReport', 'Get-OCIDatabasemanagementClusterCacheMetric', 'Get-OCIDatabasemanagementConsumerGroupPrivilegesList', 'Get-OCIDatabasemanagementCursorCacheStatementsList', 'Get-OCIDatabasemanagementDataAccessContainersList', 'Get-OCIDatabasemanagementDatabaseFleetHealthMetrics', 'Get-OCIDatabasemanagementDatabaseHomeMetrics', 'Get-OCIDatabasemanagementDatabaseParametersList', 'Get-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Get-OCIDatabasemanagementDbManagementPrivateEndpointsList', 'Get-OCIDatabasemanagementExecutionPlanStatsComparision', 'Get-OCIDatabasemanagementExternalAsm', 'Get-OCIDatabasemanagementExternalAsmConfiguration', 'Get-OCIDatabasemanagementExternalAsmDiskGroupsList', 'Get-OCIDatabasemanagementExternalAsmInstance', 'Get-OCIDatabasemanagementExternalAsmInstancesList', 'Get-OCIDatabasemanagementExternalAsmsList', 'Get-OCIDatabasemanagementExternalAsmUsersList', 'Get-OCIDatabasemanagementExternalCluster', 'Get-OCIDatabasemanagementExternalClusterInstance', 'Get-OCIDatabasemanagementExternalClusterInstancesList', 'Get-OCIDatabasemanagementExternalClustersList', 'Get-OCIDatabasemanagementExternalDatabasesList', 'Get-OCIDatabasemanagementExternalDbHome', 'Get-OCIDatabasemanagementExternalDbHomesList', 'Get-OCIDatabasemanagementExternalDbNode', 'Get-OCIDatabasemanagementExternalDbNodesList', 'Get-OCIDatabasemanagementExternalDbSystem', 'Get-OCIDatabasemanagementExternalDbSystemConnector', 'Get-OCIDatabasemanagementExternalDbSystemConnectorsList', 'Get-OCIDatabasemanagementExternalDbSystemDiscoveriesList', 'Get-OCIDatabasemanagementExternalDbSystemDiscovery', 'Get-OCIDatabasemanagementExternalDbSystemsList', 'Get-OCIDatabasemanagementExternalExadataInfrastructure', 'Get-OCIDatabasemanagementExternalExadataInfrastructuresList', 'Get-OCIDatabasemanagementExternalExadataStorageConnector', 'Get-OCIDatabasemanagementExternalExadataStorageConnectorsList', 'Get-OCIDatabasemanagementExternalExadataStorageGrid', 'Get-OCIDatabasemanagementExternalExadataStorageServer', 'Get-OCIDatabasemanagementExternalExadataStorageServersList', 'Get-OCIDatabasemanagementExternalListener', 'Get-OCIDatabasemanagementExternalListenerServicesList', 'Get-OCIDatabasemanagementExternalListenersList', 'Get-OCIDatabasemanagementHeatWaveFleetMetric', 'Get-OCIDatabasemanagementIormPlan', 'Get-OCIDatabasemanagementJob', 'Get-OCIDatabasemanagementJobExecution', 'Get-OCIDatabasemanagementJobExecutionsList', 'Get-OCIDatabasemanagementJobRun', 'Get-OCIDatabasemanagementJobRunsList', 'Get-OCIDatabasemanagementJobsList', 'Get-OCIDatabasemanagementManagedDatabase', 'Get-OCIDatabasemanagementManagedDatabaseGroup', 'Get-OCIDatabasemanagementManagedDatabaseGroupsList', 'Get-OCIDatabasemanagementManagedDatabasesList', 'Get-OCIDatabasemanagementManagedMySqlDatabase', 'Get-OCIDatabasemanagementManagedMySqlDatabaseConfigurationDataList', 'Get-OCIDatabasemanagementManagedMySqlDatabasesList', 'Get-OCIDatabasemanagementManagedMySqlDatabaseSqlDataList', 'Get-OCIDatabasemanagementMySqlFleetMetric', 'Get-OCIDatabasemanagementNamedCredential', 'Get-OCIDatabasemanagementNamedCredentialsList', 'Get-OCIDatabasemanagementObjectPrivilegesList', 'Get-OCIDatabasemanagementOpenAlertHistory', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecution', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionScript', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionsList', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionAggregationsList', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperation', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperationsList', 'Get-OCIDatabasemanagementPdbMetrics', 'Get-OCIDatabasemanagementPreferredCredential', 'Get-OCIDatabasemanagementPreferredCredentialsList', 'Get-OCIDatabasemanagementProxiedForUsersList', 'Get-OCIDatabasemanagementProxyUsersList', 'Get-OCIDatabasemanagementRolesList', 'Get-OCIDatabasemanagementSqlExecutionPlan', 'Get-OCIDatabasemanagementSqlPlanBaseline', 'Get-OCIDatabasemanagementSqlPlanBaselineConfiguration', 'Get-OCIDatabasemanagementSqlPlanBaselineJobsList', 'Get-OCIDatabasemanagementSqlPlanBaselinesList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskFindingsList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskRecommendationsList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTasksList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskSummaryReport', 'Get-OCIDatabasemanagementSqlTuningSetsList', 'Get-OCIDatabasemanagementSystemPrivilegesList', 'Get-OCIDatabasemanagementTablespace', 'Get-OCIDatabasemanagementTablespacesList', 'Get-OCIDatabasemanagementTableStatisticsList', 'Get-OCIDatabasemanagementTopSqlCpuActivity', 'Get-OCIDatabasemanagementUser', 'Get-OCIDatabasemanagementUsersList', 'Get-OCIDatabasemanagementWorkRequest', 'Get-OCIDatabasemanagementWorkRequestErrorsList', 'Get-OCIDatabasemanagementWorkRequestLogsList', 'Get-OCIDatabasemanagementWorkRequestsList', 'Invoke-OCIDatabasemanagementCheckExternalDbSystemConnectorConnectionStatus', 'Invoke-OCIDatabasemanagementCheckExternalExadataStorageConnector', 'Invoke-OCIDatabasemanagementCloneSqlTuningTask', 'Invoke-OCIDatabasemanagementConfigureAutomaticCaptureFilters', 'Invoke-OCIDatabasemanagementConfigureAutomaticSpmEvolveAdvisorTask', 'Invoke-OCIDatabasemanagementDiscoverExternalExadataInfrastructure', 'Invoke-OCIDatabasemanagementDropSqlPlanBaselines', 'Invoke-OCIDatabasemanagementDropSqlsInSqlTuningSet', 'Invoke-OCIDatabasemanagementDropSqlTuningSet', 'Invoke-OCIDatabasemanagementDropSqlTuningTask', 'Invoke-OCIDatabasemanagementDropTablespace', 'Invoke-OCIDatabasemanagementFetchSqlTuningSet', 'Invoke-OCIDatabasemanagementImplementOptimizerStatisticsAdvisorRecommendations', 'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromAwr', 'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromCursorCache', 'Invoke-OCIDatabasemanagementLoadSqlTuningSet', 'Invoke-OCIDatabasemanagementPatchExternalDbSystemDiscovery', 'Invoke-OCIDatabasemanagementResizeDataFile', 'Invoke-OCIDatabasemanagementRunHistoricAddm', 'Invoke-OCIDatabasemanagementSaveSqlTuningSetAs', 'Invoke-OCIDatabasemanagementSummarizeAlertLogCounts', 'Invoke-OCIDatabasemanagementSummarizeAttentionLogCounts', 'Invoke-OCIDatabasemanagementSummarizeAwrDbCpuUsages', 'Invoke-OCIDatabasemanagementSummarizeAwrDbMetrics', 'Invoke-OCIDatabasemanagementSummarizeAwrDbParameterChanges', 'Invoke-OCIDatabasemanagementSummarizeAwrDbParameters', 'Invoke-OCIDatabasemanagementSummarizeAwrDbSnapshotRanges', 'Invoke-OCIDatabasemanagementSummarizeAwrDbSysstats', 'Invoke-OCIDatabasemanagementSummarizeAwrDbTopWaitEvents', 'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEventBuckets', 'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEvents', 'Invoke-OCIDatabasemanagementSummarizeExternalAsmMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalClusterMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalDbNodeMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalDbSystemAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalListenerMetrics', 'Invoke-OCIDatabasemanagementSummarizeJobExecutionsStatuses', 'Invoke-OCIDatabasemanagementSummarizeManagedDatabaseAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeManagedMySqlDatabaseAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselines', 'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselinesByLastExecution', 'Invoke-OCIDatabasemanagementTestNamedCredential', 'Invoke-OCIDatabasemanagementTestPreferredCredential', 'Move-OCIDatabasemanagementDatabaseParameters', 'Move-OCIDatabasemanagementDbManagementPrivateEndpointCompartment', 'Move-OCIDatabasemanagementExternalDbSystemCompartment', 'Move-OCIDatabasemanagementExternalExadataInfrastructureCompartment', 'Move-OCIDatabasemanagementJobCompartment', 'Move-OCIDatabasemanagementManagedDatabaseGroupCompartment', 'Move-OCIDatabasemanagementNamedCredentialCompartment', 'Move-OCIDatabasemanagementPlanRetention', 'Move-OCIDatabasemanagementSpaceBudget', 'Move-OCIDatabasemanagementSqlPlanBaselinesAttributes', 'New-OCIDatabasemanagementAwrSnapshot', 'New-OCIDatabasemanagementDbManagementPrivateEndpoint', 'New-OCIDatabasemanagementExternalDbSystem', 'New-OCIDatabasemanagementExternalDbSystemConnector', 'New-OCIDatabasemanagementExternalDbSystemDiscovery', 'New-OCIDatabasemanagementExternalExadataInfrastructure', 'New-OCIDatabasemanagementExternalExadataStorageConnector', 'New-OCIDatabasemanagementJob', 'New-OCIDatabasemanagementManagedDatabaseGroup', 'New-OCIDatabasemanagementNamedCredential', 'New-OCIDatabasemanagementSqlTuningSet', 'New-OCIDatabasemanagementTablespace', 'Remove-OCIDatabasemanagementDataFile', 'Remove-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Remove-OCIDatabasemanagementExternalDbSystem', 'Remove-OCIDatabasemanagementExternalDbSystemConnector', 'Remove-OCIDatabasemanagementExternalDbSystemDiscovery', 'Remove-OCIDatabasemanagementExternalExadataInfrastructure', 'Remove-OCIDatabasemanagementExternalExadataStorageConnector', 'Remove-OCIDatabasemanagementJob', 'Remove-OCIDatabasemanagementManagedDatabaseFromManagedDatabaseGroup', 'Remove-OCIDatabasemanagementManagedDatabaseGroup', 'Remove-OCIDatabasemanagementNamedCredential', 'Remove-OCIDatabasemanagementPreferredCredential', 'Reset-OCIDatabasemanagementDatabaseParameters', 'Start-OCIDatabasemanagementSqlTuningTask', 'Update-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Update-OCIDatabasemanagementExternalAsm', 'Update-OCIDatabasemanagementExternalAsmInstance', 'Update-OCIDatabasemanagementExternalCluster', 'Update-OCIDatabasemanagementExternalClusterInstance', 'Update-OCIDatabasemanagementExternalDbHome', 'Update-OCIDatabasemanagementExternalDbNode', 'Update-OCIDatabasemanagementExternalDbSystem', 'Update-OCIDatabasemanagementExternalDbSystemConnector', 'Update-OCIDatabasemanagementExternalDbSystemDiscovery', 'Update-OCIDatabasemanagementExternalExadataInfrastructure', 'Update-OCIDatabasemanagementExternalExadataStorageConnector', 'Update-OCIDatabasemanagementExternalExadataStorageGrid', 'Update-OCIDatabasemanagementExternalExadataStorageServer', 'Update-OCIDatabasemanagementExternalListener', 'Update-OCIDatabasemanagementJob', 'Update-OCIDatabasemanagementManagedDatabase', 'Update-OCIDatabasemanagementManagedDatabaseGroup', 'Update-OCIDatabasemanagementNamedCredential', 'Update-OCIDatabasemanagementPreferredCredential', 'Update-OCIDatabasemanagementTablespace' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_34_28.ps1
sample_34_28.ps1
# # Module manifest for module 'OCI.PSModules.Appmgmtcontrol' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Appmgmtcontrol.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd2facbcf-7202-47af-96ae-07771dc74773' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Appmgmtcontrol Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Appmgmtcontrol.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIAppmgmtcontrolMonitoringPlugin', 'Get-OCIAppmgmtcontrolMonitoredInstance', 'Get-OCIAppmgmtcontrolMonitoredInstancesList', 'Get-OCIAppmgmtcontrolWorkRequest', 'Get-OCIAppmgmtcontrolWorkRequestErrorsList', 'Get-OCIAppmgmtcontrolWorkRequestLogsList', 'Get-OCIAppmgmtcontrolWorkRequestsList', 'Invoke-OCIAppmgmtcontrolPublishTopProcessesMetrics' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Appmgmtcontrol' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/123.ps1
123.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-AADGroup(){ [cmdletbinding()] param ( $GroupName, $id, [switch]$Members ) $graphApiVersion = "v1.0" $Group_resource = "groups" try { if($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } elseif($GroupName -eq "" -or $GroupName -eq $null){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } else { if(!$Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } elseif($Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" $Group = (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value if($Group){ $GID = $Group.id $Group.displayName write-host $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-iOSProvisioningProfile{ [cmdletbinding()] $graphApiVersion = "Beta" $Resource = "deviceAppManagement/iosLobAppProvisioningConfigurations?`$expand=assignments" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).value } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } write-host write-host "-------------------------------------------------------------------" Write-Host write-host "Analysing iOS App Provisioning Profiles..." -ForegroundColor Yellow Write-Host write-host "-------------------------------------------------------------------" write-host $Profiles = (Get-iOSProvisioningProfile) $Days = 30 $CSV = @() $CSV += "iOSAppProvisioningProfileName,GroupAssignedName,ExpiryDate" $GroupsOutput = @() foreach ($Profile in $Profiles) { $Payload = $Profile.payload $payloadFileName = $Profile.payloadFileName $PayloadRaw = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($Payload)) $Exp = ($PayloadRaw | C:\windows\System32\findstr.exe /i "date").trim()[3] [datetime]$ProfileExpirationDate = $Exp.TrimStart('<date>').trimend('</date>') $displayName = $Profile.displayName $GroupID = ($Profile.assignments.target.groupId) $CurrentTime = [System.DateTimeOffset]::Now $TimeDifference = ($CurrentTime - $ProfileExpirationDate) $TotalDays = ($TimeDifference.Days) write-host "iOS App Provisioning Profile Name: $($displayName)" if ($GroupID) { foreach ($id in $GroupID) { $GroupName = (Get-AADGroup -id $id).DisplayName write-host "Group assigned: $($GroupName)" $CSV += "$($displayName),$($GroupName),$($ProfileExpirationDate)" } } else { write-host "Group assigned: " -NoNewline Write-Host "Unassigned" $CSV += "$($displayName),,$($ProfileExpirationDate)" } if ($TotalDays -gt "0") { Write-Host "iOS App Provisioning Profile Expiration Date: " -NoNewline write-host "$($ProfileExpirationDate)" -ForegroundColor Red } elseif ($TotalDays -gt "-30") { Write-Host "iOS App Provisioning Profile Expiration Date: " -NoNewline write-host "$($ProfileExpirationDate)" -ForegroundColor Yellow } else { Write-Host "iOS App Provisioning Profile: $($ProfileExpirationDate)" } Write-Host write-host "-------------------------------------------------------------------" write-host } if (!($Profiles.count -eq 0)) { Write-Host "Export results? [Y]es, [N]o" $conf = Read-Host if ($conf -eq "Y"){ $parent = [System.IO.Path]::GetTempPath() [string] $name = [System.Guid]::NewGuid() New-Item -ItemType Directory -Path (Join-Path $parent $name) | Out-Null $TempDirPath = "$parent$name" $TempExportFilePath = "$($TempDirPath)\iOSAppProvisioningProfileExport.txt" $CSV | Add-Content $TempExportFilePath -Force Write-Host Write-Host "$($TempExportFilePath)" Write-Host } } else { write-host "No iOS App Provisioning Profiles found." write-host }
combined_dataset/train/non-malicious/sample_28_85.ps1
sample_28_85.ps1
# # Module manifest for module 'OCI.PSModules.Secrets' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Secrets.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '9e5d79e8-8286-48b7-ab80-a55d8a9440d3' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Secrets Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Secrets.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCISecretsSecretBundle', 'Get-OCISecretsSecretBundleByName', 'Get-OCISecretsSecretBundleVersionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Secrets' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3226.ps1
3226.ps1
describe 'New-PoshBotFileUpload' { BeforeAll { $readme = Join-Path -Path $env:BHProjectPath -ChildPath 'README.md' } it 'Returns a [PoshBot.File.Upload] object' { $resp = New-PoshBotFileUpload -Path $readme $resp.PSObject.TypeNames[0] | should be 'PoshBot.File.Upload' } it 'Will redirect to DM channel when told' { $resp = New-PoshBotFileUpload -Path $readme -DM $resp.DM | should be $true } it 'Has a valid [Title] field' { $resp = New-PoshBotFileUpload -Path $readme -DM -Title 'README.md' $resp.Title | should be 'README.md' } it 'Validates file exists' { $guid = (New-Guid).ToString() $badFile = Join-Path -Path $env:BHProjectPath -ChildPath "$($guid).txt" { New-PoshBotFileUpload -Path $badFile } | should throw } it 'Sends file content and not path' { $resp = New-PoshBotFileUpload -Content 'foo' $resp.Path | should be $null } it 'Has a valid [FileName] field when sending file content' { $resp = New-PoshBotFileUpload -Content 'foo' -FileName 'foo.txt' $resp.FileName | should be 'foo.txt' } it 'Has a valid [FileType] field when sending file content' { $resp = New-PoshBotFileUpload -Content 'foo' -FileType 'powershell' $resp.FileType | should be 'powershell' } it 'Sends file path and not content' { $resp = New-PoshBotFileUpload -Path $readme $resp.Content | should be $null } }
combined_dataset/train/non-malicious/O-ChristmasTree.ps1
O-ChristmasTree.ps1
ipmo PowerBoots ## Merry Christmas boots { $global:lights = @() grid { # A trunk rectangle -width 20 -height 40 -fill brown -HorizontalAlignment Center -VerticalAlignment Bottom # A perfect, triangular, tree polygon -points { "87.5,0","0,150","175,150","87.5,0" } -margin "0,25,0,40" -fill darkgreen # Christmas lights 1..60 | % { ellipse -width 2 -height 3 -fill red -HorizontalAlignment Center -VerticalAlignment Top -margin { $y = get-random -min 5 -max 140; $x = get-random -min 5 -max $($y * .75 + 5); if(Get-Random 1,0){ "{0},{1},0,0" -f $x,($y+30) } else { "0,{1},{0},0" -f $x,($y+30) } } -ov +global:lights } # A Star topper polygon -points { "15,0","25,30","0,10","30,10","5,30","15,0" } -fill white -HorizontalAlignment Center -VerticalAlignment Top -ov +global:lights } } -on_sourceinitialized { # make all the lights blink! $lights | % { $_.BeginAnimation( [System.Windows.Shapes.Shape]::OpacityProperty, $(DoubleAnimation -From "1.0" -To $(Get-Random -Min 0.1 -Max 0.5) -Duration $("0:0:0.{0}" -f (Get-Random -Min 5 -Max 99)) -AutoReverse -RepeatBehavior ([system.windows.media.animation.RepeatBehavior]::Forever))) } # Make the whole window draggable } -on_mouseleftbuttondown { $this.DragMove() # Make the window (chromeless and) invisible except for the tree part.... } -windowstyle none -allowstransparency -background transparent -Topmost ## Happy New Year boots { $global:lights = @() canvas { # A light pole rectangle -width 5 -height 500 -fill Gray -HorizontalAlignment Center -VerticalAlignment Bottom -"Canvas.Left" 82.5 # A Mirror ball ;) ellipse -Width 50 -Height 50 -HorizontalAlignment Center -VerticalAlignment Top -Fill White -OV +global:lights -"Canvas.Left" 60 # Some rays of flickering light, for effect polygon -HorizontalAlignment Center -VerticalAlignment Top -points "0,0", "75,10", "80,14", "0,0", "-80,-10", "-75,-14", "0,0", "60,40", "65,42", "0,0", "-50,-30", "-57,-32", "0,0", "75,-10", "85,-16", "0,0", "-60,40", "-65,42" -fill LightYellow -margin "85,25,0,0" -Opacity 0.3 -OV +global:lights } -width 170 -height 500 } -on_mouseleftbuttondown { $this.DragMove() } -on_sourceinitialized { $lights | % { $_.BeginAnimation( [System.Windows.Controls.Canvas]::TopProperty, $(DoubleAnimation -From 50 -To 550 -Duration '0:0:10') ) } @($lights)[-1].BeginAnimation( [System.Windows.Shapes.Shape]::OpacityProperty, $(DoubleAnimation -From "0.3" -To "0.0" -Duration "0:0:1" -AutoReverse -RepeatBehavior ([system.windows.media.animation.RepeatBehavior]::Forever))) } -windowstyle none -allowstransparency -background transparent
combined_dataset/train/non-malicious/sample_2_82.ps1
sample_2_82.ps1
#************************************************ # DC_KIR-RBC-RegEntries.ps1 # Version 1.0 # Date: 2020 # Author: + Walter Eder (waltere@microsoft.com) # Description: Collects KIR (for 2019) and RBC (for 2016) Registry Entries # Called from: TS_AutoAddCommands_*.ps1 #******************************************************* function InsertRegHeader( [string] $RegHeader="", [string]$OutputFile) { if($RegHeader -ne "") { $RegHeader | Out-File -FilePath $OutputFile -Append -Encoding Default "=" * ($RegHeader.Length) | Out-File -FilePath $OutputFile -Append -Encoding Default } } Import-LocalizedData -BindingVariable KirRegistryStrings Write-DiagProgress -Activity $KirRegistryStrings.ID_KIRRegentriesActivity -Status $KirRegistryStrings.ID_KIRRegentriesStatus $OutputFile = $ComputerName + "_reg_KIR-RBC_MyKnobs.txt" $fileDescription = "KIR (for 2019) and RBC (for 2016) Registry Entries" InsertRegHeader -OutputFile $OutputFile -RegHeader "KIR (for 2019) Registry Entries" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Policies" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false Write-DiagProgress -Activity $KirRegistryStrings.ID_HivesRegentriesActivity -Status $KirRegistryStrings.ID_HivesRegentriesStatus $OutputFile= $Computername + "_reg_System.HIV" RegSave -RegistryKey "HKLM\SYSTEM" -OutputFile $OutputFile -fileDescription "Obtaining System Registry Hive" $OutputFile= $Computername + "_reg_Software.HIV" RegSave -RegistryKey "HKLM\Software" -OutputFile $OutputFile -fileDescription "Obtaining Software Registry Hive" $OutputFile= $Computername + "_reg_Software_User.HIV" RegSave -RegistryKey "HKCU\Software" -OutputFile $OutputFile -fileDescription "Obtaining Software_User Registry Hive" Trap{WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;Continue} # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABXOx0mJ2KgiQ1 # OlOqNCIJ99wsTSIA1UQCjacgGoEte6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMo0KTEPAWnT3sBsKPQToorj # r1hUEDnvVM2k49Od8NYzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAlRSEU+qhPifhOMlQ+4JzCVr/9JbgO5AhQeaMqT8WoZL48xPBgkh5OWyw # 5nE2yRTvQ3GQvG8ukQSZJ3IXP2PQElwKBB1Z4YQetrgWPK6zILBpltdPZVoWDGmz # B0wGdRYp3zfzGYeuqdcjgByuwkgz5u0Jh7vsMsjMCPmmQmcPsEuovYgoD4SZYvKO # NqcauBXS3iAXI4H5T0u7H1FgTQW/9UUKZOSAFkfWhFSdJ7u7EPgTJJECk968zWDQ # FDlH6iuFWmt+0v7mgsg+HV1g9ccRySpxHbE4c4lpTdGXnD81kqAkOda9/SVaRiDe # bfK/Y8LmjyfqJ5EuIT/EASw/CsE/qaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCqRiMK2AWyzlh4oiCNzRZwJjlE7zZkXCrtbi2iFOgm/gIGZxp1kNxK # GBMyMDI0MTAyODExNDA0My41MDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1 # NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP # AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU # 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt # n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp # un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q # lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld # HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCBnrpeRQ8JnLJkGLNf9pgh20nOdC4PWmXRfB0x06LAvJTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo # rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn # cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAe6HI4RC6Dq+xciKWK9ef2gyI # LQZ/+hawNafVQJ1MTWXMnlHDCgkvM136aOB9bxok8T3Fvr6KSAZbErnDDR+8GzyA # E2LTNV5XL24yjJP1skFpYgiloF5Ld2hgTfp1LCyvdL0oQk9xStxzPth/TaHd/KZb # nISwd5BDqFUHDvECMth7kOnQ1XlDlB0qLs0HI5EoqfUTqTGXwjJ7X1C6Igh0yWmx # xmvriKdHoPZdtdZjBswFCwZUWqeRbwiYo/cCNBxb8jbEAfsCpWeQAMjvkp7BoNhl # VjFYUX1KFggTRXTgWJPthh0U60rrtpZoLGmUu4d9Hmu067PteWEGpNoaQ4KzbrPo # L9lsaZ2ALEGD+7Ree97BWOVkvg0/t85auqMowDC64MDEfblNTJc3BsLpn/Vc7Ox4 # b1YKlwWT/vTlwgdsZnX0/psvWDcxgfetpcKBOnXI51jePaJxsCTLhEgpuCOTVapl # FGJ4N1ekTwz0V+YOsNALJm9OHMSsBOy3n3bWT0DAK1J/RWZGXnYn57JaDoP5/wjc # oEmhCcGy6Xxp5os4P/oJYMMeuVYfHtS+35JNt9zjqnxbiBwrhNY6Ax1O2I0xsEwf # 1llGq37bfQ7BMxn9nuHtJ/s3UI5LaIzJ4JamDN55ogSTySY2DE5Wn7s2x0K2Anqv # LtNTu1jf/fq7O9/OiqU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_14_91.ps1
sample_14_91.ps1
@{ GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59" Author = "PowerShell" CompanyName = "Microsoft Corporation" Copyright = "Copyright (c) Microsoft Corporation." ModuleVersion = "7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion = "3.0" CmdletsToExport = @( 'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml', 'Import-Clixml', 'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv', 'Import-Csv', 'Get-Culture', 'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger', 'Register-EngineEvent', 'Write-Error', 'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event', 'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression', 'Out-File', 'Get-FileHash', 'Export-FormatData', 'Get-FormatData', 'Update-FormatData', 'New-Guid', 'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host', 'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json', 'ConvertTo-Json', 'Test-Json', 'Format-List', 'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown', 'Show-Markdown', 'Get-MarkdownOption', 'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object', 'Measure-Object', 'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output', 'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint', 'Get-PSBreakpoint', 'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession', 'Import-PSSession', 'Get-Random', 'Get-SecureRandom', 'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace', 'Disable-RunspaceDebug', 'Enable-RunspaceDebug', 'Get-RunspaceDebug', 'Start-Sleep', 'Join-String', 'Out-String', 'Select-String', 'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan', 'Get-TraceSource', 'Set-TraceSource', 'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData', 'Get-UICulture', 'Get-Unique', 'Get-Uptime', 'Clear-Variable', 'Get-Variable', 'New-Variable', 'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose', 'Write-Warning', 'Invoke-WebRequest', 'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List', 'Unblock-File' ) FunctionsToExport = @() AliasesToExport = @('fhx') NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll") HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABNCVSZz1rOWiT # w+vGPnwDRC41vPJncfHs3HcOOx4I46CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICvgCI9lBrSM9eTXBET5P5Nb # 19+nZnyUuwlDL40vJitfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhkpmvCpfqrLQmTBAg0wNn+Z7EVd9AGf8B9TCHT2SuAxMod2M3Ne2220B # vF1AsmB7o59jCuACXIWZOMRynSYsWavG70MZ774vqtC6dldr7vmFmLcrThrAMYio # r0BigFjVaKeWB4Lkx/AckpQooLbpAPDaNiN/KgAf+P1SLo/hCc5zPhZ/I7isyYWt # 0gerkBRwaoYXnDEh6oKYKiZHwDwNLBDvXQLluUyfzEJd11Bxp3mZfttSAZlR2gvr # Y16bh9+gXsZ4eA842lLG9MRNMtbqjifRZWI3DMkDvIkq/iE2cV6QhbtWX4S4QCLh # 5b46Pp4YdR4d5KklJg5oL7cB8hW0eaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCYToNKTJu8Ivkbs/qku/OIdkjG9TFf8byJO8M8nrAJOwIGZusouX/J # GBMyMDI0MTAxNjE1MjgzOC43OTFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C # u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx # /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV # V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR # 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp # gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo # j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4 # yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm # TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi # wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd # 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s # huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q # lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG # l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc # 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A # /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl # SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4 # gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG # 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt # oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc # 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn # ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq # Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/ # R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOq55qwwIhgPMjAyNDEwMTYwNzE1NTZaGA8yMDI0MTAxNzA3MTU1NlowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6rnmrAIBADAHAgEAAgIKRTAHAgEAAgIT6TAK # AgUA6rs4LAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAp8cFV7atLwiq2 # dnPkg83Uqj7oYynJrPQScmqDOG3IGIBWqIqY7tU7TL/1Q8VpPeVk9xSSnYov6DsT # En99jdRv24frwDsGkIdNn58R/uSoCouzaDjQ8QV2UUPlVinUiy/if6OzTlPRSX59 # V3kpBjOPy3Dh5jpONx+ilV07p9lrKo1Ql46TjTyuYYUqjUy+MQX0NYSL8glZsRIc # vGDESlaDFVea3CGG5rtJqpvK79mBO8MOwfEq4n+NWDCH/HUy3LDE+QCigJbwcpXl # gQEdEVL5/A74/mgRwipKVeKyAbEcLuyBCotYBqDPGD/dahYiRl5etaFAvnbeUOs3 # 6XRLGPdTMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgD3AqABECOdAx # CDJJ0U6Vje0IKMNagDMa3O4wn9fQzBYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4 # MCIEIErcVc0RIxshTUI6qZ4IuOVVC6ePnWh7CJsP1w8IrGn7MA0GCSqGSIb3DQEB # CwUABIICAFyMS2k1W0qGMdQv01vHWJ9/NDwInpatiW0Cza91ircj0EaSi56BIkyJ # rBxwoCcJbqcDhLUEdfQtkfyvsfoe3I1/diyD1tH+S/lDncTNNKiGkM3EMCeqXGLY # I4hySR92MWo61Fz1QGiPkf/+p0CBAMpigQqFYeBy3caWSaykh5T6jirMlITAGBZX # I6FjoqPnpI6DOpNl0OSRZkYwX28ue5hhKMeT03LEFxedWAMtv5Z+w4XATcbZKgRA # AHlT4VvVwal3df6Oc3GlrYcY/XzqP2XOAqQ6NxV1RojNnOm1B57XvYdoysB+iUq1 # 61dn6vhEcwCMR+EeuMlQ9oLltsEe/N1GAlSy7oMKtxcKD1el/bD+k6wWPoBCRbul # VAnJCbIOpddjqV79egOKYPlpUunhFsKaRlP6Eb1W6ANYpgn/e4eymUr5amEdDgry # ZBigYDsE2Nlzsn4HFha39LUNz6Rwan4xIuDq7zdUPcMgVTNTowVVrA6MUxxGorY4 # HmwODSauCQoiDZt6VzOeY3z9qmQwhVL8t26hTf4l7e7onYPGFGRIMrpnKWi8ZyW3 # YcGCE2J+gVcNuQuU4XPb9uU2WzHnpo3SucasKN3DkDZTF1/t+fxdWCDB2ZpuWUPz # jzymRm+7I71mVX2OARLlwmHST7hOtZVxpuEtcyd9BLz9oUxFot6H # SIG # End signature block
combined_dataset/train/non-malicious/sample_45_91.ps1
sample_45_91.ps1
# # Module manifest for module 'OCI.PSModules.Functions' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Functions.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Functions Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList', 'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList', 'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList', 'Get-OCIFunctionsPbfListingVersion', 'Get-OCIFunctionsPbfListingVersionsList', 'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction', 'Move-OCIFunctionsApplicationCompartment', 'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction', 'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction', 'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_53_4.ps1
sample_53_4.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Creates or updates the entity query. .Description Creates or updates the entity query. .Link https://learn.microsoft.com/powershell/module/az.securityinsights/new-azsentinelentityquery #> function New-AzSentinelEntityQuery { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Models.Api20210901Preview.CustomEntityQuery])] [CmdletBinding(DefaultParameterSetName = 'Activity', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] [System.String] # Gets subscription credentials which uniquely identify Microsoft Azure subscription. # The subscription ID forms part of the URI for every service call. ${SubscriptionId}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Path')] [System.String] # The Resource Group Name. ${ResourceGroupName}, [Parameter(Mandatory)] #[Alias('DataConnectionName')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Path')] [System.String] # The name of the workspace. ${WorkspaceName}, [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Runtime.DefaultInfo(Script = '(New-Guid).Guid')] [System.String] # The Id of the Entity Query. ${Id}, [Parameter(Mandatory)] [ArgumentCompleter( { param ( $CommandName, $EntityQueryName, $WordToComplete, $CommandAst, $FakeBoundParameters ) return @('Activity') })] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Support.EntityQueryKind] # Kind of the the Entity Query ${Kind}, [Parameter(ParameterSetName = 'Activity', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [System.String] ${Title}, [Parameter(ParameterSetName = 'Activity', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [System.String] ${Content}, [Parameter(ParameterSetName = 'Activity', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [System.String] ${Description}, [Parameter(ParameterSetName = 'Activity', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [System.String] ${QueryDefinitionQuery}, [Parameter(ParameterSetName = 'Activity', Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Support.EntityType])] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Support.EntityType] ${InputEntityType}, [Parameter(ParameterSetName = 'Activity')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [String[]] ${RequiredInputFieldsSet}, [Parameter(ParameterSetName = 'Activity')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Models.Api20210901Preview.ActivityEntityQueriesPropertiesEntitiesFilter] ${EntitiesFilter}, [Parameter(ParameterSetName = 'Activity')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')] [System.String] ${TemplateName}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { if ($PSBoundParameters['Kind'] -eq 'Activity'){ $EntityQuery = [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Models.Api20210901Preview.ActivityCustomEntityQuery]::new() $EntityQuery.Title = $PSBoundParameters['Title'] $null = $PSBoundParameters.Remove('Title') $EntityQuery.Content = $PSBoundParameters['Content'] $null = $PSBoundParameters.Remove('Content') $EntityQuery.Description = $PSBoundParameters['Description'] $null = $PSBoundParameters.Remove('Description') $EntityQuery.QueryDefinitionQuery = $PSBoundParameters['QueryDefinitionQuery'] $null = $PSBoundParameters.Remove('QueryDefinitionQuery') $EntityQuery.InputEntityType = $PSBoundParameters['InputEntityType'] $null = $PSBoundParameters.Remove('InputEntityType') If($PSBoundParameters['RequiredInputFieldsSet']){ $EntityQuery.RequiredInputFieldsSet = $PSBoundParameters['RequiredInputFieldsSet'] $null = $PSBoundParameters.Remove('RequiredInputFieldsSet') } If($PSBoundParameters['EntitiesFilter']){ $EntityQuery.EntitiesFilter = $PSBoundParameters['EntitiesFilter'] $null = $PSBoundParameters.Remove('EntitiesFilter') } If($PSBoundParameters['TemplateName']){ $EntityQuery.TemplateName = $PSBoundParameters['TemplateName'] $null = $PSBoundParameters.Remove('TemplateName') } } else { Write-Error "This cmdlet only works with Entity Queries of the Activity kind." break } #$EntityQuery.Kind = $PSBoundParameters['Kind'] $null = $PSBoundParameters.Remove('Kind') $null = $PSBoundParameters.Add('EntityQuery', $EntityQuery) Az.SecurityInsights.internal\New-AzSentinelEntityQuery @PSBoundParameters } catch { throw } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAZsWMtmKE0UzZh # oWU84ZLqUhfRMc1J9Z8oeG9fC31NGaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJTZz04OGLoc3EXWxj9ut8yO # pNsY3zP4xWbM81qjSPyiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEATDsn1DWren4ZcWVjofdeliaIe6Alkct9MaglVFkNen91VF5RvU44lnPS # VuFb3vlkkaPr0395zbn7j5bM3+h79A06zuMMOIfsS85/DftPQip/co/te7S05v6T # 7/smE/MFaAv9ARxFtwX3IHGFQmTfT7E1vbYPkDM9Z7ISdJyym7OGz1G1Ww2wD8yS # pIRe1MyGXM8TqTqgHngFWTNOlXvRV585WrLG49O53WNXPcJ+4/DijxrMbNXvjxmA # nUg/ikDB6NRI3XtvVaWTYRi7tVbevX7+LaPGOA+04eFeu65uV7ZCxNN8dozcELD9 # njUzKkvqazDp8udPXTdBNoG/YOPLK6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCPmPw89/zf8YHT0do4n4kvg0k3pIAiV252VDfsyl0G3QIGZhfWS4aI # GBMyMDI0MDQyMzEzMTUxMS41ODVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ # Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 # tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 # akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq # dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 # EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 # /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 # 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE # blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S # bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ # wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul # IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC # pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn # HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 # ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn # LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi # DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ # uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb # n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe # GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B # 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv # KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 # gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz # cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIknDAiGA8yMDI0MDQyMzEyMTQy # MFoYDzIwMjQwNDI0MTIxNDIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0iSc # AgEAMAoCAQACAgyFAgH/MAcCAQACAhNGMAoCBQDp03YcAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAAtBkyUdrM1hwbTBWCK48MGmKRxZss6LPFkY42ZOWnXs # VX6ZpU1Gl/LHGQnpRZk6/hinddMaf7iclXFbDMTro7W58hCrRegPfWwTzs8g1aOM # YXNAwJW30fwOsS6mecLg5zfkvBReOfq509wnpa0Ndwg6EQMGwD/BAq7tdePiGcew # KasjknLTpYY7fgoW2Ncb0sgNMRHJId/wLrHwD90VtvkCEnw9OPR+IbvMfWkyCTqp # PJ3Y0U/m/Oeqqoo9GDlFnX17f/az0HZjr4SZ9LXRqz8Qa4zlmb79kpVqf6nLoXJr # 9P9oeI7iFIEHkb+mYdtENFDUMyhhduOhsqZHXwrf3QQxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB # 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCA5+u/DOxnGTVW3ttkFhc6h+NkI0bx/qM540xNGBeql # MzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE # X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgUj1W10UOl24tqW0PGjrhbdiG # 0wEdX5mXIsSe+QniYO0wDQYJKoZIhvcNAQELBQAEggIAiYzQpvqWnfsXx/aMHE4s # oHWVf2VkfOjq3T8uvG7IOtbr9e80D5j3ShFNwzARpAKxukRu33zsGlq6i327lNLQ # P2Gud/38TFZLyWba0W3F9wk0KerK80pakSkQ/sgNAv1ehWMqJmQmrg/mh25Em+NR # IB9m/x1FVuZjY5UTEWqIjYrHhLr3ZE608K+kz41BWh0TRsMFz4a9sdfTNWU4++kU # Duf8fxHsvnbqFGoyrJrQCqcEoGxc5EzCeb6iFGir0tYBlgzO0xvNk7tYjzht5rKL # GnVOCp5sz6P7WCSDLECJUN5c4rU+GNi4wzjkK27pDPpoTVmmGJbL/v+tWo7739RB # JJVmaPveFobEZN4RGW0sM5mYR/GO2dYcFW3HCxyieVs6l5oSiIearhmU5QnMRHBs # 2p18ejkDtBRwRi+GUz0HhxwUDJfKky4lsqvQRcEbkNCv1vfyBaGkh8adlxZgl7kc # jwRCGipsw8pMYIaAEjihn+/BtsBwptGEc/rS0J9EYUyTam85LKUGGDcmwxRqcchO # YgX8BE1hav2ATTr3uNPeT68JBSrgZqE6JmCKPlbNfpKZNAQ7xvdMBDOtPQ268G/V # t83FWipfuYXfLihXKGnpKIXe6/40kx0hShwX071YTtiqRHCv8jDAC/g1ivNfiKcC # m3UPfCKK0r0dkWKFykYxUzU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_9_53.ps1
sample_9_53.ps1
#************************************************ # DC_EnvVars.ps1 # Version 2.0 # Date: 10-09-2012 # Author: clandis, andret # Description: Collects environment variables (output of SET command) #************************************************ Import-LocalizedData -BindingVariable EnvVarsStrings Write-DiagProgress -Activity $EnvVarsStrings.ID_EnvVarsOutput -Status $EnvVarsStrings.ID_EnvVarsObtaining $OutputFile = $ComputerName + "_EnvironmentVariables.txt" get-childitem env: | Format-Table -wrap | out-file $OutputFile $fileDescription = "Environment Variables" $sectionDescription = "Environment Variables" CollectFiles -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription Trap{WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;Continue} # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMXkftB73PgRjp # 2b6MyaY14xoAte6TYqqIZUY7Me3o96CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIrt # d3dGLEdOOgWXrWBoZ+9qfb91D++fMyGJZXgejTgLMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAhJ2me+j3xCOyBEQpdOV8618mK7+WSsQHVQf0 # s2/pXF5CcjTBdVCw2GuqTQv1f510VF0+gdZ7W6Kojkoyc2+XrL3flx6ZrXibNzQi # lNaam9TytIue2hIUSV8afIli0nwPPN6JpS+touyvdO+ize7bU6+DsxuSn6h19u8r # 9wlrD0fbKFR8EORVQZsIR7hNj4GqU0Roodgs7I+D5NOa0dKZqgfshi6X8RokSIyd # +ve9EDBOlIkk7eQyea/pMZqEDtKn5Ugiaji4UTVuEaRfnvljt9mNO1JgdqITvJlD # CK3ZPVMDle7QZ0ArcRIWdA51fxGeFh4fTvj3ziKryuwC1QRj6aGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDqmUgsbDN1lm3Qwtk1W+iCouDU5W/79wOr # XIMiz+ABvgIGZutZ6YJkGBMyMDI0MTAyODExNDA0My44ODlaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX # qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF # IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN # XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6 # cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN # h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69 # l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC # qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt # xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V # 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH # 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+ # nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL # ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i # O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q # +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF # RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d # 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di # rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+ # yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M # k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb # YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l # T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip # L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0 # MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA # AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr # /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3 # qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3 # 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk # wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP # 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQg6cvT0FLO+yDdSyCDy+qHvqeSVBJMmIMYXpoKN4gRmdkwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI # k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad # RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAIUrqOXhpGRXvWPatqQ41EDPBBJhAkfb # bH5/rgI3dfjg4X42lpPIHH6UZB0fZVSrE8DfksntBJkbvXu+xfUZOVmjC20kB/o/ # 2+Cs2cZBY2POESH5d8Kosopb0dx+HhZHmhUWSi2sDSLiEZ82D5rFe9g0wj6XyEVc # QDK2ukszwUEp9JNjODQRqSRW0ApKngCg7OrzPinVckscck0YbNhwN+9rGeIPpG9g # VZbZZrnzHyE/Lq5MwnpVXJ+qcq8t5Dx20NdXqC0AF7QrG+R14Ton3ylfA/qTFs9N # x63xa1XG8IRMUBzlwDhh0t2I5Hc/B5T6hk3xEXgx4JZ06igqikjwN/HQbMceeniO # 7fWL47k4QxJuRJ+9K/meo4ZTkgd9yrt2mbsSuv+SxntjwXUbF6g2klnjeEVjIxfu # InMw75qqh/iXdq6u921esmx7Iq5kJF9Np3QOksYlInkWoKPAmeGvOrofUGZ6s9c1 # YW4EPvFI0s60xH9wYIfnC+Daf1hhL/qWFdQJxEhQraSsDGxRJN6kUv3f3jIVUp04 # RF90AZVsooGLK13JTYJz3MAVLm4oiJPitHrO7UWFbq09QdlvEbOg5Y1BpmuuHkR3 # e6KzV5fqn17W9aE9X+qKf+B+OBf0VslhBfBS9BbZ0Y/zUd97jR6Grpl7Org2UIFU # 5PqDMhjIIBXy # SIG # End signature block
combined_dataset/train/non-malicious/sample_44_8.ps1
sample_44_8.ps1
<# .SYNOPSIS Install and run the 'Microsoft.DotNet.VersionTools.Cli' tool with the 'trim-artifacts-version' command to trim the version from the NuGet assets file name. .PARAMETER InputPath Full path to directory where artifact packages are stored .PARAMETER Recursive Search for NuGet packages recursively #> Param( [string] $InputPath, [bool] $Recursive = $true ) $CliToolName = "Microsoft.DotNet.VersionTools.Cli" function Install-VersionTools-Cli { param( [Parameter(Mandatory=$true)][string]$Version ) Write-Host "Installing the package '$CliToolName' with a version of '$version' ..." $feed = "https://pkgs.dev.azure.com/dnceng/public/_packaging/dotnet-eng/nuget/v3/index.json" $argumentList = @("tool", "install", "--local", "$CliToolName", "--add-source $feed", "--no-cache", "--version $Version", "--create-manifest-if-needed") Start-Process "$dotnet" -Verbose -ArgumentList $argumentList -NoNewWindow -Wait } # ------------------------------------------------------------------- if (!(Test-Path $InputPath)) { Write-Host "Input Path '$InputPath' does not exist" ExitWithExitCode 1 } $ErrorActionPreference = 'Stop' Set-StrictMode -Version 2.0 $disableConfigureToolsetImport = $true $global:LASTEXITCODE = 0 # `tools.ps1` checks $ci to perform some actions. Since the SDL # scripts don't necessarily execute in the same agent that run the # build.ps1/sh script this variable isn't automatically set. $ci = $true . $PSScriptRoot\..\tools.ps1 try { $dotnetRoot = InitializeDotNetCli -install:$true $dotnet = "$dotnetRoot\dotnet.exe" $toolsetVersion = Read-ArcadeSdkVersion Install-VersionTools-Cli -Version $toolsetVersion $cliToolFound = (& "$dotnet" tool list --local | Where-Object {$_.Split(' ')[0] -eq $CliToolName}) if ($null -eq $cliToolFound) { Write-PipelineTelemetryError -Force -Category 'Sdl' -Message "The '$CliToolName' tool is not installed." ExitWithExitCode 1 } Exec-BlockVerbosely { & "$dotnet" $CliToolName trim-assets-version ` --assets-path $InputPath ` --recursive $Recursive Exit-IfNZEC "Sdl" } } catch { Write-Host $_ Write-PipelineTelemetryError -Force -Category 'Sdl' -Message $_ ExitWithExitCode 1 }
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail_7.ps1
Send-HTMLFormattedEmail_7.ps1
################################################## # cmdlets ################################################## #------------------------------------------------- # Send-HTMLFormattedEmail #------------------------------------------------- # Usage: Send-HTMLFormattedEmail -? #------------------------------------------------- function Send-HTMLFormattedEmail { <# .Synopsis Used to send an HTML Formatted Email. .Description Used to send an HTML Formatted Email that is based on an XSLT template. .Parameter To Email address or addresses for whom the message is being sent to. Addresses should be seperated using ;. .Parameter ToDisName Display name for whom the message is being sent to. .Parameter CC Email address if you want CC a recipient. Addresses should be seperated using ;. .Parameter BCC Email address if you want BCC a recipient. Addresses should be seperated using ;. .Parameter From Email address for whom the message comes from. .Parameter FromDisName Display name for whom the message comes from. .Parameter Subject The subject of the email address. .Parameter Content The content of the message (to be inserted into the XSL Template). .Parameter Relay FQDN or IP of the SMTP relay to send the message to. .XSLPath The full path to the XSL template that is to be used. #> param( [Parameter(Mandatory=$True)][String]$To, [Parameter(Mandatory=$True)][String]$ToDisName, [String]$CC, [String]$BCC, [Parameter(Mandatory=$True)][String]$From, [Parameter(Mandatory=$True)][String]$FromDisName, [Parameter(Mandatory=$True)][String]$Subject, [Parameter(Mandatory=$True)][String]$Content, [Parameter(Mandatory=$True)][String]$Relay, [Parameter(Mandatory=$True)][String]$XSLPath ) try { # Load XSL Argument List $XSLArg = New-Object System.Xml.Xsl.XsltArgumentList $XSLArg.Clear() $XSLArg.AddParam("To", $Null, $ToDisName) $XSLArg.AddParam("Content", $Null, $Content) # Load Documents $BaseXMLDoc = New-Object System.Xml.XmlDocument $BaseXMLDoc.LoadXml("<root/>") $XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform $XSLTrans.Load($XSLPath) #Perform XSL Transform $FinalXMLDoc = New-Object System.Xml.XmlDocument $MemStream = New-Object System.IO.MemoryStream $XMLWriter = [System.Xml.XmlWriter]::Create($MemStream) $XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter) $XMLWriter.Flush() $MemStream.Position = 0 # Load the results $FinalXMLDoc.Load($MemStream) $Body = $FinalXMLDoc.Get_OuterXML() # Create Message Object $Message = New-Object System.Net.Mail.MailMessage # Now Populate the Message Object. $Message.Subject = $Subject $Message.Body = $Body $Message.IsBodyHTML = $True # Add From $MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName $Message.From = $MessFrom # Add To $To = $To.Split(";") # Make an array of addresses. $To | foreach {$Message.To.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. # Add CC if ($CC){ $CC = $CC.Split(";") # Make an array of addresses. $CC | foreach {$Message.CC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. } # Add BCC if ($BCC){ $BCC = $BCC.Split(";") # Make an array of addresses. $BCC | foreach {$Message.BCC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. } # Create SMTP Client $Client = New-Object System.Net.Mail.SmtpClient $Relay # Send The Message $Client.Send($Message) } catch { throw $_ } } ################################################## # Main ################################################## Export-ModuleMember Send-HTMLFormattedEmail ### XSLT Template Example <?xml version="1.0"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output media-type="xml" omit-xml-declaration="yes" /> <xsl:param name="To"/> <xsl:param name="Content"/> <xsl:template match="/"> <html> <head> <title>My First Formatted Email</title> </head> <body> <div width="400px"> <p>Dear <xsl:value-of select="$To" />,</p> <p></p> <p><xsl:value-of select="$Content" /></p> <p></p> <p><strong>Please do not respond to this email!</strong><br /> An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p> <p></p> <Address> Many thanks from your:<br /> Really Cool IT Team<br /> </Address> </div> </body> </html> </xsl:template> </xsl:stylesheet>
combined_dataset/train/non-malicious/3491.ps1
3491.ps1
function Test-GetBlueprintAssignment { $assignments = Get-AzBlueprintAssignment Assert-True { $assignments.Count -ge 1 } Assert-NotNull $assignments[0].Name Assert-NotNull $assignments[0].Id Assert-NotNull $assignments[0].BlueprintId Assert-NotNull $assignments[0].Scope Assert-NotNull $assignments[0].Location } function Test-NewBlueprintAssignment { $mgId = "AzBlueprintAssignTest" $blueprintName = "Filiz-Ps-Test1" $subscriptionId = "28cbf98f-381d-4425-9ac4-cf342dab9753" $assignmentName = "PS-ScenarioTest-NewAssignment" $location = "East US" $params = @{audituseofclassicvirtualmachines_effect='Audit'} $rg1 = @{name='bp-testrg';location='eastus'} $rgs = @{ResourceGroup=$rg1} $identity = "/subscriptions/996a2f3f-ee01-4ffd-9765-d2c3fc98f30a/resourceGroups/user-assigned-test/providers/Microsoft.ManagedIdentity/userAssignedIdentities/owner-identity" $blueprint = Get-AzBlueprint -ManagementGroupId $mgId -Name $blueprintName -LatestPublished Assert-NotNull $blueprint $assignment = New-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location -Parameter $params -ResourceGroup $rgs -UserAssignedIdentity $identity $expectedProvisioningState = "Creating" Assert-NotNull $assignment Assert-AreEqual $assignment.ProvisioningState $expectedProvisioningState } function Test-NewBlueprintAssignmentWithSystemAssignedIdentity { $subscriptionId = "0b1f6471-1bf0-4dda-aec3-cb9272f09590" $assignmentName = "PS-ScenarioTest-NewSystemAssignedIdentityAssignment" $location = "West US" $blueprintName = "PS-SimpleBlueprintDefinition" $deployment = New-AzDeployment -Name $blueprintName -Location $location -TemplateFile SubscriptionLevelSimpleBlueprint.json Assert-AreEqual Succeeded $deployment.ProvisioningState $blueprint = Get-AzBlueprint -SubscriptionId $subscriptionId -Name $blueprintName -LatestPublished Assert-NotNull $blueprint $assignment = New-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location Assert-NotNull $assignment } function Test-SetBlueprintAssignment { $mgId = "AzBlueprintAssignTest" $blueprintName = "Filiz-Ps-Test1" $subscriptionId = "28cbf98f-381d-4425-9ac4-cf342dab9753" $assignmentName = "PS-ScenarioTest-SetAssignment" $location = "East US" $params = @{audituseofclassicvirtualmachines_effect='Audit'} $rg1 = @{name='bp-testrg';location='eastus'} $rgs = @{ResourceGroup=$rg1} $identity = "/subscriptions/996a2f3f-ee01-4ffd-9765-d2c3fc98f30a/resourceGroups/user-assigned-test/providers/Microsoft.ManagedIdentity/userAssignedIdentities/owner-identity" $blueprint = Get-AzBlueprint -ManagementGroupId $mgId -Name $blueprintName -LatestPublished Assert-NotNull $blueprint $assignment = New-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location -Parameter $params -ResourceGroup $rgs -UserAssignedIdentity $identity $expectedProvisioningState = "Creating" Assert-NotNull $assignment Assert-AreEqual $assignment.ProvisioningState $expectedProvisioningState $assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName $assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName while($assigned.ProvisioningState -eq "Creating" -or $assigned.ProvisioningState -eq "Deploying" -or $assigned.ProvisioningState -eq "Waiting") { Wait-Seconds 10 $assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName } $newTestRg = "bp-testrg-new" $rg1 = @{name= $newTestRg;location='eastus'} $rgs = @{ResourceGroup=$rg1} $assignment = Set-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location -Parameter $params -ResourceGroup $rgs -UserAssignedIdentity $identity $expectedProvisioningState = "Creating" Assert-NotNull $assignment Assert-AreEqual $assignment.ProvisioningState $expectedProvisioningState } function Test-RemoveBlueprintAssignment { $mgId = "AzBlueprintAssignTest" $blueprintName = "Filiz-Ps-Test1" $subscriptionId = "28cbf98f-381d-4425-9ac4-cf342dab9753" $assignmentName = "PS-ScenarioTest-RemoveAssignment" $location = "East US" $params = @{audituseofclassicvirtualmachines_effect='Audit'} $rg1 = @{name='bp-testrg';location='eastus'} $rgs = @{ResourceGroup=$rg1} $identity = "/subscriptions/996a2f3f-ee01-4ffd-9765-d2c3fc98f30a/resourceGroups/user-assigned-test/providers/Microsoft.ManagedIdentity/userAssignedIdentities/owner-identity" $blueprint = Get-AzBlueprint -ManagementGroupId $mgId -Name $blueprintName -LatestPublished Assert-NotNull $blueprint $assignment = New-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location -Parameter $params -ResourceGroup $rgs -UserAssignedIdentity $identity $expectedProvisioningState = "Creating" Assert-NotNull $assignment Assert-AreEqual $assignment.ProvisioningState $expectedProvisioningState $assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName while($assigned.ProvisioningState -eq "Creating" -or $assigned.ProvisioningState -eq "Deploying" -or $assigned.ProvisioningState -eq "Waiting") { Wait-Seconds 10 $assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName } $removed = Remove-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignment.Name -PassThru $expectedProvisioningState = "Deleting" Assert-NotNull $removed Assert-AreEqual $removed.Name $assignment.Name Assert-AreEqual $removed.ProvisioningState $expectedProvisioningState }
combined_dataset/train/non-malicious/Start-ComputerJobs_1.ps1
Start-ComputerJobs_1.ps1
#requires -version 2.0 function Start-ComputerJobs{ <# .NOTES Name: Start-ComputerJobs Author: Tome Tanasovski Created: 6/25/2010 Modified: 6/25/2010 Version: 1.1 Website: http://powertoe.wordpress.com .SYNOPSIS Multithreads a scriptblock with jobs .DESCRIPTION The Start-ComputerJobs cmdlet runs a specified scriptblock within a maximum number of simultaneously spawned Powershell jobs. You must pass a list of ComputerNames to it. The names passed to the cmdlet will replace $computername within the scriptblock prior to starting each thread. This can be thought of as a multithreaded approach to a foreach loop. .PARAMETER ComputerName Specifies a list of computers that you wish to inject into your scriptblock. The list of computer names will replace $computername in the script block. This does not actually need to be a list of computer names. It can be anything you wish to inject into your scriptblock. .PARAMETER ScriptBlock Specifies the commands to run in the background jobs. Enclose the commands in braces ({}) or use $ExecutionContext.InvokeCommand.NewScriptBlock to create a scriptblock. The scriptblock must contain a $computername variable. $computername will be replaced by each entry into the pipeline or from the parameter ComputerName. .PARAMETER Threads Specifies the maximum number of jobs that can be simultaneously running at any given time. This defaults to 10 if nothing is specified. .EXAMPLE "computer1","computer2","computer3","computer4","computer5" |Start-ComputerJobs -ScriptBlock {dir \\\\$computername\\c$} .INPUTS System.String .OUTPUTS PSObject Returns the results of the commands in the job. It is the data returned from receive-job. If you're scriptblock contains write-host it will write that to the console as it is running. To avoid this you should just return objects within your scriptblock. i.e. Instead of write-host "text" just use "text" #> param( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [string[]]$ComputerName, [Parameter(Mandatory=$true)] [ScriptBlock]$ScriptBlock, [Parameter(Mandatory=$false)] [ValidateScript({$_ -gt 0})] [int32]$Threads = 10, [Parameter(Mandatory=$false)] [ValidateScript({$_ -gt 0})] [int32]$Sleep = 5 ) BEGIN { $firstrun = $true $computers = @() $curthreads = 0 $jobs = @() $valid = $false } PROCESS { if ($firstrun) { $firstrun = $false # Validate scriptblock - Making sure it has a $computername variable to use if ($ScriptBlock -match '\\$computername') { $valid = $true } else { Write-Error 'You must specify a scriptblock that contains a variable called $computername' $valid = $false } } if ($valid) { foreach ($computer in $computername) { while ($jobs.count -eq $Threads) { $newjobs = @() $jobs |foreach { Receive-Job $_.id if ($_.state -eq "Running" -or $_.HasMoreData) { $newjobs += $_ } else { $_ |Remove-Job } } $jobs = $newjobs if ($jobs.count -eq $Threads) { sleep $sleep } } $runscript = $ExecutionContext.InvokeCommand.NewScriptBlock(($ScriptBlock -replace '\\$computername', "$computer")) Write-Verbose "Starting Job for computer: $computer" $jobs += Start-Job -ScriptBlock $runscript $curthreads++ } } } END { while ($jobs.count -ne 0) { $newjobs = @() $jobs |foreach { Receive-Job $_.id if ($_.state -eq "Running" -or $_.HasMoreData) { $newjobs += $_ } else { $_ |Remove-Job } } $jobs = $newjobs if ($jobs.count -gt 0) { sleep $sleep } } } }
combined_dataset/train/non-malicious/Custom Accelerators_1.ps1
Custom Accelerators_1.ps1
#requires -version 2.0 ## Custom Accelerators for PowerShell 2 #################################################################################################### ## A script module for PowerShell 2 which allows the user to create their own custom type accelerators. ## Thanks to "Oisin Grehan for the discovery":http://www.nivot.org/2008/12/25/ListOfTypeAcceleratorsForPowerShellCTP3.aspx. #################################################################################################### ## Revision History ## v1.0 - Modularization of Oisin's idea, by Joel 'Jaykul' Bennett ## v2.0 - Update for RTM (nothing significant) ## v2.1 - Minor tweaks to make it more pipelineable (I'm including this in my Reflection module) #################################################################################################### # get a reference to the Type $xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators") function Add-Accelerator { <# .Synopsis Add a type accelerator to the current session .Description The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]). .Example Add-Accelerator list System.Collections.Generic.List``1 $list = New-Object list[string] Creates an accelerator for the generic List[T] collection type, and then creates a list of strings. .Example Add-Accelerator "List T", GList System.Collections.Generic.List``1 $list = New-Object "list t[string]" Creates two accelerators for the Generic List[T] collection type. .Parameter Accelerator The short form accelerator should be just the name you want to use (without square brackets). .Parameter Type The type you want the accelerator to accelerate (without square brackets) .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". PowerShell requires arguments that are "types" to NOT have the square bracket type notation, because of the way the parsing engine works. You can either just type in the type as System.Int64, or you can put parentheses around it to help the parser out: ([System.Int64]) Also see the help for Get-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding()] PARAM( [Parameter(Position=0,ValueFromPipelineByPropertyName=$true)] [Alias("Key","Name")] [string[]]$Accelerator , [Parameter(Position=1,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [Alias("Value","FullName")] [type]$Type ) PROCESS { # add a user-defined accelerator foreach($a in $Accelerator) { $xlr8r::Add( $a, $Type) trap [System.Management.Automation.MethodInvocationException] { if($xlr8r::get.keys -contains $a) { Write-Error "Cannot add accelerator [$a] for [$($Type.FullName)]`n [$a] is already defined as [$($xlr8r::get[$a].FullName)]" Continue; } throw } } } } function Get-Accelerator { <# .Synopsis Get one or more type accelerator definitions .Description The Get-Accelerator function allows you to look up the type accelerators (like [regex]) defined on your system by their short form or by type .Example Get-Accelerator System.String Returns the KeyValue pair for the [System.String] accelerator(s) .Example Get-Accelerator ps*,wmi* Returns the KeyValue pairs for the matching accelerator definition(s) .Parameter Accelerator One or more short form accelerators to search for (Accept wildcard characters). .Parameter Type One or more types to search for. .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". Also see the help for Add-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(DefaultParameterSetName="ByType")] PARAM( [Parameter(Position=0, ParameterSetName="ByAccelerator", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key","Name")] [string[]]$Accelerator , [Parameter(Position=0, ParameterSetName="ByType", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Value","FullName")] [type[]]$Type ) PROCESS { # add a user-defined accelerator switch($PSCmdlet.ParameterSetName) { "ByAccelerator" { $xlr8r::get.GetEnumerator() | % { foreach($a in $Accelerator) { if($_.Key -like $a) { $_ } } } break } "ByType" { if($Type -and $Type.Count) { $xlr8r::get.GetEnumerator() | ? { $Type -contains $_.Value } } else { $xlr8r::get.GetEnumerator() | %{ $_ } } break } } } } function Remove-Accelerator { <# .Synopsis Remove a type accelerator from the current session .Description The Remove-Accelerator function allows you to remove a simple type accelerator (like [regex]) from the current session. You can pass one or more accelerators, and even wildcards, but you should be aware that you can remove even the built-in accelerators. .Example Remove-Accelerator int Add-Accelerator int Int64 Removes the "int" accelerator for Int32 and adds a new one for Int64. I can't recommend doing this, but it's pretty cool that it works: So now, "$(([int]3.4).GetType().FullName)" would return "System.Int64" .Example Get-Accelerator System.Single | Remove-Accelerator Removes both of the default accelerators for System.Single: [float] and [single] .Example Get-Accelerator System.Single | Remove-Accelerator -WhatIf Demonstrates that Remove-Accelerator supports -Confirm and -Whatif. Will Print: What if: Removes the alias [float] for type [System.Single] What if: Removes the alias [single] for type [System.Single] .Parameter Accelerator The short form accelerator that you want to remove (Accept wildcard characters). .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accel string, regex". Also see the help for Add-Accelerator and Get-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(SupportsShouldProcess=$true)] PARAM( [Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key","FullName")] [string[]]$Accelerator ) PROCESS { foreach($a in $Accelerator) { foreach($key in $xlr8r::Get.Keys -like $a) { if($PSCmdlet.ShouldProcess( "Removes the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]", "Remove the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]?", "Removing Type Accelerator" )) { # remove a user-defined accelerator $xlr8r::remove($key) } } } } } Add-Accelerator list System.Collections.Generic.List``1 Add-Accelerator dictionary System.Collections.Generic.Dictionary``2
combined_dataset/train/non-malicious/sample_59_96.ps1
sample_59_96.ps1
# # Module manifest for module 'OCI.PSModules.Waa' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waa.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5e9163aa-454b-4b6c-b240-a7136ba9f82a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waa Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waa.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWaaWebAppAcceleration', 'Get-OCIWaaWebAppAccelerationPoliciesList', 'Get-OCIWaaWebAppAccelerationPolicy', 'Get-OCIWaaWebAppAccelerationsList', 'Get-OCIWaaWorkRequest', 'Get-OCIWaaWorkRequestErrorsList', 'Get-OCIWaaWorkRequestLogsList', 'Get-OCIWaaWorkRequestsList', 'Invoke-OCIWaaPurgeWebAppAccelerationCache', 'Move-OCIWaaWebAppAccelerationCompartment', 'Move-OCIWaaWebAppAccelerationPolicyCompartment', 'New-OCIWaaWebAppAcceleration', 'New-OCIWaaWebAppAccelerationPolicy', 'Remove-OCIWaaWebAppAcceleration', 'Remove-OCIWaaWebAppAccelerationPolicy', 'Update-OCIWaaWebAppAcceleration', 'Update-OCIWaaWebAppAccelerationPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waa' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_66_89.ps1
sample_66_89.ps1
# # Module manifest for module 'OCI.PSModules.Servicemanagerproxy' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Servicemanagerproxy.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '01ac6ca4-c358-4958-baf9-455f6dd1de04' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Servicemanagerproxy Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicemanagerproxy.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIServicemanagerproxyServiceEnvironment', 'Get-OCIServicemanagerproxyServiceEnvironmentsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicemanagerproxy' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_8_94.ps1
sample_8_94.ps1
