full_path stringlengths 31 232 | filename stringlengths 4 167 | content stringlengths 0 48.3M |
|---|---|---|
combined_dataset/train/non-malicious/Filtering hosts.ps1 | Filtering hosts.ps1 | set-psdebug -strict
Function Where-Host
{
<#
.SYNOPSIS
Filter hosts according to hostname resolution, ping reachability or WMI capability
.DESCRIPTION
Filter hostnames by hostname resolution, ping reachbility or WMI capabilities.
Filter can be positive or negative. Positive filter includes hosts that can be reached at least at level X (X can be "DNS", "Ping" or "WMI"). Negative filter includes hosts that cannot be reached at level X (X can be the same as above).
.EXAMPLE
Get a list of hosts from Hosts.txt and keep only those who reply to WMI requests:
Get-Content Hosts.txt | Filter-Host -Can WMI
.INPUTTYPE
String
.PARAMETER Hostname
Name of the host we want to know about its level of reachability
.PARAMETER PingTimeout
When pinging hosts, timeout after what we consider the host is unreachable
.PARAMETER PingCount
When pinging hosts, number of packets sent
.PARAMETER Can
Positive Filter. We keep hosts who DO reply to a certain level of request.
"Can" parameter takes an argument that is the MINIMUM capacity we are looking to know about:
- "DNS": the hostname can at least be resolved by DNS
- "Ping": the host at least replies to ping requests
- "WMI": the host at least replies to a WMI "List" request
Only one argument can be given to "Can" parameter. Give the most elevated you want.
.PARAMETER Cannot
Negative Filter. We keep hosts who DO NOT reply to a certain level of request.
"Cannot" parameter takes an argument that is the MAXIMUM capacity we are looking to know about:
- "DNS": the hostname cannot be resolved by DNS
- "Ping": the host doesn't reply to ping requests
- "WMI": the host doesn't reply to a WMI "List" request
Only one argument can be given to "Can" parameter. Give the less elevated you want.
.PARAMETER Credential
A PSCredential object used if you want to do WMI requests and you're not logged with a power user.
See Get-Credential
.RETURNVALUE
For each object in the pipeline, the cmdlet returns the input object if filter matches, nothing if it doesn't.
.EXAMPLE
Get a list of hosts from Hosts.txt and keep only those who doesn't reply to ping requests:
Get-Content Hosts.txt | Filter-Host -Cannot Ping
.NOTES
Author : Rafael Corvalan - rafael <a-t> corvalan [dot] net
.LINK
http://psh-xrt.blogspot.com
#>
[CmdletBinding(DefaultParameterSetName="PositiveFilter")]
Param(
[String]
[Parameter(ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$True, Mandatory=$True)]
[Alias("Host","Name")]
$Hostname,
[Alias("Timeout")]
[Int]$PingTimeout = 200,
[Alias("Count")]
[Int]$PingCount = 2,
[ValidateSet("DNS", "Ping", "WMI")]
[Parameter(ParameterSetName="PositiveFilter")]
[String]
$Can = "Ping",
[ValidateSet("DNS", "Ping", "WMI")]
[Parameter(ParameterSetName="NegativeFilter")]
[String]
$Cannot,
[System.Management.Automation.PSCredential]
[Alias("PSCredential")]
$Credential
)
BEGIN
{
if (-not (Test-Path Variable:\\Can)) {$Can = ''}
if (-not (Test-Path Variable:\\Cannot)) {$Cannot = ''}
}
Process
{
Write-Verbose "+ Processing host $Hostname"
Write-Verbose " - Resolving host $Hostname"
$rh = Resolve-Host $Hostname -ErrorAction SilentlyContinue -ErrorVariable err
if ($err -ne $Null)
{
Write-Verbose('Cannot resolve host {0}. Message [{1}]' -f $Hostname, ($err -join '; '))
if ($Cannot -match '^DNS|Ping|WMI$')
{
return $_
}
return
}
if ($Can -ieq 'DNS') {return $_}
if ($Cannot -ieq 'DNS') {return}
Write-Verbose " - Pinging host $Hostname"
$ping = Ping-Host $Hostname -Quiet -Count $PingCount -Timeout $PingTimeout -ErrorAction SilentlyContinue -ErrorVariable err
if ($err -ne $Null)
{
Write-Verbose('Error pinging host {0}. Message [{1}]' -f $Hostname, ($err -join '; '))
}
elseif ($ping.Loss -eq 100)
{
Write-Verbose('Host {0} is unreachable by ping' -f $Hostname)
}
if ($err -ne $null -or $ping.Loss -eq 100)
{
if ($Cannot -match '^Ping|WMI$') {return $_ }
else {return}
}
if ($Can -ieq 'Ping') {return $_}
if ($Cannot -ieq 'Ping') {return}
Write-Verbose " - WMI test on host $Hostname"
if ($Credential -ne $Null) {
Get-WMIObject -List -ComputerName $Hostname -Credential $Credential -ErrorAction SilentlyContinue -ErrorVariable err > $Null
} else {
Get-WMIObject -List -ComputerName $Hostname -ErrorAction SilentlyContinue -ErrorVariable err > $Null
}
if ($err -ne $Null)
{
Write-Verbose('Error querying WMI on host {0}. Message [{1}]' -f $Hostname, ($err -join '; '))
if ($Cannot -ieq 'WMI') {return $_}
else {return}
}
if ($Can -ieq 'WMI') {return $_}
else {return}
}
}
|
combined_dataset/train/non-malicious/1044.ps1 | 1044.ps1 |
[CmdletBinding()]
param(
)
Set-StrictMode -Version 'Latest'
$ErrorActionPreference = 'Stop'
$base64Snk = $env:SNK
if( -not $base64Snk )
{
return
}
$snkPath = Join-Path -Path $PSScriptRoot -ChildPath 'Source\Carbon.snk'
Write-Verbose -Message ('Saving signing key to "{0}".' -f $snkPath)
[IO.File]::WriteAllBytes($snkPath, [Convert]::FromBase64String($base64Snk))
|
combined_dataset/train/non-malicious/sample_66_77.ps1 | sample_66_77.ps1 | <policyDefinitionResources revision="1.0" schemaVersion="1.0">
<displayName>
</displayName>
<description>
</description>
<resources>
<stringTable>
<string id="LAPS">LAPS</string>
<string id="LAPS_BackupDirectory">Настройка каталога резервного копирования паролей</string>
<string id="LAPS_BackupDirectory_Help">Используйте этот параметр, чтобы настроить каталог, в который архивется пароль локальной учетной записи администратора.
Допустимые параметры:
0=Отключено (резервное копирование пароля выполняться не будет)
1= Резервное копирование пароля для Azure Active Directory
2=Резервное копирование пароля в Active Directory
Если этот параметр не указан, по умолчанию используется значение 0 (отключено).
Если этот параметр имеет значение 1 и управляемое устройство не присоединено к Azure Active Directory, локальный пароль администратора не будет управляться.
Если этот параметр имеет значение 2 и управляемое устройство не присоединено к Active Directory, локальный пароль администратора не будет управляться.
Если этот параметр отключен или не настроен, пароль локального администратора не управляется.
Дополнительные https://go.microsoft.com/fwlink/?linkid=2188435 см. в https://go.microsoft.com/fwlink/?linkid=2188435.
</string>
<string id="LAPS_BackupDirectoryDisabled">Отключено</string>
<string id="LAPS_BackupDirectoryAzure">Azure Active Directory</string>
<string id="LAPS_BackupDirectoryAD">Active Directory</string>
<string id="LAPS_PasswordSettings">Параметры паролей</string>
<string id="LAPS_PasswordSettings_Help">Настройка параметров паролей
Сложность пароля: какие символы используются при создании нового пароля
По умолчанию: большие буквы, маленькие буквы, цифры и специальные символы
Длина пароля
Минимум 8 символов
Максимум 64 символа
По умолчанию: 14 символов
Возраст пароля в днях
Минимум: 1 день (7 дней, если каталог резервного копирования настроен как Azure AD)
Не более 365 дней
По умолчанию: 30 дней
Длина парольной фразы
Минимум: 3 слова
Максимум: 10 слов
По умолчанию: 6 слов
Дополнительные сведения см. на странице https://go.microsoft.com/fwlink/?linkid=2188435.
Список парольных фраз взят из "Deep Dive. Новые списки слов EFF для случайных парольных фраз" от Electronic Frontier Foundation и используется под лицензией CC-BY-3.0 Attribution. Дополнительные сведения см. на странице https://go.microsoft.com/fwlink/?linkid=2255471.
</string>
<string id="LAPS_PwdComplexity_Item_1">Большие буквы</string>
<string id="LAPS_PwdComplexity_Item_2">Большие и маленькие буквы</string>
<string id="LAPS_PwdComplexity_Item_3">Большие буквы + маленькие буквы + цифры</string>
<string id="LAPS_PwdComplexity_Item_4">Большие буквы + маленькие буквы + цифры + специальные знаки</string>
<string id="LAPS_PwdComplexity_Item_5">Большие буквы + маленькие буквы + цифры + специальные знаки (улучшенная читаемость)</string>
<string id="LAPS_PwdComplexity_Item_6">Парольная фраза (длинные слова)</string>
<string id="LAPS_PwdComplexity_Item_7">Парольная фраза (короткие слова)</string>
<string id="LAPS_PwdComplexity_Item_8">Парольная фраза (короткие слова с уникальными префиксами)</string>
<string id="LAPS_AdminName">Имя учетной записи администратора для управления</string>
<string id="LAPS_AdminName_Help">Этот параметр политики указывает пользовательское имя учетной записи администратора для управления паролем.
Если этот параметр политики включен, LAPS будет управлять паролем для локальной учетной записи с этим именем.
Если этот параметр политики отключен или не настроен, LAPS будет управлять паролем для известной учетной записи администратора.
НЕ ВКЛЮЧАЙТЕ этот параметр политики для управления встроенной учетной записью администратора. Встроенная учетная запись администратора определяется автоматически по известному SID и не зависит от имени учетной записи.
Дополнительные сведения см. по ссылку https://go.microsoft.com/fwlink/?linkid=2188435.
</string>
<string id="LAPS_DontAllowPwdExpirationBehindPolicy">Не разрешайте сроку действия пароля превышать время, требуемое политикой.</string>
<string id="LAPS_DontAllowPwdExpirationBehindPolicy_Help">Если этот параметр включен или не задан, запланированный срок действия пароля превышает срок действия пароля, заданный политикой "Пароль Параметры". При обнаружении такого срока действия пароль немедленно меняется, а срок действия пароля определяется в соответствии с политикой.
Если этот параметр отключен, срок действия пароля может быть больше, чем требуется политикой "Пароль Параметры".
Дополнительные https://go.microsoft.com/fwlink/?linkid=2188435 см. в https://go.microsoft.com/fwlink/?linkid=2188435.
</string>
<string id="LAPS_ADPasswordEncryptionEnabled">Включить шифрование паролей</string>
<string id="LAPS_ADPasswordEncryptionEnabled_Help">Если этот параметр включен, управляемый пароль шифруется перед отправкой в Active Directory.
Включение этого параметра не действует, если 1) для пароля настроено резервное копирование в Active Directory; 2) режим работы домена Active Directory находится на Windows Server 2016 выше.
Если этот параметр включен, а режим работы домена не превышает Windows Server 2016, пароль управляемой учетной записи шифруется.
Если этот параметр включен, а режим работы домена меньше Windows Server 2016, пароль управляемой учетной записи не будет архивироваться в каталоге.
Если этот параметр отключен, пароль управляемой учетной записи не шифруется.
Этот параметр будет включен по умолчанию, если он не настроен.
Дополнительные https://go.microsoft.com/fwlink/?linkid=2188435 см. в https://go.microsoft.com/fwlink/?linkid=2188435.
</string>
<string id="LAPS_ADPasswordEncryptionPrincipal">Настройка авторизованных дешифраторов паролей</string>
<string id="LAPS_ADPasswordEncryptionPrincipal_Help">Настройте этот параметр для управления определенным пользователем или группой, которые авторизованы расшифровывать зашифрованные пароли.
Настройка этого параметра не действует, если не включено шифрование пароля.
Если этот параметр включен, зашифрованные пароли будут расшифровываться указанной группой.
Если этот параметр отключен или не настроен, зашифрованные пароли будут расшифровываться группой администраторов домена.
В этом параметре необходимо указать либо имя группы или пользователя с указанием домена, либо идентификатор безопасности в строковом формате. Допустимые примеры:
contoso\LAPSAdmins
lapsadmins@contoso.com
S-1-5-21-2127521184-1604012920-1887927527-35197
Не заключайте имя пользователя\группы или идентификатор безопасности в кавычки или круглые скобки.
Указанный пользователь или группа должны быть распознаваемы управляемым устройством, иначе пароли не будут сохранены.
ПРИМЕЧАНИЕ. Этот параметр игнорируется, когда пароли учетных записей режима восстановления служб каталогов (DSRM) резервируются на контроллере домена. В данном случае этот параметр по умолчанию всегда соответствует группе "Администраторы домена" домена контроллера домена.
Дополнительные сведения см. на странице "https://go.microsoft.com/fwlink/?linkid=2188435".
</string>
<string id="LAPS_ADEncryptedPasswordHistorySize">Настройка размера журнала зашифрованных паролей</string>
<string id="LAPS_ADEncryptedPasswordHistorySize_Help">Используйте этот параметр, чтобы указать, сколько предыдущих зашифрованных паролей будет храниться в Active Directory.
Настройка этого параметра не действует, если 1) пароль не настроен для резервного копирования в Active Directory и 2) не включено шифрование пароля.
Если этот параметр включен, указанное количество старых паролей будет храниться в Active Directory.
Если этот параметр отключен или не настроен, в Active Directory не будет храниться ни одного старого пароля.
Этот параметр имеет минимально допустимое значение 0 паролей.
Этот параметр имеет максимально допустимое значение 12 паролей.
Дополнительные сведения см. по ссылке https://go.microsoft.com/fwlink/?linkid=2188435.
</string>
<string id="LAPS_ADBackupDSRMPassword">Включить резервное копирование паролей для учетных записей DSRM</string>
<string id="LAPS_ADBackupDSRMPassword_Help">Если этот параметр включен, пароль учетной записи администратора DSRM будет управляться и архивироваться в Active Directory.
Включение этого параметра не действует, если управляемое устройство не является контроллером домена и шифрование паролей также включено.
Если этот параметр включен, резервное копирование пароля для учетной записи администратора DSRM на контроллере домена будет выполняться в Active Directory.
Если этот параметр отключен или не настроен, резервное копирование пароля для учетной записи администратора DSRM на контроллере домена в Active Directory выполняться не будет.
Дополнительные https://go.microsoft.com/fwlink/?linkid=2188435 см. в https://go.microsoft.com/fwlink/?linkid=2188435.
</string>
<string id="LAPS_PostAuthenticationActions">Действия после проверки подлинности</string>
<string id="LAPS_PostAuthenticationActions_Help">Эта политика настраивает действия после проверки подлинности, которые будут выполняться после обнаружения проверки подлинности управляемой учетной записью.
Льготный период: указывает количество времени (в часах) ожидания после проверки подлинности перед выполнением указанных действий после проверки подлинности.
Если этот параметр включен и больше нуля, указанные действия после проверки подлинности будут выполняться по истечении льготного периода.
Если этот параметр отключен или не настроен, указанные действия после проверки подлинности будут выполняться по истечении стандартного 24-часового льготного периода.
Если этот параметр равен нулю, никакие действия после проверки подлинности выполняться не будут.
Действия: указывает действия, которые следует предпринять по истечении льготного периода.
Сброс пароля: по истечении льготного периода пароль управляемой учетной записи сбрасывается.
Сброс пароля и выход из управляемой учетной записи: по истечении льготного периода пароль управляемой учетной записи сбрасывается, а для всех интерактивных сеансов входа с использованием управляемой учетной записи выполняется выход.
Сброс пароля и перезагрузка: по истечении льготного периода пароль управляемой учетной записи сбрасывается, а управляемое устройство перезагружается.
Сброс пароля, выход из управляемой учетной записи и завершение любых оставшихся процессов: по истечении льготного периода пароль управляемой учетной записи сбрасывается, для всех интерактивных сеансов входа с использованием управляемой учетной записи выполняется выход и завершаются любые оставшиеся сеансы.
(ПРИМЕЧАНИЕ: после завершения любых интерактивных сеансов входа управляемая учетная запись может по-прежнему использовать другие сеансы с проверкой подлинности. Единственный надежный способ гарантировать, что предыдущий пароль используется дольше, — это перезагрузить устройство.)
Если этот параметр отключен или не настроен, действиями после проверки подлинности по умолчанию будут: "Сброс пароля и выход из управляемой учетной записи".
Примечание. Учетную запись DSRM на контроллерах домена нельзя настроить для действий после проверки подлинности. Эта политика не влияет на контроллеры домена и будет игнорироваться, даже если она настроена для контроллера домена.
Подробнее см. по адресу https://go.microsoft.com/fwlink/?linkid=2188435.
</string>
<string id="PostAuthenticationActions_Item0">Отключено — не выполнять никаких действий</string>
<string id="PostAuthenticationActions_Item1">Сброс пароля</string>
<string id="PostAuthenticationActions_Item3">Сбросьте пароль и выйдите из управляемой учетной записи</string>
<string id="PostAuthenticationActions_Item5">Сбросьте пароль и перезагрузите устройство</string>
<string id="PostAuthenticationActions_Item11">Сбросьте пароль, выйдите из управляемой учетной записи и завершите все оставшиеся процессы</string>
<string id="LAPS_AutomaticAccountManagementPolicy">Настройка автоматического управления учетными записями</string>
<string id="LAPS_AutomaticAccountManagementPolicy_Help">Эта политика настраивает параметры политики автоматического управления учетной записью.
Укажите целевую учетную запись для управления: указывает, следует ли управлять встроенной учетной записью администратора или настраиваемой учетной записью.
Автоматическое имя учетной записи (или префикс имени): указывает имя или префикс имени, которое будет использовано для управляемой учетной записи.
Если этот параметр политики настроен, Windows LAPS будет использовать его в качестве имени или префикса имени для целевой учетной записи.
Если этот параметр политики не настроен, Windows LAPS будет использовать "WLapsAdmin" в качестве имени или префикса имени для целевой учетной записи.
Примечание. Это имя используется как префикс, если настроена рандомизация имени учетной записи. См. комментарии ниже.
Включить управляемую учетную запись: указывает, следует ли включить управляемую учетную запись.
Если этот параметр политики настроен, Windows LAPS включит указанную управляемую учетную запись.
Если этот параметр политики не настроен, Windows LAPS отключит указанную управляемую учетную запись.
Примечание. Windows LAPS будет поддерживать пароль управляемой учетной записи и производить его периодическую смену независимо от того, находится ли учетная запись в состоянии "включено" или "отключено".
Рандомизация имени управляемой учетной записи: указывает, должно ли имя управляемой учетной записи содержать случайный компонент (генерируемый случайным образом численный суффикс).
Если этот параметр политики настроен, Windows LAPS добавит восьмизначный числовой суффикс (генерируемый случайным образом) к имени управляемой автоматической учетной записи и будет заново рандомизировать имя управляемой учетной записи при каждой регулярно проводимой очередной смене пароля.
Если этот параметр политики не настроен, Windows LAPS будет использовать имя автоматической управляемой учетной записи в том виде, в каком оно настроено.
Если настроен префикс имени автоматической управляемой учетной записи, Windows LAPS использует до 12 (двенадцати) начальных символов этого имени в качестве префикса для рандомизированного имени. Если имя автоматической управляемой учетной записи не настроено, Windows LAPS будет использовать в качестве префикса имени "WLapsAdmin".
Примечание. Учетную запись DSRM на контроллерах домена нельзя настроить для автоматического управления учетными записями. Эта политика не влияет на контроллеры домена и будет проигнорирована, даже если настроена для контроллера домена.
Подробнее см. на странице https://go.microsoft.com/fwlink/?linkid=2188435.
</string>
<string id="AutomaticAccountManagementTarget_Item0">Управление встроенной учетной записью администратора</string>
<string id="AutomaticAccountManagementTarget_Item1">Управление настраиваемой учетной записью администратора</string>
<string id="AutomaticAccountName_Help">Укажите имя или префикс имени учетной записи</string>
<string id="AutomaticAccountNameRandomization_Help">Указывает, следует ли случайным образом указать имя автоматической учетной записи.</string>
<string id="SUPPORTED_Windows10">Не менее Microsoft Windows 10 или более поздней версии</string>
</stringTable>
<presentationTable>
<presentation id="LAPS_BackupDirectory">
<dropdownList refId="LAPS_BackupDirectory" defaultItem="1">Каталог резервного копирования</dropdownList>
</presentation>
<presentation id="LAPS_PasswordSettings">
<dropdownList refId="LAPS_PasswordComplexity" defaultItem="3">Сложность пароля</dropdownList>
<decimalTextBox refId="LAPS_PasswordLength" defaultValue="14">Длина пароля</decimalTextBox>
<decimalTextBox refId="LAPS_PasswordAgeDays" defaultValue="30">Срок действия пароля (в днях)</decimalTextBox>
<decimalTextBox refId="LAPS_PassphraseLength" defaultValue="6">Длина парольной фразы (в словах)</decimalTextBox>
</presentation>
<presentation id="LAPS_AdminName">
<textBox refId="TEXT_AdminAccountName">
<label>Имя учетной записи администратора</label>
</textBox>
</presentation>
<presentation id="LAPS_ADPasswordEncryptionPrincipal">
<textBox refId="TEXT_ADPasswordEncryptionPrincipal">
<label>Авторизованный дешифратор паролей</label>
</textBox>
</presentation>
<presentation id="LAPS_ADEncryptedPasswordHistorySize">
<decimalTextBox refId="LAPS_ADEncryptedPasswordHistorySize_INT" defaultValue="0">Размер журнала зашифрованных паролей</decimalTextBox>
</presentation>
<presentation id="LAPS_PostAuthenticationActions">
<decimalTextBox refId="LAPS_PostAuthenticationResetDelay_INT" defaultValue="24">Льготный период (часы):</decimalTextBox>
<dropdownList refId="LAPS_PostAuthenticationActions" defaultItem="2">Действия:</dropdownList>
</presentation>
<presentation id="LAPS_AutomaticAccountManagementPolicy">
<dropdownList refId="LAPS_AutomaticAccountManagementTarget" defaultItem="0">Укажите целевую учетную запись для управления:</dropdownList>
<textBox refId="LAPS_AutomaticAccountManagementNameOrPrefix">
<label>Имя или префикс имени автоматической учетной записи</label>
</textBox>
<checkBox refId="LAPS_AutomaticAccountManagementEnableAccount">Включить управляемую учетную запись</checkBox>
<checkBox refId="LAPS_AutomaticAccountManagementRandomizeName">Рандомизация имени управляемой учетной записи</checkBox>
</presentation>
</presentationTable>
</resources>
</policyDefinitionResources>
|
combined_dataset/train/non-malicious/2165.ps1 | 2165.ps1 |
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true, ParameterSetName="AppName", HelpMessage="Specify the app name to search for within the App Store.")]