#************************************************ # TS_SurfacePro3DetectFirmwareVersions.ps1 # Version 1.0.09.19.14: Created and tested SurfacePro3 scripts from Sep12-19 # Date: 2014 # Author: bbenson # Description: SurfacePro3DetectFirmwareVersions # # Rule GUID: 34F6567E-7B92-4C37-B1CA-5DE6E66D4881 # # Files: # TS_SurfacePro3DetectFirmwareVersions.ps1 # RC_SurfacePro3DetectFirmwareVersions.xml # Include.xml # # Output files: # none # # Called from: Networking and Setup Diagnostics #************************************************ Import-LocalizedData -BindingVariable RegKeyCheck Write-DiagProgress -Activity $RegKeyCheck.ID_SurfacePro3DetectFirmwareVersions -Status $RegKeyCheck.ID_SurfacePro3DetectFirmwareVersionsDesc $RootCauseDetected = $false $HasIssue = $false $RootCauseName = "RC_SurfacePro3DetectFirmwareVersions" #$PublicContent Title: "Surface Pro 3, Surface Pro 2, and Surface Pro firmware and driver packs" $PublicContent = "http://www.microsoft.com/en-us/download/details.aspx?id=38826" #InternalContent Title: "2961421 - Surface: How to check firmware versions" $InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2961421" $Verbosity = "Error" $Visibility = "4" $SupportTopicsID = "8041" $InformationCollected = new-object PSObject #******************** #Functions #******************** $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber $sku = $((Get-CimInstance win32_operatingsystem).OperatingSystemSKU) Function isOSVersionAffected { if ($bn -eq 9600) { return $true } else { return $false } } Function isSurfacePro3 { # Check for: "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\BIOS"; SystemSKU = Surface_Pro_3 $regkeyBIOS = "HKLM:\HARDWARE\DESCRIPTION\System\BIOS" If (test-path $regkeyBIOS) { $regvalueSystemSKUReg = Get-ItemProperty -path $regkeyBIOS -name "SystemSKU" -ErrorAction SilentlyContinue $regvalueSystemSKU = $regvalueSystemSKUReg.SystemSKU if ($regvalueSystemSKU -eq "Surface_Pro_3") { return $true } else { return $false } } } #******************** #Detection Logic and Alert Evaluation #******************** if ((isOSVersionAffected) -and (isSurfacePro3)) { # Using this method to detect the firmware version: # Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{512B1F42-CCD2-403B-8118-2F54353A1226}" Filename = "SamFirmware.3.9.350.0.cap" # Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{52D9DA80-3D55-47E4-A9ED-D538A9B88146}" Filename = "ECFirmware.38.6.50.0.cap" # Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{5A2D987B-CB39-42FE-A4CF-D5D0ABAE3A08}" Filename = "UEFI.3.10.250.0.cap" # Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{E5FFF56F-D160-4365-9E21-22B06F6746DD}" Filename = "TouchFirmware.426.27.66.0.cap" # # This method shows the correct driver if the driver is rolled back, but this is not needed since firmware cannot be rolled back. # HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\UEFI\RES_{GUID}\0\Device Parameters # $regkeySamFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{512B1F42-CCD2-403B-8118-2F54353A1226}" If (test-path $regkeySamFirmware) { $regvalueSamFirmwareFilename = Get-ItemProperty -path $regkeySamFirmware -name "Filename" -ErrorAction SilentlyContinue if ($null -ne $regvalueSamFirmwareFilename) { $regvalueSamFirmwareFilename = $regvalueSamFirmwareFilename.Filename $regvalueSamFirmwareFileNameLatest = "SamFirmware.3.9.350.0.cap" } $regvalueSamFirmwareVersion = Get-ItemProperty -path $regkeySamFirmware -name "Version" -ErrorAction SilentlyContinue if ($null -ne $regvalueSamFirmwareVersion) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro System Aggregator Firmware" -value " " $regvalueSamFirmwareVersion = $regvalueSamFirmwareVersion.Version if ($regvalueSamFirmwareVersion -lt 50922320) # Hex 0x03090350 { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Installed Version" -value $regvalueSamFirmwareFileName add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Recommended Version" -value $regvalueSamFirmwareFileNameLatest } else { add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Version: No Action Needed" -value $regvalueSamFirmwareFileName } } } $regkeyECFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{52D9DA80-3D55-47E4-A9ED-D538A9B88146}" If (test-path $regkeyECFirmware) { $regvalueECFirmwareFileName = Get-ItemProperty -path $regkeyECFirmware -name "Filename" -ErrorAction SilentlyContinue if ($null -ne $regvalueECFirmwareFileName) { $regvalueECFirmwareFileName = $regvalueECFirmwareFileName.Filename $regvalueECFirmwareFileNameLatest = "ECFirmware.38.6.50.0" } $regvalueECFirmwareVersion = Get-ItemProperty -path $regkeyECFirmware -name "Version" -ErrorAction SilentlyContinue if ($null -ne $regvalueECFirmwareVersion) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro Embedded Controller Firmware" -value " " $regvalueECFirmwareVersion = $regvalueECFirmwareVersion.Version if ($regvalueECFirmwareVersion -lt 3671632) # Hex 0x00380650 { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Installed Version" -value $regvalueECFirmwareFileName add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Recommended Version" -value $regvalueECFirmwareFileNameLatest } else { add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Version: No Action Needed" -value $regvalueECFirmwareFileName } } } $regkeyUEFI = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{5A2D987B-CB39-42FE-A4CF-D5D0ABAE3A08}" If (test-path $regkeyUEFI) { $regvalueUEFIFileName = Get-ItemProperty -path $regkeyUEFI -name "Filename" -ErrorAction SilentlyContinue if ($null -ne $regvalueUEFIFileName) { $regvalueUEFIFileName = $regvalueUEFIFileName.Filename $regvalueUEFIFileNameLatest = "UEFI.3.10.250.0.cap" } $regvalueUEFIVersion = Get-ItemProperty -path $regkeyUEFI -name "Version" -ErrorAction SilentlyContinue if ($null -ne $regvalueUEFIVersion) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro UEFI" -value " " $regvalueUEFIVersion = $regvalueUEFIVersion.Version if ($regvalueUEFIVersion -lt 50987258) # Hex 0x030a00fa { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Installed Version" -value $regvalueUEFIFileName add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Recommended Version" -value $regvalueUEFIFileNameLatest } else { add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Version: No Action Needed" -value $regvalueUEFIFileName } } } $regkeyTouchFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{E5FFF56F-D160-4365-9E21-22B06F6746DD}" If (test-path $regkeyTouchFirmware) { $regvalueTouchFirmwareFileName = Get-ItemProperty -path $regkeyTouchFirmware -name "Filename" -ErrorAction SilentlyContinue if ($null -ne $regvalueTouchFirmwareFileName) { $regvalueTouchFirmwareFileName = $regvalueTouchFirmwareFileName.Filename $regvalueTouchFirmwareFileNameLatest = "TouchFirmware.426.27.66.0" } $regvalueTouchFirmwareVersion = Get-ItemProperty -path $regkeyTouchFirmware -name "Version" -ErrorAction SilentlyContinue if ($null -ne $regvalueTouchFirmwareVersion) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro Touch Controller Firmware" -value " " $regvalueTouchFirmwareVersion = $regvalueTouchFirmwareVersion.Version if ($regvalueTouchFirmwareVersion -lt 27925314) # Hex 0x01aa1b42 { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Installed Version:" -value $regvalueTouchFirmwareFileName add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Recommended Version" -value $regvalueTouchFirmwareFileNameLatest } else { add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Version: No Action Needed" -value $regvalueTouchFirmwareFileName } } } if ($RootCauseDetected -eq $true) { "[info] RootCauseDetected: Completing RootCause" | WriteTo-StdOut # Completing the Root Cause Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InternalContentURL $InternalContent -Verbosity $Verbosity -InformationCollected $InformationCollected -Visibility $Visibility -SupportTopicsID $SupportTopicsID -MessageVersion 1 } else { Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoUQYJKoZIhvcNAQcCoIIoQjCCKD4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB10HRFrv8HjhoX # gsRZ5WnZzTq8vDo3ZWsTdcl0N9SmHKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFzW # iMZmK36RHn34ITp+dpSCjzKsm6UyyzflaB7FrpOGMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAiMIJtLQjS/0BIq5AMQVvgGSufD6p29eTtyj5 # nRxyuY6sd7fbmPfqSD9SJ8UDGBeawEjmqQm4bKjkYOGL1UwSUE3bD/K6Ha6ZJcB8 # sA3ZX9pDsqHnG0EG6KziBeMLFsCaw+sn4kcY2JsmIp6bdH5JkIBUz1uzl3qGGKGh # i4VvOpzK2TyQGHa0foj8n66/yx62Z6kS+P4gMwA679272DVjVVnoNy3VK/1l2vjT # 47881DXeMwHhfytwxQEXJFf7x+HQjmIKwytBhz6EmHSJjsO52hi724dgrcOpVsWb # N7S+INy1JLhS6DTzIGOPvbogGhwzazzGZi2gdeVMi4PwyCnBoKGCF6wwgheoBgor # BgEEAYI3AwMBMYIXmDCCF5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCnlDISA3V/ssXwt4PRuitDHhoNLozWEyQm # Ds7o9T+wQQIGZus6esmcGBIyMDI0MTAyODExNDA0MC4yOFowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAH5H2eN # dauk8bEAAQAAAfkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTA5WhcNMjUxMDIyMTgzMTA5WjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MkExQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC0 # PUwffIAdYc1WyUL4IFOP8yl3nksM+1CuE3tZ6oWFF4L3EpdKOhtbVkfMdTxXYE4l # SJiDt8MnYDEZUbKi9S2AZmDb4Zq4UqTdmOOwtKyp6FgixRCuBf6v9UBNpbz841bL # qU7IZnBmnF9XYRfioCHqZvaFp0C691tGXVArW18GVHd914IFAb7JvP0kVnjks3am # zw1zXGvjU3xCLcpUkthfSJsRsCSSxHhtuzMLO9j691KuNbIoCNHpiBiFoFoPETYo # MnaxBEUUX96ALEqCiB0XdUgmgIT9a7L0y4SDKl5rUd6LuUUa90tBkfkmjZBHm43y # GIxzxnjtFEm4hYI57IgnVidGKKJulRnvb7Cm/wtOi/TIfoLkdH8Pz4BPi+q0/nsh # NewP0M86hvy2O2x589xAl5tQ2KrJ/JMvmPn8n7Z34Y8JxcRih5Zn6euxlJ+t3kMc # zii8KYPeWJ+BifOM6vLiCFBP9y+Z0fAWvrIkamFb8cbwZB35wHjDvAak6EdUlvLj # iQZUrwzNj2zfYPLVMecmDynvLWwQbP8DXLzhm3qAiwhNhpxweEEqnhw5U2t+hFVT # HYb/ROvsOTd+kJTy77miWo8/AqBmznuOX6U6tFWxfUBgSYCfILIaupEDOkZfKTUe # 80gGlI025MFCTsUG+75imLoDtLZXZOPqXNhZUG+4YQIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFInto7qclckj16KPNLlCRHZGWeAAMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQBmIAmAVuR/uN+HH+aZmWcZmulp74canFbGzwjv29RvwZCi7nQzWezuLAbY # Jx2hdqrtWClWQ1/W68iGsZikoIFdD5JonY7QG/C4lHtSyBNoo3SP/J/d+kcPSS0f # 4SQS4Zez0MEvK3vWK61WTCjD2JCZKTiggrxLwCs0alI7N6671N0mMGOxqya4n7ar # lOOauAQrI97dMCkCKjxx3D9vVwECaO0ju2k1hXk/JEjcrU2G4OB8SPmTKcYX+6LM # /U24dLEX9XWSz/a0ISiuKJwziTU8lNMDRMKM1uSmYFywAyXFPMGdayqcEK3135R3 # 1VrcjD0GzhxyuSAGMu2De9gZhqvrXmh9i1T526n4u5TR3bAEMQbWeFJYdo767bLp # KLcBo0g23+k4wpTqXgBbS4NZQff04cfcSoUe1OyxldoM6O3JGBuowaaR/wojeohU # FknZdCmeES5FuH4CCmZGf9rjXQOTtW0+Da4LjbZYsLwfwhWT8V6iJJLi8Wh2GdwV # 60nRkrfrDEBrcWI+AF5tFbJW1nvreoMPPENvSYHocv0cR9Ns37igcKRlrUcqXwHS # zxGIUEx/9bv47sQ9n7AwfzB2SNntJux1211GBEBGpHwgU9a6tD6yft+0SJ9qiPO4 # IRqFIByrzrKPBB5M831gb1vfhFO6ueSkP7A8ZMHVZxwymwuUzTCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCqzlaNY7vNUAqY # hx3CGqBm/KnpRqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6snJlzAiGA8yMDI0MTAyODA4MjgwN1oYDzIwMjQx # MDI5MDgyODA3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqycmXAgEAMAcCAQAC # AgheMAcCAQACAhNxMAoCBQDqyxsXAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD # ggEBABl2r45TbcRpRyHBC7Tfm1IOcpmVr24Oj3iI4YxR9hIegjEBKx/eOzYN7DEj # OwXPW3wQtuz/tX5v6UtnblQPLlaEy4BpQXQMEroPYmeyPIlVJtxz7jyPpn/sWHzj # L2RPxzkdRgvmQXY0mKqAco1FMt1mocHjYjhtX9/Pz8Ob/b0Zb4NHYgZhKy8vZ7vY # C9+kq1Rk73hZ+e9FUC7grAeUiYZF3fQlSJbSoUEO+YDXbACDwUn/6aTqeEmMSlSq # eshWE6pNkTQjkYmJUnJ0AWlYZB43BaKARszkCW9KuDKhAyGdqBFX8EeGOmEWAYS7 # o4XMf6DpsGJS78GyaWh0zj3NACAxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfkfZ411q6TxsQABAAAB+TANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCA/vjySoim1TLx7PFh+Nci4GZltq8hz6aRDGVYWYmBfMTCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIDkjjMge8I37ZPrpFQ4sJmtQRV2gqUqXxV4I7lJs # YtgQMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH5 # H2eNdauk8bEAAQAAAfkwIgQgJmu+NOFPuWOF/KqubUTlJN0adLdAcytn+UUcmQcH # ut0wDQYJKoZIhvcNAQELBQAEggIAl7sqCZ4y/UwHpdpaoluj2INT9+VJ3+Swj2IP # Je1aIjWW2DeO/Kjj/TCSmtHLRbxS0dMEoiKJUst5Ex9i4aQLykQ1PEHj9sd/OZtB # SPl82s7vvc4ipgkN/HmCjauN6AKfXmhw58OXgTG8Oo1blMNej7aQpwZqyLLWHXqe # lVDQqD3XrQ5VpCf1M/uOKZSnK0yTfti9x5SdFyfI57RwoeoPELdKDAQ2h6hgbhld # sbMr4HEYL0pqbiVo0pSV3FGskvxpXhydASPLq/8UrfLDvq/qm8KglckSuhI/vICW # 7PtParYQq/Qd7yrQ1wAH36QXUgULrTtf582WreIMU/K7xv38/FSJ/gJdA+v5mvEl # uFpmhETTJxlbXtIWjX0Tea+B69fFReYz4dglfqgJ4Lk6TGW0El3DGZUPyK02Josg # YJcqcO8a7h0TRjaZCoDtcyifF1mMFxQN75J2Bo6ousZ8A0CpUhCa6+8swuByJ00r # CFwwc8hYl2JJqJARbh3zS87+kg572+modSIfDNNKoz6Gk4nqGiucNm12Vmow6c3p # e6EzB6We8n6wK9GRwfO8lmLHHJ8qWtHR2eNRXKrH6WxOV4vR3bMO4f6oPDrncSqV # JewV1M2xIA5xwoLgBRMdM7tfma0X5F3keceyzWj1xktvnFLo6y6rhcRP/oBXYxsg # 9VybTNU= # SIG # End signature block
combined_dataset/train/non-malicious/1931.ps1
1931.ps1
Describe "Set-Alias DRT Unit Tests" -Tags "CI" { It "Set-Alias Invalid Scope Name should throw PSArgumentException"{ { Set-Alias -Name "ABCD" -Value "foo" -Scope "bogus" } | Should -Throw -ErrorId "Argument,Microsoft.PowerShell.Commands.SetAliasCommand" } It "Set-Alias ReadOnly Force"{ Set-Alias -Name ABCD -Value "foo" -Option ReadOnly -Force:$true $result=Get-Alias -Name ABCD $result.Name| Should -BeExactly "ABCD" $result.Definition| Should -BeExactly "foo" $result.Description| Should -BeNullOrEmpty $result.Options| Should -BeExactly "ReadOnly" Set-Alias -Name ABCD -Value "foo" -Force:$true $result=Get-Alias -Name ABCD $result.Name| Should -BeExactly "ABCD" $result.Definition| Should -BeExactly "foo" $result.Description| Should -BeNullOrEmpty $result.Options| Should -BeExactly "None" } It "Set-Alias Name And Value Valid"{ Set-Alias -Name ABCD -Value "MyCommand" $result=Get-Alias -Name ABCD $result.Name| Should -BeExactly "ABCD" $result.Definition| Should -BeExactly "MyCommand" $result.Description| Should -BeNullOrEmpty $result.Options| Should -BeExactly "None" } It "Set-Alias Name And Value Positional Valid"{ Set-Alias -Name ABCD "foo" $result=Get-Alias ABCD $result.Name| Should -BeExactly "ABCD" $result.Definition| Should -BeExactly "foo" $result.Description| Should -BeNullOrEmpty $result.Options| Should -BeExactly "None" } It "Set-Alias Description Valid"{ Set-Alias -Name ABCD -Value "MyCommand" -Description "test description" $result=Get-Alias -Name ABCD $result.Name| Should -BeExactly "ABCD" $result.Definition| Should -BeExactly "MyCommand" $result.Description| Should -BeExactly "test description" $result.Options| Should -BeExactly "None" } It "Set-Alias Scope Valid"{ Set-Alias -Name ABCD -Value "localfoo" -scope local -Force:$true Set-Alias -Name ABCD -Value "foo1" -scope "1" -Force:$true $result=Get-Alias -Name ABCD $result.Name| Should -BeExactly "ABCD" $result.Definition| Should -BeExactly "localfoo" $result.Description| Should -BeNullOrEmpty $result.Options| Should -BeExactly "None" $result=Get-Alias -Name ABCD -scope local $result.Name| Should -BeExactly "ABCD" $result.Definition| Should -BeExactly "localfoo" $result.Description| Should -BeNullOrEmpty $result.Options| Should -BeExactly "None" $result=Get-Alias -Name ABCD -scope "1" $result.Name| Should -BeExactly "ABCD" $result.Definition| Should -BeExactly "foo1" $result.Description| Should -BeNullOrEmpty $result.Options| Should -BeExactly "None" } It "Set-Alias Expose Bug 1062958, BugId:905449"{ { Set-Alias -Name "ABCD" -Value "foo" -Scope "-1" } | Should -Throw -ErrorId "ArgumentOutOfRange,Microsoft.PowerShell.Commands.SetAliasCommand" } } Describe "Set-Alias" -Tags "CI" { Mock Get-Date { return "Friday, October 30, 2015 3:38:08 PM" } It "Should be able to set alias without error" { { set-alias -Name gd -Value Get-Date } | Should -Not -Throw } It "Should be able to have the same output between set-alias and the output of the function being aliased" { set-alias -Name gd -Value Get-Date gd | Should -Be $(Get-Date) } It "Should be able to use the sal alias" { { sal gd Get-Date } | Should -Not -Throw } It "Should have the same output between the sal alias and the original set-alias cmdlet" { sal -Name gd -Value Get-Date Set-Alias -Name gd2 -Value Get-Date gd2 | Should -Be $(gd) } }
combined_dataset/train/non-malicious/4024.ps1
4024.ps1
function Test-CreatesNewSimpleResourceGroup { $rgname = Get-ResourceGroupName $location = Get-Location "Microsoft.Resources" "resourceGroups" "West US" try { $actual = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval"} $expected = Get-AzResourceGroup -Name $rgname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName Assert-AreEqual $expected.Tags["testtag"] $actual.Tags["testtag"] } finally { Clean-ResourceGroup $rgname } } function Test-UpdatesExistingResourceGroup { $rgname = Get-ResourceGroupName $location = Get-Location "Microsoft.Resources" "resourceGroups" "West US" try { Set-AzResourceGroup -Name $rgname -Tags @{testtag = "testval"} -ErrorAction SilentlyContinue Assert-True { $Error[0] -like "*Provided resource group does not exist." } $Error.Clear() $new = New-AzResourceGroup -Name $rgname -Location $location $actual = Set-AzResourceGroup -Name $rgname -Tags @{ testtag = "testval" } $expected = Get-AzResourceGroup -Name $rgname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName Assert-AreEqual 0 $new.Tags.Count Assert-AreEqual $expected.Tags["testtag"] $actual.Tags["testtag"] } finally { Clean-ResourceGroup $rgname } } function Test-CreatesAndRemoveResourceGroupViaPiping { $rgname1 = Get-ResourceGroupName $rgname2 = Get-ResourceGroupName $location = Get-Location "Microsoft.Resources" "resourceGroups" "West US" New-AzResourceGroup -Name $rgname1 -Location $location New-AzResourceGroup -Name $rgname2 -Location $location $job = Get-AzResourceGroup | where {$_.ResourceGroupName -eq $rgname1 -or $_.ResourceGroupName -eq $rgname2} | Remove-AzResourceGroup -Force -AsJob Wait-Job $job Get-AzResourceGroup -Name $rgname1 -ErrorAction SilentlyContinue Assert-True { $Error[0] -like "*Provided resource group does not exist." } $Error.Clear() Get-AzResourceGroup -Name $rgname2 -ErrorAction SilentlyContinue Assert-True { $Error[0] -like "*Provided resource group does not exist." } $Error.Clear() } function Test-GetNonExistingResourceGroup { $rgname = Get-ResourceGroupName Get-AzResourceGroup -Name $rgname -ErrorAction SilentlyContinue Assert-True { $Error[0] -like "*Provided resource group does not exist." } $Error.Clear() } function Test-NewResourceGroupInNonExistingLocation { $rgname = Get-ResourceGroupName Assert-Throws { New-AzResourceGroup -Name $rgname -Location 'non-existing' } } function Test-RemoveNonExistingResourceGroup { $rgname = Get-ResourceGroupName Remove-AzResourceGroup -Name $rgname -Force -ErrorAction SilentlyContinue Assert-True { $Error[0] -like "*Provided resource group does not exist." } $Error.Clear() } function Test-AzureTagsEndToEnd { $tag1 = getAssetName $tag2 = getAssetName Clean-Tags New-AzTag $tag1 $tag = Get-AzTag $tag1 Assert-AreEqual $tag1 $tag.Name New-AzTag $tag1 value1 New-AzTag $tag1 value1 New-AzTag $tag1 value2 $tag = Get-AzTag $tag1 Assert-AreEqual 2 $tag.Values.Count New-AzTag $tag2 value1 New-AzTag $tag2 value2 New-AzTag $tag2 value3 $tags = Get-AzTag Assert-AreEqual 2 $tags.Count $tag = Remove-AzTag $tag1 -Force -PassThru $tags = Get-AzTag Assert-AreEqual $tag1 $tag.Name $tag = Remove-AzTag $tag2 value1 -Force -PassThru $tags = Get-AzTag Assert-AreEqual 0 $tags.Count Assert-Throws { Get-AzTag "non-existing" } Clean-Tags } function Test-NewDeploymentAndProviderRegistration { $rgname = Get-ResourceGroupName $rname = Get-ResourceName $location = Get-Location "Microsoft.Resources" "resourceGroups" "West US" $template = "Microsoft.Cache.0.4.0-preview" $provider = "microsoft.cache" try { $subscription = [Microsoft.WindowsAzure.Commands.Utilities.Common.AzureProfile]::Instance.CurrentSubscription $client = New-Object Microsoft.Azure.Commands.Resources.Models.ResourcesClient $subscription $providers = [Microsoft.WindowsAzure.Commands.Utilities.Common.AzureProfile]::Instance.CurrentSubscription.RegisteredResourceProvidersList if( $providers -Contains $provider ) { $client.UnregisterProvider($provider) } $deployment = New-AzResourceGroup -Name $rgname -Location $location -GalleryTemplateIdentity $template -cacheName $rname -cacheLocation $location $client = New-Object Microsoft.Azure.Commands.Resources.Models.ResourcesClient $subscription $providers = [Microsoft.WindowsAzure.Commands.Utilities.Common.AzureProfile]::Instance.CurrentSubscription.RegisteredResourceProvidersList Assert-True { $providers -Contains $provider } } finally { Clean-ResourceGroup $rgname } } function Test-RemoveDeployment { $deploymentName = "Test" $templateUri = "https://gallery.azure.com/artifact/20140901/Microsoft.ResourceGroup.1.0.0/DeploymentTemplates/Template.json" $rgName = "TestSDK0123" try { New-AzResourceGroup -Name $rgName -Location "East US" $job = New-AzResourceGroupDeployment -ResourceGroupName $rgName -Name $deploymentName -TemplateUri $templateUri -AsJob Wait-Job $job $deployment = Receive-Job $job Assert-True { Remove-AzResourceGroupDeployment -ResourceGroupName $deployment.ResourceGroupName -Name $deployment.DeploymentName } } finally { Clean-ResourceGroup $rgName } } function Test-FindResourceGroup { $rgname = Get-ResourceGroupName $rgname2 = Get-ResourceGroupName $location = Get-Location "Microsoft.Resources" "resourceGroups" "West US" $originalResorcrGroups = Get-AzResourceGroup $originalCount = @($originalResorcrGroups).Count try { $actual = New-AzResourceGroup -Name $rgname -Location $location -Tag @{ testtag = "testval" } $actual2 = New-AzResourceGroup -Name $rgname2 -Location $location -Tag @{ testtag = "testval2" } $expected1 = Get-AzResourceGroup -Name $rgname Assert-AreEqual $expected1.ResourceGroupName $actual.ResourceGroupName Assert-AreEqual $expected1.Tags["testtag"] $actual.Tags["testtag"] $expected2 = Get-AzResourceGroup -Name $rgname2 Assert-AreEqual $expected2.ResourceGroupName $actual2.ResourceGroupName Assert-AreEqual $expected2.Tags["testtag"] $actual2.Tags["testtag"] $expected2 = Get-AzResourceGroup -Name ($rgname2 + "*") Assert-AreEqual $expected2.ResourceGroupName $actual2.ResourceGroupName Assert-AreEqual $expected2.Tags["testtag"] $actual2.Tags["testtag"] $expected3 = Get-AzResourceGroup $expectedCount = $originalCount + 2 Assert-AreEqual @($expected3).Count $expectedCount $expected3 = Get-AzResourceGroup -Name * $expectedCount = $originalCount + 2 Assert-AreEqual @($expected3).Count $expectedCount $expected4 = Get-AzResourceGroup -Tag @{ testtag = $null} Assert-AreEqual @($expected4).Count 2 $expected5 = Get-AzResourceGroup -Tag @{ testtag = "testval" } Assert-AreEqual @($expected5).Count 1 $expected6 = Get-AzResourceGroup -Tag @{ testtag2 = $null } Assert-AreEqual @($expected6).Count 0 } finally { Clean-ResourceGroup $rgname Clean-ResourceGroup $rgname2 } } function Test-GetNonExistingResourceGroupWithDebugStream { $ErrorActionPreference="Continue" $output = $(Get-AzResourceGroup -Name "InvalidNonExistRocks" -Debug) 2>&1 5>&1 | Out-String $ErrorActionPreference="Stop" Assert-True { $output -Like "*============================ HTTP RESPONSE ============================*" } } function Test-ExportResourceGroup { $rgname = Get-ResourceGroupName $rname = Get-ResourceName $rglocation = Get-Location "Microsoft.Resources" "resourceGroups" "West US" $apiversion = "2014-04-01" $resourceType = "Providers.Test/statefulResources" try { New-AzResourceGroup -Name $rgname -Location $rglocation $r = New-AzResource -Name $rname -Location "centralus" -Tags @{ testtag = "testval"} -ResourceGroupName $rgname -ResourceType $resourceType -PropertyObject @{"administratorLogin" = "adminuser"; "administratorLoginPassword" = "P@ssword1"} -SkuObject @{ Name = "A0" } -ApiVersion $apiversion -Force Assert-AreEqual $r.ResourceGroupName $rgname $exportOutput = Export-AzResourceGroup -ResourceGroupName $rgname -Force Assert-NotNull $exportOutput Assert-True { $exportOutput.Path.Contains($rgname + ".json") } } finally { Clean-ResourceGroup $rgname } } function Test-ExportResourceGroupWithFiltering { $rgname = Get-ResourceGroupName $rname1 = Get-ResourceName $rname2 = Get-ResourceName $rglocation = Get-Location "Microsoft.Resources" "resourceGroups" "West US" $apiversion = "2014-04-01" $resourceType = "Providers.Test/statefulResources" try { New-AzResourceGroup -Name $rgname -Location $rglocation $r1 = New-AzResource -Name $rname1 -Location "centralus" -Tags @{ testtag = "testval"} -ResourceGroupName $rgname -ResourceType $resourceType -PropertyObject @{"administratorLogin" = "adminuser"; "administratorLoginPassword" = "P@ssword1"} -SkuObject @{ Name = "A0" } -ApiVersion $apiversion -Force Assert-NotNull $r1.ResourceId $r2 = New-AzResource -Name $rname2 -Location "centralus" -Tags @{ testtag = "testval"} -ResourceGroupName $rgname -ResourceType $resourceType -PropertyObject @{"administratorLogin" = "adminuser"; "administratorLoginPassword" = "P@ssword1"} -SkuObject @{ Name = "A0" } -ApiVersion $apiversion -Force Assert-NotNull $r2.ResourceId $exportOutput = Export-AzResourceGroup -ResourceGroupName $rgname -Force -Resource @($r2.ResourceId) -IncludeParameterDefaultValue -IncludeComments Assert-NotNull $exportOutput Assert-True { $exportOutput.Path.Contains($rgname + ".json") } } finally { Clean-ResourceGroup $rgname } } function Test-ResourceGroupWithPositionalParams { $rgname = Get-ResourceGroupName $location = Get-Location "Microsoft.Resources" "resourceGroups" "West US" try { $ErrorActionPreference = "SilentlyContinue" $Error.Clear() $actual = New-AzResourceGroup $rgname $location $expected = Get-AzResourceGroup $rgname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName Remove-AzResourceGroup $rgname -Force } catch { Assert-True { $Error[0].Contains("Provided resource group does not exist.") } } }
combined_dataset/train/non-malicious/sample_9_83.ps1
sample_9_83.ps1
#************************************************ # TS_DetectMTU1514.ps1 # Version 1.0 # Date: 02/06/2014 # Author: BBenson # Description: Detect if LinkMTU is set to 1514. # Rule number: 262751 # Rule ID: 7a316c95-272b-4207-983d-57acb91d0eea # Rule URL: https://kse.microsoft.com/Contribute/Idea/1456f71b-f3ff-4247-ade1-d47b8ff1a4e6 # Purpose: # 1. Determine which network adapters are of type Ethernet with "netsh int ipv4 show int" # 2. RootCause detected if LinkMTU is set to 1514. #************************************************ # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_DetectMTU1514_Activity -Status $ScriptStrings.ID_DetectMTU1514_Status $RootCauseDetected = $false $RootCauseName = "RC_DetectMTU1514" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** #-----ipv4 $OutputFileIPv4 = "DetectMTU1514_netsh-int-ipv4-show-int.TXT" $NetSHCommandToExecute = "int ipv4 show int" $CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFileIPv4 " RunCmD -commandToRun $CommandToExecute -CollectFiles $false $netshIPv4MTUSettings = Get-Content $OutputFileIPv4 [int]$netshIPv4MTUSettingsLen = $netshIPv4MTUSettings.length #========== # Read entire output file with contents from "netsh int ipv4 show int" into a PSObject. #========== # Creating IPv4MtuObj psobject $ipObj = New-Object psobject # find the line after the line of dashes for ($i=0;$i -le $netshIPv4MTUSettingsLen;$i++){ #lines of interest after line that starts with dashes $line = $null $line = $netshIPv4MTUSettings[$i] # Handling the first few lines by finding the line that starts with dashes if ($line -match "---"){ $dashline = $i $i++ #increment past the line of dashes # all lines interesting after dash line for ($j=1;$j -le $netshIPv4MTUSettingsLen;$j++){ #first line of interest $line = $null $line = $netshIPv4MTUSettings[$i] if ($line -eq ""){ break } $delimiter = " " $arrLine = [Regex]::Split($line, $delimiter) $arrLineLen = $arrLine.length $Idx = "" $Met = "" $MTU = "" $State = "" $Name = "" $headerCounter = 0 for ($k=0;$k -le $arrLineLen;$k++){ #if non zero value, increment counter and proceed if ($arrLine[$k] -ne ""){ #if headerCounter has been incremented, assign it to a variable. if ($headerCounter -eq 0) { $Idx = $arrLine[$k] } if ($headerCounter -eq 1) { $Met = $arrLine[$k] } if ($headerCounter -eq 2) { $MTU = $arrLine[$k] } if ($headerCounter -eq 3) { $State = $arrLine[$k] } if ($headerCounter -eq 4){ $Name = $arrLine[$k] do{ $k++ $Name = $Name + " " + $arrLine[$k] } while($k -le $arrLineLen) } $headerCounter++ } } # define object $psobj = New-Object psobject @{ "Idx" = $Idx "Met" = $Met "MTU" = $MTU "State" = $State "Name" = $Name } #create object New-Variable -Name ('Int' + $Idx) -Value $psobj -Force #add member Add-Member -InputObject $ipObj -MemberType NoteProperty -Name "Int$Idx" -Value (get-variable -name Int$Idx).value -Force #increment counter $i++ } } #-----finding each interface in ipObj $ipObjFile = "ipObj.TXT" $ipObj | Format-List | Out-File $ipObjFile $ipObjTxt = Get-Content $ipObjFile [int]$ipObjTxtLen = $ipObjTxt.length # "number of interfaces: " + $ipObjTxtLen # loop through the lines of output, finding each interface number for ($i=1;$i -le $ipObjTxtLen-1;$i++){ #========== # Find Ethernet adapters with a LinkMTU of 1514 #========== $netshIPv4PMTU = $null if ($ipObjTxt[$i] -ne ""){ $line = $ipObjTxt[$i] $delimiter = ":" $arrLine = [Regex]::Split($line, $delimiter) [string]$intID = ([string]$arrLine[0]).TrimEnd() [string]$intName = ($ipObj.$intID.name).TrimEnd() if ($ipObj.$intID.mtu -eq 1514){ #Problem detected. $RootCauseDetected = $true [int]$currentInterface = $ipObj.$intID.idx add-member -inputobject $InformationCollected -membertype noteproperty -name "Interface $currentInterface" -value "MTU=1514" } } } } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if ($RootCauseDetected -eq $true){ Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "http://support.microsoft.com/kb/314496" -InformationCollected $InformationCollected -Verbosity "Error" -Visibility 4 -SupportTopicsID 8041 -Component "Networking" } # ********************* # Root Cause processing # ********************* if ($RootCauseDetected){ # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true }else{ # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBkoglaReZwevEh # 40XVs1e9MGD7PtVaPzKyyxDTOhjHXqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOke # w8QH1/qnIT4qfsWsRdh90lUuccTqrbcfziEHMgfVMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAYfKUTI03Zunw3Vx/plAkwpbUmGJNXmMVnZp6 # ybgHnA6XU9mnY1GjN6ge6EyRbKvlm1gIRdLYTvdZW9ECbC/lVXtWhAWNAblZOcps # f0c+mZlhxwHMxGf4FSTe7AX25yWOZZCLa2oX2xzuq6rI8LA7zfFpu5EuS4Szh09a # AEQMcyED+8E0gTJZd4mtNSOFctUJ3FadxRiXw355QE0ebuBzmP7HfRGfoXkjF/IL # 8dbCzG5ATHCFbwo54dm86rxQMt21bUbcgZJjsypcpSGHnXZkSw9Ou6n69r8KinIb # cIuCerml+Wc3aVhTDN8FpYYSIJTElFEeG1zeQ/ly2Bbjf0pSD6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCANIQHopU3f3Zjatl+oLvpMkhv+AUKzueNQ # MPI7wKFKTgIGZutLSAOUGBMyMDI0MTAyODExNDA0MC43NTRaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4 # fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # yeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4d # U4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqh # hxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAn # ncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTM # KjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L # 0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr # 9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqf # RuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbi # aboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA # 4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49 # tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUA # p6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyf # OievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkG # Zjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3 # kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU # 3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0T # y0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOd # gRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tyt # uulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3 # XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTS # Y4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUl # cnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0 # MTAyOTA5Mzk0OVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEA # AgIFPAIB/zAHAgEAAgIUKTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAuUNJmV2WEmZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaH # yPjIBqzVVX+OsCmMA4rCSBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cq # WgcxpcvR5+XFiKoxtNrZ+ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedW # cWiD6dyYPjiJ10ZllDJAkIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7a # Y8kNavDIwAwm/WFtYzSwFv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4 # swD4QJBUY7k+61Fk5XlZu6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgvxuIisAx8pZFiOjPiui3V3Jirf6jgvELHtDZvqHQWSgwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDj # SEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/xI4fPfBZdahAAEAAAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJk # D9cXZckbMA0GCSqGSIb3DQEBCwUABIICAEQB9rFuE2JGezIdF96563MJQMWf8TpB # XSzR0ZkJvkok71km/FDkVvYqsFHxPG+aArOwntLj6VbzcOi2Llkn3CMNa52PnORV # QyoMyJDkUxJ5ZAoBxAA5F6AktNxCElSXjqdkofoEEKJ/y4YOK8xtAw4owI7D4XYV # f2IskoTYAjmzDXujnsYZT6n/HBRDYbVWWDG9Y2syoIqWHT3duGxirV2s/MJzFn8f # WWht1zmLMXsaADyqJgOC6Z69M5UIoIaXQR+jU5BdN0rwaoLFXIrh+Z76SaXmnrEk # 0/UaLRZc6hZris7pGpTAia3Nn3nCfovd0jayQMJsyX913rIbB5SDsKtvHMsglMu+ # jKTtQYUIrWXBYD0hqJhUO/WL9rXmMvhXKlPZezHQOdO9sS6EReEiNUNas2WL/QUh # afkCKMhfM3M1sj57otkWh7EfHumLFad40oLrVA02FZA7uxWeo8DQzH5q+7CRTqhd # wJJehojXBwyIgWq40jt78K+uenxMNiqLilIWSZflniVugnBCXA3bOuBLvY/qLof1 # xo5Jp+GKNp+rhDSlpwvUYvRLgVud0z/AV9Uqd1SSmxWg1mtWXW+/Eo90u4Va6FwV # Dr4rn3BsJ+3UT7yEmJPhGUAxFyboJ5kg+PE+Te8DA+nHlpxzW4chw9xMIwTkCe/w # zu85OLJFgV59 # SIG # End signature block
combined_dataset/train/non-malicious/1458.ps1
1458.ps1
function Install-CCertificate { [CmdletBinding(SupportsShouldProcess=$true,DefaultParameterSetName='FromFileInWindowsStore')] [OutputType([Security.Cryptography.X509Certificates.X509Certificate2])] param( [Parameter(Mandatory=$true,Position=0,ParameterSetName='FromFileInWindowsStore')] [Parameter(Mandatory=$true,Position=0,ParameterSetName='FromFileInCustomStore')] [string] $Path, [Parameter(Mandatory=$true,Position=0,ParameterSetName='FromCertificateInWindowsStore')] [Parameter(Mandatory=$true,Position=0,ParameterSetName='FromCertificateInCustomStore')] [Security.Cryptography.X509Certificates.X509Certificate2] $Certificate, [Parameter(Mandatory=$true)] [Security.Cryptography.X509Certificates.StoreLocation] $StoreLocation, [Parameter(Mandatory=$true,ParameterSetName='FromFileInWindowsStore')] [Parameter(Mandatory=$true,ParameterSetName='FromCertificateInWindowsStore')] [Security.Cryptography.X509Certificates.StoreName] $StoreName, [Parameter(Mandatory=$true,ParameterSetName='FromFileInCustomStore')] [Parameter(Mandatory=$true,ParameterSetName='FromCertificateInCustomStore')] [string] $CustomStoreName, [Parameter(ParameterSetName='FromFileInWindowsStore')] [Parameter(ParameterSetName='FromFileInCustomStore')] [Switch] $Exportable, [Parameter(ParameterSetName='FromFileInWindowsStore')] [Parameter(ParameterSetName='FromFileInCustomStore')] $Password, [Management.Automation.Runspaces.PSSession[]] $Session ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( $Password -and $Password -isnot [securestring] ) { Write-Warning -Message ('You passed a plain text password to `Install-CCertificate`. A future version of Carbon will remove support for plain-text passwords. Please pass a `SecureString` instead.') $Password = ConvertTo-SecureString -String $Password -AsPlainText -Force } if( $PSCmdlet.ParameterSetName -like 'FromFile*' ) { $resolvedPath = Resolve-Path -Path $Path if( -not $resolvedPath ) { return } $Path = $resolvedPath.ProviderPath $fileBytes = [IO.File]::ReadAllBytes($Path) $encodedCert = [Convert]::ToBase64String( $fileBytes ) $keyFlags = [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::MachineKeySet if( $StoreLocation -eq [Security.Cryptography.X509Certificates.StoreLocation]::CurrentUser ) { $keyFlags = [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::UserKeySet } $keyFlags = $keyFlags -bor [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet if( $Exportable ) { $keyFlags = $keyFlags -bor [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable } $Certificate = Get-CCertificate -Path $Path -Password $Password -KeyStorageFlags $keyFlags $fromFile = $true } else { $encodedCert = [Convert]::ToBase64String( $Certificate.RawData ) $keyFlags = 0 $fromFile = $false } $invokeCommandArgs = @{ } if( $Session ) { $invokeCommandArgs['Session'] = $Session } Invoke-Command @invokeCommandArgs -ScriptBlock { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $EncodedCertificate, [securestring] $Password, [Parameter(Mandatory=$true)] [Security.Cryptography.X509Certificates.StoreLocation] $StoreLocation, $StoreName, [string] $CustomStoreName, [Security.Cryptography.X509Certificates.X509KeyStorageFlags] $KeyStorageFlags, [bool] $WhatIf, [Management.Automation.ActionPreference] $Verbosity ) Set-StrictMode -Version 'Latest' $WhatIfPreference = $WhatIf $VerbosePreference = $Verbosity $tempDir = 'Carbon+Install-CCertificate+{0}' -f [IO.Path]::GetRandomFileName() $tempDir = Join-Path -Path $env:TEMP -ChildPath $tempDir New-Item -Path $tempDir -ItemType 'Directory' -WhatIf:$false | Out-Null try { $certBytes = [Convert]::FromBase64String( $EncodedCertificate ) $certFilePath = Join-Path -Path $tempDir -ChildPath ([IO.Path]::GetRandomFileName()) [IO.File]::WriteAllBytes( $certFilePath, $certBytes ) $cert = New-Object 'Security.Cryptography.X509Certificates.X509Certificate2' $cert.Import( $certFilePath, $Password, $KeyStorageFlags ) if( $CustomStoreName ) { $store = New-Object 'Security.Cryptography.X509Certificates.X509Store' $CustomStoreName,$StoreLocation } else { $store = New-Object 'Security.Cryptography.X509Certificates.X509Store' ([Security.Cryptography.X509Certificates.StoreName]$StoreName),$StoreLocation } $store.Open( ([Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) ) $description = $cert.FriendlyName if( -not $description ) { $description = $cert.Subject } if( $PSCmdlet.ShouldProcess( ('install into {0}''s {1} store' -f $StoreLocation,$StoreName), ('{0} ({1})' -f $description,$cert.Thumbprint) ) ) { Write-Verbose ('Installing certificate ''{0}'' ({1}) into {2}''s {3} store.' -f $description,$cert.Thumbprint,$StoreLocation,$StoreName) $store.Add( $cert ) } $store.Close() } finally { Remove-Item -Path $tempDir -Recurse -ErrorAction Ignore -WhatIf:$false -Force } } -ArgumentList $encodedCert,$Password,$StoreLocation,$StoreName,$CustomStoreName,$keyFlags,$WhatIfPreference,$VerbosePreference return $Certificate }
combined_dataset/train/non-malicious/sample_62_42.ps1
sample_62_42.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# .Synopsis Group Policy tools use administrative template files (.admx, .adml) to populate policy settings in the user interface. This allows administrators to manage registry-based policy settings. This script installes PowerShell Core Administrative Templates for Windows. .Notes The PowerShellCoreExecutionPolicy.admx and PowerShellCoreExecutionPolicy.adml files are expected to be at the location specified by the Path parameter with default value of the location of this script. #> [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [string] $Path = $PSScriptRoot ) Set-StrictMode -Version 3.0 $ErrorActionPreference = 'Stop' function Test-Elevated { [CmdletBinding()] [OutputType([bool])] Param() # if the current Powershell session was called with administrator privileges, # the Administrator Group's well-known SID will show up in the Groups for the current identity. # Note that the SID won't show up unless the process is elevated. return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544") } $IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows if (-not $IsWindowsOs) { throw 'This script must be run on Windows.' } if (-not (Test-Elevated)) { throw 'This script must be run from an elevated process.' } if ([System.Management.Automation.Platform]::IsNanoServer) { throw 'Group policy definitions are not supported on Nano Server.' } $admxName = 'PowerShellCoreExecutionPolicy.admx' $admlName = 'PowerShellCoreExecutionPolicy.adml' $admx = Get-Item -Path (Join-Path -Path $Path -ChildPath $admxName) $adml = Get-Item -Path (Join-Path -Path $Path -ChildPath $admlName) $admxTargetPath = Join-Path -Path $env:WINDIR -ChildPath "PolicyDefinitions" $admlTargetPath = Join-Path -Path $admxTargetPath -ChildPath "en-US" $files = @($admx, $adml) foreach ($file in $files) { if (-not (Test-Path -Path $file)) { throw "Could not find $($file.Name) at $Path" } } Write-Verbose "Copying $admx to $admxTargetPath" Copy-Item -Path $admx -Destination $admxTargetPath -Force $admxTargetFullPath = Join-Path -Path $admxTargetPath -ChildPath $admxName if (Test-Path -Path $admxTargetFullPath) { Write-Verbose "$admxName was installed successfully" } else { Write-Error "Could not install $admxName" } Write-Verbose "Copying $adml to $admlTargetPath" Copy-Item -Path $adml -Destination $admlTargetPath -Force $admlTargetFullPath = Join-Path -Path $admlTargetPath -ChildPath $admlName if (Test-Path -Path $admlTargetFullPath) { Write-Verbose "$admlName was installed successfully" } else { Write-Error "Could not install $admlName" } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJ90/Icr8AC0PX # PztF6dyoFT+ucLEEg+WYsxQzIJpS/KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIARp # rUuNhtpil9vE/G9ZX3FLF/w3czFFxBwWmQqTagvjMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAMSqkASF3uhPnw6SuFRSPjkcyCT1FXcyY8mCb # t3caGD4arA9JJGQQNWtUjfMh55bb34W9nIlzZFshdM7rytsoVJtX7gLLnmKGo0M+ # x0HZwLWgJ2LDO2CMJZtqF58+5K600stAKG1JhykMhZVFPdMlKfJy/oPIIsY0sOIt # Co8saVHfuDhnXIt59GJ8KWW2arnzFwyyJKJT0kiIET2ZQelqPp6rEiZYlKnKicDm # BoIvrz7cUILq/P4Oe6T62/B7ghnC0wxy0XeJCPwptz8WtSLt7S0fRbiGQRu8SDBO # KKXpLPzaLfCgY82Kx7Ha6I8ffrFo6aSeTo1AQIdVJpI1/0p3mqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAr1943bh/c+yRkv12Bc1zb6u290jeHmClh # mRvDx7cDEgIGZkZGrqV1GBMyMDI0MDYxNzIyMTQyOC4wNjFaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB # AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv # QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed # zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv # 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY # cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT # EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ # UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7 # b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD # oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe # h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69 # mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2 # t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx # BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X # pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t # aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t # uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM # iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw # psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL # zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR # J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB # 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX # WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV # PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE # K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hrywDAi # GA8yMDI0MDYxNzE3MzcwNFoYDzIwMjQwNjE4MTczNzA0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqGvLAAgEAMAcCAQACAgF1MAcCAQACAhNLMAoCBQDqHERAAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAJ1eAqlPiHGpwnxBXrClAWpAmr+ # kRbR82PCeyaVF0f60L1GYFkOhqYu30i9UTIvp046gCdXFh1Uy1Cm82Wm52t8fd06 # c8GM/HqfnLlNfOwnYTHtk5NA9pge5Iy3eZmse//V6qFT0iqWPwjQhwe3ZuuNRXbP # RC61gFMvhbRJY8DDcdzwJi0uGFtNSc9iL5Ok7B+eryXmczO924oq+eSct2rB8YmD # 2C6wjqJFoPZRRsxR38/TsW2zYoCQZjjE3wDXBZH1mX1ZJgMHY2eruJGya9y/DLli # zcGUOuS8sROTUXUVz9UcvaHc7YDGL+JUrsDVv5avc3gqqR5edlvvBG6NYE0xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+ # MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDMfc8ZXfklHO7Bzvg1HUkHBgEV # 40Ve1khTWr8PC3KuAzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0u # MVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgd1orjL9g # TJS8HYILm61dqtHwhC4Yw7WbOn59a6wVpQwwDQYJKoZIhvcNAQELBQAEggIAqNFz # M+CJ/bepTEgm8bZg8sGcKCGbfH/2dTPKfvJqpePSOSgzEMciktk2Ijhd4wPIMvSq # 6kZtZ0rqJsHrnpT0g8eCaVPSal8G3AFBSodVJhNobIpG8rcjVofYkaGFKgCmi+Ht # mY7pDsFLmQOI5vMRzqBQnWWuNYfpIFAqJL9jCpQi++ZGI+i6etLFjHiQS7qnY2ZI # c6fVSqDbbTyFsQxQ79ILZZA9MXKRTloPihWKx3IV6rUeGemUt6bdggveyQk9R1Wr # Bkg/kKWImnH37jKMvr90kpxffsaAbu3Woz23lxx841ihipzIBEw6oHzgRmCCkHQj # ScO88SMCOMhW/weEKFywutnEdErnnauphSJ4OhqOOPqqR+xG81FJCyBiXjEiCQi0 # gSShEhrA8xVfUSFDdlYorwT7ttp8rqfIAhR+ibjtWDDaExx0AOtsy2krAa/zNxoY # lmoxgJji3O1W6eIj9mHuW4/OhvaOUqSIkh+Ymq1mYhILxqYGiaijtJ1rXOra3gFP # LJ+53geghyfoayiQPa8pGzM3P0U7uYIeVnMfHP78UTXvHKFxdXyhk2OOAbMVACxo # vgvt0xCSVGzYPmLFe3f/RTytI+C2rneLUykndvpfaQ076XftF6l6wzcSHrFJ67lj # 6i6sLso46PpND7NkTfK+UCTiKeaL7pSAFqhoHZw= # SIG # End signature block
combined_dataset/train/non-malicious/1278.ps1
1278.ps1
function Convert-CSecureStringToString { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [Security.SecureString] $SecureString ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $stringPtr = [Runtime.InteropServices.Marshal]::SecureStringToBSTR($SecureString) return [Runtime.InteropServices.Marshal]::PtrToStringAuto($stringPtr) }
combined_dataset/train/non-malicious/sample_44_98.ps1
sample_44_98.ps1
# Use this PowerShell script to register required cmdlets # The script must be executed as local admin .\cru.ps1 -installcmdlet CredRoamLocalUserData .\cru.ps1 -installcmdlet CredRoamADUserData -AcceptEula .\cru.ps1 -installcmdlet CredRoamLVRData -AcceptEula # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBYpmDFRNih906W # OB/muVcsNnDHhKIWlScJwhMYqn/TraCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILf2SvNPMthqieQR6kHBwnVn # 90cpIwqk4reRPXCNwiR9MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAvj2hYffz0elENyD7R4Rb/F19GLWC1RWAomadd/sNfS+JEdChhJPemQh0 # 0PI6Gkx91CQ2Pnoyq+kKTmZkokGNGG7jug3WuKWlMopnm+AEhF9x3C5Y/dEBS7xE # ry+dkIP46aWeVSz207FDZ5XJqAqyc9gttmGfUKGm7TFHLM9FfqYjE4s3+bcgM4cn # khDiZyxDL6asEzL0mQIXTGDQLNxtJBPiS3v0uNc69j0PXlxAl4aRG11HyXVY3It8 # SaDXqb8gVKfqP/GwTi7jhzzAA8uv5ItSRXqILxjT1AlHoAr8sjaIk6MFU4s0rcG0 # c+awXqmrVVGE9uqeZ2r8vcfZK9I+0qGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAZZhHFhq2TXvNT8wk4b7lLM+OM4jhMMgNRhxgDrAQEzgIGZfL2iOqY # GBMyMDI0MDQwNDEzMzIzNC41NzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6bki+TAiGA8yMDI0MDQwNDEzMDA0 # MVoYDzIwMjQwNDA1MTMwMDQxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpuSL5 # AgEAMAcCAQACAgWSMAcCAQACAhQrMAoCBQDpunR5AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAG6kGrF8OPKLvjr6MfOFrIpgI6F1MzoB4llcwVfJ7r82vJVl # ud6ZpIyzIm3mhhDyD/7nnH8IeZSprBoWBN+BywLkWSNIq/u6QsJZTGN4xpeOke6n # XbA32Dzcf6InTo18ULy3zHOyuImUw1zbShPgEiK+QGQCMOrsQCpYBDPA7cGMkUxg # 4MXo6LexolmOLAoEVxYM6ZKfXlD9qa4+JiD8tKXNoKKq3shhmzxZCSl3b6V+azPr # SE16oOFtqx5sDO+6gW3SS7ThHW943rTKm8aBbR+I/7VAQhynepUA1qFsl7aS0Tsg # ItnPvfFqOFuONglLlOF/xdvrZu+PptXQj1wBw/AxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCADO4sCQkzJurDLgjtC2K546FbgHEMoZXUb5+vjw/BxUTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh8 # 41sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgt7igPF7A2P+C3XkMIr4Ley+T4rM5 # P9laYvw+yA3hwZgwDQYJKoZIhvcNAQELBQAEggIAadBkqqpJIS2yZIAuugsfqPRM # StH3b9eJwi7TMajngfCDw5fNzfpyGSB1BbL16VsegxhwkOfGI7ZhbCdqyBar+p0x # nUIYxE6u3xiiSJ183Tp7y71RxT4RBuYTupCbT3RPsqK/Zq1fNKL5Z+jXyQSn6TS2 # 0cc7Hi0Q3gtGwFrghy+VFaA1WJcIlP4pgPQ7q1jSZVzUYCCFR7UVN0O2DVJWYkqw # 3ESZUiiH/BoxTlxNCHbjmy6k98LUMwQ4wnmAlX2eyxyXd+dz+ZhXcKmo9AIwjA2Z # LLdHFjhFVUIpGOltKo3OQnJ/rHGIpf7jI2usHF1NRwZdOIOEh4pBYZxTPhD75lsF # rIx6uQj8CHO8Jy5MYzdMPA59UAoUcvVx5QthujGQTqSTb7RXwUH1SvgXQdH8Q8ff # HbPkEtwicy4HyMGaGMhxJPNACjrooAp88R/44EdIMLP8kKZK79xGPTMTanq68yVF # p/iCp/I9j2NFJWL2ICPopBAlNsxmHPz2gQ1isfbSkzTZqNz9cDWgUGuRfFdBJDPv # XAEwArhme4HEdKS5kq/jMBGPSmwlgYDLZaD+WDAq+o5qUTEQmL2/dEeKCpW9HAgV # FSPC82QIe9JD3P+7weWvmCc0rD+TAtaJM9tD/g4hjhLLu5eHFPQtkMp7nBVetE9F # m4Kljkkmzb1zKw5KtzU= # SIG # End signature block
combined_dataset/train/non-malicious/New-SQLComputerLogin.ps1
New-SQLComputerLogin.ps1
function New-SQLComputerLogin { param( [Parameter(Mandatory=$True,Position=0)] [String]$SQLServer, [Parameter(Mandatory=$True,Position=1)] [String]$ComputerName, [Switch]$Force ) ## Import-Module QAD, SQLPS -DisableNameChecking $Computer = Get-QADComputer $ComputerName #$NTAccountName = $Computer.NTAccountName #if(!$SID) { $SID = $Computer.SID.ToString() } invoke-sqlcmd -ServerInstance $SQLServer -Query "CREATE LOGIN [$($Computer.NTAccountName)] FROM WINDOWS" -ErrorVariable SqlError -ErrorAction SilentlyContinue ## If this principal already exists, fail, or clean it out and recreate it: if($SqlError[0].Exception.Message.EndsWith("already exists.")) { if(!$Force) { Write-Error $SqlError[0].Exception } else { $ExistingAccount = invoke-sqlcmd -ServerInstance $SQLServer -Query "select name, sid, create_date from sys.server_principals where type IN ('U','G')" | add-member -membertype ScriptProperty SSDL { new-object security.principal.securityidentifier $this.SID, 0 } -passthru | where-object {$_.SSDL -eq $Computer.SID} invoke-sqlcmd -ServerInstance $SQLServer -Query "DROP LOGIN [$($ExistingAccount.Name)]" -ErrorAction Stop invoke-sqlcmd -ServerInstance $SQLServer -Query "CREATE LOGIN [$($Computer.NTAccountName)] FROM WINDOWS" } } }
combined_dataset/train/non-malicious/2332.ps1
2332.ps1
[CmdletBinding()] [OutputType('Selected.Microsoft.Management.Infrastructure.CimInstance')] param () begin { $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop Set-StrictMode -Version Latest } process { try { $DhcpServers = Get-DhcpServerInDC | where { Test-Connection -ComputerName $_.DnsName -Quiet -Count 1 } | Select-Object -ExpandProperty DnsName foreach ($DhcpServer in $DhcpServers) { try { try { $Scopes = Get-DhcpServerv4Scope -ComputerName $DhcpServer } catch {Write-Warning -Message "Error: $($_.Exception.Message)"} foreach ($Scope in $Scopes) { try { Get-DhcpServerv4Lease -ComputerName $DhcpServer -ScopeId $Scope.ScopeId | Select-Object * -ExcludeProperty 'Cim*' } catch { Write-Warning -Message "Error: $($_.Exception.Message)" } } } catch { Write-Error -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" } } } catch { Write-Error -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" } }
combined_dataset/train/non-malicious/sample_3_35.ps1
sample_3_35.ps1
#************************************************ # TS_EventLogStoppedGPPCheck.ps1 # Version 1.0.1 # Date: 4/3/2013 # Author: v-blchen # Description: [Idea ID 7018] [Windows] Event Log Service won't start # Rule number: 7018 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=7018 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 7018 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_EventLogStoppedGPPCheck" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) #Windows Sever 2008 } Function IsGPPRegionalOptionsTurnedOn { $GroupPolicyHistoryPath = "$Env:APPDATA\..\Local\Microsoft\Group Policy\History" if(Test-Path $GroupPolicyHistoryPath) { $RegionalOptionsXmlList = Get-childitem $GroupPolicyHistoryPath -Name 'RegionalOptions.xml' -recurse if($null -ne $RegionalOptionsXmlList) { foreach($RegionalOptionsXmlPath in $RegionalOptionsXmlList) { [xml]$RegionalOptionsContent = get-content (join-Path $GroupPolicyHistoryPath $RegionalOptionsXmlPath) if($null -ne $RegionalOptionsContent.Regional) { return $true } } } } return $false } Function CheckHotFixKB951430Installed { $GpprefclDLLPath = join-path $env:windir "system32\Gpprefcl.dll" if(CheckMinimalFileVersion $GpprefclDLLPath 6 0 6001 22474) { return $true } else { "Microsoft KB 951430 is not installed" | WriteTo-StdOut return $false } } Function EventLogServiceStoppedGPPCheck { if(IsGPPRegionalOptionsTurnedOn) { if(!(CheckHotFixKB951430Installed)) { $EventLogService = Get-CimInstance win32_service -filter "name='eventlog'" if(($EventLogService.State -eq 'stopped') -and ($EventLogService.ExitCode -eq 87)) { "Event Log Service is stopped by invalid parameter" | WriteTo-StdOut $InformationCollected | add-member -membertype noteproperty -name "GPP Enabled" -value "True" $InformationCollected | add-member -membertype noteproperty -name "Event Log Service State" -value ($EventLogService.State) $InformationCollected | add-member -membertype noteproperty -name "Event Log Service Exit Code" -value ($EventLogService.ExitCode) return $true } } } else { "Group Policy Preferences is not turn on" | WriteTo-StdOut } return $false } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = EventLogServiceStoppedGPPCheck if ($RuleApplicable) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZZfHGZy1pAnfq # Rsgm4vu1YygtbCHTK2Pq8+Lt8fkNW6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEb6 # Dmyql//KTWUmNfSzluTedloMTurmUbg2TfpQklmdMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAfuPrgcK6BcdafuYE1PO5TzL7d+cLezzix28p # C9JwYNVFO0iGsBQ1Dm3TmMDB7rjWimko6NhVLegv4QJHIFVN1wvKHbABKS1kYpIm # q3LV3xWrQGXZeg8GgUIjCNrRvY3ukpFKeyoHe46CJolqpRxmru/aE6F4f/9p+XWs # D/xWkC6pCotGWAdx6RL1HjC2aJOReEmAYvkmor0/kBEGh97MimwEjFD/JejDU6o6 # cIql8Ogupj1iKG/+7qdCeSqTUCP4ZBPWWQ8SUmGMmEad0LbeHwXgJT88Oq1Bv5Iu # 4mPcojzk12Uj1SU8zAO8sa/1fEz9/0WUAgxcxx2NrQussMR4FaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBOXDVcZGEo7bGlvG/r1qcGe4KqOB7GfBs2 # HKuZ8U9DawIGZut4BYxlGBMyMDI0MTAyODExNDA0MC4zOTFaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ # lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38 # 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC # fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D # cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA # ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT # M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB # Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo # u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0 # PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88 # 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv # eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/ # 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4 # Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6 # I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa # QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV # 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS # s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5 # WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q # 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK # CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi # TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y # Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0 # MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA # AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3 # UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS # TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3 # FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO # RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB # NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg+2V3l6LKFPA6zuTcrBKRjuIrHq636HD1exWRmdDDPhAwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT # hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1 # KYILMA0GCSqGSIb3DQEBCwUABIICAKlZiimVU6rLk2n7c8nsfAIjJy7NBd1YbvM1 # Yb7ddJhI/7tJfpkrZX8k6DAnvDWnZkylq0B3PnLXRkrLWVnlU5eeX0KOtIjN96th # K/T7GxIS5BTL+Kz6j+OstHBJEfvo1kJw9V6COUMiVt6el+IKDPCcQDcDR+LZU0Sf # lbeUe4kOWbZgMfxxWPb7N/vRCtOWSyJsktm9stIr4Y9pzGbQ7bWskgw1tYoI55lz # HeMfomm4trh2Qc93JMBaPwnGQUkk7o1mQmkYCiBRfqsEPY8D9q+oKOfkNXEudJne # f582F7Kk8UxlVBDK+m9cofmIFQHy58pgRAT1V9JijqQ2Np1ioFP0ee+UiXrLK5dO # tJpt1rTMVf1NnmDTAGo3TIKhPAVpLq+0iw8MpNGRIfSRIejhKv0qDSOfK5+qWxFU # bKl2Qqv5lN0J8xsY4Jo6wjYxJo9T4mADuAXIX+BSVf0hNn5iNgqrmiSviBJvldCe # m5mHPxDWQ2NW8LpJYCIWMmMsE86rrEpOHwYaHcDnXKAzzjxjc6haKAS+dO0CAFdn # dfnzPzAgwwuslq5lG7R4Cwjsd9TsoiA4uQgfy0qUd2m8Y+ydC8U8D9l00idZ/RS6 # n0k6eJDsu/5VkNgmeExcJGx6ebxcDCQIEQKvF69L7TL/vKQ6KWgR65rX02J44D6x # BFaktMxC # SIG # End signature block
combined_dataset/train/non-malicious/wlanscan.ps1
wlanscan.ps1
# -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-= # Name: wlanscan # Author: Kris Cieslak (defaultset.blogspot.com) # Date: 2010-04-03 # Description: Simple script that uses netsh to show wireless networks. # # Parameters: wireless interface name (optional,but recommended if you have # more than one card) # Result: $ActiveNetworks # Usage example: wlanscan WiFi # # -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=- PARAM ($ifname = "") # Windows Vista/2008/7 if ((gwmi win32_operatingsystem).Version.Split(".")[0] -lt 6) { throw "This script works on Windows Vista or higher." } if ((gsv "wlansvc").Status -ne "Running" ) { throw "WLAN AutoConfig service must be running." } $GLOBAL:ActiveNetworks = @(); $CurrentIfName = ""; $n = -1; $iftest = $false; netsh wlan show network mode=bssid | % { if ( $_ -match "Interface") { $CurrentIfName = [regex]::match($_.Replace("Interface name : ","") ,"\\w{1,}").ToString(); if (($CurrentIfName.ToLower() -eq $ifname.ToLower()) -or ($ifname.length -eq 0)) { $iftest=$true; } else { $iftest=$false } } $buf = [regex]::replace($_,"[ ]",""); if ([regex]::IsMatch($buf,"^SSID\\d{1,}(.)*") -and $iftest) { $item = "" | Select-Object SSID,NetType,Auth,Encryption,BSSID,Signal,Radiotype,Channel; $n+=1; $item.SSID = [regex]::Replace($buf,"^SSID\\d{1,}:",""); $GLOBAL:ActiveNetworks+=$item; } if ([regex]::IsMatch($buf,"Networktype") -and $iftest) { $GLOBAL:ActiveNetworks[$n].NetType=$buf.Replace("Networktype:",""); } if ([regex]::IsMatch($buf,"Authentication") -and $iftest) { $GLOBAL:ActiveNetworks[$n].Auth=$buf.Replace("Authentication:",""); } if ([regex]::IsMatch($buf,"Encryption") -and $iftest) { $GLOBAL:ActiveNetworks[$n].Encryption=$buf.Replace("Encryption:",""); } if ([regex]::IsMatch($buf,"BSSID1") -and $iftest) { $GLOBAL:ActiveNetworks[$n].BSSID=$buf.Replace("BSSID1:",""); } if ([regex]::IsMatch($buf,"Signal") -and $iftest) { $GLOBAL:ActiveNetworks[$n].Signal=$buf.Replace("Signal:",""); } if ([regex]::IsMatch($buf,"Radiotype") -and $iftest) { $GLOBAL:ActiveNetworks[$n].Radiotype=$buf.Replace("Radiotype:",""); } if ([regex]::IsMatch($buf,"Channel") -and $iftest) { $GLOBAL:ActiveNetworks[$n].Channel=$buf.Replace("Channel:",""); } } if ( ($CurrentIfName.ToLower() -eq $ifname.ToLower()) -or ($ifname.length -eq 0) ) { write-host -ForegroundColor Yellow "`nInterface: "$CurrentIfName; if (($GLOBAL:ActiveNetworks.length -gt 0)) { $GLOBAL:ActiveNetworks | Sort-Object Signal -Descending | ft @{Label = "BSSID"; Expression={$_.BSSID };width=18}, @{Label = "Channel"; Expression={$_.Channel};width=8}, @{Label = "Signal"; Expression={$_.Signal};width=7}, @{Label = "Encryption"; Expression={$_.Encryption};width=11}, @{Label = "Authentication"; Expression={$_.Auth};width=15}, SSID } else { Write-host "`n No active networks found.`n"; } } else { Write-host -ForegroundColor Red "`n Could not find interface: "$ifname"`n"; }
combined_dataset/train/non-malicious/3951.ps1
3951.ps1
function Test-GetAvailableAliasList { $location = Get-ProviderLocation ResourceManagement try { $results = Get-AzAvailableServiceAlias -Location $location; Assert-NotNull $results; } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/251.ps1
251.ps1
Function Invoke-Ping { [cmdletbinding(DefaultParameterSetName = 'Ping')] param ( [Parameter(ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, Position = 0)] [string[]]$ComputerName, [Parameter(ParameterSetName = 'Detail')] [validateset("*", "WSMan", "RemoteReg", "RPC", "RDP", "SMB")] [string[]]$Detail, [Parameter(ParameterSetName = 'Ping')] [switch]$Quiet, [int]$Timeout = 20, [int]$Throttle = 100, [switch]$NoCloseOnTimeout ) Begin { function Invoke-Parallel { [cmdletbinding(DefaultParameterSetName = 'ScriptBlock')] Param ( [Parameter(Mandatory = $false, position = 0, ParameterSetName = 'ScriptBlock')] [System.Management.Automation.ScriptBlock]$ScriptBlock, [Parameter(Mandatory = $false, ParameterSetName = 'ScriptFile')] [ValidateScript({ test-path $_ -pathtype leaf })] $ScriptFile, [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [Alias('CN', '__Server', 'IPAddress', 'Server', 'ComputerName')] [PSObject]$InputObject, [PSObject]$Parameter, [switch]$ImportVariables, [switch]$ImportModules, [int]$Throttle = 20, [int]$SleepTimer = 200, [int]$RunspaceTimeout = 0, [switch]$NoCloseOnTimeout = $false, [int]$MaxQueue, [validatescript({ Test-Path (Split-Path $_ -parent) })] [string]$LogFile = "C:\temp\log.log", [switch]$Quiet = $false ) Begin { if (-not $PSBoundParameters.ContainsKey('MaxQueue')) { if ($RunspaceTimeout -ne 0) { $script:MaxQueue = $Throttle } else { $script:MaxQueue = $Throttle * 3 } } else { $script:MaxQueue = $MaxQueue } Write-Verbose "Throttle: '$throttle' SleepTimer '$sleepTimer' runSpaceTimeout '$runspaceTimeout' maxQueue '$maxQueue' logFile '$logFile'" if ($ImportVariables -or $ImportModules) { $StandardUserEnv = [powershell]::Create().addscript({ $Modules = Get-Module | Select-Object -ExpandProperty Name $Snapins = Get-PSSnapin | Select-Object -ExpandProperty Name $Variables = Get-Variable | Select-Object -ExpandProperty Name @{ Variables = $Variables Modules = $Modules Snapins = $Snapins } }).invoke()[0] if ($ImportVariables) { Function _temp { [cmdletbinding()] param () } $VariablesToExclude = @((Get-Command _temp | Select-Object -ExpandProperty parameters).Keys + $PSBoundParameters.Keys + $StandardUserEnv.Variables) Write-Verbose "Excluding variables $(($VariablesToExclude | Sort-Object) -join ", ")" $UserVariables = @(Get-Variable | Where-Object { -not ($VariablesToExclude -contains $_.Name) }) Write-Verbose "Found variables to import: $(($UserVariables | Select-Object -expandproperty Name | Sort-Object) -join ", " | Out-String).`n" } if ($ImportModules) { $UserModules = @(Get-Module | Where-Object { $StandardUserEnv.Modules -notcontains $_.Name -and (Test-Path $_.Path -ErrorAction SilentlyContinue) } | Select-Object -ExpandProperty Path) $UserSnapins = @(Get-PSSnapin | Select-Object -ExpandProperty Name | Where-Object { $StandardUserEnv.Snapins -notcontains $_ }) } } Function Get-RunspaceData { [cmdletbinding()] param ([switch]$Wait) Do { $more = $false if (-not $Quiet) { Write-Progress -Activity "Running Query" -Status "Starting threads"` -CurrentOperation "$startedCount threads defined - $totalCount input objects - $script:completedCount input objects processed"` -PercentComplete $(Try { $script:completedCount / $totalCount * 100 } Catch { 0 }) } Foreach ($runspace in $runspaces) { $currentdate = Get-Date $runtime = $currentdate - $runspace.startTime $runMin = [math]::Round($runtime.totalminutes, 2) $log = "" | Select-Object Date, Action, Runtime, Status, Details $log.Action = "Removing:'$($runspace.object)'" $log.Date = $currentdate $log.Runtime = "$runMin minutes" If ($runspace.Runspace.isCompleted) { $script:completedCount++ if ($runspace.powershell.Streams.Error.Count -gt 0) { $log.status = "CompletedWithErrors" Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] foreach ($ErrorRecord in $runspace.powershell.Streams.Error) { Write-Error -ErrorRecord $ErrorRecord } } else { $log.status = "Completed" Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] } $runspace.powershell.EndInvoke($runspace.Runspace) $runspace.powershell.dispose() $runspace.Runspace = $null $runspace.powershell = $null } ElseIf ($runspaceTimeout -ne 0 -and $runtime.totalseconds -gt $runspaceTimeout) { $script:completedCount++ $timedOutTasks = $true $log.status = "TimedOut" Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] Write-Error "Runspace timed out at $($runtime.totalseconds) seconds for the object:`n$($runspace.object | out-string)" if (!$noCloseOnTimeout) { $runspace.powershell.dispose() } $runspace.Runspace = $null $runspace.powershell = $null $completedCount++ } ElseIf ($runspace.Runspace -ne $null) { $log = $null $more = $true } if ($logFile -and $log) { ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] | out-file $LogFile -append } } $temphash = $runspaces.clone() $temphash | Where-Object { $_.runspace -eq $Null } | ForEach-Object { $Runspaces.remove($_) } if ($PSBoundParameters['Wait']) { Start-Sleep -milliseconds $SleepTimer } } while ($more -and $PSBoundParameters['Wait']) } if ($PSCmdlet.ParameterSetName -eq 'ScriptFile') { $ScriptBlock = [scriptblock]::Create($(Get-Content $ScriptFile | out-string)) } elseif ($PSCmdlet.ParameterSetName -eq 'ScriptBlock') { [string[]]$ParamsToAdd = '$_' if ($PSBoundParameters.ContainsKey('Parameter')) { $ParamsToAdd += '$Parameter' } $UsingVariableData = $Null if ($PSVersionTable.PSVersion.Major -gt 2) { $UsingVariables = $ScriptBlock.ast.FindAll({ $args[0] -is [System.Management.Automation.Language.UsingExpressionAst] }, $True) If ($UsingVariables) { $List = New-Object 'System.Collections.Generic.List`1[System.Management.Automation.Language.VariableExpressionAst]' ForEach ($Ast in $UsingVariables) { [void]$list.Add($Ast.SubExpression) } $UsingVar = $UsingVariables | Group-Object Parent | ForEach-Object { $_.Group | Select-Object -First 1 } $UsingVariableData = ForEach ($Var in $UsingVar) { Try { $Value = Get-Variable -Name $Var.SubExpression.VariablePath.UserPath -ErrorAction Stop $NewName = ('$__using_{0}' -f $Var.SubExpression.VariablePath.UserPath) [pscustomobject]@{ Name = $Var.SubExpression.Extent.Text Value = $Value.Value NewName = $NewName NewVarName = ('__using_{0}' -f $Var.SubExpression.VariablePath.UserPath) } $ParamsToAdd += $NewName } Catch { Write-Error "$($Var.SubExpression.Extent.Text) is not a valid Using: variable!" } } $NewParams = $UsingVariableData.NewName -join ', ' $Tuple = [Tuple]::Create($list, $NewParams) $bindingFlags = [Reflection.BindingFlags]"Default,NonPublic,Instance" $GetWithInputHandlingForInvokeCommandImpl = ($ScriptBlock.ast.gettype().GetMethod('GetWithInputHandlingForInvokeCommandImpl', $bindingFlags)) $StringScriptBlock = $GetWithInputHandlingForInvokeCommandImpl.Invoke($ScriptBlock.ast, @($Tuple)) $ScriptBlock = [scriptblock]::Create($StringScriptBlock) Write-Verbose $StringScriptBlock } } $ScriptBlock = $ExecutionContext.InvokeCommand.NewScriptBlock("param($($ParamsToAdd -Join ", "))`r`n" + $Scriptblock.ToString()) } else { Throw "Must provide ScriptBlock or ScriptFile"; Break } Write-Debug "`$ScriptBlock: $($ScriptBlock | Out-String)" Write-Verbose "Creating runspace pool and session states" $sessionstate = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault() if ($ImportVariables) { if ($UserVariables.count -gt 0) { foreach ($Variable in $UserVariables) { $sessionstate.Variables.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateVariableEntry -ArgumentList $Variable.Name, $Variable.Value, $null)) } } } if ($ImportModules) { if ($UserModules.count -gt 0) { foreach ($ModulePath in $UserModules) { $sessionstate.ImportPSModule($ModulePath) } } if ($UserSnapins.count -gt 0) { foreach ($PSSnapin in $UserSnapins) { [void]$sessionstate.ImportPSSnapIn($PSSnapin, [ref]$null) } } } $runspacepool = [runspacefactory]::CreateRunspacePool(1, $Throttle, $sessionstate, $Host) $runspacepool.Open() Write-Verbose "Creating empty collection to hold runspace jobs" $Script:runspaces = New-Object System.Collections.ArrayList $global:__bound = $false $allObjects = @() if ($PSBoundParameters.ContainsKey("inputObject")) { $global:__bound = $true } if ($LogFile) { New-Item -ItemType file -path $logFile -force | Out-Null ("" | Select-Object Date, Action, Runtime, Status, Details | ConvertTo-Csv -NoTypeInformation -Delimiter ";")[0] | Out-File $LogFile } $log = "" | Select-Object Date, Action, Runtime, Status, Details $log.Date = Get-Date $log.Action = "Batch processing started" $log.Runtime = $null $log.Status = "Started" $log.Details = $null if ($logFile) { ($log | convertto-csv -Delimiter ";" -NoTypeInformation)[1] | Out-File $LogFile -Append } $timedOutTasks = $false } Process { if (-not $global:__bound) { $allObjects += $inputObject } else { $allObjects = $InputObject } } End { Try { $totalCount = $allObjects.count $script:completedCount = 0 $startedCount = 0 foreach ($object in $allObjects) { $powershell = [powershell]::Create() if ($VerbosePreference -eq 'Continue') { [void]$PowerShell.AddScript({ $VerbosePreference = 'Continue' }) } [void]$PowerShell.AddScript($ScriptBlock).AddArgument($object) if ($parameter) { [void]$PowerShell.AddArgument($parameter) } if ($UsingVariableData) { Foreach ($UsingVariable in $UsingVariableData) { Write-Verbose "Adding $($UsingVariable.Name) with value: $($UsingVariable.Value)" [void]$PowerShell.AddArgument($UsingVariable.Value) } } $powershell.RunspacePool = $runspacepool $temp = "" | Select-Object PowerShell, StartTime, object, Runspace $temp.PowerShell = $powershell $temp.StartTime = Get-Date $temp.object = $object $temp.Runspace = $powershell.BeginInvoke() $startedCount++ Write-Verbose ("Adding {0} to collection at {1}" -f $temp.object, $temp.starttime.tostring()) $runspaces.Add($temp) | Out-Null Get-RunspaceData $firstRun = $true while ($runspaces.count -ge $Script:MaxQueue) { if ($firstRun) { Write-Verbose "$($runspaces.count) items running - exceeded $Script:MaxQueue limit." } $firstRun = $false Get-RunspaceData Start-Sleep -Milliseconds $sleepTimer } } Write-Verbose ("Finish processing the remaining runspace jobs: {0}" -f (@($runspaces | Where-Object { $_.Runspace -ne $Null }).Count)) Get-RunspaceData -wait if (-not $quiet) { Write-Progress -Activity "Running Query" -Status "Starting threads" -Completed } } Finally { if (($timedOutTasks -eq $false) -or (($timedOutTasks -eq $true) -and ($noCloseOnTimeout -eq $false))) { Write-Verbose "Closing the runspace pool" $runspacepool.close() } [gc]::Collect() } } } Write-Verbose "PSBoundParameters = $($PSBoundParameters | Out-String)" $bound = $PSBoundParameters.keys -contains "ComputerName" if (-not $bound) { [System.Collections.ArrayList]$AllComputers = @() } } Process { if ($bound) { $AllComputers = $ComputerName } Else { foreach ($Computer in $ComputerName) { $AllComputers.add($Computer) | Out-Null } } } End { $params = @($Detail, $Quiet) $splat = @{ Throttle = $Throttle RunspaceTimeout = $Timeout InputObject = $AllComputers parameter = $params } if ($NoCloseOnTimeout) { $splat.add('NoCloseOnTimeout', $True) } Invoke-Parallel @splat -ScriptBlock { $computer = $_.trim() $detail = $parameter[0] $quiet = $parameter[1] if ($detail) { Try { Function Test-Server { [cmdletBinding()] param ( [parameter( Mandatory = $true, ValueFromPipeline = $true)] [string[]]$ComputerName, [switch]$All, [parameter(Mandatory = $false)] [switch]$CredSSP, [switch]$RemoteReg, [switch]$RDP, [switch]$RPC, [switch]$SMB, [switch]$WSMAN, [switch]$IPV6, [Management.Automation.PSCredential]$Credential ) begin { $total = Get-Date $results = @() if ($credssp -and -not $Credential) { Throw "Must supply Credentials with CredSSP test" } [string[]]$props = write-output Name, IP, Domain, Ping, WSMAN, CredSSP, RemoteReg, RPC, RDP, SMB $Hash = @{ } foreach ($prop in $props) { $Hash.Add($prop, $null) } function Test-Port { [cmdletbinding()] Param ( [string]$srv, $port = 135, $timeout = 3000 ) $ErrorActionPreference = "SilentlyContinue" $tcpclient = new-Object system.Net.Sockets.TcpClient $iar = $tcpclient.BeginConnect($srv, $port, $null, $null) $wait = $iar.AsyncWaitHandle.WaitOne($timeout, $false) if (-not $wait) { $tcpclient.Close() Write-Verbose "Connection Timeout to $srv`:$port" $false } else { Try { $tcpclient.EndConnect($iar) | out-Null $true } Catch { write-verbose "Error for $srv`:$port`: $_" $false } $tcpclient.Close() } } } process { foreach ($name in $computername) { $dt = $cdt = Get-Date Write-verbose "Testing: $Name" $failed = 0 try { $DNSEntity = [Net.Dns]::GetHostEntry($name) $domain = ($DNSEntity.hostname).replace("$name.", "") $ips = $DNSEntity.AddressList | ForEach-Object{ if (-not (-not $IPV6 -and $_.AddressFamily -like "InterNetworkV6")) { $_.IPAddressToString } } } catch { $rst = New-Object -TypeName PSObject -Property $Hash | Select-Object -Property $props $rst.name = $name $results += $rst $failed = 1 } Write-verbose "DNS: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" if ($failed -eq 0) { foreach ($ip in $ips) { $rst = New-Object -TypeName PSObject -Property $Hash | Select-Object -Property $props $rst.name = $name $rst.ip = $ip $rst.domain = $domain if ($RDP -or $All) { try { $socket = New-Object Net.Sockets.TcpClient($name, 3389) -ErrorAction stop if ($socket -eq $null) { $rst.RDP = $false } else { $rst.RDP = $true $socket.close() } } catch { $rst.RDP = $false Write-Verbose "Error testing RDP: $_" } } Write-verbose "RDP: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" if (test-connection $ip -count 2 -Quiet) { Write-verbose "PING: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" $rst.ping = $true if ($WSMAN -or $All) { try { Test-WSMan $ip -ErrorAction stop | Out-Null $rst.WSMAN = $true } catch { $rst.WSMAN = $false Write-Verbose "Error testing WSMAN: $_" } Write-verbose "WSMAN: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" if ($rst.WSMAN -and $credssp) { try { Test-WSMan $ip -Authentication Credssp -Credential $cred -ErrorAction stop $rst.CredSSP = $true } catch { $rst.CredSSP = $false Write-Verbose "Error testing CredSSP: $_" } Write-verbose "CredSSP: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" } } if ($RemoteReg -or $All) { try { [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine, $ip) | Out-Null $rst.remotereg = $true } catch { $rst.remotereg = $false Write-Verbose "Error testing RemoteRegistry: $_" } Write-verbose "remote reg: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" } if ($RPC -or $All) { try { $w = [wmi] '' $w.psbase.options.timeout = 15000000 $w.path = "\\$Name\root\cimv2:Win32_ComputerSystem.Name='$Name'" $w | Select-Object none | Out-Null $rst.RPC = $true } catch { $rst.rpc = $false Write-Verbose "Error testing WMI/RPC: $_" } Write-verbose "WMI/RPC: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" } if ($SMB -or $All) { try { $path = "\\$name\c$" Push-Location -Path $path -ErrorAction stop $rst.SMB = $true Pop-Location } catch { $rst.SMB = $false Write-Verbose "Error testing SMB: $_" } Write-verbose "SMB: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" } } else { $rst.ping = $false $rst.wsman = $false $rst.credssp = $false $rst.remotereg = $false $rst.rpc = $false $rst.smb = $false } $results += $rst } } Write-Verbose "Time for $($Name): $((New-TimeSpan $cdt ($dt)).totalseconds)" Write-Verbose "----------------------------" } } end { Write-Verbose "Time for all: $((New-TimeSpan $total ($dt)).totalseconds)" Write-Verbose "----------------------------" return $results } } $TestServerParams = @{ ComputerName = $Computer ErrorAction = "Stop" } if ($detail -eq "*") { $detail = "WSMan", "RemoteReg", "RPC", "RDP", "SMB" } $detail | Select-Object -Unique | Foreach-Object { $TestServerParams.add($_, $True) } Test-Server @TestServerParams | Select-Object -Property $("Name", "IP", "Domain", "Ping" + $detail) } Catch { Write-Warning "Error with Test-Server: $_" } } else { Try { $result = $null if ($result = @(Test-Connection -ComputerName $computer -Count 2 -erroraction Stop)) { $Output = $result | Select-Object -first 1 -Property Address, IPV4Address, IPV6Address, ResponseTime, @{ label = "STATUS"; expression = { "Responding" } } if ($quiet) { $Output.address } else { $Output } } } Catch { if (-not $quiet) { if ($_ -match "No such host is known") { $status = "Unknown host" } elseif ($_ -match "Error due to lack of resources") { $status = "No Response" } else { $status = "Error: $_" } "" | Select-Object -Property @{ label = "Address"; expression = { $computer } }, IPV4Address, IPV6Address, ResponseTime, @{ label = "STATUS"; expression = { $status } } } } } } } }
combined_dataset/train/non-malicious/sample_11_45.ps1
sample_11_45.ps1
Signature-Version: 1.0 SHA-256-Digest-Manifest-Main-Attributes: g/TqwshCROFJVmhV1QEn61Fg1W2Oo tyaowJxbJy6WMI= SHA-256-Digest-Manifest: sLmosxa9qYRSiP8Jdd0CG1edmUi8x/G3yNnagMjj5Lc= Created-By: 1.8.0_112 (Oracle Corporation) Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppServiceS ubscription.class SHA-256-Digest: +/Y04Ue8jByMXkPUOD6ilMcsil6ij/4d+ATD5aCH108= Name: com/microsoft/azure/toolkit/lib/appservice/model/FlexConsumption Configuration$FlexConsumptionConfigurationBuilder.class SHA-256-Digest: 9sr8teyZlT6wnIf6E1XrwQktQtnZZ9kIlYUTPyTAGQ8= Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceConfi gUtils.class SHA-256-Digest: 4IZOpny7k18BI0sVYnfq5BjyFWTMfmZx1c6HpYVrnvI= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/MSFunctionDepl oyHandler.class SHA-256-Digest: vvhVq1rMYppX6spnAV3laes7GSOUOL9yFSUJ1xSgg3w= Name: com/microsoft/azure/toolkit/lib/appservice/config/FunctionAppCon fig.class SHA-256-Digest: bGczubxa9YzxhXuDdQ3a9RV2zROYkw0DZu29O05vCZs= Name: com/microsoft/azure/toolkit/lib/appservice/model/DiagnosticConfi g$DiagnosticConfigBuilder.class SHA-256-Digest: MgD3Tu8BI4Qywe38EE2hKija3lkaq9/U2zTY24qwHC0= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F unctionExtensionVersion.class SHA-256-Digest: lpdkgCwfLfs9k791wvEmGqe9aBzT+xxE/66d4qq64ow= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebContainer.cl ass SHA-256-Digest: h9t81EzXrtCFyTqSt/Om3GBjiLJEIfPZXbJ5fj/UExk= Name: com/microsoft/azure/toolkit/lib/legacy/docker/IDockerCredentialP rovider.class SHA-256-Digest: tqdIUMcBUh1yOXp7EzqdCu0Bu/R6x8b6oc7g4W0Qqwo= Name: com/microsoft/azure/toolkit/lib/appservice/model/CsmDeploymentSt atus$CsmDeploymentStatusBuilder.class SHA-256-Digest: zwcePs51L8yPCvjJ6y3/hoeMT+qGInagt8Y3Wyv4N6w= Name: com/microsoft/azure/toolkit/lib/appservice/model/KuduDeploymentR esult$KuduDeploymentResultBuilder.class SHA-256-Digest: m7ernkfoEMEMkA275U95hJ8V4kmW16/fKalKuIHplcM= Name: com/microsoft/azure/toolkit/lib/appservice/model/CsmDeploymentSt atus.class SHA-256-Digest: jQ7DmCLKTHgIgC+ocqmovfBaZGwEpU9EX5w5HynbpTM= Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi le$PublishingProfileBuilder.class SHA-256-Digest: u62b3m93DOk91ibvwqBhiSz4NYYh0EeXxExK+ry77us= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Enum$Direction.class SHA-256-Digest: ZhLtD2MMFHrvhtS3eFcWTiytRHcok5LfROiJRa63VAc= Name: com/microsoft/azure/toolkit/lib/appservice/model/PricingTier.cla ss SHA-256-Digest: 4XIx6/uKAdcBFDemL6imd1g/WxPmuBJPrnJT8UoZymA= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/AzureWebApp.cl ass SHA-256-Digest: 7/qQU2o+uobT9HdPg6cpssR3UQ6nyJ4E3ZCTJ2Hs9zE= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R etry$1.class SHA-256-Digest: hCs3Ny/AhteTjySj1qH36NlP5A4iX9JiDuQB29Zh2JM= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppB ase$1.class SHA-256-Digest: 6y2UwGOrboPUmkApA1kjO0y6Gm9zOn4CdGZuXUbCdOY= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FlexFunctionDe ployHandler.class SHA-256-Digest: SJfUywgU0sAk+jHkiAFX75+mo4Toob1PVy4oOB9cExs= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromZipFunc tionDeployHandler.class SHA-256-Digest: sO9matz3oGzlX6VaUo+kH845N72cJ7XtrZJ5qszduvE= Name: META-INF/aop-ajc.xml SHA-256-Digest: Lmh7xWtzJ24Mbar0uNGgL4hM5bECwwFmQH/7y4FVnxo= Name: com/microsoft/azure/toolkit/lib/appservice/file/IProcessClient.c lass SHA-256-Digest: jpC/cye6JFxVFfXxYHK1Ktaqf5YTTv/n3hm7MPLbHUc= Name: com/microsoft/azure/toolkit/lib/appservice/config/RuntimeConfig. class SHA-256-Digest: veXfHDQK0xCTPRLDQ7u6Dl9Z/uE1OcXpsdSXjoYkcG4= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebApp.class SHA-256-Digest: U+8iTbq2hD3jm8gZ3mJ/7rDOTuhZSNSNygEHeK47gow= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity $1.class SHA-256-Digest: mWAePnqPjeshyBrre/NDU9fbLjwxT6m/HhoLjVbVKv8= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity $BindingEntity.class SHA-256-Digest: wsUtfIC0EVwz0xIFaV4cu/NpXlkLihfnkQYWvDswSjU= Name: com/microsoft/azure/toolkit/lib/appservice/AzureAppService.class SHA-256-Digest: wUVumzYvgOqmVx74AN/vML1sjgGNVMcc9JxhC+OtD5Y= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD raft.class SHA-256-Digest: y2IsbEFV60CNv4dULIZynTUuGpTCPnGoC0AUfvS3Q34= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackager$1.class SHA-256-Digest: 3L1DLDswjBy/oFd++Lh/Z19l8YVdjXiK1NcGEJ+92Sc= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppBase.cla ss SHA-256-Digest: 04zlf6v8nXv+1wxSTN+yjyn+zaia3mCbQWDuPo21Yb4= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployType.clas s SHA-256-Digest: NhGl+/BDAsc9yKghSNu8cxkuWQQf7Pms0FVhYfx7rtI= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/ZIPFunctionDep loyHandler.class SHA-256-Digest: WbfNi+CRL8hTnNMoGZ4jqWO7MS4dReVhueUDCFlcKtw= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IOneDeploy.cla ss SHA-256-Digest: gcrNvE0Iqwa119yuc4W60/sqyQqmUVnNB6nFQ0qLTj0= Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile$ Type.class SHA-256-Digest: b5ail/4mKZ/r6+yNa07SIoOVGT7d+UMQzHeyi6XAjqk= Name: bindings.json SHA-256-Digest: rAgPyqyWEypznK8+mwPvSECqnuOpDfgzFmSFJmkhtlk= Name: com/microsoft/azure/toolkit/lib/appservice/model/ErrorEntity.cla ss SHA-256-Digest: roSw74ePfOIujxJnUis252JR5Oq69PBYikdd5e7hBnI= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient$1.class SHA-256-Digest: obhcylh31dgaXFIO1iFa4tfpg6Dbyu7kKbBHF91Ph4U= Name: com/microsoft/azure/toolkit/lib/appservice/file/IFileClient.clas s SHA-256-Digest: 7Y0LIxH2divWNJ90I6pC3/nzae3ZBP32aU/u6WxRgW8= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding .class SHA-256-Digest: kE9jldbCApCWxHTImqSWSFC1p7RbP62uDVu93sutNDc= Name: com/microsoft/azure/toolkit/lib/legacy/function/Constants.class SHA-256-Digest: 9HKz/7rWDfyrW+ZlED8VgW+hi+8jvM1sToTVe7dFahw= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppModule.c lass SHA-256-Digest: i1KXPoEyvhKK8kubnIwzd/eg2yzQH2E1uG6xSqZX6PQ= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat ionHandlerImpl.class SHA-256-Digest: whOxLRe2erKWYNzZrJg+KlP42I+4UThU4dvJUa6KRlg= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FTPFunctionDep loyHandler.class SHA-256-Digest: Tt6JvohNFuIJYsL+aHhabOSc6BkHB+Nl48ZNNWDAS7A= Name: com/microsoft/azure/toolkit/lib/appservice/model/CommandOutput.c lass SHA-256-Digest: 7jnp2mx66WvaCA1PYYYPbwYuL8cKACRut8352kqguQM= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity $FunctionEntityBuilderImpl.class SHA-256-Digest: iJDayBIZX7s2h2XlahaTJSfbjg5pE/qhY/H7LOW9IvU= Name: builddef.lst SHA-256-Digest: 7n9RBOy8pMGlsvaAzVw47t/cRM0CzVE3jxwYD8Xfu5U= Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateWe bAppTask.class SHA-256-Digest: dAV9QHFFeyJWG3pFiywZXUSscUKDukOyGazIW6+Fqs8= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat ionHandler.class SHA-256-Digest: VKuA2zIGsuFRh9eYhFRSn1Gd2ZoVigVchU/PJZAgF/o= Name: resources.json SHA-256-Digest: MJyxajX0JKwAGeUJRXKxMbVpXKY0MEpWK8XxFa+//SQ= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Extende dCustomBinding.class SHA-256-Digest: JyUQYwEcNmC6Apv7DVZklWHyHFRDV8X9NmTSXOqe6BY= Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura tion$DockerConfigurationBuilder.class SHA-256-Digest: iaRFgD+CShV6ukLXNZ0WEajxpNNsgiwXY0ygWiDabYQ= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient$CommandRequest.class SHA-256-Digest: 7G9SJmq5TMqwG35P63gWALQpvaKWRR3PxT7IaToNufQ= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromBlobFun ctionDeployHandler.class SHA-256-Digest: beHyPzCU+QMgVrsMCzPK2JVP7p7rlPBCEwj1ojFDGT4= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient$KuduService.class SHA-256-Digest: ERXWGrsX0jIgDuj6WeJ5u1BbkSqDTUC1PN9VH5SMK8w= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplate.class SHA-256-Digest: mSw7RrH/E8q+Q/nlRlCC6QWCQUoe710kAOiqfN2ZJm0= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployOptions$D eployOptionsBuilder.class SHA-256-Digest: gV7qDLJvr+ZkW1B43kXrnpWgGvZkCqmsYcpEGrWsR2E= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppB ase.class SHA-256-Digest: hDpAqrZNVkperNlkNXrn+aH99aHibkHwBuxeuH0dxt0= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Serializer.class SHA-256-Digest: SDpbAMIZrWQIk1k613+mIUo1NSyoGSc6f4i3krK56Vw= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr aft$Config.class SHA-256-Digest: 9qYhJBmGILhaiypcGMKhVtYImcGLVqafzLqKD9uV4uk= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionsAnnotationConstants.class SHA-256-Digest: Sx3SDbFvGPRHKT1stA7NhYJ/chDcqYpksWlMPQWKX1I= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceServiceSubs cription.class SHA-256-Digest: 7kihgyJrx3v6W/520OOd9sk1H2DhJbEs2KGEYp4uSOE= Name: com/microsoft/azure/toolkit/lib/appservice/model/ErrorEntity$Err orEntityBuilder.class SHA-256-Digest: B/RrU/3YgIvs2GBxDKpLND9UYYRpend5yeZzUz4BuvA= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/IAnnota table.class SHA-256-Digest: BaKC5fvsRj+7I2DhCkzCOpSDQyIq8NNyVvaem2s3Gx0= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlot.class SHA-256-Digest: IG8kFEYo3e1tcyg2ur1xUjW7PdNhnMKIsiqUOPVJZLA= Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServicePlan Config$AppServicePlanConfigBuilder.class SHA-256-Digest: NHRVNUZlj2rKS9YmtMS3oxCm55qfwgyIGhh4qKoGvl4= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplate$Function.class SHA-256-Digest: R4lXEw/IPaeGUGPVkLjT4uTqk+Z/wV8234PqVO8sXeU= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact$ WebAppArtifactBuilder.class SHA-256-Digest: k6RLcI64XHQQe64eznCT8XZvSBvtGrV+RRhN9PWZ+j4= Name: META-INF/maven/com.microsoft.azure/azure-toolkit-appservice-lib/ pom.xml SHA-256-Digest: +LLEuoBF/mOF4Qb1cWUoOTEff97MOynwg4qqsWuAVNY= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/Default FunctionProject.class SHA-256-Digest: y4iem+li4mTavLcwqwrgPOkFbN8kaV/t9RA+5iP+5cg= Name: com/microsoft/azure/toolkit/lib/appservice/model/Runtime.class SHA-256-Digest: FNhXuz/elEHIxYGRw71OX8vo5IyTJhdApb7Co28cATU= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio nCoreToolsHandler.class SHA-256-Digest: JOqTUULmjJdRZ6QovBFb51iEC1FFm9caxGTRUVb1vPI= Name: META-INF/services/com.microsoft.azure.toolkit.lib.AzService SHA-256-Digest: ZOS6Pq0SJp/sCq0MyE9XCOgJ/E5Z4iUF1KtSXlHuGdU= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient.class SHA-256-Digest: F4RI3rA3XhvcfUPdY8gYYS5FzkNGqk2sVGUPPJUhW+E= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanMo dule.class SHA-256-Digest: dQRH/XYrgPuanutNovPku/p0PZ9DarBFJzyksD5Zrck= Name: com/microsoft/azure/toolkit/lib/appservice/function/AzureFunctio ns.class SHA-256-Digest: wX2w1HuhN5KlbFmKMGrMzUkgXLp812qMjlOgD808wy8= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotModule.class SHA-256-Digest: LOQC2/jMfE0efSolDqdarHjLquZejhK9xy0bqXUmHiQ= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IFunctionDeplo yHandler.class SHA-256-Digest: zig0WR5tUfApgUiaffDPCO15EPbhcMkWtgmHyGL5o+A= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Validat orTemplate.class SHA-256-Digest: 7vWweIrFZhetvD/Gk+tyR5Za1ZZaDigylvaMzgk0v70= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity $BindingEntity$BindingEntityBuilder.class SHA-256-Digest: elKL++CECNE1RxwOWI7Rq8pkwaOQlnk3cI0Yo3Aw0Xw= Name: com/microsoft/azure/toolkit/lib/appservice/model/TunnelStatus.cl ass SHA-256-Digest: O9UmJfhruINbDX9RTlhvWnp66Qm3rcmKUaIyzRXnKSY= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft.cl ass SHA-256-Digest: Y38dXISMkiUlF7kspIcfPzMIVxSKrz909D/1YtdulMg= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeploymentBuild Status.class SHA-256-Digest: 67merSfq1nb5eFYkgCIzoUmUskpAkzsqMOqntoHW6CM= Name: schema/appservice/CreateAppServicePlan.json SHA-256-Digest: DGNGqLsn0X/uQJro8foH6iV2lsVf17DVsEUqgM0+Cgg= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask .class SHA-256-Digest: NjUJvok9SfftIGrvo4juwVsPI0n4o3zRMFcLpDjwhg0= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat eResources.class SHA-256-Digest: 2ITdSv2JN0k4eOskHllCvjxS2MVW9zfCPvc06L/ZtRE= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient$CommandRequest$CommandRequestBuilderImpl.class SHA-256-Digest: NS8lnM7oVzEdiC7GsCrZqMoLQDIyFvXHa4zG2jpWNkI= Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile. class SHA-256-Digest: BBkVSz40gphAg6zRBA1pf7/Hkunz9oFV6SGssf/LmZY= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentType .class SHA-256-Digest: E6pjaxnya9f9lzoKED+T8qDo/x3QvzZxOieI3+u9nL0= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/DeployUtils.cl ass SHA-256-Digest: mrD2F8uXOjnldCwXbgHOlDieUJZLSdBdTX2rozV+DaY= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentSlot Setting.class SHA-256-Digest: KOgiFDRnKQBZF6bosv+wCU66aPzICB5wVJA6nMx+WHY= Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServicePlan Config.class SHA-256-Digest: 6Ic5FA3K5bjaOUM2y8ses9tm5A4+FZwgJWaSFb5cRaQ= Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceUtils .class SHA-256-Digest: jD9On7Xra174vxJi/uwz2VfcJKpG6i81dyQsLyPjpuQ= Name: com/microsoft/azure/toolkit/lib/appservice/model/LogLevel.class SHA-256-Digest: UBzOrrEw/TdjhkpMGF2/Y3AKE3X176j/gklPGXpAu0Y= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceAppBase.cla ss SHA-256-Digest: YqEWXT5XMbRQgRzT3G7BzEtrKnA4eP1EfQfjscC3otc= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command HandlerImpl.class SHA-256-Digest: PtlWVekP6qC67YLUUu1RyJoQ8csYBixSCu/yJerq/EY= Name: com/microsoft/azure/toolkit/lib/appservice/utils/Utils.class SHA-256-Digest: clubhe0qX1tCLzQmfLEl/Rc9VcjktMqdUdWygPrvWqE= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackagerBase.class SHA-256-Digest: 2swUd4oxEWqjAe2PhxU2W6jafJzjcCx+pWdwD9BOXvg= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity $BindingEntity$BindingEntityBuilderImpl.class SHA-256-Digest: 2u7zKj44GpUTGl0CeJWFrZWx48Ytrd6FbHoAvVduNAk= Name: com/microsoft/azure/toolkit/lib/appservice/utils/FunctionCliReso lver.class SHA-256-Digest: Fly4d+hgCA2S0u9N1sfctr+RCXzrtRzy8+5Ihn0M7nA= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact. class SHA-256-Digest: P42lBunnEe1gg3Uyi6c2v7Fo47d2arnSrsbPf3JhKag= Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi le.class SHA-256-Digest: HuRmMUY2kZFthtr8scGnK7XVsabkI55g7IjxpZUnFQ0= Name: com/microsoft/azure/toolkit/lib/appservice/IDeploymentSlotModule .class SHA-256-Digest: IA2sD98BtFRAsGTQnvhAbzqTqoRWBSiOH726nCfJemc= Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServiceConf ig.class SHA-256-Digest: i1+uG9ED7Z+pd1W5jVbJ4wlEKhF26wmZLnCpd2SuqTo= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/Default FunctionProject$1.class SHA-256-Digest: pCzebCjmY3Vf62u2tFpI9lLtSOQ4TIWU1IVcU40dg1Q= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/FTPUploader.class SHA-256-Digest: AGuH/8GYOuYWB0zYzZTU+zh3mdGYOCHeVmavknZGWlg= Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura tion$DockerConfigurationBuilderImpl.class SHA-256-Digest: C5ytbYo2A3zxZEPxShgodUbPLuxxpJ+Ux40fOPIQBXE= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R untimeConfiguration.class SHA-256-Digest: 97QOEJ0z2Sgo5Z6uFP8xCp3T1tJSxLxW2qE1OpUJ+Lo= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlot.class SHA-256-Digest: ZIboE/PQ+uUpGRcuzoYXbSVXv1wnYVuvAHpTI1Knmos= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/CommandUti ls.class SHA-256-Digest: 50JBjUebpZZHKjwZJsbiSSE8Vz9NPnDgeQ0Muf5rmvY= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R etry.class SHA-256-Digest: 1JN3C8Gh5Ft/3vW28Uh94Uj/L9AOK2J3+ouI1wF+L7U= Name: com/microsoft/azure/toolkit/lib/appservice/model/JavaVersion.cla ss SHA-256-Digest: AzcN9Bk1uOYKXx2lFe79UDgX/LAH+kErRuy3aw04FYA= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nSettingTemplate$FunctionSettingTemplateBuilder.class SHA-256-Digest: 4cMCBKaOLv6aTEVSi61niCTXtM7N2cg/KHVURciScHs= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nAnnotationClass.class SHA-256-Digest: q4erbw4eJcdugpcToQ2Ius1EjrOxQzJMQ2gD2nRbQvI= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceResourceMod ule.class SHA-256-Digest: vCUBDO8pXxqYU8djZFT2Bxsf2u9SLfpmvsUSZE/RJWg= Name: com/microsoft/azure/toolkit/lib/legacy/function/AzureStorageHelp er.class SHA-256-Digest: RtPpc5R/pHLmkGT1uol7Kab0jczFMmeVMPUGCQ7KRUw= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppM odule.class SHA-256-Digest: YoyddmC1E/+M+ofKiS9AoKTHdDZWuv5J62IfsBWFFw4= Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd minClient$FunctionsService.class SHA-256-Digest: TCnPCVB/Dld6ldO8k3iY3LrqDFKuLmCxEokU/z/IKF0= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command Handler.class SHA-256-Digest: VnugUcR03EQXPfXiUOGy3KHqf8cpzqZBULOZDcvQJmk= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nProject.class SHA-256-Digest: zmkjDPf1c598WolyqzCMtVL8jg0VgDODhfGYxwDmki0= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nSettingTemplate.class SHA-256-Digest: KTXLfROoZugbhY4ZjaUmhSwuU3XvOT0zse0OiRhOOSU= Name: com/microsoft/azure/toolkit/lib/appservice/model/ProcessInfo.cla ss SHA-256-Digest: agHhowwjC4OTya4BWAbEbsuguU5cVH5Pz+f0p/wk4/o= Name: com/microsoft/azure/toolkit/lib/appservice/task/StreamingLogTask .class SHA-256-Digest: nnyr79t/efxKo2H8y+1udMb2UIGivBgSSaiDqjY5Juk= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackager$AzureFunctionPackagerHolder.class SHA-256-Digest: lwxpNPZ5FzDuZs7+W3CeRdF5Qc4HqAHmeHpsSk04Vb8= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding Template.class SHA-256-Digest: ZDKdoOajiqDEs9pLOblgfTwm+PLZkZ1zAV+kxE0slGw= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotModule.class SHA-256-Digest: bjgRbwdXQs5A+NQIhVmn3zgHF2iXnyLmgOOTf+oue8Q= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt ils$AjcClosure3.class SHA-256-Digest: arZY8LRsTre0r4Du1rHI9QpN+FRTsoUAzUB3XAyh/EE= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding Configuration.class SHA-256-Digest: b4Yj24HLjumhI4AJSvN9A/oVIzPYrEpLy0gf/PXFy1E= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlan.c lass SHA-256-Digest: G/OlxK9sQmlmdYf1fHjCGnAWZLQuIsm0ibFPcfgq9As= Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateFu nctionAppTask.class SHA-256-Digest: wIGq9XGF3dcc/cIeHZBP8VtJGFngQoLl5kDTQR80dMI= Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd minClient.class SHA-256-Digest: YI6ZJbP1R5hs5Y7UteXW/o5w4BxvILtuqCCE+rkdaLg= Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura tion.class SHA-256-Digest: 1SruYEpEtq07fm5VI3M27KvTmSk8QUMWeTl/kczKe+0= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient$CommandRequest$CommandRequestBuilder.class SHA-256-Digest: unTnQmjh2L8LpyhzJ84LXfnuhuar00u9tgoIzqbgHf4= Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura tion$1.class SHA-256-Digest: gDCdmjhRyH43GgBJO0okh4BOR/bvZvM2VLXIhYX/PG4= Name: META-INF/maven/com.microsoft.azure/azure-toolkit-appservice-lib/ pom.properties SHA-256-Digest: bd8M+Km+2a+pHa+EipYi3FZhCHxBwr2waPr/KXCvx5Y= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployFunctionAp pTask.class SHA-256-Digest: HVwCi67n8ahc/daHpbNH7PvTg/aBKLP41/B6Kv6TQLk= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nSettingTemplate$SettingEnum.class SHA-256-Digest: xcnDs+JlQ8suoWTnS6xEDloZlwO99Ob/zgbFmH9nH60= Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi le$PublishingProfileBuilderImpl.class SHA-256-Digest: Y3lQetjnhyJU3S/MzxZvDxTGNyU52onHzhYN1TGkkto= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployOptions.c lass SHA-256-Digest: Mt4R1MG27DxFNACQ1FEhoPf3EUt4YKr7hiIie535wz0= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity $FunctionEntityBuilder.class SHA-256-Digest: 9WDBBJll4gh2zYbn3LDliSqUkdiNaanNEsBv1WwvpnI= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft$Co nfig.class SHA-256-Digest: 1csJJTPw1j0b5HfnJqebDPt3X9gnIbIzo+60zVDtBq0= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotDraft$Config.class SHA-256-Digest: TLIz1VidA7DdvbfjUGa1wLPaet+lqGpXC9VBbJqCnA8= Name: com/microsoft/azure/toolkit/lib/appservice/model/FlexConsumption Configuration.class SHA-256-Digest: fYa39WEd8oAO8e5Z+Nyfj5/AqVXd04gWF/qNperZSUE= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding sTemplate.class SHA-256-Digest: Vox0tD6BYwWNuJHoOPMd72LZZ1BtKnhJPvb681lExD4= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/AppServiceUtil s.class SHA-256-Digest: bgdg/7EsdCnBf8c3w2UlLncvzNu/oyYrt4PUnuf8v9w= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Enum.class SHA-256-Digest: qULuV33jvuhi80UYVFCeUsZ62Ebk2iQyuXJMaw1pfyQ= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R etry$RetryBuilder.class SHA-256-Digest: hPU7zgRd5QtH1Md0Koz/KfAK6qvs3JosOdGV+oFxv6Q= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nMethod.class SHA-256-Digest: YvSP74f3dz+m4qm98x58jwGUJrMbgRbAavpepF1a1hc= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact$ WebAppArtifactBuilderImpl.class SHA-256-Digest: 9sGcZPaDf+FAe6SkU45IMa99BzRFAfu9l5s1uMF7fac= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Factory.class SHA-256-Digest: NA2lL+tMbCvr2mDFzfMWsV7ZLV8OAWLjX6LAx21NSm8= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DockerImageTyp e.class SHA-256-Digest: DrmGjlUqQb7TKQhlaFHH+sAvlg3nHk6cxwpqCGAbm34= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact$ 1.class SHA-256-Digest: 1Nn+/W/OGHFmjPQ5P+mAGPIwyIgr0MkqRF3D4+EDfoM= Name: com/microsoft/azure/toolkit/lib/appservice/model/OperatingSystem .class SHA-256-Digest: zh19Ey5aKAP2ma0pxcIpzFipHn6yk+nVOYZJfSmB6Ns= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/DateUtils. class SHA-256-Digest: mPqy1OeY4sH4d1GM7f8EIiHaFrq1sxeYR6nYUhT7vU0= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity .class SHA-256-Digest: PhRXDXFdL2Pjzn8XDBZYZ28Yr9r8Rgm5ptx7m9ow6Fo= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F unctionConfiguration.class SHA-256-Digest: fzVY2bEdxkZvsrb1qHVorgzlpmxX/BhqHjmt+g8+Imw= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotDraft$Config.class SHA-256-Digest: xbPRFQsyBi4JgYtnVFPrZfqNPBYYySCuqzMExJrX4uk= Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi le$1.class SHA-256-Digest: 46UGx2JjKzcK4vHdd7gZ+LovD5bykbLkBAcERShrf98= Name: com/microsoft/azure/toolkit/lib/appservice/model/FunctionDeployT ype.class SHA-256-Digest: OjN0aljRR3apIJMTa1+PFxmMA01qmbe/qrAErJTN2y4= Name: templates.json SHA-256-Digest: q/Jo9Jy4HkGf+krojhnSlR1Hx1d63datH5OfXtpo9ic= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplates.class SHA-256-Digest: xlFJm4AyeSTQONBk4eZoIo/wuLIOvg5O07fJSjyuff4= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotDraft.class SHA-256-Digest: /P0s61Ek/s+6Mzv53j83WMwu3eyhqKQEn1TRm2y5eMA= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat eMetadata.class SHA-256-Digest: RDpPw8pzxrvTAgGrZKvuLhx6+dytWViPNUOzJbXyHmU= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R etry$RetryBuilderImpl.class SHA-256-Digest: mKzLin6TigR9LXBO0+sNYVN0mmz7URdrybv6cpytHbQ= Name: com/microsoft/azure/toolkit/lib/appservice/model/KuduDeploymentR esult.class SHA-256-Digest: cEuc3ibmbdQxsO9x3c33xosb8L5MBtno6Uuut5b5LrQ= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr aft.class SHA-256-Digest: rd9IXXsi1GdBtZaYx9VcVPeI9euRv1w2Rx32BuM39vs= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt ils.class SHA-256-Digest: A2rFdgztOUyM/m/6QnzndW/ztDdqTWnx4F3euNPZRBM= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Extende dCustomBinding.class SHA-256-Digest: eYCi6frbrvYWoEef8U7YERGN5ggMQePS0O4ZHJti24g= Name: schema/appservice/AppServicePlan.json SHA-256-Digest: eO+yKXVggY/T7PYqwMKE1xsoLQ5Wz3LFfhktQrHlxm8= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask $TrackDeploymentStatusTask.class SHA-256-Digest: gKI6ZuVAFpF/eo0l15wolVfU2zlV84H8MXpRAyInRSo= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nAnnotation.class SHA-256-Digest: TwFX3P2pZjIoaHAblyMxosA9YvMIErM9VhJhNkq9r6s= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt ils$AjcClosure1.class SHA-256-Digest: BAThOGH3Z3qMmSudJa7PAjrL07shfQErW/bi1J+qBBM= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio nCoreToolsHandlerImpl.class SHA-256-Digest: KBn+LPTe17qSO1RjTYct8LISe13Gp0ES3DEH+qo/d+k= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotDraft.class SHA-256-Digest: vvTtVclSD6k0u7HIokRr/7vhlCQa0dUMK8QoJFERbZw= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionApp. class SHA-256-Digest: 0AFOo2H8q8qkYvI5n4/E0k910609sdIr4BTQF7WGzY8= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackager.class SHA-256-Digest: ThWy8YvrK7i87ClkFR7HUIRVPUSe7HYEbfIVnbeNm1w= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionsSer viceSubscription.class SHA-256-Digest: DiD/+2afTG96Y9ROMGAbBfZXk6P6wIP30rLhBe999j4= Name: com/microsoft/azure/toolkit/lib/appservice/model/DiagnosticConfi g.class SHA-256-Digest: +EnY0psWP8GwPMVYcz6frQOYCcCM4w49YB0b4FKm9Gw= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD raft$Config.class SHA-256-Digest: L1ujoYQ0iaNLtpLEMqaWWwF8LOP9wRryqZR19tKMqIU=
combined_dataset/train/non-malicious/sample_38_92.ps1
sample_38_92.ps1
ConvertFrom-StringData -StringData @' AdapterNotFound = 지정된 어댑터를 찾을 수 없음: {0} InvalidParams = 유효하지 않은 매개변수 집합. 유효한 매개변수 세트를 확인하려면 cmdlet 도움말을 참조하십시오. InvalidParamsAdapterAndName = 이름 및 어댑터 매개변수를 지정할 수 없습니다. InvalidParamsConfigAndModule = 모듈과 구성 매개변수를 지정할 수 없습니다. InvalidModule = {0}: {1}은(는) 유효하지 않은 모듈 이름입니다. 유효한 모듈을 살펴보려면 다음 명령을 사용하십시오. "Get-IntelEthernetLogConfig -Name "{0}"" InvalidSetting = {0}: {1}은(는) 유효한 설정 이름입니다. 유효한 설정을 보려면 다음 명령을 사용하십시오. "Get-IntelEthernetSetting -Name "{0}"" InvalidObject = {0} : 유효한 객체가 아닙니다. 유효한 객체 유형은 cmdlet 도움말을 참조하십시오. InvalidSettingValueGeneric = 이 장치 또는 설정에 대해 지정한 값이 유효하지 않으므로 설정을 수정할 수 없습니다. InvalidParamsAdapterOrName = 이름 또는 어댑터 매개변수를 지정해야 합니다. InvalidParamsConfigOrModule = 모듈 또는 구성 매개변수를 지정해야 합니다. InvalidLevel = {0}: {1}은(는) 유효한 레벨 이름입니다. 모듈당 유효한 수준을 확인하려면 다음 명령을 사용하십시오. "Get-IntelEthernetLogConfig -Name "{0}" -Module "{2}" | fl" InvalidLevelWildcard = 레벨은 한 개의 로그 레벨과 일치해야 하지만, 임의 문자열은 한 개 이상과 일치합니다. InvalidDriverLevel = 드라이버 모듈의 경우 수준을 Normal(보통) 또는 Verbose(자세히)로만 설정할 수 있습니다. InvalidSubModule = {0}: {1}은(는) 유효한 하위 모듈 값이 아닙니다. 지원되는 하위 모듈 값 목록을 보려면 이 cmdlet에 대한 전체 도움말을 참조하십시오. InvalidCluster = {0} : {1}은(는) 유효한 클러스터 이름이 아닙니다. 지원되는 -Cluster 목록을 보려면 이 cmdlet에 대한 전체 도움말을 참조하십시오. FailedToReadCluster = 클러스터 {0}을(를) 읽는 동안 오류가 발생했습니다. LogmanRunning = {0}에 대한 로깅이 이미 실행 중입니다. LogmanFileExists = {0}에 대한 파일이 이미 존재합니다. 파일을 덮어쓰려면 -Force를 지정하고, 기존 파일에 추가하려면 -Append를 지정하거나 다른 파일 이름을 선택하십시오. PathIncorrect = 지정된 경로가 존재하지 않거나 액세스 할 수 있는 권한이 없습니다. 정확한 경로를 지정하십시오. NoLogsStarted = {0}에 대한 로그가 아직 시작되지 않았습니다. OperationFailed = {0}: 이 장치에서 {1} 작동이 실패했습니다. 다시 시도하십시오. NoCmdletSupport = {0}: 이 장치는 이 cmdlet를 지원하지 않거나 그것을 지원하는 드라이버가 없습니다. NoConfigurationSupport = {0}: 이 장치는 구성 매개 변수를 지원하지 않습니다. FolderFileNameExits = 귀하가 지정한 파일 이름과 같은 이름의 폴더가 이미 있습니다. 다른 이름을 지정해 주십시오. InvalidConfigurationName = {0}: {1}은(는) 유효하지 않은 구성 이름입니다. 지원되는 -Configuration 목록을 보려면 이 cmdlet 전체 도움말을 확인하십시오. GenericFailure = {0}: 이 장치에서 {2}에 대한 {1} 작동이 실패했습니다. 다시 시도하십시오. NotSupported = 지원되지 않음 NotAvailable = 이용할 수 없습니다 Unknown = 알 수 없음 MiniHelpNotFound = 이 설정을 위한 도움말 콘텐츠를 찾을 수 없습니다. IdentifyPortDisabledOrLowPower = 장치가 비활성화되었거나 저전력 상태에 있기 때문에 명령을 실행할 수 없습니다. InvalidSettingValue = {0}: {1}은 {2}에 올바른 값이 아닙니다. 다음 명령을 사용해 올바른 값을 확인하십시오. "Get-IntelEthernetSetting -Name "{0}" -RegistryKeyword "{2}" | fl" WritingDebugDump = 디버그 덤프 작성 RegisterCountersSuccess = {0}: 카운터 집합 등록을 완료했습니다. RegisterCountersFailure = {0}: 카운터 집합 등록에 실패했습니다. UnregisterCountersSuccess = {0}: 카운터 집합 등록이 해제 되었습니다. UnregisterCountersFailure = {0}: 카운터 집합 등록 해제에 실패했습니다. InvalidSystemConfigFailure = 이 cmdlet은 현재 시스템 설정을 지원하지 않습니다. ProfileXmlError = PerformanceProfiles.xml에서 프로파일 설정을 가져오지 못했습니다. 최신 설치 패키지를 다운로드한 다음 다시 시도하십시오. NoProfileSupport = {0}: 지정된 프로파일은 현재 환경에서 지원되지 않습니다. cmdlet 도움말을 참조하십시오. TestSuccess = {0}: 테스트를 성공적으로 실행되었습니다. TestFailure = {0}: 테스트 실행에 실패했습니다. TestResultPass = 통과됨 TestResultFail = 실패됨 AdapterStartFail = {0}: 장치 시작에 실패했습니다. NotStarted = 시작되지 않음 InProgress = 진행중 Done = 완료 MultiplePeers = 여러 개의 피어 Backplane = 백플레인 QSFP = QSFP QSFPDirectAttach = QSFP+ 직접 부착 SFP = SFP SFPDirectAttach = SFP+ 직접 부착 SFP28DirectAttach = SFP28 직접 부착 Copper = 구리 CX4Copper = CX4 Copper CopperT = 구리-T CopperTX = 구리-TX SGMII = SGMII Fiber = 광섬유 SRFiber = SR 광섬유 LRFiber = LR 광섬유 KXBackplane = KX/KX4 백플레인 XAUI = XAUI AOCACC = AOC/ACC BackplaneKR = 백플레인-KR BackplaneKR1 = 백플레인-KR1 BackplaneKR2 = 백플레인-KR2 BackplaneKR2PAM4 = 백플레인-KR2-PAM4 BackplaneKR4 = 백플레인-KR4 BackplaneKR4PAM4 = 백플레인-KR4-PAM4 BackplaneKRPAM4 = 백플레인-KR-PAM4 BackplaneKRS = 백플레인-KR-S BackplaneKX = 백플레인-KX ChiptoChip = 칩 투 칩 DirectAttach = 직접 부착 DirectAttachCP2 = 직접 부착-CP2 DirectAttachCR = 직접 부착-CR DirectAttachCR1 = 직접 부착-CR1 DirectAttachCR2 = 직접 부착-CR2 DirectAttachCR4 = 직접 부착-CR4 DirectAttachCRPAM4 = 직접 부착-CR-PAM4 DirectAttachCRS = 직접 부착-CR-S FiberDR = 파이버-DR FiberFR = 파이버-FR FiberLR = 파이버-LR FiberLR4 = 파이버-LR4 FiberLX = 파이버-LX FiberSR = 파이버-SR FiberSR2 = 파이버-SR2 FiberSR4 = 파이버-SR4 FiberSX = 파이버-SX FiberX = 파이버-X FullDuplex = 전이중 NotNegotiated = 협상되지 않음 Disabled = 비활성화됨 Active = 활성화 LinkUp = 링크 업 LinkUpNotMax = 링크업 - 이 장치가 가능한 최대 속도에서 연결되어 있지 않습니다 LinkDown = 링크 다운 NotPresent = 존재하지 않음 NegLaneSpeed25 = 2.5 GT/s NegLaneSpeed50 = 5.0 GT/s NegLaneSpeed80 = 8.0 GT/s ISA = ISA EISA = EISA PCMCIA = PCMCIA CardBus = CardBus PCI = PCI PCIX = PCI-X PCIExpress = PCI Express IOSF = IOSF Normal = 정상 OverheatedStopped = 과열, 어댑터 중지됨 OverheatedReduced = 과열, 링크 속도 감소함 PortA = A PortB = B PortC = C PortD = D Profile = 프로파일 CustomSettings = 사용자 정의 설정 StandardServer = Standard Server WebServer = Web Server StorageServer = Storage Server VirtServer = Virtualization Server (Hyper-V*) LowLatency = Low Latency StorageVirt = Storage + Virtualization Register = 등록 EEPROM = EEPROM MacLoopback = MAC 루프백 Interrupt = 중단됨 FIFO = FIFO RunningTests = 테스트 실행 중... 이 작업은 몇 분 정도 소요될 수 있습니다. 중단하지 마십시오. TestProgress = {1}의 {0} 테스트 실행 중 - {2} '@
combined_dataset/train/non-malicious/1318.ps1
1318.ps1
function Uninstall-CScheduledTask { [CmdletBinding(DefaultParameterSetName='AsBuiltinPrincipal')] param( [Parameter(Mandatory=$true)] [Alias('TaskName')] [string] $Name ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $Name = Join-Path -Path '\' -ChildPath $Name $MAX_TRIES = 5 $tryNum = 0 do { if( -not (Test-CScheduledTask -Name $Name) ) { Write-Verbose ('Scheduled task ''{0}'' not found.' -f $Name) return } $lastTry = (++$tryNum -ge $MAX_TRIES) Write-Verbose ('Deleting scheduled task ''{0}''.' -f $Name) $errFile = Join-Path -Path $env:TEMP -ChildPath ('Carbon+Uninstall-CScheduledTask+{0}' -f ([IO.Path]::GetRandomFileName())) schtasks.exe /delete /tn $Name '/F' 2> $errFile | ForEach-Object { if( $_ -match '\bERROR\b' ) { if( $lastTry -or $err -notmatch 'The function attempted to use a name that is reserved for use by another transaction' ) { Write-Error $_ } } elseif( $_ -match '\bWARNING\b' ) { Write-Warning $_ } else { Write-Verbose $_ } } if( $LASTEXITCODE ) { $err = (Get-Content -Path $errFile) -join ([Environment]::NewLine) if( -not $lastTry -and $err -match 'The function attempted to use a name that is reserved for use by another transaction' ) { if( $Global:Error.Count -gt 0 ) { $Global:Error.RemoveAt(0) } if( $Global:Error.Count -gt 0 ) { $Global:Error.RemoveAt(0) } Write-Verbose ('Failed to delete scheduled task ''{0}'' (found ''The function attempted to use a name that is reserved for use by another transaction.'' error). Retrying (attempt Start-Sleep -Milliseconds 100 continue } Write-Error $err break } } while( $true -and -not $lastTry) }
combined_dataset/train/non-malicious/List AD Attributes.ps1
List AD Attributes.ps1
$forest = [DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest() $Schema = $forest.schema $Properties = $Schema.FindAllProperties() foreach($property in $Properties) { "#################################" "Name: {0}" -f $property.Name "Link: {0}" -f $property.link "LinkID: {0}" -f $property.linkid if(!$?) { "Error: {0}" -f $error[0].message } "#################################" }
combined_dataset/train/non-malicious/2975.ps1
2975.ps1
param ( [Parameter(Mandatory)] [string] $ApiKey ) $VerbosePreference = 'Continue' $ErrorActionPreference = 'Stop' $baseDir = $PSScriptRoot try { $buildDir = "$baseDir\build\psgallery\Pester" Write-Verbose 'Importing PowerShellGet module' $psGet = Import-Module PowerShellGet -PassThru -Verbose:$false & $psGet { [CmdletBinding()] param () Install-NuGetClientBinaries -CallerPSCmdlet $PSCmdlet -BootstrapNuGetExe -Force } Write-Host 'Publishing module to PowerShellGet' $null = Publish-Module -Path $buildDir -NuGetApiKey $ApiKey -Confirm:$false -Force } catch { Write-Error -ErrorRecord $_ exit 1 }
combined_dataset/train/non-malicious/1868.ps1
1868.ps1
Add-TestDynamicType Describe "Where-Object" -Tags "CI" { BeforeAll { $Computers = @( [PSCustomObject]@{ ComputerName = "SPC-1234" IPAddress = "192.168.0.1" NumberOfCores = 1 Drives = 'C','D' }, [PSCustomObject]@{ ComputerName = "BGP-5678" IPAddress = "" NumberOfCores = 2 Drives = 'C','D','E' }, [PSCustomObject]@{ ComputerName = "MGC-9101" NumberOfCores = 3 Drives = 'C' } ) } It "Where-Object -Not Prop" { $Result = $Computers | Where-Object -Not 'IPAddress' $Result | Should -HaveCount 2 } It 'Where-Object -FilterScript {$true -ne $_.Prop}' { $Result = $Computers | Where-Object -FilterScript {$true -ne $_.IPAddress} $Result | Should -HaveCount 2 } It "Where-Object Prop" { $Result = $Computers | Where-Object 'IPAddress' $Result | Should -HaveCount 1 } It 'Where-Object -FilterScript {$true -eq $_.Prop}' { $Result = $Computers | Where-Object -FilterScript {$true -eq $_.IPAddress} $Result | Should -HaveCount 1 } It 'Where-Object -FilterScript {$_.Prop -contains Value}' { $Result = $Computers | Where-Object -FilterScript {$_.Drives -contains 'D'} $Result | Should -HaveCount 2 } It 'Where-Object Prop -contains Value' { $Result = $Computers | Where-Object Drives -contains 'D' $Result | Should -HaveCount 2 } It 'Where-Object -FilterScript {$_.Prop -in $Array}' { $Array = 'SPC-1234','BGP-5678' $Result = $Computers | Where-Object -FilterScript {$_.ComputerName -in $Array} $Result | Should -HaveCount 2 } It 'Where-Object $Array -in Prop' { $Array = 'SPC-1234','BGP-5678' $Result = $Computers | Where-Object ComputerName -in $Array $Result | Should -HaveCount 2 } It 'Where-Object -FilterScript {$_.Prop -ge 2}' { $Result = $Computers | Where-Object -FilterScript {$_.NumberOfCores -ge 2} $Result | Should -HaveCount 2 } It 'Where-Object Prop -ge 2' { $Result = $Computers | Where-Object NumberOfCores -ge 2 $Result | Should -HaveCount 2 } It 'Where-Object -FilterScript {$_.Prop -gt 2}' { $Result = $Computers | Where-Object -FilterScript {$_.NumberOfCores -gt 2} $Result | Should -HaveCount 1 } It 'Where-Object Prop -gt 2' { $Result = $Computers | Where-Object NumberOfCores -gt 2 $Result | Should -HaveCount 1 } It 'Where-Object -FilterScript {$_.Prop -le 2}' { $Result = $Computers | Where-Object -FilterScript {$_.NumberOfCores -le 2} $Result | Should -HaveCount 2 } It 'Where-Object Prop -le 2' { $Result = $Computers | Where-Object NumberOfCores -le 2 $Result | Should -HaveCount 2 } It 'Where-Object -FilterScript {$_.Prop -lt 2}' { $Result = $Computers | Where-Object -FilterScript {$_.NumberOfCores -lt 2} $Result | Should -HaveCount 1 } It 'Where-Object Prop -lt 2' { $Result = $Computers | Where-Object NumberOfCores -lt 2 $Result | Should -HaveCount 1 } It 'Where-Object -FilterScript {$_.Prop -Like Value}' { $Result = $Computers | Where-Object -FilterScript {$_.ComputerName -like 'MGC-9101'} $Result | Should -HaveCount 1 } It 'Where-Object Prop -like Value' { $Result = $Computers | Where-Object ComputerName -like 'MGC-9101' $Result | Should -HaveCount 1 } It 'Where-Object -FilterScript {$_.Prop -Match Pattern}' { $Result = $Computers | Where-Object -FilterScript {$_.ComputerName -match '^MGC.+'} $Result | Should -HaveCount 1 } It 'Where-Object Prop -like Value' { $Result = $Computers | Where-Object ComputerName -match '^MGC.+' $Result | Should -HaveCount 1 } It 'Where-Object should handle dynamic (DLR) objects' { $dynObj = [TestDynamic]::new() $Result = $dynObj, $dynObj | Where-Object FooProp -eq 123 $Result | Should -HaveCount 2 $Result[0] | Should -Be $dynObj $Result[1] | Should -Be $dynObj } It 'Where-Object should handle dynamic (DLR) objects, even without property name hint' { $dynObj = [TestDynamic]::new() $Result = $dynObj, $dynObj | Where-Object HiddenProp -eq 789 $Result | Should -HaveCount 2 $Result[0] | Should -Be $dynObj $Result[1] | Should -Be $dynObj } }
combined_dataset/train/non-malicious/sample_1_96.ps1
sample_1_96.ps1
ConvertFrom-StringData @' progressbar_id_crm_unsupportedcustomapp_exists=Custom Applications Under CRMAppPool Check progressbar_id_crm_unsupportedcustomapp_existsdesc=Creating an IIS application inside the Microsoft Dynamics CRM Website for any VDir and specifically within the ISV folder is not supported. '@ # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAfO7a0ItayoDn+ # W8S/SjnIMpCh4sjkKcrsGynSLkwOZ6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGKrMSVcl5uPIJn0P/xjzvz8 # DYZk5JY5CD4AWiLwUoo/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAsmEeO8a/YG7U/q2kjK2h5/kcW4+gc/yrgUhBct+5dt7v948s0jWCCQMh # P4EXAaam8/Fzb8bVIUy8bHKgaMHVOxCcMrb9UAwjcw+q8PXkmcwyzwHdejS85bDH # 3bPZMN4VTQNYLjITWAvC2mVXCj1pqZ1rx3cHEbn0p2q2+7wTURYmDk7eZlF+on/u # FfoeE7L3TQUk4RgZzmcz1K1y2rzWP62LFKbPk0IZv79pVZUHvhWhNN4zU7WjFSJU # /yGrejk2maF3jYMTMUTrH9K9zIZ4QTsAy2UnfLNdD28VT5TITvKeF8auAUjXdalQ # zjUMLJo4miI/dscx7K3453pRH8aTmKGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDSDQqfXVYZ/zmAFg+GqDykL9YxMH8kZgSEp5NOs/dokQIGZutLSAN7 # GBMyMDI0MTAyODExNDAzOS44ODJaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4fPfBZdahAAEAAAH/MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjRDMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyeiV0pB7bg8/qc/mkiDd # JXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4dU4VCkAZEXqvkxP5QNTtB # G5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqhhxfHFV7vhtmqHLCCmDxh # ZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAnncUdtp1xjGmCpdBMygk/ # K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTMKjYD6pLeBP0hZDh5P3f4 # xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L0SdR7qQlv5pwDNerbK3Y # SEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr9/fIEpPAlC8YisxXaGX4 # RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqfRuWzdUir0Z3jiOOtaDq7 # XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbiaboi12usV8axtlT/dCeP # C4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA4y3s6G+gQ35o90j2i6am # aa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49tdsWTIgZWVOSS9uUHhSY # kbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTD+pXk/rT/ # d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOSNN5MpLiyun # m866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUAp6WtgolIrativXjOG1lI # jayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyfOievfbsIzTk/G51+uiUJ # k772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkGZjq/O4Z/PcmVGtjGps2T # CtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3kN8N56jpl9kotLhdvd89 # RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU3dLYTAI91gTNUF7BA9q1 # EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0Ty0PD83aCt79Ra0IdDIMS # uwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOdgRe8tXdGrgDoBeuVOK+c # RClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tytuulYYcRK95qihF0irQs6 # /WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3XRROwAv016ICuT8hY1In # yW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTSY4OGuGU1SXaH49JSP3t8 # yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUlcnPkwRLFRPXFspmggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0MTAyOTA5Mzk0OVowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEAAgIFPAIB/zAHAgEAAgIU # KTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAuUNJmV2WE # mZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaHyPjIBqzVVX+OsCmMA4rC # SBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cqWgcxpcvR5+XFiKoxtNrZ # +ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedWcWiD6dyYPjiJ10ZllDJA # kIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7aY8kNavDIwAwm/WFtYzSw # Fv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4swD4QJBUY7k+61Fk5XlZ # u6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgHshdMhEd # edRzV0JaUATm5PVUGzck+QwUyoURSwyehdwwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDjSEV8upyn/TCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/xI4fPfBZdahAAEA # AAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJkD9cXZckbMA0GCSqGSIb3 # DQEBCwUABIICAIBUIoIjnPyBRLDoSHrezfdTrAht9XJ74NmsbWNmJbffN7PQm808 # LeC8pCHK3swQhe9PteHJSOs8sNKAOx5N4FKb+ssl3c0JBJHtGV3tMMdvg/VjDs9b # Di9EbB46Hp8pfhjpSHoVUwzj7AB3DPc5xCXcvunILIwVZIBkQvwGUViBY5ZzsyvL # 1hv876oYm0xpQQekLt7EkHyBcUvUpHo2Cderfs8nH0MjDrQI9VvU4JeLkkYqmgM5 # lIquZQ3H9XBlFqgijTD25aeWo/FM4anF+yizd5itNEyIRRwnmsxKIxODQkDh6re9 # GYb6e+7q6AT9+V39GsFTJ9EFU5m21ZwkitaJDtiEJ5axTRvW+DLQYhMRYFrkPEva # IxLJhzaNIHEWjf93yJ3rcR+zYMQATOI1LDTJlW2dLSDyLIGBo0usnghY601txgxD # 0RSO1k9PZcpQt5+nysHYJJ0sgmY/VUZqvSOX52TQ/+z9Lp40sPT/BkpWIdVmlQpe # 2P+mu3Jgzga84VW/o89zXaW2TgOFK1Q/b0E4ppkRhF+bHfHDcW2uWwfQBpvxpGLP # gqP//GFrgEJjbYZ6ddoa5bg7leQOUw8+USg6fVgm8pY/fBncwwxduS8dJoCrMtZ/ # ylmZasoA/ICDY/byDFvZaw0jJqOnd6A3fAHvcsmwk8JyqS7CugsXxW2f # SIG # End signature block
combined_dataset/train/non-malicious/Test-Server_2.ps1
Test-Server_2.ps1
Function Test-Server{ [cmdletBinding()] param( [parameter(Mandatory=$true,ValueFromPipeline=$true)] [string[]]$ComputerName, [parameter(Mandatory=$false)] [switch]$CredSSP, [Management.Automation.PSCredential] $Credential) begin{ $total = Get-Date $results = @() if($credssp){if(!($credential)){Write-Host "must supply Credentials with CredSSP test";break}} } process{ foreach($name in $computername) { $dt = $cdt= Get-Date Write-verbose "Testing: $Name" $failed = 0 try{ $DNSEntity = [Net.Dns]::GetHostEntry($name) $domain = ($DNSEntity.hostname).replace("$name.","") $ips = $DNSEntity.AddressList | %{$_.IPAddressToString} } catch { $rst = "" | select Name,IP,Domain,Ping,WSMAN,CredSSP,RemoteReg,RPC,RDP $rst.name = $name $results += $rst $failed = 1 } Write-verbose "DNS: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" if($failed -eq 0){ foreach($ip in $ips) { $rst = "" | select Name,IP,Domain,Ping,WSMAN,CredSSP,RemoteReg,RPC,RDP $rst.name = $name $rst.ip = $ip $rst.domain = $domain ####RDP Check (firewall may block rest so do before ping try{ $socket = New-Object Net.Sockets.TcpClient($name, 3389) if($socket -eq $null) { $rst.RDP = $false } else { $rst.RDP = $true $socket.close() } } catch { $rst.RDP = $false } Write-verbose "RDP: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" #########ping if(test-connection $ip -count 1 -Quiet) { Write-verbose "PING: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" $rst.ping = $true try{############wsman Test-WSMan $ip | Out-Null $rst.WSMAN = $true } catch {$rst.WSMAN = $false} Write-verbose "WSMAN: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" if($rst.WSMAN -and $credssp) ########### credssp { try{ Test-WSMan $ip -Authentication Credssp -Credential $cred $rst.CredSSP = $true } catch {$rst.CredSSP = $false} Write-verbose "CredSSP: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" } try ########remote reg { [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine, $ip) | Out-Null $rst.remotereg = $true } catch {$rst.remotereg = $false} Write-verbose "remote reg: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" try ######### wmi { $w = [wmi] '' $w.psbase.options.timeout = 15000000 $w.path = "\\\\$Name\\root\\cimv2:Win32_ComputerSystem.Name='$Name'" $w | select none | Out-Null $rst.RPC = $true } catch {$rst.rpc = $false} Write-verbose "WMI: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)" } else { $rst.ping = $false $rst.wsman = $false $rst.credssp = $false $rst.remotereg = $false $rst.rpc = $false } $results += $rst }} Write-Verbose "Time for $($Name): $((New-TimeSpan $cdt ($dt)).totalseconds)" Write-Verbose "----------------------------" } } end{ Write-Verbose "Time for all: $((New-TimeSpan $total ($dt)).totalseconds)" Write-Verbose "----------------------------" return $results } }
combined_dataset/train/non-malicious/sample_67_21.ps1
sample_67_21.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$true)] [string] $FabricRuntimePackageOutputDirectory ) $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } if(!$AcceptEULA.IsPresent) { $EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software. [Y] Yes [N] No [?] Help (default is "N")' if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y") { Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red" exit 1 } } $ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents" if(!(Test-Path $DeployerBinPath)) { $DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe" if(!(Test-Path $DCAutoExtractorPath)) { Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location." exit 1 } #Extract DeploymentComponents $DCExtractArguments = "/E /Y /L `"$ThisScriptPath`"" $DCExtractOutput = cmd.exe /c "$DCAutoExtractorPath $DCExtractArguments && exit 0 || exit 1" if($LASTEXITCODE -eq 1) { Write-Host "Extracting DeploymentComponents Cab ran into an issue." Write-Host $DCExtractOutput exit 1 } else { Write-Host "DeploymentComponents extracted." } } $SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll" if(!(Test-Path $SystemFabricModulePath)) { Write-Host "Run the script local to the Standalone package directory." exit 1 } $ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1" $FabricRuntimePackageOutputDirectoryAbsolutePath = Resolve-Path $FabricRuntimePackageOutputDirectory if(!(Test-Path $FabricRuntimePackageOutputDirectoryAbsolutePath)) { Write-Host "Output directory specified does not exist." exit 1 } # Invoke in separate AppDomain $argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $FabricRuntimePackageOutputDirectoryAbsolutePath) Powershell -Command { param ( [Parameter(Mandatory=$true)] [string] $DeployerBinPath, [Parameter(Mandatory=$true)] [string] $ServiceFabricPowershellModulePath, [Parameter(Mandatory=$true)] [string] $FabricRuntimePackageOutputDirectoryAbsolutePath ) #Add FabricCodePath Environment Path $env:path = "$($DeployerBinPath);" + $env:path #Import Service Fabric Powershell Module Import-Module $ServiceFabricPowershellModulePath #Download Runtime Package Try { $RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion -Latest $RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $RuntimePackageDetails.GoalRuntimeVersion + ".cab" $MicrosoftServiceFabricCabFilePath = Join-Path $FabricRuntimePackageOutputDirectoryAbsolutePath -ChildPath $RuntimeCabFilename if(!(Test-Path $MicrosoftServiceFabricCabFilePath)) { $Version = $RuntimePackageDetails.GoalRuntimeVersion Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded." (New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath) Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath." } Resolve-Path $MicrosoftServiceFabricCabFilePath } Catch { Write-Host "Runtime package cannot be downloaded. Check you internet connectivity. If the cluster is not connected to the internet use DownloadServiceFabricRuntimePackage.ps1 script to download the latest package. Then run CreateServiceFabricCluster.ps1 -ClusterConfigurationFilePath <ClusterConfigFilePath> -FabricRuntimePackagePath <RuntimePackagePath> to create the cluster. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } -args $argList -OutputFormat Text $env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine") # SIG # Begin signature block # MIIdmwYJKoZIhvcNAQcCoIIdjDCCHYgCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUs/fl3ysxyqijyxkIu1UTIjuD # pc+gghhfMIIE2jCCA8KgAwIBAgITMwAAAQ4bLwsITDNxqAAAAAABDjANBgkqhkiG # 9w0BAQUFADB3MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSEw # HwYDVQQDExhNaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EwHhcNMTgwODIzMjAyMDM5 # WhcNMTkxMTIzMjAyMDM5WjCByjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEm # MCQGA1UECxMdVGhhbGVzIFRTUyBFU046MTJCNC0yRDVGLTg3RDQxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggEiMA0GCSqGSIb3DQEBAQUA # A4IBDwAwggEKAoIBAQD2of4BuJr+l5YdMhnQvz9mz4sRndB3DovL3qM02OdJEAPl # JqWDe8/ZdjYqpHBzMuPvkw8+JnoHr0TpY/WQFk/hE34F01TqkhsDuqsaLqe8V24m # 8c9jcmfDcmx0yR7QZ/DdY8FbkrWck/ePKHKq4hRFhX2ynZlsVy0HGiuuSoj9q8iQ # 5mku3z3DnC4heY9+v0h7KhKCgieimEqzrpHpvyHK+s91aMhpWjpTol0nZxyHbFTq # 95wLkp6IqHIsyxtXwHJFmM+T3TVtccsxU2ckEvzJtzCm2Ee66HJBtI2G4OoSReK8 # 1BTC1xlNWQkSXLD5MvquL3dVevzEGDL9sCw5jyFxAgMBAAGjggEJMIIBBTAdBgNV # HQ4EFgQUXpkTOkaccb8xG34+iCz+a4ZPT64wHwYDVR0jBBgwFoAUIzT42VJGcArt # QPt2+7MrsMM1sw8wVAYDVR0fBE0wSzBJoEegRYZDaHR0cDovL2NybC5taWNyb3Nv # ZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0VGltZVN0YW1wUENBLmNy # bDBYBggrBgEFBQcBAQRMMEowSAYIKwYBBQUHMAKGPGh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljcm9zb2Z0VGltZVN0YW1wUENBLmNydDATBgNV # HSUEDDAKBggrBgEFBQcDCDANBgkqhkiG9w0BAQUFAAOCAQEAMVyya9youGq7xaZi # +3mc7Hv2USRlEsJny2Y9C0KHl1CUv3W1hLl9hHcOBTbYCkPybLbp4DDM00qGVQDt # kBKoRHOESHd8xX7iP20EVj7YoH8bba8qoIVT/71F6tcldmwNaxA9TiLp9ClPhvOd # fJBbN+Pem4DpPBT9NOgotvCBCFF0NXizqkk9wtEYdMTqxLYEs8napK/4rKx4CtW8 # IobSaURZhlRla9ph6BRkMQv1NcfsgzWgHkvT9RRL2zLSk7opGdo6HtUX6SCKFjQ7 # WaP8lllCOmpMVFNlSDpmY2GC9358vGL4scKii6lygcMevVlbxqmoV/ay0OyhKWNS # tbZ54DCCBfQwggPcoAMCAQICEzMAAAECm/ALp45dw00AAAAAAQIwDQYJKoZIhvcN # AQELBQAwfjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG # A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMTAeFw0xODA3MTIy # MDA4NDhaFw0xOTA3MjYyMDA4NDhaMHQxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xHjAcBgNVBAMTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANQMBgSFCJYop+lrdNDiYZPjpTBf # 9QjDW4T2wacw94hKh51p1Ph+8LLz89lGtOFkFf1vnsoWx1ioo5mM1af88Y0ad2Ds # XUULx5tqUQmEA5LkEGqo+3I4DToEx7BWQS9MlKuwwMiiL5/R8wPZCQGlC6jdFaZe # Yiihqq7b2tVEmqMJMtnFK9rsK20RjPXRHZpzcP+a+OilunSo6nZze9WW8Bi4J8zo # 7ZRGEbhpl5X4mLNxmDHue9i7dbU5XyJkeQ1Z6qaEOPH6j2OXrFQXusmdP2UtN5fq # fnAcmeXa4+puPtclHN8YBJ1r4EOEY28FSLG5XTwmaKwxyv1+7u7a22xGw1sCAwEA # AaOCAXMwggFvMB8GA1UdJQQYMBYGCisGAQQBgjdMCAEGCCsGAQUFBwMDMB0GA1Ud # DgQWBBSJFwWujTtn71whoV8lsN1JuTdO7zBFBgNVHREEPjA8pDowODEeMBwGA1UE # CxMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMRYwFAYDVQQFEw0yMzAwMTIrNDM3OTY0 # MB8GA1UdIwQYMBaAFEhuZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBH # oEWGQ2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNp # Z1BDQTIwMTFfMjAxMS0wNy0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUF # BzAChkVodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0Nv # ZFNpZ1BDQTIwMTFfMjAxMS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG # 9w0BAQsFAAOCAgEAk/YCcku0liV5Dhj7G7SYmGisI5nl62F8EeChIwDJfvNJKOB1 # /fNoxBnGoFZVaiK7NVUlG8FmcnOnYiK0QW6HMHosY6QmLX/5QLF4ecXD9XuNoefo # QFZneTUEdmAmV402GZItm9ht0EFKxUzXHcd28nqzPyUTj43bK9dPFMnCZYqjG7nf # 4sQYWAWs8e0MS+fkhH9EYstmopIqt8iRc0o8+4unKv/iYbQRWQHXi2uWIYatRm7b # qplfsfBg6Oj4OSoSRlZ7WXt8DQL1nAIUthX8Z1v/siivkBGpOHz0RX8gH/Qrv1XJ # LdVjU8DrF6Agi5gY5Vf1ApQyhBJvOlBv9daFEue3MwPBxUcw9oeP/H+JCmIZpRNI # yw8+X5SAVlkws9PIdPogPc4xiG5asNzG5MivUwioKlk5unq6VD0wgz1BmW3Wz9jo # sCWkPNSL5itVFHo+mpE5P4x+u1eElRAmQ8JmhNwrmSPMTU8l8dBAOUnvPy3RUbI+ # C70q1D2hb/VwqZ9rVZlBKWkSU6hL81PiyLZRN/1rvzvPrxfsgnhwoScAePRTs+HJ # kUnmwLTPm9kxZVtAlwToOAGT4gnHK/v5vwh+ApOevIRAPEvCZfzu9TYUJTVrizEk # QCVUA6RmR7PQI7aPF8mw72ByKIQk4KgINwrunNgHHoWLnM8Un6Hmku/VdYcwggYH # MIID76ADAgECAgphFmg0AAAAAAAcMA0GCSqGSIb3DQEBBQUAMF8xEzARBgoJkiaJ # k/IsZAEZFgNjb20xGTAXBgoJkiaJk/IsZAEZFgltaWNyb3NvZnQxLTArBgNVBAMT # JE1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNzA0MDMx # MjUzMDlaFw0yMTA0MDMxMzAzMDlaMHcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xITAfBgNVBAMTGE1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQTCC # ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ+hbLHf20iSKnxrLhnhveLj # xZlRI1Ctzt0YTiQP7tGn0UytdDAgEesH1VSVFUmUG0KSrphcMCbaAGvoe73siQcP # 9w4EmPCJzB/LMySHnfL0Zxws/HvniB3q506jocEjU8qN+kXPCdBer9CwQgSi+aZs # k2fXKNxGU7CG0OUoRi4nrIZPVVIM5AMs+2qQkDBuh/NZMJ36ftaXs+ghl3740hPz # CLdTbVK0RZCfSABKR2YRJylmqJfk0waBSqL5hKcRRxQJgp+E7VV4/gGaHVAIhQAQ # MEbtt94jRrvELVSfrx54QTF3zJvfO4OToWECtR0Nsfz3m7IBziJLVP/5BcPCIAsC # AwEAAaOCAaswggGnMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFCM0+NlSRnAK # 7UD7dvuzK7DDNbMPMAsGA1UdDwQEAwIBhjAQBgkrBgEEAYI3FQEEAwIBADCBmAYD # VR0jBIGQMIGNgBQOrIJgQFYnl+UlE/wq4QpTlVnkpKFjpGEwXzETMBEGCgmSJomT # 8ixkARkWA2NvbTEZMBcGCgmSJomT8ixkARkWCW1pY3Jvc29mdDEtMCsGA1UEAxMk # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5ghB5rRahSqClrUxz # WPQHEy5lMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwubWljcm9zb2Z0LmNv # bS9wa2kvY3JsL3Byb2R1Y3RzL21pY3Jvc29mdHJvb3RjZXJ0LmNybDBUBggrBgEF # BQcBAQRIMEYwRAYIKwYBBQUHMAKGOGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w # a2kvY2VydHMvTWljcm9zb2Z0Um9vdENlcnQuY3J0MBMGA1UdJQQMMAoGCCsGAQUF # BwMIMA0GCSqGSIb3DQEBBQUAA4ICAQAQl4rDXANENt3ptK132855UU0BsS50cVtt # DBOrzr57j7gu1BKijG1iuFcCy04gE1CZ3XpA4le7r1iaHOEdAYasu3jyi9DsOwHu # 4r6PCgXIjUji8FMV3U+rkuTnjWrVgMHmlPIGL4UD6ZEqJCJw+/b85HiZLg33B+Jw # vBhOnY5rCnKVuKE5nGctxVEO6mJcPxaYiyA/4gcaMvnMMUp2MT0rcgvI6nA9/4UK # E9/CCmGO8Ne4F+tOi3/FNSteo7/rvH0LQnvUU3Ih7jDKu3hlXFsBFwoUDtLaFJj1 # PLlmWLMtL+f5hYbMUVbonXCUbKw5TNT2eb+qGHpiKe+imyk0BncaYsk9Hm0fgvAL # xyy7z0Oz5fnsfbXjpKh0NbhOxXEjEiZ2CzxSjHFaRkMUvLOzsE1nyJ9C/4B5IYCe # FTBm6EISXhrIniIh0EPpK+m79EjMLNTYMoBMJipIJF9a6lbvpt6Znco6b72BJ3QG # Ee52Ib+bgsEnVLaxaj2JoXZhtG6hE6a/qkfwEm/9ijJssv7fUciMI8lmvZ0dhxJk # Aj0tr1mPuOQh5bWwymO0eFQF1EEuUKyUsKV4q7OglnUa2ZKHE3UiLzKoCG6gW4wl # v6DvhMoh1useT8ma7kng9wFlb4kLfchpyOZu6qeXzjEp/w7FW1zYTRuh2Povnj8u # VRZryROj/TCCB3owggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQELBQAw # gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT # KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx # MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmlu # ZyBQQ0EgMjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQ # HC6t2G6qghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vGEtgL8DjCmQaw # yDnVARQxQtOJDXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/XllnKYBoF # 6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5kNXimoGMP # LdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt7UOR # g9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKdgCz1 # TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl # mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd # D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZ # xe/CHFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4 # X7IvhNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11g # lZo+TzOE2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEE # AYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0fBFMwUTBP # oE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRSMFAw # TgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv # TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR # BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIg # HQBMAGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4g # HTANBgkqhkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3S # eQyQwWVfLiw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQfYtGUFXYDJJ8 # 0hpLHPM8QotS0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32mkHSDjfTL # JgJGKsKKELukqQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr3vw70L01 # 724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsatruWy # 2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNNZgvA # s0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj # Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX # pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1 # eBrs6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BX # IqF4ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJz # Ew16UM0xggSmMIIEogIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAy # MDExAhMzAAABApvwC6eOXcNNAAAAAAECMAkGBSsOAwIaBQCggbowGQYJKoZIhvcN # AQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUw # IwYJKoZIhvcNAQkEMRYEFIhboonRzh3kYumP29LfTo7qX5bgMFoGCisGAQQBgjcC # AQwxTDBKoCSAIgBNAGkAYwByAG8AcwBvAGYAdAAgAFcAaQBuAGQAbwB3AHOhIoAg # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3dpbmRvd3MwDQYJKoZIhvcNAQEBBQAE # ggEAQe28BR/W654xLEgVfF8E/xcAxFRsb+ThRQMqAWt+sdMxVHpAaAZocfdkdnXe # 5v2N4l21WurUX2h1TeWKTpErOmTLVvxb98SFdCAAPLM/dImXroMqGww+824ZSARm # y6HSzcY9phZr5H8uu+OENTC5aYONEZouXxDvurXYY5aOpOTmWU9RwKU74HGRlW1e # 4w9fqYYPXuhjB40eqWwb4mKH12WTDw/JvhofPXtEwrCVFp7nnkx9u5jVobwM01VE # mMKzV0GHgzH9TtCkzy2n8WvRtvNsTPRc8RRqibMOILDcHPK+yF/LwjmIPrkqXnfv # I6KF20fnD4yIVV9CM0n/WoqrCaGCAigwggIkBgkqhkiG9w0BCQYxggIVMIICEQIB # ATCBjjB3MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSEwHwYD # VQQDExhNaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0ECEzMAAAEOGy8LCEwzcagAAAAA # AQ4wCQYFKw4DAhoFAKBdMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZI # hvcNAQkFMQ8XDTE4MTEyMTEzMzg0OVowIwYJKoZIhvcNAQkEMRYEFM91ADY+m7rE # dmjxS9TuTRAZWgKfMA0GCSqGSIb3DQEBBQUABIIBAJ+7oIN/SsP4MYBehXFpKZe0 # EonTgsTSInRoiWOFqrx8RoxvjzDXFesJyqbs3k4Y8A0qeMBmI0lKZMuf7XBn72C4 # bSxux/7zoFwIA2QzXZNURAk6d1PvFkiGvUuN5Su7uunVwLwJfZ/bqkveDCEFuBDG # MtSvHWCaDXpfWTuqOrgYQweWX95A0PZsNI9TmIYBiGBankLP2bgsTmp+fHLxcZ3p # 90bxWCfvO1E96qNm/XAAencr3QTuuWfcs1nTSpP3rmHsXbjez+LphcA17MFPScU9 # 5ROoechsJ1QUtOZ7cVPOaFuoot+Z0ZilEDwNkQMGeVF6FozLcOpEy6AY/YAk9gY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_51_34.ps1
sample_51_34.ps1