[ValidateNotNullOrEmpty()]
[ValidatePattern("^[A-Za-z\s]*$")]
[string]$AppName,
[parameter(Mandatory=$true, ParameterSetName="Url", HelpMessage="Specify the URL pointing to the app in the App Store.")]
[ValidateNotNullOrEmpty()]
[string]$URL,
[parameter(Mandatory=$true, ParameterSetName="AppName", HelpMessage="Path to a folder where the app image will be downloaded to.")]
[parameter(Mandatory=$true, ParameterSetName="Url")]
[ValidateNotNullOrEmpty()]
[ValidatePattern("^[A-Za-z]{1}:\\\w+")]
[ValidateScript({
if ((Split-Path -Path $_ -Leaf).IndexOfAny([IO.Path]::GetInvalidFileNameChars()) -ge 0) {
Throw "$(Split-Path -Path $_ -Leaf) contains invalid characters"
}
else {
if (Test-Path -Path $_ -PathType Container) {
return $true
}
else {
Throw "Unable to locate part of or the whole specified path, specify a valid path"
}
}
})]
[string]$Path
)
Process {
$StoreAppName = ($AppName -replace " ", "+").ToLower()
switch ($PSCmdlet.ParameterSetName) {
"AppName" {
$SearchURL = "https://itunes.apple.com/search?term=$($StoreAppName)&entity=software&limit=1"
$SearchWebRequest = Invoke-WebRequest -Uri $SearchURL
$AppLink = (ConvertFrom-Json -InputObject $SearchWebRequest).Results | Select-Object -ExpandProperty trackViewUrl
}
"Url" {
$AppLink = $URL
}
}
if ($AppLink -ne $null) {
$WebRequest = Invoke-WebRequest -Uri $AppLink
$AppIcon = $WebRequest.Images | Where-Object { ($_.Width -eq 175) -and ($_.Class -like "artwork") }
if ($AppIcon -ne $null) {
$WebClient = New-Object System.Net.WebClient
$WebClient.DownloadFile($AppIcon."src-swap", "$($Path)\$($AppIcon.alt).jpg")
$AppImage = [PSCustomObject]@{
ImageName = $AppIcon.alt
ImagePath = "$($Path)\$($AppIcon.alt).jpg"
}
Write-Output -InputObject $AppImage
}
}
else {
Write-Warning -Message "Unable to determine app link for specified app: $($AppName)"
}
}
End {
$WebClient.Dispose()
} |
combined_dataset/train/non-malicious/Get-Codecs.ps1 | Get-Codecs.ps1 | [string[]]$key = "SOFTWARE\\Classes\\CLSID\\{083863F1-70DE-11d0-BD40-00A0C911CE86}\\Instance",
"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Drivers32"
function ModuleInfo([string]$path) {
$item.SubItems.Add((gci $path).VersionInfo.CompanyName)
$item.SubItems.Add((gci $path).VersionInfo.FileDescription)
}
function ItemsCount {
$sbCount.Text = $lvPage1.Items.Count.ToString() + " item(s)"
}
$mnuScan_Click= {
#clear both ListView before each scan
$lvPage1.Items.Clear()
$lvPage2.Items.Clear()
<#
Do not use Get-ChildItem cmdlet if you want quick scan!
#>
$reg = [Microsoft.Win32.Registry]::LocalMachine
$rk = $reg.OpenSubKey($key[0])
$rk.GetSubKeyNames() | % {
#adding name of filters
$name = $reg.OpenSubKey($($key[0] + "\\" + $_))
$item = $lvPage1.Items.Add($name.GetValue("FriendlyName"))
$name.Close()
#adding its CLSID
$item.SubItems.Add($_)
#adding path and additional info of filters
$path = $reg.OpenSubKey($("SOFTWARE\\Classes\\CLSID\\" + "\\" + $_ + "\\InprocServer32"))
$item.SubItems.Add($path.GetValue(""))
ModuleInfo($path.GetValue(""))
$path.Close()
}
$rk.Close()
$rk = $reg.OpenSubKey($key[1])
$rk.GetValueNames() | % {
$item = $lvPage2.Items.Add($_)
#hypothetical directory
$file = $rk.GetValue($_)
if (-not (Test-Path $file)) {
#another possible directory of driver
$pos = [Environment]::SystemDirectory + "\\" + $file
if (Test-Path $pos) {
$item.SubItems.Add($pos)
ModuleInfo($pos)
}
}
else {
$item.SubItems.Add($file)
ModuleInfo($file)
}
}
$rk.Close()
ItemsCount
}
$tcPage2_Enter= {
$sbCount.Text = $lvPage2.Items.Count.ToString() + " item(s)"
}
#this is about form load function
$frmMain_Load= {
try {
$icon = [Drawing.Icon]::ExtractAssociatedIcon($($pshome + "\\powershell.exe"))
$pbImage.Image = $icon.ToBitmap()
}
catch {}
}
function frmMain_Show {
Add-Type -AssemblyName System.Windows.Forms
[Windows.Forms.Application]::EnableVisualStyles()
$frmMain = New-Object Windows.Forms.Form
$mnuMain = New-Object Windows.Forms.MainMenu
$mnuFile = New-Object Windows.Forms.MenuItem
$mnuScan = New-Object Windows.Forms.MenuItem
$mnuExit = New-Object Windows.Forms.MenuItem
$mnuHelp = New-Object Windows.Forms.MenuItem
$mnuInfo = New-Object Windows.Forms.MenuItem
$tabCtrl = New-Object Windows.Forms.TabControl
$tcPage1 = New-Object Windows.Forms.TabPage
$lvPage1 = New-Object Windows.Forms.ListView
$chFName = New-Object Windows.Forms.ColumnHeader
$chCLSID = New-Object Windows.Forms.ColumnHeader
$chFPath = New-Object Windows.Forms.ColumnHeader
$chFPubl = New-Object Windows.Forms.ColumnHeader
$chFDesc = New-Object Windows.Forms.ColumnHeader
$tcPage2 = New-Object Windows.Forms.TabPage
$lvPage2 = New-Object Windows.Forms.ListView
$chDName = New-Object Windows.Forms.ColumnHeader
$chDPath = New-Object Windows.Forms.ColumnHeader
$chDPubl = New-Object Windows.Forms.ColumnHeader
$chDDesc = New-Object Windows.Forms.ColumnHeader
$sbCount = New-Object Windows.Forms.StatusBar
#
#mnuMain
#
$mnuMain.MenuItems.AddRange(@($mnuFile, $mnuHelp))
#
#mnuFile
#
$mnuFile.MenuItems.AddRange(@($mnuScan, $mnuExit))
$mnuFile.Text = "&File"
#
#mnuScan
#
$mnuScan.Shortcut = "F5"
$mnuScan.Text = "&Scan"
$mnuScan.Add_Click($mnuScan_Click)
#
#mnuExit
#
$mnuExit.Shortcut = "CtrlX"
$mnuExit.Text = "E&xit"
$mnuExit.Add_Click({$frmMain.Close()})
#
#mnuHelp
#
$mnuHelp.MenuItems.AddRange(@($mnuInfo))
$mnuHelp.Text = "&Help"
#
#mnuInfo
#
$mnuInfo.Text = "About"
$mnuInfo.Add_Click({frmAbout_Show})
#
#tabCtrl
#
$tabCtrl.Controls.AddRange(@($tcPage1, $tcPage2))
$tabCtrl.Dock = "Fill"
#
#tcPage1
#
$tcPage1.Controls.AddRange(@($lvPage1))
$tcPage1.Text = "DirectShow"
$tcPage1.UseVisualStyleBackColor = $true
$tcPage1.Add_Enter($tcPage1_Enter)
#
#lvPage1
#
$lvPage1.AllowColumnReorder = $true
$lvPage1.Columns.AddRange(@($chFName, $chCLSID, $chFPath, $chFPubl, $chFDesc))
$lvPage1.Dock = "Fill"
$lvPage1.FullRowSelect = $true
$lvPage1.GridLines = $false
$lvPage1.MultiSelect = $false
$lvPage1.ShowItemToolTips = $true
$lvPage1.Sorting = "Ascending"
$lvPage1.View = "Details"
#
#chFName
#
$chFName.Text = "Name"
$chFName.Width = 110
#
#chCLSID
#
$chCLSID.Text = "CLSID"
$chCLSID.Width = 241
#
#chFPath
#
$chFPath.Text = "Path"
$chFPath.Width = 215
#
#chFPubl
#
$chFPubl.Text = "Publisher"
$chFPubl.Width = 145
#
#chFDesc
#
$chFDesc.Text = "Description"
$chFDesc.Width = 300
#
#tcPage2
#
$tcPage2.Controls.AddRange(@($lvPage2))
$tcPage2.Text = "Drivers"
$tcPage2.UseVisualStyleBackColor = $true
$tcPage2.Add_Enter($tcPage2_Enter)
#
#lvPage2
#
$lvPage2.AllowColumnReorder = $true
$lvPage2.Columns.AddRange(@($chDName, $chDPath, $chDPubl, $chDDesc))
$lvPage2.Dock = "Fill"
$lvPage2.FullRowSelect = $true
$lvPage2.GridLines = $false
$lvPage2.MultiSelect = $false
$lvPage2.ShowItemToolTips = $true
$lvPage2.Sorting = "Ascending"
$lvPage2.View = "Details"
#
#chDName
#
$chDName.Text = "Name"
$chDName.Width = 100
#
#chDPath
#
$chDPath.Text = "Path"
$chDPath.Width = 210
#
#chDPubl
#
$chDPubl.Text = "Publisher"
$chDPubl.Width = 145
#
#chDDesc
#
$chDDesc.Text = "Description"
$chDDesc.Width = 300
#
#sbCount
#
$sbCount.SizingGrip = $false
#
#frmMain
#
$frmMain.ClientSize = New-Object Drawing.Size(573, 217)
$frmMain.Controls.AddRange(@($tabCtrl, $sbCount))
$frmMain.Menu = $mnuMain
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "Codecs"
[void]$frmMain.ShowDialog()
}
function frmAbout_Show {
$frmMain = New-Object Windows.Forms.Form
$pbImage = New-Object Windows.Forms.PictureBox
$lblName = New-Object Windows.Forms.Label
$lblCopy = New-Object Windows.Forms.Label
$btnExit = New-Object Windows.Forms.Button
#
#pbImage
#
$pbImage.Location = New-Object Drawing.Point(16, 16)
$pbImage.Size = New-Object Drawing.Size(32, 32)
$pbImage.SizeMode = "StretchImage"
#
#lblName
#
$lblName.Font = New-Object Drawing.Font("Microsoft Sans Serif", 9, [Drawing.FontStyle]::Bold)
$lblName.Location = New-Object Drawing.Size(53, 19)
$lblName.Size = New-Object Drawing.Size(360, 18)
$lblName.Text = "Codecs v1.00"
#
#lblCopy
#
$lblCopy.Location = New-Object Drawing.Point(67, 37)
$lblCopy.Size = New-Object Drawing.Size(360, 23)
$lblCopy.Text = "(C) 2012 Greg Zakharov gregzakh@gmail.com"
#
#btnExit
#
$btnExit.Location = New-Object Drawing.Point(135, 67)
$btnExit.Text = "OK"
#
#frmMain
#
$frmMain.AcceptButton = $btnExit
$frmMain.CancelButton = $btnExit
$frmMain.ClientSize = New-Object Drawing.Size(350, 110)
$frmMain.ControlBox = $false
$frmMain.Controls.AddRange(@($pbImage, $lblName, $lblCopy, $btnExit))
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.ShowInTaskbar = $false
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "About..."
$frmMain.Add_Load($frmMain_Load)
[void]$frmMain.ShowDialog()
}
frmMain_Show
|
combined_dataset/train/non-malicious/sample_42_71.ps1 | sample_42_71.ps1 | let resizeObserver;
let observerAddRemove;
export function FluentOverflowInitialize(dotNetHelper, id, isHorizontal, querySelector) {
var localSelector = querySelector;
if (!localSelector) {
// cannot use :scope for node.matches() further down
localSelector = ".fluent-overflow-item";
}
// Create a Add/Remove Observer, started later
observerAddRemove = new MutationObserver(mutations => {
mutations.forEach(mutation => {
// Only new node (type=childList)
if (mutation.type !== 'childList' && (mutation.addedNodes.length > 0 || mutation.removedNodes.length > 0)) {
return
}
// Only for localSelector element
const node = mutation.addedNodes.length > 0 ? mutation.addedNodes[0] : mutation.removedNodes[0];
if (node.nodeType !== Node.ELEMENT_NODE || !node.matches(localSelector)) {
return;
}
FluentOverflowResized(dotNetHelper, id, isHorizontal, querySelector);
});
});
// Create a ResizeObserver, started later
resizeObserver = new ResizeObserver((entries) => {
FluentOverflowResized(dotNetHelper, id, isHorizontal, querySelector);
});
// Start the resize observation
var el = document.getElementById(id);
if (el) {
resizeObserver.observe(el);
observerAddRemove.observe(el, { childList: true, subtree: false });
}
}
// When the Element[id] is resized, set overflow attribute to all element outside of this element.
// Except for elements with fixed attribute.
export function FluentOverflowResized(dotNetHelper, id, isHorizontal, querySelector) {
let container = document.getElementById(id); // Container
if (!container) return;
if (!querySelector) {
querySelector = ":scope .fluent-overflow-item";
}
else {
querySelector = ":scope " + querySelector;
}
let items = container.querySelectorAll(querySelector + ":not([fixed])"); // List of first level element of this container
let fixedItems = container.querySelectorAll(querySelector + "[fixed]"); // List of element defined as fixed (not "overflowdable")
let itemsTotalSize = 10;
let containerMaxSize = isHorizontal ? container.offsetWidth : container.offsetHeight;
let overflowChanged = false;
let containerGap = parseFloat(window.getComputedStyle(container).gap);
if (!containerGap) containerGap = 0;
// Size of all fixed elements
fixedItems.forEach(element => {
element.overflowSize = isHorizontal ? getElementWidth(element) : getElementHeight(element);
element.overflowSize += containerGap;
itemsTotalSize += element.overflowSize;
});
// Add overflow attribute, if the element is out of total size.
items.forEach(element => {
let isOverflow = element.hasAttribute("overflow");
// Compute element size (if not already set)
// Save this element.size in the attribute 'overflowSize'
if (!isOverflow) {
element.overflowSize = isHorizontal ? getElementWidth(element) : getElementHeight(element);
element.overflowSize += containerGap;
}
itemsTotalSize += element.overflowSize;
// Only check for overflow if the container has a size
if (containerMaxSize > 0) {
if (itemsTotalSize > containerMaxSize) {
// Add an attribute 'overflow'
if (!isOverflow) {
element.setAttribute("overflow", "");
overflowChanged = true;
}
}
else {
// Remove the attribute 'overflow'
if (isOverflow) {
element.removeAttribute("overflow");
overflowChanged = true;
}
}
}
});
// If an attribute 'overflow' has been added or removed,
// raise a C# method
if (overflowChanged) {
let listOfOverflow = [];
items.forEach(element => {
listOfOverflow.push({
Id: element.id,
Overflow: element.hasAttribute("overflow"),
Text: element.innerText.trim()
});
});
dotNetHelper.invokeMethodAsync("OverflowRaisedAsync", JSON.stringify(listOfOverflow));
}
}
export function FluentOverflowDispose(id) {
let el = document.getElementById(id);
if (el) {
resizeObserver.unobserve(el);
observerAddRemove.disconnect();
}
}
// Compute the element Width, including paddings, margins and borders.
function getElementWidth(element) {
var style = element.currentStyle || window.getComputedStyle(element);
var width = element.offsetWidth; // Width including paddings and borders
var margin = parseFloat(style.marginLeft) + parseFloat(style.marginRight);
return width + margin;
}
// Compute the element Height, including paddings, margins and borders.
function getElementHeight(element) {
var style = element.currentStyle || window.getComputedStyle(element);
var height = element.offsetHeight; // Height including paddings and borders
var margin = parseFloat(style.marginTop) + parseFloat(style.marginBottom);
return height + margin;
}
// SIG // Begin signature block
// SIG // MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // OVSU4FwfxqCigUOdQy4t0+ZuqQForRPJCjbwpMZp72Cg
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghoKMIIaBgIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCD7qfkVO3228H31OQ1IzQEEkmK54um1CnLg
// SIG // rNpPYAMW+TBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBALs02E8S
// SIG // R/7IshLNvgIAnNrPupoLI6vafBs5uacwa9gsODJqjHOE
// SIG // i303ZgzTKwdq+V7DxBzBv1CtbFlhS37lNa6XP4JXNhRJ
// SIG // PEC1djIRSSFDiNs0SyTNf8bTpOE1W7JIXvJOGW0XzJp1
// SIG // zdSNaFeeMfIghMCWSFAnAIM3KZt9Yrm1Yk96HzsaFWs1
// SIG // FeEzpTDRPhdYMBs7PzPTpqvBCXXFFIsTK1XgyGu1Kp+g
// SIG // OjpmrMmRYZJ9d0X12iDPSKNp01sWqcdM/HU3WuKbuEuR
// SIG // /mSbkrZVdl23rq9xd3GhrFqhRa1EAN0LF1/m8Tsm/69l
// SIG // UvfFYGpSXH92z9N7Bm1WIoXbJb2hgheUMIIXkAYKKwYB
// SIG // BAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdtMIIX
// SIG // aQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN
// SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQgqbEtzQZzNhx0t0phWPu+
// SIG // nkEBctKm6hvoKotkNyHwL/oCBmYX3JEvYhgTMjAyNDA0
// SIG // MTQyMTIwMDQuNzM4WjAEgAIB9KCB0aSBzjCByzELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0
// SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo
// SIG // aWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYD
// SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
// SIG // oIIR6jCCByAwggUIoAMCAQICEzMAAAHr4BhstbbvOO0A
// SIG // AQAAAeswDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTM0WhcN
// SIG // MjUwMzA1MTg0NTM0WjCByzELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl
// SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
// SIG // OkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG
// SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEAwRVoIdpW4Fd3iadN
// SIG // aKomhQbmGzXO4UippLbydeTawfwwW6FKMPFjzkz8W5+4
// SIG // HJiDhpsCZHfk8hceyjp868Z6Ad4br7/dX2blLoCLCk5w
// SIG // L4NgVP53ze2c5/SpNZqbidu0usVAx+KHRYl+dSAnCpeh
// SIG // BuHMSoHAwIp4oU/Ma6CVlQEy+6fG2358LHNaYoWZnLyL
// SIG // mBp29U2PbZ6XQoVq/RAEbgqN04kRozNi6eKYk9pQ+YZ3
// SIG // d1Whk3qTasmpKZAhldPnCvFbvx5CGXb8vs+RC96I03RS
// SIG // y+byfSAKIFn91wLt3e0qRWmqHosdHtaueQA/eGcAz/os
// SIG // 6i2nbAUd7c46tkX6wjS/k5ov42pUbaPyem4eHz4RxE5w
// SIG // wu/E9cn11EHRrZif7rSPwDcYux1fIAD84nfU2IzD22Kh
// SIG // vMucc/oCP0hco/mirRx1pisxFz7bV8wHHsSdRB+8G7ol
// SIG // ZN7BKzyvTC4NV2+oTORyFgNIxAGYShMneYR9lzIm82pG
// SIG // 6drNhCUFmrEHOAzGhdRLENQs4ApQ2CGBuq1IbnXyO5PC
// SIG // /SighLn0WyuZXUWDQKnXa/8kiX7mb9z0t/r7Q+l+qtR+
// SIG // FDpowynY6Ft6rOyUTGZh/X5BZDM2+mEs6+nl9S6GJtz6
// SIG // ztSXmuN0mM5Qd08/ODr7lUlezXInVbTaomXllqVY32r0
// SIG // fiY/yTkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBR0ngWs
// SIG // 1lXMbuKk/TuY09gfqgHq4TAfBgNVHSMEGDAWgBSfpxVd
// SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ
// SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
// SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
// SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
// SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt
// SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB
// SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G
// SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // g3TfL6D3fAvlVmT9/lvO3P0G3W1itLDrfWeJBDlp4Oyp
// SIG // oflg9i5zyUySiBGsZ4jnLfcDICfMkMsEfFh4Azr28Kna
// SIG // rC1GjODa3q7SOhSPa4Y4XmisTTZwWcx2Sw8JZC/bwhA3
// SIG // vUXNHRklXeQYNwlpJ1d7r1WrteBeeREk1iATWkEvQqaN
// SIG // jqc93EYAGFX2ixRmwKzXEb0lr0lG3iNiA6kcQuMQW0Yj
// SIG // UPtah1wwj59IRrF3y/spw2Z3An7Mza5YGU9uF4Ib082D
// SIG // B3F4qC1WKP9h5MqMOnSO7lCyWysS1/MB4bIsK4lyAwp4
// SIG // y1bBtBOW0fNkIHLHhIcW1NndUVR3ELZFBO1vc8Wamev4
// SIG // z5mqI2YF0Dt9148Th2GFWvwV3CLrvEjMz44wAG7o8E2s
// SIG // KWsywb/fey0QdGTmzXJCWMkEKRE0n5Td+o1vs+0f5xsi
// SIG // akWdx7WdZV1tX+sxAgHj/vXcup5nAq1XDqm0B1+2a/Fj
// SIG // 3IIRyQAA5ZuRMT4ecYtbTUZPouhdmvUqU3kJ2Vz+dMPi
// SIG // aE8SEkKu7wYo9p4rQLEi2lXjKqD4vjV5U1DWdjXbWxa+
// SIG // iIq/WSvbn2s9xcX7w2aN+ubyzqM5kDnv2fqbuL2Ocz5r
// SIG // TYlSHEJxcuyWTomVQyOWyHcEEWotqrhyiepbVHbItx4z
// SIG // Z4nrhO9n0+HlocbZpzeR2AgwggdxMIIFWaADAgECAhMz
// SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA
// SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN
// SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp
// SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx
// SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
// SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
// SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
// SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
// SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
// SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
// SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF
// SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc
// SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus
// SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130
// SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI
// SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes
// SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp
// SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+
// SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz
// SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO
// SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi
// SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5
// SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
// SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
// SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG
// SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
// SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf
// SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG
// SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw
// SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv
// SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH
// SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f
// SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK
// SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
// SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
// SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1
// SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
// SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL
// SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l
// SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ
// SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz
// SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7
// SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY
// SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX
// SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU
// SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz
// SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/
// SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1
// SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328
// SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
// SIG // ahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGkgc4w
// SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p
// SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV
// SIG // BAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1RTAtRDk0
// SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
// SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAgAaJdbtcMMGI
// SIG // FLVKMDJ6mL27pd6ggYMwgYCkfjB8MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOnG
// SIG // T0IwIhgPMjAyNDA0MTQxMjQ5MDZaGA8yMDI0MDQxNTEy
// SIG // NDkwNlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6cZP
// SIG // QgIBADAHAgEAAgIOkDAHAgEAAgIUEDAKAgUA6cegwgIB
// SIG // ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMC
// SIG // oAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3
// SIG // DQEBCwUAA4IBAQBwqqYuuhVqKc0pAUp1bHlJfp+UNC/Z
// SIG // DeJoVoQuYX4IXtHUDJKE5Ovr9w/R1VHpWQ05kI6XxclV
// SIG // crbFTN8mDRqOzOMB5qOITH60fHmSeTXg20y6TJEe77AB
// SIG // EilrRmjW0vw/WrgnUrTE7qhxrCnmxDc34qliPCMWh52z
// SIG // 3DayCciwoI9xyMfyyFqi4Hb7zL1XEnMWyJZKm44MOsFE
// SIG // CXSBJDZwDr1VZxCXsmRELvHs64lxe+kAVpiQUSAwo3o/
// SIG // xpu99WfRgxuEh0EhNH4xIO/3RWT0cF5v74hDJyT+r4ID
// SIG // AFDhj8BiG0be6CGWZqqKvWDs/7BfXrbjhLW6Ws2eYWUk
// SIG // iBVRMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
// SIG // EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
// SIG // ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
// SIG // dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
// SIG // bXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAesw
// SIG // DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzEN
// SIG // BgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgPu+a
// SIG // Gp8ilLRDML394PFnRbx6HeDCG9RYwhUhXkJAaBIwgfoG
// SIG // CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDOt2u+X2kD
// SIG // 4X/EgQ07ZNg0lICG3Ys17M++odSXYSws+DCBmDCBgKR+
// SIG // MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
// SIG // Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
// SIG // 6+AYbLW27zjtAAEAAAHrMCIEIPM5gZTPWQg2Z1FWI5sU
// SIG // YN0/dV/LBIasPfKr8EWvjzSkMA0GCSqGSIb3DQEBCwUA
// SIG // BIICADLSSz9BceflyOlbDy/Zu2ZYqMNlrvGhXJq4Le1H
// SIG // I/mwgVvktsCe4jBxrOklWQM2/+oh0mUHuoGgNWl65CB/
// SIG // gaQ55mJPXNZR1J57KynKIxNPWPwyUDhzyUbIesv/PCMN
// SIG // VvPkAuHTrE3PU8Twwyb8Br+XZ/qBXyAnJeKuHvOEPVun
// SIG // 1DmsH833TI7a2DLxrA6QS7XlE5HsY2ArLgMReArqE3rZ
// SIG // kP6KqN4k84XeTiokYoi1U9AUf65RwNtNe2FKLmM2FoIo
// SIG // VabPtj/gt6LI4F4/W+6J3VgzZ893AN5hasJMqRl/Mu07
// SIG // HbXOPjrpdfM3DmVm7QDPPmCvIqrP2z74GYJFnwGy8hmV
// SIG // bHAG9Lz1xwNP/+Xt//Nz+3BduzJ+7ZAYT88y9vY88lYk
// SIG // XDu3GUQMU4MORSgqUmuw5X9e7vQQzF2/NthYYmCrN6fK
// SIG // ZVHOvcK0zE5y6Jobu40sKmgFHUFJmDpTMai9lD+QNTsK
// SIG // gsEeSgNKT/uaDv+h6mhMRBCR3fGwtCEI44+o3nQeK+v4
// SIG // ulAUISu8W3C8YymnWFsQD/DjB67CAD945no61fNYRSLA
// SIG // 8WtgtNcJjv5NzgzKEdAFp0fhLvmfDkvs+ZtQkYuwxxok
// SIG // IK65QDZTYnX0ICqKO93z+fkYuX5a11HI1KgZiLjCvfpD
// SIG // 6TUS5CgE9ANJwchIJmkD8uja5hgF
// SIG // End signature block
|
combined_dataset/train/non-malicious/sample_29_60.ps1 | sample_29_60.ps1 | #
# Module manifest for module 'OCI.PSModules.Globallydistributeddatabase'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Globallydistributeddatabase.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '31a94d9b-5cc3-4808-88f0-6b82ed090ffe'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Globallydistributeddatabase Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Globallydistributeddatabase.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIGloballydistributeddatabaseNetwork',
'Get-OCIGloballydistributeddatabasePrivateEndpoint',
'Get-OCIGloballydistributeddatabasePrivateEndpointsList',
'Get-OCIGloballydistributeddatabaseShardedDatabase',
'Get-OCIGloballydistributeddatabaseShardedDatabasesList',
'Get-OCIGloballydistributeddatabaseWorkRequest',
'Get-OCIGloballydistributeddatabaseWorkRequestErrorsList',
'Get-OCIGloballydistributeddatabaseWorkRequestLogsList',
'Get-OCIGloballydistributeddatabaseWorkRequestsList',
'Invoke-OCIGloballydistributeddatabaseConfigureShardedDatabaseGsms',
'Invoke-OCIGloballydistributeddatabaseConfigureSharding',
'Invoke-OCIGloballydistributeddatabaseDownloadGsmCertificateSigningRequest',
'Invoke-OCIGloballydistributeddatabaseFetchConnectionString',
'Invoke-OCIGloballydistributeddatabaseFetchShardableCloudAutonomousVmClusters',
'Invoke-OCIGloballydistributeddatabasePatchShardedDatabase',
'Invoke-OCIGloballydistributeddatabasePrevalidateShardedDatabase',
'Move-OCIGloballydistributeddatabasePrivateEndpointCompartment',
'Move-OCIGloballydistributeddatabaseShardedDatabaseCompartment',
'New-OCIGloballydistributeddatabaseGsmCertificateSigningRequest',
'New-OCIGloballydistributeddatabasePrivateEndpoint',
'New-OCIGloballydistributeddatabaseShardedDatabase',
'New-OCIGloballydistributeddatabaseWallet',
'Remove-OCIGloballydistributeddatabasePrivateEndpoint',
'Remove-OCIGloballydistributeddatabaseShardedDatabase',
'Start-OCIGloballydistributeddatabaseShardedDatabase',
'Stop-OCIGloballydistributeddatabaseShardedDatabase',
'Update-OCIGloballydistributeddatabasePrivateEndpoint',
'Update-OCIGloballydistributeddatabaseShardedDatabase',
'Write-OCIGloballydistributeddatabaseSignedCertificateAndGenerateWallet'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Globallydistributeddatabase'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_23_43.ps1 | sample_23_43.ps1 | $ServerCertificateName = "CN=ServiceFabricServerCert"
$ClientCertificateName = "CN=ServiceFabricClientCert"
function IsSecurityX509([string]$ClusterConfigFilePath)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$properties = $jsonConfig.properties
if ($properties -ne $Null)
{
$security = $properties.security
if ($security -ne $Null )
{
$clusterCredentialType = $security.ClusterCredentialType
return ($clusterCredentialType -ne $Null -And $clusterCredentialType -eq "X509")
}
}
return $False
}
function IsLocalMachine([string] $MachineName)
{
return ($MachineName -eq $env:ComputerName) -Or ($MachineName -eq "localhost")
}
function GetHostName([string] $iPAddress)
{
$hostName = $iPAddress
if ([bool]($iPAddress -as [ipaddress]))
{
$hostName = [System.Net.Dns]::GetHostByAddress($iPAddress).HostName
}
return $hostName
}
function IsThisMachineServer([string] $ClusterConfigFilePath)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$nodes = $jsonConfig.nodes
Foreach ($node in $nodes)
{
$hostName = GetHostName -iPAddress $node.iPAddress
if (IsLocalMachine -MachineName $hostName)
{
return $True;
}
}
return $False
}
function InstallCertToLocal([string] $CertSetupScript)
{
invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ServerCertificateName'"
invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ClientCertificateName'"
$cerLoc = "cert:\LocalMachine\My"
$cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ServerCertificateName*" }
$serverthumbprint = $cert.Thumbprint
$cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ClientCertificateName*" }
$clientthumbprint = $cert.Thumbprint
return $serverthumbprint,$clientthumbprint
}
function IsOneBox([string] $ClusterConfigFilePath)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$nodes = $jsonConfig.nodes
$machineNames = $nodes.iPAddress | select -uniq
return ($machineNames.Count -eq 1)
}
function ExportCertificateToLocal([string]$PackageRoot, [string]$CertSetupScript, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$ClusterConfigFilePath)
{
$serverCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $serverThumbprint -Name "server"
$clientCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $clientThumbprint -Name "client"
Write-Host "Server certificate is exported to $($serverCertificate[0]) with the password $($serverCertificate[1])"
Write-Host "Client certificate is exported to $($clientCertificate[0]) with the password $($clientCertificate[1])"
# If the current machine is server, then remove the client cert. If the current machine is client, then remove server cert.
if (IsThisMachineServer -ClusterConfigFilePath $ClusterConfigFilePath)
{
if (-Not (IsOneBox -ClusterConfigFilePath $ClusterConfigFilePath))
{
Write-Host "Remove client certificate on localhost."
invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ClientCertificateName'"
}
}
else
{
Write-Host "Remove server certificate on localhost."
invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ServerCertificateName'"
}
return $serverCertificate
}
function ExportCertificate([string]$PackageRoot, [string]$Thumbprint, [string] $Name)
{
$OutputCertificateFolder = Join-Path $PackageRoot "Certificates"
if (-Not(Test-Path $OutputCertificateFolder))
{
try
{
New-Item -ItemType Directory -Force -Path $OutputCertificateFolder -ErrorAction Stop | Out-Null
}
catch
{
Write-Error "Unable to create output certificate directory $OutputCertificateFolder. Error: $_"
exit 1
}
}
$PfxFilePath = "$OutputCertificateFolder\$Name.pfx"
$randomnum = Get-Random
$pswd = ConvertTo-SecureString -String "$randomnum" -Force -AsPlainText
Get-ChildItem -Path "cert:\localMachine\my\$Thumbprint" | Export-PfxCertificate -FilePath $PfxFilePath -Password $pswd > $null
return $PfxFilePath,$randomnum
}
function ModifyJsonThumbprint([string]$ClusterConfigFilePath, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$OutputPath)
{
Write-Host "Modify thumbprint in $ClusterConfigFilePath"
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$securityCertInfo = New-Object -TypeName PSObject
$certificate= New-Object –TypeName PSObject
$certificate | Add-Member -Name "Thumbprint" -value "$ServerThumbprint" -MemberType NoteProperty
$certificate | Add-Member -Name "X509StoreName" -value "My" -MemberType NoteProperty
$clientcertificate = New-Object -TypeName PSObject
$clientcertificate | Add-Member -Name "CertificateThumbprint" -value "$ClientThumbprint" -MemberType NoteProperty
$clientcertificate | Add-Member -Name "IsAdmin" -value $true -MemberType NoteProperty
$clientcertificateArray = @()
$clientcertificateArray += $clientcertificate
$securityCertInfo | Add-Member -Name "ClusterCertificate" -value $certificate -MemberType NoteProperty
$securityCertInfo | Add-Member -Name "ServerCertificate" -value $certificate -MemberType NoteProperty
$securityCertInfo | Add-Member -Name "ClientCertificateThumbprints" -value $clientcertificateArray -MemberType NoteProperty
if (IsReverseProxyEndPointConfigured -ClusterConfigFilePath $ClusterConfigFilePath)
{
$securityCertInfo | Add-Member -Name "ReverseProxyCertificate" -value $certificate -MemberType NoteProperty
}
$jsonConfig.properties.security.CertificateInformation = $securityCertInfo
$jsonObject = ConvertTo-Json $jsonConfig -Depth 10
$jsonObject > $OutputPath
}
function IsReverseProxyEndPointConfigured([string]$ClusterConfigFilePath)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$nodes = $jsonConfig.nodes
$properties = $jsonConfig.properties
$nodetypes = $properties.nodetypes
foreach($node in $nodes)
{
$nodetypeRef = $node.nodetypeRef
foreach($nodetype in $nodetypes)
{
if ($nodetype.Name -eq $nodetypeRef)
{
if ($nodetype.reverseProxyEndpointPort -ne $Null)
{
return $True;
}
}
}
}
return $False
}
function AddToTrustedHosts([string]$MachineName)
{
Write-Host "Adding $MachineName to TrustedHosts"
Set-Item WSMan:\localhost\Client\TrustedHosts -Value "$MachineName" -Concatenate -Force
}
function InstallCertToRemote([string]$ClusterConfigFilePath, [string]$CertificatePath, [string]$Password)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$nodes = $jsonConfig.nodes
$pswd = ConvertTo-SecureString -String $Password -Force -AsPlainText
$certBytes = [System.IO.File]::ReadAllBytes($CertificatePath)
$iPAddressList = $nodes.iPAddress | select -uniq
Foreach ($iPAddress in $iPAddressList)
{
$machineName = GetHostName -iPAddress $iPAddress
if (IsLocalMachine -MachineName $machineName)
{
Write-Host "Skipping certificate installation in $machineName."