/*!----------------------------------------------------------------------------- * Copyright (c) Microsoft Corporation. All rights reserved. * Version: 0.46.0(21007360cad28648bdf46282a2592cb47c3a7a6f) * Released under the MIT license * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt *-----------------------------------------------------------------------------*/ define("vs/basic-languages/powerquery/powerquery", ["require"],(require)=>{ "use strict"; var moduleExports = (() => { var __defProp = Object.defineProperty; var __getOwnPropDesc = Object.getOwnPropertyDescriptor; var __getOwnPropNames = Object.getOwnPropertyNames; var __hasOwnProp = Object.prototype.hasOwnProperty; var __export = (target, all) => { for (var name in all) __defProp(target, name, { get: all[name], enumerable: true }); }; var __copyProps = (to, from, except, desc) => { if (from && typeof from === "object" || typeof from === "function") { for (let key of __getOwnPropNames(from)) if (!__hasOwnProp.call(to, key) && key !== except) __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable }); } return to; }; var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod); // src/basic-languages/powerquery/powerquery.ts var powerquery_exports = {}; __export(powerquery_exports, { conf: () => conf, language: () => language }); var conf = { comments: { lineComment: "//", blockComment: ["/*", "*/"] }, brackets: [ ["[", "]"], ["(", ")"], ["{", "}"] ], autoClosingPairs: [ { open: '"', close: '"', notIn: ["string", "comment", "identifier"] }, { open: "[", close: "]", notIn: ["string", "comment", "identifier"] }, { open: "(", close: ")", notIn: ["string", "comment", "identifier"] }, { open: "{", close: "}", notIn: ["string", "comment", "identifier"] } ] }; var language = { defaultToken: "", tokenPostfix: ".pq", ignoreCase: false, brackets: [ { open: "[", close: "]", token: "delimiter.square" }, { open: "{", close: "}", token: "delimiter.brackets" }, { open: "(", close: ")", token: "delimiter.parenthesis" } ], operatorKeywords: ["and", "not", "or"], keywords: [ "as", "each", "else", "error", "false", "if", "in", "is", "let", "meta", "otherwise", "section", "shared", "then", "true", "try", "type" ], constructors: ["#binary", "#date", "#datetime", "#datetimezone", "#duration", "#table", "#time"], constants: ["#infinity", "#nan", "#sections", "#shared"], typeKeywords: [ "action", "any", "anynonnull", "none", "null", "logical", "number", "time", "date", "datetime", "datetimezone", "duration", "text", "binary", "list", "record", "table", "function" ], builtinFunctions: [ "Access.Database", "Action.Return", "Action.Sequence", "Action.Try", "ActiveDirectory.Domains", "AdoDotNet.DataSource", "AdoDotNet.Query", "AdobeAnalytics.Cubes", "AnalysisServices.Database", "AnalysisServices.Databases", "AzureStorage.BlobContents", "AzureStorage.Blobs", "AzureStorage.Tables", "Binary.Buffer", "Binary.Combine", "Binary.Compress", "Binary.Decompress", "Binary.End", "Binary.From", "Binary.FromList", "Binary.FromText", "Binary.InferContentType", "Binary.Length", "Binary.ToList", "Binary.ToText", "BinaryFormat.7BitEncodedSignedInteger", "BinaryFormat.7BitEncodedUnsignedInteger", "BinaryFormat.Binary", "BinaryFormat.Byte", "BinaryFormat.ByteOrder", "BinaryFormat.Choice", "BinaryFormat.Decimal", "BinaryFormat.Double", "BinaryFormat.Group", "BinaryFormat.Length", "BinaryFormat.List", "BinaryFormat.Null", "BinaryFormat.Record", "BinaryFormat.SignedInteger16", "BinaryFormat.SignedInteger32", "BinaryFormat.SignedInteger64", "BinaryFormat.Single", "BinaryFormat.Text", "BinaryFormat.Transform", "BinaryFormat.UnsignedInteger16", "BinaryFormat.UnsignedInteger32", "BinaryFormat.UnsignedInteger64", "Byte.From", "Character.FromNumber", "Character.ToNumber", "Combiner.CombineTextByDelimiter", "Combiner.CombineTextByEachDelimiter", "Combiner.CombineTextByLengths", "Combiner.CombineTextByPositions", "Combiner.CombineTextByRanges", "Comparer.Equals", "Comparer.FromCulture", "Comparer.Ordinal", "Comparer.OrdinalIgnoreCase", "Csv.Document", "Cube.AddAndExpandDimensionColumn", "Cube.AddMeasureColumn", "Cube.ApplyParameter", "Cube.AttributeMemberId", "Cube.AttributeMemberProperty", "Cube.CollapseAndRemoveColumns", "Cube.Dimensions", "Cube.DisplayFolders", "Cube.Measures", "Cube.Parameters", "Cube.Properties", "Cube.PropertyKey", "Cube.ReplaceDimensions", "Cube.Transform", "Currency.From", "DB2.Database", "Date.AddDays", "Date.AddMonths", "Date.AddQuarters", "Date.AddWeeks", "Date.AddYears", "Date.Day", "Date.DayOfWeek", "Date.DayOfWeekName", "Date.DayOfYear", "Date.DaysInMonth", "Date.EndOfDay", "Date.EndOfMonth", "Date.EndOfQuarter", "Date.EndOfWeek", "Date.EndOfYear", "Date.From", "Date.FromText", "Date.IsInCurrentDay", "Date.IsInCurrentMonth", "Date.IsInCurrentQuarter", "Date.IsInCurrentWeek", "Date.IsInCurrentYear", "Date.IsInNextDay", "Date.IsInNextMonth", "Date.IsInNextNDays", "Date.IsInNextNMonths", "Date.IsInNextNQuarters", "Date.IsInNextNWeeks", "Date.IsInNextNYears", "Date.IsInNextQuarter", "Date.IsInNextWeek", "Date.IsInNextYear", "Date.IsInPreviousDay", "Date.IsInPreviousMonth", "Date.IsInPreviousNDays", "Date.IsInPreviousNMonths", "Date.IsInPreviousNQuarters", "Date.IsInPreviousNWeeks", "Date.IsInPreviousNYears", "Date.IsInPreviousQuarter", "Date.IsInPreviousWeek", "Date.IsInPreviousYear", "Date.IsInYearToDate", "Date.IsLeapYear", "Date.Month", "Date.MonthName", "Date.QuarterOfYear", "Date.StartOfDay", "Date.StartOfMonth", "Date.StartOfQuarter", "Date.StartOfWeek", "Date.StartOfYear", "Date.ToRecord", "Date.ToText", "Date.WeekOfMonth", "Date.WeekOfYear", "Date.Year", "DateTime.AddZone", "DateTime.Date", "DateTime.FixedLocalNow", "DateTime.From", "DateTime.FromFileTime", "DateTime.FromText", "DateTime.IsInCurrentHour", "DateTime.IsInCurrentMinute", "DateTime.IsInCurrentSecond", "DateTime.IsInNextHour", "DateTime.IsInNextMinute", "DateTime.IsInNextNHours", "DateTime.IsInNextNMinutes", "DateTime.IsInNextNSeconds", "DateTime.IsInNextSecond", "DateTime.IsInPreviousHour", "DateTime.IsInPreviousMinute", "DateTime.IsInPreviousNHours", "DateTime.IsInPreviousNMinutes", "DateTime.IsInPreviousNSeconds", "DateTime.IsInPreviousSecond", "DateTime.LocalNow", "DateTime.Time", "DateTime.ToRecord", "DateTime.ToText", "DateTimeZone.FixedLocalNow", "DateTimeZone.FixedUtcNow", "DateTimeZone.From", "DateTimeZone.FromFileTime", "DateTimeZone.FromText", "DateTimeZone.LocalNow", "DateTimeZone.RemoveZone", "DateTimeZone.SwitchZone", "DateTimeZone.ToLocal", "DateTimeZone.ToRecord", "DateTimeZone.ToText", "DateTimeZone.ToUtc", "DateTimeZone.UtcNow", "DateTimeZone.ZoneHours", "DateTimeZone.ZoneMinutes", "Decimal.From", "Diagnostics.ActivityId", "Diagnostics.Trace", "DirectQueryCapabilities.From", "Double.From", "Duration.Days", "Duration.From", "Duration.FromText", "Duration.Hours", "Duration.Minutes", "Duration.Seconds", "Duration.ToRecord", "Duration.ToText", "Duration.TotalDays", "Duration.TotalHours", "Duration.TotalMinutes", "Duration.TotalSeconds", "Embedded.Value", "Error.Record", "Excel.CurrentWorkbook", "Excel.Workbook", "Exchange.Contents", "Expression.Constant", "Expression.Evaluate", "Expression.Identifier", "Facebook.Graph", "File.Contents", "Folder.Contents", "Folder.Files", "Function.From", "Function.Invoke", "Function.InvokeAfter", "Function.IsDataSource", "GoogleAnalytics.Accounts", "Guid.From", "HdInsight.Containers", "HdInsight.Contents", "HdInsight.Files", "Hdfs.Contents", "Hdfs.Files", "Informix.Database", "Int16.From", "Int32.From", "Int64.From", "Int8.From", "ItemExpression.From", "Json.Document", "Json.FromValue", "Lines.FromBinary", "Lines.FromText", "Lines.ToBinary", "Lines.ToText", "List.Accumulate", "List.AllTrue", "List.Alternate", "List.AnyTrue", "List.Average", "List.Buffer", "List.Combine", "List.Contains", "List.ContainsAll", "List.ContainsAny", "List.Count", "List.Covariance", "List.DateTimeZones", "List.DateTimes", "List.Dates", "List.Difference", "List.Distinct", "List.Durations", "List.FindText", "List.First", "List.FirstN", "List.Generate", "List.InsertRange", "List.Intersect", "List.IsDistinct", "List.IsEmpty", "List.Last", "List.LastN", "List.MatchesAll", "List.MatchesAny", "List.Max", "List.MaxN", "List.Median", "List.Min", "List.MinN", "List.Mode", "List.Modes", "List.NonNullCount", "List.Numbers", "List.PositionOf", "List.PositionOfAny", "List.Positions", "List.Product", "List.Random", "List.Range", "List.RemoveFirstN", "List.RemoveItems", "List.RemoveLastN", "List.RemoveMatchingItems", "List.RemoveNulls", "List.RemoveRange", "List.Repeat", "List.ReplaceMatchingItems", "List.ReplaceRange", "List.ReplaceValue", "List.Reverse", "List.Select", "List.Single", "List.SingleOrDefault", "List.Skip", "List.Sort", "List.StandardDeviation", "List.Sum", "List.Times", "List.Transform", "List.TransformMany", "List.Union", "List.Zip", "Logical.From", "Logical.FromText", "Logical.ToText", "MQ.Queue", "MySQL.Database", "Number.Abs", "Number.Acos", "Number.Asin", "Number.Atan", "Number.Atan2", "Number.BitwiseAnd", "Number.BitwiseNot", "Number.BitwiseOr", "Number.BitwiseShiftLeft", "Number.BitwiseShiftRight", "Number.BitwiseXor", "Number.Combinations", "Number.Cos", "Number.Cosh", "Number.Exp", "Number.Factorial", "Number.From", "Number.FromText", "Number.IntegerDivide", "Number.IsEven", "Number.IsNaN", "Number.IsOdd", "Number.Ln", "Number.Log", "Number.Log10", "Number.Mod", "Number.Permutations", "Number.Power", "Number.Random", "Number.RandomBetween", "Number.Round", "Number.RoundAwayFromZero", "Number.RoundDown", "Number.RoundTowardZero", "Number.RoundUp", "Number.Sign", "Number.Sin", "Number.Sinh", "Number.Sqrt", "Number.Tan", "Number.Tanh", "Number.ToText", "OData.Feed", "Odbc.DataSource", "Odbc.Query", "OleDb.DataSource", "OleDb.Query", "Oracle.Database", "Percentage.From", "PostgreSQL.Database", "RData.FromBinary", "Record.AddField", "Record.Combine", "Record.Field", "Record.FieldCount", "Record.FieldNames", "Record.FieldOrDefault", "Record.FieldValues", "Record.FromList", "Record.FromTable", "Record.HasFields", "Record.RemoveFields", "Record.RenameFields", "Record.ReorderFields", "Record.SelectFields", "Record.ToList", "Record.ToTable", "Record.TransformFields", "Replacer.ReplaceText", "Replacer.ReplaceValue", "RowExpression.Column", "RowExpression.From", "Salesforce.Data", "Salesforce.Reports", "SapBusinessWarehouse.Cubes", "SapHana.Database", "SharePoint.Contents", "SharePoint.Files", "SharePoint.Tables", "Single.From", "Soda.Feed", "Splitter.SplitByNothing", "Splitter.SplitTextByAnyDelimiter", "Splitter.SplitTextByDelimiter", "Splitter.SplitTextByEachDelimiter", "Splitter.SplitTextByLengths", "Splitter.SplitTextByPositions", "Splitter.SplitTextByRanges", "Splitter.SplitTextByRepeatedLengths", "Splitter.SplitTextByWhitespace", "Sql.Database", "Sql.Databases", "SqlExpression.SchemaFrom", "SqlExpression.ToExpression", "Sybase.Database", "Table.AddColumn", "Table.AddIndexColumn", "Table.AddJoinColumn", "Table.AddKey", "Table.AggregateTableColumn", "Table.AlternateRows", "Table.Buffer", "Table.Column", "Table.ColumnCount", "Table.ColumnNames", "Table.ColumnsOfType", "Table.Combine", "Table.CombineColumns", "Table.Contains", "Table.ContainsAll", "Table.ContainsAny", "Table.DemoteHeaders", "Table.Distinct", "Table.DuplicateColumn", "Table.ExpandListColumn", "Table.ExpandRecordColumn", "Table.ExpandTableColumn", "Table.FillDown", "Table.FillUp", "Table.FilterWithDataTable", "Table.FindText", "Table.First", "Table.FirstN", "Table.FirstValue", "Table.FromColumns", "Table.FromList", "Table.FromPartitions", "Table.FromRecords", "Table.FromRows", "Table.FromValue", "Table.Group", "Table.HasColumns", "Table.InsertRows", "Table.IsDistinct", "Table.IsEmpty", "Table.Join", "Table.Keys", "Table.Last", "Table.LastN", "Table.MatchesAllRows", "Table.MatchesAnyRows", "Table.Max", "Table.MaxN", "Table.Min", "Table.MinN", "Table.NestedJoin", "Table.Partition", "Table.PartitionValues", "Table.Pivot", "Table.PositionOf", "Table.PositionOfAny", "Table.PrefixColumns", "Table.Profile", "Table.PromoteHeaders", "Table.Range", "Table.RemoveColumns", "Table.RemoveFirstN", "Table.RemoveLastN", "Table.RemoveMatchingRows", "Table.RemoveRows", "Table.RemoveRowsWithErrors", "Table.RenameColumns", "Table.ReorderColumns", "Table.Repeat", "Table.ReplaceErrorValues", "Table.ReplaceKeys", "Table.ReplaceMatchingRows", "Table.ReplaceRelationshipIdentity", "Table.ReplaceRows", "Table.ReplaceValue", "Table.ReverseRows", "Table.RowCount", "Table.Schema", "Table.SelectColumns", "Table.SelectRows", "Table.SelectRowsWithErrors", "Table.SingleRow", "Table.Skip", "Table.Sort", "Table.SplitColumn", "Table.ToColumns", "Table.ToList", "Table.ToRecords", "Table.ToRows", "Table.TransformColumnNames", "Table.TransformColumnTypes", "Table.TransformColumns", "Table.TransformRows", "Table.Transpose", "Table.Unpivot", "Table.UnpivotOtherColumns", "Table.View", "Table.ViewFunction", "TableAction.DeleteRows", "TableAction.InsertRows", "TableAction.UpdateRows", "Tables.GetRelationships", "Teradata.Database", "Text.AfterDelimiter", "Text.At", "Text.BeforeDelimiter", "Text.BetweenDelimiters", "Text.Clean", "Text.Combine", "Text.Contains", "Text.End", "Text.EndsWith", "Text.Format", "Text.From", "Text.FromBinary", "Text.Insert", "Text.Length", "Text.Lower", "Text.Middle", "Text.NewGuid", "Text.PadEnd", "Text.PadStart", "Text.PositionOf", "Text.PositionOfAny", "Text.Proper", "Text.Range", "Text.Remove", "Text.RemoveRange", "Text.Repeat", "Text.Replace", "Text.ReplaceRange", "Text.Select", "Text.Split", "Text.SplitAny", "Text.Start", "Text.StartsWith", "Text.ToBinary", "Text.ToList", "Text.Trim", "Text.TrimEnd", "Text.TrimStart", "Text.Upper", "Time.EndOfHour", "Time.From", "Time.FromText", "Time.Hour", "Time.Minute", "Time.Second", "Time.StartOfHour", "Time.ToRecord", "Time.ToText", "Type.AddTableKey", "Type.ClosedRecord", "Type.Facets", "Type.ForFunction", "Type.ForRecord", "Type.FunctionParameters", "Type.FunctionRequiredParameters", "Type.FunctionReturn", "Type.Is", "Type.IsNullable", "Type.IsOpenRecord", "Type.ListItem", "Type.NonNullable", "Type.OpenRecord", "Type.RecordFields", "Type.ReplaceFacets", "Type.ReplaceTableKeys", "Type.TableColumn", "Type.TableKeys", "Type.TableRow", "Type.TableSchema", "Type.Union", "Uri.BuildQueryString", "Uri.Combine", "Uri.EscapeDataString", "Uri.Parts", "Value.Add", "Value.As", "Value.Compare", "Value.Divide", "Value.Equals", "Value.Firewall", "Value.FromText", "Value.Is", "Value.Metadata", "Value.Multiply", "Value.NativeQuery", "Value.NullableEquals", "Value.RemoveMetadata", "Value.ReplaceMetadata", "Value.ReplaceType", "Value.Subtract", "Value.Type", "ValueAction.NativeStatement", "ValueAction.Replace", "Variable.Value", "Web.Contents", "Web.Page", "WebAction.Request", "Xml.Document", "Xml.Tables" ], builtinConstants: [ "BinaryEncoding.Base64", "BinaryEncoding.Hex", "BinaryOccurrence.Optional", "BinaryOccurrence.Repeating", "BinaryOccurrence.Required", "ByteOrder.BigEndian", "ByteOrder.LittleEndian", "Compression.Deflate", "Compression.GZip", "CsvStyle.QuoteAfterDelimiter", "CsvStyle.QuoteAlways", "Culture.Current", "Day.Friday", "Day.Monday", "Day.Saturday", "Day.Sunday", "Day.Thursday", "Day.Tuesday", "Day.Wednesday", "ExtraValues.Error", "ExtraValues.Ignore", "ExtraValues.List", "GroupKind.Global", "GroupKind.Local", "JoinAlgorithm.Dynamic", "JoinAlgorithm.LeftHash", "JoinAlgorithm.LeftIndex", "JoinAlgorithm.PairwiseHash", "JoinAlgorithm.RightHash", "JoinAlgorithm.RightIndex", "JoinAlgorithm.SortMerge", "JoinKind.FullOuter", "JoinKind.Inner", "JoinKind.LeftAnti", "JoinKind.LeftOuter", "JoinKind.RightAnti", "JoinKind.RightOuter", "JoinSide.Left", "JoinSide.Right", "MissingField.Error", "MissingField.Ignore", "MissingField.UseNull", "Number.E", "Number.Epsilon", "Number.NaN", "Number.NegativeInfinity", "Number.PI", "Number.PositiveInfinity", "Occurrence.All", "Occurrence.First", "Occurrence.Last", "Occurrence.Optional", "Occurrence.Repeating", "Occurrence.Required", "Order.Ascending", "Order.Descending", "Precision.Decimal", "Precision.Double", "QuoteStyle.Csv", "QuoteStyle.None", "RelativePosition.FromEnd", "RelativePosition.FromStart", "RoundingMode.AwayFromZero", "RoundingMode.Down", "RoundingMode.ToEven", "RoundingMode.TowardZero", "RoundingMode.Up", "SapHanaDistribution.All", "SapHanaDistribution.Connection", "SapHanaDistribution.Off", "SapHanaDistribution.Statement", "SapHanaRangeOperator.Equals", "SapHanaRangeOperator.GreaterThan", "SapHanaRangeOperator.GreaterThanOrEquals", "SapHanaRangeOperator.LessThan", "SapHanaRangeOperator.LessThanOrEquals", "SapHanaRangeOperator.NotEquals", "TextEncoding.Ascii", "TextEncoding.BigEndianUnicode", "TextEncoding.Unicode", "TextEncoding.Utf16", "TextEncoding.Utf8", "TextEncoding.Windows", "TraceLevel.Critical", "TraceLevel.Error", "TraceLevel.Information", "TraceLevel.Verbose", "TraceLevel.Warning", "WebMethod.Delete", "WebMethod.Get", "WebMethod.Head", "WebMethod.Patch", "WebMethod.Post", "WebMethod.Put" ], builtinTypes: [ "Action.Type", "Any.Type", "Binary.Type", "BinaryEncoding.Type", "BinaryOccurrence.Type", "Byte.Type", "ByteOrder.Type", "Character.Type", "Compression.Type", "CsvStyle.Type", "Currency.Type", "Date.Type", "DateTime.Type", "DateTimeZone.Type", "Day.Type", "Decimal.Type", "Double.Type", "Duration.Type", "ExtraValues.Type", "Function.Type", "GroupKind.Type", "Guid.Type", "Int16.Type", "Int32.Type", "Int64.Type", "Int8.Type", "JoinAlgorithm.Type", "JoinKind.Type", "JoinSide.Type", "List.Type", "Logical.Type", "MissingField.Type", "None.Type", "Null.Type", "Number.Type", "Occurrence.Type", "Order.Type", "Password.Type", "Percentage.Type", "Precision.Type", "QuoteStyle.Type", "Record.Type", "RelativePosition.Type", "RoundingMode.Type", "SapHanaDistribution.Type", "SapHanaRangeOperator.Type", "Single.Type", "Table.Type", "Text.Type", "TextEncoding.Type", "Time.Type", "TraceLevel.Type", "Type.Type", "Uri.Type", "WebMethod.Type" ], tokenizer: { root: [ // quoted identifier [/#"[\w \.]+"/, "identifier.quote"], // numbers [/\d*\.\d+([eE][\-+]?\d+)?/, "number.float"], [/0[xX][0-9a-fA-F]+/, "number.hex"], [/\d+([eE][\-+]?\d+)?/, "number"], // keywords [ /(#?[a-z]+)\b/, { cases: { "@typeKeywords": "type", "@keywords": "keyword", "@constants": "constant", "@constructors": "constructor", "@operatorKeywords": "operators", "@default": "identifier" } } ], // built-in types [ /\b([A-Z][a-zA-Z0-9]+\.Type)\b/, { cases: { "@builtinTypes": "type", "@default": "identifier" } } ], // other built-ins [ /\b([A-Z][a-zA-Z0-9]+\.[A-Z][a-zA-Z0-9]+)\b/, { cases: { "@builtinFunctions": "keyword.function", "@builtinConstants": "constant", "@default": "identifier" } } ], // other identifiers [/\b([a-zA-Z_][\w\.]*)\b/, "identifier"], { include: "@whitespace" }, { include: "@comments" }, { include: "@strings" }, [/[{}()\[\]]/, "@brackets"], [/([=\+<>\-\*&@\?\/!])|([<>]=)|(<>)|(=>)|(\.\.\.)|(\.\.)/, "operators"], [/[,;]/, "delimiter"] ], whitespace: [[/\s+/, "white"]], comments: [ ["\\/\\*", "comment", "@comment"], ["\\/\\/+.*", "comment"] ], comment: [ ["\\*\\/", "comment", "@pop"], [".", "comment"] ], strings: [['"', "string", "@string"]], string: [ ['""', "string.escape"], ['"', "string", "@pop"], [".", "string"] ] } }; return __toCommonJS(powerquery_exports); })(); return moduleExports; });
combined_dataset/train/non-malicious/sample_21_72.ps1
sample_21_72.ps1
# Copyright 2021-2023 VMware, Inc. # SPDX-License-Identifier: Apache-2 <# .SYNOPSIS VMware Tools script for managing the Salt minion on a Windows guest .DESCRIPTION This script manages the Salt minion on a Windows guest. The minion is a OneDir build hosted on https://repo.saltproject.io/salt/py3/onedir/. You can install the minion, remove it, check script dependencies, get the Salt minion installation status, and reset the Salt minion configuration. When this script is run without any parameters, the action is obtained from guestVars (if present). If no action is found, the script will exit with a scriptFailed exit code. If an action is passed on the CLI or found in guestVars, minion config options (master=198.51.100.1, etc.) are queried from guestVars. Config options are then obtained from tools.conf. Config options obtained from tools.conf will overwrite any config options obtained from guestVars with the same name. Config options passed on the CLI will overwrite any config options obtained from either of the previous two methods. The order of precedence is CLI options first, then tools.conf, and finally guestVars. This script returns exit codes to signal its success or failure. The exit codes are as follows: 0 - scriptSuccess 126 - scriptFailed 130 - scriptTerminated If the Status option is passed, then the exit code will signal the status of the Salt minion installation. Status exit codes are as follows: 100 - installed 101 - installing 102 - notInstalled 103 - installFailed 104 - removing 105 - removeFailed 106 - externalInstall NOTE: This script must be run with Administrator privileges .EXAMPLE PS>svtminion.ps1 -Install PS>svtminion.ps1 -Install -MinionVersion 3004-1 master=192.168.10.10 id=dev_box PS>svtminion.ps1 -Install -Source https://my.domain.com/vmtools/salt .EXAMPLE PS>svtminion.ps1 -Clear .EXAMPLE PS>svtminion.ps1 -Status .EXAMPLE PS>svtminion.ps1 -Depend .EXAMPLE PS>svtminion.ps1 -Remove -LogLevel debug #> [CmdletBinding(DefaultParameterSetName = "Install")] param( [Parameter(Mandatory=$false, ParameterSetName="Install")] [Alias("i")] # Downloads, installs, and starts the salt-minion service. Exits with # scriptFailed exit (126) code under the following conditions: # - Existing Standard Salt Installation detected # - Unknown status found # - Installation in progress # - Removal in progress # - Installation failed # - Missing script dependencies # # Exits with scriptSuccess exit code (0) under the following conditions: # - Installed successfully # - Already installed [Switch] $Install, [Parameter(Mandatory=$false, ParameterSetName="Install")] [Alias("m")] # The version of Salt minion to install. Default is "latest". [String] $MinionVersion="latest", [Parameter(Mandatory=$false, ParameterSetName="Install")] [Alias("j")] # The url or path to the repo containing the installers and, preferably, the # repo.json file. This would contain a directory structure similar to that # found at the default location: # # https://repo.saltproject.io/salt/py3/onedir # # The root of this directory preferably contains a file named `repo.json` # which contains the information about the installer versions available. # If this file not available, this script will scan the directory for the # requested version. # # This can handle most common protocols: http, https, ftp, unc, local [String] $Source="https://repo.saltproject.io/salt/py3/onedir", [Parameter(Mandatory=$false, ParameterSetName="Install", Position=0, ValueFromRemainingArguments=$true)] # Any number of minion config options specified by the name of the config # option as found in Salt documentation. All options will be lower-cased and # written to the minion config as passed. All values are in the key=value # format. For example: master=localhost [String[]] $ConfigOptions, [Parameter(Mandatory=$false, ParameterSetName="Remove")] [Alias("r")] # Stops and uninstalls the salt-minion service. Exits with scriptFailed exit # code (126) under the following conditions: # - Unknown status found # - Installation in progress # - Removal in progress # - Installation failed # - Missing script dependencies # # Exits with scriptSuccess exit code (0) under the following conditions: # - Removed successfully # - Already removed [Switch] $Remove, [Parameter(Mandatory=$false, ParameterSetName="Clear")] [Alias("c")] # Resets the salt-minion by randomizing the minion ID and removing the # minion keys. The randomized minion ID will be the old minion ID, an # underscore, and 5 random digits. # # Exits with scriptFailed exit code (126) under the following conditions: # - Unknown status found # - Missing script dependencies # # Exits with scriptSuccess exit code (0) under the following conditions: # - Cleared successfully # - Not installed [Switch] $Clear, [Parameter(Mandatory=$false, ParameterSetName="Status")] [Alias("s")] # Gets the status of the Salt minion installation. This command returns an # exit code that corresponds to one of the following: # 100 - installed # 101 - installing # 102 - notInstalled # 103 - installFailed # 104 - removing # 105 - removeFailed # 106 - externalInstall # # Exits with scriptFailed exit code (126) under the following conditions: # - Unknown status found # - Missing script dependencies [Switch] $Status, [Parameter(Mandatory=$false, ParameterSetName="Depend")] [Alias("d")] # Ensures the required dependencies are available. Exits with a scriptFailed # exit code (126) if any dependencies are missing. Exits with a # scriptSuccess exit code (0) if all dependencies are present. [Switch] $Depend, [Parameter(Mandatory=$false, ParameterSetName="Install")] [Parameter(ParameterSetName="Clear")] [Parameter(ParameterSetName="Status")] [Parameter(ParameterSetName="Depend")] [Parameter(ParameterSetName="Remove")] [Alias("l")] [ValidateSet( "silent", "error", "warning", "info", "debug", IgnoreCase=$true)] [String] # Sets the log level to display and log. Default is warning. Silent # suppresses all logging output. Available options are: # - silent # - error # - warning # - info # - debug # Logs are placed in C:\Windows\temp and are named according to the action # the script is performing and a timestamp for when the script was run. # This is a sample name: # `vmware-svtminion-<action>-<timestamp>.log` $LogLevel = "warning", [Parameter(Mandatory=$false, ParameterSetName="Help")] [Parameter(ParameterSetName="Install")] [Parameter(ParameterSetName="Clear")] [Parameter(ParameterSetName="Status")] [Parameter(ParameterSetName="Depend")] [Parameter(ParameterSetName="Remove")] [Alias("h")] [Switch] # Displays help for this script. $Help, [Parameter(Mandatory=$false, ParameterSetName="Version")] [Parameter(ParameterSetName="Install")] [Parameter(ParameterSetName="Clear")] [Parameter(ParameterSetName="Status")] [Parameter(ParameterSetName="Depend")] [Parameter(ParameterSetName="Remove")] [Alias("v")] [Switch] # Displays the version of this script. $Version ) # Set TLS1.2 as default [System.Net.ServicePointManager]::SecurityProtocol = ` [System.Net.SecurityProtocolType]'Tls12' ################################ HELP/VERSION ################################## # We'll put these functions first because they don't require administrator # privileges to run # Check for help switch if ($help) { # Get the full script name $this_script = & {$myInvocation.ScriptName} Get-Help $this_script -Detailed exit 0 } # This value is populated via CICD during build # $script_version = "SCRIPT_VERSION_REPLACE" $script_version = "1.6" if ($Version) { Write-Host $script_version exit 0 } # Only run on 64-bit architecture if ( [System.IntPtr]::Size -eq 4 ) { Write-Host "This script only supports 64-bit architecture" exit 0 } ################################# STATUS CODES ################################# $STATUS_CODES = @{ "scriptSuccess" = 0; "installed" = 100; "installing" = 101; "notInstalled" = 102; "installFailed" = 103; "removing" = 104; "removeFailed" = 105; "externalInstall" = 106; "scriptFailed" = 126; "scriptTerminated" = 130; 100 = "installed"; 101 = "installing"; 102 = "notInstalled"; 103 = "installFailed" 104 = "removing"; 105 = "removeFailed"; 106 = "externalInstall"; } ################################ REQUIREMENTS ################################## # Make sure the script is run as Administrator $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) if (!($Principal.IsInRole( [System.Security.Principal.WindowsBuiltInRole]::Administrator ))) { Write-Host "This script must run as Administrator" -ForegroundColor Red exit $STATUS_CODES["scriptFailed"] } ################################# LOGGING ###################################### $LOG_LEVELS = @{ "silent" = 0; "error" = 1; "warning" = 2; "info" = 3; "debug" = 4 } $log_level_value = $LOG_LEVELS[$LogLevel.ToLower()] ################################# SETTINGS ##################################### $global:ErrorActionPreference = "Stop" $global:ProgressPreference = "SilentlyContinue" $Script:log_cleared = $false $download_retry_count = 5 $script_date = Get-Date -Format "yyyyMMddHHmmss" $script_name = $MyInvocation.MyCommand.Name $script_log_dir = "$env:SystemRoot\Temp" # log file name: vmware-svtminion-{0}-20211019152012.log $script_log_base_name = "vmware-$($script_name.Split(".")[0])-{0}" $script_log_name = "$script_log_base_name-$script_date.log" $script_log_file_count = 5 $action_list = @("install", "remove", "depend", "clear", "status") ################################# VARIABLES #################################### # Repository locations and names $salt_name = "salt" $base_url = $Source $default_source = "https://repo.saltproject.io/salt/py3/onedir" $pre_3006_source = "https://repo.saltproject.io/salt/vmware-tools-onedir" # Salt file and directory locations $base_salt_install_location = "$env:ProgramFiles\Salt Project" $salt_dir = "$base_salt_install_location\$salt_name" $salt_bin = "$salt_dir\salt\salt.exe" # Tiamat Builds $salt_minion_bin = "$salt_dir\salt-minion.exe" # Relenv Builds $ssm_bin = "$salt_dir\ssm.exe" $base_salt_config_location = "$env:ProgramData\Salt Project" $salt_root_dir = "$base_salt_config_location\$salt_name" $salt_config_dir = "$salt_root_dir\conf" $salt_config_name = "minion" $salt_config_file = "$salt_config_dir\$salt_config_name" $salt_pki_dir = "$salt_config_dir\pki\$salt_config_name" $salt_log_dir = "$salt_root_dir\var\log\salt" # Files/Dirs to remove $file_dirs_to_remove = New-Object System.Collections.Generic.List[String] $file_dirs_to_remove.Add($base_salt_config_location) | Out-Null $file_dirs_to_remove.Add($base_salt_install_location) | Out-Null # Old Salt install location left behind by older versions of Salt # Pre 3004 $file_dirs_to_remove.Add("C:\salt") | Out-Null ## VMware registry locations $salt_base_reg = "HKLM:\SOFTWARE\Salt Project\salt" $vmtools_base_reg = "HKLM:\SOFTWARE\VMware, Inc.\VMware Tools" $vmtools_salt_minion_status_name = "SaltMinionStatus" try{ $reg_key = Get-ItemProperty $vmtools_base_reg } catch { if (Test-Path $vmtools_base_reg) { $msg = "VMware Tools not installed: $_" Write-Host $msg exit $STATUS_CODES["scriptFailed"] } } if (!($reg_key.PSObject.Properties.Name -contains "InstallPath")) { if (Test-Path $vmtools_base_reg) { # Only error out on systems with VMware Tools installed $msg = "Unable to find VMware Tools installation" Write-Host $msg exit $STATUS_CODES["scriptFailed"] } } else { ## VMware file and directory locations $vmtools_reg = Get-ItemProperty -Path $vmtools_base_reg -Name "InstallPath" $vmtools_base_dir = $vmtools_reg.InstallPath $vmtools_conf_dir = "$env:ProgramData\VMware\VMware Tools" $vmtools_conf_file = "$vmtools_conf_dir\tools.conf" $vmtoolsd_bin = "$vmtools_base_dir\vmtoolsd.exe" } # If VMTools reg path exists, then we're on a VMTools system if ( Test-Path $vmtools_base_reg ) { $reg_path = $vmtools_base_reg } else { $reg_path = $salt_base_reg if ( !(Test-Path $salt_base_reg) ) { New-Item -Path "$salt_base_reg" -Force } } ## VMware guestVars file and directory locations $guestvars_base = "guestinfo./vmware.components" $guestvars_section = "salt_minion" $guestvars_salt = "$guestvars_base.$guestvars_section" $guestvars_salt_args = "$guestvars_salt.args" $guestvars_salt_desired_state = "$guestvars_salt.desiredstate" ################################ TEST FUNCTIONS ################################ function Get-Version { return $script_version } ############################### HELPER FUNCTIONS ############################### function Clear-OldLogs { $filter = "*$script_log_base_name*.log" -f $Action.ToLower() $files = Get-ChildItem $script_log_dir -Filter $filter | Sort-Object $total_files = $files.Count try { foreach ($file in $files) { if ($total_files -ge $script_log_file_count) { # Remove the file/dir/synlink/junction $file_obj = Get-Item -Path $file.FullName if ($file_obj -is [System.IO.DirectoryInfo]) { [System.IO.Directory]::Delete(` $file.FullName, $true) | Out-Null } else { [System.IO.File]::Delete($file.FullName) | Out-Null } $total_files -= 1 } else { break } } } finally { $Script:log_cleared = $true } } function Write-Log { # Function for writing logs to the screen and to the log file # # Args: # Message (string): The log message # Level (string): # The log level. Must be one of error, info, warning, debug. Default # is info [CmdletBinding()] param( [Parameter(Mandatory=$true, Position=0)] [String] $Message, [Parameter()] [ValidateSet("error", "info", "warning", "debug", IgnoreCase=$true)] [String] $Level = "info" ) $Level = $Level.ToUpper() $level_text = $Level + " " * (7 - $Level.Length) $script_pid = $PID + " " * (5 - $PID.Length) if ( $LOG_LEVELS[$Level.ToLower()] -le $log_level_value ) { $date_time = Get-Date -Format "yyyy-MM-dd:HH:mm:ss.ffff" $timestamp = Get-Date -Format "HH:mm:ss.ffff" $log_message = "[$timestamp] [$level_text] $Message" $log_file_message = "[$date_time] [$script_pid] [$level_text] $Message" if (!(Test-Path($script_log_dir))) { Write-Host "[$timestamp] [INFO ] : Creating log file directory" New-Item -Path $script_log_dir -Type Directory | Out-Null } if (!($action_list -contains $Action)) { $Action = "Default" } if (!$Script:log_cleared) { Clear-OldLogs } $log_path = "$script_log_dir\$script_log_name" -f $Action Add-Content -Path $log_path.ToLower() -Value $log_file_message switch ($Level) { "ERROR" { $color = "Red" } "WARNING" { $color = "Yellow" } default { $color = "White"} } Write-Host $log_message -ForegroundColor $color } } function Get-ScriptRunningStatus { # Try to detect if this script is already running under another process # # Returns True if running, otherwise False Write-Log "Checking for a running instance of this script" -Level info #Get all running powershell processes $filter = "Name='powershell.exe' AND CommandLine LIKE '%$script_name%'" $processes = Get-WmiObject Win32_Process -Filter $filter | ` Select-Object CommandLine,ProcessId $process_found = $false foreach ($process in $processes) { [Int32]$process_pid = $process.ProcessId [String]$process_cmd = $process.commandline #Are other instances of this script already running? if (($process_cmd -match $script_name) -And ($process_pid -ne $PID)) { $process_found = $true } } if ($process_found) { Write-Log "Found running instance in PID: $process_pid" -Level debug return $true } else { Write-Log "Running instance not detected" -Level debug return $false } } function Get-Status { # Read the status out of the registry. If the key is missing that means # notInstalled # # Returns the error level number $script_running_status = Get-ScriptRunningStatus Write-Log "Getting status" -Level info try { $current_status = Get-ItemProperty ` -Path $reg_path ` -Name $vmtools_salt_minion_status_name $current_status = $current_status.($vmtools_salt_minion_status_name) Write-Log "Found status code: $current_status" -Level debug } catch { Write-Log "Key not set, not installed : $_" -Level debug $current_status = $STATUS_CODES["notInstalled"] } # If status is 101 or 104 (installing or removing) but there isn't another # script running, then the status is installFailed or removeFailed $list_ing = @($STATUS_CODES["installing"], $STATUS_CODES["removing"]) if (($list_ing -contains $current_status) -and !($script_running_status)) { switch ($current_status) { $STATUS_CODES["installing"] { Write-Log "Found failed install" -Level debug $current_status = $STATUS_CODES["installFailed"] } $STATUS_CODES["removing"] { Write-Log "Found failed remove" -Level debug $current_status = $STATUS_CODES["removeFailed"] } } } if ($STATUS_CODES.keys -contains $current_status) { $status_lookup = $STATUS_CODES[$current_status] Write-Log "Found status: $status_lookup" -Level debug } else { Write-Log "Unknown status code: $current_status" -Level debug } return $current_status } function Set-Status { # Set the numeric value of the status in the registry. notInstalled means to # remove the key # # Args: # NewStatus (string): # The status to set. Must be one of the following: # - installed # - installing # - notInstalled # - installFailed # - removing # - removeFailed # - externalInstall [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateSet( "installed", "installing", "notInstalled", "installFailed", "removing", "removeFailed", "externalInstall" )] [String] $NewStatus ) Write-Log "Setting status: $NewStatus" -Level info $status_code = $STATUS_CODES[$NewStatus] # If it's notInstalled, just remove the property name if ($status_code -eq $STATUS_CODES["notInstalled"]) { try { Remove-ItemProperty -Path "$reg_path"` -Name $vmtools_salt_minion_status_name $key = "$reg_path\$vmtools_salt_minion_status_name" Write-Log "Removed reg key: $key" -Level debug Write-Log "Set status to $NewStatus" -Level debug } catch [System.Management.Automation.PSArgumentException] { Write-Log "Reg key not present: $key" -Level debug Write-Log "Status already set to: $NewStatus" -Level debug } catch { Write-Log "Error removing reg key: $_" -Level error exit $STATUS_CODES["scriptFailed"] } } else { try { New-ItemProperty -Path "$reg_path"` -Name $vmtools_salt_minion_status_name ` -Value $status_code ` -Force | Out-Null Write-Log "Set status to $NewStatus" -Level debug } catch { if (Test-Path $vmtools_base_reg) { Write-Log "Error writing status: $_" -Level error exit $STATUS_CODES["scriptFailed"] } else { Write-Log "Error writing status: $_" -Level warning } } } } function Set-FailedStatus { # Sets the status if either add or remove fails, each sets a different # status if it fails switch ($Action.ToLower()) { "install" { Set-Status installFailed } "remove" { Set-Status removeFailed } } } function Get-WebFile{ # Downloads a file from the web. Enables the TLS1.2 protocol. If the # download times out, wait 10 seconds and try again. Continues retrying # until the download retry count max is reached # # Used by: # - Get-SaltFromWeb # # Args: # Url (string): The url for the file to download # OutFile (string): The location to put the downloaded file [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Url, [Parameter(Mandatory=$true)] [String] $OutFile ) $parent_dir = Split-Path $OutFile if ( !( Test-Path $parent_dir )) { New-Item $parent_dir -Type Directory | Out-Null } $url_name = $Url.SubString($Url.LastIndexOf('/')) $tries = 1 $success = $false while (!$success){ try { # Download the file $msg = "Downloading (try: $tries/$download_retry_count): $url_name" Write-Log $msg -Level debug Invoke-WebRequest -Uri $Url -OutFile $OutFile } catch { Write-Log "Error downloading: $Url" -Level warning Write-Log "Error message: $_" -Level warning } finally { $tries++ if ((Test-Path -Path "$OutFile") ` -and ` ((Get-Item "$OutFile").Length -gt 0kb )) { Write-Log "Finished downloading: $url_name" -Level debug $success = $true } else { if ($tries -gt $download_retry_count) { Write-Log "Retry count exceeded" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } Write-Log "Trying again after 10 seconds" -Level warning Start-Sleep -Seconds 10 } } } } function Get-HashFromFile { # Gets the hash for the file from the hash file which contains a list of # hashes and their files # # Used by: # - Get-SaltFromWeb # # Args: # HashFile (string): The file containing the hashes # FileName (string): The name of the file to search for in the hash file # # Returns: # Returns the hash for the specified file # Errors: # If there is an error, set the failed status and exit with an error [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $HashFile, [Parameter(Mandatory=$true)] [String] $FileName ) Write-Log "Loading hashfile: $HashFile" -Level debug $lines = Get-Content -Path $HashFile Write-Log "Searching for hash for: $FileName" -Level debug foreach ($line in $lines) { $file_hash, $file_name = $line -split "\s+" if ($FileName -eq $file_name) { Write-Log "Found hash: $file_hash" -Level debug return $file_hash } } Write-Log "No hash found for: $FileName" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } function Expand-ZipFile { # Extract a zip file # # Used by: # - Install-SaltMinion # # Args: # ZipFile (string): The file to extract # Destination (string): The location to extract to # # Error: # Sets the failed status and exits with a scriptFailed exit code [CmdletBinding()] param( [Parameter(Mandatory = $true)] [string] $ZipFile, [Parameter(Mandatory = $true)] [string] $Destination ) if (!(Test-Path -Path $Destination)) { Write-Log "Creating missing directory: $Destination" -Level debug New-Item -ItemType directory -Path $Destination } Write-Log "Unzipping '$ZipFile' to '$Destination'" -Level debug if ($PSVersionTable.PSVersion.Major -ge 5) { # PowerShell 5 introduced Expand-Archive Write-Log "Using Expand-Archive to unzip" try{ Expand-Archive -Path $ZipFile -DestinationPath $Destination -Force } catch { Write-Log "Failed to unzip $ZipFile : $_" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } else { # This method will work with older versions of powershell, but it is # slow Write-Log "Using Shell.Application to unzip" $objShell = New-Object -Com Shell.Application $objZip = $objShell.NameSpace($ZipFile) try{ foreach ($item in $objZip.Items()) { $objShell.Namespace($Destination).CopyHere($item, 0x14) } } catch { Write-Log "Failed to unzip $ZipFile : $_" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } Write-Log "Finished unzipping '$ZipFile' to '$Destination'" -Level debug } function Add-SystemPathValue{ # Add a new entry to the system path environment variable. Only adds the new # path if it does not already exist. # # Used by: # - Install-SaltMinion # # Args: # Path (string): The target path to add # # Warning: # Logs a warning if the target path does not exist [Cmdletbinding()] param ( [parameter(Mandatory=$True)] [String]$Path ) $key = "HKLM:\System\CurrentControlSet\Control\Session Manager\Environment" # Make sure the target folder exists Write-Log "Ensuring target path exists" -Level debug if (!(Test-Path $Path)) { Write-Log "Target path does not exist: $Path" -Level warning } Write-Log "Getting current system path" -Level debug $current_path = (Get-ItemProperty -Path $key -Name Path).Path $new_path_list = New-Object System.Collections.Generic.List[String] Write-Log "Verifying the target path is not already present" -Level debug $regex_path = $Path.Replace("\", "\\") foreach ($item in $current_path.Split(";")) { # Bail if we find the new path in the current path if ($item -imatch "^$regex_path(\\)?$") { Write-Log "Target path already exists: $Path" -Level warning return } else { # Add the item to our new path array $new_path_list.Add($item) | Out-Null } } # Add the new path to the array Write-Log "Adding target path: $Path" -Level debug $new_path_list.Add($Path) | Out-Null $new_path = $new_path_list -join ";" try{ Write-Log "Updating system path" -Level debug Set-ItemProperty -Path $key -Name Path -Value $new_path } catch { Write-Log "Failed to add $Path the system path" -Level warning Write-Log "Tried to write: $new_path" -Level warning Write-Log "Error message: $_" -Level warning } $env:Path = [System.Environment]::GetEnvironmentVariable("Path","Machine") } function Remove-SystemPathValue { # Removes the specified target path from the system path environment # variable # # Used by: # - Remove-SaltMinion # # Args # Path (string): The target path to remove [Cmdletbinding()] param ( [parameter(Mandatory=$True)] [String]$Path ) Write-Log "Removing from system path: $Path" -Level info $key = "HKLM:\System\CurrentControlSet\Control\Session Manager\Environment" Write-Log "Getting current system path" -Level debug $current_path = (Get-ItemProperty -Path $key -Name Path).Path $new_path_list = New-Object System.Collections.Generic.List[String] Write-Log "Searching for $Path" -Level debug $regex_path = $Path.Replace("\", "\\") $removed = 0 foreach ($item in $current_path.Split(";")) { # Don't add if we find the new path if ($item -imatch "^$regex_path(\\)?$") { Write-Log "Removing target path: $Path" -Level debug $removed = 1 } else { # Add the item to our new path array $new_path_list.Add($item) | Out-Null } } if ($removed) { $new_path = $new_path_list -join ";" try { Write-Log "Updating system path" -Level debug Set-ItemProperty -Path $key -Name Path -Value $new_path } catch { $msg = "Failed to remove $Path from the system path: $new_path" Write-Log $msg -Level warning Write-Log "Tried to write: $new_path" -Level warning Write-Log "Error message: $_" -level warning } } $env:Path = [System.Environment]::GetEnvironmentVariable("Path","Machine") } function Remove-FileOrFolder { # Removes a file or a folder recursively from the system. Takes ownership of # the file or directory before removing # # Used by: # - Remove-SaltMinion # - Reset-SaltMinion # # Args: # Path (string): The file or folder to remove [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Path ) if (!(Test-Path -Path $Path)) { Write-Log "Path not found: $Path" -Level debug return } $tries = 1 $max_tries = 5 $success = $false while (!$success) { $msg = "Removing (try: $tries/$max_tries): $Path" Write-Log $msg -Level debug try { # Remove the file/dir/symlink/junction if ((Get-Item -Path $Path) -is [System.IO.DirectoryInfo]) { if (Get-IsReparsePoint -Path $Path) { Write-Log "Removing reparse point" -Level debug [System.IO.Directory]::Delete($Path, $true) | Out-Null } else { Write-Log "Removing directory" -Level debug # Handles nested readonly files Remove-Item -Path $Path -Force -Recurse } } else { Write-Log "Removing file" -Level debug [System.IO.File]::Delete($Path) | Out-Null } } catch { Write-Log "Error removing: $Path" -Level warning Write-Log "Error message: $_" -Level warning } finally { $tries++ if (!(Test-Path -Path $Path)) { Write-Log "Finished removing $Path" -Level debug $success = $true } else { if ($tries -gt $max_tries) { Write-Log "Retry count exceeded" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } if ((Get-Item -Path $Path) -is [System.IO.DirectoryInfo]) { Write-Log "Taking ownership: $Path" -Level debug takeown /a /r /d Y /f $Path *> $null if ($LASTEXITCODE) { Write-Log "Directory does not exist" -Level debug } } Write-Log "Trying again after 5 seconds" -Level warning Start-Sleep -Seconds 5 } } } } function Get-GuestVars { # Get guestvars data using vmtoolsd.exe # They can be set on the host using vmrun.exe # # vmrun writeVariable "d:\VMWare\Windows Server 2019\Windows Server # 2019.vmx" guestVar /vmware.components.salt_minion.args # "master=192.168.0.12 id=test_id" # # Used by: # - Get-ConfigGuestVars # # Args: # GuestVarsPath (string): # The option to get from the guestvars repository. Likely one of the # following: # - Action: guestinfo.vmware.components.salt_minion # - Minion Config: guestinfo.vmware.components.salt_minion.args [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $GuestVarsPath ) If ( !$vmtoolsd_bin -or !(Test-Path $vmtoolsd_bin) ) { $msg = "vmtoolsd.exe not found. GuestVars data will not be available" Write-Log $msg -Level warning return "" } $arguments = "--cmd `"info-get $GuestVarsPath`"" try { $ProcessInfo = New-Object System.Diagnostics.ProcessStartInfo $ProcessInfo.FileName = $vmtoolsd_bin $ProcessInfo.Arguments = $arguments $ProcessInfo.RedirectStandardError = $true $ProcessInfo.RedirectStandardOutput = $true $ProcessInfo.UseShellExecute = $false $Process = New-Object System.Diagnostics.Process $Process.StartInfo = $ProcessInfo $Process.Start() | Out-Null $Process.WaitForExit() $stdout = $Process.StandardOutput.ReadToEnd() $exitcode = $Process.ExitCode } catch { $msg = "vmtoolsd.exe encountered an error. " + "GuestVars data will not be available" Write-Log $msg -Level warning return "" } if ($exitcode -eq 0) { return $stdout.Trim() } else { return "" } } function _parse_config { # Parse config options that are in the format key=value. These can be passed # on the cli, guestvars, or tools.conf # # Used by: # - Get-ConfigCLI # - Get-ConfigGuestVars # - Get-ConfigToolsConf # # Args: # KeyValues (string[]) # A list of string values in the key=value format # # Returns: # A hash table containing the config options and their values [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String[]] $KeyValues ) $config_options = @{} foreach ($key_value in $KeyValues.Split()) { if ($key_value -like "*=*") { Write-Log "Found config: $key_value" -Level debug $key, $value = $key_value -split "=" if ($value) { $config_options[$key.ToLower()] = $value.ToLower() } else { Write-Log "No config value specified: $key_value" -Level warning } } else { Write-Log "Invalid config format ignored: $key_value" -Level warning } } $count = $config_options.Count Write-Log "Found $count config options" -Level debug return $config_options } function Get-ConfigCLI { # Get salt-minion configuration options from arguments passed on the # command line. These key/value pairs are already in the ConfigOptions # variable populated by the powershell cli parser. They should be a space # delimited list of options in the key=value format. # # Used by: # - Get-MinionConfig # # Return hashtable Write-Log "Checking for CLI config options" -Level debug if ($ConfigOptions) { return _parse_config $ConfigOptions } else { Write-Log "Minion config not passed on CLI" -Level debug } } function Get-ConfigGuestVars { # Get salt-minion configuration options defined in the guestvars. That # should be a space delimited list of options in the key=value format. # # Used by: # - Get-MinionConfig # # Return hashtable Write-Log "Checking for GuestVars config options" -Level debug $config_options = Get-GuestVars -GuestVarsPath $guestvars_salt_args if ($config_options) { return _parse_config $config_options } else { Write-Log "Minion config not defined in guestvars" -Level debug } } function Read-IniContent { # Create a hash table with values from an ini file. Each section will # contain a sub hash table with key/value pairs # # Used by: # - Get-ConfigToolsConf # # Args: # FilePath (string): The location of the ini file to read [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $FilePath ) if (!(Test-Path -Path $FilePath)) { Write-Log "File not found: $FilePath" -Level warning return @{} } $ini = @{} switch -regex -file $FilePath { # [Section] "^(?![#,;])\[(.+)\]$" { $section = $matches[1] $ini[$section.Trim()] = @{} } # key=value "^(?![#,;])(.+?)\s*=(.*)$" { $key,$value = $matches[1..2] $ini[$section.Trim()][$key.Trim()] = $value.Trim() } } return $ini } function Get-ConfigToolsConf { # Get salt-minion configuration options defined in tools.conf. That should # be all keys/value pairs under the [salt_minion] section of the tools.conf # ini file. # # Used by: # - Get-MinionConfig # # Return hashtable if ( !$vmtools_conf_file -or !(Test-Path $vmtools_conf_file) ) { Write-Log "tools.conf not found" -Level debug return @{} } $config_options = Read-IniContent -FilePath $vmtools_conf_file Write-Log "Checking for tools.conf config options" -Level debug if ($config_options.ContainsKey($guestvars_section)) { $count = $config_options[$guestvars_section].Count Write-Log "Found $count config options" -Level debug return $config_options[$guestvars_section] } else { Write-Log "Minion config not defined in tools.conf" -Level debug return @{} } } function Get-MinionConfig { # Get the minion config values to be placed in the minion config file. The # Order of priority is as follows: # - Get config from GuestVars (defined by VMware Tools) # - Get config from tools.conf (defined by VMware Tools - older method), # overwrites guestVars with the same name # - Get config from the CLI (options passed to the script), overwrites # guestVars and tools.conf settings with the same name # - No config found, use Salt minion defaults (master: salt, id: hostname) # # Used by: # - Add-MinionConfig # # Returns a hash table of options or null if no options found Write-Log "Getting minion config" -Level info $config_options = @{} # Get guestVars config, conflicting values will be overwritten by guestvars $gv_config = Get-ConfigGuestVars if ($gv_config) { foreach ($row in $gv_config.GetEnumerator()) { if ($row.Value) { $config_options[$row.Name] = $row.Value } } } # Get tools.conf config first $tc_config = Get-ConfigToolsConf if ($tc_config) { foreach ($row in $tc_config.GetEnumerator()) { if ($row.Value) { $config_options[$row.Name] = $row.Value } } } # Get cli config, conflicting values will be overwritten by cli $cli_config = Get-ConfigCLI if ($cli_config) { foreach ($row in $cli_config.GetEnumerator()) { if ($row.Value) { $config_options[$row.Name] = $row.Value } } } return $config_options } function Get-IsReparsePoint { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Path ) $fd_path = Get-Item -Path $Path return [bool]($fd_path.Attributes -band [IO.FileAttributes]::ReparsePoint) } function Get-IsSecureOwner { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Path ) $acl = Get-Acl -Path $Path $owner = (($acl | Select-Object Owner).Owner).ToLower() if ($owner -eq "nt authority\system") { return $true } if ($owner -eq "builtin\administrators") { return $true } return $false } function Set-Security { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Path, [Parameter(Mandatory=$false)] [String] $Owner = "BUILTIN\Administrators" ) Write-Log "Setting Security: $Path" -Level info Write-Log "Getting ACL: $Path" -Level debug $path_acl = Get-Acl -Path $Path Write-Log "Setting Sddl" -Level debug $Sddl = 'D:PAI(A;OICI;0x1200a9;;;WD)(A;OICI;FA;;;SY)(A;OICI;FA;;;BA)' $path_acl.SetSecurityDescriptorSddlForm($Sddl) Write-Log "Setting Owner" -Level debug $path_acl.SetOwner([System.Security.Principal.NTAccount]"$Owner") Write-Log "Writing New ACL" -Level debug Set-Acl -Path $Path -AclObject $path_acl } function New-SecureDirectory { [CmdletBinding()] param( [Parameter(Mandatory=$false)] [String] $Path ) if (Test-Path -Path $Path) { if (Get-IsReparsePoint -Path $Path) { Write-Log "Found reparse point: $Path" -Level warning Write-Log "Renaming reparse point (.insecure): $Path" -Level warning Move-item -Path $Path ` -Destination "$Path-$script_date.insecure" | Out-Null $msg = "Insecure reparse point renamed: $Path-$script_date.insecure" Write-Log $msg -Level debug } } if (Test-Path -Path $Path) { if (!(Get-IsSecureOwner -Path $Path)) { Write-Log "Found insecure owner: $Path" -Level warning Write-Log "Renaming file/dir (.insecure): $Path" -Level warning Move-Item -Path $Path ` -Destination "$Path-$script_date.insecure" | Out-Null $msg = "Insecure file/dir renamed: $Path-$script_date.insecure" Write-Log $msg -Level debug } } $tries = 1 $max_tries = 5 while ($true) { # Remove any existing file or directory if it exists if (Test-Path -Path $Path) { Write-Log "Removing existing file/directory: $Path" -Level debug Remove-FileOrFolder -Path $Path } $msg = "Creating secure directory (try: $tries/$max_tries): $Path" Write-Log $msg -Level debug try { New-Item -Path $Path -Type Directory | Out-Null } catch { if ($tries -le $max_tries) { $msg = "Failed to create directory: $Path. Trying again..." Write-Log $msg -Level warning $tries++ continue } else { $msg = "Failed to create secure directory. Try limit exceeded." Write-Log $msg -Level error Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } Set-Security -Path $Path if((Get-ChildItem -Path $Path | Measure-Object).Count -ne 0) { # Someone is competing with us if ($tries -le $max_tries) { $msg = "Expected empty directory. Trying again..." Write-Log $msg -Level warning $tries += 1 continue } else { $msg = "Expected empty directory. Try limit exceeded." Write-Log $msg -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } Write-Log "Secure directory created successfully" -Level debug break } } function Add-MinionConfig { # Write minion config options to the minion config file # New-SecureDirectory will handle reparse points and ownership issues New-SecureDirectory -Path $base_salt_config_location # Child directories will inherit permissions from the parent if ( !( Test-Path -path $salt_root_dir ) ) { New-Item -Path $salt_root_dir -Type Directory | Out-Null } if ( !( Test-Path -path $salt_config_dir ) ) { New-Item -Path $salt_config_dir -Type Directory | Out-Null } if ( !( Test-Path -path $salt_pki_dir ) ) { New-Item -Path "$salt_pki_dir" -Type Directory | Out-Null } if ( !( Test-Path -path $salt_log_dir ) ) { New-Item -Path "$salt_log_dir" -Type Directory | Out-Null } # Create additional directories $cache_dir = "$salt_root_dir\var\cache\salt\minion" if ( !( Test-Path -path "$salt_config_dir\minion.d" ) ) { New-Item -Path "$salt_config_dir\minion.d" -Type Directory | Out-Null } if ( !( Test-Path -path "$cache_dir\extmods\grains" ) ) { New-Item -Path "$cache_dir\extmods\grains" -Type Directory | Out-Null } if ( !( Test-Path -path "$cache_dir\proc" ) ) { New-Item -Path "$cache_dir\proc" -Type Directory | Out-Null } if ( !( Test-Path -path "$salt_root_dir\var\run" ) ) { New-Item -Path "$salt_root_dir\var\run" -Type Directory | Out-Null } # Get the minion config $config_options = Get-MinionConfig if ($config_options.Count -eq 0) { Write-Log "No minion config found. Defaults will be used" -Level debug } # These settings are for pre 3004 versions of Salt # Add root_dir to point to ProgramData $config_options["root_dir"] = $salt_root_dir # Add log_file to point to ProgramData $config_options["log_file"] = "$salt_log_dir\minion" $new_content = New-Object System.Collections.Generic.List[String] $comment = "# Minion configuration file - created by VMTools Salt script" $new_content.Add($comment) foreach ($row in $config_options.GetEnumerator()) { $new_content.Add("$($row.Name): $($row.Value)") | Out-Null } $config_content = $new_content -join "`r`n" try { Write-Log "Writing minion config" -Level info Set-Content -Path $salt_config_file -Value $config_content Write-Log "Finished writing minion config" -Level debug } catch { $msg = "Failed to write minion config: $config_content : $_" Write-Log $msg -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } function Start-MinionService { [CmdletBinding()] param( [Parameter(Mandatory=$false)] [String] $ServiceName = "salt-minion" ) try { $service = Get-Service -Name $ServiceName } catch { switch ($_.FullyQualifiedErrorId.Split(",")[0]) { "NoServiceFoundForGivenName" { # We'll hard fail here because the service is not present Write-Log "$ServiceName is not installed" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } Default { Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } } # Not sure this is needed as the Start-Service cmdlet seems to wait until # the service is started before returning $tries = 1 $max_tries = 5 while ($service.Status -ne "Running") { if ($service.Status -eq "Stopped") { # Start the minion service Write-Log "Starting the $ServiceName service" -Level info try { Start-Service -Name $ServiceName *> $null } catch { Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } $service.Refresh() if ($service.Status -eq "Running") { Write-Log "Service started successfully" -Level debug } else { if ($tries -le $max_tries) { $msg = "Service not started. Waiting 1 second to try again..." Write-Log $msg -Level debug $tries += 1 Start-Sleep -Seconds 1 } else { $msg = "Failed to start the $ServiceName service. " $msg += "Exceeded max tries" Write-Log $msg -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } } } function Stop-MinionService { [CmdletBinding()] param( [Parameter(Mandatory=$false)] [String] $ServiceName = "salt-minion" ) try { $service = Get-Service -Name $ServiceName } catch { switch ($_.FullyQualifiedErrorId.Split(",")[0]) { "NoServiceFoundForGivenName" { # We'll return here because we don't need to stop a service that # isn't installed Write-Log "$ServiceName is not installed" -Level info return } Default { Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } } # Not sure this is needed as the Stop-Service cmdlet seems to wait until # the service is stopped before returning $tries = 1 $max_tries = 5 while ($service.Status -ne "Stopped") { if (($service.Status -eq "Running") -or ` ($service.Status -eq "Paused")) { # Start the minion service Write-Log "Stop the $ServiceName service" -Level info try { Stop-Service -Name $ServiceName *> $null } catch { Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } $service.Refresh() if ($service.Status -eq "Stopped") { Write-Log "Service stopped successfully" -Level debug } else { if ($tries -le $max_tries) { $msg = "Service not stopped. Waiting 1 second to try again..." Write-Log $msg -Level debug $tries += 1 Start-Sleep -Seconds 1 } else { $msg = "Failed to stop the $ServiceName service. " $msg += "Exceeded max tries" Write-Log $msg -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } } } function Get-RandomizedMinionId { # Generate a randomized minion id [CmdletBinding()] param( [Parameter(Mandatory=$false)] [String] $Prefix = "minion", [Parameter(Mandatory=$false)] [String] $Length = 5 ) $chars = (0x30..0x39) + ( 0x41..0x5A) + ( 0x61..0x7A) $rand_chars = $chars | Get-Random -Count $Length $rand_string = -join ($rand_chars | ForEach-Object {[char]$_}) return -join ($Prefix, "_", $rand_string) } ############################### MAIN FUNCTIONS ################################# function Confirm-Dependencies { # Check that the required dependencies for this script are present on the # system # # Return: # Bool: False if missing dependencies, otherwise True $deps_present = $true Write-Log "Checking dependencies" -Level info # Files required by this script $salt_dep_files = @{} # $salt_dep_files["dep_name.exe"] = "path\to\dep_name.exe" foreach ($file in $salt_dep_files.Keys) { Write-Log "Looking for $file in $($salt_dep_files[$file])" -Level debug if(!(Test-Path("$($salt_dep_files[$file])\$file"))) { $msg = "Unable to find $file in $($salt_dep_files[$file])" Write-Log $msg -Level error $deps_present = $false } } return $deps_present } function Get-SaltVersion { # This function is needed for unit testing [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Path ) if ( Test-Path -Path "$Path\salt-call.exe" ) { # 3006 and later packages Write-Log "Running: $Path\salt-call.exe" -Level debug $ver = . $Path\salt-call.exe --version } elseif ( Test-Path -Path "$Path\bin\python.exe" ) { # Pre 3006 Packages $python_bin = "$Path\bin\python.exe" Write-Log "Running: $python_bin" -Level debug $ver = . $python_bin -E -s $Path\bin\Scripts\salt-call --version } elseif ( Test-Path -Path "$Path\bin\salt.exe" ) { # Tiamat Packages Write-Log "Running: $Path\bin\salt.exe" -Level debug $ver = . $Path\bin\salt.exe --version } return $ver.Trim("salt-call ") } function Find-StandardSaltInstallation { # Find an existing standard Salt installation # # Return: # Bool: True if standard installation found, otherwise False # First we'll look for the install_dir registry entry # If we find that, we'll use it to detect the version # This works for 3004 and newer versions of Salt $salt_path = $null try { $dir_path = (Get-Item -Path $salt_base_reg).GetValue("install_dir") } catch {} if ($dir_path -ne $null) { $dir_path = [System.Environment]::ExpandEnvironmentVariables($dir_path) Write-Host $dir_path if ( Test-Path -Path $dir_path ) { $version = Get-SaltVersion -Path $dir_path Write-Log "Standard Installation detected" -Level error Write-Log "Version: $version" -Level error Write-Log "Path: $dir_path" -Level error return $true } } # We'll look in the old C:\salt location for python.exe # This handles all older versions of Salt if (Test-Path -Path "C:\salt\bin\python.exe") { $version = Get-SaltVersion -Path "C:\salt" Write-Log "Standard Installation detected" -Level error Write-Log "Version: $version" -Level error Write-Log "Path: C:\salt" -Level error return $true } Write-Log "Standard Installation not detected" -Level debug return $false } function Convert-PSObjectToHashtable { param ( [Parameter(ValueFromPipeline)] $InputObject ) if ($null -eq $InputObject) { return $null } $is_enum = $InputObject -is [System.Collections.IEnumerable] $not_string = $InputObject -isnot [string] if ($is_enum -and $not_string) { $collection = @( foreach ($object in $InputObject) { Convert-PSObjectToHashtable $object } ) Write-Output -NoEnumerate $collection } elseif ($InputObject -is [PSObject]) { $hash = @{} foreach ($property in $InputObject.PSObject.Properties) { $hash[$property.Name] = Convert-PSObjectToHashtable $property.Value } $hash } else { $InputObject } } function Get-MajorVersion { # Parses a version string and returns the major version # # Args: # Version (string): The Version to parse [CmdletBinding()] param( [Parameter(Mandatory=$true, Position=0)] [String] $Version ) if ( !($Version.Contains(".")) -and ($Version.ToLower() -ne "latest")) { return $Version } try { $parsed_version = [System.Version]::Parse($Version) return $parsed_version.Major.ToString() } catch { # We might hit this if there is text in the minor version $regex = [regex]"^(\d+)\.([\w\-]+)$" $match = $regex.Match($Version) if ( $match.Success ) { return $match.Groups[1].Value } } return "" } function Get-SaltPackageInfo { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $MinionVersion ) if ( $MinionVersion.ToLower() -ne "latest" ) { # A specific version has been passed. # Let's check if we're looking at the default location hosted by Salt # If we are, we'll want to adjust for pre-3006 versions if passed # If the user specified a Source, we just trust they have it set up for # the version they are passing $uri = [System.Uri]($base_url) if ( $uri.AbsoluteUri -eq $default_source ) { # Let's check for a pre 3006 version $major_version = Get-MajorVersion -Version $MinionVersion if ( $major_version -lt "3006" ) { # This is an older version, use the older URL $base_url = $pre_3006_source } else { # This is a new URL, and a version was passed, let's look in # minor if ( $MinionVersion.ToLower() -ne $major_version.ToLower() ) { $base_url = "$base_url/minor" } } } } $enc = [System.Text.Encoding]::UTF8 try { $response = Invoke-WebRequest -Uri "$base_url/repo.json" ` -UseBasicParsing if ($response.Content.GetType().Name -eq "Byte[]") { $psobj = $enc.GetString($response.Content) | ConvertFrom-Json } else { $psobj = $response.Content | ConvertFrom-Json } $hash = Convert-PSObjectToHashtable $psobj } catch { Write-Log "repo.json not found at: $base_url" -Level debug $hash = @{} } $salt_file_name = "" $salt_version = "" $salt_sha512 = "" $search_version = $MinionVersion.ToLower() if ($hash.Contains($search_version)) { foreach ($item in $hash.($search_version).Keys) { if ($item.EndsWith(".zip")) { if ($item.Contains("amd64")) { $salt_file_name = $hash.($search_version).($item).name $salt_version = $hash.($search_version).($item).version $salt_sha512 = $hash.($search_version).