continue
}
AddToTrustedHosts -MachineName $machineName
Write-Host "Connectting to $machineName"
for($retry = 0; $retry -le 2; $retry ++)
{
Write-Host "Installing server certificate in $machineName for iteration $retry"
Invoke-Command -ComputerName $machineName -ScriptBlock {
param($pswd, $certBytes)
Get-ChildItem -Path Cert:\LocalMachine\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force
Get-ChildItem -Path Cert:\LocalMachine\root | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force
Get-ChildItem -Path Cert:\CurrentUser\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force
$certPath = [System.IO.Path]::GetTempFileName()
[system.IO.file]::WriteAllBytes($certPath, $certBytes);
Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\My -FilePath $certPath -Password $pswd > $null
Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\root -FilePath $certPath -Password $pswd > $null
Import-PfxCertificate -Exportable -CertStoreLocation Cert:\CurrentUser\My -FilePath $certPath -Password $pswd > $null
} -ArgumentList $pswd,$certBytes
if ($?)
{
Write-Host "Installed server certificate in $machineName"
break
}
if ($retry -eq 2)
{
Write-Host "Installing server certificate in $machineName failed after 3 attemps"
}
else
{
Write-Host "Unable to intall server certificate in $machineName, retry after 30 seconds..."
Start-Sleep -Seconds 30
}
}
}
}
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBes9mKwSwmEyt5
# rlIN/UE8nv4hdY7kCy+udFdDWSrVDaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA+B+EZukwaT8LuzTsxMFVRL
# J48wx+tVOjsI7NKS8YM/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAkBHW6rSjAhaOM+iRr9TSC5ZGNtbJNXUrzrnPoqiyVgB5yQzA2OGnegVr
# DT0rmyYlObUahXRvRRJxS9/sC2fRyWH0ENaZ9VN3vWud8ShN0s1weHCVWN9wKR4O
# 0RpZByMbrz2vv7mr3YMeXfajH8hVndyjHKUHwkCf6R8OOKwW7IokiU/rm32hsqx3
# GYdLvtVlTlOWPPzymCs6AHb47f330Lv9PEp064ojyGNEAme3lFNbg7sJ22jn5IDD
# IM/MJPqS81zSImej+NQ/IYOi9KtvxM5IJQf1Te2hiWi2WHtY7mRV9cEzZqNQCJ4p
# 64k2PeEBglzgjw5Wl6tRuTFwSrM0xaGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDzs93g97dEi25QECWYQnj685YN+0NpiYsK2+PhwUGJVQIGZc4NjVQM
# GBMyMDI0MDIxNTIxNDg0Ni40NDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHsMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP
# MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XiMBDAiGA8yMDI0MDIxNTEzMTEz
# MloYDzIwMjQwMjE2MTMxMTMyWjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpeIwE
# AgEAMAkCAQACAQYCAf8wBwIBAAICEGUwCgIFAOl53YQCAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEAAyppjNtMaK3exqVr0XKhQZ3TH629EVMQIJF583jdnZjx
# pxjkULaLAkHOj8taW1HyxQ/uFJaba7yTfns/CIuGc2nLuRAr1+puVtc2Te/EzKcr
# OhXgOcoThxjGGsyjA1wf4emKeRYExK7zOeFc2W3QYrw/U0J9dTI6OSGE8Ir2G3Yz
# e7rTQ1UivDBOp5HhjkvmNNPvBm1vfS6iE6xW5ku7KQPtzmY8qdcVtujTqXFmeo2F
# pAhaVVTFDFka6QWr0nME3XR1uLQe3X/0xia0Fa+VTmnWURAAN3DOZw13Ilu0rYsg
# 81lb9cTgwMnNpHGDLB6SWNJyzCDpZyWt0VW2MIcTBjGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB88UKQ64DzB0xAAEAAAHz
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEIEbEpALSkvfhQn+NOIGg+92HAzrAKSBgLZr2OnYxltIE
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgGLzZNIu24bhWSnzAGYmT9P5E
# CHzjWwb9oM7DGDo7YugwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAiBCAEb2+7Ts1WUcNQtYDML7vx8Jgp
# 8YvKbMP/ElU6xdpRQTANBgkqhkiG9w0BAQsFAASCAgB0eKczg5dOdYccHFdJLu9a
# 75AXT1vpr3I6Ds5LiU0+kWu+HgumgBnDrfP445L1RQqkOHlK6yi6dVspHf/vzttq
# h0Z2QoeAVJIjEcaiypTAxbjGhCzj13WMRRo8ZE94N6nG/msnKGbgOJTl0IB9OXfz
# Pxv65iOCVYWuLUXj++kbtWvUdnAwrQhMF4bvcoXG/l+7ZlXIhEWeJmHV1/ZW8vBl
# Mqky/OL7ZFqSycG+01GPPgGJYqr/sqh/mVhm8ihjpYlS20a5PRdF6ZuppKKo9hQ2
# KEDTfjJst4kdPzYRK0Q9K2xwjiWHIkWOvBpBWOE7HB0HZc+AuXwNxLfpGvumriCL
# Wbj16Nq6ktmlLb7y1JIUpijUMMa8X9H5Pq23Ko9FH9kh7vYYeUByejajjz3HnfTh
# oQjAK34FjfBjShl61Iw/7G4yE4dNaFsxmE9htcvBwZbKBL16YUijhNKiWBzEvftB
# dBIMrM+HFFGNPEVUvu4DPL9zRvJaguTFCwZV7HEArCxIQI6360Tj41u+Eehs/v2N
# npI5AiQ9D4ZCZu0WJFdF8c5op7Si+YECQj7jHmIY3oyIdSre69+CDCJznl9YdBAP
# 9X0q6NPtflV+FRTUDQ+reR5pDPY4hEyOtfbdc8Yy2hKBYvbxVjmciQ6cl8D03Tdf
# lw38POMclcfUHgW5tf6+YA==
# SIG # End signature block
|
combined_dataset/train/non-malicious/Connect-VMHost_1.ps1 | Connect-VMHost_1.ps1 | #requires -version 2
#requires -pssnapin VMware.VimAutomation.Core
Function Connect-VMHost {
<#
.Summary
Used to Connect a disconnected host to vCenter.
.Parameter VMHost
VMHost to reconnect to virtual center
.Example
Get-VMHost | Where-Object {$_.state -eq "Disconnected"} | Connect-VMHost
Will Attempt to reconnect any host that are currently disconnected.
.Example
Connect-VMHost -Name ESX1.get-admin.local
Will reconnect ESX1 to vCenter
#>
[CmdletBinding(
SupportsShouldProcess=$True,
SupportsTransactions=$False,
ConfirmImpact="low",
DefaultParameterSetName="ByString"
)]
Param(
[Parameter(
Mandatory=$True,
Valuefrompipeline=$true,
ParameterSetName="ByObj"
)]
[VMware.VimAutomation.Client20.VMHostImpl[]]
$VMHost,
[Parameter(
Mandatory=$True,
Position=0,
ParameterSetName="ByString"
)]
[string[]]
$Name
)
Begin {
IF ($Name) {
$VMHost = $Name|%{ Get-VMHost -Name $_ }
}
}
process {
Foreach ($VMHostImpl in ($VMHost|Get-View)) {
$ReconnectSpec = New-Object VMware.Vim.HostConnectSpec
$ReconnectSpec.HostName = $VMHostImpl.Summary.Config.Name
$ReconnectSpec.Port = $VMHostImpl.Summary.Config.Port
$ReconnectSpec.Force = $true
if ($pscmdlet.ShouldProcess($VMHostImpl.name)) {
$VMHostImpl.ReconnectHost_Task($ReconnectSpec)
}
}
}
}
|
combined_dataset/train/non-malicious/sample_3_59.ps1 | sample_3_59.ps1 | ConvertFrom-StringData @'
id_sbsl_mcafee_eepc_slowboot_sd=McAfee Endpoint Encryption for PCs (EEPC) may cause slow boot or delay between CTRL+ALT+DEL and Credential logon dialog
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAS4gijXRn1eN+F
# BzJHTefl+Sm2IjB79+PBdhnda/O3kaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICyVyiVplklUbu1030EM0lDb
# rJb1PlR5wLtpKm5vsGWOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAJbadNWkyD5r0NR7/5e8nAItN0xhtfMmB8XLhLTN5lEFYZr0ubnU2CSm8
# iI0+FMUaafppAlwA3bnnhBVvG39jgmbL6qauF/RoJHH2NGo6IorhGm0gbspnZqvD
# V502plLSv1xSIP1B5GnAAaRTsDnBS27TYlvxNtpuNjZvQjyE2AWH7of/8WjAxDuy
# +1tDqq/NRAKTDzuO+8JANVIzNz2mbrqEFvyBseC2OY16iT1VMD5LV1ED1yJTJ26g
# bwSqribYXuus1+2w8W26IVCSVmdY7fTlAqJpJVOKRG3vykQUWB1uqsmK70HWV7CN
# /ywHuefQ1Sb/c5Iv9GQuION8gdJirqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAAp0Cd1W0ZRtXiZPXsGGhm3H2cU5PnX13xzLY9lzchBwIGZuspkdKf
# GBMyMDI0MTAyODExNDA0MC4yODFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C
# u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx
# /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV
# V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR
# 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp
# gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo
# j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4
# yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm
# TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi
# wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd
# 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s
# huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q
# lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG
# l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc
# 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A
# /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl
# SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4
# gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG
# 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt
# oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc
# 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn
# ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq
# Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/
# R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0MTAyOTA3MTU1NlowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEAAgIYGzAHAgEAAgITTTAK
# AgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCdo1/IodMsNY0I
# gWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbggj5TzOyaNz/noIF8rSswo
# SMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQFD26RPCKzj29tv+B+uFY
# o+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZRY6ZoVliBz9eAi7lBW9k
# ULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0pcf9UEdis9BF366M8Ktt
# 8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yqF0TVFbiwLm8UNadYHPkb
# zTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgeQDm0hBhjWpM
# 5vsHBZmEJywEojN0kT9ign2a+fv6t0cwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4
# MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6crrSMA0GCSqGSIb3DQEB
# CwUABIICAEKY2ddqCESwO/4iJSPAjE3BwjwE1OOqu8SQDJ6vfajtrDt8pp6kIDfh
# mtewJ1WgyBxyX7CfZKiy8cOieQh5nVK81CvNBJKqofkjT1PaVceXuFR6LTJooom0
# tDUM69B6nA6uETEDiA1C5j/kZ5QcDthi66k1eOwMlBOl4r1xztHW3CN5vdsMPOlN
# czKhb9jTc1/dNwQGvdc0vad5Tam7pZMkzi5nuVGreERb2eUY3Ado4v6I1WWeQUMs
# BjB3uIXIH513YrFq8q78appqq2IvZKAy1wWKCN+KLtpj5zcJtvkMQrJxRDVsGXCI
# OIE4pAQlAh/WMzu9fyuQxIqckZLXYHp00k0VfI/w5BpMCOxFtvJFEQTFoiVWgmeb
# I5XjxERx9XggDH5b0kxEAcYQoWDTwoRiRavEW3/UFtv1E8SyhPe4zmgRttC8zJut
# tv5m6H5ZGkqcPuZ/4NIYvNZ19q2kibI8iLCgQSezUDTDeRLUNRB/1AA6FWl8UDEg
# j7bupMnf2tzEcB+dLBwXthHtSpdpj9cnkkAJ76CTRKZa6gmVUHQOn47gnnP9cARI
# rHIkz5dJ9F+Hp+j8nWTAj8HSrcDCl/KlBdm+eIrCvMj1Eu9gjz5nePCudQmEmmas
# 3d0deal5MlppKGR3/IgXKOf5gjaid/b69RGoRp1dmY4cFrDAAGjB
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_5_53.ps1 | sample_5_53.ps1 | ## Copyright (c) Microsoft Corporation. All rights reserved.