($item).SHA512 } } } } if ($salt_file_name -and $salt_version -and $salt_sha512) { $salt_url = @($base_url, $salt_version, $salt_file_name) -join "/" $major_version = Get-MajorVersion -Version $salt_version if ( $major_version -ge "3006" ) { if ( !($base_url.Contains("minor")) ) { $salt_url = @( $base_url, "minor", $salt_version, $salt_file_name ) -join "/" } } Write-Log "Found installer: $salt_file_name" -Level debug Write-Log "Found version: $salt_version" -Level debug Write-Log "Found sha512: $salt_sha512" -Level debug Write-Log "Found URL: $salt_url" -Level debug return @{ url = $salt_url; hash = $salt_sha512; file_name = $salt_file_name; version = $salt_version } } else { # Since there's no repo.json, we need to look in the directory for the # URL and HASH. The version can also be `latest` but expects a symlink # named `latest` that points to the directory containing the latest # version of Salt $salt_file_name = $null $salt_version = $null # Fix URL $major_version = Get-MajorVersion -Version $search_version if ( $major_version -ge "3006" ) { if ( !($base_url.Contains("minor")) ) { $base_url = @($base_url, "minor") -join "/" } } # Invoke-WebRequest will not work on a local file directory so we need # to detect the URL scheme. Use Invoke-WebRequest to get the directory # contents if URL scheme is http/https/ftp. Not tested with FTP if ($base_url -match "^(http\:|https\:|ftp\:).*") { $dir_url = @($base_url, $search_version) -join "/" Write-Log "Looking for version in web directory: $dir_url" ` -Level debug try { $dir_contents = Invoke-WebRequest -Uri $dir_url -UseBasicParsing } catch { Write-Log "Directory not found: $dir_url" -Level debug return @{} } # Look for the zip file in the directory foreach ($link in $dir_contents.Links) { if ($link.href.EndsWith(".zip")) { if ($link.href.Contains("-amd64")) { $salt_file_name = $link.href } } } } # Get the directory contents if URL is Drive Letter or UNC elseif ($base_url -match "^(\w\:|\\\\).*") { $dir_url = "$base_url\$search_version" Write-Log "Looking for version in local directory: $dir_url" ` -Level debug try { $salt_file_name = Get-ChildItem -Path $dir_url -Filter "*.zip" } catch { Write-Log "Directory not found: $dir_url" -Level debug return @{} } if ($salt_file_name.Length -gt 0) { $salt_file_name = $salt_file_name[0].Name } } else { Write-Log "Unknown source url type: $dir_url" -Level debug return @{} } # Verify that we found a file name if ($salt_file_name.Length -eq 0) { Write-Log "Zip file not found in directory: $dir_url" -Level debug return @{} } # Since we have a zip file, get the version and sha file from it if ( $salt_file_name.Contains("onedir") ) { $salt_version = ( $salt_file_name -split "-onedir-" )[0].Split("-", 2)[1] } else { $salt_version = ( $salt_file_name -split "-windows-" )[0].Split("-", 2)[1] } $sha_file_name = "salt-$($salt_version)_SHA512" # Get the contents of the sha file try { # We can use Invoke-WebRequest as long as we're looking at a file $response = Invoke-WebRequest -Uri "$dir_url/$sha_file_name" ` -UseBasicParsing } catch { Write-Log "Could not retrieve sha file: $dir_url/$sha_file_name" ` -Level debug return @{} } $salt_sha512 = $null # Get the sha out of the sha file ForEach ($line in $response.RawContent.Split([Environment]::NewLine)) { if ($line.EndsWith(".zip")) { $salt_sha512 = $line.Split()[0] } } # Verify that a sha was retrieved if ($null -eq $salt_sha512) { Write-Log "Sha not found in file: $dir_url/$sha_file_name" ` -Level debug return @{} } Write-Log "Found installer: $salt_file_name" -Level debug Write-Log "Found version: $salt_version" -Level debug Write-Log "Found sha512: $salt_sha512" -Level debug return @{ url = @($dir_url, $salt_file_name) -join "/"; hash = $salt_sha512; file_name = $salt_file_name; version = $salt_version } } } function Get-FileHash { # Get-FileHash is a built-in cmdlet in powershell 5+ but we need to support # powershell 3. This will overwrite the powershell 5 commandlet only for # this script. But it will provide the missing cmdlet for powershell 3 [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Path, [Parameter(Mandatory=$false)] [ValidateSet( "SHA1", "SHA256", "SHA384", "SHA512", # https://serverfault.com/questions/820300/ # why-isnt-mactripledes-algorithm-output-in-powershell-stable "MACTripleDES", # don't use "MD5", "RIPEMD160", IgnoreCase=$true)] [String] $Algorithm = "SHA256" ) if ( !(Test-Path $Path) ) { Write-Log "Invalid path for hashing: $Path" -Level debug return @{} } if ( (Get-Item -Path $Path) -isnot [System.IO.FileInfo]) { Write-Log "Not a file for hashing: $Path" -Level debug return @{} } $Path = Resolve-Path -Path $Path Switch ($Algorithm) { SHA1 { # We're doing this in 2 lines to comply with the 80 char limit $hasher = [System.Security.Cryptography.SHA1CryptoServiceProvider] $hasher = $hasher::Create() } SHA256 { $hasher = [System.Security.Cryptography.SHA256]::Create() } SHA384 { $hasher = [System.Security.Cryptography.SHA384]::Create() } SHA512 { $hasher = [System.Security.Cryptography.SHA512]::Create() } MACTripleDES { $hasher = [System.Security.Cryptography.MACTripleDES]::Create() } MD5 { $hasher = [System.Security.Cryptography.MD5]::Create() } RIPEMD160 { $hasher = [System.Security.Cryptography.RIPEMD160]::Create() } } Write-Log "Hashing using $Algorithm algorithm" -Level debug try { $data = [System.IO.File]::OpenRead($Path) $hash = $hasher.ComputeHash($data) $hash = [System.BitConverter]::ToString($hash) -replace "-","" return @{ Path = $Path; Algorithm = $Algorithm.ToUpper(); Hash = $hash } } catch { Write-Log "Error hashing: $Path" -Level debug return @{} } finally { if ($null -ne $data) { $data.Close() } } } function Get-SaltFromWeb { # Download the Salt OneDir zip file from the web and verify the hash # # Error: # Sets the failed status and exits with a scriptFailed exit code # Make sure the download directory exists [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Url, [Parameter(Mandatory=$true)] [String] $Destination, [Parameter(Mandatory=$true)] [String] $Hash ) # Download the Salt file Write-Log "Downloading Salt" -Level info Get-WebFile -Url $Url -OutFile $Destination # Get the hash for the Salt file $file_hash = (Get-FileHash -Path $Destination -Algorithm SHA512).Hash Write-Log "Verifying hash" -Level info if ($file_hash -like $Hash) { Write-Log "Hash verified" -Level debug } else { Write-Log "Failed to verify hash:" -Level error Write-Log " - $file_hash" -Level error Write-Log " - $Hash" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } function New-SaltCallScript { # Create the salt-call.bat script for Tiamat builds [CmdletBinding()] param( [Parameter(Mandatory=$false)] # The location to create the script [String] $Path ) $content = @( ":: Copyright (c) 2021-2023 VMware, Inc. All rights reserved.", "", ":: Script for starting the Salt-Minion", ":: Accepts all parameters that Salt-Minion Accepts", "@ echo off", "", ":: Define Variables", "Set SaltBin=%~dp0\salt\salt.exe", "", "net session >nul 2>&1", "if %errorLevel%==0 (", " :: Launch Script", " `"%SaltBin%`" call %*", ") else (", " echo ***** This script must be run as Administrator *****", ")" ) $file_content = $content -join "`r`n" Set-Content -Path $Path -Value $file_content } function New-SaltMinionScript { # Create the salt-minion.bat script for Tiamat builds [CmdletBinding()] param( [Parameter(Mandatory=$false)] # The location to create the script [String] $Path ) $content = @( ":: Copyright (c) 2021-2023 VMware, Inc. All rights reserved.", "", ":: Script for starting the Salt-Minion" ":: Accepts all parameters that Salt-Minion Accepts", "@ echo off", "", ":: Define Variables", "Set SaltBin=%~dp0\salt\salt.exe", "", "net session >nul 2>&1", 'if %errorLevel%==0 (', " :: Launch Script", " `"%SaltBin%`" minion %*", ") else (", " echo ***** This script must be run as Administrator *****", ")" ) $file_content = $content -join "`r`n" Set-Content -Path $Path -Value $file_content } function Install-SaltMinion-Tiamat { # Installs the Tiamat build of the Salt minion. Performs the following: # - Copies the helper scripts into C:\ProgramFiles\Salt Project\Salt # - Registers the salt-minion service # # Error: # Sets the failed status and exits with a scriptFailed exit code # 1. Copy the helper scripts into Program Files [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Version ) Write-Log "Copying scripts ($Version)" -Level info try { Write-Log "Creating $salt_dir\salt-call.bat" -Level debug New-SaltCallScript -Path "$salt_dir\salt-call.bat" } catch { Write-Log "Failed to create $salt_dir\salt-call.bat" -Level error Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } try { Write-Log "Creating $salt_dir\salt-minion.bat" -Level debug New-SaltMinionScript -Path "$salt_dir\salt-minion.bat" } catch { Write-Log "Failed to create $salt_dir\salt-minion.bat" -Level error Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } # 2. Register the salt-minion service Write-Log "Registering the salt-minion service ($Version)" -Level info & $ssm_bin install salt-minion "$salt_bin" ` "minion -c """"$salt_config_dir"""" -l quiet" *> $null $description = "Salt Minion from VMware Tools ($Version)" & $ssm_bin set salt-minion Description $description } function Install-SaltMinion-Relenv { # Installs the Relenv build of the Salt minion. Performs the following: # - Registers the salt-minion service # 1. Register the salt-minion service [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Version ) Write-Log "Registering the salt-minion service ($Version)" -Level info # & $ssm_bin install salt-minion "$salt_minion_bin" ` "-c """"$salt_config_dir"""" -l quiet" *> $null $description = "Salt Minion from VMware Tools ($Version)" & $ssm_bin set salt-minion Description $description } function Install-SaltMinion { # Installs the Salt minion. Performs the following: # - Expands the zipfile into C:\Program Files\Salt Project # - Detects Relenv vs Tiamat build and calls the appropriate install # function # # Error: # Sets the failed status and exits with a scriptFailed exit code # 1. Unzip into Program Files [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Path, [Parameter(Mandatory=$true)] [String] $Version ) Write-Log "Unzipping Salt (this may take a few minutes)" -Level info Expand-ZipFile -ZipFile $Path -Destination $base_salt_install_location Write-Log "Removing zipfile: $Path" -Level debug Remove-Item -Path $Path # 2. Determine if this is a Tiamat package or a Relenv package # - salt-minion.exe in the root = Relenv = post-3005 # - salt\salt.exe in the root = Tiamat = pre-3006 if ( Test-Path -Path "$salt_minion_bin") { Write-Log "Found post-3005 Package" Install-SaltMinion-Relenv -Version $Version } elseif ( Test-Path -Path "$salt_bin" ) { Write-Log "Found pre-3006 Package" Install-SaltMinion-Tiamat -Version $Version } else { Write-Log "Unknown Package Type" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } # Common service settings Write-Log "Configuring the salt-minion service" -Level info & $ssm_bin set salt-minion Start SERVICE_AUTO_START *> $null & $ssm_bin set salt-minion AppStopMethodConsole 24000 *> $null & $ssm_bin set salt-minion AppStopMethodWindow 2000 *> $null & $ssm_bin set salt-minion AppRestartDelay 60000 *> $null # 3. Verify that the service is installed try { Get-Service -Name salt-minion Write-Log "salt-minion service installed successfully" -Level debug } catch { switch ($_.FullyQualifiedErrorId.Split(",")[0]) { "NoServiceFoundForGivenName" { $msg = "Failed to install salt-minion service" Write-Log $msg -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } Default { Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } } # 4. Modify the system path Write-Log "Adding Salt to the path" -Level info Add-SystemPathValue -Path $salt_dir } function Remove-SaltMinion { # Uninstall the Salt minion. Performs the following steps: # - Stop the salt-minion service # - Remove the salt-minion service # - Remove the directories in Program Files and ProgramData # - Remove the registry entries # - Remove the entry from the system path # # Error: # Sets the failed status and exits with a scriptFailed exit code # Does the service exist try { # This command will throw an exception if the service is missing $service = Get-Service -Name salt-minion # Stop the minion service Stop-MinionService # Delete the service Write-Log "Uninstalling salt-minion service" -Level info $service = Get-WmiObject -Class Win32_Service ` -Filter "Name='salt-minion'" $service.delete() *> $null try { # This command will throw an exception if the service is missing $service = Get-Service -Name salt-minion # If we were able to connect to the service, no exception thrown, # then we failed to remove the service Write-Log "Failed to uninstall salt-minion service" -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } catch { # This would catch a missing service after the removal meaning the # service was removed successfully switch ($_.FullyQualifiedErrorId.Split(",")[0]) { "NoServiceFoundForGivenName" { $msg = "Finished uninstalling salt-minion service" Write-Log $msg -Level debug } Default { Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } } } catch { # This would catch a missing service before trying to Stop and Remove it # That would mean the service is already removed switch ($_.FullyQualifiedErrorId.Split(",")[0]) { "NoServiceFoundForGivenName" { # We'll return here because we don't need to remove a service # that isn't installed Write-Log "salt-minion service not found" -Level warning } Default { Write-Log $_ -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } } } # 3. Remove the files # Do this in a for loop for logging foreach ($item in $file_dirs_to_remove) { Remove-FileOrFolder -Path $item } # 4. Remove entry from the path Remove-SystemPathValue -Path $salt_dir } function Reset-SaltMinion { # Resets the salt-minion environment in preperation for imaging. Performs # the following steps: # - Remove minion_id file # - Randomize the minion id in the minion config # - Remove the minion public and private keys Write-Log "Resetting Salt minion" -Level info Remove-FileOrFolder "$salt_config_file\minion_id" # Comment out id: in the minion config $new_content = New-Object System.Collections.Generic.List[String] if (Test-Path -Path "$salt_config_file") { Write-Log "Searching minion config file for id" -Level debug foreach ($line in Get-Content $salt_config_file) { if ($line -match "^id:.*$") { Write-Log "Commenting out the id" -Level debug $new_content.Add("#" + $line) | Out-Null $random_id = Get-RandomizedMinionId -Prefix $line.Split("")[1] $new_content.Add("id: $random_id") | Out-Null } else { $new_content.Add($line) | Out-Null } } $config_content = $new_content -join "`r`n" Write-Log "Writing new minion config" try { Set-Content -Path $salt_config_file -Value $config_content } catch { Write-Log "Failed to write new minion config : $_" -Level error exit $STATUS_CODES["scriptFailed"] } } # Remove minion keys (minion.pem and minion.pub" Remove-FileOrFolder -Path "$salt_pki_dir\minion.pem" Remove-FileOrFolder -Path "$salt_pki_dir\minion.pub" Write-Log "Salt minion reset successfully" -Level info } function Install { # Set status and update the log Write-Log "Installing Salt minion" -Level info Set-Status installing # Make sure the base install location exists if ( !( Test-Path -Path $base_salt_install_location) ) { Write-Log "Creating directory: $base_salt_install_location" -Level debug New-Item -Path $base_salt_install_location -Type Directory | Out-Null } # Get URL from repo.json $info = Get-SaltPackageInfo -MinionVersion $MinionVersion if ($info.Count -eq 0) { $msg = "Failed to get Package Info for Version: $MinionVersion" Write-Log $msg -Level error Set-FailedStatus exit $STATUS_CODES["scriptFailed"] } $zip_file = "$base_salt_install_location\$($info.file_name)" # Download Salt from the Web Get-SaltFromWeb -Url $info.url -Destination $zip_file -Hash $info.hash # Install the Salt Package Install-SaltMinion -Path $zip_file -Version $info.version # Generate and update the minion config Add-MinionConfig # Start the Minion Service Start-MinionService # Update the Status and output the Log Set-Status installed Write-Log "Salt minion installed successfully" -Level info } function Remove { Write-Log "Removing Salt minion" -Level info Set-Status removing Remove-SaltMinion Set-Status notInstalled Write-Log "Salt minion removed successfully" -Level info } ################################### MAIN ####################################### function Main { # Check for Action. If not specified on the command line, get it from # guestVars if ($Install) { $Action = "install" } if ($Status) { $Action = "status" } if ($Depend) { $Action = "depend" } if ($Clear) { $Action = "clear" } if ($Remove) { $Action = "remove" } if (!$Action) { # We're not logging yet because we don't know the status $Action = Get-GuestVars -GuestVarsPath $guestvars_salt_desired_state if (!$Action) { $msg = "No action found in guestVars or specified on CLI" Write-Log $msg -Level error Write-Host $msg -ForegroundColor Red Write-Host "Please specify an action" -ForegroundColor Yellow return $STATUS_CODES["scriptFailed"] } switch ($Action.ToLower()) { "present" { $Action = "install" } "absent" { $Action = "remove" } } } if (!($action_list -contains $Action.ToLower())) { $msg = "Invalid action: $Action - Must be one of [$action_list]" Write-Log $msg -Level error Write-Host $msg -ForegroundColor Red Write-Host "Please specify a valid action" -ForegroundColor Yellow return $STATUS_CODES["scriptFailed"] } # Let's confirm dependencies if (!(Confirm-Dependencies)) { Write-Log "Missing script dependencies" -Level error Write-Host "Missing script dependencies" -ForegroundColor Red return $STATUS_CODES["scriptFailed"] } # Perform the action switch ($Action.ToLower()) { "depend" { # If we've gotten this far, dependencies have been confirmed Write-Host "Found all dependencies" return $STATUS_CODES["scriptSuccess"] } "install" { # Let's make sure there's not already a standard Salt installation # on the system if (Find-StandardSaltInstallation) { $msg = "Found an existing Salt installation on the system." Write-Log $msg -Level error Write-Host $msg -ForegroundColor Red return $STATUS_CODES["externalInstall"] } # If status is installed, installing, or removing, bail out $current_status = Get-Status if ($STATUS_CODES.keys -notcontains $current_status) { $msg = "Unknown status code: $current_status" Write-Log $msg -Level error Write-Host $msg -ForegroundColor Red return $STATUS_CODES["scriptFailed"] } switch ($current_status) { $STATUS_CODES["installed"] { Write-Host "Already installed" return $STATUS_CODES["scriptSuccess"] } $STATUS_CODES["installing"] { Write-Host "Installation in progress" return $STATUS_CODES["scriptFailed"] } $STATUS_CODES["removing"] { Write-Host "Removal in progress" return $STATUS_CODES["scriptFailed"] } $STATUS_CODES["removeFailed"] { # We want to clean up anything left behind by a failed # remove Remove } $STATUS_CODES["installFailed"] { # We want to clean up anything left behind by a failed # install Remove } } Install Write-Host "Salt minion installed successfully" return $STATUS_CODES["scriptSuccess"] } "remove" { # Let's make sure we're not trying to remove a standard Salt # installation on the system if (Find-StandardSaltInstallation) { $msg = "Found an existing Salt installation on the system." Write-Log $msg -Level error Write-Host $msg -ForegroundColor Red return $STATUS_CODES["externalInstall"] } # If status is installing, notInstalled, or removing, bail out $current_status = Get-Status if ($STATUS_CODES.keys -notcontains $current_status) { $msg = "Unknown status code: $current_status" Write-Host $msg -Level error return $STATUS_CODES["scriptFailed"] } switch ($current_status) { $STATUS_CODES["installing"] { Write-Host "Installation in progress" return $STATUS_CODES["scriptFailed"] } $STATUS_CODES["notInstalled"] { Write-Host "Already uninstalled" return $STATUS_CODES["scriptSuccess"] } $STATUS_CODES["removing"] { Write-Host "Removal in progress" return $STATUS_CODES["scriptFailed"] } } Remove Write-Host "Salt minion removed successfully" return $STATUS_CODES["scriptSuccess"] } "clear" { # If not installed (0), bail out $current_status = Get-Status if ($STATUS_CODES.keys -notcontains $current_status) { $msg = "Unknown status code: $current_status" Write-Host $msg -Level error return $STATUS_CODES["scriptFailed"] } if ($current_status -ne $STATUS_CODES["installed"]) { Write-Host "Not installed. Reset will not continue" return $STATUS_CODES["scriptSuccess"] } Reset-SaltMinion Write-Host "Salt minion reset successfully" return $STATUS_CODES["scriptSuccess"] } "status" { # Let's check for a standard Salt installation first if (Find-StandardSaltInstallation) { $msg = "Found an existing Salt installation on the system." Write-Log $msg -Level error Write-Host $msg -ForegroundColor Red return $STATUS_CODES["externalInstall"] } $exit_code = Get-Status if ($STATUS_CODES.keys -notcontains $exit_code) { Write-Host "Unknown status code: $exit_code" return $STATUS_CODES["scriptFailed"] } Write-Host "Found status: $($STATUS_CODES[$exit_code])" return $exit_code } } } # Allow importing for testing if (($Action) -and ($Action.ToLower() -eq "test")) { exit $STATUS_CODES["scriptSuccess"] } try { $exit_code = Main exit $exit_code } finally { if ($null -eq $exit_code) { Write-Host "Script Terminated..." exit $STATUS_CODES["scriptTerminated"] } }
combined_dataset/train/non-malicious/get windows product key_4.ps1
get windows product key_4.ps1
function get-windowsproductkey([string]$computer) { $Reg = [WMIClass] ("\\\\" + $computer + "\\root\\default:StdRegProv") $values = [byte[]]($reg.getbinaryvalue(2147483650,"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion","DigitalProductId").uvalue) $lookup = [char[]]("B","C","D","F","G","H","J","K","M","P","Q","R","T","V","W","X","Y","2","3","4","6","7","8","9") $keyStartIndex = [int]52; $keyEndIndex = [int]($keyStartIndex + 15); $decodeLength = [int]29 $decodeStringLength = [int]15 $decodedChars = new-object char[] $decodeLength $hexPid = new-object System.Collections.ArrayList for ($i = $keyStartIndex; $i -le $keyEndIndex; $i++){ [void]$hexPid.Add($values[$i]) } for ( $i = $decodeLength - 1; $i -ge 0; $i--) { if (($i + 1) % 6 -eq 0){$decodedChars[$i] = '-'} else { $digitMapIndex = [int]0 for ($j = $decodeStringLength - 1; $j -ge 0; $j--) { $byteValue = [int](($digitMapIndex * [int]256) -bor [byte]$hexPid[$j]); $hexPid[$j] = [byte] ([math]::Floor($byteValue / 24)); $digitMapIndex = $byteValue % 24; $decodedChars[$i] = $lookup[$digitMapIndex]; } } } $STR = '' $decodedChars | % { $str+=$_} $STR } get-windowsproductkey .
combined_dataset/train/non-malicious/sample_43_21.ps1
sample_43_21.ps1
# # Module manifest for module 'ThreadJob' # @{ # Script module or binary module file associated with this manifest. RootModule = '.\Microsoft.PowerShell.ThreadJob.dll' # Version number of this module. ModuleVersion = '2.0.3' # ID used to uniquely identify this module GUID = '0e7b895d-2fec-43f7-8cae-11e8d16f6e40' Author = 'Microsoft Corporation' CompanyName = 'Microsoft Corporation' Copyright = '(c) Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = " PowerShell's built-in BackgroundJob jobs (Start-Job) are run in separate processes on the local machine. They provide excellent isolation but are resource heavy. Running hundreds of BackgroundJob jobs can quickly absorb system resources. This module extends the existing PowerShell BackgroundJob to include a new thread based ThreadJob job. This is a lighter weight solution for running concurrent PowerShell scripts that works within the existing PowerShell job infrastructure. ThreadJob jobs will tend to run quicker because there is lower overhead and they do not use the remoting serialization system. And they will use up fewer system resources. In addition output objects returned from the job will be 'live' since they are not re-hydrated from the serialization system. However, there is less isolation. If one ThreadJob job crashes the process then all ThreadJob jobs running in that process will be terminated. This module exports a single cmdlet, Start-ThreadJob, which works similarly to the existing Start-Job cmdlet. The main difference is that the jobs which are created run in separate threads within the local process. One difference is that ThreadJob jobs support a ThrottleLimit parameter to limit the number of running jobs, and thus active threads, at a time. If more jobs are started then they go into a queue and wait until the current number of jobs drops below the throttle limit. Source for this module is at GitHub. Please submit any issues there. https://github.com/PaulHigin/PSThreadJob Added Runspace cleanup. Added Using variable expression support. Added StreamingHost parameter to stream host data writes to a provided host object. Added Information stream handling. Bumped version to 2.0.0, and now only support PowerShell version 5.1 and higher. Fixed using keyword bug with PowerShell preview version, and removed unneeded version check. Added setting current working directory to running jobs, when available. Added help URI to module. " # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Cmdlets to export from this module CmdletsToExport = 'Start-ThreadJob' HelpInfoURI = 'https://go.microsoft.com/fwlink/?linkid=2113345' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCv4Sy4df4Y/sf/ # 4d7im71N8tCny9H0XszagzRNoGf2raCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHladHYi2lfI6orS+P2p3tLX # iHwb+pI1x7mEwA8VwGMTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJWsEdgQFLu/2/K+184cobDXbEG4Y19OmmCi/9yJ9wRcZI3/yo/WEkszZ # 5F0/vO1SzwRn9jVdB4d5pVGvtS0URM0derfF5by/6BjOfC/5+akaJHGCDcrc17NW # REWk3pYekLB/p+mqeYhBEs3gZVg5JZEWU2ILRMwefOF5TCqoEeTFWzlgjKnGCuP9 # i/FvE0bX9uLLu4DwOm5burC4tyh9fzoNotra/1DWjxprUcqYYOCaE4NptRLnaXXO # PGo3grd9JV1finlqFozCy6ErWgxvk/gM0SvDhHhD5yrUopK9E5OfsP0vL13VrSEF # sbwrizX4ZRGbzNfU4BTB7Y4WbXdFnKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDd9gvLTyCQTEweHSyAt7WPYvHCYcHot091/jFuDkcHsAIGZdXka4Vv # GBMyMDI0MDIyNjAzMDQwOS4yODRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmGUQ8wIhgPMjAyNDAyMjYwNzUxNDNaGA8yMDI0MDIyNzA3NTE0M1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YZRDwIBADAHAgEAAgIEcjAHAgEAAgIRUzAKAgUA # 6YeijwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEXucbh1tCcsJZWNnBcf # 7jkJdUv4YIHByK+BElcS3eGuZnkZq6zVfDAPvRPGYzMhNpGNwYlkloeIzASLudYq # bx7DNKo75D9n6pBRiXv44CFLBS9j7duhNIE5Bnf+5TgaYBQD3x8bUwbhQH0o9chw # h4owHYvXt9yG/XVvbkBkpf+UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgapbsK+3tbkekBIkmAd6nCr6KSkNWogcEtV5pKJX0mFEwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIHRiS6x7wpBZr2axMZanzXPRYDxQ+PGoOo0lbMr5jh5X # MA0GCSqGSIb3DQEBCwUABIICAFqbmg5hKk0ac5g51LiUbFDSHmvfk9cZILfEE7Ct # 67YUkoc1sWDSmQyefYVV0LoPcdEwx8XPtJfDq1QDnrJhAemAPt3Oqq09C2H6j6H2 # cF1GqrdnfD5J1W9rtZs3hxNSArP+E5Mh7TdiyTCjlezZprES+Asn/wK86u+PeRam # lbQ2Rg8jL/9Dd84rD4k3wW7H1A8Yl1Ckh7RxfN7oQJokAcSNZyV1gsnRV1qPHwML # 7BU3g25BHVADpVyM7OujmUca5A635VKeXg2eMmEqjsVv9LiNC74U1BMERQDY+zn4 # rZCVOUFeVgsObbEDSu+4otJ83Q/Mj3DeVj32EYOGNEdmZAxREk2Ip5bhCTnjsRZr # q3YnB/fwIchw4lzOn+l0MT24kBJpOArGKPbYIk/EM8R/TvgwtMDjrsBClXC9F1Ke # suJjqeH37qPpTWceVYyPcPc8sMWmc28HvsfZIdhc0B5z/zIuXzKg3VNSLYUnR6pY # kXjo5htO7uflNXdo7qW3TogIubSIme8U4RERSGg0LblbqQbm/KiSDQnwRfsh+nAU # 1njnJCglXgqgLQDmd1mdUtfU9w6EgWo6K5iB7tF7pVLeOt0gEEHrrJJXrErhjPaO # GnkzqW70zvnKMwGDLbWVcLF196tZSybohxz755Pf1gEkNMKidd2TI9WUee+ndI+T # L5wf # SIG # End signature block
combined_dataset/train/non-malicious/716.ps1
716.ps1
function New-RsRestFolder { [CmdletBinding()] param( [Parameter(Mandatory = $True)] [string] $RsFolder, [Parameter(Mandatory = $True)] [Alias('Name')] [string] $FolderName, [string] $ReportPortalUri, [Alias('ApiVersion')] [ValidateSet("v2.0")] [string] $RestApiVersion = "v2.0", [Alias('ReportServerCredentials')] [System.Management.Automation.PSCredential] $Credential, [Microsoft.PowerShell.Commands.WebRequestSession] $WebSession ) Begin { $WebSession = New-RsRestSessionHelper -BoundParameters $PSBoundParameters $ReportPortalUri = Get-RsPortalUriHelper -WebSession $WebSession $foldersUri = $ReportPortalUri + "api/$RestApiVersion/Folders" } Process { try { if ($RsFolder -eq '/') { $TargetFolderPath = "/$FolderName" } else { $TargetFolderPath = "$RsFolder/$FolderName" } Write-Verbose "Creating folder $TargetFolderPath..." $payload = @{ "@odata.type" = " "Path" = $RsFolder; "Name" = $FolderName; } $payloadJson = ConvertTo-Json $payload if ($Credential -ne $null) { $response = Invoke-WebRequest -Uri $foldersUri -Method Post -WebSession $WebSession -Body ([System.Text.Encoding]::UTF8.GetBytes($payloadJson)) -ContentType "application/json" -Credential $Credential -Verbose:$false } else { $response = Invoke-WebRequest -Uri $foldersUri -Method Post -WebSession $WebSession -Body ([System.Text.Encoding]::UTF8.GetBytes($payloadJson)) -ContentType "application/json" -UseDefaultCredentials -Verbose:$false } Write-Verbose "Folder $TargetFolderPath was created successfully!" return ConvertFrom-Json $response.Content } catch { throw (New-Object System.Exception("Failed to create folder '$FolderName' in '$RsFolder': $($_.Exception.Message)", $_.Exception)) } } }
combined_dataset/train/non-malicious/4136.ps1
4136.ps1
[CmdletBinding()] param () function Uninstall-MSIByName { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][String]$ApplicationName, [ValidateNotNullOrEmpty()][String]$Switches ) $Executable = $Env:windir + "\system32\msiexec.exe" $Uninstall = Get-ChildItem HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue If (((Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture).OSArchitecture) -eq "64-Bit") { $Uninstall += Get-ChildItem HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue } $Key = $uninstall | foreach-object { Get-ItemProperty REGISTRY::$_ } | where-object { $_.DisplayName -like "*$ApplicationName*" } If ($Key -ne $null) { Write-Host "Uninstall"$Key.DisplayName"....." -NoNewline $Parameters = "/x " + $Key.PSChildName + [char]32 + $Switches $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010) -or ($ErrCode -eq 1605)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red } } } Uninstall-MSIByName -ApplicationName "Adobe Acrobat" -Switches "/qb- /norestart" Uninstall-MSIByName -ApplicationName "Adobe Reader" -Switches "/qb- /norestart"
combined_dataset/train/non-malicious/183.ps1
183.ps1
function Get-LocalGroup { PARAM ( [Alias('cn')] [String[]]$ComputerName = $Env:COMPUTERNAME, [String]$AccountName, [System.Management.Automation.PsCredential]$Credential ) $Splatting = @{ Class = "Win32_Group" Namespace = "root\cimv2" Filter = "LocalAccount='$True'" } If ($PSBoundParameters['Credential']) { $Splatting.Credential = $Credential } Foreach ($Computer in $ComputerName) { TRY { Write-Verbose -Message "[PROCESS] ComputerName: $Computer" Get-WmiObject @Splatting -ComputerName $Computer | Select-Object -Property Name, Caption, Status, SID, SIDType, Domain, Description } CATCH { Write-Warning -Message "[PROCESS] Issue connecting to $Computer" } } }
combined_dataset/train/non-malicious/sample_31_51.ps1
sample_31_51.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module -Name "$PSScriptRoot\..\RoleHelpers.psm1" -DisableNameChecking $HostInstallKBsStatusFilePath = "$($env:systemdrive)\MASLogs\HostInstallKBsStatusFile.xml" function Test-KBsInstallationFailure { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string] $HostName ) $ErrorActionPreference = 'stop' Trace-Execution "Checking if remote host '$HostName' is reachable." if(-not (Test-Path "\\$HostName\C$")) { throw "Remote host's C drive is not reachable. Host name: '$HostName'" } $HostInstallKBsStatusFileRemotePath = "\\$HostName\C$\MASLogs\HostInstallKBsStatusFile.xml" Trace-Execution "Checking if host install-KBs status file: '$HostInstallKBsStatusFileRemotePath' exists..." if(test-path $HostInstallKBsStatusFileRemotePath) { Trace-Execution "Found the file: $HostInstallKBsStatusFileRemotePath." [xml] $xmlStatus = Get-Content -Path $HostInstallKBsStatusFileRemotePath if([string]::IsNullOrEmpty($xmlStatus.Host.Status)) { throw "Xml present in file is not as expected. file: $HostInstallKBsStatusFileRemotePath" } if($xmlStatus.Host.Status -eq "Error") { Trace-Execution "KB installation failed on the host." return $true } } return $false } function Delete-HostInstallKBsStatusFile { $ErrorActionPreference = 'stop' Trace-Execution "Deleting host install-KBs status file: $HostInstallKBsStatusFilePath ..." if(test-path $HostInstallKBsStatusFilePath) { Trace-Execution "Found and deleting file: $HostInstallKBsStatusFilePath ..." Remove-Item -path $HostInstallKBsStatusFilePath -Force } } function Create-HostInstallKBsStatusFile { $ErrorActionPreference = 'stop' Trace-Execution "Creating host install-KBs status file: $HostInstallKBsStatusFilePath ..." $xmlStatus = "<Host><Status>Error</Status></Host>" Set-Content -Value $xmlStatus -Path $HostInstallKBsStatusFilePath -Force } Export-ModuleMember Test-KBsInstallationFailure Export-ModuleMember Delete-HostInstallKBsStatusFile Export-ModuleMember Create-HostInstallKBsStatusFile # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCyGHsxzYyuMBrC # KzVUjdHhgUbEfG8i2PGLQXMFsLX1T6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMOKxSVdVEXK1pKnxXUat9lg # fCFHFfjFtNHKgFPtg37+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAdHY6Gq2NvAJGoW+qZt8qXj7unjLWWJ1FjqR1q5H9Yj3EtVEhheNDtYYv # VCabO3w/RWLS4yER7Nlp4KPNeIvYfL96go6RI/hG498AYtWvcoO7wN0O+t69ItOH # wpn8sCUbp5Vhq3cps3s22z4o6bBHb/kkdTN7ccZq7IJr2Aler+WlxQ2H/iL90IXT # xwQAyIoTOW16vKcYCpApO16nCflSrvlJPZA/DFoBvaoQEI8eustg4kSlDItaJG7q # VafmxU/SRmnnPWek09AH58yhh0Is/TZUt8vscyGmbPa3TBIXLytLi1EoxyaDKSTo # XeNweR8BB6sFKQ0TwiZugFuXamSw4qGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAngOaMgjpWzMC7gjxLejtm3/3rCypXAgKLl/U1aqKfeAIGZbqk0RXh # GBMyMDI0MDIxMjE0MDUzMC4xNzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA # 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/ # fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly # OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc # Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgrPpVgPElOpZZPv9Cw7HaVufKDHfjnXx5PIKh6n+eT/swgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao # MA0GCSqGSIb3DQEBCwUABIICAF4JRLNHvO3t+omgjcj3ie2hGSkD8kDmvVw2MRUs # VUT0AwrzTbI2Km6QjaGew9jiSEMacMrQhTdEP8uEQEP3oJvgXz97iT1HnwNftn69 # ymWUHcpsN2ZlbwPnwtXcdStLidM2gex9AcpTTIubp5+fUENaig/EMMql1v+CQ8oI # s+RvybZZXt38iZj8Iplpn2cKi/LW9tR8CCt+ZMBhzEl8XxcM9YPU23/6pyCVMHn/ # AOGROmFNVNA9ilZai7B/ldgZL/UBjDp+kt04MYukDuRNz/hc5mjxryxLLLCtUTKN # 0gLBv3zdEvE3B65wfFBguP0DoOnE8iB9nPY5vaeuBBTz4nDa7HoVhQbiXp54NlJh # lcaE74rohQGKktseoOQkhEI4jECz9yiBCuapDvVeDqFoYbPI+BiqZS+cfxIlS9GB # Rqa2BrPA/Al/DxCNCg+k+AzT4LHksjwICs6zCGdeqHetfxRtJjF53zEYeAnw1DsN # 7d4at66q2eYEraf+vWC51O72mKba92UD20PdZ+w/2Y99G3lm1MYpg1QX21g2EwND # Dw1xFz6zhM29p3UE3bJWnS6pQyh0sJ1JxBeAaAU66otobXBUQc5MFmQnH0Ex+93F # cI5s4RQWGxZwWywERaKZF2Cd/rjCDmBYjwOZJQskx9yjogH7F3CQnON9nEesAr4e # JaWc # SIG # End signature block
combined_dataset/train/non-malicious/sample_26_32.ps1
sample_26_32.ps1
# # Module manifest for module 'OCI.PSModules.Networkfirewall' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkfirewall.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6a784c1a-dca2-489e-beb9-d910537df35b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkfirewall Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkfirewall.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkfirewall', 'Get-OCINetworkfirewallAddressList', 'Get-OCINetworkfirewallAddressListsList', 'Get-OCINetworkfirewallApplication', 'Get-OCINetworkfirewallApplicationGroup', 'Get-OCINetworkfirewallApplicationGroupsList', 'Get-OCINetworkfirewallApplicationsList', 'Get-OCINetworkfirewallDecryptionProfile', 'Get-OCINetworkfirewallDecryptionProfilesList', 'Get-OCINetworkfirewallDecryptionRule', 'Get-OCINetworkfirewallDecryptionRulesList', 'Get-OCINetworkfirewallMappedSecret', 'Get-OCINetworkfirewallMappedSecretsList', 'Get-OCINetworkfirewallPoliciesList', 'Get-OCINetworkfirewallPolicy', 'Get-OCINetworkfirewallSecurityRule', 'Get-OCINetworkfirewallSecurityRulesList', 'Get-OCINetworkfirewallService', 'Get-OCINetworkfirewallServiceList', 'Get-OCINetworkfirewallServiceListsList', 'Get-OCINetworkfirewallServicesList', 'Get-OCINetworkfirewallsList', 'Get-OCINetworkfirewallUrlList', 'Get-OCINetworkfirewallUrlListsList', 'Get-OCINetworkfirewallWorkRequest', 'Get-OCINetworkfirewallWorkRequestErrorsList', 'Get-OCINetworkfirewallWorkRequestLogsList', 'Get-OCINetworkfirewallWorkRequestsList', 'Invoke-OCINetworkfirewallApplyNetworkFirewallPolicy', 'Invoke-OCINetworkfirewallBulkUploadAddressLists', 'Invoke-OCINetworkfirewallBulkUploadApplicationGroups', 'Invoke-OCINetworkfirewallBulkUploadApplications', 'Invoke-OCINetworkfirewallBulkUploadDecryptionProfiles', 'Invoke-OCINetworkfirewallBulkUploadDecryptionRules', 'Invoke-OCINetworkfirewallBulkUploadMappedSecrets', 'Invoke-OCINetworkfirewallBulkUploadSecurityRules', 'Invoke-OCINetworkfirewallBulkUploadServiceLists', 'Invoke-OCINetworkfirewallBulkUploadServices', 'Invoke-OCINetworkfirewallBulkUploadUrlLists', 'Invoke-OCINetworkfirewallCloneNetworkFirewallPolicy', 'Invoke-OCINetworkfirewallMigrateNetworkFirewallPolicy', 'Move-OCINetworkfirewallCompartment', 'Move-OCINetworkfirewallPolicyCompartment', 'New-OCINetworkfirewall', 'New-OCINetworkfirewallAddressList', 'New-OCINetworkfirewallApplication', 'New-OCINetworkfirewallApplicationGroup', 'New-OCINetworkfirewallDecryptionProfile', 'New-OCINetworkfirewallDecryptionRule', 'New-OCINetworkfirewallMappedSecret', 'New-OCINetworkfirewallPolicy', 'New-OCINetworkfirewallSecurityRule', 'New-OCINetworkfirewallService', 'New-OCINetworkfirewallServiceList', 'New-OCINetworkfirewallUrlList', 'Remove-OCINetworkfirewall', 'Remove-OCINetworkfirewallAddressList', 'Remove-OCINetworkfirewallApplication', 'Remove-OCINetworkfirewallApplicationGroup', 'Remove-OCINetworkfirewallDecryptionProfile', 'Remove-OCINetworkfirewallDecryptionRule', 'Remove-OCINetworkfirewallMappedSecret', 'Remove-OCINetworkfirewallPolicy', 'Remove-OCINetworkfirewallSecurityRule', 'Remove-OCINetworkfirewallService', 'Remove-OCINetworkfirewallServiceList', 'Remove-OCINetworkfirewallUrlList', 'Stop-OCINetworkfirewallWorkRequest', 'Update-OCINetworkfirewall', 'Update-OCINetworkfirewallAddressList', 'Update-OCINetworkfirewallApplication', 'Update-OCINetworkfirewallApplicationGroup', 'Update-OCINetworkfirewallDecryptionProfile', 'Update-OCINetworkfirewallDecryptionRule', 'Update-OCINetworkfirewallMappedSecret', 'Update-OCINetworkfirewallPolicy', 'Update-OCINetworkfirewallSecurityRule', 'Update-OCINetworkfirewallService', 'Update-OCINetworkfirewallServiceList', 'Update-OCINetworkfirewallUrlList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkfirewall' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4217.ps1
4217.ps1
function New-InMemoryModule { Param ( [Parameter(Position = 0)] [ValidateNotNullOrEmpty()] [String] $ModuleName = [Guid]::NewGuid().ToString() ) $LoadedAssemblies = [AppDomain]::CurrentDomain.GetAssemblies() ForEach ($Assembly in $LoadedAssemblies) { if ($Assembly.FullName -and ($Assembly.FullName.Split(',')[0] -eq $ModuleName)) { return $Assembly } } $DynAssembly = New-Object Reflection.AssemblyName($ModuleName) $Domain = [AppDomain]::CurrentDomain $AssemblyBuilder = $Domain.DefineDynamicAssembly($DynAssembly, 'Run') $ModuleBuilder = $AssemblyBuilder.DefineDynamicModule($ModuleName, $False) return $ModuleBuilder } function func { Param ( [Parameter(Position = 0, Mandatory = $True)] [String] $DllName, [Parameter(Position = 1, Mandatory = $True)] [String] $FunctionName, [Parameter(Position = 2, Mandatory = $True)] [Type] $ReturnType, [Parameter(Position = 3)] [Type[]] $ParameterTypes, [Parameter(Position = 4)] [Runtime.InteropServices.CallingConvention] $NativeCallingConvention, [Parameter(Position = 5)] [Runtime.InteropServices.CharSet] $Charset, [Switch] $SetLastError ) $Properties = @{ DllName = $DllName FunctionName = $FunctionName ReturnType = $ReturnType } if ($ParameterTypes) { $Properties['ParameterTypes'] = $ParameterTypes } if ($NativeCallingConvention) { $Properties['NativeCallingConvention'] = $NativeCallingConvention } if ($Charset) { $Properties['Charset'] = $Charset } if ($SetLastError) { $Properties['SetLastError'] = $SetLastError } New-Object PSObject -Property $Properties } function Add-Win32Type { [OutputType([Hashtable])] Param( [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [String] $DllName, [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [String] $FunctionName, [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [Type] $ReturnType, [Parameter(ValueFromPipelineByPropertyName = $True)] [Type[]] $ParameterTypes, [Parameter(ValueFromPipelineByPropertyName = $True)] [Runtime.InteropServices.CallingConvention] $NativeCallingConvention = [Runtime.InteropServices.CallingConvention]::StdCall, [Parameter(ValueFromPipelineByPropertyName = $True)] [Runtime.InteropServices.CharSet] $Charset = [Runtime.InteropServices.CharSet]::Auto, [Parameter(ValueFromPipelineByPropertyName = $True)] [Switch] $SetLastError, [Parameter(Mandatory = $True)] [ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] $Module, [ValidateNotNull()] [String] $Namespace = '' ) BEGIN { $TypeHash = @{} } PROCESS { if ($Module -is [Reflection.Assembly]) { if ($Namespace) { $TypeHash[$DllName] = $Module.GetType("$Namespace.$DllName") } else { $TypeHash[$DllName] = $Module.GetType($DllName) } } else { if (!$TypeHash.ContainsKey($DllName)) { if ($Namespace) { $TypeHash[$DllName] = $Module.DefineType("$Namespace.$DllName", 'Public,BeforeFieldInit') } else { $TypeHash[$DllName] = $Module.DefineType($DllName, 'Public,BeforeFieldInit') } } $Method = $TypeHash[$DllName].DefineMethod( $FunctionName, 'Public,Static,PinvokeImpl', $ReturnType, $ParameterTypes) $i = 1 ForEach($Parameter in $ParameterTypes) { if ($Parameter.IsByRef) { [void] $Method.DefineParameter($i, 'Out', $Null) } $i++ } $DllImport = [Runtime.InteropServices.DllImportAttribute] $SetLastErrorField = $DllImport.GetField('SetLastError') $CallingConventionField = $DllImport.GetField('CallingConvention') $CharsetField = $DllImport.GetField('CharSet') if ($SetLastError) { $SLEValue = $True } else { $SLEValue = $False } $Constructor = [Runtime.InteropServices.DllImportAttribute].GetConstructor([String]) $DllImportAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($Constructor, $DllName, [Reflection.PropertyInfo[]] @(), [Object[]] @(), [Reflection.FieldInfo[]] @($SetLastErrorField, $CallingConventionField, $CharsetField), [Object[]] @($SLEValue, ([Runtime.InteropServices.CallingConvention] $NativeCallingConvention), ([Runtime.InteropServices.CharSet] $Charset))) $Method.SetCustomAttribute($DllImportAttribute) } } END { if ($Module -is [Reflection.Assembly]) { return $TypeHash } $ReturnTypes = @{} ForEach ($Key in $TypeHash.Keys) { $Type = $TypeHash[$Key].CreateType() $ReturnTypes[$Key] = $Type } return $ReturnTypes } } function psenum { [OutputType([Type])] Param ( [Parameter(Position = 0, Mandatory = $True)] [ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] $Module, [Parameter(Position = 1, Mandatory = $True)] [ValidateNotNullOrEmpty()] [String] $FullName, [Parameter(Position = 2, Mandatory = $True)] [Type] $Type, [Parameter(Position = 3, Mandatory = $True)] [ValidateNotNullOrEmpty()] [Hashtable] $EnumElements, [Switch] $Bitfield ) if ($Module -is [Reflection.Assembly]) { return ($Module.GetType($FullName)) } $EnumType = $Type -as [Type] $EnumBuilder = $Module.DefineEnum($FullName, 'Public', $EnumType) if ($Bitfield) { $FlagsConstructor = [FlagsAttribute].GetConstructor(@()) $FlagsCustomAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($FlagsConstructor, @()) $EnumBuilder.SetCustomAttribute($FlagsCustomAttribute) } ForEach ($Key in $EnumElements.Keys) { $Null = $EnumBuilder.DefineLiteral($Key, $EnumElements[$Key] -as $EnumType) } $EnumBuilder.CreateType() } function field { Param ( [Parameter(Position = 0, Mandatory = $True)] [UInt16] $Position, [Parameter(Position = 1, Mandatory = $True)] [Type] $Type, [Parameter(Position = 2)] [UInt16] $Offset, [Object[]] $MarshalAs ) @{ Position = $Position Type = $Type -as [Type] Offset = $Offset MarshalAs = $MarshalAs } } function struct { [OutputType([Type])] Param ( [Parameter(Position = 1, Mandatory = $True)] [ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})] $Module, [Parameter(Position = 2, Mandatory = $True)] [ValidateNotNullOrEmpty()] [String] $FullName, [Parameter(Position = 3, Mandatory = $True)] [ValidateNotNullOrEmpty()] [Hashtable] $StructFields, [Reflection.Emit.PackingSize] $PackingSize = [Reflection.Emit.PackingSize]::Unspecified, [Switch] $ExplicitLayout ) if ($Module -is [Reflection.Assembly]) { return ($Module.GetType($FullName)) } [Reflection.TypeAttributes] $StructAttributes = 'AnsiClass, Class, Public, Sealed, BeforeFieldInit' if ($ExplicitLayout) { $StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::ExplicitLayout } else { $StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::SequentialLayout } $StructBuilder = $Module.DefineType($FullName, $StructAttributes, [ValueType], $PackingSize) $ConstructorInfo = [Runtime.InteropServices.MarshalAsAttribute].GetConstructors()[0] $SizeConst = @([Runtime.InteropServices.MarshalAsAttribute].GetField('SizeConst')) $Fields = New-Object Hashtable[]($StructFields.Count) ForEach ($Field in $StructFields.Keys) { $Index = $StructFields[$Field]['Position'] $Fields[$Index] = @{FieldName = $Field; Properties = $StructFields[$Field]} } ForEach ($Field in $Fields) { $FieldName = $Field['FieldName'] $FieldProp = $Field['Properties'] $Offset = $FieldProp['Offset'] $Type = $FieldProp['Type'] $MarshalAs = $FieldProp['MarshalAs'] $NewField = $StructBuilder.DefineField($FieldName, $Type, 'Public') if ($MarshalAs) { $UnmanagedType = $MarshalAs[0] -as ([Runtime.InteropServices.UnmanagedType]) if ($MarshalAs[1]) { $Size = $MarshalAs[1] $AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo, $UnmanagedType, $SizeConst, @($Size)) } else { $AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo, [Object[]] @($UnmanagedType)) } $NewField.SetCustomAttribute($AttribBuilder) } if ($ExplicitLayout) { $NewField.SetOffset($Offset) } } $SizeMethod = $StructBuilder.DefineMethod('GetSize', 'Public, Static', [Int], [Type[]] @()) $ILGenerator = $SizeMethod.GetILGenerator() $ILGenerator.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder) $ILGenerator.Emit([Reflection.Emit.OpCodes]::Call, [Type].GetMethod('GetTypeFromHandle')) $ILGenerator.Emit([Reflection.Emit.OpCodes]::Call, [Runtime.InteropServices.Marshal].GetMethod('SizeOf', [Type[]] @([Type]))) $ILGenerator.Emit([Reflection.Emit.OpCodes]::Ret) $ImplicitConverter = $StructBuilder.DefineMethod('op_Implicit', 'PrivateScope, Public, Static, HideBySig, SpecialName', $StructBuilder, [Type[]] @([IntPtr])) $ILGenerator2 = $ImplicitConverter.GetILGenerator() $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Nop) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldarg_0) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call, [Type].GetMethod('GetTypeFromHandle')) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call, [Runtime.InteropServices.Marshal].GetMethod('PtrToStructure', [Type[]] @([IntPtr], [Type]))) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Unbox_Any, $StructBuilder) $ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ret) $StructBuilder.CreateType() } filter Get-IniContent { [CmdletBinding()] Param( [Parameter(Mandatory=$True, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$True)] [Alias('FullName')] [ValidateScript({ Test-Path -Path $_ })] [String[]] $Path ) ForEach($TargetPath in $Path) { $IniObject = @{} Switch -Regex -File $TargetPath { "^\[(.+)\]" { $Section = $matches[1].Trim() $IniObject[$Section] = @{} $CommentCount = 0 } "^(;.*)$" { $Value = $matches[1].Trim() $CommentCount = $CommentCount + 1 $Name = 'Comment' + $CommentCount $IniObject[$Section][$Name] = $Value } "(.+?)\s*=(.*)" { $Name, $Value = $matches[1..2] $Name = $Name.Trim() $Values = $Value.split(',') | ForEach-Object {$_.Trim()} if($Values -isnot [System.Array]) {$Values = @($Values)} $IniObject[$Section][$Name] = $Values } } $IniObject } } filter Get-IPAddress { [CmdletBinding()] param( [Parameter(Position=0, ValueFromPipeline=$True)] [Alias('HostName')] [String] $ComputerName = $Env:ComputerName ) try { $Computer = $ComputerName | Get-NameField @(([Net.Dns]::GetHostEntry($Computer)).AddressList) | ForEach-Object { if ($_.AddressFamily -eq 'InterNetwork') { $Out = New-Object PSObject $Out | Add-Member Noteproperty 'ComputerName' $Computer $Out | Add-Member Noteproperty 'IPAddress' $_.IPAddressToString $Out } } } catch { Write-Verbose -Message 'Could not resolve host to an IP Address.' } } filter Convert-NameToSid { [CmdletBinding()] param( [Parameter(Mandatory=$True, ValueFromPipeline=$True)] [String] [Alias('Name')] $ObjectName, [String] $Domain ) $ObjectName = $ObjectName -Replace "/","\" if($ObjectName.Contains("\")) { $Domain = $ObjectName.Split("\")[0] $ObjectName = $ObjectName.Split("\")[1] } elseif(-not $Domain) { $Domain = (Get-NetDomain).Name } try { $Obj = (New-Object System.Security.Principal.NTAccount($Domain, $ObjectName)) $SID = $Obj.Translate([System.Security.Principal.SecurityIdentifier]).Value $Out = New-Object PSObject $Out | Add-Member Noteproperty 'ObjectName' $ObjectName $Out | Add-Member Noteproperty 'SID' $SID $Out } catch { Write-Verbose "Invalid object/name: $Domain\$ObjectName" $Null } } filter Convert-SidToName { [CmdletBinding()] param( [Parameter(Mandatory=$True, ValueFromPipeline=$True)] [String] [ValidatePattern('^S-1-.*')] $SID ) try { $SID2 = $SID.trim('*') Switch ($SID2) { 'S-1-0' { 'Null Authority' } 'S-1-0-0' { 'Nobody' } 'S-1-1' { 'World Authority' } 'S-1-1-0' { 'Everyone' } 'S-1-2' { 'Local Authority' } 'S-1-2-0' { 'Local' } 'S-1-2-1' { 'Console Logon ' } 'S-1-3' { 'Creator Authority' } 'S-1-3-0' { 'Creator Owner' } 'S-1-3-1' { 'Creator Group' } 'S-1-3-2' { 'Creator Owner Server' } 'S-1-3-3' { 'Creator Group Server' } 'S-1-3-4' { 'Owner Rights' } 'S-1-4' { 'Non-unique Authority' } 'S-1-5' { 'NT Authority' } 'S-1-5-1' { 'Dialup' } 'S-1-5-2' { 'Network' } 'S-1-5-3' { 'Batch' } 'S-1-5-4' { 'Interactive' } 'S-1-5-6' { 'Service' } 'S-1-5-7' { 'Anonymous' } 'S-1-5-8' { 'Proxy' } 'S-1-5-9' { 'Enterprise Domain Controllers' } 'S-1-5-10' { 'Principal Self' } 'S-1-5-11' { 'Authenticated Users' } 'S-1-5-12' { 'Restricted Code' } 'S-1-5-13' { 'Terminal Server Users' } 'S-1-5-14' { 'Remote Interactive Logon' } 'S-1-5-15' { 'This Organization ' } 'S-1-5-17' { 'This Organization ' } 'S-1-5-18' { 'Local System' } 'S-1-5-19' { 'NT Authority' } 'S-1-5-20' { 'NT Authority' } 'S-1-5-80-0' { 'All Services ' } 'S-1-5-32-544' { 'BUILTIN\Administrators' } 'S-1-5-32-545' { 'BUILTIN\Users' } 'S-1-5-32-546' { 'BUILTIN\Guests' } 'S-1-5-32-547' { 'BUILTIN\Power Users' } 'S-1-5-32-548' { 'BUILTIN\Account Operators' } 'S-1-5-32-549' { 'BUILTIN\Server Operators' } 'S-1-5-32-550' { 'BUILTIN\Print Operators' } 'S-1-5-32-551' { 'BUILTIN\Backup Operators' } 'S-1-5-32-552' { 'BUILTIN\Replicators' } 'S-1-5-32-554' { 'BUILTIN\Pre-Windows 2000 Compatible Access' } 'S-1-5-32-555' { 'BUILTIN\Remote Desktop Users' } 'S-1-5-32-556' { 'BUILTIN\Network Configuration Operators' } 'S-1-5-32-557' { 'BUILTIN\Incoming Forest Trust Builders' } 'S-1-5-32-558' { 'BUILTIN\Performance Monitor Users' } 'S-1-5-32-559' { 'BUILTIN\Performance Log Users' } 'S-1-5-32-560' { 'BUILTIN\Windows Authorization Access Group' } 'S-1-5-32-561' { 'BUILTIN\Terminal Server License Servers' } 'S-1-5-32-562' { 'BUILTIN\Distributed COM Users' } 'S-1-5-32-569' { 'BUILTIN\Cryptographic Operators' } 'S-1-5-32-573' { 'BUILTIN\Event Log Readers' } 'S-1-5-32-574' { 'BUILTIN\Certificate Service DCOM Access' } 'S-1-5-32-575' { 'BUILTIN\RDS Remote Access Servers' } 'S-1-5-32-576' { 'BUILTIN\RDS Endpoint Servers' } 'S-1-5-32-577' { 'BUILTIN\RDS Management Servers' } 'S-1-5-32-578' { 'BUILTIN\Hyper-V Administrators' } 'S-1-5-32-579' { 'BUILTIN\Access Control Assistance Operators' } 'S-1-5-32-580' { 'BUILTIN\Access Control Assistance Operators' } Default { $Obj = (New-Object System.Security.Principal.SecurityIdentifier($SID2)) $Obj.Translate( [System.Security.Principal.NTAccount]).Value } } } catch { Write-Verbose "Invalid SID: $SID" $SID } } filter Convert-ADName { [CmdletBinding()] param( [Parameter(Mandatory=$True, ValueFromPipeline=$True)] [String] $ObjectName, [String] [ValidateSet("NT4","DN","Simple","Canonical")] $InputType, [String] [ValidateSet("NT4","DN","Simple","Canonical")] $OutputType ) $NameTypes = @{ 'DN' = 1 'Canonical' = 2 'NT4' = 3 'Simple' = 5 } if(-not $PSBoundParameters['InputType']) { if( ($ObjectName.split('/')).Count -eq 2 ) { $ObjectName = $ObjectName.replace('/', '\') } if($ObjectName -match "^[A-Za-z]+\\[A-Za-z ]+") { $InputType = 'NT4' } elseif($ObjectName -match "^[A-Za-z ]+@[A-Za-z\.]+") { $InputType = 'Simple' } elseif($ObjectName -match "^[A-Za-z\.]+/[A-Za-z]+/[A-Za-z/ ]+") { $InputType = 'Canonical' } elseif($ObjectName -match '^CN=.*') { $InputType = 'DN' } else { Write-Warning "Can not identify InType for $ObjectName" } } elseif($InputType -eq 'NT4') { $ObjectName = $ObjectName.replace('/', '\') } if(-not $PSBoundParameters['OutputType']) { $OutputType = Switch($InputType) { 'NT4' {'Canonical'} 'Simple' {'NT4'} 'DN' {'NT4'} 'Canonical' {'NT4'} } } $Domain = Switch($InputType) { 'NT4' { $ObjectName.split("\")[0] } 'Simple' { $ObjectName.split("@")[1] } 'Canonical' { $ObjectName.split("/")[0] } 'DN' {$ObjectName.subString($ObjectName.IndexOf('DC=')) -replace 'DC=','' -replace ',','.'} } function Invoke-Method([__ComObject] $Object, [String] $Method, $Parameters) { $Output = $Object.GetType().InvokeMember($Method, "InvokeMethod", $Null, $Object, $Parameters) if ( $Output ) { $Output } } function Set-Property([__ComObject] $Object, [String] $Property, $Parameters) { [Void] $Object.GetType().InvokeMember($Property, "SetProperty", $Null, $Object, $Parameters) } $Translate = New-Object -ComObject NameTranslate try { Invoke-Method $Translate "Init" (1, $Domain) } catch [System.Management.Automation.MethodInvocationException] { } Set-Property $Translate "ChaseReferral" (0x60) try { Invoke-Method $Translate "Set" ($NameTypes[$InputType], $ObjectName) (Invoke-Method $Translate "Get" ($NameTypes[$OutputType])) } catch [System.Management.Automation.MethodInvocationException] { } } filter Get-NameField { [CmdletBinding()] param( [Parameter(ValueFromPipeline = $True, ValueFromPipelineByPropertyName = $True)] [Object] $Object, [Parameter(ValueFromPipelineByPropertyName = $True)] [String] $DnsHostName, [Parameter(ValueFromPipelineByPropertyName = $True)] [String] $Name ) if($PSBoundParameters['DnsHostName']) { $DnsHostName } elseif($PSBoundParameters['Name']) { $Name } elseif($Object) { if ( [bool]($Object.PSobject.Properties.name -match "dnshostname") ) { $Object.dnshostname } elseif ( [bool]($Object.PSobject.Properties.name -match "name") ) { $Object.name } else { $Object } } else { return $Null } } function Convert-LDAPProperty { param( [Parameter(Mandatory=$True, ValueFromPipeline=$True)] [ValidateNotNullOrEmpty()] $Properties ) $ObjectProperties = @{} $Properties.PropertyNames | ForEach-Object { if (($_ -eq "objectsid") -or ($_ -eq "sidhistory")) { $ObjectProperties[$_] = (New-Object System.Security.Principal.SecurityIdentifier($Properties[$_][0],0)).Value } elseif($_ -eq "objectguid") { $ObjectProperties[$_] = (New-Object Guid (,$Properties[$_][0])).Guid } elseif( ($_ -eq "lastlogon") -or ($_ -eq "lastlogontimestamp") -or ($_ -eq "pwdlastset") -or ($_ -eq "lastlogoff") -or ($_ -eq "badPasswordTime") ) { if ($Properties[$_][0] -is [System.MarshalByRefObject]) { $Temp = $Properties[$_][0] [Int32]$High = $Temp.GetType().InvokeMember("HighPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null) [Int32]$Low = $Temp.GetType().InvokeMember("LowPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null) $ObjectProperties[$_] = ([datetime]::FromFileTime([Int64]("0x{0:x8}{1:x8}" -f $High, $Low))) } else { $ObjectProperties[$_] = ([datetime]::FromFileTime(($Properties[$_][0]))) } } elseif($Properties[$_][0] -is [System.MarshalByRefObject]) { $Prop = $Properties[$_] try { $Temp = $Prop[$_][0] Write-Verbose $_ [Int32]$High = $Temp.GetType().InvokeMember("HighPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null) [Int32]$Low = $Temp.GetType().InvokeMember("LowPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null) $ObjectProperties[$_] = [Int64]("0x{0:x8}{1:x8}" -f $High, $Low) } catch { $ObjectProperties[$_] = $Prop[$_] } } elseif($Properties[$_].count -eq 1) { $ObjectProperties[$_] = $Properties[$_][0] } else { $ObjectProperties[$_] = $Properties[$_] } } New-Object -TypeName PSObject -Property $ObjectProperties } filter Get-DomainSearcher { param( [Parameter(ValueFromPipeline=$True)] [String] $Domain, [String] $DomainController, [String] $ADSpath, [String] $ADSprefix, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) if(-not $Credential) { if(-not $Domain) { $Domain = (Get-NetDomain).name } elseif(-not $DomainController) { try { $DomainController = ((Get-NetDomain).PdcRoleOwner).Name } catch { throw "Get-DomainSearcher: Error in retrieving PDC for current domain" } } } elseif (-not $DomainController) { try { $DomainController = ((Get-NetDomain -Credential $Credential).PdcRoleOwner).Name } catch { throw "Get-DomainSearcher: Error in retrieving PDC for current domain" } if(!$DomainController) { throw "Get-DomainSearcher: Error in retrieving PDC for current domain" } } $SearchString = "LDAP://" if($DomainController) { $SearchString += $DomainController if($Domain){ $SearchString += '/' } } if($ADSprefix) { $SearchString += $ADSprefix + ',' } if($ADSpath) { if($ADSpath -Match '^GC://') { $DN = $AdsPath.ToUpper().Trim('/') $SearchString = '' } else { if($ADSpath -match '^LDAP://') { if($ADSpath -match "LDAP://.+/.+") { $SearchString = '' } else { $ADSpath = $ADSpath.Substring(7) } } $DN = $ADSpath } } else { if($Domain -and ($Domain.Trim() -ne "")) { $DN = "DC=$($Domain.Replace('.', ',DC='))" } } $SearchString += $DN Write-Verbose "Get-DomainSearcher search string: $SearchString" if($Credential) { Write-Verbose "Using alternate credentials for LDAP connection" $DomainObject = New-Object DirectoryServices.DirectoryEntry($SearchString, $Credential.UserName, $Credential.GetNetworkCredential().Password) $Searcher = New-Object System.DirectoryServices.DirectorySearcher($DomainObject) } else { $Searcher = New-Object System.DirectoryServices.DirectorySearcher([ADSI]$SearchString) } $Searcher.PageSize = $PageSize $Searcher.CacheResults = $False $Searcher } filter Get-NetDomain { param( [Parameter(ValueFromPipeline=$True)] [String] $Domain, [Management.Automation.PSCredential] $Credential ) if($Credential) { Write-Verbose "Using alternate credentials for Get-NetDomain" if(!$Domain) { $Domain = $Credential.GetNetworkCredential().Domain Write-Verbose "Extracted domain '$Domain' from -Credential" } $DomainContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Domain', $Domain, $Credential.UserName, $Credential.GetNetworkCredential().Password) try { [System.DirectoryServices.ActiveDirectory.Domain]::GetDomain($DomainContext) } catch { Write-Verbose "The specified domain does '$Domain' not exist, could not be contacted, there isn't an existing trust, or the specified credentials are invalid." $Null } } elseif($Domain) { $DomainContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Domain', $Domain) try { [System.DirectoryServices.ActiveDirectory.Domain]::GetDomain($DomainContext) } catch { Write-Verbose "The specified domain '$Domain' does not exist, could not be contacted, or there isn't an existing trust." $Null } } else { [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() } } filter Get-NetForest { param( [Parameter(ValueFromPipeline=$True)] [String] $Forest, [Management.Automation.PSCredential] $Credential ) if($Credential) { Write-Verbose "Using alternate credentials for Get-NetForest" if(!$Forest) { $Forest = $Credential.GetNetworkCredential().Domain Write-Verbose "Extracted domain '$Forest' from -Credential" } $ForestContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Forest', $Forest, $Credential.UserName, $Credential.GetNetworkCredential().Password) try { $ForestObject = [System.DirectoryServices.ActiveDirectory.Forest]::GetForest($ForestContext) } catch { Write-Verbose "The specified forest '$Forest' does not exist, could not be contacted, there isn't an existing trust, or the specified credentials are invalid." $Null } } elseif($Forest) { $ForestContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Forest', $Forest) try { $ForestObject = [System.DirectoryServices.ActiveDirectory.Forest]::GetForest($ForestContext) } catch { Write-Verbose "The specified forest '$Forest' does not exist, could not be contacted, or there isn't an existing trust." return $Null } } else { $ForestObject = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest() } if($ForestObject) { $ForestSid = (New-Object System.Security.Principal.NTAccount($ForestObject.RootDomain,"krbtgt")).Translate([System.Security.Principal.SecurityIdentifier]).Value $Parts = $ForestSid -Split "-" $ForestSid = $Parts[0..$($Parts.length-2)] -join "-" $ForestObject | Add-Member NoteProperty 'RootDomainSid' $ForestSid $ForestObject } } filter Get-NetForestDomain { param( [Parameter(ValueFromPipeline=$True)] [String] $Forest, [Management.Automation.PSCredential] $Credential ) $ForestObject = Get-NetForest -Forest $Forest -Credential $Credential if($ForestObject) { $ForestObject.Domains } } filter Get-NetDomainController { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$True)] [String] $Domain, [String] $DomainController, [Switch] $LDAP, [Management.Automation.PSCredential] $Credential ) if($LDAP -or $DomainController) { Get-NetComputer -Domain $Domain -DomainController $DomainController -Credential $Credential -FullData -Filter '(userAccountControl:1.2.840.113556.1.4.803:=8192)' } else { $FoundDomain = Get-NetDomain -Domain $Domain -Credential $Credential if($FoundDomain) { $Founddomain.DomainControllers } } } function Get-NetComputer { [CmdletBinding()] Param ( [Parameter(ValueFromPipeline=$True)] [Alias('HostName')] [String] $ComputerName = '*', [String] $SPN, [String] $OperatingSystem, [String] $ServicePack, [String] $Filter, [Switch] $Printers, [Switch] $Ping, [Switch] $FullData, [String] $Domain, [String] $DomainController, [String] $ADSpath, [String] $SiteName, [Switch] $Unconstrained, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) begin { $CompSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -ADSpath $ADSpath -PageSize $PageSize -Credential $Credential } process { if ($CompSearcher) { if($Unconstrained) { Write-Verbose "Searching for computers with for unconstrained delegation" $Filter += "(userAccountControl:1.2.840.113556.1.4.803:=524288)" } if($Printers) { Write-Verbose "Searching for printers" $Filter += "(objectCategory=printQueue)" } if($SPN) { Write-Verbose "Searching for computers with SPN: $SPN" $Filter += "(servicePrincipalName=$SPN)" } if($OperatingSystem) { $Filter += "(operatingsystem=$OperatingSystem)" } if($ServicePack) { $Filter += "(operatingsystemservicepack=$ServicePack)" } if($SiteName) { $Filter += "(serverreferencebl=$SiteName)" } $CompFilter = "(&(sAMAccountType=805306369)(dnshostname=$ComputerName)$Filter)" Write-Verbose "Get-NetComputer filter : $CompFilter" $CompSearcher.filter = $CompFilter if(-not $FullData) { $Null = $CompSearcher.PropertiesToLoad.Add('dnshostname') } try { ForEach($ComputerResult in $CompSearcher.FindAll()) { if($ComputerResult) { $Up = $True if($Ping) { $Up = Test-Connection -Count 1 -Quiet -ComputerName $ComputerResult.properties.dnshostname } if($Up) { if ($FullData) { $Computer = Convert-LDAPProperty -Properties $ComputerResult.Properties $Computer.PSObject.TypeNames.Add('PowerView.Computer') $Computer } else { $ComputerResult.properties.dnshostname } } } } $CompSearcher.dispose() } catch { Write-Warning "Error: $_" } } } } function Get-ADObject { [CmdletBinding()] Param ( [Parameter(ValueFromPipeline=$True)] [String] $SID, [String] $Name, [String] $SamAccountName, [String] $Domain, [String] $DomainController, [String] $ADSpath, [String] $Filter, [Switch] $ReturnRaw, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) process { if($SID -and (-not $Domain)) { try { $Name = Convert-SidToName $SID if($Name) { $Canonical = Convert-ADName -ObjectName $Name -InputType NT4 -OutputType Canonical if($Canonical) { $Domain = $Canonical.split("/")[0] } else { Write-Verbose "Error resolving SID '$SID'" return $Null } } } catch { Write-Verbose "Error resolving SID '$SID' : $_" return $Null } } $ObjectSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize if($ObjectSearcher) { if($SID) { $ObjectSearcher.filter = "(&(objectsid=$SID)$Filter)" } elseif($Name) { $ObjectSearcher.filter = "(&(name=$Name)$Filter)" } elseif($SamAccountName) { $ObjectSearcher.filter = "(&(samAccountName=$SamAccountName)$Filter)" } try { $Results = $ObjectSearcher.FindAll() $Results | Where-Object {$_} | ForEach-Object { if($ReturnRaw) { $_ } else { Convert-LDAPProperty -Properties $_.Properties } } $Results.dispose() } catch { Write-Verbose "Error building the searcher object!" } $ObjectSearcher.dispose() } } } function Get-NetOU { [CmdletBinding()] Param ( [Parameter(ValueFromPipeline=$True)] [String] $OUName = '*', [String] $GUID, [String] $Domain, [String] $DomainController, [String] $ADSpath, [Switch] $FullData, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) begin { $OUSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize } process { if ($OUSearcher) { if ($GUID) { $OUSearcher.filter="(&(objectCategory=organizationalUnit)(name=$OUName)(gplink=*$GUID*))" } else { $OUSearcher.filter="(&(objectCategory=organizationalUnit)(name=$OUName))" } try { $Results = $OUSearcher.FindAll() $Results | Where-Object {$_} | ForEach-Object { if ($FullData) { $OU = Convert-LDAPProperty -Properties $_.Properties $OU.PSObject.TypeNames.Add('PowerView.OU') $OU } else { $_.properties.adspath } } $Results.dispose() $OUSearcher.dispose() } catch { Write-Warning $_ } } } } function Get-NetSite { [CmdletBinding()] Param ( [Parameter(ValueFromPipeline=$True)] [String] $SiteName = "*", [String] $Domain, [String] $DomainController, [String] $ADSpath, [String] $GUID, [Switch] $FullData, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) begin { $SiteSearcher = Get-DomainSearcher -ADSpath $ADSpath -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSprefix "CN=Sites,CN=Configuration" -PageSize $PageSize } process { if($SiteSearcher) { if ($GUID) { $SiteSearcher.filter="(&(objectCategory=site)(name=$SiteName)(gplink=*$GUID*))" } else { $SiteSearcher.filter="(&(objectCategory=site)(name=$SiteName))" } try { $Results = $SiteSearcher.FindAll() $Results | Where-Object {$_} | ForEach-Object { if ($FullData) { $Site = Convert-LDAPProperty -Properties $_.Properties $Site.PSObject.TypeNames.Add('PowerView.Site') $Site } else { $_.properties.name } } $Results.dispose() $SiteSearcher.dispose() } catch { Write-Verbose $_ } } } } function Get-DomainSID { param( [String] $Domain, [String] $DomainController ) $ComputerSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController $ComputerSearcher.Filter = '(sAMAccountType=805306369)' $Null = $ComputerSearcher.PropertiesToLoad.Add('objectsid') $Result = $ComputerSearcher.FindOne() if(-not $Result) { Write-Verbose "Get-DomainSID: no results retrieved" } else { $DCObject = Convert-LDAPProperty -Properties $Result.Properties $DCSID = $DCObject.objectsid $DCSID.Substring(0, $DCSID.LastIndexOf('-')) } } function Get-NetFileServer { [CmdletBinding()] param( [String] $Domain, [String] $DomainController, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) function Split-Path { param([String]$Path) if ($Path -and ($Path.split("\\").Count -ge 3)) { $Temp = $Path.split("\\")[2] if($Temp -and ($Temp -ne '')) { $Temp } } } $UserSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -PageSize $PageSize $UserSearcher.filter = "(&(samAccountType=805306368)(|(homedirectory=*)(scriptpath=*)(profilepath=*)))" $UserSearcher.PropertiesToLoad.AddRange(('homedirectory', 'scriptpath', 'profilepath')) Sort-Object -Unique -InputObject $(ForEach($UserResult in $UserSearcher.FindAll()) {if($UserResult.Properties['homedirectory']) {Split-Path($UserResult.Properties['homedirectory'])}if($UserResult.Properties['scriptpath']) {Split-Path($UserResult.Properties['scriptpath'])}if($UserResult.Properties['profilepath']) {Split-Path($UserResult.Properties['profilepath'])}}) } function Get-DFSshare { [CmdletBinding()] param( [String] [ValidateSet("All","V1","1","V2","2")] $Version = "All", [String] $Domain, [String] $DomainController, [String] $ADSpath, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) function Parse-Pkt { [CmdletBinding()] param( [byte[]] $Pkt ) $bin = $Pkt $blob_version = [bitconverter]::ToUInt32($bin[0..3],0) $blob_element_count = [bitconverter]::ToUInt32($bin[4..7],0) $offset = 8 $object_list = @() for($i=1; $i -le $blob_element_count; $i++){ $blob_name_size_start = $offset $blob_name_size_end = $offset + 1 $blob_name_size = [bitconverter]::ToUInt16($bin[$blob_name_size_start..