<#
.SYNOPSIS
This cmdlet collects a performance recording of Microsoft Defender Antivirus
scans.
.DESCRIPTION
This cmdlet collects a performance recording of Microsoft Defender Antivirus
scans. These performance recordings contain Microsoft-Antimalware-Engine
and NT kernel process events and can be analyzed after collection using the
Get-MpPerformanceReport cmdlet.
This cmdlet requires elevated administrator privileges.
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
.EXAMPLE
New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl
#>
function New-MpPerformanceRecording {
[CmdletBinding(DefaultParameterSetName='Interactive')]
param(
# Specifies the location where to save the Microsoft Defender Antivirus
# performance recording.
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$RecordTo,
# Specifies the duration of the performance recording in seconds.
[Parameter(Mandatory=$true, ParameterSetName='Timed')]
[ValidateRange(0,2147483)]
[int]$Seconds,
# Specifies the PSSession object in which to create and save the Microsoft
# Defender Antivirus performance recording. When you use this parameter,
# the RecordTo parameter refers to the local path on the remote machine.
[Parameter(Mandatory=$false)]
[System.Management.Automation.Runspaces.PSSession[]]$Session,
# Optional argument to specifiy a different tool for recording traces. Default is wpr.exe
# When $Session parameter is used this path represents a location on the remote machine.
[Parameter(Mandatory=$false)]
[string]$WPRPath = $null
)
[bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive')
[bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed')
# Hosts
[string]$powerShellHostConsole = 'ConsoleHost'
[string]$powerShellHostISE = 'Windows PowerShell ISE Host'
[string]$powerShellHostRemote = 'ServerRemoteHost'
if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) {
$ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.'
$category = [System.Management.Automation.ErrorCategory]::NotImplemented
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name
$psCmdlet.WriteError($errRecord)
return
}
if ($null -ne $Session) {
[int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 }
Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$RecordTo,
[Parameter(Mandatory=$true)]
[ValidateRange(-1,2147483)]
[int]$RemotedSeconds
)
if ($RemotedSeconds -eq -1) {
New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath
} else {
New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath
}
}
return
}
if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo
$psCmdlet.WriteError($errRecord)
return
}
# Resolve any relative paths
$RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo)
# Dependencies: WPR Profile
[string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp"
if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile
$psCmdlet.WriteError($errRecord)
return
}
# Dependencies: WPR Version
try
{
# If user provides a valid string as $WPRPath we go with that.
[string]$wprCommand = $WPRPath
if (!$wprCommand) {
$wprCommand = "wpr.exe"
$wprs = @(Get-Command -All "wpr" 2> $null)
if ($wprs -and ($wprs.Length -ne 0)) {
$latestVersion = [System.Version]"0.0.0.0"
$wprs | ForEach-Object {
$currentVersion = $_.Version
$currentFullPath = $_.Source
$currentVersionString = $currentVersion.ToString()
Write-Host "Found $currentVersionString at $currentFullPath"
if ($currentVersion -gt $latestVersion) {
$latestVersion = $currentVersion
$wprCommand = $currentFullPath
}
}
}
}
}
catch
{
# Fallback to the old ways in case we encounter an error (ex: version string format change).
[string]$wprCommand = "wpr.exe"
}
finally
{
Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n"
}
#
# Test dependency presence
#
if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand
$psCmdlet.WriteError($errRecord)
return
}
# Exclude versions that have known bugs or are not supported any more.
[int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int]
if ($wprFileVersion -le 6) {
$ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again."
$category = [System.Management.Automation.ErrorCategory]::NotInstalled
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand
$psCmdlet.WriteError($errRecord)
return
}
function CancelPerformanceRecording {
Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline
& $wprCommand -cancel -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {}
0xc5583000 {
Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording."
return
}
default {
Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has been cancelled."
}
#
# Ensure Ctrl-C doesn't abort the app without cleanup
#
# - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved
# - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved
# - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated
[bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole)
$savedControlCAsInput = $null
$shouldCancelRecordingOnTerminatingError = $false
try
{
if ($canTreatControlCAsInput) {
$savedControlCAsInput = [Console]::TreatControlCAsInput
[Console]::TreatControlCAsInput = $true
}
#
# Start recording
#
Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline
$shouldCancelRecordingOnTerminatingError = $true
& $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {}
0xc5583001 {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording."
return
}
default {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has started." -NoNewline
if ($timedMode) {
Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline
Start-Sleep -Seconds:$Seconds
Write-Host "ok." -NoNewline
} elseif ($interactiveMode) {
$stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording"
if ($canTreatControlCAsInput) {
Write-Host "${stopPrompt}: "
do {
$key = [Console]::ReadKey($true)
if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) {
CancelPerformanceRecording
$shouldCancelRecordingOnTerminatingError = $false
#
# Restore Ctrl-C behavior
#
[Console]::TreatControlCAsInput = $savedControlCAsInput
return
}
} while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter))
} else {
Read-Host -Prompt:$stopPrompt
}
}
#
# Stop recording
#
Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... "
& $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {
$shouldCancelRecordingOnTerminatingError = $false
}
0xc5583000 {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace."
return
}
default {
Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has been saved to '$RecordTo'."
Write-Host `
'
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
'
Write-Host `
'
The trace you have just captured may contain personally identifiable information,
including but not necessarily limited to paths to files accessed, paths to
registry accessed and process names. Exact information depends on the events that
were logged. Please be aware of this when sharing this trace with other people.
'
} catch {
throw
} finally {
if ($shouldCancelRecordingOnTerminatingError) {
CancelPerformanceRecording
}
if ($null -ne $savedControlCAsInput) {
#
# Restore Ctrl-C behavior
#
[Console]::TreatControlCAsInput = $savedControlCAsInput
}
}
}
function PadUserDateTime
{
[OutputType([DateTime])]
param(
[Parameter(Mandatory = $true, Position = 0)]
[DateTime]$UserDateTime
)
# Padding user input to include all events up to the start of the next second.
if (($UserDateTime.Ticks % 10000000) -eq 0)
{
return $UserDateTime.AddTicks(9999999)
}
else
{
return $UserDateTime
}
}
function ValidateTimeInterval
{
[OutputType([PSCustomObject])]
param(
[DateTime]$MinStartTime = [DateTime]::MinValue,
[DateTime]$MinEndTime = [DateTime]::MinValue,
[DateTime]$MaxStartTime = [DateTime]::MaxValue,
[DateTime]$MaxEndTime = [DateTime]::MaxValue
)
$ret = [PSCustomObject]@{
arguments = [string[]]@()
status = $false
}
if ($MinStartTime -gt $MaxEndTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinStartTime -gt $MaxStartTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinEndTime -gt $MaxEndTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinStartTime -gt [DateTime]::MinValue)
{
try
{
$MinStartFileTime = $MinStartTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MinStartTime', $MinStartFileTime)
}
if ($MaxEndTime -lt [DateTime]::MaxValue)
{
try
{
$MaxEndFileTime = $MaxEndTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MaxEndTime', $MaxEndFileTime)
}
if ($MaxStartTime -lt [DateTime]::MaxValue)
{
try
{
$MaxStartFileTime = $MaxStartTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MaxStartTime', $MaxStartFileTime)
}
if ($MinEndTime -gt [DateTime]::MinValue)
{
try
{
$MinEndFileTime = $MinEndTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MinEndTime', $MinEndFileTime)
}
$ret.status = $true
return $ret
}
function ParseFriendlyDuration
{
[OutputType([TimeSpan])]
param(
[Parameter(Mandatory = $true, Position = 0)]
[string]
$FriendlyDuration
)
if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$')
{
[string]$seconds = $Matches[1]
[string]$decimals = $Matches[2]
[string]$unit = $Matches[3]
[uint32]$magnitude =
switch ($unit)
{
'sec' {7}
'ms' {4}
'us' {1}
}
if ($decimals.Length -gt $magnitude)
{
throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.")
}
return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0')))
}
[timespan]$result = [timespan]::FromTicks(0)
if ([timespan]::TryParse($FriendlyDuration, [ref]$result))
{
return $result
}
throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.")
}
[scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) }
function New-FriendlyTimeSpan
{
param(
[Parameter(Mandatory = $true)]
[uint64]$Ticks,
[bool]$Raw = $false
)
if ($Raw) {
return $Ticks
}
$result = [TimeSpan]::FromTicks($Ticks)
$result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan')
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString
$result
}
function New-FriendlyDateTime
{
param(
[Parameter(Mandatory = $true)]
[uint64]$FileTime,
[bool]$Raw = $false
)
if ($Raw) {
return $FileTime
}
[DateTime]::FromFileTime($FileTime)
}
function Add-DefenderCollectionType
{
param(
[Parameter(Mandatory = $true)]
[ref]$CollectionRef
)
if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder'))
{
$CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection')
}
}
[scriptblock]$FriendlyScanInfoToString = {
[PSCustomObject]@{
ScanType = $this.ScanType
StartTime = $this.StartTime
EndTime = $this.EndTime
Duration = $this.Duration
Reason = $this.Reason
Path = $this.Path
ProcessPath = $this.ProcessPath
ProcessId = $this.ProcessId
Image = $this.Image
}
}
function Get-ScanComments
{
param(
[PSCustomObject[]]$SecondaryEvents,
[bool]$Raw = $false
)
$Comments = @()
foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) {
if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) {
if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) {
$Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw
$StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw
$Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString())
if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) {
$item.Debug | ForEach-Object {
if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) {
$Comments += "$_"
}
}
}
}
else {
if ($item.Message.Contains("subtype=Lowfi")) {
$Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection")
}
else {
$Comments += $item.Message
}
}
}
elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) {
$Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw
$OpId = "Internal opertion"
if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) {
$OpId = $item.Path
}
elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) {
$OpId = $item.ProcessPath
}
$Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString())
}
}
$Comments
}
filter ConvertTo-DefenderScanInfo
{
param(
[bool]$Raw = $false
)
$result = [PSCustomObject]@{
ScanType = [string]$_.ScanType
StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw
EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw
Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw
Reason = [string]$_.Reason
SkipReason = [string]$_.SkipReason
}
if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path)
}
if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath)
}
if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image)
}
elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) {
try {
$result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name)
} catch {
# Silently ignore.
}
}
$ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null }
if ($ProcessId) {
$result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId)
}
if ($result.Image -and $result.ProcessId) {
$ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId
$result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName)
}
if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) {
$Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw)
$result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments
}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo')
}
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString
$result
}
filter ConvertTo-DefenderScanOverview
{
param(
[bool]$Raw = $false
)
$vals = [ordered]@{}
foreach ($entry in $_.PSObject.Properties) {
if ($entry.Value) {
$Key = $entry.Name.Replace("_", " ")
if ($Key.EndsWith("Time")) {
$vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw
}
elseif ($Key.EndsWith("Duration")) {
$vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw
}
else {
$vals[$Key] = $entry.Value
}
}
}
# Remove duplicates
if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) {
$hints = [ordered]@{}
foreach ($hint in $_.PerfHints) {
$hints[$hint] = $true
}
$vals["PerfHints"] = @($hints.Keys)
}
$result = New-Object PSCustomObject -Property:$vals
$result
}
filter ConvertTo-DefenderScanStats
{
param(
[bool]$Raw = $false
)
$result = [PSCustomObject]@{
Count = $_.Count
TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw
MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw
AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw
MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw
MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw
}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats')
}
$result
}
[scriptblock]$FriendlyScannedFilePathStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Path = $this.Path
}
}
filter ConvertTo-DefenderScannedFilePathStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats')
}
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
$result
}
[scriptblock]$FriendlyScannedPathsStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Path = $this.Path
Folder = $this.Folder
}
}
filter ConvertTo-DefenderScannedPathsStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats')
}
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path)
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
$result
}
[scriptblock]$FriendlyScannedFileExtensionStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Extension = $this.Extension
}
}
filter ConvertTo-DefenderScannedFileExtensionStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats')
}
$result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
$result
}
[scriptblock]$FriendlyScannedProcessStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
ProcessPath = $this.ProcessPath
}
}
filter ConvertTo-DefenderScannedProcessStats
{
param(
[bool]$Raw
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats')
}
$result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Extensions)
{
$result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@(
$_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions)
}
}
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
$result
}
<#
.SYNOPSIS
This cmdlet reports the file paths, file extensions, and processes that cause
the highest impact to Microsoft Defender Antivirus scans.
.DESCRIPTION
This cmdlet analyzes a previously collected Microsoft Defender Antivirus
performance recording and reports the file paths, file extensions and processes
that cause the highest impact to Microsoft Defender Antivirus scans.
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3
.EXAMPLE
# Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations that start at MinStartTime or later:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that start before or at MaxStartTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that end at MinEndTime or later:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that end before or at MaxEndTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM"
.EXAMPLE
# Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033))
.EXAMPLE
# Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033))
.EXAMPLE
# Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview
#>
function Get-MpPerformanceReport {
[CmdletBinding()]
param(
# Specifies the location of Microsoft Defender Antivirus performance recording to analyze.
[Parameter(Mandatory=$true,
Position=0,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
HelpMessage="Location of Microsoft Defender Antivirus performance recording.")]
[ValidateNotNullOrEmpty()]
[string]$Path,
# Requests a top files report and specifies how many top files to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFiles = 0,
# Specifies how many top scans to output for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFile = 0,
# Specifies how many top processes to output for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerFile = 0,
# Specifies how many top scans to output for each top process for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerFile = 0,
# Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPaths = 0,
# Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used.
[ValidateRange(1,1024)]
[int]$TopPathsDepth = 0,
# Specifies how many top scans to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPath = 0,
# Specifies how many top files to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerPath = 0,
# Specifies how many top scans to output for each top file for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerPath = 0,
# Specifies how many top extensions to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensionsPerPath = 0,
# Specifies how many top scans to output for each top extension for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtensionPerPath = 0,
# Specifies how many top processes to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerPath = 0,
# Specifies how many top scans to output for each top process for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerPath = 0,
# Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensions = 0,
# Specifies how many top scans to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtension = 0,
# Specifies how many top paths to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPathsPerExtension = 0,
# Specifies how many top scans to output for each top path for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPathPerExtension = 0,
# Specifies how many top files to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerExtension = 0,
# Specifies how many top scans to output for each top file for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerExtension = 0,
# Specifies how many top processes to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerExtension = 0,
# Specifies how many top scans to output for each top process for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerExtension = 0,
# Requests a top processes report and specifies how many top processes to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcesses = 0,
# Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcess = 0,
# Specifies how many top files to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerProcess = 0,
# Specifies how many top scans to output for each top file for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerProcess = 0,
# Specifies how many top extensions to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensionsPerProcess = 0,
# Specifies how many top scans to output for each top extension for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtensionPerProcess = 0,
# Specifies how many top paths to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPathsPerProcess = 0,
# Specifies how many top scans to output for each top path for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPathPerProcess = 0,
# Requests a top scans report and specifies how many top scans to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScans = 0,
## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f)
# Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report.
# Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.
[ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')]
[string]$MinDuration = '0us',
# Specifies the minimum start time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MinStartTime = [DateTime]::MinValue,
# Specifies the minimum end time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MinEndTime = [DateTime]::MinValue,
# Specifies the maximum start time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MaxStartTime = [DateTime]::MaxValue,
# Specifies the maximum end time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MaxEndTime = [DateTime]::MaxValue,
# Adds an overview or summary of the scans captured in the trace to the regular output.
[switch]$Overview,
# Specifies that the output should be machine readable and readily convertible to serialization formats like JSON.
# - Collections and elements are not be formatted.
# - TimeSpan values are represented as number of 100-nanosecond intervals.
# - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC).
[switch]$Raw
)
#
# Validate performance recording presence
#
if (-not (Test-Path -Path:$Path -PathType:Leaf)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path
$psCmdlet.WriteError($errRecord)
return
}
function ParameterValidationError {
[CmdletBinding()]
param (
[Parameter(Mandatory)]
[string]
$ParameterName,
[Parameter(Mandatory)]
[string]
$ParentParameterName
)
$ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'."
$category = [System.Management.Automation.ErrorCategory]::MetadataError
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName
$psCmdlet.WriteError($errRecord)
}
#
# Additional parameter validation
#
if ($TopFiles -eq 0)
{
if ($TopScansPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles'
}
if ($TopProcessesPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles'
}
}
if ($TopProcessesPerFile -eq 0)
{
if ($TopScansPerProcessPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile'
}
}
if ($TopPathsDepth -gt 0)
{
if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0))
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension'
}
}
if ($TopPaths -eq 0)
{
if ($TopScansPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths'
}
if ($TopFilesPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths'
}
if ($TopExtensionsPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths'
}
if ($TopProcessesPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths'
}
}
if ($TopFilesPerPath -eq 0)
{
if ($TopScansPerFilePerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath'
}
}
if ($TopExtensionsPerPath -eq 0)
{
if ($TopScansPerExtensionPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath'
}
}
if ($TopProcessesPerPath -eq 0)
{
if ($TopScansPerProcessPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath'
}
}
if ($TopExtensions -eq 0)
{
if ($TopScansPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopFilesPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopProcessesPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopPathsPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions'
}
}
if ($TopFilesPerExtension -eq 0)
{
if ($TopScansPerFilePerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension'
}
}
if ($TopProcessesPerExtension -eq 0)
{
if ($TopScansPerProcessPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension'
}
}
if ($TopPathsPerExtension -eq 0)
{
if ($TopScansPerPathPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension'
}
}
if ($TopProcesses -eq 0)
{
if ($TopScansPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopFilesPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopExtensionsPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopPathsPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses'
}
}
if ($TopFilesPerProcess -eq 0)
{
if ($TopScansPerFilePerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess'
}
}
if ($TopExtensionsPerProcess -eq 0)
{
if ($TopScansPerExtensionPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess'
}
}
if ($TopPathsPerProcess -eq 0)
{
if ($TopScansPerPathPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess'
}
}
if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile
$psCmdlet.WriteError($errRecord)
return
}
# Dependencies
[string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation
#
# Test dependency presence
#
[string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe"
if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand
$psCmdlet.WriteError($errRecord)
return
}
# assemble report arguments
[string[]]$reportArguments = @(
$PSBoundParameters.GetEnumerator() |
Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } |
ForEach-Object { "-$($_.Key)"; "$($_.Value)"; }
)
[timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration
if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0))
{
$reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks))
}
$MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime
$MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime
$ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime
if ($false -eq $ret.status)
{
return
}
[string[]]$intervalArguments = $ret.arguments
if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0))
{
$reportArguments += $intervalArguments
}
if ($Overview)
{
$reportArguments += "-Overview"
}
$report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json
$result = [PSCustomObject]@{}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result')
}
if ($TopFiles -gt 0)
{
$reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles)
}
}
if ($TopPaths -gt 0)
{
$reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths)
}
}
if ($TopExtensions -gt 0)
{
$reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions)
}
}
if ($TopProcesses -gt 0)
{
$reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses)
}
}
if ($TopScans -gt 0)
{
$reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans)
}
}
if ($Overview)
{
if ($null -ne $report.Overview) {
$reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw
$result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview
if (-not $Raw) {
$result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview')
}
}
}
$result
}
$exportModuleMemberParam = @{
Function = @(
'New-MpPerformanceRecording'
'Get-MpPerformanceReport'
)
}
Export-ModuleMember @exportModuleMemberParam
# SIG # Begin signature block
# MIImGwYJKoZIhvcNAQcCoIImDDCCJggCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH
# 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa
# HjCCGhoCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3
# RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq
# tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7
# EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/
# 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt
# SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC
# F60wghepBgorBgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL
# JZwfEO4YeUvzRyzBGzb6/QIGZutJ48scGBMyMDI0MTAwOTE3MjE1Ni4yMTZaMASA
# AgH0oIHZpIHWMIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgEC
# AhMzAAAB/xI4fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU
# aW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzEx
# OVowgdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNV
# BAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UE
# CxMeblNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy
# b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A
# MIICCgKCAgEAyeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKY
# Hd/9db+g3z4dU4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wf
# lDAY1tu9CQqhhxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmW
# iYgfX0R+bDAnncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYg
# Ww8PGBUO0vTMKjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT
# 1cZAqGyEhT7L0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAy
# g6zmE5p3fONr9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8O
# OXf8JxTYWIqfRuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D
# 1J7PQJAJObbiaboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfN
# zhXgLDEwb6dA4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxf
# WzXN6sPJMy49tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOC
# AUkwggFFMB0GA1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAW
# gBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0
# YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUF
# BzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jv
# c29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8E
# AjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkq
# hkiG9w0BAQsFAAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K
# /DNMzLliYQUAp6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1
# iU/Yk0