$blob_name_size_end],0) $blob_name_start = $blob_name_size_end + 1 $blob_name_end = $blob_name_start + $blob_name_size - 1 $blob_name = [System.Text.Encoding]::Unicode.GetString($bin[$blob_name_start..$blob_name_end]) $blob_data_size_start = $blob_name_end + 1 $blob_data_size_end = $blob_data_size_start + 3 $blob_data_size = [bitconverter]::ToUInt32($bin[$blob_data_size_start..$blob_data_size_end],0) $blob_data_start = $blob_data_size_end + 1 $blob_data_end = $blob_data_start + $blob_data_size - 1 $blob_data = $bin[$blob_data_start..$blob_data_end] switch -wildcard ($blob_name) { "\siteroot" { } "\domainroot*" { $root_or_link_guid_start = 0 $root_or_link_guid_end = 15 $root_or_link_guid = [byte[]]$blob_data[$root_or_link_guid_start..$root_or_link_guid_end] $guid = New-Object Guid(,$root_or_link_guid) $prefix_size_start = $root_or_link_guid_end + 1 $prefix_size_end = $prefix_size_start + 1 $prefix_size = [bitconverter]::ToUInt16($blob_data[$prefix_size_start..$prefix_size_end],0) $prefix_start = $prefix_size_end + 1 $prefix_end = $prefix_start + $prefix_size - 1 $prefix = [System.Text.Encoding]::Unicode.GetString($blob_data[$prefix_start..$prefix_end]) $short_prefix_size_start = $prefix_end + 1 $short_prefix_size_end = $short_prefix_size_start + 1 $short_prefix_size = [bitconverter]::ToUInt16($blob_data[$short_prefix_size_start..$short_prefix_size_end],0) $short_prefix_start = $short_prefix_size_end + 1 $short_prefix_end = $short_prefix_start + $short_prefix_size - 1 $short_prefix = [System.Text.Encoding]::Unicode.GetString($blob_data[$short_prefix_start..$short_prefix_end]) $type_start = $short_prefix_end + 1 $type_end = $type_start + 3 $type = [bitconverter]::ToUInt32($blob_data[$type_start..$type_end],0) $state_start = $type_end + 1 $state_end = $state_start + 3 $state = [bitconverter]::ToUInt32($blob_data[$state_start..$state_end],0) $comment_size_start = $state_end + 1 $comment_size_end = $comment_size_start + 1 $comment_size = [bitconverter]::ToUInt16($blob_data[$comment_size_start..$comment_size_end],0) $comment_start = $comment_size_end + 1 $comment_end = $comment_start + $comment_size - 1 if ($comment_size -gt 0) { $comment = [System.Text.Encoding]::Unicode.GetString($blob_data[$comment_start..$comment_end]) } $prefix_timestamp_start = $comment_end + 1 $prefix_timestamp_end = $prefix_timestamp_start + 7 $prefix_timestamp = $blob_data[$prefix_timestamp_start..$prefix_timestamp_end] $state_timestamp_start = $prefix_timestamp_end + 1 $state_timestamp_end = $state_timestamp_start + 7 $state_timestamp = $blob_data[$state_timestamp_start..$state_timestamp_end] $comment_timestamp_start = $state_timestamp_end + 1 $comment_timestamp_end = $comment_timestamp_start + 7 $comment_timestamp = $blob_data[$comment_timestamp_start..$comment_timestamp_end] $version_start = $comment_timestamp_end + 1 $version_end = $version_start + 3 $version = [bitconverter]::ToUInt32($blob_data[$version_start..$version_end],0) $dfs_targetlist_blob_size_start = $version_end + 1 $dfs_targetlist_blob_size_end = $dfs_targetlist_blob_size_start + 3 $dfs_targetlist_blob_size = [bitconverter]::ToUInt32($blob_data[$dfs_targetlist_blob_size_start..$dfs_targetlist_blob_size_end],0) $dfs_targetlist_blob_start = $dfs_targetlist_blob_size_end + 1 $dfs_targetlist_blob_end = $dfs_targetlist_blob_start + $dfs_targetlist_blob_size - 1 $dfs_targetlist_blob = $blob_data[$dfs_targetlist_blob_start..$dfs_targetlist_blob_end] $reserved_blob_size_start = $dfs_targetlist_blob_end + 1 $reserved_blob_size_end = $reserved_blob_size_start + 3 $reserved_blob_size = [bitconverter]::ToUInt32($blob_data[$reserved_blob_size_start..$reserved_blob_size_end],0) $reserved_blob_start = $reserved_blob_size_end + 1 $reserved_blob_end = $reserved_blob_start + $reserved_blob_size - 1 $reserved_blob = $blob_data[$reserved_blob_start..$reserved_blob_end] $referral_ttl_start = $reserved_blob_end + 1 $referral_ttl_end = $referral_ttl_start + 3 $referral_ttl = [bitconverter]::ToUInt32($blob_data[$referral_ttl_start..$referral_ttl_end],0) $target_count_start = 0 $target_count_end = $target_count_start + 3 $target_count = [bitconverter]::ToUInt32($dfs_targetlist_blob[$target_count_start..$target_count_end],0) $t_offset = $target_count_end + 1 for($j=1; $j -le $target_count; $j++){ $target_entry_size_start = $t_offset $target_entry_size_end = $target_entry_size_start + 3 $target_entry_size = [bitconverter]::ToUInt32($dfs_targetlist_blob[$target_entry_size_start..$target_entry_size_end],0) $target_time_stamp_start = $target_entry_size_end + 1 $target_time_stamp_end = $target_time_stamp_start + 7 $target_time_stamp = $dfs_targetlist_blob[$target_time_stamp_start..$target_time_stamp_end] $target_state_start = $target_time_stamp_end + 1 $target_state_end = $target_state_start + 3 $target_state = [bitconverter]::ToUInt32($dfs_targetlist_blob[$target_state_start..$target_state_end],0) $target_type_start = $target_state_end + 1 $target_type_end = $target_type_start + 3 $target_type = [bitconverter]::ToUInt32($dfs_targetlist_blob[$target_type_start..$target_type_end],0) $server_name_size_start = $target_type_end + 1 $server_name_size_end = $server_name_size_start + 1 $server_name_size = [bitconverter]::ToUInt16($dfs_targetlist_blob[$server_name_size_start..$server_name_size_end],0) $server_name_start = $server_name_size_end + 1 $server_name_end = $server_name_start + $server_name_size - 1 $server_name = [System.Text.Encoding]::Unicode.GetString($dfs_targetlist_blob[$server_name_start..$server_name_end]) $share_name_size_start = $server_name_end + 1 $share_name_size_end = $share_name_size_start + 1 $share_name_size = [bitconverter]::ToUInt16($dfs_targetlist_blob[$share_name_size_start..$share_name_size_end],0) $share_name_start = $share_name_size_end + 1 $share_name_end = $share_name_start + $share_name_size - 1 $share_name = [System.Text.Encoding]::Unicode.GetString($dfs_targetlist_blob[$share_name_start..$share_name_end]) $target_list += "\\$server_name\$share_name" $t_offset = $share_name_end + 1 } } } $offset = $blob_data_end + 1 $dfs_pkt_properties = @{ 'Name' = $blob_name 'Prefix' = $prefix 'TargetList' = $target_list } $object_list += New-Object -TypeName PSObject -Property $dfs_pkt_properties $prefix = $null $blob_name = $null $target_list = $null } $servers = @() $object_list | ForEach-Object { if ($_.TargetList) { $_.TargetList | ForEach-Object { $servers += $_.split("\")[2] } } } $servers } function Get-DFSshareV1 { [CmdletBinding()] param( [String] $Domain, [String] $DomainController, [String] $ADSpath, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) $DFSsearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize if($DFSsearcher) { $DFSshares = @() $DFSsearcher.filter = "(&(objectClass=fTDfs))" try { $Results = $DFSSearcher.FindAll() $Results | Where-Object {$_} | ForEach-Object { $Properties = $_.Properties $RemoteNames = $Properties.remoteservername $Pkt = $Properties.pkt $DFSshares += $RemoteNames | ForEach-Object { try { if ( $_.Contains('\') ) { New-Object -TypeName PSObject -Property @{'Name'=$Properties.name[0];'RemoteServerName'=$_.split("\")[2]} } } catch { Write-Verbose "Error in parsing DFS share : $_" } } } $Results.dispose() $DFSSearcher.dispose() if($pkt -and $pkt[0]) { Parse-Pkt $pkt[0] | ForEach-Object { if ($_ -ne "null") { New-Object -TypeName PSObject -Property @{'Name'=$Properties.name[0];'RemoteServerName'=$_} } } } } catch { Write-Warning "Get-DFSshareV1 error : $_" } $DFSshares | Sort-Object -Property "RemoteServerName" } } function Get-DFSshareV2 { [CmdletBinding()] param( [String] $Domain, [String] $DomainController, [String] $ADSpath, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) $DFSsearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize if($DFSsearcher) { $DFSshares = @() $DFSsearcher.filter = "(&(objectClass=msDFS-Linkv2))" $DFSSearcher.PropertiesToLoad.AddRange(('msdfs-linkpathv2','msDFS-TargetListv2')) try { $Results = $DFSSearcher.FindAll() $Results | Where-Object {$_} | ForEach-Object { $Properties = $_.Properties $target_list = $Properties.'msdfs-targetlistv2'[0] $xml = [xml][System.Text.Encoding]::Unicode.GetString($target_list[2..($target_list.Length-1)]) $DFSshares += $xml.targets.ChildNodes | ForEach-Object { try { $Target = $_.InnerText if ( $Target.Contains('\') ) { $DFSroot = $Target.split("\")[3] $ShareName = $Properties.'msdfs-linkpathv2'[0] New-Object -TypeName PSObject -Property @{'Name'="$DFSroot$ShareName";'RemoteServerName'=$Target.split("\")[2]} } } catch { Write-Verbose "Error in parsing target : $_" } } } $Results.dispose() $DFSSearcher.dispose() } catch { Write-Warning "Get-DFSshareV2 error : $_" } $DFSshares | Sort-Object -Unique -Property "RemoteServerName" } } $DFSshares = @() if ( ($Version -eq "all") -or ($Version.endsWith("1")) ) { $DFSshares += Get-DFSshareV1 -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize } if ( ($Version -eq "all") -or ($Version.endsWith("2")) ) { $DFSshares += Get-DFSshareV2 -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize } $DFSshares | Sort-Object -Property ("RemoteServerName","Name") -Unique } function Get-GptTmpl { [CmdletBinding()] Param ( [Parameter(Mandatory=$True, ValueFromPipeline=$True)] [String] $GptTmplPath, [Switch] $UsePSDrive ) begin { if($UsePSDrive) { $Parts = $GptTmplPath.split('\') $FolderPath = $Parts[0..($Parts.length-2)] -join '\' $FilePath = $Parts[-1] $RandDrive = ("abcdefghijklmnopqrstuvwxyz".ToCharArray() | Get-Random -Count 7) -join '' Write-Verbose "Mounting path $GptTmplPath using a temp PSDrive at $RandDrive" try { $Null = New-PSDrive -Name $RandDrive -PSProvider FileSystem -Root $FolderPath -ErrorAction Stop } catch { Write-Verbose "Error mounting path $GptTmplPath : $_" return $Null } $TargetGptTmplPath = $RandDrive + ":\" + $FilePath } else { $TargetGptTmplPath = $GptTmplPath } } process { try { Write-Verbose "Attempting to parse GptTmpl: $TargetGptTmplPath" $TargetGptTmplPath | Get-IniContent -ErrorAction SilentlyContinue } catch { } } end { if($UsePSDrive -and $RandDrive) { Write-Verbose "Removing temp PSDrive $RandDrive" Get-PSDrive -Name $RandDrive -ErrorAction SilentlyContinue | Remove-PSDrive -Force } } } function Get-GroupsXML { [CmdletBinding()] Param ( [Parameter(Mandatory=$True, ValueFromPipeline=$True)] [String] $GroupsXMLPath, [Switch] $UsePSDrive ) begin { if($UsePSDrive) { $Parts = $GroupsXMLPath.split('\') $FolderPath = $Parts[0..($Parts.length-2)] -join '\' $FilePath = $Parts[-1] $RandDrive = ("abcdefghijklmnopqrstuvwxyz".ToCharArray() | Get-Random -Count 7) -join '' Write-Verbose "Mounting path $GroupsXMLPath using a temp PSDrive at $RandDrive" try { $Null = New-PSDrive -Name $RandDrive -PSProvider FileSystem -Root $FolderPath -ErrorAction Stop } catch { Write-Verbose "Error mounting path $GroupsXMLPath : $_" return $Null } $TargetGroupsXMLPath = $RandDrive + ":\" + $FilePath } else { $TargetGroupsXMLPath = $GroupsXMLPath } } process { try { Write-Verbose "Attempting to parse Groups.xml: $TargetGroupsXMLPath" [XML]$GroupsXMLcontent = Get-Content $TargetGroupsXMLPath -ErrorAction Stop $GroupsXMLcontent | Select-Xml "//Groups" | Select-Object -ExpandProperty node | ForEach-Object { $Groupname = $_.Group.Properties.groupName $GroupSID = $_.Group.Properties.GroupSid if(-not $LocalSid) { if($Groupname -match 'Administrators') { $GroupSID = 'S-1-5-32-544' } elseif($Groupname -match 'Remote Desktop') { $GroupSID = 'S-1-5-32-555' } elseif($Groupname -match 'Guests') { $GroupSID = 'S-1-5-32-546' } else { $GroupSID = Convert-NameToSid -ObjectName $Groupname | Select-Object -ExpandProperty SID } } $Members = $_.Group.Properties.members | Select-Object -ExpandProperty Member | Where-Object { $_.action -match 'ADD' } | ForEach-Object { if($_.sid) { $_.sid } else { $_.name } } if ($Members) { if($_.Group.filters) { $Filters = $_.Group.filters.GetEnumerator() | ForEach-Object { New-Object -TypeName PSObject -Property @{'Type' = $_.LocalName;'Value' = $_.name} } } else { $Filters = $Null } if($Members -isnot [System.Array]) { $Members = @($Members) } $GPOGroup = New-Object PSObject $GPOGroup | Add-Member Noteproperty 'GPOPath' $TargetGroupsXMLPath $GPOGroup | Add-Member Noteproperty 'Filters' $Filters $GPOGroup | Add-Member Noteproperty 'GroupName' $GroupName $GPOGroup | Add-Member Noteproperty 'GroupSID' $GroupSID $GPOGroup | Add-Member Noteproperty 'GroupMemberOf' $Null $GPOGroup | Add-Member Noteproperty 'GroupMembers' $Members $GPOGroup } } } catch { } } end { if($UsePSDrive -and $RandDrive) { Write-Verbose "Removing temp PSDrive $RandDrive" Get-PSDrive -Name $RandDrive -ErrorAction SilentlyContinue | Remove-PSDrive -Force } } } function Get-NetGPOGroup { [CmdletBinding()] Param ( [String] $GPOname = '*', [String] $DisplayName, [String] $Domain, [String] $DomainController, [String] $ADSpath, [Switch] $ResolveMemberSIDs, [Switch] $UsePSDrive, [ValidateRange(1,10000)] [Int] $PageSize = 200 ) $Option = [System.StringSplitOptions]::RemoveEmptyEntries $GPOSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize $GPOSearcher.filter="(&(objectCategory=groupPolicyContainer)(name=*)(gpcfilesyspath=*))" $GPOSearcher.PropertiesToLoad.AddRange(('displayname', 'name', 'gpcfilesyspath')) ForEach($GPOResult in $GPOSearcher.FindAll()) { $GPOdisplayName = $GPOResult.Properties['displayname'] $GPOname = $GPOResult.Properties['name'] $GPOPath = $GPOResult.Properties['gpcfilesyspath'] Write-Verbose "Get-NetGPOGroup: enumerating $GPOPath" $ParseArgs = @{ 'GptTmplPath' = "$GPOPath\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf" 'UsePSDrive' = $UsePSDrive } $Inf = Get-GptTmpl @ParseArgs if($Inf -and ($Inf.psbase.Keys -contains 'Group Membership')) { $Memberships = @{} ForEach ($Membership in $Inf.'Group Membership'.GetEnumerator()) { $Group, $Relation = $Membership.Key.Split('__', $Option) | ForEach-Object {$_.Trim()} $MembershipValue = $Membership.Value | Where-Object {$_} | ForEach-Object { $_.Trim('*') } | Where-Object {$_} if($ResolveMemberSIDs) { $GroupMembers = @() ForEach($Member in $MembershipValue) { if($Member -and ($Member.Trim() -ne '')) { if($Member -notmatch '^S-1-.*') { $MemberSID = Convert-NameToSid -Domain $Domain -ObjectName $Member | Select-Object -ExpandProperty SID if($MemberSID) { $GroupMembers += $MemberSID } else { $GroupMembers += $Member } } else { $GroupMembers += $Member } } } $MembershipValue = $GroupMembers } if(-not $Memberships[$Group]) { $Memberships[$Group] = @{} } if($MembershipValue -isnot [System.Array]) {$MembershipValue = @($MembershipValue)} $Memberships[$Group].Add($Relation, $MembershipValue) } ForEach ($Membership in $Memberships.GetEnumerator()) { if($Membership -and $Membership.Key -and ($Membership.Key -match '^\*')) { $GroupSID = $Membership.Key.Trim('*') if($GroupSID -and ($GroupSID.Trim() -ne '')) { $GroupName = Convert-SidToName -SID $GroupSID } else { $GroupName = $False } } else { $GroupName = $Membership.Key if($GroupName -and ($GroupName.Trim() -ne '')) { if($Groupname -match 'Administrators') { $GroupSID = 'S-1-5-32-544' } elseif($Groupname -match 'Remote Desktop') { $GroupSID = 'S-1-5-32-555' } elseif($Groupname -match 'Guests') { $GroupSID = 'S-1-5-32-546' } elseif($GroupName.Trim() -ne '') { $GroupSID = Convert-NameToSid -Domain $Domain -ObjectName $Groupname | Select-Object -ExpandProperty SID } else { $GroupSID = $Null } } } $GPOGroup = New-Object PSObject $GPOGroup | Add-Member Noteproperty 'GPODisplayName' $GPODisplayName $GPOGroup | Add-Member Noteproperty 'GPOName' $GPOName $GPOGroup | Add-Member Noteproperty 'GPOPath' $GPOPath $GPOGroup | Add-Member Noteproperty 'GPOType' 'RestrictedGroups' $GPOGroup | Add-Member Noteproperty 'Filters' $Null $GPOGroup | Add-Member Noteproperty 'GroupName' $GroupName $GPOGroup | Add-Member Noteproperty 'GroupSID' $GroupSID $GPOGroup | Add-Member Noteproperty 'GroupMemberOf' $Membership.Value.Memberof $GPOGroup | Add-Member Noteproperty 'GroupMembers' $Membership.Value.Members $GPOGroup } } $ParseArgs = @{ 'GroupsXMLpath' = "$GPOPath\MACHINE\Preferences\Groups\Groups.xml" 'UsePSDrive' = $UsePSDrive } Get-GroupsXML @ParseArgs | ForEach-Object { if($ResolveMemberSIDs) { $GroupMembers = @() ForEach($Member in $_.GroupMembers) { if($Member -and ($Member.Trim() -ne '')) { if($Member -notmatch '^S-1-.*') { $MemberSID = Convert-NameToSid -Domain $Domain -ObjectName $Member | Select-Object -ExpandProperty SID if($MemberSID) { $GroupMembers += $MemberSID } else { $GroupMembers += $Member } } else { $GroupMembers += $Member } } } $_.GroupMembers = $GroupMembers } $_ | Add-Member Noteproperty 'GPODisplayName' $GPODisplayName $_ | Add-Member Noteproperty 'GPOName' $GPOName $_ | Add-Member Noteproperty 'GPOType' 'GroupPolicyPreferences' $_ } } } function Find-GPOLocation { [CmdletBinding()] Param ( [String] $Domain, [String] $DomainController, [String] $LocalGroup = 'Administrators', [Switch] $UsePSDrive, [ValidateRange(1,10000)] [Int] $PageSize = 200 ) $TargetSIDs = @('*') if($LocalGroup -like "*Admin*") { $TargetLocalSID = 'S-1-5-32-544' } elseif ( ($LocalGroup -like "*RDP*") -or ($LocalGroup -like "*Remote*") ) { $TargetLocalSID = 'S-1-5-32-555' } elseif ($LocalGroup -like "S-1-5-*") { $TargetLocalSID = $LocalGroup } else { throw "LocalGroup must be 'Administrators', 'RDP', or a 'S-1-5-X' SID format." } if(-not $TargetSIDs) { throw "No effective target SIDs!" } Write-Verbose "TargetLocalSID: $TargetLocalSID" Write-Verbose "Effective target SIDs: $TargetSIDs" $GPOGroupArgs = @{ 'Domain' = $Domain 'DomainController' = $DomainController 'UsePSDrive' = $UsePSDrive 'ResolveMemberSIDs' = $True 'PageSize' = $PageSize } Sort-Object -Property GPOName -Unique -InputObject $(ForEach($GPOGroup in (Get-NetGPOGroup @GPOGroupArgs)) { if($GPOgroup.GroupSID -match $TargetLocalSID) { ForEach($GPOgroupMember in $GPOgroup.GroupMembers) { if($GPOgroupMember) { if ( ($TargetSIDs[0] -eq '*') -or ($TargetSIDs -Contains $GPOgroupMember) ) { $GPOgroup } } } } if( ($GPOgroup.GroupMemberOf -contains $TargetLocalSID) ) { if( ($TargetSIDs[0] -eq '*') -or ($TargetSIDs -Contains $GPOgroup.GroupSID) ) { $GPOgroup } } }) | ForEach-Object { $GPOname = $_.GPODisplayName write-verbose "GPOname: $GPOname" $GPOguid = $_.GPOName $GPOPath = $_.GPOPath $GPOType = $_.GPOType if($_.GroupMembers) { $GPOMembers = $_.GroupMembers } else { $GPOMembers = $_.GroupSID } $Filters = $_.Filters if(-not $TargetObject) { $TargetObjectSIDs = $GPOMembers } else { $TargetObjectSIDs = $TargetObject } Get-NetOU -Domain $Domain -DomainController $DomainController -GUID $GPOguid -FullData -PageSize $PageSize | ForEach-Object { if($Filters) { $FilterValue = $Filters.Value $OUComputers = ForEach($OUComputer in (Get-NetComputer -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $_.ADSpath -PageSize $PageSize)) { if($OUComputer.ToLower() -match $Filters.Value) { $OUComputer } } } else { $OUComputers = Get-NetComputer -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $_.ADSpath -PageSize $PageSize } if($OUComputers) { if($OUComputers -isnot [System.Array]) {$OUComputers = @($OUComputers)} ForEach ($TargetSid in $TargetObjectSIDs) { $Object = Get-ADObject -SID $TargetSid if (-not $Object) { $Object = Get-ADObject -SID $TargetSid -Domain $Domain -DomainController $DomainController -Credential $Credential -PageSize $PageSize } if($Object) { $MemberDN = $Object.distinguishedName $ObjectDomain = $MemberDN.subString($MemberDN.IndexOf("DC=")) -replace 'DC=','' -replace ',','.' $IsGroup = @('268435456','268435457','536870912','536870913') -contains $Object.samaccounttype $GPOLocation = New-Object PSObject $GPOLocation | Add-Member Noteproperty 'ObjectDomain' $ObjectDomain $GPOLocation | Add-Member Noteproperty 'ObjectName' $Object.samaccountname $GPOLocation | Add-Member Noteproperty 'ObjectDN' $Object.distinguishedname $GPOLocation | Add-Member Noteproperty 'ObjectSID' $Object.objectsid $GPOLocation | Add-Member Noteproperty 'IsGroup' $IsGroup $GPOLocation | Add-Member Noteproperty 'GPODomain' $Domain $GPOLocation | Add-Member Noteproperty 'GPODisplayName' $GPOname $GPOLocation | Add-Member Noteproperty 'GPOGuid' $GPOGuid $GPOLocation | Add-Member Noteproperty 'GPOPath' $GPOPath $GPOLocation | Add-Member Noteproperty 'GPOType' $GPOType $GPOLocation | Add-Member Noteproperty 'ContainerName' $_.distinguishedname $GPOLocation | Add-Member Noteproperty 'ComputerName' $OUComputers $GPOLocation.PSObject.TypeNames.Add('PowerView.GPOLocalGroup') $GPOLocation } } } } Get-NetSite -Domain $Domain -DomainController $DomainController -GUID $GPOguid -PageSize $PageSize -FullData | ForEach-Object { ForEach ($TargetSid in $TargetObjectSIDs) { $Object = Get-ADObject -SID $TargetSid if (-not $Object) { $Object = Get-ADObject -SID $TargetSid -Domain $Domain -DomainController $DomainController -Credential $Credential -PageSize $PageSize } if($Object) { $MemberDN = $Object.distinguishedName $ObjectDomain = $MemberDN.subString($MemberDN.IndexOf("DC=")) -replace 'DC=','' -replace ',','.' $IsGroup = @('268435456','268435457','536870912','536870913') -contains $Object.samaccounttype $AppliedSite = New-Object PSObject $GPOLocation | Add-Member Noteproperty 'ObjectDomain' $ObjectDomain $AppliedSite | Add-Member Noteproperty 'ObjectName' $Object.samaccountname $AppliedSite | Add-Member Noteproperty 'ObjectDN' $Object.distinguishedname $AppliedSite | Add-Member Noteproperty 'ObjectSID' $Object.objectsid $AppliedSite | Add-Member Noteproperty 'IsGroup' $IsGroup $AppliedSite | Add-Member Noteproperty 'GPODomain' $Domain $AppliedSite | Add-Member Noteproperty 'GPODisplayName' $GPOname $AppliedSite | Add-Member Noteproperty 'GPOGuid' $GPOGuid $AppliedSite | Add-Member Noteproperty 'GPOPath' $GPOPath $AppliedSite | Add-Member Noteproperty 'GPOType' $GPOType $AppliedSite | Add-Member Noteproperty 'ContainerName' $_.distinguishedname $AppliedSite | Add-Member Noteproperty 'ComputerName' $_.siteobjectbl $AppliedSite.PSObject.TypeNames.Add('PowerView.GPOLocalGroup') $AppliedSite } } } } } function Get-NetLocalGroup { [CmdletBinding(DefaultParameterSetName = 'WinNT')] param( [Parameter(ParameterSetName = 'API', Position=0, ValueFromPipeline=$True)] [Parameter(ParameterSetName = 'WinNT', Position=0, ValueFromPipeline=$True)] [Alias('HostName')] [String[]] $ComputerName = $Env:ComputerName, [Parameter(ParameterSetName = 'WinNT')] [Parameter(ParameterSetName = 'API')] [ValidateScript({Test-Path -Path $_ })] [Alias('HostList')] [String] $ComputerFile, [Parameter(ParameterSetName = 'WinNT')] [Parameter(ParameterSetName = 'API')] [String] $GroupName = 'Administrators', [Parameter(ParameterSetName = 'API')] [Switch] $API, [Switch] $IsDomain, [ValidateNotNullOrEmpty()] [String] $DomainSID ) process { $Servers = @() if($ComputerFile) { $Servers = Get-Content -Path $ComputerFile } else { $Servers += $ComputerName | Get-NameField } ForEach($Server in $Servers) { if($API) { $QueryLevel = 2 $PtrInfo = [IntPtr]::Zero $EntriesRead = 0 $TotalRead = 0 $ResumeHandle = 0 $Result = $Netapi32::NetLocalGroupGetMembers($Server, $GroupName, $QueryLevel, [ref]$PtrInfo, -1, [ref]$EntriesRead, [ref]$TotalRead, [ref]$ResumeHandle) $Offset = $PtrInfo.ToInt64() $LocalUsers = @() if (($Result -eq 0) -and ($Offset -gt 0)) { $Increment = $LOCALGROUP_MEMBERS_INFO_2::GetSize() for ($i = 0; ($i -lt $EntriesRead); $i++) { $NewIntPtr = New-Object System.Intptr -ArgumentList $Offset $Info = $NewIntPtr -as $LOCALGROUP_MEMBERS_INFO_2 $Offset = $NewIntPtr.ToInt64() $Offset += $Increment $SidString = '' $Result2 = $Advapi32::ConvertSidToStringSid($Info.lgrmi2_sid, [ref]$SidString);$LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if($Result2 -eq 0) { } else { $IsGroup = $($Info.lgrmi2_sidusage -ne 'SidTypeUser') $LocalUsers += @{ 'ComputerName' = $Server 'AccountName' = $Info.lgrmi2_domainandname 'SID' = $SidString 'IsGroup' = $IsGroup 'Type' = 'LocalUser' } } } $Null = $Netapi32::NetApiBufferFree($PtrInfo) $MachineSid = ($LocalUsers | Where-Object {$_['SID'] -like '*-500'})['SID'] $MachineSid = $MachineSid.Substring(0, $MachineSid.LastIndexOf('-')) try { ForEach($LocalUser in $LocalUsers) { if($DomainSID -and ($LocalUser['SID'] -match $DomainSID)) { $LocalUser['IsDomain'] = $True } elseif($LocalUser['SID'] -match $MachineSid) { $LocalUser['IsDomain'] = $False } else { $LocalUser['IsDomain'] = $True } if($IsDomain) { if($LocalUser['IsDomain']) { $LocalUser } } else { $LocalUser } } } catch { } } else { } } else { try { $LocalUsers = @() $Members = @($([ADSI]"WinNT://$Server/$GroupName,group").psbase.Invoke('Members')) $Members | ForEach-Object { $LocalUser = ([ADSI]$_) $AdsPath = $LocalUser.InvokeGet('AdsPath').Replace('WinNT://', '') if(([regex]::Matches($AdsPath, '/')).count -eq 1) { $MemberIsDomain = $True $Name = $AdsPath.Replace('/', '\') } else { $MemberIsDomain = $False $Name = $AdsPath.Substring($AdsPath.IndexOf('/')+1).Replace('/', '\') } $IsGroup = ($LocalUser.SchemaClassName -like 'group') if($IsDomain) { if($MemberIsDomain) { $LocalUsers += @{ 'ComputerName' = $Server 'AccountName' = $Name 'SID' = ((New-Object System.Security.Principal.SecurityIdentifier($LocalUser.InvokeGet('ObjectSID'),0)).Value) 'IsGroup' = $IsGroup 'IsDomain' = $MemberIsDomain 'Type' = 'LocalUser' } } } else { $LocalUsers += @{ 'ComputerName' = $Server 'AccountName' = $Name 'SID' = ((New-Object System.Security.Principal.SecurityIdentifier($LocalUser.InvokeGet('ObjectSID'),0)).Value) 'IsGroup' = $IsGroup 'IsDomain' = $MemberIsDomain 'Type' = 'LocalUser' } } } $LocalUsers } catch { Write-Verbose "Get-NetLocalGroup error for $Server : $_" } } } } } filter Get-NetLoggedon { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$True)] [Alias('HostName')] [Object[]] [ValidateNotNullOrEmpty()] $ComputerName = 'localhost' ) $Computer = $ComputerName | Get-NameField $QueryLevel = 1 $PtrInfo = [IntPtr]::Zero $EntriesRead = 0 $TotalRead = 0 $ResumeHandle = 0 $Result = $Netapi32::NetWkstaUserEnum($Computer, $QueryLevel, [ref]$PtrInfo, -1, [ref]$EntriesRead, [ref]$TotalRead, [ref]$ResumeHandle) $Offset = $PtrInfo.ToInt64() if (($Result -eq 0) -and ($Offset -gt 0)) { $Increment = $WKSTA_USER_INFO_1::GetSize() for ($i = 0; ($i -lt $EntriesRead); $i++) { $NewIntPtr = New-Object System.Intptr -ArgumentList $Offset $Info = $NewIntPtr -as $WKSTA_USER_INFO_1 $LoggedOn = $Info | Select-Object * $LoggedOn | Add-Member Noteproperty 'ComputerName' $Computer $Offset = $NewIntPtr.ToInt64() $Offset += $Increment $LoggedOn } $Null = $Netapi32::NetApiBufferFree($PtrInfo) } else { Write-Verbose "Error: $(([ComponentModel.Win32Exception] $Result).Message)" } } filter Get-NetSession { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$True)] [Alias('HostName')] [Object[]] [ValidateNotNullOrEmpty()] $ComputerName = 'localhost', [String] $UserName = '' ) $Computer = $ComputerName | Get-NameField $QueryLevel = 10 $PtrInfo = [IntPtr]::Zero $EntriesRead = 0 $TotalRead = 0 $ResumeHandle = 0 $Result = $Netapi32::NetSessionEnum($Computer, '', $UserName, $QueryLevel, [ref]$PtrInfo, -1, [ref]$EntriesRead, [ref]$TotalRead, [ref]$ResumeHandle) $Offset = $PtrInfo.ToInt64() if (($Result -eq 0) -and ($Offset -gt 0)) { $Increment = $SESSION_INFO_10::GetSize() for ($i = 0; ($i -lt $EntriesRead); $i++) { $NewIntPtr = New-Object System.Intptr -ArgumentList $Offset $Info = $NewIntPtr -as $SESSION_INFO_10 $Sessions = $Info | Select-Object * $Sessions | Add-Member Noteproperty 'ComputerName' $Computer $Offset = $NewIntPtr.ToInt64() $Offset += $Increment $Sessions } $Null = $Netapi32::NetApiBufferFree($PtrInfo) } else { Write-Verbose "Error: $(([ComponentModel.Win32Exception] $Result).Message)" } } filter Get-LoggedOnLocal { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$True)] [Alias('HostName')] [Object[]] [ValidateNotNullOrEmpty()] $ComputerName = 'localhost' ) $ComputerName = Get-NameField -Object $ComputerName try { $Reg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('Users', "$ComputerName") $Reg.GetSubKeyNames() | Where-Object { $_ -match 'S-1-5-21-[0-9]+-[0-9]+-[0-9]+-[0-9]+$' } | ForEach-Object { $UserName = Convert-SidToName $_ $Parts = $UserName.Split('\') $UserDomain = $Null $UserName = $Parts[-1] if ($Parts.Length -eq 2) { $UserDomain = $Parts[0] } $LocalLoggedOnUser = New-Object PSObject $LocalLoggedOnUser | Add-Member Noteproperty 'ComputerName' "$ComputerName" $LocalLoggedOnUser | Add-Member Noteproperty 'UserDomain' $UserDomain $LocalLoggedOnUser | Add-Member Noteproperty 'UserName' $UserName $LocalLoggedOnUser | Add-Member Noteproperty 'UserSID' $_ $LocalLoggedOnUser } } catch { } } function Get-NetDomainTrust { [CmdletBinding()] param( [Parameter(Position=0, ValueFromPipeline=$True)] [String] $Domain, [String] $DomainController, [String] $ADSpath, [Switch] $API, [Switch] $LDAP, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) begin { $TrustAttributes = @{ [uint32]'0x00000001' = 'non_transitive' [uint32]'0x00000002' = 'uplevel_only' [uint32]'0x00000004' = 'quarantined_domain' [uint32]'0x00000008' = 'forest_transitive' [uint32]'0x00000010' = 'cross_organization' [uint32]'0x00000020' = 'within_forest' [uint32]'0x00000040' = 'treat_as_external' [uint32]'0x00000080' = 'trust_uses_rc4_encryption' [uint32]'0x00000100' = 'trust_uses_aes_keys' [uint32]'0x00000200' = 'cross_organization_no_tgt_delegation' [uint32]'0x00000400' = 'pim_trust' } } process { if(-not $Domain) { $SourceDomain = (Get-NetDomain -Credential $Credential).Name } else { $SourceDomain = $Domain } if($LDAP -or $ADSPath) { $TrustSearcher = Get-DomainSearcher -Domain $SourceDomain -DomainController $DomainController -Credential $Credential -PageSize $PageSize -ADSpath $ADSpath $SourceSID = Get-DomainSID -Domain $SourceDomain -DomainController $DomainController if($TrustSearcher) { $TrustSearcher.Filter = '(objectClass=trustedDomain)' $Results = $TrustSearcher.FindAll() $Results | Where-Object {$_} | ForEach-Object { $Props = $_.Properties $DomainTrust = New-Object PSObject $TrustAttrib = @() $TrustAttrib += $TrustAttributes.Keys | Where-Object { $Props.trustattributes[0] -band $_ } | ForEach-Object { $TrustAttributes[$_] } $Direction = Switch ($Props.trustdirection) { 0 { 'Disabled' } 1 { 'Inbound' } 2 { 'Outbound' } 3 { 'Bidirectional' } } $ObjectGuid = New-Object Guid @(,$Props.objectguid[0]) $TargetSID = (New-Object System.Security.Principal.SecurityIdentifier($Props.securityidentifier[0],0)).Value $DomainTrust | Add-Member Noteproperty 'SourceName' $SourceDomain $DomainTrust | Add-Member Noteproperty 'SourceSID' $SourceSID $DomainTrust | Add-Member Noteproperty 'TargetName' $Props.name[0] $DomainTrust | Add-Member Noteproperty 'TargetSID' $TargetSID $DomainTrust | Add-Member Noteproperty 'ObjectGuid' "{$ObjectGuid}" $DomainTrust | Add-Member Noteproperty 'TrustType' $($TrustAttrib -join ',') $DomainTrust | Add-Member Noteproperty 'TrustDirection' "$Direction" $DomainTrust.PSObject.TypeNames.Add('PowerView.DomainTrustLDAP') $DomainTrust } $Results.dispose() $TrustSearcher.dispose() } } elseif($API) { if(-not $DomainController) { $DomainController = Get-NetDomainController -Credential $Credential -Domain $SourceDomain | Select-Object -First 1 | Select-Object -ExpandProperty Name } if($DomainController) { $PtrInfo = [IntPtr]::Zero $Flags = 63 $DomainCount = 0 $Result = $Netapi32::DsEnumerateDomainTrusts($DomainController, $Flags, [ref]$PtrInfo, [ref]$DomainCount) $Offset = $PtrInfo.ToInt64() if (($Result -eq 0) -and ($Offset -gt 0)) { $Increment = $DS_DOMAIN_TRUSTS::GetSize() for ($i = 0; ($i -lt $DomainCount); $i++) { $NewIntPtr = New-Object System.Intptr -ArgumentList $Offset $Info = $NewIntPtr -as $DS_DOMAIN_TRUSTS $Offset = $NewIntPtr.ToInt64() $Offset += $Increment $SidString = "" $Result = $Advapi32::ConvertSidToStringSid($Info.DomainSid, [ref]$SidString);$LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if($Result -eq 0) { Write-Verbose "Error: $(([ComponentModel.Win32Exception] $LastError).Message)" } else { $DomainTrust = New-Object PSObject $DomainTrust | Add-Member Noteproperty 'SourceDomain' $SourceDomain $DomainTrust | Add-Member Noteproperty 'SourceDomainController' $DomainController $DomainTrust | Add-Member Noteproperty 'NetbiosDomainName' $Info.NetbiosDomainName $DomainTrust | Add-Member Noteproperty 'DnsDomainName' $Info.DnsDomainName $DomainTrust | Add-Member Noteproperty 'Flags' $Info.Flags $DomainTrust | Add-Member Noteproperty 'ParentIndex' $Info.ParentIndex $DomainTrust | Add-Member Noteproperty 'TrustType' $Info.TrustType $DomainTrust | Add-Member Noteproperty 'TrustAttributes' $Info.TrustAttributes $DomainTrust | Add-Member Noteproperty 'DomainSid' $SidString $DomainTrust | Add-Member Noteproperty 'DomainGuid' $Info.DomainGuid $DomainTrust.PSObject.TypeNames.Add('PowerView.APIDomainTrust') $DomainTrust } } $Null = $Netapi32::NetApiBufferFree($PtrInfo) } else { Write-Verbose "Error: $(([ComponentModel.Win32Exception] $Result).Message)" } } else { Write-Verbose "Could not retrieve domain controller for $Domain" } } else { $FoundDomain = Get-NetDomain -Domain $Domain -Credential $Credential if($FoundDomain) { $FoundDomain.GetAllTrustRelationships() | ForEach-Object { $_.PSObject.TypeNames.Add('PowerView.DomainTrust') $_ } } } } } function Get-NetForestTrust { [CmdletBinding()] param( [Parameter(Position=0,ValueFromPipeline=$True)] [String] $Forest, [Management.Automation.PSCredential] $Credential ) process { $FoundForest = Get-NetForest -Forest $Forest -Credential $Credential if($FoundForest) { $FoundForest.GetAllTrustRelationships() | ForEach-Object { $_.PSObject.TypeNames.Add('PowerView.ForestTrust') $_ } } } } function Invoke-MapDomainTrust { [CmdletBinding()] param( [Switch] $LDAP, [String] $DomainController, [ValidateRange(1,10000)] [Int] $PageSize = 200, [Management.Automation.PSCredential] $Credential ) $SeenDomains = @{} $Domains = New-Object System.Collections.Stack $CurrentDomain = (Get-NetDomain -Credential $Credential).Name $Domains.push($CurrentDomain) while($Domains.Count -ne 0) { $Domain = $Domains.Pop() if ($Domain -and ($Domain.Trim() -ne "") -and (-not $SeenDomains.ContainsKey($Domain))) { Write-Verbose "Enumerating trusts for domain '$Domain'" $Null = $SeenDomains.add($Domain, "") try { if($LDAP -or $DomainController) { $Trusts = Get-NetDomainTrust -Domain $Domain -LDAP -DomainController $DomainController -PageSize $PageSize -Credential $Credential } else { $Trusts = Get-NetDomainTrust -Domain $Domain -PageSize $PageSize -Credential $Credential } if($Trusts -isnot [System.Array]) { $Trusts = @($Trusts) } if(-not ($LDAP -or $DomainController) ) { $Trusts += Get-NetForestTrust -Forest $Domain -Credential $Credential } if ($Trusts) { if($Trusts -isnot [System.Array]) { $Trusts = @($Trusts) } ForEach ($Trust in $Trusts) { if($Trust.SourceName -and $Trust.TargetName) { $SourceDomain = $Trust.SourceName $TargetDomain = $Trust.TargetName $TrustType = $Trust.TrustType $TrustDirection = $Trust.TrustDirection $ObjectType = $Trust.PSObject.TypeNames | Where-Object {$_ -match 'PowerView'} | Select-Object -First 1 $Null = $Domains.Push($TargetDomain) $DomainTrust = New-Object PSObject $DomainTrust | Add-Member Noteproperty 'SourceDomain' "$SourceDomain" $DomainTrust | Add-Member Noteproperty 'SourceSID' $Trust.SourceSID $DomainTrust | Add-Member Noteproperty 'TargetDomain' "$TargetDomain" $DomainTrust | Add-Member Noteproperty 'TargetSID' $Trust.TargetSID $DomainTrust | Add-Member Noteproperty 'TrustType' "$TrustType" $DomainTrust | Add-Member Noteproperty 'TrustDirection' "$TrustDirection" $DomainTrust.PSObject.TypeNames.Add($ObjectType) $DomainTrust } } } } catch { Write-Verbose "[!] Error: $_" } } } } function New-ThreadedFunction { [CmdletBinding()] Param( [Parameter(Position = 0, Mandatory = $True, ValueFromPipeline = $True, ValueFromPipelineByPropertyName = $True)] [String[]] $ComputerName, [Parameter(Position = 1, Mandatory = $True)] [System.Management.Automation.ScriptBlock] $ScriptBlock, [Parameter(Position = 2)] [Hashtable] $ScriptParameters, [Int] [ValidateRange(1, 100)] $Threads = 20, [Switch] $NoImports ) BEGIN { $SessionState = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault() $SessionState.ApartmentState = [System.Threading.Thread]::CurrentThread.GetApartmentState() if (-not $NoImports) { $MyVars = Get-Variable -Scope 2 $VorbiddenVars = @('?','args','ConsoleFileName','Error','ExecutionContext','false','HOME','Host','input','InputObject','MaximumAliasCount','MaximumDriveCount','MaximumErrorCount','MaximumFunctionCount','MaximumHistoryCount','MaximumVariableCount','MyInvocation','null','PID','PSBoundParameters','PSCommandPath','PSCulture','PSDefaultParameterValues','PSHOME','PSScriptRoot','PSUICulture','PSVersionTable','PWD','ShellId','SynchronizedHash','true') ForEach ($Var in $MyVars) { if ($VorbiddenVars -NotContains $Var.Name) { $SessionState.Variables.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateVariableEntry -ArgumentList $Var.name,$Var.Value,$Var.description,$Var.options,$Var.attributes)) } } ForEach ($Function in (Get-ChildItem Function:)) { $SessionState.Commands.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateFunctionEntry -ArgumentList $Function.Name, $Function.Definition)) } } $Pool = [RunspaceFactory]::CreateRunspacePool(1, $Threads, $SessionState, $Host) $Pool.Open() $Method = $Null ForEach ($M in [PowerShell].GetMethods() | Where-Object { $_.Name -eq 'BeginInvoke' }) { $MethodParameters = $M.GetParameters() if (($MethodParameters.Count -eq 2) -and $MethodParameters[0].Name -eq 'input' -and $MethodParameters[1].Name -eq 'output') { $Method = $M.MakeGenericMethod([Object], [Object]) break } } $Jobs = @() $ComputerName = $ComputerName | Where-Object { $_ -and ($_ -ne '') } Write-Verbose "[New-ThreadedFunction] Total number of hosts: $($ComputerName.count)" if ($Threads -ge $ComputerName.Length) { $Threads = $ComputerName.Length } $ElementSplitSize = [Int]($ComputerName.Length/$Threads) $ComputerNamePartitioned = @() $Start = 0 $End = $ElementSplitSize for($i = 1; $i -le $Threads; $i++) { $List = New-Object System.Collections.ArrayList if ($i -eq $Threads) { $End = $ComputerName.Length } $List.AddRange($ComputerName[$Start..($End-1)]) $Start += $ElementSplitSize $End += $ElementSplitSize $ComputerNamePartitioned += @(,@($List.ToArray())) } Write-Verbose "[New-ThreadedFunction] Total number of threads/partitions: $Threads" ForEach ($ComputerNamePartition in $ComputerNamePartitioned) { $PowerShell = [PowerShell]::Create() $PowerShell.runspacepool = $Pool $Null = $PowerShell.AddScript($ScriptBlock).AddParameter('ComputerName', $ComputerNamePartition) if ($ScriptParameters) { ForEach ($Param in $ScriptParameters.GetEnumerator()) { $Null = $PowerShell.AddParameter($Param.Name, $Param.Value) } } $Output = New-Object Management.Automation.PSDataCollection[Object] $Jobs += @{ PS = $PowerShell Output = $Output Result = $Method.Invoke($PowerShell, @($Null, [Management.Automation.PSDataCollection[Object]]$Output)) } } } END { Write-Verbose "[New-ThreadedFunction] Threads executing" Do { ForEach ($Job in $Jobs) { $Job.Output.ReadAll() } Start-Sleep -Seconds 1 } While (($Jobs | Where-Object { -not $_.Result.IsCompleted }).Count -gt 0) Write-Verbose "[New-ThreadedFunction] Waiting 120 seconds for final cleanup..." Start-Sleep -Seconds 120 ForEach ($Job in $Jobs) { $Job.Output.ReadAll() $Job.PS.Dispose() } $Pool.Dispose() Write-Verbose "[New-ThreadedFunction] all threads completed" } } function Get-GlobalCatalogUserMapping { [CmdletBinding()] param( [ValidatePattern('^GC://')] [String] $GlobalCatalog ) if(-not $PSBoundParameters['GlobalCatalog']) { $GCPath = ([ADSI]'LDAP://RootDSE').dnshostname $ADSPath = "GC://$GCPath" Write-Verbose "Enumerated global catalog location: $ADSPath" } else { $ADSpath = $GlobalCatalog } $UserDomainMappings = @{} $UserSearcher = Get-DomainSearcher -ADSpath $ADSpath $UserSearcher.filter = '(samAccountType=805306368)' $UserSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname', 'cn', 'objectsid')) ForEach($User in $UserSearcher.FindAll()) { $UserName = $User.Properties['samaccountname'][0].ToUpper() $UserDN = $User.Properties['distinguishedname'][0] if($UserDN -and ($UserDN -ne '')) { if (($UserDN -match 'ForeignSecurityPrincipals') -and ($UserDN -match 'S-1-5-21')) { try { if(-not $MemberSID) { $MemberSID = $User.Properties['cn'][0] } $UserSid = (New-Object System.Security.Principal.SecurityIdentifier($User.Properties['objectsid'][0],0)).Value $MemberSimpleName = Convert-SidToName -SID $UserSid | Convert-ADName -InputType 'NT4' -OutputType 'Canonical' if($MemberSimpleName) { $UserDomain = $MemberSimpleName.Split('/')[0] } else { Write-Verbose "Error converting $UserDN" $UserDomain = $Null } } catch { Write-Verbose "Error converting $UserDN" $UserDomain = $Null } } else { $UserDomain = ($UserDN.subString($UserDN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.').ToUpper() } if($UserDomain) { if(-not $UserDomainMappings[$UserName]) { $UserDomainMappings[$UserName] = @($UserDomain) } elseif($UserDomainMappings[$UserName] -notcontains $UserDomain) { $UserDomainMappings[$UserName] += $UserDomain } } } } $UserSearcher.dispose() $UserDomainMappings } function Invoke-BloodHound { [CmdletBinding(DefaultParameterSetName = 'CSVExport')] param( [Parameter(ValueFromPipeline=$True)] [Alias('HostName')] [String[]] [ValidateNotNullOrEmpty()] $ComputerName, [String] $ComputerADSpath, [String] $UserADSpath, [String] $Domain, [String] $DomainController, [String] [ValidateSet('Group', 'Containers', 'ACLs', 'ComputerOnly', 'LocalGroup', 'GPOLocalGroup', 'Session', 'LoggedOn', 'Stealth', 'Trusts', 'Default')] $CollectionMethod = 'Default', [Switch] $SearchForest, [Parameter(ParameterSetName = 'CSVExport')] [ValidateScript({ Test-Path -Path $_ })] [String] $CSVFolder = $(Get-Location), [Parameter(ParameterSetName = 'CSVExport')] [ValidateNotNullOrEmpty()] [String] $CSVPrefix, [Parameter(ParameterSetName = 'RESTAPI', Mandatory = $True)] [URI] $URI, [Parameter(ParameterSetName = 'RESTAPI', Mandatory = $True)] [String] [ValidatePattern('.*:.*')] $UserPass, [ValidatePattern('^GC://')] [String] $GlobalCatalog, [Switch] $SkipGCDeconfliction, [ValidateRange(1,50)] [Int] $Threads = 20, [ValidateRange(1,5000)] [Int] $Throttle = 1000 ) BEGIN { Switch ($CollectionMethod) { 'Group' { $UseGroup = $True; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True } 'Containers' { $UseContainers = $True; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True } 'ACLs' { $UseGroup = $False; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True; $UseACLs = $True } 'ComputerOnly' { $UseGroup = $False; $UseLocalGroup = $True; $UseSession = $True; $UseLoggedOn = $True; $SkipGCDeconfliction2 = $False } 'LocalGroup' { $UseLocalGroup = $True; $SkipGCDeconfliction2 = $True } 'GPOLocalGroup' { $UseGPOGroup = $True; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True } 'Session' { $UseSession = $True; $SkipGCDeconfliction2 = $False } 'LoggedOn' { $UseLoggedOn = $True; $SkipGCDeconfliction2 = $True } 'Trusts' { $UseDomainTrusts = $True; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True } 'Stealth' { $UseGroup = $True $UseContainers = $True $UseGPOGroup = $True $UseSession = $True $UseDomainTrusts = $True $SkipGCDeconfliction2 = $False } 'Default' { $UseGroup = $True $UseContainers = $True $UseLocalGroup = $True $UseSession = $True $UseLoggedOn = $False $UseDomainTrusts = $True $SkipGCDeconfliction2 = $False } } if($SkipGCDeconfliction) { $SkipGCDeconfliction2 = $True } $GCPath = ([ADSI]'LDAP://RootDSE').dnshostname $GCADSPath = "GC://$GCPath" $ACLGeneralRightsRegex = [regex] 'GenericAll|GenericWrite|WriteOwner|WriteDacl' if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { try { $OutputFolder = $CSVFolder | Resolve-Path -ErrorAction Stop | Select-Object -ExpandProperty Path } catch { throw "Error: $_" } if($CSVPrefix) { $CSVExportPrefix = "$($CSVPrefix)_" } else { $CSVExportPrefix = '' } Write-Output "Writing output to CSVs in: $OutputFolder\$CSVExportPrefix" if($UseSession -or $UseLoggedon) { $SessionPath = "$OutputFolder\$($CSVExportPrefix)user_sessions.csv" $Exists = [System.IO.File]::Exists($SessionPath) $SessionFileStream = New-Object IO.FileStream($SessionPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read) $SessionWriter = New-Object System.IO.StreamWriter($SessionFileStream) $SessionWriter.AutoFlush = $True if (-not $Exists) { $SessionWriter.WriteLine('"ComputerName","UserName","Weight"') } } if($UseGroup) { $GroupPath = "$OutputFolder\$($CSVExportPrefix)group_memberships.csv" $Exists = [System.IO.File]::Exists($GroupPath) $GroupFileStream = New-Object IO.FileStream($GroupPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read) $GroupWriter = New-Object System.IO.StreamWriter($GroupFileStream) $GroupWriter.AutoFlush = $True if (-not $Exists) { $GroupWriter.WriteLine('"GroupName","AccountName","AccountType"') } } if($UseContainers) { $ContainerPath = "$OutputFolder\$($CSVExportPrefix)container_structure.csv" $Exists = [System.IO.File]::Exists($ContainerPath) $ContainerFileStream = New-Object IO.FileStream($ContainerPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read) $ContainerWriter = New-Object System.IO.StreamWriter($ContainerFileStream) $ContainerWriter.AutoFlush = $True if (-not $Exists) { $ContainerWriter.WriteLine('"ContainerType","ContainerName","ContainerGUID","ContainerBlocksInheritence","ObjectType","ObjectName","ObjectGUIDorSID"') } $GPLinkPath = "$OutputFolder\$($CSVExportPrefix)container_gplinks.csv" $Exists = [System.IO.File]::Exists($GPLinkPath) $GPLinkFileStream = New-Object IO.FileStream($GPLinkPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read) $GPLinkWriter = New-Object System.IO.StreamWriter($GPLinkFileStream) $GPLinkWriter.AutoFlush = $True if (-not $Exists) { $GPLinkWriter.WriteLine('"ObjectType","ObjectName","ObjectGUID","GPODisplayName","GPOGUID","IsEnforced"') } } if($UseACLs) { $ACLPath = "$OutputFolder\$($CSVExportPrefix)acls.csv" $Exists = [System.IO.File]::Exists($ACLPath) $ACLFileStream = New-Object IO.FileStream($ACLPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read) $ACLWriter = New-Object System.IO.StreamWriter($ACLFileStream) $ACLWriter.AutoFlush = $True if (-not $Exists) { $ACLWriter.WriteLine('"ObjectName","ObjectType","ObjectGuid","PrincipalName","PrincipalType","ActiveDirectoryRights","ACEType","AccessControlType","IsInherited"') } } if($UseLocalGroup -or $UseGPOGroup) { $LocalAdminPath = "$OutputFolder\$($CSVExportPrefix)local_admins.csv" $Exists = [System.IO.File]::Exists($LocalAdminPath) $LocalAdminFileStream = New-Object IO.FileStream($LocalAdminPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read) $LocalAdminWriter = New-Object System.IO.StreamWriter($LocalAdminFileStream) $LocalAdminWriter.AutoFlush = $True if (-not $Exists) { $LocalAdminWriter.WriteLine('"ComputerName","AccountName","AccountType"') } } if($UseDomainTrusts) { $TrustsPath = "$OutputFolder\$($CSVExportPrefix)trusts.csv" $Exists = [System.IO.File]::Exists($TrustsPath) $TrustsFileStream = New-Object IO.FileStream($TrustsPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read) $TrustWriter = New-Object System.IO.StreamWriter($TrustsFileStream) $TrustWriter.AutoFlush = $True if (-not $Exists) { $TrustWriter.WriteLine('"SourceDomain","TargetDomain","TrustDirection","TrustType","Transitive"') } } } else { $WebClient = New-Object System.Net.WebClient $Base64UserPass = [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($UserPass)) $WebClient.Headers.Add('Accept','application/json; charset=UTF-8') $WebClient.Headers.Add('Authorization',"Basic $Base64UserPass") try { $Null = $WebClient.DownloadString($URI.AbsoluteUri + 'user/neo4j') Write-Verbose "Connection established with neo4j ingestion interface at $($URI.AbsoluteUri)" $Authorized = $True } catch { $Authorized = $False throw "Error connecting to Neo4j rest REST server at '$($URI.AbsoluteUri)'" } Write-Output "Sending output to neo4j RESTful API interface at: $($URI.AbsoluteUri)" $Null = [Reflection.Assembly]::LoadWithPartialName("System.Web.Extensions") function ConvertTo-Json20([object] $Item){ $ps_js = New-Object System.Web.Script.Serialization.javascriptSerializer return $ps_js.Serialize($item) } $Authorized = $True $Statements = New-Object System.Collections.ArrayList $Null = $Statements.Add( @{ "statement"="CREATE CONSTRAINT ON (c:User) ASSERT c.UserName IS UNIQUE" } ) $Null = $Statements.Add( @{ "statement"="CREATE CONSTRAINT ON (c:Computer) ASSERT c.ComputerName IS UNIQUE"} ) $Null = $Statements.Add( @{ "statement"="CREATE CONSTRAINT ON (c:Group) ASSERT c.GroupName IS UNIQUE" } ) $Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements } $JsonRequest = ConvertTo-Json20 $Json $Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest) $Statements.Clear() } $UserDomainMappings = @{} if(-not $SkipGCDeconfliction2) { if($PSBoundParameters['GlobalCatalog']) { $UserDomainMappings = Get-GlobalCatalogUserMapping -GlobalCatalog $GlobalCatalog } else { $UserDomainMappings = Get-GlobalCatalogUserMapping } } $DomainShortnameMappings = @{} if($Domain) { $TargetDomains = @($Domain) } elseif($SearchForest) { $TargetDomains = Get-NetForestDomain | Select-Object -ExpandProperty Name } else { $TargetDomains = @( (Get-NetDomain).Name ) } if($UseGroup -and $TargetDomains) { $Title = (Get-Culture).TextInfo ForEach ($TargetDomain in $TargetDomains) { Write-Verbose "Enumerating group memberships for domain $TargetDomain" $GroupDNMappings = @{} $PrimaryGroups = @{} $DomainSID = Get-DomainSID -Domain $TargetDomain -DomainController $DomainController $ObjectSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController -ADSPath $UserADSpath $ObjectSearcher.Filter = '(memberof=*)' $Null = $ObjectSearcher.PropertiesToLoad.AddRange(('samaccountname', 'distinguishedname', 'cn', 'dnshostname', 'samaccounttype', 'primarygroupid', 'memberof')) $Counter = 0 $ObjectSearcher.FindAll() | ForEach-Object { if($Counter % 1000 -eq 0) { Write-Verbose "Group object counter: $Counter" if($GroupWriter) { $GroupWriter.Flush() } [GC]::Collect() } $Properties = $_.Properties $MemberDN = $Null $MemberDomain = $Null try { $MemberDN = $Properties['distinguishedname'][0] if (($MemberDN -match 'ForeignSecurityPrincipals') -and ($MemberDN -match 'S-1-5-21')) { try { if(-not $MemberSID) { $MemberSID = $Properties.cn[0] } $MemberSimpleName = Convert-SidToName -SID $MemberSID | Convert-ADName -InputType 'NT4' -OutputType 'Canonical' if($MemberSimpleName) { $MemberDomain = $MemberSimpleName.Split('/')[0] } else { Write-Verbose "Error converting $MemberDN" } } catch { Write-Verbose "Error converting $MemberDN" } } else { $MemberDomain = $MemberDN.subString($MemberDN.IndexOf("DC=")) -replace 'DC=','' -replace ',','.' } } catch {} if (@('268435456','268435457','536870912','536870913') -contains $Properties['samaccounttype']) { $ObjectType = 'group' if($Properties['samaccountname']) { $MemberName = $Properties['samaccountname'][0] } else { try { $MemberName = Convert-SidToName $Properties['cn'][0] } catch { $MemberName = $Properties['cn'][0] } } if ($MemberName -Match "\\") { $AccountName = $MemberName.split('\')[1] + '@' + $MemberDomain } else { $AccountName = "$MemberName@$MemberDomain" } } elseif (@('805306369') -contains $Properties['samaccounttype']) { $ObjectType = 'computer' if ($Properties['dnshostname']) { $AccountName = $Properties['dnshostname'][0] } } elseif (@('805306368') -contains $Properties['samaccounttype']) { $ObjectType = 'user' if($Properties['samaccountname']) { $MemberName = $Properties['samaccountname'][0] } else { try { $MemberName = Convert-SidToName $Properties['cn'][0] } catch { $MemberName = $Properties['cn'][0] } } if ($MemberName -Match "\\") { $AccountName = $MemberName.split('\')[1] + '@' + $MemberDomain } else { $AccountName = "$MemberName@$MemberDomain" } } else { Write-Verbose "Unknown account type for object $($Properties['distinguishedname']) : $($Properties['samaccounttype'])" } if($AccountName -and (-not $AccountName.StartsWith('@'))) { $MemberPrimaryGroupName = $Null try { if($AccountName -match $TargetDomain) { if($Properties['primarygroupid'] -and $Properties['primarygroupid'][0] -and ($Properties['primarygroupid'][0] -ne '')) { $PrimaryGroupSID = "$DomainSID-$($Properties['primarygroupid'][0])" if($PrimaryGroups[$PrimaryGroupSID]) { $PrimaryGroupName = $PrimaryGroups[$PrimaryGroupSID] } else { $RawName = Convert-SidToName -SID $PrimaryGroupSID if ($RawName -notmatch '^S-1-.*') { $PrimaryGroupName = $RawName.split('\')[-1] $PrimaryGroups[$PrimaryGroupSID] = $PrimaryGroupName } } if ($PrimaryGroupName) { $MemberPrimaryGroupName = "$PrimaryGroupName@$TargetDomain" } } else { } } } catch { } if($MemberPrimaryGroupName) { if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $GroupWriter.WriteLine("`"$MemberPrimaryGroupName`",`"$AccountName`",`"$ObjectType`"") } else { $ObjectTypeCap = $Title.ToTitleCase($ObjectType) $Null = $Statements.Add( @{ "statement"="MERGE ($($ObjectType)1:$ObjectTypeCap { name: UPPER('$AccountName') }) MERGE (group2:Group { name: UPPER('$MemberPrimaryGroupName') }) MERGE ($($ObjectType)1)-[:MemberOf]->(group2)" } ) } } ForEach($GroupDN in $_.properties['memberof']) { $GroupDomain = $GroupDN.subString($GroupDN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.' if($GroupDNMappings[$GroupDN]) { $GroupName = $GroupDNMappings[$GroupDN] } else { $GroupName = Convert-ADName -ObjectName $GroupDN if($GroupName) { $GroupName = $GroupName.Split('\')[-1] } else { $GroupName = $GroupDN.SubString(0, $GroupDN.IndexOf(',')).Split('=')[-1] } $GroupDNMappings[$GroupDN] = $GroupName } if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $GroupWriter.WriteLine("`"$GroupName@$GroupDomain`",`"$AccountName`",`"$ObjectType`"") } else { $ObjectTypeCap = $Title.ToTitleCase($ObjectType) $Null = $Statements.Add( @{ "statement"="MERGE ($($ObjectType)1:$ObjectTypeCap { name: UPPER('$AccountName') }) MERGE (group2:Group { name: UPPER('$GroupName@$GroupDomain') }) MERGE ($($ObjectType)1)-[:MemberOf]->(group2)" } ) if ($Statements.Count -ge $Throttle) { $Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements } $JsonRequest = ConvertTo-Json20 $Json $Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest) $Statements.Clear() } } } $Counter += 1 } } $ObjectSearcher.Dispose() if ($PSCmdlet.ParameterSetName -eq 'RESTAPI') { $Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements } $JsonRequest = ConvertTo-Json20 $Json $Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest) $Statements.Clear() } Write-Verbose "Done with group enumeration for domain $TargetDomain" } [GC]::Collect() } if ($UseContainers -and $TargetDomains) { ForEach ($TargetDomain in $TargetDomains) { Write-Verbose "Enumerating container memberships and gpLinks for domain: $TargetDomain" $OUs = New-Object System.Collections.Queue $GPOSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController $GPOSearcher.filter="(&(objectCategory=groupPolicyContainer)(name=*)(gpcfilesyspath=*))" $GPOSearcher.PropertiesToLoad.AddRange(('displayname', 'name')) $GPOs = @{} ForEach($GPOResult in $GPOSearcher.FindAll()) { $GPOdisplayName = $GPOResult.Properties['displayname'][0] $GPOname = $GPOResult.Properties['name'][0] $GPOName = $GPOName.Substring(1, $GPOName.Length-2) $GPOs[$GPOname] = $GPOdisplayName } $DomainSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController $DomainSearcher.SearchScope = 'Base' $Null = $DomainSearcher.PropertiesToLoad.AddRange(('gplink', 'objectguid')) $DomainObject = $DomainSearcher.FindOne() $DomainGUID = (New-Object Guid (,$DomainObject.Properties['objectguid'][0])).Guid if ($DomainObject.Properties['gplink']) { $DomainObject.Properties['gplink'][0].split('][') | ForEach-Object { if ($_.startswith('LDAP')) { $Parts = $_.split(';') $GPODN = $Parts[0] if ($Parts[1] -eq 2) { $Enforced = $True } else { $Enforced = $False } $i = $GPODN.IndexOf("CN=")+4 $GPOName = $GPODN.subString($i, $i+25) $GPODisplayName = $GPOs[$GPOname] $GPLinkWriter.WriteLine("`"domain`",`"$TargetDomain`",`"$DomainGUID`",`"$GPODisplayName`",`"$GPOName`",`"$Enforced`"") } } } $DomainSearcher.SearchScope = 'OneLevel' $Null = $DomainSearcher.PropertiesToLoad.AddRange(('name')) $DomainSearcher.Filter = "(objectClass=container)" $DomainSearcher.FindAll() | ForEach-Object { $ContainerName = ,$_.Properties['name'][0] $ContainerPath = $_.Properties['adspath'] Write-Verbose "ContainerPath: $ContainerPath" $ContainerSearcher = Get-DomainSearcher -ADSpath $ContainerPath $Null = $ContainerSearcher.PropertiesToLoad.AddRange(('name', 'objectsid', 'samaccounttype')) $ContainerSearcher.Filter = '(|(samAccountType=805306368)(samAccountType=805306369))' $ContainerSearcher.SearchScope = 'SubTree' $ContainerSearcher.FindAll() | ForEach-Object { $ObjectName = ,$_.Properties['name'][0] Write-Verbose "ObjectName: $ObjectName" if ( (,$_.Properties['samaccounttype'][0]) -eq '805306368') { $ObjectType = 'user' } else { $ObjectType = 'computer' } $ObjectSID = (New-Object System.Security.Principal.SecurityIdentifier($_.Properties['objectsid'][0],0)).Value $ContainerWriter.WriteLine("`"domain`",`"$TargetDomain`",`"$DomainGUID`",`"$False`",`"$ObjectType`",`"$ObjectName`",`"$ObjectSID`"") } $ContainerSearcher.Dispose() } $DomainSearcher.SearchScope = 'OneLevel' $Null = $DomainSearcher.PropertiesToLoad.AddRange(('name', 'objectguid', 'gplink')) $DomainSearcher.Filter = "(objectCategory=organizationalUnit)" $DomainSearcher.FindAll() | ForEach-Object { $OUGuid = (New-Object Guid (,$_.Properties['objectguid'][0])).Guid $OUName = ,$_.Properties['name'][0] $ContainerWriter.WriteLine("`"domain`",`"$TargetDomain`",`"$DomainGUID`",`"$False`",`"ou`",`"$OUName`",`"$OUGuid`"") $OUs.Enqueue($_.Properties['adspath']) } $DomainSearcher.Dispose() while ($OUs.Count -gt 0) { $ADSPath = $OUs.Dequeue() Write-Verbose "Enumerating OU: '$ADSPath'" $DomainSearcher = Get-DomainSearcher -ADSpath $ADSPath $Null = $DomainSearcher.PropertiesToLoad.AddRange(('name', 'objectguid', 'gplink', 'gpoptions')) $DomainSearcher.SearchScope = 'Base' $OU = $DomainSearcher.FindOne() $OUGuid = (New-Object Guid (,$OU.Properties['objectguid'][0])).Guid $OUName = ,$OU.Properties['name'][0] $ContainerBlocksInheritence = $False if ($OU.Properties['gpoptions'] -and ($OU.Properties['gpoptions'] -eq 1)) { $ContainerBlocksInheritence = $True } if ($OU.Properties['gplink'] -and $OU.Properties['gplink'][0]) { $OU.Properties['gplink'][0].split('][') | ForEach-Object { if ($_.startswith('LDAP')) { $Parts = $_.split(';') $GPODN = $Parts[0] if ($Parts[1] -eq 2) { $Enforced = $True } else { $Enforced = $False } $i = $GPODN.IndexOf('CN=', [System.StringComparison]::CurrentCultureIgnoreCase)+4 $GPOName = $GPODN.SubString($i, $i+25) $GPODisplayName = $GPOs[$GPOname] $GPLinkWriter.WriteLine("`"ou`",`"$OUName`",`"$OUGuid`",`"$GPODisplayName`",`"$GPOName`",`"$Enforced`"") } } } $Null = $DomainSearcher.PropertiesToLoad.AddRange(('name', 'objectsid', 'objectguid', 'gplink', 'gpoptions', 'objectclass')) $DomainSearcher.Filter = '(|(samAccountType=805306368)(samAccountType=805306369)(objectclass=organizationalUnit))' $DomainSearcher.SearchScope = 'OneLevel' $DomainSearcher.FindAll() | ForEach-Object { if ($_.Properties['objectclass'] -contains 'organizationalUnit') { $SubOUName = ,$_.Properties['name'][0] $SubOUGuid = (New-Object Guid (,$_.Properties['objectguid'][0])).Guid $ContainerWriter.WriteLine("`"ou`",`"$OUName`",`"$OUGuid`",`"$ContainerBlocksInheritence`",`"ou`",`"$SubOUName`",`"$SubOUGuid`"") $OUs.Enqueue($_.Properties['adspath']) } elseif ($_.Properties['objectclass'] -contains 'computer') { $SubComputerName = ,$_.Properties['name'][0] $SubComputerSID = (New-Object System.Security.Principal.SecurityIdentifier($_.Properties['objectsid'][0],0)).Value $ContainerWriter.WriteLine("`"ou`",`"$OUName`",`"$OUGuid`",`"$ContainerBlocksInheritence`",`"computer`",`"$SubComputerName`",`"$SubComputerSID`"") } else { $SubUserName = ,$_.Properties['name'][0] $SubUserSID = (New-Object System.Security.Principal.SecurityIdentifier($_.Properties['objectsid'][0],0)).Value $ContainerWriter.WriteLine("`"ou`",`"$OUName`",`"$OUGuid`",`"$ContainerBlocksInheritence`",`"user`",`"$SubUserName`",`"$SubUserSID`"") } } $DomainSearcher.Dispose() } Write-Verbose "Done with container memberships and gpLink enumeration for domain: $TargetDomain" } [GC]::Collect() } if($UseACLs -and $TargetDomains) { $PrincipalMapping = @{} $Counter = 0 $CommonSidMapping = @{ 'S-1-0' = @('Null Authority', 'USER') 'S-1-0-0' = @('Nobody', 'USER') 'S-1-1' = @('World Authority', 'USER') 'S-1-1-0' = @('Everyone', 'GROUP') 'S-1-2' = @('Local Authority', 'USER') 'S-1-2-0' = @('Local', 'GROUP') 'S-1-2-1' = @('Console Logon', 'GROUP') 'S-1-3' = @('Creator Authority', 'USER') 'S-1-3-0' = @('Creator Owner', 'USER') 'S-1-3-1' = @('Creator Group', 'GROUP') 'S-1-3-2' = @('Creator Owner Server', 'COMPUTER') 'S-1-3-3' = @('Creator Group Server', 'COMPUTER') 'S-1-3-4' = @('Owner Rights', 'GROUP') 'S-1-4' = @('Non-unique Authority', 'USER') 'S-1-5' = @('NT Authority', 'USER') 'S-1-5-1' = @('Dialup', 'GROUP') 'S-1-5-2' = @('Network', 'GROUP') 'S-1-5-3' = @('Batch', 'GROUP') 'S-1-5-4' = @('Interactive', 'GROUP') 'S-1-5-6' = @('Service', 'GROUP') 'S-1-5-7' = @('Anonymous', 'GROUP') 'S-1-5-8' = @('Proxy', 'GROUP') 'S-1-5-9' = @('Enterprise Domain Controllers', 'GROUP') 'S-1-5-10' = @('Principal Self', 'USER') 'S-1-5-11' = @('Authenticated Users', 'GROUP') 'S-1-5-12' = @('Restricted Code', 'GROUP') 'S-1-5-13' = @('Terminal Server Users', 'GROUP') 'S-1-5-14' = @('Remote Interactive Logon', 'GROUP') 'S-1-5-15' = @('This Organization ', 'GROUP') 'S-1-5-17' = @('This Organization ', 'GROUP') 'S-1-5-18' = @('Local System', 'USER') 'S-1-5-19' = @('NT Authority', 'USER') 'S-1-5-20' = @('NT Authority', 'USER') 'S-1-5-80-0' = @('All Services ', 'GROUP') 'S-1-5-32-544' = @('Administrators', 'GROUP') 'S-1-5-32-545' = @('Users', 'GROUP') 'S-1-5-32-546' = @('Guests', 'GROUP') 'S-1-5-32-547' = @('Power Users', 'GROUP') 'S-1-5-32-548' = @('Account Operators', 'GROUP') 'S-1-5-32-549' = @('Server Operators', 'GROUP') 'S-1-5-32-550' = @('Print Operators', 'GROUP') 'S-1-5-32-551' = @('Backup Operators', 'GROUP') 'S-1-5-32-552' = @('Replicators', 'GROUP') 'S-1-5-32-554' = @('Pre-Windows 2000 Compatible Access', 'GROUP') 'S-1-5-32-555' = @('Remote Desktop Users', 'GROUP') 'S-1-5-32-556' = @('Network Configuration Operators', 'GROUP') 'S-1-5-32-557' = @('Incoming Forest Trust Builders', 'GROUP') 'S-1-5-32-558' = @('Performance Monitor Users', 'GROUP') 'S-1-5-32-559' = @('Performance Log Users', 'GROUP') 'S-1-5-32-560' = @('Windows Authorization Access Group', 'GROUP') 'S-1-5-32-561' = @('Terminal Server License Servers', 'GROUP') 'S-1-5-32-562' = @('Distributed COM Users', 'GROUP') 'S-1-5-32-569' = @('Cryptographic Operators', 'GROUP') 'S-1-5-32-573' = @('Event Log Readers', 'GROUP') 'S-1-5-32-574' = @('Certificate Service DCOM Access', 'GROUP') 'S-1-5-32-575' = @('RDS Remote Access Servers', 'GROUP') 'S-1-5-32-576' = @('RDS Endpoint Servers', 'GROUP') 'S-1-5-32-577' = @('RDS Management Servers', 'GROUP') 'S-1-5-32-578' = @('Hyper-V Administrators', 'GROUP') 'S-1-5-32-579' = @('Access Control Assistance Operators', 'GROUP') 'S-1-5-32-580' = @('Access Control Assistance Operators', 'GROUP') } ForEach ($TargetDomain in $TargetDomains) { Write-Verbose "Enumerating ACLs for objects in domain: $TargetDomain" $ObjectSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController -ADSPath $UserADSpath $ObjectSearcher.SecurityMasks = [System.DirectoryServices.SecurityMasks]'Dacl,Owner' $ObjectSearcher.Filter = '(|(samAccountType=805306368)(samAccountType=805306369)(samAccountType=268435456)(samAccountType=268435457)(samAccountType=536870912)(samAccountType=536870913)(objectCategory=groupPolicyContainer))' $ObjectSearcher.PropertiesToLoad.AddRange(('distinguishedName','samaccountname','dnshostname','displayname','objectclass','objectsid','name','ntsecuritydescriptor')) $ObjectSearcher.FindAll() | ForEach-Object { $Object = $_.Properties if($Object -and $Object.distinguishedname -and $Object.distinguishedname[0]) { $DN = $Object.distinguishedname[0] $ObjectDomain = $DN.SubString($DN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.' $ObjectName, $ObjectADType, $ObjectGuid = $Null if ($Object.objectclass.contains('computer')) { $ObjectADType = 'COMPUTER' if ($Object.dnshostname) { $ObjectName = $Object.dnshostname[0] } } elseif ($Object.objectclass.contains('groupPolicyContainer')) { $ObjectADType = 'GPO' $ObjectGuid = $Object.name[0].trim('{}') $ObjectDisplayName = $Object.displayname[0] $ObjectName = "$ObjectDisplayName@$ObjectDomain" } else { if($Object.samaccountname) { $ObjectSamAccountName = $Object.samaccountname[0] } else { $ObjectSamAccountName = $Object.name[0] } $ObjectName = "$ObjectSamAccountName@$ObjectDomain" if ($Object.objectclass.contains('group')) { $ObjectADType = 'GROUP' } elseif ($Object.objectclass.contains('user')) { $ObjectADType = 'USER' } else { $ObjectADType = 'OTHER' } } if ($ObjectName -and $ObjectADType) { try { $SecDesc = New-Object -TypeName Security.AccessControl.RawSecurityDescriptor -ArgumentList $Object['ntsecuritydescriptor'][0], 0 $SecDesc| Select-Object -Expand DiscretionaryAcl | ForEach-Object { $Counter += 1 if($Counter % 10000 -eq 0) { Write-Verbose "ACE counter: $Counter" if($ACLWriter) { $ACLWriter.Flush() } [GC]::Collect() } $RawActiveDirectoryRights = ([Enum]::ToObject([System.DirectoryServices.ActiveDirectoryRights], $_.AccessMask)) if ( ( ($RawActiveDirectoryRights -match 'GenericAll|GenericWrite') -and (-not $_.ObjectAceType -or $_.ObjectAceType -eq '00000000-0000-0000-0000-000000000000') ) -or ( ($RawActiveDirectoryRights -match 'WriteProperty') -and (-not $_.ObjectAceType -or $_.ObjectAceType -eq '00000000-0000-0000-0000-000000000000') ) -or ( ($RawActiveDirectoryRights -match 'ExtendedRight') -and (-not $_.ObjectAceType -or $_.ObjectAceType -eq '00000000-0000-0000-0000-000000000000') ) -or ($RawActiveDirectoryRights -match 'WriteDacl|WriteOwner') -or (($_.ObjectAceType -eq '00299570-246d-11d0-a768-00aa006e0529') -and ($RawActiveDirectoryRights -match 'ExtendedRight')) -or (($_.ObjectAceType -eq 'bf9679c0-0de6-11d0-a285-00aa003049e2') -and ($RawActiveDirectoryRights -match 'WriteProperty')) -or (($_.ObjectAceType -eq 'bf9679a8-0de6-11d0-a285-00aa003049e2') -and ($RawActiveDirectoryRights -match 'WriteProperty')) -or (($_.ObjectAceType -eq 'f30e3bc1-9ff0-11d1-b603-0000f80367c1') -and ($RawActiveDirectoryRights -match 'WriteProperty')) ) { $PrincipalSid = $_.SecurityIdentifier.ToString() $PrincipalSimpleName, $PrincipalObjectClass, $ACEType = $Null $ActiveDirectoryRights = $ACLGeneralRightsRegex.Matches($RawActiveDirectoryRights) | Select-Object -ExpandProperty Value if (-not $ActiveDirectoryRights) { if ($RawActiveDirectoryRights -match 'ExtendedRight') { $ActiveDirectoryRights = 'ExtendedRight' } else { $ActiveDirectoryRights = 'WriteProperty' } $ACEType = Switch ($_.ObjectAceType) { '00299570-246d-11d0-a768-00aa006e0529' {'User-Force-Change-Password'} 'bf9679c0-0de6-11d0-a285-00aa003049e2' {'Member'} 'bf9679a8-0de6-11d0-a285-00aa003049e2' {'Script-Path'} 'f30e3bc1-9ff0-11d1-b603-0000f80367c1' {'GPC-File-Sys-Path'} Default {'All'} } } if ($PrincipalMapping[$PrincipalSid]) { $PrincipalSimpleName, $PrincipalObjectClass = $PrincipalMapping[$PrincipalSid] } elseif ($CommonSidMapping[$PrincipalSid]) { $PrincipalName, $PrincipalObjectClass = $CommonSidMapping[$PrincipalSid] $PrincipalSimpleName = "$PrincipalName@$TargetDomain" $PrincipalMapping[$PrincipalSid] = $PrincipalSimpleName, $PrincipalObjectClass } else { $SIDSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController $SIDSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname','dnshostname','objectclass')) $SIDSearcher.Filter = "(objectsid=$PrincipalSid)" $PrincipalObject = $SIDSearcher.FindOne() if ((-not $PrincipalObject) -and ((-not $DomainController) -or (-not $DomainController.StartsWith('GC:')))) { $GCSearcher = Get-DomainSearcher -ADSpath $GCADSPath $GCSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname','dnshostname','objectclass')) $GCSearcher.Filter = "(objectsid=$PrincipalSid)" $PrincipalObject = $GCSearcher.FindOne() } if ($PrincipalObject) { if ($PrincipalObject.Properties.objectclass.contains('computer')) { $PrincipalObjectClass = 'COMPUTER' $PrincipalSimpleName = $PrincipalObject.Properties.dnshostname[0] } else { $PrincipalSamAccountName = $PrincipalObject.Properties.samaccountname[0] $PrincipalDN = $PrincipalObject.Properties.distinguishedname[0] $PrincipalDomain = $PrincipalDN.SubString($PrincipalDN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.' $PrincipalSimpleName = "$PrincipalSamAccountName@$PrincipalDomain" if ($PrincipalObject.Properties.objectclass.contains('group')) { $PrincipalObjectClass = 'GROUP' } elseif ($PrincipalObject.Properties.objectclass.contains('user')) { $PrincipalObjectClass = 'USER' } else { $PrincipalObjectClass = 'OTHER' } } } else { Write-Verbose "SID not resolved: $PrincipalSid" } $PrincipalMapping[$PrincipalSid] = $PrincipalSimpleName, $PrincipalObjectClass } if ($PrincipalSimpleName -and $PrincipalObjectClass) { if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $ACLWriter.WriteLine("`"$ObjectName`",`"$ObjectADType`",`"$ObjectGuid`",`"$PrincipalSimpleName`",`"$PrincipalObjectClass`",`"$ActiveDirectoryRights`",`"$ACEType`",`"$($_.AceQualifier)`",`"$($_.IsInherited)`"") } else { Write-Warning 'TODO: implement neo4j RESTful API ingestion for ACLs!' } } } } $SecDesc | Select-Object -Expand Owner | ForEach-Object { $Counter += 1 if($Counter % 10000 -eq 0) { Write-Verbose "ACE counter: $Counter" if($ACLWriter) { $ACLWriter.Flush() } [GC]::Collect() } if ($_ -and $_.Value) { $PrincipalSid = $_.Value $PrincipalSimpleName, $PrincipalObjectClass, $ACEType = $Null if ($PrincipalMapping[$PrincipalSid]) { $PrincipalSimpleName, $PrincipalObjectClass = $PrincipalMapping[$PrincipalSid] } elseif ($CommonSidMapping[$PrincipalSid]) { $PrincipalName, $PrincipalObjectClass = $CommonSidMapping[$PrincipalSid] $PrincipalSimpleName = "$PrincipalName@$TargetDomain" $PrincipalMapping[$PrincipalSid] = $PrincipalSimpleName, $PrincipalObjectClass } else { $SIDSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController $SIDSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname','dnshostname','objectclass')) $SIDSearcher.Filter = "(objectsid=$PrincipalSid)" $PrincipalObject = $SIDSearcher.FindOne() if ((-not $PrincipalObject) -and ((-not $DomainController) -or (-not $DomainController.StartsWith('GC:')))) { $GCSearcher = Get-DomainSearcher -ADSpath $GCADSPath $GCSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname','dnshostname','objectclass')) $GCSearcher.Filter = "(objectsid=$PrincipalSid)" $PrincipalObject = $GCSearcher.FindOne() } if ($PrincipalObject) { if ($PrincipalObject.Properties.objectclass.contains('computer')) { $PrincipalObjectClass = 'COMPUTER' $PrincipalSimpleName = $PrincipalObject.Properties.dnshostname[0] } else { $PrincipalSamAccountName = $PrincipalObject.Properties.samaccountname[0] $PrincipalDN = $PrincipalObject.Properties.distinguishedname[0] $PrincipalDomain = $PrincipalDN.SubString($PrincipalDN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.' $PrincipalSimpleName = "$PrincipalSamAccountName@$PrincipalDomain" if ($PrincipalObject.Properties.objectclass.contains('group')) { $PrincipalObjectClass = 'GROUP' } elseif ($PrincipalObject.Properties.objectclass.contains('user')) { $PrincipalObjectClass = 'USER' } else { $PrincipalObjectClass = 'OTHER' } } } else { Write-Verbose "SID not resolved: $PrincipalSid" } $PrincipalMapping[$PrincipalSid] = $PrincipalSimpleName, $PrincipalObjectClass } if ($PrincipalSimpleName -and $PrincipalObjectClass) { if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $ACLWriter.WriteLine("`"$ObjectName`",`"$ObjectADType`",`"$ObjectGuid`",`"$PrincipalSimpleName`",`"$PrincipalObjectClass`",`"Owner`",`"`",`"AccessAllowed`",`"False`"") } else { Write-Warning 'TODO: implement neo4j RESTful API ingestion for ACLs!' } } } } } catch { Write-Verbose "ACL ingestion error: $_" } } } } } } if($UseDomainTrusts -and $TargetDomains) { Write-Verbose "Mapping domain trusts" Invoke-MapDomainTrust | ForEach-Object { if($_.SourceDomain) { $SourceDomain = $_.SourceDomain } else { $SourceDomain = $_.SourceName } if($_.TargetDomain) { $TargetDomain = $_.TargetDomain } else { $TargetDomain = $_.TargetName } if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $TrustWriter.WriteLine("`"$SourceDomain`",`"$TargetDomain`",`"$($_.TrustDirection)`",`"$($_.TrustType)`",`"$True`"") } else { $Null = $Statements.Add( @{ "statement"="MERGE (SourceDomain:Domain { name: UPPER('$SourceDomain') }) MERGE (TargetDomain:Domain { name: UPPER('$TargetDomain') })" } ) $TrustType = $_.TrustType $Transitive = $True Switch ($_.TrustDirection) { 'Inbound' { $Null = $Statements.Add( @{ "statement"="MERGE (SourceDomain)-[:TrustedBy{ TrustType: UPPER('$TrustType'), Transitive: UPPER('$Transitive')}]->(TargetDomain)" } ) } 'Outbound' { $Null = $Statements.Add( @{ "statement"="MERGE (TargetDomain)-[:TrustedBy{ TrustType: UPPER('$TrustType'), Transitive: UPPER('$Transitive')}]->(SourceDomain)" } ) } 'Bidirectional' { $Null = $Statements.Add( @{ "statement"="MERGE (TargetDomain)-[:TrustedBy{ TrustType: UPPER('$TrustType'), Transitive: UPPER('$Transitive')}]->(SourceDomain) MERGE (SourceDomain)-[:TrustedBy{ TrustType: UPPER('$TrustType'), Transitive: UPPER('$Transitive')}]->(TargetDomain)" } ) } } } } if ($PSCmdlet.ParameterSetName -eq 'RESTAPI') { $Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements } $JsonRequest = ConvertTo-Json20 $Json $Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest) $Statements.Clear() } Write-Verbose "Done mapping domain trusts" } if($UseGPOGroup -and $TargetDomains) { ForEach ($TargetDomain in $TargetDomains) { Write-Verbose "Enumerating GPO local group memberships for domain $TargetDomain" Find-GPOLocation -Domain $TargetDomain -DomainController $DomainController | ForEach-Object { $AccountName = "$($_.ObjectName)@$($_.ObjectDomain)" ForEach($Computer in $_.ComputerName) { if($_.IsGroup) { if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $LocalAdminWriter.WriteLine("`"$Computer`",`"$AccountName`",`"group`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (group:Group { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$Computer') }) MERGE (group)-[:AdminTo]->(computer)" } ) } } else { if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $LocalAdminWriter.WriteLine("`"$Computer`",`"$AccountName`",`"user`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$Computer') }) MERGE (user)-[:AdminTo]->(computer)" } ) } } } } Write-Verbose "Done enumerating GPO local group memberships for domain $TargetDomain" } Write-Verbose "Done enumerating GPO local group" } $CurrentUser = ([Environment]::UserName).toLower() $HostEnumBlock = { Param($ComputerName, $CurrentUser2, $UseLocalGroup2, $UseSession2, $UseLoggedon2, $DomainSID2) ForEach ($TargetComputer in $ComputerName) { $Up = Test-Connection -Count 1 -Quiet -ComputerName $TargetComputer if($Up) { if($UseLocalGroup2) { $Results = Get-NetLocalGroup -ComputerName $TargetComputer -API -IsDomain -DomainSID $DomainSID2 if($Results) { $Results } else { Get-NetLocalGroup -ComputerName $TargetComputer -IsDomain -DomainSID $DomainSID2 } } $IPAddress = @(Get-IPAddress -ComputerName $TargetComputer)[0].IPAddress if($UseSession2) { ForEach ($Session in $(Get-NetSession -ComputerName $TargetComputer)) { $UserName = $Session.sesi10_username $CName = $Session.sesi10_cname if($CName -and $CName.StartsWith("\\")) { $CName = $CName.TrimStart("\") } if (($UserName) -and ($UserName.trim() -ne '') -and ($UserName -notmatch '\$') -and ($UserName -notmatch $CurrentUser2)) { try { $CNameDNSName = [System.Net.Dns]::GetHostEntry($CName) | Select-Object -ExpandProperty HostName } catch { $CNameDNSName = $CName } @{ 'UserDomain' = $Null 'UserName' = $UserName 'ComputerName' = $TargetComputer 'IPAddress' = $IPAddress 'SessionFrom' = $CName 'SessionFromName' = $CNameDNSName 'LocalAdmin' = $Null 'Type' = 'UserSession' } } } } if($UseLoggedon2) { ForEach ($User in $(Get-NetLoggedon -ComputerName $TargetComputer)) { $UserName = $User.wkui1_username $UserDomain = $User.wkui1_logon_domain if($TargetComputer -notmatch "^$UserDomain") { if (($UserName) -and ($UserName.trim() -ne '') -and ($UserName -notmatch '\$')) { @{ 'UserDomain' = $UserDomain 'UserName' = $UserName 'ComputerName' = $TargetComputer 'IPAddress' = $IPAddress 'SessionFrom' = $Null 'SessionFromName' = $Null 'LocalAdmin' = $Null 'Type' = 'UserSession' } } } } ForEach ($User in $(Get-LoggedOnLocal -ComputerName $TargetComputer)) { $UserName = $User.UserName $UserDomain = $User.UserDomain if($TargetComputer -notmatch "^$UserDomain") { @{ 'UserDomain' = $UserDomain 'UserName' = $UserName 'ComputerName' = $TargetComputer 'IPAddress' = $IPAddress 'SessionFrom' = $Null 'SessionFromName' = $Null 'LocalAdmin' = $Null 'Type' = 'UserSession' } } } } } } } } PROCESS { if ($TargetDomains -and (-not $SkipComputerEnumeration)) { if($Statements) { $Statements.Clear() } [Array]$TargetComputers = @() ForEach ($TargetDomain in $TargetDomains) { $DomainSID = Get-DomainSid -Domain $TargetDomain $ScriptParameters = @{ 'CurrentUser2' = $CurrentUser 'UseLocalGroup2' = $UseLocalGroup 'UseSession2' = $UseSession 'UseLoggedon2' = $UseLoggedon 'DomainSID2' = $DomainSID } if($CollectionMethod -eq 'Stealth') { Write-Verbose "Executing stealth computer enumeration of domain $TargetDomain" Write-Verbose "Querying domain $TargetDomain for File Servers" $TargetComputers += Get-NetFileServer -Domain $TargetDomain -DomainController $DomainController Write-Verbose "Querying domain $TargetDomain for DFS Servers" $TargetComputers += ForEach($DFSServer in $(Get-DFSshare -Domain $TargetDomain -DomainController $DomainController)) { $DFSServer.RemoteServerName } Write-Verbose "Querying domain $TargetDomain for Domain Controllers" $TargetComputers += ForEach($DomainController in $(Get-NetDomainController -LDAP -DomainController $DomainController -Domain $TargetDomain)) { $DomainController.dnshostname } $TargetComputers = $TargetComputers | Where-Object {$_ -and ($_.Trim() -ne '')} | Sort-Object -Unique } else { if($ComputerName) { Write-Verbose "Using specified -ComputerName target set" if($ComputerName -isnot [System.Array]) {$ComputerName = @($ComputerName)} $TargetComputers = $ComputerName } else { Write-Verbose "Enumerating all machines in domain $TargetDomain" $ComputerSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController -ADSPath $ComputerADSpath $ComputerSearcher.filter = '(sAMAccountType=805306369)' $Null = $ComputerSearcher.PropertiesToLoad.Add('dnshostname') $TargetComputers = $ComputerSearcher.FindAll() | ForEach-Object {$_.Properties.dnshostname} $ComputerSearcher.Dispose() } } $TargetComputers = $TargetComputers | Where-Object { $_ } New-ThreadedFunction -ComputerName $TargetComputers -ScriptBlock $HostEnumBlock -ScriptParameters $ScriptParameters -Threads $Threads | ForEach-Object { if($_['Type'] -eq 'UserSession') { if($_['SessionFromName']) { try { $SessionFromName = $_['SessionFromName'] $UserName = $_['UserName'].ToUpper() $ComputerDomain = $_['SessionFromName'].SubString($_['SessionFromName'].IndexOf('.')+1).ToUpper() if($UserDomainMappings) { $UserDomain = $Null if($UserDomainMappings[$UserName]) { if($UserDomainMappings[$UserName].Count -eq 1) { $UserDomain = $UserDomainMappings[$UserName] $LoggedOnUser = "$UserName@$UserDomain" if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"1`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '1'}]->(user)" } ) } } else { $ComputerDomain = $_['SessionFromName'].SubString($_['SessionFromName'].IndexOf('.')+1).ToUpper() $UserDomainMappings[$UserName] | ForEach-Object { if($_ -eq $ComputerDomain) { $UserDomain = $_ $LoggedOnUser = "$UserName@$UserDomain" if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"1`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '1'}]->(user)" } ) } } else { $UserDomain = $_ $LoggedOnUser = "$UserName@$UserDomain" if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"2`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '2'}]->(user)" } ) } } } } } else { $LoggedOnUser = "$UserName@UNKNOWN" if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"2`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '2'}]->(user)" } ) } } } else { $LoggedOnUser = "$UserName@$ComputerDomain" if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"2`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '2'}]->(user)"} ) } } } catch { Write-Warning "Error extracting domain from $SessionFromName" } } elseif($_['SessionFrom']) { $SessionFromName = $_['SessionFrom'] $LoggedOnUser = "$($_['UserName'])@UNKNOWN" if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"2`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER(`"$LoggedOnUser`") }) MERGE (computer:Computer { name: UPPER(`"$SessionFromName`") }) MERGE (computer)-[:HasSession {Weight: '2'}]->(user)"} ) } } else { $UserDomain = $_['UserDomain'] $UserName = $_['UserName'] try { if($DomainShortnameMappings[$UserDomain]) { $AccountName = "$UserName@$($DomainShortnameMappings[$UserDomain])" } else { $MemberSimpleName = "$UserDomain\$UserName" | Convert-ADName -InputType 'NT4' -OutputType 'Canonical' if($MemberSimpleName) { $MemberDomain = $MemberSimpleName.Split('/')[0] $AccountName = "$UserName@$MemberDomain" $DomainShortnameMappings[$UserDomain] = $MemberDomain } else { $AccountName = "$UserName@UNKNOWN" } } $SessionFromName = $_['ComputerName'] if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $SessionWriter.WriteLine("`"$SessionFromName`",`"$AccountName`",`"1`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '1'}]->(user)" } ) } } catch { Write-Verbose "Error converting $UserDomain\$UserName : $_" } } } elseif($_['Type'] -eq 'LocalUser') { $Parts = $_['AccountName'].split('\') $UserDomain = $Parts[0] $UserName = $Parts[-1] if($DomainShortnameMappings[$UserDomain]) { $AccountName = "$UserName@$($DomainShortnameMappings[$UserDomain])" } else { $MemberSimpleName = "$UserDomain\$UserName" | Convert-ADName -InputType 'NT4' -OutputType 'Canonical' if($MemberSimpleName) { $MemberDomain = $MemberSimpleName.Split('/')[0] $AccountName = "$UserName@$MemberDomain" $DomainShortnameMappings[$UserDomain] = $MemberDomain } else { $AccountName = "$UserName@UNKNOWN" } } $ComputerName = $_['ComputerName'] if($_['IsGroup']) { if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $LocalAdminWriter.WriteLine("`"$ComputerName`",`"$AccountName`",`"group`"") } else { $Null = $Statements.Add( @{ "statement"="MERGE (group:Group { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$ComputerName') }) MERGE (group)-[:AdminTo]->(computer)" } ) } } else { if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { $LocalAdminWriter.WriteLine("`"$ComputerName`",`"$AccountName`",`"user`"") } else { $Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$ComputerName') }) MERGE (user)-[:AdminTo]->(computer)" } ) } } } if (($PSCmdlet.ParameterSetName -eq 'RESTAPI') -and ($Statements.Count -ge $Throttle)) { $Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements } $JsonRequest = ConvertTo-Json20 $Json $Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest) $Statements.Clear() [GC]::Collect() } } } } } END { if ($PSCmdlet.ParameterSetName -eq 'CSVExport') { if($SessionWriter) { $SessionWriter.Dispose() $SessionFileStream.Dispose() } if($GroupWriter) { $GroupWriter.Dispose() $GroupFileStream.Dispose() } if($ContainerWriter) { $ContainerWriter.Dispose() $ContainerFileStream.Dispose() } if($GPLinkWriter) { $GPLinkWriter.Dispose() $GPLinkFileStream.Dispose() } if($ACLWriter) { $ACLWriter.Dispose() $ACLFileStream.Dispose() } if($LocalAdminWriter) { $LocalAdminWriter.Dispose() $LocalAdminFileStream.Dispose() } if($TrustWriter) { $TrustWriter.Dispose() $TrustsFileStream.Dispose() } Write-Output "Done writing output to CSVs in: $OutputFolder\$CSVExportPrefix" } else { $Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements } $JsonRequest = ConvertTo-Json20 $Json $Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest) $Statements.Clear() Write-Output "Done sending output to neo4j RESTful API interface at: $($URI.AbsoluteUri)" } [GC]::Collect() } } $Mod = New-InMemoryModule -ModuleName Win32 $FunctionDefinitions = @( (func netapi32 NetWkstaUserEnum ([Int]) @([String], [Int], [IntPtr].MakeByRefType(), [Int], [Int32].MakeByRefType(), [Int32].MakeByRefType(), [Int32].MakeByRefType())), (func netapi32 NetSessionEnum ([Int]) @([String], [String], [String], [Int], [IntPtr].MakeByRefType(), [Int], [Int32].MakeByRefType(), [Int32].MakeByRefType(), [Int32].MakeByRefType())), (func netapi32 NetLocalGroupGetMembers ([Int]) @([String], [String], [Int], [IntPtr].MakeByRefType(), [Int], [Int32].MakeByRefType(), [Int32].MakeByRefType(), [Int32].MakeByRefType())), (func netapi32 DsEnumerateDomainTrusts ([Int]) @([String], [UInt32], [IntPtr].MakeByRefType(), [IntPtr].MakeByRefType())), (func netapi32 NetApiBufferFree ([Int]) @([IntPtr])), (func advapi32 ConvertSidToStringSid ([Int]) @([IntPtr], [String].MakeByRefType()) -SetLastError) ) $WKSTA_USER_INFO_1 = struct $Mod WKSTA_USER_INFO_1 @{ wkui1_username = field 0 String -MarshalAs @('LPWStr') wkui1_logon_domain = field 1 String -MarshalAs @('LPWStr') wkui1_oth_domains = field 2 String -MarshalAs @('LPWStr') wkui1_logon_server = field 3 String -MarshalAs @('LPWStr') } $SESSION_INFO_10 = struct $Mod SESSION_INFO_10 @{ sesi10_cname = field 0 String -MarshalAs @('LPWStr') sesi10_username = field 1 String -MarshalAs @('LPWStr') sesi10_time = field 2 UInt32 sesi10_idle_time = field 3 UInt32 } $SID_NAME_USE = psenum $Mod SID_NAME_USE UInt16 @{ SidTypeUser = 1 SidTypeGroup = 2 SidTypeDomain = 3 SidTypeAlias = 4 SidTypeWellKnownGroup = 5 SidTypeDeletedAccount = 6 SidTypeInvalid = 7 SidTypeUnknown = 8 SidTypeComputer = 9 } $LOCALGROUP_MEMBERS_INFO_2 = struct $Mod LOCALGROUP_MEMBERS_INFO_2 @{ lgrmi2_sid = field 0 IntPtr lgrmi2_sidusage = field 1 $SID_NAME_USE lgrmi2_domainandname = field 2 String -MarshalAs @('LPWStr') } $DsDomainFlag = psenum $Mod DsDomain.Flags UInt32 @{ IN_FOREST = 1 DIRECT_OUTBOUND = 2 TREE_ROOT = 4 PRIMARY = 8 NATIVE_MODE = 16 DIRECT_INBOUND = 32 } -Bitfield $DsDomainTrustType = psenum $Mod DsDomain.TrustType UInt32 @{ DOWNLEVEL = 1 UPLEVEL = 2 MIT = 3 DCE = 4 } $DsDomainTrustAttributes = psenum $Mod DsDomain.TrustAttributes UInt32 @{ NON_TRANSITIVE = 1 UPLEVEL_ONLY = 2 FILTER_SIDS = 4 FOREST_TRANSITIVE = 8 CROSS_ORGANIZATION = 16 WITHIN_FOREST = 32 TREAT_AS_EXTERNAL = 64 } $DS_DOMAIN_TRUSTS = struct $Mod DS_DOMAIN_TRUSTS @{ NetbiosDomainName = field 0 String -MarshalAs @('LPWStr') DnsDomainName = field 1 String -MarshalAs @('LPWStr') Flags = field 2 $DsDomainFlag ParentIndex = field 3 UInt32 TrustType = field 4 $DsDomainTrustType TrustAttributes = field 5 $DsDomainTrustAttributes DomainSid = field 6 IntPtr DomainGuid = field 7 Guid } $Types = $FunctionDefinitions | Add-Win32Type -Module $Mod -Namespace 'Win32' $Netapi32 = $Types['netapi32'] $Advapi32 = $Types['advapi32'] Set-Alias Get-BloodHoundData Invoke-BloodHound
combined_dataset/train/non-malicious/3383.ps1
3383.ps1
$commands = function Test-SetAzureStorageBlobContent { Assert-ThrowsContains { Set-AzureStorageBlobContent -File "foo.txt" -Container foo -Blob foo -BlobType Block } "Could not get the storage context. Please pass in a storage context or set the current storage context." > $null } function Test-UpdateStorageAccount { $accounts = Get-AzureStorageAccount $subscription = $(Get-AzureSubscription -Current).SubscriptionName Set-AzureSubscription -SubscriptionName $subscription -CurrentStorageAccountName $accounts[0].StorageAccountName $storageAccountName = $(Get-AzureStorageContainer)[0].Context.StorageAccountName Assert-AreEqual $storageAccountName $accounts[0].StorageAccountName Set-AzureSubscription -SubscriptionName $subscription -CurrentStorageAccountName $accounts[1].StorageAccountName $storageAccountName = $(Get-AzureStorageContainer)[0].Context.StorageAccountName Assert-AreEqual $storageAccountName $accounts[1].StorageAccountName } [CmdletBinding] function Get-IncompleteHelp { Get-Help azure | where {[System.String]::IsNullOrEmpty($_.Synopsis) -or ` [System.String]::Equals($_.Synopsis, (Get-Command $_.Name).Definition, ` [System.StringComparison]::OrdinalIgnoreCase)} | % {Write-Output $_.Name} }
combined_dataset/train/non-malicious/785.ps1
785.ps1
function Find-Ast { [CmdletBinding(PositionalBinding=$false, DefaultParameterSetName='FilterScript')] param( [Parameter(Position=0, ParameterSetName='FilterScript')] [ValidateNotNullOrEmpty()] [scriptblock] $FilterScript = { $true }, [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName='FilterScript')] [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.Ast] $Ast, [Parameter(ParameterSetName='FilterScript')] [switch] $Before, [Parameter(ParameterSetName='FilterScript')] [switch] $Family, [Parameter(ParameterSetName='FilterScript')] [Alias('Closest', 'F')] [switch] $First, [Parameter(ParameterSetName='FilterScript')] [Alias('Furthest')] [switch] $Last, [Parameter(ParameterSetName='FilterScript')] [Alias('Parent')] [switch] $Ancestor, [Parameter(ParameterSetName='FilterScript')] [switch] $IncludeStartingAst, [Parameter(ParameterSetName='AtCursor')] [switch] $AtCursor ) begin { if ($PSVersionTable.PSVersion.Major -ge 4) { $variableType = [System.Management.Automation.PSVariable] function InvokeWithContext { param([scriptblock]$Filter, [System.Management.Automation.Language.Ast]$DollarUnder) return $Filter.InvokeWithContext( $null, [Activator]::CreateInstance($variableType, @('_', $DollarUnder)), $aAst) } } else { $FilterScript = [scriptblock]::Create($FilterScript.ToString()) function InvokeWithContext { param([scriptblock]$Filter, [System.Management.Automation.Language.Ast]$DollarUnder) return $DollarUnder | & { process { $Filter.InvokeReturnAsIs($DollarUnder) } } } } function GetAllFamily { param($Start) if ($Before.IsPresent) { $parent = $Start for ($parent; $parent = $parent.Parent) { $parent } return } return $Start.FindAll({ $true }, $true) } function GetAllAsts { param($Start) $predicate = [Func[System.Management.Automation.Language.Ast,bool]]{ $args[0] -ne $Ast } $topParent = Find-Ast -Ast $Start -Ancestor -Last -IncludeStartingAst if (-not $topParent) { $topParent = $Start } if ($Before.IsPresent) { $result = [Linq.Enumerable]::TakeWhile( $topParent.FindAll({ $true }, $true), $predicate) -as [System.Management.Automation.Language.Ast[]] [array]::Reverse($result) return $result } return [Linq.Enumerable]::SkipWhile( $topParent.FindAll({ $true }, $true), $predicate) } } process { if ($Ancestor.IsPresent) { $Family = $Before = $true } $context = $psEditor.GetEditorContext() if (-not $Ast -and $context) { $Ast = $context.CurrentFile.Ast } switch ($PSCmdlet.ParameterSetName) { AtCursor { $cursorLine = $context.CursorPosition.Line - 1 $cursorColumn = $context.CursorPosition.Column - 1 $cursorOffset = $Ast.Extent.Text | Select-String "(.*\r?\n){$cursorLine}.{$cursorColumn}" | ForEach-Object { $PSItem.Matches.Value.Length } Find-Ast -Last { $cursorOffset -ge $PSItem.Extent.StartOffset -and $cursorOffset -le $PSItem.Extent.EndOffset } } FilterScript { if (-not $Ast) { return } if ($Before.IsPresent -and $Family.IsPresent -and $Last.IsPresent -and -not $Ast.Parent -and $Ast -is [System.Management.Automation.Language.ScriptBlockAst]) { return $Ast } if ($Family.IsPresent) { $asts = GetAllFamily $Ast } else { $asts = GetAllAsts $Ast } $checkFirstAst = -not $IncludeStartingAst foreach ($aAst in $asts) { if ($checkFirstAst) { if ($aAst -eq $Ast) { $checkFirstAst = $false continue } } $shouldReturn = InvokeWithContext $FilterScript $aAst if (-not $shouldReturn) { continue } if (-not $Last.IsPresent) { $aAst if ($First.IsPresent) { break } } else { $lastMatch = $aAst if ($First.IsPresent) { $aAst $First = $false } } } if ($Last.IsPresent) { return $lastMatch } } } } }
combined_dataset/train/non-malicious/Add-SqlTable_4.ps1
Add-SqlTable_4.ps1
try {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo"} try {add-type -AssemblyName "Microsoft.SqlServer.Smo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.Smo"} ####################### function Get-SqlType { param([string]$TypeName) switch ($TypeName) { 'Boolean' {[Data.SqlDbType]::Bit} 'Byte[]' {[Data.SqlDbType]::VarBinary} 'Byte' {[Data.SQLDbType]::VarBinary} 'Datetime' {[Data.SQLDbType]::DateTime} 'Decimal' {[Data.SqlDbType]::Decimal} 'Double' {[Data.SqlDbType]::Float} 'Guid' {[Data.SqlDbType]::UniqueIdentifier} 'Int16' {[Data.SQLDbType]::SmallInt} 'Int32' {[Data.SQLDbType]::Int} 'Int64' {[Data.SqlDbType]::BigInt} default {[Data.SqlDbType]::VarChar} } } #Get-SqlType ####################### <# .SYNOPSIS Creates a SQL Server table from a DataTable .DESCRIPTION Creates a SQL Server table from a DataTable using SMO. .EXAMPLE $dt = Invoke-Sqlcmd2 -ServerInstance "Z003\\R2" -Database pubs "select * from authors"; Add-SqlTable -ServerInstance "Z003\\R2" -Database pubscopy -TableName authors -DataTable $dt This example loads a variable dt of type DataTable from a query and creates an empty SQL Server table .EXAMPLE $dt = Get-Alias | Out-DataTable; Add-SqlTable -ServerInstance "Z003\\R2" -Database pubscopy -TableName alias -DataTable $dt This example creates a DataTable from the properties of Get-Alias and creates an empty SQL Server table. .NOTES Add-SqlTable uses SQL Server Management Objects (SMO). SMO is installed with SQL Server Management Studio and is available as a separate download: http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=ceb4346f-657f-4d28-83f5-aae0c5c83d52 Version History v1.0 - Chad Miller - Initial Release v1.1 - Chad Miller - Updated documentation v1.2 - Chad Miller - Add loading Microsoft.SqlServer.ConnectionInfo v1.3 - Chad Miller - Added error handling v1.4 - Chad Miller - Add VarCharMax and VarBinaryMax handling #> function Add-SqlTable { [CmdletBinding()] param( [Parameter(Position=0, Mandatory=$true)] [string]$ServerInstance, [Parameter(Position=1, Mandatory=$true)] [string]$Database, [Parameter(Position=2, Mandatory=$true)] [String]$TableName, [Parameter(Position=3, Mandatory=$true)] [System.Data.DataTable]$DataTable, [Parameter(Position=4, Mandatory=$false)] [string]$Username, [Parameter(Position=5, Mandatory=$false)] [string]$Password, [ValidateRange(0,8000)] [Parameter(Position=6, Mandatory=$false)] [Int32]$MaxLength=1000 ) try { if($Username) { $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $ServerInstance,$Username,$Password } else { $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $ServerInstance } $con.Connect() $server = new-object ("Microsoft.SqlServer.Management.Smo.Server") $con $db = $server.Databases[$Database] $table = new-object ("Microsoft.SqlServer.Management.Smo.Table") $db, $TableName foreach ($column in $DataTable.Columns) { $sqlDbType = [Microsoft.SqlServer.Management.Smo.SqlDataType]"$(Get-SqlType $column.DataType.Name)" if ($sqlDbType -eq 'VarBinary' -or $sqlDbType -eq 'VarChar') { if ($MaxLength -gt 0) {$dataType = new-object ("Microsoft.SqlServer.Management.Smo.DataType") $sqlDbType, $MaxLength} else { $sqlDbType = [Microsoft.SqlServer.Management.Smo.SqlDataType]"$(Get-SqlType $column.DataType.Name)Max" $dataType = new-object ("Microsoft.SqlServer.Management.Smo.DataType") $sqlDbType } } else { $dataType = new-object ("Microsoft.SqlServer.Management.Smo.DataType") $sqlDbType } $col = new-object ("Microsoft.SqlServer.Management.Smo.Column") $table, $column.ColumnName, $dataType $col.Nullable = $column.AllowDBNull $table.Columns.Add($col) } $table.Create() } catch { $message = $_.Exception.GetBaseException().Message Write-Error $message } } #Add-SqlTable
combined_dataset/train/non-malicious/sample_18_61.ps1
sample_18_61.ps1
# # Module manifest for module 'OCI.PSModules.Apigateway' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apigateway.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6afcef29-4171-4ad7-a267-5ec2cf2367ad' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apigateway Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apigateway.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApigatewayApi', 'Get-OCIApigatewayApiContent', 'Get-OCIApigatewayApiDeploymentSpecification', 'Get-OCIApigatewayApisList', 'Get-OCIApigatewayApiValidations', 'Get-OCIApigatewayCertificate', 'Get-OCIApigatewayCertificatesList', 'Get-OCIApigatewayDeployment', 'Get-OCIApigatewayDeploymentsList', 'Get-OCIApigatewayGateway', 'Get-OCIApigatewayGatewaysList', 'Get-OCIApigatewaySdk', 'Get-OCIApigatewaySdkLanguageTypesList', 'Get-OCIApigatewaySdksList', 'Get-OCIApigatewaySubscriber', 'Get-OCIApigatewaySubscribersList', 'Get-OCIApigatewayUsagePlan', 'Get-OCIApigatewayUsagePlansList', 'Get-OCIApigatewayWorkRequest', 'Get-OCIApigatewayWorkRequestErrorsList', 'Get-OCIApigatewayWorkRequestLogsList', 'Get-OCIApigatewayWorkRequestsList', 'Move-OCIApigatewayApiCompartment', 'Move-OCIApigatewayCertificateCompartment', 'Move-OCIApigatewayDeploymentCompartment', 'Move-OCIApigatewayGatewayCompartment', 'Move-OCIApigatewaySubscriberCompartment', 'Move-OCIApigatewayUsagePlanCompartment', 'New-OCIApigatewayApi', 'New-OCIApigatewayCertificate', 'New-OCIApigatewayDeployment', 'New-OCIApigatewayGateway', 'New-OCIApigatewaySdk', 'New-OCIApigatewaySubscriber', 'New-OCIApigatewayUsagePlan', 'Remove-OCIApigatewayApi', 'Remove-OCIApigatewayCertificate', 'Remove-OCIApigatewayDeployment', 'Remove-OCIApigatewayGateway', 'Remove-OCIApigatewaySdk', 'Remove-OCIApigatewaySubscriber', 'Remove-OCIApigatewayUsagePlan', 'Stop-OCIApigatewayWorkRequest', 'Update-OCIApigatewayApi', 'Update-OCIApigatewayCertificate', 'Update-OCIApigatewayDeployment', 'Update-OCIApigatewayGateway', 'Update-OCIApigatewaySdk', 'Update-OCIApigatewaySubscriber', 'Update-OCIApigatewayUsagePlan' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apigateway' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3451.ps1
3451.ps1
function Test-GetNonExistingDataFactory { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force Assert-ThrowsContains { Get-AzDataFactory -ResourceGroupName $rgname -Name $dfname } "ResourceNotFound" } function Test-CreateDataFactory { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force try { $actual = New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force $expected = Get-AzDataFactory -ResourceGroupName $rgname -Name $dfname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName Assert-AreEqual $expected.DataFactoryName $actual.DataFactoryName } finally { Clean-DataFactory $rgname $dfname } } function Test-DeleteDataFactoryWithDataFactoryParameter { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force $df = New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force Remove-AzDataFactory -DataFactory $df -Force } function Test-DataFactoryPiping { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force Get-AzDataFactory -ResourceGroupName $rgname | Remove-AzDataFactory -Force Assert-ThrowsContains { Get-AzDataFactory -ResourceGroupName $rgname -Name $dfname } "ResourceNotFound" }
combined_dataset/train/non-malicious/171.ps1
171.ps1
Function Test-ADCredential { Param($username, $password, $domain) Add-Type -AssemblyName System.DirectoryServices.AccountManagement $ct = [System.DirectoryServices.AccountManagement.ContextType]::Domain $pc = New-Object System.DirectoryServices.AccountManagement.PrincipalContext($ct, $domain) New-Object PSObject -Property @{ UserName = $username; IsValid = $pc.ValidateCredentials($username, $password).ToString() } }
combined_dataset/train/non-malicious/1811.ps1
1811.ps1
Describe "Get-Item" -Tags "CI" { BeforeAll { if ( $IsWindows ) { $skipNotWindows = $false } else { $skipNotWindows = $true } } It "Should list all the items in the current working directory when asterisk is used" { $items = Get-Item (Join-Path -Path $PSScriptRoot -ChildPath "*") ,$items | Should -BeOfType 'System.Object[]' } It "Should return the name of the current working directory when a dot is used" { $item = Get-Item $PSScriptRoot $item | Should -BeOfType 'System.IO.DirectoryInfo' $item.Name | Should -BeExactly (Split-Path $PSScriptRoot -Leaf) } It "Should return the proper Name and BaseType for directory objects vs file system objects" { $rootitem = Get-Item $PSScriptRoot $rootitem | Should -BeOfType 'System.IO.DirectoryInfo' $childitem = (Get-Item (Join-Path -Path $PSScriptRoot -ChildPath Get-Item.Tests.ps1)) $childitem | Should -BeOfType 'System.IO.FileInfo' } It "Using -literalpath should find no additional files" { $null = New-Item -type file "$TESTDRIVE/file[abc].txt" $null = New-Item -type file "$TESTDRIVE/filea.txt" $item = Get-Item -literalpath "$TESTDRIVE/file[abc].txt" @($item).Count | Should -Be 1 $item.Name | Should -BeExactly 'file[abc].txt' } It "Should have mode flags set" { Get-ChildItem $PSScriptRoot | foreach-object { $_.Mode | Should -Not -BeNullOrEmpty } } It "Should not return the item unless force is used if hidden" { ${hiddenFile} = "${TESTDRIVE}/.hidden.txt" ${item} = New-Item -type file "${hiddenFile}" if ( ${IsWindows} ) { attrib +h "$hiddenFile" } ${result} = Get-Item "${hiddenFile}" -ErrorAction SilentlyContinue ${result} | Should -BeNullOrEmpty ${result} = Get-Item -force "${hiddenFile}" -ErrorAction SilentlyContinue ${result}.FullName | Should -BeExactly ${item}.FullName } It "Should get properties for special reparse points" -skip:$skipNotWindows { $result = Get-Item -Path $HOME/Cookies -Force $result.LinkType | Should -BeExactly "Junction" $result.Target | Should -Not -BeNullOrEmpty $result.Name | Should -BeExactly "Cookies" $result.Mode | Should -BeExactly "l--hs" $result.Exists | Should -BeTrue } It "Should return correct result for ToString() on root of drive" { $root = $IsWindows ? "${env:SystemDrive}\" : "/" (Get-Item -Path $root).ToString() | Should -BeExactly $root } Context "Test for Include, Exclude, and Filter" { BeforeAll { ${testBaseDir} = "${TESTDRIVE}/IncludeExclude" $null = New-Item -Type Directory "${testBaseDir}" $null = New-Item -Type File "${testBaseDir}/file1.txt" $null = New-Item -Type File "${testBaseDir}/file2.txt" } It "Should respect -Exclude" { $result = Get-Item "${testBaseDir}/*" -Exclude "file2.txt" ($result).Count | Should -Be 1 $result.Name | Should -BeExactly "file1.txt" } It "Should respect -Include" { $result = Get-Item "${testBaseDir}/*" -Include "file2.txt" ($result).Count | Should -Be 1 $result.Name | Should -BeExactly "file2.txt" } It "Should respect -Filter" { $result = Get-Item "${testBaseDir}/*" -Filter "*2*" ($result).Count | Should -Be 1 $result.Name | Should -BeExactly "file2.txt" } It "Should respect combinations of filter, include, and exclude" { $result = get-item "${testBaseDir}/*" -filter *.txt -include "file[12].txt" -exclude file2.txt ($result).Count | Should -Be 1 $result.Name | Should -BeExactly "file1.txt" } } Context "Error Condition Checking" { It "Should return an error if the provider does not exist" { { Get-Item BadProvider::/BadFile -ErrorAction Stop } | Should -Throw -ErrorId "ProviderNotFound,Microsoft.PowerShell.Commands.GetItemCommand" } It "Should return an error if the drive does not exist" { { Get-Item BadDrive:/BadFile -ErrorAction Stop } | Should -Throw -ErrorId "DriveNotFound,Microsoft.PowerShell.Commands.GetItemCommand" } } Context "Alternate Stream Tests" { BeforeAll { if ( $skipNotWindows ) { return } $altStreamPath = "$TESTDRIVE/altStream.txt" $stringData = "test data" $streamName = "test" $item = new-item -type file $altStreamPath Set-Content -path $altStreamPath -Stream $streamName -Value $stringData } It "Should find an alternate stream if present" -skip:$skipNotWindows { $result = Get-Item $altStreamPath -Stream $streamName $result.Length | Should -Be ($stringData.Length + [Environment]::NewLine.Length) $result.Stream | Should -Be $streamName } } Context "Registry Provider" { It "Can retrieve an item from registry" -skip:$skipNotWindows { ${result} = Get-Item HKLM:/Software ${result} | Should -BeOfType "Microsoft.Win32.RegistryKey" } } Context "Environment provider" -tag "CI" { BeforeAll { $env:testvar="b" $env:testVar="a" } AfterAll { Clear-Item -Path env:testvar -ErrorAction SilentlyContinue Clear-Item -Path env:testVar -ErrorAction SilentlyContinue } It "get-item testVar" { (get-item env:\testVar).Value | Should -BeExactly "a" } It "get-item is case-sensitive/insensitive as appropriate" { $expectedValue = "b" if($IsWindows) { $expectedValue = "a" } (get-item env:\testvar).Value | Should -BeExactly $expectedValue } } } Describe "Get-Item environment provider on Windows with accidental case-variant duplicates" -Tags "Scenario" { BeforeAll { $env:testVar = 'a' } AfterAll { $env:testVar = $null } It "Reports the effective value among accidental case-variant duplicates on Windows" -skip:$skipNotWindows { if (-not (Get-Command -ErrorAction Ignore node.exe)) { Write-Warning "Test skipped, because prerequisite Node.js is not installed." } else { $valDirect, $valGetItem, $unused = node.exe -pe @" env = {} env.testVar = process.env.testVar // include the original case variant with its original value. env.TESTVAR = 'b' // redefine with a case variant name and different value // Note: Which value will win is not deterministic(!); what matters, however, is that both // $env:testvar and Get-Item env:testvar report the same value. // The nondeterministic behavior makes it hard to prove that the values are *always* the // same, however. require('child_process').execSync(\"\\\"$($PSHOME -replace '\\', '/')/pwsh.exe\\\" -noprofile -command `$env:testvar, (Get-Item env:testvar).Value\", { env: env }).toString() "@ $valGetItem | Should -BeExactly $valDirect } } }
combined_dataset/train/non-malicious/2424.ps1
2424.ps1
[CmdletBinding()] param( [Parameter(Mandatory)] [string[]]$ComputerName, [Parameter(Mandatory)] [pscredential]$Credential ) $Header = @" <style> table { font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; border-collapse: collapse; width: 100%; } th { padding-top: 12px; padding-bottom: 12px; text-align: left; background-color: color: white; } </style> "@ $scriptBlock = { $output = @{ 'ServerName' = (hostname) 'IPAddress' = $null 'OperatingSystem' = $null 'AvailableDriveSpace (GB)' = $null 'Memory (GB)' = $null 'UserProfilesSize (MB)' = $null 'StoppedServices' = $null } $userProfileSize = (Get-ChildItem -Path 'C:\Users' -File -Recurse | Measure-Object -Property Length -Sum).Sum $output.'UserProfilesSize (MB)' = [math]::Round($userProfileSize / 1GB, 1) $output.'IPAddress' = (Get-CimInstance -ClassName Win32_NetworkAdapterConfiguration -Filter "IPEnabled = 'True'").IPAddress[0] $output.'OperatingSystem' = (Get-CimInstance -ClassName Win32_OperatingSystem).Caption $output.'Memory (GB)' = (Get-CimInstance -ClassName Win32_PhysicalMemory | Measure-Object -Property Capacity -Sum).Sum /1GB $output.'AvailableDriveSpace (GB)' = (Get-CimInstance -ClassName Win32_LogicalDisk | Select-Object -Property DeviceID, @{Name='FreeSpace'; Expression={ [Math]::Round(($_.Freespace / 1GB), 1) } } | Measure-Object -Property FreeSpace -Sum).Sum $output.'StoppedServices' = (Get-Service | Where-Object { $_.Status -eq 'Stopped' } | Measure-Object).Count [pscustomobject]$output } $icmParams = @{ ComputerName = $ComputerName ScriptBlock = $scriptBlock Credential = $Credential } $report = Invoke-Command @icmParams | Select-Object -Property * -ExcludeProperty 'RunspaceId','PSComputerName','PSShowComputerName' | ConvertTo-Html -Fragment ConvertTo-HTML -PreContent "<h1>Server Information Report</h1>" -PostContent $report -Head $Header | Out-File ServerReport.html Invoke-Item ServerReport.html
combined_dataset/train/non-malicious/sample_9_12.ps1
sample_9_12.ps1
#************************************************ # RS_BPAinfo.ps1 # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } . ./utils_cts.ps1 SkipSecondExecution if($debug -eq $true){[void]$shell.popup("Run RS_BPAInfo.ps1")} $BPAXMLFile = [System.IO.Path]::GetFullPath($PWD.Path + ("\..\BPAResults.XML")) if($debug -eq $true){[void]$shell.popup("BPAXMLFile: " + $BPAXMLFile)} if (Test-Path $BPAXMLFile) { [xml] $XMLResults = Get-Content -Path $BPAXMLFile $BPAModels = $XMLResults.SelectNodes("(//BPAModel[Object[(Property[@Name=`'Severity`'] = `'Warning`') or (Property[@Name=`'Severity`'] = `'Error`')]])") $X = 0 ForEach ($BPAModel in $BPAModels){ forEach ($Object in $BPAModel.SelectNodes("(Object[(Property[@Name=`'Severity`'] = `'Warning`') or (Property[@Name=`'Severity`'] = `'Error`')])")){ $X += 1 $BPAMSG_Summary = new-object PSObject add-member -inputobject $BPAMSG_Summary -membertype noteproperty -name "Category" -value $Object.SelectSingleNode("Property[@Name='Category']").InnerText add-member -inputobject $BPAMSG_Summary -membertype noteproperty -name "Source" -value ($BPAModel.ReportTitle) add-member -inputobject $BPAMSG_Summary -membertype noteproperty -name "Resolution" -value $Object.SelectSingleNode("Property[@Name='Resolution']").InnerText add-member -inputobject $BPAMSG_Summary -membertype noteproperty -name "Additional Information" -value ("<a target=`"_blank`" href = `"" + $Object.SelectSingleNode("Property[@Name='Help']").InnerText + "`">" + $Object.SelectSingleNode("Property[@Name='Help']").InnerText + "</a>") $BPAMSG_Summary | ConvertTo-Xml2 | update-diagreport -ID ($X.ToString() + "_BPA") -name $Object.SelectSingleNode("Property[@Name='Problem']").InnerText -verbosity $Object.SelectSingleNode("Property[@Name='Severity']").InnerText } $MoreInfo_Summary = new-object PSObject $MoreInfoMsg = "Please open the <a href= `"`#" + $BPAModel.OutputFileName + "`">" + ($BPAModel.ReportTitle) + "</a> report for more information. You can calso go to the internal web site <a target=`"_blank`" href=`"http://winbpa`">http://winbpa</a> to submit a BPA rule suggestion." add-member -inputobject $MoreInfo_Summary -membertype noteproperty -name "Message" -value $MoreInfoMsg $MoreInfo_Summary | ConvertTo-Xml2 | update-diagreport -ID ($X.ToString() + "ZZ_BPA") -name "More Information" -verbosity "Informational" } Remove-Item $BPAXMLFile } if($debug -eq $true){[void]$shell.popup("RS_BPAInfo.ps1 finished")} # SIG # Begin signature block # MIIoUQYJKoZIhvcNAQcCoIIoQjCCKD4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3gx0bZLhuL7zo # X+FAxZ+cVw4ofw8DqpU6uFQ5Kn+k1KCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPdn # HVhfw0R2w0g8oqZapK8WNGsaNkYjIANA6tQ5kMzEMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAjvomPzOL2I5C2L6dDQfCtLcKDS6MMhSvqXuR # MLxxmOirxaJSJ85qPaQVs6wem0c7H8ls+JOS9wEkhkYprgNzfn6suxoGROBH0tqj # biB0UZBQV5F8T/P2BhIPZhSl/d5EAsiFC99SP0s9tpRQ9pRIIz/9zV8ljo+VvpiM # j9U9+daDZ8lnUv60THSwjaK75onP3D0T4fFB61W/QEd/lXnQwBhEw+XFOrrKkB3b # nvA7YlgJ0Jl9WJOm4Vv5DxIDuHXLwbl6s6FT3J7Tp3MRHmzCk+mBeYZGhEfUjXaA # Faqb1lG7TrkkVh3mjbrghblH5PxDxAvOoGUNXMr4Tak+OXBuhqGCF6wwgheoBgor # BgEEAYI3AwMBMYIXmDCCF5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB4u+D56HUmByx4fo09+FabVqYBFi2JbDt7 # Fyjg3Kx9fgIGZus6esnlGBIyMDI0MTAyODExNDA0Mi43MVowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAH5H2eN # dauk8bEAAQAAAfkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTA5WhcNMjUxMDIyMTgzMTA5WjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MkExQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC0 # PUwffIAdYc1WyUL4IFOP8yl3nksM+1CuE3tZ6oWFF4L3EpdKOhtbVkfMdTxXYE4l # SJiDt8MnYDEZUbKi9S2AZmDb4Zq4UqTdmOOwtKyp6FgixRCuBf6v9UBNpbz841bL # qU7IZnBmnF9XYRfioCHqZvaFp0C691tGXVArW18GVHd914IFAb7JvP0kVnjks3am # zw1zXGvjU3xCLcpUkthfSJsRsCSSxHhtuzMLO9j691KuNbIoCNHpiBiFoFoPETYo # MnaxBEUUX96ALEqCiB0XdUgmgIT9a7L0y4SDKl5rUd6LuUUa90tBkfkmjZBHm43y # GIxzxnjtFEm4hYI57IgnVidGKKJulRnvb7Cm/wtOi/TIfoLkdH8Pz4BPi+q0/nsh # NewP0M86hvy2O2x589xAl5tQ2KrJ/JMvmPn8n7Z34Y8JxcRih5Zn6euxlJ+t3kMc # zii8KYPeWJ+BifOM6vLiCFBP9y+Z0fAWvrIkamFb8cbwZB35wHjDvAak6EdUlvLj # iQZUrwzNj2zfYPLVMecmDynvLWwQbP8DXLzhm3qAiwhNhpxweEEqnhw5U2t+hFVT # HYb/ROvsOTd+kJTy77miWo8/AqBmznuOX6U6tFWxfUBgSYCfILIaupEDOkZfKTUe # 80gGlI025MFCTsUG+75imLoDtLZXZOPqXNhZUG+4YQIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFInto7qclckj16KPNLlCRHZGWeAAMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQBmIAmAVuR/uN+HH+aZmWcZmulp74canFbGzwjv29RvwZCi7nQzWezuLAbY # Jx2hdqrtWClWQ1/W68iGsZikoIFdD5JonY7QG/C4lHtSyBNoo3SP/J/d+kcPSS0f # 4SQS4Zez0MEvK3vWK61WTCjD2JCZKTiggrxLwCs0alI7N6671N0mMGOxqya4n7ar # lOOauAQrI97dMCkCKjxx3D9vVwECaO0ju2k1hXk/JEjcrU2G4OB8SPmTKcYX+6LM # /U24dLEX9XWSz/a0ISiuKJwziTU8lNMDRMKM1uSmYFywAyXFPMGdayqcEK3135R3 # 1VrcjD0GzhxyuSAGMu2De9gZhqvrXmh9i1T526n4u5TR3bAEMQbWeFJYdo767bLp # KLcBo0g23+k4wpTqXgBbS4NZQff04cfcSoUe1OyxldoM6O3JGBuowaaR/wojeohU # FknZdCmeES5FuH4CCmZGf9rjXQOTtW0+Da4LjbZYsLwfwhWT8V6iJJLi8Wh2GdwV # 60nRkrfrDEBrcWI+AF5tFbJW1nvreoMPPENvSYHocv0cR9Ns37igcKRlrUcqXwHS # zxGIUEx/9bv47sQ9n7AwfzB2SNntJux1211GBEBGpHwgU9a6tD6yft+0SJ9qiPO4 # IRqFIByrzrKPBB5M831gb1vfhFO6ueSkP7A8ZMHVZxwymwuUzTCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCqzlaNY7vNUAqY # hx3CGqBm/KnpRqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6snJlzAiGA8yMDI0MTAyODA4MjgwN1oYDzIwMjQx # MDI5MDgyODA3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqycmXAgEAMAcCAQAC # AgheMAcCAQACAhNxMAoCBQDqyxsXAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD # ggEBABl2r45TbcRpRyHBC7Tfm1IOcpmVr24Oj3iI4YxR9hIegjEBKx/eOzYN7DEj # OwXPW3wQtuz/tX5v6UtnblQPLlaEy4BpQXQMEroPYmeyPIlVJtxz7jyPpn/sWHzj # L2RPxzkdRgvmQXY0mKqAco1FMt1mocHjYjhtX9/Pz8Ob/b0Zb4NHYgZhKy8vZ7vY # C9+kq1Rk73hZ+e9FUC7grAeUiYZF3fQlSJbSoUEO+YDXbACDwUn/6aTqeEmMSlSq # eshWE6pNkTQjkYmJUnJ0AWlYZB43BaKARszkCW9KuDKhAyGdqBFX8EeGOmEWAYS7 # o4XMf6DpsGJS78GyaWh0zj3NACAxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfkfZ411q6TxsQABAAAB+TANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCDhcmpYN8UJqsOnIhnfAC1usdc9vfDX9Ha0LqnjUXIkUDCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIDkjjMge8I37ZPrpFQ4sJmtQRV2gqUqXxV4I7lJs # YtgQMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH5 # H2eNdauk8bEAAQAAAfkwIgQgJmu+NOFPuWOF/KqubUTlJN0adLdAcytn+UUcmQcH # ut0wDQYJKoZIhvcNAQELBQAEggIAFqyTTG8SZ/2/eo2Xtb+cZBfRKmsBS2ByysV3 # 2JIT4IqPyOtW8l9+xYg0qriYP4DngsehKLnDjs7YGKtQ5RZD1otD9bnUoZxeKVLJ # sdrupibn+Qr9Qxuzmb14Ak0RFoGfgKdnAyl6IV5OTVu8w5rk+eZ3NizSOD31QgME # mKZNdIM9ThznynphBYw7pEDW6QCPLFRJnSsx6gBAU4/vMPR0eJI2+xTzcXWOZXqV # 4Q7kE8hBwlyooQgglYcgI3nla7Mdy9Le+Eh4d0fRcs14qKdoh/LLa3Fsp1dvFNpS # laQB9E7/Qapz0IZd7b3o9IGJTAdT02zIoyhXCGtc+yYN9DBVZhev1eRvf/53CvTz # H87Ttdpl6wpS5CDavBjTtaNTKUeIErQCjSGVv8hi0M4salWlv+9s5XxFZ7h+BKXA # pL4M5yDx977SLHyjKVxqA2SXsoC2WyCk4LQIXqSgzzcYRYET0juUNuSDOtjJey4a # HQAABeglbCh0sIK6FlCeHlPYHWq/k6BmDyjq5r8tIaTpF1QgOo9QN2XnyJybTjzi # JgUUbsrDmylu7nFs5TZyP+eYndJU6I9ETimXKeXz4hRSj0sPCHiU6W79LoXxXv0g # 6TVpLud8nj+pY7/3P18CjKF2bPtQRXUgvYTORn1wCJzpJ4o+K5ZRjm62xHAibyUx # tNTNOPE= # SIG # End signature block
combined_dataset/train/non-malicious/sample_9_58.ps1
sample_9_58.ps1
# 2023-02-24 WalterE mod Trap #we# $startTime_AutoAdd = Get-Date trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: common ---" # version of the psSDP Diagnostic - "_psSDP_DiagnosticVersion.TXT" Run-DiagExpression .\DC_NetworkingDiagnostic.ps1 # MSInfo Run-DiagExpression .\DC_MSInfo.ps1 # Obtain pstat output Run-DiagExpression .\DC_PStat.ps1 # CheckSym Run-DiagExpression .\DC_ChkSym.ps1 # AutoRuns Information Run-DiagExpression .\DC_Autoruns.ps1 # Collects Windows Server 2008/R2 Server Manager Information Run-DiagExpression .\DC_ServerManagerInfo.ps1 # List Schedule Tasks using schtasks.exe utility Run-DiagExpression .\DC_ScheduleTasks.ps1 # Collect Machine Registry Information for Setup and Performance Diagnostics Run-DiagExpression .\DC_RegistrySetupPerf.ps1 # GPResults.exe Output Run-DiagExpression .\DC_RSoP.ps1 # Basic System Information Run-DiagExpression .\DC_BasicSystemInformation.ps1 # Basic System Information TXT output Run-DiagExpression .\DC_BasicSystemInformationTXT.ps1 # Services Run-DiagExpression .\DC_Services.ps1 # TaskListSvc Run-DiagExpression .\DC_TaskListSvc.ps1 # User Rights (privileges) via the userrights.exe tool Run-DiagExpression .\DC_UserRights.ps1 # WhoAmI Run-DiagExpression .\DC_Whoami.ps1 # PoolMon Run-DiagExpression .\DC_PoolMon.ps1 # Collects registry entries for KIR (for 2019) and RBC (for 2016) Run-DiagExpression .\DC_KIR-RBC-RegEntries.ps1 #_# Collect summary report Run-DiagExpression .\DC_SummaryReliability.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Network ---" Run-DiagExpression .\DC_Get_Network.ps1 Run-DiagExpression .\DC_Firewall-Component.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: SVUP ---" #Event Logs - System & Application logs $EventLogNames = "System", "Application", "Security" Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -Days 15 Run-DiagExpression .\TS_Virtualization.ps1 # WMI Query to Security Center Run-DiagExpression .\DC_WMISecurityCenter.ps1 Run-DiagExpression .\DC_EnvVars.ps1 #_# Run-DiagExpression .\DC_Office_Inventory.ps1 -> ROIscan Run-DiagExpression .\DC_ROIScan.ps1 #Run Query_Registry. This collects all of the HKLM txt files Run-DiagExpression .\DC_Query_Registry.ps1 #Run-DiagExpression .\DC_RegistryFEPClient.ps1 Run-DiagExpression .\DC_Reg_ACLs.ps1 Run-DiagExpression .\DC_Dirs.ps1 #Run-DiagExpression .\DC_Driver_Dir.ps1 Run-DiagExpression .\DC_FileVersions.ps1 Run-DiagExpression .\DC_Handle.ps1 Run-DiagExpression .\DC_Hardware.ps1 Run-DiagExpression .\DC_Disk_Quota.ps1 Run-DiagExpression .\DC_Certificates.ps1 Run-DiagExpression .\DC_Get-Files.ps1 #_# Run-DiagExpression .\DC_Checksym.ps1 #see common DC_ChkSym Run-DiagExpression .\DC_WGADiag.ps1 Run-DiagExpression .\DC_File_ACLs.ps1 Run-DiagExpression .\DC_ClassRegistration.ps1 Run-DiagExpression .\DC_Descriptors.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Setup ---" # Fltmc Run-DiagExpression .\DC_Fltmc.ps1 # Obtain information about Upper and lower filters Information fltrfind.exe utility Run-DiagExpression .\DC_Fltrfind.ps1 # Collects Windows and ConfigMgr OSD Logs #_# added 2021.12.08 Run-DiagExpression .\DC_CollectWindowsLogs.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Update ---" # Update History Run-DiagExpression .\DC_UpdateHistory.ps1 # Collect WindowsUpdate.Log Run-DiagExpression .\DC_WindowsUpdateLog.ps1 # Hotfix Rollups Run-DiagExpression .\DC_HotfixRollups.ps1 $stopTime_AutoAdd = Get-Date $duration = $(New-TimeSpan -Start $startTime_AutoAdd -End $stopTime_AutoAdd) Write-Host "*** $(Get-Date -UFormat "%R:%S") DONE (Dur: $duration) TS_AutoAddCommands_SUVP.ps1 SkipTS: $Global:skipTS - SkipBPA: $Global:skipBPA" # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBBkEy1s/nDxwCH # b5UIAtESJoBlvZU+hpwI4mgUqeisnqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDSY # EdyOipEbew3pvVcQ7yFXfGZXIbPBiTK+A1ag4xqxMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAGEv/d+i1rO8x16k458wjeVbk6/jqoEmq+GEG # WUu6uy4pM8eQtmLZcSkS7mgD3ZCYo4BAkYi05KVk5iGlqEcJ3r1jReaZAPxh+dG+ # 9tGrC/iqaQUAdu80iPqoHkK9tqPtP/z6Y9jA8wx1dzzQBmkW9LIAQQ/2ju1GNaE1 # sefM/zZdNbYcqou2WiohmOYLRUfzYLaAxuK+dgQS5ZNuCaPg2IKmTWwHLn4CeLa8 # 3/GwzjC4Bbd53SqGIjdoViD6D28zXavfHzwHwLLH4Px+TtR50Df/kHz0ZJuEntEk # NpxtfGAuNLeqAb0yFld4aIMgpCjyEgCIYSyQf2k59Wf6OJnh0aGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCACetCs1cAW53qFcbvNXktcEmopAbnPCU+u # +jIwEqNnswIGZut4BYxUGBMyMDI0MTAyODExNDAzOS45OTFaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ # lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38 # 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC # fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D # cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA # ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT # M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB # Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo # u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0 # PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88 # 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv # eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/ # 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4 # Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6 # I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa # QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV # 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS # s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5 # WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q # 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK # CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi # TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y # Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0 # MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA # AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3 # UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS # TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3 # FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO # RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB # NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgAMh8TZUztYpd2o8x14YTy6JLiuTJcLSaLGgBP7Ev+78wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT # hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1 # KYILMA0GCSqGSIb3DQEBCwUABIICAECrfNCmmQeE7Z2PBSejskaBvk0ILD7afAE+ # Q9OKlQM6ND5B8QyNjBEETgXYuJEVEYOHbuFbvjWacPeB6gy1iJ+aPPBciyRub5Gb # zt791rpzwL95OBX1f8wAMzLxCHIpJTX3ufaxOhwPPKLjni0UzQOcH+iEIyERhu0n # 8qEE8DbMGG4kV3xmx3Xobq4jAj6QtRIOeQot7ManO8Wa7taZmOvPM4/Mg2dwyzAt # rIpE1z5d1PVDP3o3mb5Ah6QF63Xzr1fi/RXWugASiX3T0QHPCR5Svag843vy9ZdS # A8Rdidrz61rw/crCiu9lhwF7eCYvFp8Qlzppn0q7Mu7T/Zt52AXASqWkAzhbw+7f # pZoXhteUnCIk18qT8e8mZ947HpEIMNU8LUypb1VTpVPS+ZEkW4kz4YJPUbaQNFv7 # 90rrysIsnKT7d1wzHJdlc+RRY+mVBSQVofRlQQ/dgoPmiRLSIQVlVtygKBOkvB5y # 8uA2zW7c43XAtFi69UDpq+b9GFB9N3GOg58/1dmcQszUKT7W5o+27f8/ebs3uW27 # w2sXv2B6eekHbhuM/Cs6CCuCeOC8Uh9rJE+AY+GpMwgTgFWjVQErejWc5M2XM/w/ # 0buKn0OMiCa9gEq++CKKenI8+dPP00TXcHLWshrT57XPn+c2rJ0sIdL9myg8IQcT # P+HKQ3GU # SIG # End signature block
combined_dataset/train/non-malicious/sample_9_57.ps1
sample_9_57.ps1
ConvertFrom-StringData @' id_ctssnmp=SNMP id_ctssnmpdescription=Collects information about SNMP. '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBZJek0Hywgv+/D # JUzKZik4sZZw4iybPYizGaWFX5prw6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGKW # kf4ybRdkxQaz/K2TF677uweqfyxthAmOdsj8Q/MYMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAEo1S80MZhMhvroviMtghSbnBE0BU9bYF3eWu # OPkcMcaVML8Yt64ieZXRgrPK2lLwCkTcPMF/XqrWQ2e3sf9Ko7hgwW7q81BfZKHW # Kta54G4+DX1lEkqlKRM0qzlmOQDvPNAhCeV+XdZQvymzsZpXshhwUWuEnGpaS3x3 # pRJLISROZJ12n6WsgSowqoER6oCfpfeYHWrDz2HOvmSUdxe+3eqtpAm5FTqj+0sQ # GrhNqxekySM7mLmrV9J3z5VwdUkLDCwQ/yzoOfb5YxPOtMb6EptgHQ0QeYereVOD # PD1iE6q7KKsZr/yWNbWEuSRPjlwGbO/WKFwQXy7WntEDWnhr0KGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAfq46u5yOQrIIOjCUNLdCFPtOLPq6O9qSu # jBXC8495AgIGZxp1kNxDGBMyMDI0MTAyODExNDA0My4yMzNaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgAB # AAAB6TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yr # APJnV6A7aZYnTw/yx90u1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZ # Y5O8PCBu7Gq+x5Xe6plQt4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7L # MpKwIKQMwXDctYKvCyQy6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5Mx # ylRdTS7E1Jocl30NgcBiJfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9d # xsyvng0lUVY+urq/G8QRFoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTp # w2I6ZWaIhPwMu5DvdkEGzV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0 # VJBSGV+h66ZcaUJOxpbSIjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDC # xHG4mW3mpNQopM/U1WJnjssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOa # mGfwvkIe7dkylzm8BeAUQC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKF # I30u9YlxDTzAuLDK073cndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022 # +yPwclmykssk30a4Rp3v9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYj # uIj0Wuv+jcjtB+xOMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe6 # 1AE90Ken2XPgQHJDiS4SbLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz # /HciZooyeoAvkHQaHmLhwBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20 # QpHDEukwKR8kfaBEX83AyvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQg # eEBr8E4K2wQ2WXI/ZJxZS/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/Jnj # XMChnm9bLDD1waJ7TPp5wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6 # QjegHzndX/tZrY792dfRAXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWG # XYJL5H6LNnKyXJVEw/1FbO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsH # ptAvREqCc+/YxzhIKkA88Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFv # NRhh8ZBAenn1pW+5UBGYz2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMl # PG3YjuqFxidiIsoAw2+MhI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2j # JWgq7VlBuP1BuXjZ3qgym9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCraYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAi # GA8yMDI0MTAyODA0MjY1NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyZEPAgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHt # BHop/3nnFpjQj8V83hqU5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9x # vEgbrAR5K6X+m/0UulYtn4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9M # pP5gv2jcKAx6bUdU1GWpun+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC # 5l3l2pWNTP/uI425dd/qlyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRc # vA2b/9gGyJGQQ0VcBEldHI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekP # cTB+XfESNgABAAAB6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDjLAVHBUQnZ9p830JPkz1g8/pP # 0THDOnQjsZLI8gQ1ZTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniX # aTcmj1TKQWF+x2U4riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5 # BbZ0l6HNgYtnviUBT9VncdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIABg0J # b15Vhz4RxWBnsuxqjUyaDd/509IOY+CyBn1F7vzYW6mf0xW60vx1b4uArPeI0Idt # HF8OUPbe4jZsMgf4aWnb1sP3swNtmdFUcm4u4H/eNbGm/oZ8iyiqfOVbsf9FrkXf # mkYJql9IGymoQiPGyokfWw5oFAOjljyE3AoZ23i8Rt6KcmX3I5+OowQJ+pulmlDR # BHANcbZbHq5yOlb+ek556BnTyAvsTJjaWXa7okJDG0lGpqeRgAg17v8ECMivlraA # mkRR+jgTQa2KJN8DPPqjQb33/STfV30ujZoSvHRBwO2oSMU+7NF84lOZQsMiI53F # SPOI/8gTAXtBerUwujKLGyAOT3dnurbPmO9hnm/gmLiVjrGD6eqaFmQ+SX95McE8 # 3VmqK+15vSsj7rSNJC8+4AFLF7x2ev61Ph16wUvdCisr7qaSOAJzYhL+b6ORJ6B6 # wx9AakUAIyyPN2/eTYr8pKBul3CEO61btO2CRBuXA1hkCvudkoG2vc/px5ILiTDY # x600Hgy2yv6sTxyrzzW8V9emYbekQFy9gvku40gzEWU6CKqajL1FeVHuHjVjeYz3 # 9eaSSmwIL2owVb9VCsinlKKY6MP5Fa4o4Wm/pdgtgLhflEnYOxHkheHRuCEVXyQQ # PBL5NAZWoOhTvpWqvLKkpZE3cU/D/2vCSkNv8nI= # SIG # End signature block
combined_dataset/train/non-malicious/4006.ps1
4006.ps1
$testReposInfo = @{ VsoGit = @{ Name = "AASourceControl-VsoGit" RepoUrl = "https://francisco-gamino.visualstudio.com/_git/VsoGit-SwaggerAndCmdletsTests" Branch = "preview" FolderPath = "Azure/MyRunbooks" SourceType = "VsoGit" PersonalAccessToken = "3qdxa22lutnhezd4atpna74jn3m7wgo6o6kfbwezjfnvgbjhvoca" } VsoTfvc = @{ Name = "AASourceControl-VsoTfvc" RepoUrl = "https://francisco-gamino.visualstudio.com/VsoTfvc-SwaggerAndCmdletsTests/_versionControl" FolderPath = "/MyRunbooks" SourceType = "VsoTfvc" PersonalAccessToken = "3qdxa22lutnhezd4atpna74jn3m7wgo6o6kfbwezjfnvgbjhvoca" } GitHub = @{ Name = "AASourceControl-GitHub" RepoUrl = "https://github.com/Francisco-Gamino/SwaggerAndCmdletsTests.git" Branch = "master" FolderPath = "/" SourceType = "GitHub" PersonalAccessToken = "5fd81166a9ebaebc60da4756f2094a598f1d4c01" } } $resourceGroupName = "frangom-test" $automationAccountName = "frangom-sdkCmdlet-tests" function EnsureSourceControlDoesNotExist { Param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String] $Name ) $sourceControl = Get-AzAutomationSourceControl -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $Name ` -ErrorAction SilentlyContinue if ($sourceControl) { Remove-AzAutomationSourceControl -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $Name } } function WaitForSourceControlSyncJobState { Param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String] $Name, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [Guid] $JobId, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String] $ExpectedState ) $waitTimeInSeconds = 2 $retries = 40 $jobCompleted = Retry-Function { return (Get-AzAutomationSourceControlSyncJob -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $Name ` -JobId $JobId).ProvisioningState -eq $ExpectedState } $null $retries $waitTimeInSeconds Assert-True {$jobCompleted -gt 0} "Timeout waiting for provisioning state to reach '$ExpectedState'" } function Test-CreateVsoGitSourceControlAndSync { $sourceControl = $testReposInfo["VsoGit"] try { EnsureSourceControlDoesNotExist -Name $sourceControl.Name $accessToken = ConvertTo-SecureString -String $sourceControl.PersonalAccessToken -AsPlainText -Force $createdSourceControl = New-AzAutomationSourceControl -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -RepoUrl $sourceControl.RepoUrl ` -Branch $sourceControl.Branch ` -SourceType $sourceControl.SourceType ` -FolderPath $sourceControl.FolderPath ` -AccessToken $accessToken ` -DoNotPublishRunbook Assert-NotNull $createdSourceControl "Failed to create VsoGit source control." $propertiesToValidate = @("Name", "RepoUrl", "SourceType", "Branch", "FolderPath") foreach ($property in $propertiesToValidate) { Assert-AreEqual $sourceControl.$property $createdSourceControl.$property ` "'$property' of created source control does not match. Expected:$($sourceControl.$property). Actual: $($createdSourceControl.$property)" } $updatedSourceControl = Update-AzAutomationSourceControl -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -PublishRunbook $true $expectedPropertyValue = "True" Assert-AreEqual $updatedSourceControl.PublishRunbook $expectedPropertyValue ` "'PublishRunbook' property does not match. Expected: $expectedPropertyValue. Actual: $($updatedSourceControl.PublishRunbook)" $jobId = "0bfa6b49-c08c-4b2f-853e-08128c3c86ee" Start-AzAutomationSourceControlSyncJob -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -JobId $jobId WaitForSourceControlSyncJobState -Name $sourceControl.Name -JobId $jobId -ExpectedState Completed $streams = Get-AzAutomationSourceControlSyncJobOutput -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -JobId $jobId ` -Stream Output | % Summary Assert-True {$streams.count -gt 0} "Failed to get Output stream via Get-AzAutomationSourceControlSyncJobOutput " } finally { EnsureSourceControlDoesNotExist -Name $sourceControl.Name } } function Test-CreateVsoTfvcSourceControlAndSync { $sourceControl = $testReposInfo["VsoTfvc"] try { EnsureSourceControlDoesNotExist -Name $sourceControl.Name $accessToken = ConvertTo-SecureString -String $sourceControl.PersonalAccessToken -AsPlainText -Force $createdSourceControl = New-AzAutomationSourceControl -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -RepoUrl $sourceControl.RepoUrl ` -SourceType $sourceControl.SourceType ` -FolderPath $sourceControl.FolderPath ` -AccessToken $accessToken ` -DoNotPublishRunbook Assert-NotNull $createdSourceControl "Failed to create VsoGit source control." $propertiesToValidate = @("Name", "RepoUrl", "SourceType", "FolderPath") foreach ($property in $propertiesToValidate) { Assert-AreEqual $sourceControl.$property $createdSourceControl.$property ` "'$property' of created source control does not match. Expected:$($sourceControl.$property) Actual: $($createdSourceControl.$property)" } $updatedSourceControl = Update-AzAutomationSourceControl -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -PublishRunbook $true $expectedPropertyValue = "True" Assert-AreEqual $updatedSourceControl.PublishRunbook $expectedPropertyValue ` "'PublishRunbook' property does not match. Expected: $expectedPropertyValue. Actual: $($updatedSourceControl.PublishRunbook)" $jobId = "27dcdb17-1f65-42e9-9eeb-088a5f50eeb8" Start-AzAutomationSourceControlSyncJob -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -JobId $jobId WaitForSourceControlSyncJobState -Name $sourceControl.Name -JobId $jobId -ExpectedState Completed $streams = Get-AzAutomationSourceControlSyncJobOutput -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -JobId $jobId ` -Stream Output | % Summary Assert-True {$streams.count -gt 0} "Failed to get Output stream via Get-AzAutomationSourceControlSyncJobOutput " } finally { EnsureSourceControlDoesNotExist -Name $sourceControl.Name } } function Test-CreateGitHubSourceControlAndSync { $sourceControl = $testReposInfo["GitHub"] try { EnsureSourceControlDoesNotExist -Name $sourceControl.Name $accessToken = ConvertTo-SecureString -String $sourceControl.PersonalAccessToken -AsPlainText -Force $createdSourceControl = New-AzAutomationSourceControl -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -RepoUrl $sourceControl.RepoUrl ` -Branch $sourceControl.Branch ` -SourceType $sourceControl.SourceType ` -FolderPath $sourceControl.FolderPath ` -AccessToken $accessToken ` -DoNotPublishRunbook Assert-NotNull $createdSourceControl "Failed to create VsoGit source control." $propertiesToValidate = @("Name", "RepoUrl", "SourceType", "Branch", "FolderPath") foreach ($property in $propertiesToValidate) { Assert-AreEqual $sourceControl.$property $createdSourceControl.$property ` "'$property' of created source control does not match. Expected:$($sourceControl.$property) Actual: $($createdSourceControl.$property)" } $updatedSourceControl = Update-AzAutomationSourceControl -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -PublishRunbook $true $expectedPropertyValue = "True" Assert-AreEqual $updatedSourceControl.PublishRunbook $expectedPropertyValue ` "'PublishRunbook' property does not match. Expected: $expectedPropertyValue. Actual: $($updatedSourceControl.PublishRunbook)" $jobId = "f7dd56e6-0da3-442a-b1c5-3027065c7786" Start-AzAutomationSourceControlSyncJob -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -JobId $jobId WaitForSourceControlSyncJobState -Name $sourceControl.Name -JobId $jobId -ExpectedState Completed $streams = Get-AzAutomationSourceControlSyncJobOutput -ResourceGroupName $resourceGroupName ` -AutomationAccountName $automationAccountName ` -Name $sourceControl.Name ` -JobId $jobId ` -Stream Output | % Summary Assert-True {$streams.count -gt 0} "Failed to get Output stream via Get-AzAutomationSourceControlSyncJobOutput " } finally { EnsureSourceControlDoesNotExist -Name $sourceControl.Name } }
combined_dataset/train/non-malicious/580.ps1
580.ps1
function Add-SPOField { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string] $listTitle, [Parameter(Mandatory=$true, Position=2)] [string] $fieldName, [Parameter(Mandatory=$true, Position=3)] [string] $fieldXML ) $web = $clientContext.Web $list = $web.Lists.GetByTitle($listTitle) $fields = $list.Fields $clientContext.Load($fields) $clientContext.ExecuteQuery() if (!(Test-SPOField $list $fields $fieldName)) { $field = $list.Fields.AddFieldAsXml($fieldXML, $true, [Microsoft.SharePoint.Client.AddFieldOptions]::AddToAllContentTypes); $list.Update() $clientContext.ExecuteQuery() Write-Host "Field $fieldName added to list $listTitle" -foregroundcolor black -backgroundcolor yellow } else { Write-Host "Field $fieldName already exists in list $listTitle" -foregroundcolor black -backgroundcolor yellow } }
combined_dataset/train/non-malicious/Audit Script.ps1
Audit Script.ps1
##################################################### # Audit script by Alan Renouf - Virtu-Al # # Blog: http://teckinfo.blogspot.com/ # # # # Usage: Audit.ps1 'path' # # # # The file needs to be a plain text list of # # computers to be audited one on each line # # # ##################################################### param( [string] $auditlist) if ($auditlist -eq ""){ Write-Host "No list specified, using Localhost" $targets = "localhost" } else { if ((Test-Path $auditlist) -eq $false) { Write-Host "Invalid audit path specified: $auditlist" exit } else { Write-Host "Using Audit list: $auditlist" $Targets = Get-Content $auditlist } } $Date = Get-Date Foreach ($Target in $Targets) { $Filename = ".\\" + $Target + "_" + $date.Hour + $date.Minute + "_" + $Date.Day + "-" + $Date.Month + "-" + $Date.Year + ".htm" # ===================================================================================================================== # CREATE HTML OUTPUT # ===================================================================================================================== Write-Output " "| out-file -Append -encoding ASCII -filepath $Filename Write-Output '<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">'| out-file -Append -encoding ASCII -filepath $Filename Write-Output '<html ES_auditInitialized='false'><head><title>Audit</title>'| out-file -Append -encoding ASCII -filepath $Filename Write-Output "<META http-equiv=Content-Type content='text/html; charset=windows-1252'>"| out-file -Append -encoding ASCII -filepath $Filename # ---------- Start of Style Definition Section ------------------------------------------------------------------------ Write-Output "<STYLE type=text/css>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " DIV .expando {DISPLAY: block; FONT-WEIGHT: normal; FONT-SIZE: 8pt; RIGHT: 10px; COLOR: #ffffff; FONT-FAMILY: Tahoma; POSITION: absolute; TEXT-DECORATION: underline}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " TABLE {TABLE-LAYOUT: fixed; FONT-SIZE: 100%; WIDTH: 100%}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " #objshowhide {PADDING-RIGHT: 10px; FONT-WEIGHT: bold; FONT-SIZE: 8pt; Z-INDEX: 2; CURSOR: hand; COLOR: #000000; MARGIN-RIGHT: 0px; FONT-FAMILY: Tahoma; TEXT-ALIGN: right; TEXT-DECORATION: underline; WORD-WRAP: normal}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " .heading0_expanded {BORDER-RIGHT: #bbbbbb 1px solid; PADDING-RIGHT: 5em; BORDER-TOP: #bbbbbb 1px solid; DISPLAY: block; PADDING-LEFT: 8px; FONT-WEIGHT: bold; FONT-SIZE: 8pt; MARGIN-BOTTOM: -1px; MARGIN-LEFT: 0px; BORDER-LEFT: #bbbbbb 1px solid; WIDTH: 100%; CURSOR: hand; COLOR: #FFFFFF; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: #bbbbbb 1px solid; FONT-FAMILY: Tahoma; POSITION: relative; HEIGHT: 2.25em; BACKGROUND-COLOR: #cc0000}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " .heading1 {BORDER-RIGHT: #bbbbbb 1px solid; PADDING-RIGHT: 5em; BORDER-TOP: #bbbbbb 1px solid; DISPLAY: block; PADDING-LEFT: 16px; FONT-WEIGHT: bold; FONT-SIZE: 8pt; MARGIN-BOTTOM: -1px; MARGIN-LEFT: 5px; BORDER-LEFT: #bbbbbb 1px solid; WIDTH: 100%; CURSOR: hand; COLOR: #ffffff; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: #bbbbbb 1px solid; FONT-FAMILY: Tahoma; POSITION: relative; HEIGHT: 2.25em; BACKGROUND-COLOR: #7BA7C7}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " .heading2 {BORDER-RIGHT: #bbbbbb 1px solid; PADDING-RIGHT: 5em; BORDER-TOP: #bbbbbb 1px solid; DISPLAY: block; PADDING-LEFT: 16px; FONT-WEIGHT: bold; FONT-SIZE: 8pt; MARGIN-BOTTOM: -1px; MARGIN-LEFT: 5px; BORDER-LEFT: #bbbbbb 1px solid; WIDTH: 100%; CURSOR: hand; COLOR: #ffffff; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: #bbbbbb 1px solid; FONT-FAMILY: Tahoma; POSITION: relative; HEIGHT: 2.25em; BACKGROUND-COLOR: #A5A5A5}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " .tableDetail {BORDER-RIGHT: #bbbbbb 1px solid; BORDER-TOP: #bbbbbb 1px solid; DISPLAY: block; PADDING-LEFT: 16px; FONT-SIZE: 8pt;MARGIN-BOTTOM: -1px; PADDING-BOTTOM: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #bbbbbb 1px solid; WIDTH: 100%; COLOR: #000000; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: #bbbbbb 1px solid; FONT-FAMILY: Tahoma; POSITION: relative; BACKGROUND-COLOR: #f9f9f9}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " .filler {BORDER-RIGHT: medium none; BORDER-TOP: medium none; DISPLAY: block; BACKGROUND: none transparent scroll repeat 0% 0%; MARGIN-BOTTOM: -1px; FONT: 100%/8px Tahoma; MARGIN-LEFT: 43px; BORDER-LEFT: medium none; COLOR: #ffffff; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: medium none; POSITION: relative}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " .Solidfiller {BORDER-RIGHT: medium none; BORDER-TOP: medium none; DISPLAY: block; BACKGROUND: none transparent scroll repeat 0% 0%; MARGIN-BOTTOM: -1px; FONT: 100%/8px Tahoma; MARGIN-LEFT: 0px; BORDER-LEFT: medium none; COLOR: #000000; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: medium none; POSITION: relative; BACKGROUND-COLOR: #000000}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " td {VERTICAL-ALIGN: TOP; FONT-FAMILY: Tahoma}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " th {VERTICAL-ALIGN: TOP; COLOR: #cc0000; TEXT-ALIGN: left}"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "</STYLE>"| out-file -Append -encoding ASCII -filepath $Filename # ---------- End of Style Definition Section -------------------------------------------------------------------------- # ---------- Start of Control Script Section -------------------------------------------------------------------------- Write-Output "<SCRIPT language=vbscript>"| out-file -Append -encoding ASCII -filepath $Filename # ---------- Declare Global Variables for Routines -------------------------------------------------------------------- Write-Output " strShowHide = 1"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' strShow = "show"'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' strHide = "hide"'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' strShowAll = "show all"'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' strHideAll = "hide all"'| out-file -Append -encoding ASCII -filepath $Filename Write-Output "Function window_onload()"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' If UCase(document.documentElement.getAttribute("ES_auditInitialized")) <> "TRUE" Then'| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Set objBody = document.body.all"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " For Each obji in objBody"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " If IsSectionHeader(obji) Then"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " If IsSectionExpandedByDefault(obji) Then"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " ShowSection obji"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Else"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " HideSection obji"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Next"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " objshowhide.innerText = strShowAll"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' document.documentElement.setAttribute "ES_auditInitialized", "true"'| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "End Function"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "Function IsSectionExpandedByDefault(objHeader)"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' IsSectionExpandedByDefault = (Right(objHeader.className, Len("_expanded")) = "_expanded")'| out-file -Append -encoding ASCII -filepath $Filename Write-Output "End Function"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "Function document_onclick()"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Set strsrc = window.event.srcElement"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' While (strsrc.className = "sectionTitle" or strsrc.className = "expando")'| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Set strsrc = strsrc.parentElement"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Wend"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " If Not IsSectionHeader(strsrc) Then Exit Function"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " ToggleSection strsrc"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " window.event.returnValue = False"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "End Function"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "Sub ToggleSection(objHeader)"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' SetSectionState objHeader, "toggle"'| out-file -Append -encoding ASCII -filepath $Filename Write-Output "End Sub"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "Sub SetSectionState(objHeader, strState)"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " i = objHeader.sourceIndex"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Set all = objHeader.parentElement.document.all"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' While (all(i).className <> "container")'| out-file -Append -encoding ASCII -filepath $Filename Write-Output " i = i + 1"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Wend"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Set objContainer = all(i)"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' If strState = "toggle" Then'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' If objContainer.style.display = "none" Then'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' SetSectionState objHeader, "show" '| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Else"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' SetSectionState objHeader, "hide" '| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Else"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Set objExpando = objHeader.children.item(1)"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' If strState = "show" Then'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' objContainer.style.display = "block" '| out-file -Append -encoding ASCII -filepath $Filename Write-Output " objExpando.innerText = strHide"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' ElseIf strState = "hide" Then'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' objContainer.style.display = "none" '| out-file -Append -encoding ASCII -filepath $Filename Write-Output " objExpando.innerText = strShow"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "End Sub"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "Function objshowhide_onClick()"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Set objBody = document.body.all"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Select Case strShowHide"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Case 0"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " strShowHide = 1"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " objshowhide.innerText = strShowAll"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " For Each obji In objBody"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " If IsSectionHeader(obji) Then"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " HideSection obji"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Next"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Case 1"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " strShowHide = 0"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " objshowhide.innerText = strHideAll"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " For Each obji In objBody"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " If IsSectionHeader(obji) Then"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " ShowSection obji"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " Next"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " End Select"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "End Function"| out-file -Append -encoding ASCII -filepath $Filename Write-Output 'Function IsSectionHeader(obj) : IsSectionHeader = (obj.className = "heading0_expanded") Or (obj.className = "heading1_expanded") Or (obj.className = "heading1") Or (obj.className = "heading2"): End Function'| out-file -Append -encoding ASCII -filepath $Filename Write-Output 'Sub HideSection(objHeader) : SetSectionState objHeader, "hide" : End Sub'| out-file -Append -encoding ASCII -filepath $Filename Write-Output 'Sub ShowSection(objHeader) : SetSectionState objHeader, "show": End Sub'| out-file -Append -encoding ASCII -filepath $Filename Write-Output "</SCRIPT>"| out-file -Append -encoding ASCII -filepath $Filename # ---------- End of Control Script Section ---------------------------------------------------------------------------- Write-Output " </HEAD>"| out-file -Append -encoding ASCII -filepath $Filename # ---------- End of Head Section -------------------------------------------------------------------------------------- # ---------- Start of Body Section ------------------------------------------------------------------------------------ Write-Output "<BODY>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' <p><b><font face="Arial" size="5">'$Target' Audit<hr size="8" color="#CC0000"></font></b>'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' <font face="Arial" size="1"><b><i>Version 1.0 by Alan Renouf (Virtu-Al)</i></b></font><br>'| out-file -Append -encoding ASCII -filepath $Filename Write-Output ' <font face="Arial" size="1">Report generated on ' (Get-Date) '</font></p>'| out-file -Append -encoding ASCII -filepath $Filename Write-Output "<TABLE cellSpacing=0 cellPadding=0>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TBODY>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TR>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TD>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV id=objshowhide tabIndex=0><FONT face=Arial></FONT></DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </TD>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </TR>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </TBODY>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "</TABLE>"| out-file -Append -encoding ASCII -filepath $Filename write-output "Writing Detail for $Target" $ComputerSystem = Get-WmiObject -computername $Target Win32_ComputerSystem switch ($ComputerSystem.DomainRole) { 0 { $ComputerRole = "Standalone Workstation" } 1 { $ComputerRole = "Member Workstation" } 2 { $ComputerRole = "Standalone Server" } 3 { $ComputerRole = "Member Server" } 4 { $ComputerRole = "Domain Controller" } 5 { $ComputerRole = "Domain Controller" } default { $ComputerRole = "Information not available" } } $OperatingSystems = Get-WmiObject -computername $Target Win32_OperatingSystem $TimeZone = Get-WmiObject -computername $Target Win32_Timezone $Keyboards = Get-WmiObject -computername $Target Win32_Keyboard $SchedTasks = Get-WmiObject -computername $Target Win32_ScheduledJob $BootINI = $OperatingSystems.SystemDrive + "boot.ini" $RecoveryOptions = Get-WmiObject -computername $Target Win32_OSRecoveryConfiguration # ---------- Start of COMPUTER DETAILS Section HTML Code -------------------------------------------------------------- Write-Output "<DIV class=heading0_expanded>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>$target Details</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "</DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output "<DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename # ---------- Start of COMPUTER DETAILS - GENERAL Sub Section HTML Code ------------------------------------------------ write-output "..Computer Details" Write-Output "<DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>General</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Computer Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'> " $ComputerSystem.Name "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Computer Role</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'> $ComputerRole </font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename switch ($ComputerRole) { "Member Workstation" { Write-Output " <th width='25%'><b>Computer Domain</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename } "Domain Controller" { Write-Output " <th width='25%'><b>Computer Domain</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename } "Member Server" { Write-Output " <th width='25%'><b>Computer Domain</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename } default { Write-Output " <th width='25%'><b>Computer Workgroup</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename} } Write-Output " <td width='75%'>" $ComputerSystem.Domain "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Operating System</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $OperatingSystems.Caption "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Service Pack</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $OperatingSystems.CSDVersion "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>System Root</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $OperatingSystems.SystemDrive "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Manufacturer</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $ComputerSystem.Manufacturer "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Model</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $ComputerSystem.Model "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Number of Processors</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $ComputerSystem.NumberOfProcessors "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Memory</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $ComputerSystem.TotalPhysicalMemory "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Registered User</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $ComputerSystem.PrimaryOwnerName "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Registered Organisation</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $OperatingSystems.Organization "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Last System Boot</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename $LBTime=$OperatingSystems.ConvertToDateTime($OperatingSystems.Lastbootuptime) Write-Output " <td width='75%'>" $LBTime "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename #---------- End of COMPUTER DETAILS - GENERAL Sub-section HTML Code -------------------------------------------------- # ---------- Start of COMPUTER DETAILS - HOFIXES Sub-section HTML Code ------------------------------------------------ write-output "..Hotfix Information" $colQuickFixes = Get-WmiObject Win32_QuickFixEngineering Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>HotFixes</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>HotFix Number</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='75%'><b>Description</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename ForEach ($objQuickFix in $colQuickFixes) { if ($objQuickFix.HotFixID -ne "File 1") { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'>" $objQuickFix.HotFixID "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $objQuickFix.Description "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename #---------- End of COMPUTER DETAILS - HOFIXES Sub-section HTML Code -------------------------------------------------- #---------- Start of COMPUTER DETAILS - LOGICAL DISK CONFIGURATION Sub-section HTML Code ----------------------------- write-output "..Logical Disks" $colDisks = Get-WmiObject -ComputerName $Target Win32_LogicalDisk Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>Logical Disk Configuration</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='15%'><b>Drive Letter</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='20%'><b>Label</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='20%'><b>File System</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='15%'><b>Disk Size</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='15%'><b>Disk Free Space</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='15%'><b>% Free Space</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Foreach ($objDisk in $colDisks) { if ($objDisk.DriveType -eq 3) { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='15%'>"$objDisk.DeviceID"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'>"$objDisk.VolumeName"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'>"$objDisk.FileSystem"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename $disksize = [math]::round(($objDisk.size / 1048576)) Write-Output " <td width='15%'>"$disksize" MB</font></td>"| out-file -Append -encoding ASCII -filepath $Filename $freespace = [math]::round(($objDisk.FreeSpace / 1048576)) Write-Output " <td width='15%'>"$Freespace" MB</font></td>"| out-file -Append -encoding ASCII -filepath $Filename $percFreespace=[math]::round(((($objDisk.FreeSpace / 1048576)/($objDisk.Size / 1048676)) * 100),0) Write-Output " <td width='15%'>"$percFreespace" %</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename # ---------- End of COMPUTER DETAILS - LOGICAL DISK CONFIGURATION Sub-section HTML Code ------------------------------- # ---------- Start of COMPUTER DETAILS - NIC CONFIGURATION Sub-section HTML Code -------------------------------------- write-output "..Network Configuration" $NICCount = 0 $colAdapters = Get-WmiObject -ComputerName $Target Win32_NetworkAdapterConfiguration Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>NIC Configuration</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename $NICCount = 0 Foreach ($objAdapter in $colAdapters) { if ($objAdapter.IPEnabled -eq "True") { $NICCount = $NICCount + 1 If ($NICCount -gt 1) { Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=Solidfiller></DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Description</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $objAdapter.Description "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Physical address</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $objAdapter.MACaddress "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename If ($objAdapter.IPAddress -ne $Null) { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>IP Address / Subnet Mask</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $objAdapter.IPAddress " / " $objAdapter.IPSubnet "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Default Gateway</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $objAdapter.DefaultIPGateway "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>DHCP enabled</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename If ($objAdapter.DHCPEnabled -eq "True") { Write-Output " <td width='75%'>Yes</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Else { Write-Output " <td width='75%'>No</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>DNS Servers</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>"| out-file -Append -encoding ASCII -filepath $Filename If ($objAdapter.DNSServerSearchOrder -ne $Null) { Write-Output $objAdapter.DNSServerSearchOrder | out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Primary WINS Server</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $objAdapter.WINSPrimaryServer "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Secondary WINS Server</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $objAdapter.WINSSecondaryServer "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename $NICCount = $NICCount + 1 } } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename #---------- End of COMPUTER DETAILS - NIC CONFIGURATION Sub-section HTML Code ---------------------------------------- #---------- Start of COMPUTER DETAILS - Software Sub-section HTML Code ------------------------------------------- if ((get-wmiobject -namespace "root/cimv2" -list) | ? {$_.name -match "Win32_Product"}) { write-output "..Installed Software" $colShares = get-wmiobject -ComputerName $Target Win32_Product | select Name,Version,Vendor,InstallDate Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>Software</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Version</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Vendor</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Install Date</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Foreach ($objShare in $colShares) { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='50%'>" $objShare.Name "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'>" $objShare.Version "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='15%'>" $objShare.Vendor "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='15%'>" $objShare.InstallDate "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename } # ---------- End of COMPUTER DETAILS - Software Sub-section HTML Code --------------------------------------------- #---------- Start of COMPUTER DETAILS - LOCAL SHARES Sub-section HTML Code ------------------------------------------- write-output "..Local Shares" $colShares = Get-wmiobject -ComputerName $Target Win32_Share Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>Local Shares</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Share</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Path</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='50%'><b>Comment</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Foreach ($objShare in $colShares) { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'>" $objShare.Name "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'>" $objShare.Path "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='50%'>" $objShare.Caption "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename #---------- End of COMPUTER DETAILS - LOCAL SHARES Sub-section HTML Code --------------------------------------------- #---------- Start of COMPUTER DETAILS - PRINTERS Sub-section HTML Code ----------------------------------------------- Write-output "..Printers" $colInstalledPrinters = Get-WmiObject -ComputerName $Target Win32_Printer Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>Printers</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Printer</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Location</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Default Printer</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Portname</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Foreach ($objPrinter in $colInstalledPrinters) { If ($objPrinter.Name -eq "") { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='100%'>No Printers Installed</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Else { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'>" $objPrinter.Name "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'>" $objPrinter.Location "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename if ($objPrinter.Default -eq "True") { Write-Output " <td width='25%'>Yes</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Else { Write-Output " <td width='25%'>No</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " <td width='25%'>"$objPrinter.Portname"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename #---------- End of COMPUTER DETAILS - PRINTERS Sub-section HTML Code ------------------------------------------------- #---------- Start of COMPUTER DETAILS - SERVICES Sub-section HTML Code ----------------------------------------------- Write-Output "..Services" $colListOfServices = Get-WmiObject -ComputerName $Target Win32_Service Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>Services</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='20%'><b>Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='20%'><b>Account</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='20%'><b>Start Mode</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='20%'><b>State</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='20%'><b>Expected State</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Foreach ($objService in $colListOfServices) { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'>"$objService.Caption"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'>"$objService.Startname"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'>"$objService.StartMode"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename If ($objService.StartMode -eq "Auto") { if ($objService.State -eq "Stopped") { Write-Output " <td width='20%'><font color='#FF0000'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'><font face='Wingdings'color='#FF0000'>ű</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } } If ($objService.StartMode -eq "Auto") { if ($objService.State -eq "Running") { Write-Output " <td width='20%'><font color='#009900'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'><font face='Wingdings'color='#009900'>ü</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } } If ($objService.StartMode -eq "Disabled") { If ($objService.State -eq "Running") { Write-Output " <td width='20%'><font color='#FF0000'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'><font face='Wingdings'color='#FF0000'>ű</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } } If ($objService.StartMode -eq "Disabled") { if ($objService.State -eq "Stopped") { Write-Output " <td width='20%'><font color='#009900'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'><font face='Wingdings'color='#009900'>ü</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } } If ($objService.StartMode -eq "Manual") { Write-Output " <td width='20%'><font color='#009900'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'><font face='Wingdings'color='#009900'>ü</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } If ($objService.State -eq "Paused") { Write-Output " <td width='20%'><font color='#FF9933'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='20%'><font face='Wingdings'color='#009900'>ü</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename #---------- End of COMPUTER DETAILS - SERVICES Sub-section HTML Code ------------------------------------------------- #---------- Start of COMPUTER DETAILS - REGIONAL SETTINGS Sub-section HTML Code -------------------------------------- Write-Output "..Regional Options" $ObjKeyboards = Get-WmiObject -ComputerName $Target Win32_Keyboard Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>Regional Settings</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Time Zone</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $TimeZone.Description "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Country Code</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $OperatingSystems.Countrycode "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Locale</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $OperatingSystems.Locale"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Operating System Language</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $OperatingSystems.OSLanguage"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename switch ($ObjKeyboards.Layout) { "00000402"{ $keyb = "BG" } "00000404"{ $keyb = "CH" } "00000405"{ $keyb = "CZ" } "00000406"{ $keyb = "DK" } "00000407"{ $keyb = "GR" } "00000408"{ $keyb = "GK" } "00000409"{ $keyb = "US" } "0000040A"{ $keyb = "SP" } "0000040B"{ $keyb = "SU" } "0000040C"{ $keyb = "FR" } "0000040E"{ $keyb = "HU" } "0000040F"{ $keyb = "IS" } "00000410"{ $keyb = "IT" } "00000411"{ $keyb = "JP" } "00000412"{ $keyb = "KO" } "00000413"{ $keyb = "NL" } "00000414"{ $keyb = "NO" } "00000415"{ $keyb = "PL" } "00000416"{ $keyb = "BR" } "00000418"{ $keyb = "RO" } "00000419"{ $keyb = "RU" } "0000041A"{ $keyb = "YU" } "0000041B"{ $keyb = "SL" } "0000041C"{ $keyb = "US" } "0000041D"{ $keyb = "SV" } "0000041F"{ $keyb = "TR" } "00000422"{ $keyb = "US" } "00000423"{ $keyb = "US" } "00000424"{ $keyb = "YU" } "00000425"{ $keyb = "ET" } "00000426"{ $keyb = "US" } "00000427"{ $keyb = "US" } "00000804"{ $keyb = "CH" } "00000809"{ $keyb = "UK" } "0000080A"{ $keyb = "LA" } "0000080C"{ $keyb = "BE" } "00000813"{ $keyb = "BE" } "00000816"{ $keyb = "PO" } "00000C0C"{ $keyb = "CF" } "00000C1A"{ $keyb = "US" } "00001009"{ $keyb = "US" } "0000100C"{ $keyb = "SF" } "00001809"{ $keyb = "US" } "00010402"{ $keyb = "US" } "00010405"{ $keyb = "CZ" } "00010407"{ $keyb = "GR" } "00010408"{ $keyb = "GK" } "00010409"{ $keyb = "DV" } "0001040A"{ $keyb = "SP" } "0001040E"{ $keyb = "HU" } "00010410"{ $keyb = "IT" } "00010415"{ $keyb = "PL" } "00010419"{ $keyb = "RU" } "0001041B"{ $keyb = "SL" } "0001041F"{ $keyb = "TR" } "00010426"{ $keyb = "US" } "00010C0C"{ $keyb = "CF" } "00010C1A"{ $keyb = "US" } "00020408"{ $keyb = "GK" } "00020409"{ $keyb = "US" } "00030409"{ $keyb = "USL" } "00040409"{ $keyb = "USR" } "00050408"{ $keyb = "GK" } default { $keyb = "Unknown" } } Write-Output " <th width='25%'><b>Keyboard Layout</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='75%'>" $keyb "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </div>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename #---------- End of COMPUTER DETAILS - REGIONAL SETTINGS Sub-section HTML Code ---------------------------------------- #---------- Start of COMPUTER DETAILS - EVENT LOGS Sub-section HTML Code --------------------------------------------- Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>Event Logs</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename #---------- Start of COMPUTER DETAILS - EVENT LOGS - EVENT LOG SETTINGS Sub-section HTML Code ------------------------ Write-Output "..Event Log Settings" $colLogFiles = Get-WmiObject -ComputerName $Target Win32_NTEventLogFile Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading2>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>Event Log Settings</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Log Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Overwrite Outdated Records</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Maximum Size</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='25%'><b>Current Size</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename ForEach ($objLogFile in $colLogfiles) { Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'>" $objLogFile.LogFileName "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename If ($objLogfile.OverWriteOutdated -lt 0) { Write-Output " <td width='25%'>Never</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } if ($objLogFile.OverWriteOutdated -eq 0) { Write-Output " <td width='25%'>As needed</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Else { Write-Output " <td width='25%'>After " $objLogFile.OverWriteOutdated " days</font></td>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " <td width='25%'>" (($objLogfile.MaxFileSize)/1024) " KB</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='25%'>" (($objLogfile.FileSize)/1024) " KB</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename #---------- End of COMPUTER DETAILS - EVENT LOGS - EVENT LOG SETTINGS Sub-section HTML Code -------------------------- # ---------- Start of COMPUTER DETAILS - EVENT LOGS - ERROR ENTRIES Sub-section HTML Code ----------------------------- write-output "..Event Log Errors" $WmidtQueryDT = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime([DateTime]::Now.AddDays(-14)) $colLoggedEvents = Get-WmiObject -computer "Localhost" -query ("Select * from Win32_NTLogEvent Where Type='Error' and TimeWritten >='" + $WmidtQueryDT + "'") Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=heading2>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <SPAN class=sectionTitle tabIndex=0>ERROR Entries</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='10%'><b>Event Code</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='10%'><b>Source Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='15%'><b>Time</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='10%'><b>Log</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <th width='55%'><b>Message</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename ForEach ($objEvent in $colLoggedEvents) { $dtmEventDate = $ObjEvent.ConvertToDateTime($objEvent.TimeWritten) Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='10%'>" $objEvent.EventCode "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='10%'>" $objEvent.SourceName "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='15%'>" $dtmEventDate "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='10%'>" $objEvent.LogFile "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " <td width='55%'>" $objEvent.Message "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename } Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename Write-Output " </DI
combined_dataset/train/non-malicious/sample_3_45.ps1
sample_3_45.ps1
#************************************************ # TS_MemoryManagerSystemPagesCheck.ps1 # Version 1.0.1 # Date: 5/14/2012 # Author: v-kaw # Description: [Idea ID 2389] [Windows] Hang caused by kernel memory depletion due 'SystemPages' reg key with wrong value # Rule number: 2389 # Rule URL: //sharepoint/sites/rules/Rule%20Submissions/Forms/DispForm.aspx?ID=2389 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 2389 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_MemoryManagerSystemPagesCheck" $PublicContent = "http://technet.microsoft.com/en-us/library/aa996786(EXCHG.80).aspx" $InternalContent = "" $Verbosity = "Warning" $Visibility = "4" $SupportTopicsID = "8125" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** # ************** # Detection Logic # ************** function CheckSystemPages() { $Path='HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management' if(Test-Path $Path) { $SystemPages = (Get-ItemProperty -Path $Path).SystemPages if(($null -ne $SystemPages) -and ($SystemPages -ne 0)) { Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name 'SystemPages current value' -Value ("0x{0:X8}" -f $SystemPages) return $true } } return $false } #Check to see if rule is applicable to this computer if (($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2)) { $RuleApplicable = $true #Detect root cause if (CheckSystemPages) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -SolutionTitle $ScriptStrings.ID_MemoryManagerSystemPagesCheck_SD } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCChNyAJoITslVYa # SNII43LWjg0nYTLohXPkOsyKYqJsUaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINU16KKa4t7Xt2GpCWcWFB/O # c7iVpASO1bY7w3L962nCMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHds6j1lR9fyKu1v1mf7CyKajpSWvN0/I8AmM4x6inD08UNW3X9Q4TS4f # VNEuBswOwwCFZpLCJSUmtzQfGVWHH/WuSwl6DU6+9qqRuriPSu4dsuW2IM5KoTY0 # A5ggyaI0dotIhs9dze1JVOYaEyG6EMFJGuynDXIxjZbQEdTndXP5jT696Uhmns4/ # TqCMj5IpZYJgSpexcpv4lX7LfTrdnKPyUVG+P668TKMoMz+WO/j5x/kk4DdWpRbh # ibnHBkqyPEviDiv2tGeHiNZQLqeAzVJ6TmKlxBgeqYSMdWsqgkUBZ76Ixv2WiC+n # KS9FpUk52Oz6PUtIFVy+I3FC7+11WKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCoIkFElxjupj4q5Cyt+E8ETTvpTYPp0U5eH8cyq+g4JgIGZxqDjw9Z # GBMyMDI0MTAyODExNDA0MC4yNjlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz # OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P # AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR # rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C # Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm # xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy # fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo # 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCAo3vhSwJ7kCqP4UZ6A+NmZ8XgFxW20gCdJkCGkfAR # jzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy # SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIASBfG7vJk5xiT6frrZUJa # pAh7zbEaJpnWKObM2vq5qdougFDxeFn31DaIohN95FaEaiQKZ570pYU4UVEoy4xG # 6MUJgxBEddksAonARebYsVDJwx592mKKY0ZEFlpWlVf5kPvUQV3iD7JDDaNG0+0W # SfTu3I3rXguy4JHn3/nSZOlyr1CGtpFtTTAw8q3IwpV3uEP7GBYwuEYdQBrLfewM # OeUHhHFgKozfnvP4osDQthMwnMUP8v/C0ujAVWGF2foF5IzCZuRW2v48KjvZteE9 # iO3jGO6vjA63eFacKAcVMKcd/gofMFhRf8mpnJ+gUfMpZLckMFs56p3jlGxPqF+w # FAuoNVfLsrYXjnH7Td4CBVLS8OzMfkklv8Hcqj4CK7F5C02t3xcOHPMDEpQjQ7Gl # GmxhBdjsaIXecQKMSd5vttqCCMgW1ktjgEksdKCkSRzTJ94NQ8WoW1qGVwmhnpfX # vvOdF8CA29rlieBFzZUQ/qzbjMlgJIs0aaz0gTV9pA7iRyke60JQVY+BTmh3WTHi # joZpqN/ReU82Q6ELquV9fXfKj86DYBTIxjbv4hTKy4xCAlP9QF/bzaCzhwHlv0zQ # x0u3QTtY0SxJ0eJRKIx/krJnLJJDc7Zbk73e89I9fy6ETV9SsEJ9Npayvwqiv+V5 # IZ6UQXtjkIfydhW+6rLn2rM= # SIG # End signature block
combined_dataset/train/non-malicious/sample_62_14.ps1
sample_62_14.ps1
# # Module manifest for module 'OCI.PSModules.Servicemanagerproxy' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Servicemanagerproxy.dll' # Version number of this module. ModuleVersion = '88.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '01ac6ca4-c358-4958-baf9-455f6dd1de04' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Servicemanagerproxy Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicemanagerproxy.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIServicemanagerproxyServiceEnvironment', 'Get-OCIServicemanagerproxyServiceEnvironmentsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicemanagerproxy' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3701.ps1
3701.ps1
function Get-AzVMGuestPolicyStatus-VmNameScope { $rgName = "vivga" $vmName = "Viv1809SDDC" $reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName Assert-NotNull $reports Assert-True { $reports.Count -gt 0 } } function Get-AzVMGuestPolicyStatus-VmNameScope_Custom { $rgName = "aashishCustomrole7ux" $vmName = "aashishCustomrole7ux" $reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName Assert-NotNull $reports Assert-True { $reports.Count -gt 0 } } function Get-AzVMGuestPolicyStatus-InitiativeIdScope { $rgName = "vivga" $vmName = "Viv1809SDDC" $initiativeId = "/providers/Microsoft.Authorization/policySetDefinitions/25ef9b72-4af2-4501-acd1-fc814e73dde1" $reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeId $initiativeId Assert-NotNull $reports Assert-True { $reports.Count -gt 0 } } function Get-AzVMGuestPolicyStatus-InitiativeIdScope_Custom { $rgName = "aashishCustomrole7ux" $vmName = "aashishCustomrole7ux" $initiativeId = "/subscriptions/b5e4748c-f69a-467c-8749-e2f9c8cd3db0/providers/Microsoft.Authorization/policySetDefinitions/60062d3c-3282-4a3d-9bc4-3557dded22ca" $reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeId $initiativeId Assert-NotNull $reports Assert-True { $reports.Count -gt 0 } } function Get-AzVMGuestPolicyStatus-InitiativeNameScope { $rgName = "vivga" $vmName = "Viv1809SDDC" $initiativeName = "25ef9b72-4af2-4501-acd1-fc814e73dde1" $reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName Assert-NotNull $reports Assert-True { $reports.Count -gt 0 } } function Get-AzVMGuestPolicyStatus-InitiativeNameScope_Custom { $rgName = "aashishCustomrole7ux" $vmName = "aashishCustomrole7ux" $initiativeName = "60062d3c-3282-4a3d-9bc4-3557dded22ca" $reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName Assert-NotNull $reports Assert-True { $reports.Count -gt 0 } } function Get-AzVMGuestPolicyStatus-ReportIdScope { $rgName = "vivga" $vmName = "Viv1809SDDC" $initiativeName = "25ef9b72-4af2-4501-acd1-fc814e73dde1" $reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName Assert-NotNull $reports Assert-True { $reports.Count -gt 0 } $Id= $reports[0].ReportId; $report = Get-AzVMGuestPolicyStatus -ReportId $Id Assert-NotNull $report } function Get-AzVMGuestPolicyStatus-ReportIdScope_Custom { $rgName = "aashishCustomrole7ux" $vmName = "aashishCustomrole7ux" $initiativeName = "60062d3c-3282-4a3d-9bc4-3557dded22ca" $reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName Assert-NotNull $reports Assert-True { $reports.Count -gt 0 } $Id= $reports[0].ReportId; $report = Get-AzVMGuestPolicyStatus -ReportId $Id Assert-NotNull $report }
combined_dataset/train/non-malicious/DefaultParameterValues_2.ps1
DefaultParameterValues_2.ps1
# DefaultParameters Module # 1.3 - fixed denable/disable, added get and remove, and improved import and set # 1.2 - added help and commands to enable/disable the defaults # 1.0 - initial release function Export-DefaultParameter { #.Synopsis # Exports the current default parameter values [CmdletBinding()] param( # The path to export default parameter values to (defaults to "DefaultParameterValues.clixml" in your profile directory) [String]$Path = $(Join-Path (Split-Path $Profile.CurrentUserAllHosts -Parent) DefaultParameterValues.clixml) ) Export-CliXml -InputObject $Global:PSDefaultParameterValues -Path $Path } function Import-DefaultParameter { #.Synopsis # Imports new default parameter values [CmdletBinding()] param( # The path to import default parameter values from (defaults to "DefaultParameterValues.clixml" in your profile directory) [String]$Path = $(Join-Path (Split-Path $Profile.CurrentUserAllHosts -Parent) DefaultParameterValues.clixml), # If set, overwrite current values (otherwise, keep current values) [Switch]$Force ) $TempParameterValues = $Global:PSDefaultParameterValues if(Test-Path $Path) { [System.Management.Automation.DefaultParameterDictionary]$NewValues = Import-CliXml -Path ${ProfileDir}\\DefaultParameterValues.clixml $repeats = @() foreach($key in $NewValues.Keys) { # don't import the disabled state, that's just silly if($key -eq "disabled") { continue } if($Global:PSDefaultParameterValues.ContainsKey($key)) { $command,$parameter = $key -split ":" if($Force) { $repeats += [PSCustomObject]@{Command=$Command;Parameter=$Parameter;NewDefault=$NewValues.$key;OldDefault=$Global:PSDefaultParameterValues.$Key} $Global:PSDefaultParameterValues.$Key = $NewValues.$key } else { $repeats += [PSCustomObject]@{Command=$Command;Parameter=$Parameter;CurrentDefault=$Global:PSDefaultParameterValues.$Key;SkippedValue=$NewValues.$key} } } else { $Global:PSDefaultParameterValues.$Key = $NewValues.$key } } if($repeats.Count) { $Width = &{ $Local:ErrorActionPreference = "SilentlyContinue" $Width = $Host.UI.RawUI.BufferSize.Width - 2 if($Width) { $Width } else { 80 } } if($Force) { Write-Warning ("Some defaults overwritten:`n{0}" -f ($repeats | Out-String -Width $Width)) } else { Write-Warning ("Some defaults already defined, use -Force to overwrite:`n{0}" -f ($repeats | Out-String -Width $Width)) } } # Make sure that everything is enabled $Global:PSDefaultParameterValues["Disabled"] = $false } else { Write-Warning "Default Parameter file not found: '$Path'" } } function Set-DefaultParameter { #.Synopsis # Sets a default parameter value for a command #.Description # Safely sets the default parameter value for a command, making sure that you've correctly typed the command and parameter combination [CmdletBinding(DefaultParameterSetName="Colonated", SupportsShouldProcess=$true, ConfirmImpact="Low")] param( # The command that you want to change the default value of a parameter for [parameter(Position=0,Mandatory=$true,ParameterSetName="Colonated")] [parameter(Position=0,Mandatory=$true,ParameterSetName="SeparateInputs")] $Command, # The name of the parameter that you want to change the default value for [parameter(Position=1,Mandatory=$true,ParameterSetName="SeparateInputs")] $Parameter, # The new default parameter value [parameter(Position=1,Mandatory=$true,ParameterSetName="Colonated")] [parameter(Position=2,Mandatory=$true,ParameterSetName="SeparateInputs")] $Value ) if($PSCmdlet.ParameterSetName -eq "Colonated") { $command,$parameter = $command -split ":" } if($parameter.StartsWith("-")) { $parameter = $parameter.TrimStart("-") } ## Resolve the parameter to be sure $cmd = Get-Command $command | Select -First 1 $parameters = $cmd.Parameters.Values $param = @($parameters | Where-Object { $_.Name -match $parameter -or $_.Aliases -match $parameter} | Select -Expand Name -Unique) if(!$param) { $param = @($parameters | Where-Object { $_.Name -match "${parameter}*"} | Select -First 1 -Expand Name) if(!$param) { $param = @($parameters | Where-Object { $_.Aliases -match "${parameter}*"} | Select -First 1 -Expand Name) } } if($param.Count -eq 1) { if($cmd.CommandType -eq "Alias") { $Command = $cmd.DisplayName } else { $Command = $cmd.Name } Write-Verbose "Setting Parameter $parameter on ${Command} to default: $($param[0])" $Key = "${Command}:$($param[0])" if( $Global:PSDefaultParameterValues.ContainsKey($Key) ) { $WI = "Overwrote the default parameter value for '$Key' with $Value" $CF = "Overwrite the existing default parameter value for '$Key'? ($($Global:PSDefaultParameterValues.$Key))" } else { $WI = "Added a default parameter value for '$Key' = $Value" $CF = "Add a default parameter value for '$Key'? ($($Global:PSDefaultParameterValues.$Key))" } if($PSCmdlet.ShouldProcess( $WI, $CI, "Setting Default Parameter Values" )) { $Global:PSDefaultParameterValues.$Key = $Value } } else { Write-Warning "Parameter $parameter not found on ${Command}" } } function Get-DefaultParameter { #.Synopsis # Gets the default parameter value for a command, if it's been set #.Description # Gets the default parameter value for a command from $PSDefaultParameterValues [CmdletBinding(DefaultParameterSetName="Colonated")] param( # The command that you want to change the default value of a parameter for (allows wildcards) [parameter(Position=0,Mandatory=$false)] [string]$Command = "*", # The name of the parameter that you want to change the default value for (allows wildcards) [parameter(Position=1,Mandatory=$true,ParameterSetName="SeparateInputs")] [string]$Parameter ) if($PSCmdlet.ParameterSetName -eq "Colonated") { $command,$parameter = $command -split ":" } if($parameter.StartsWith("-")) { $parameter = $parameter.TrimStart("-") } $repeats = @() foreach($key in $Global:PSDefaultParameterValues.Keys) { # Handle the disabled state: if($key -eq "disabled" -and $Global:PSDefaultParameterValues["Disabled"]) { Write-Warning "Default Parameter Values are DISABLED and will not be used:" continue } if($key -like "${Command}:${Parameter}*") { $Cmd,$Param = $key -split ":" $repeats += [PSCustomObject]@{Command=$Cmd;Parameter=$Param;CurrentDefault=$Global:PSDefaultParameterValues.$Key} } else { Write-Verbose "'$key' is -not -like '${Command}:${Parameter}*'" } } $repeats } function Remove-DefaultParameter { #.Synopsis # Removed the default parameter value for a command, if it's been set #.Description # Removes the default parameter value for a command from $PSDefaultParameterValues [CmdletBinding(DefaultParameterSetName="Colonated", SupportsShouldProcess=$true, ConfirmImpact="Low")] param( # The command that you want to change the default value of a parameter for (allows wildcards) [parameter(Position=0,Mandatory=$false)] [string]$Command = "*", # The name of the parameter that you want to change the default value for (allows wildcards) [parameter(Position=1,Mandatory=$true,ParameterSetName="SeparateInputs")] [string]$Parameter ) if($PSCmdlet.ParameterSetName -eq "Colonated") { $command,$parameter = $command -split ":" } if($parameter.StartsWith("-")) { $parameter = $parameter.TrimStart("-") } $keys foreach($key in $Global:PSDefaultParameterValues.Keys | Where { $_ -like "${Command}:${Parameter}*" }) { # Handle the disabled state: if($key -ne "disabled") { if($PSCmdlet.ShouldProcess( "Removed the default parameter value for '$Key'", "Remove the default parameter value for '$Key'?", "Removing Default Parameter Values" )) { $Global:PSDefaultParameterValues.Remove($key) } } } } function Disable-DefaultParameter { #.Synopsis # Turns OFF default parameters #.Description # By setting $PSDefaultParameterValues["Disabled"] to $true, we make sure that NONE of our default parameter values will be used [CmdletBinding()] param() $Global:PSDefaultParameterValues["Disabled"]=$true } function Enable-DefaultParameter { #.Synopsis # Turns ON default parameters #.Description # By setting $PSDefaultParameterValues["Disabled"] to $false, we make sure that all of our default parameter values will be used [CmdletBinding()] param() $Global:PSDefaultParameterValues["Disabled"]=$false } Set-Alias Add-DefaultParameter Set-DefaultParameter -ErrorAction SilentlyContinue Import-DefaultParameter
combined_dataset/train/non-malicious/sample_62_81.ps1
sample_62_81.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # # culture="en-US" ConvertFrom-StringData @' ###PSLOC InValidUri=InValid Uri: '{0}'. A sample valid uri: https://www.powershellgallery.com/api/v2/. PathDoesNotExist=Path: '{0}' does not exist VersionError=MinimumVersion should be less than the maximumVersion. The MinimumVersion or maximumVersion cannot be used with the RequiredVersion in the same command. UnexpectedArgument=Unexpected argument type: '{0}' SourceNotFound=Source '{0}' not found. Please make sure you register it. CallingFunction="Call a function '{0}'". ###PSLOC '@ # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAXoZvT6Sxwjlb6 # K13DPDb7ghCGgYKA5tdcnEQXeEdnE6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJxA+NogklrB4tpUObA+I3df # cmORxJJ2UKVVYDnxVeCLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAie6WFBnhOdqCeg19/438meTFmRE3+tpOI0qEo5uqCQcs0l9sWxuKRl2f # STtG+zPwlgQMCMLBO2g6FhzhGyA7b0cY5DdPmsUOPNCLZLYtM61c/t9sTLGMCQqr # qe+SfILhN5x1punHWgKJpr/cQ9Fy5cpkHpmp2z4eH2aorCFKzc+ssQHzXf7H+5oS # fDg3f5rQmEvecJbOKk5yyfFB2spTPV5637QO3pyMde4p4mOnW8DtQloeoArMUb0q # fhqA/GUDGbMk+iA49FSlBBQsVoGNYqUdPgSFdyEuWLePtsJeBLsfMfr/6pwNl6Y2 # 1i+hFG9m6ddzdOAZbtsvxdfbZMIepaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCIWKw+pbhj2hBzOd81ICL28RoBID6ig9dLHNDIQEFtBQIGZk3YA/sm # GBMyMDI0MDUyMzE2NDM0Ni4zNzVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOn5p+IwIhgPMjAyNDA1MjMxOTMyNTBaGA8yMDI0MDUyNDE5MzI1MFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fmn4gIBADAHAgEAAgINYjAHAgEAAgIRNDAKAgUA # 6fr5YgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHpsm5q0ZdHBaeprgjNS # yd0ojEpghZykcYvC4kIp8xAzjXyUJcyGaJzLDxqNBeAVauNvfMjIRz0BkdK0PWPI # Q9gkZioVL04NJ5sejbf0SubFs8In3i91dxRqRqp7GWDF7W+LPx+GhPmu+8g8xmz3 # Z8iVuzX9WbSBunphA+N0UNp4MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgTU0u4wm9Gi9HUAZyzeYnb9hwOMnr3Zdy81NZiOIuFr0wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIBwT6TUhjH6lGpefusVS7qAzvvAD8invIFPZYh3t3r3H # MA0GCSqGSIb3DQEBCwUABIICADa+nsZafyaG9M74DPopV8EOBMiPtbhsVXhPxbDG # Y1wnxyxxIZ3z9PQT3wh44XwhLnBhwAuWNLNpQekLijb+uKr+2GdG7U70rag5wE4J # MXeuSdmZy6WtDRQ22ch3uDYcpC/UqnGjyskAHGnd5i7z433gStG5RTT/KeQVPE/0 # 5/opspznV8Q4YRZC7PidzHeiaCbkf+v/bCMLU4yv2Zc4jWQc582NkixnYOFiWnUP # Rcx5bTjXkUdyZli9aHRTHVsxWhftizu5G2pqL2nzohlNqjPUK07AYt8xsPo7NoGT # oaxpXp6lxNK353uk5fuCjZcFkI3ZybyTMgjQ6yZvWHOvt7hAfzZtPLbDiv3gmcM0 # BdpYNZj1V3CBIERcp+zkVvD39r8Wv6wp3byH7ea+mlIABYVsTqJl4zVDnACUOPtW # w/3wHqkszDqoynQNhsL6qswCgdFSjE6yJkRMOQeMJI51vIDuwRzzJw1jPEhWJ5uJ # iMb1/hGztov3GStrtLXDUETBceEQamcEbPR6GS76xsg4TlCTH2IMbaQ5UAeHNogm # MwCk3goyX5Qod7tdm9YCN9+YuyQEoHaLq/vW+NTaxwygs4mNE0sNnmXx3XHgRDvq # bQKY/Dyim5N+i+bbQiRjGiqUEMiTvlgu4V+UpeXh+mP8TAwqcRNHESWp9y09xf+O # uSAf # SIG # End signature block
combined_dataset/train/non-malicious/sample_27_3.ps1
sample_27_3.ps1
# # Module manifest for module 'OCI.PSModules.Cloudguard' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '416303ec-c9d6-4a65-8413-14973e520be8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudguard Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudguardCompartment', 'Get-OCICloudguardConditionMetadataType', 'Get-OCICloudguardConditionMetadataTypesList', 'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule', 'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource', 'Get-OCICloudguardDataSourceEventsList', 'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector', 'Get-OCICloudguardDetectorRecipe', 'Get-OCICloudguardDetectorRecipeDetectorRule', 'Get-OCICloudguardDetectorRecipeDetectorRulesList', 'Get-OCICloudguardDetectorRecipesList', 'Get-OCICloudguardDetectorRule', 'Get-OCICloudguardDetectorRulesList', 'Get-OCICloudguardDetectorsList', 'Get-OCICloudguardImpactedResourcesList', 'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList', 'Get-OCICloudguardManagedListTypesList', 'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem', 'Get-OCICloudguardProblemEndpointsList', 'Get-OCICloudguardProblemEntitiesList', 'Get-OCICloudguardProblemHistoriesList', 'Get-OCICloudguardProblemsList', 'Get-OCICloudguardRecommendationsList', 'Get-OCICloudguardResourceProfile', 'Get-OCICloudguardResourceProfileEndpointsList', 'Get-OCICloudguardResourceProfileImpactedResourcesList', 'Get-OCICloudguardResourceProfilesList', 'Get-OCICloudguardResourceTypesList', 'Get-OCICloudguardResponderActivitiesList', 'Get-OCICloudguardResponderExecution', 'Get-OCICloudguardResponderExecutionsList', 'Get-OCICloudguardResponderRecipe', 'Get-OCICloudguardResponderRecipeResponderRule', 'Get-OCICloudguardResponderRecipeResponderRulesList', 'Get-OCICloudguardResponderRecipesList', 'Get-OCICloudguardResponderRule', 'Get-OCICloudguardResponderRulesList', 'Get-OCICloudguardSecurityPoliciesList', 'Get-OCICloudguardSecurityPolicy', 'Get-OCICloudguardSecurityRecipe', 'Get-OCICloudguardSecurityRecipesList', 'Get-OCICloudguardSecurityZone', 'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting', 'Get-OCICloudguardSightingEndpointsList', 'Get-OCICloudguardSightingImpactedResourcesList', 'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList', 'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe', 'Get-OCICloudguardTargetDetectorRecipeDetectorRule', 'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList', 'Get-OCICloudguardTargetDetectorRecipesList', 'Get-OCICloudguardTargetResponderRecipe', 'Get-OCICloudguardTargetResponderRecipeResponderRule', 'Get-OCICloudguardTargetResponderRecipeResponderRulesList', 'Get-OCICloudguardTargetResponderRecipesList', 'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList', 'Get-OCICloudguardWorkRequest', 'Get-OCICloudguardWorkRequestErrorsList', 'Get-OCICloudguardWorkRequestLogsList', 'Get-OCICloudguardWorkRequestsList', 'Invoke-OCICloudguardExecuteResponderExecution', 'Invoke-OCICloudguardRequestRiskScores', 'Invoke-OCICloudguardRequestSecurityScores', 'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend', 'Invoke-OCICloudguardRequestSummarizedActivityProblems', 'Invoke-OCICloudguardRequestSummarizedProblems', 'Invoke-OCICloudguardRequestSummarizedResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedRiskScores', 'Invoke-OCICloudguardRequestSummarizedSecurityScores', 'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendProblems', 'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores', 'Invoke-OCICloudguardSkipBulkResponderExecution', 'Invoke-OCICloudguardSkipResponderExecution', 'Invoke-OCICloudguardTriggerResponder', 'Move-OCICloudguardDataSourceCompartment', 'Move-OCICloudguardDetectorRecipeCompartment', 'Move-OCICloudguardManagedListCompartment', 'Move-OCICloudguardResponderRecipeCompartment', 'Move-OCICloudguardSecurityRecipeCompartment', 'Move-OCICloudguardSecurityZoneCompartment', 'New-OCICloudguardDataMaskRule', 'New-OCICloudguardDataSource', 'New-OCICloudguardDetectorRecipe', 'New-OCICloudguardDetectorRecipeDetectorRule', 'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe', 'New-OCICloudguardSecurityRecipe', 'New-OCICloudguardSecurityZone', 'New-OCICloudguardTarget', 'New-OCICloudguardTargetDetectorRecipe', 'New-OCICloudguardTargetResponderRecipe', 'Remove-OCICloudguardCompartment', 'Remove-OCICloudguardDataMaskRule', 'Remove-OCICloudguardDataSource', 'Remove-OCICloudguardDetectorRecipe', 'Remove-OCICloudguardDetectorRecipeDetectorRule', 'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource', 'Remove-OCICloudguardManagedList', 'Remove-OCICloudguardResponderRecipe', 'Remove-OCICloudguardSecurityRecipe', 'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget', 'Remove-OCICloudguardTargetDetectorRecipe', 'Remove-OCICloudguardTargetResponderRecipe', 'Stop-OCICloudguardWorkRequest', 'Update-OCICloudguardBulkProblemStatus', 'Update-OCICloudguardConfiguration', 'Update-OCICloudguardDataMaskRule', 'Update-OCICloudguardDataSource', 'Update-OCICloudguardDetectorRecipe', 'Update-OCICloudguardDetectorRecipeDetectorRule', 'Update-OCICloudguardManagedList', 'Update-OCICloudguardProblemStatus', 'Update-OCICloudguardResponderRecipe', 'Update-OCICloudguardResponderRecipeResponderRule', 'Update-OCICloudguardSecurityRecipe', 'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget', 'Update-OCICloudguardTargetDetectorRecipe', 'Update-OCICloudguardTargetDetectorRecipeDetectorRule', 'Update-OCICloudguardTargetResponderRecipe', 'Update-OCICloudguardTargetResponderRecipeResponderRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }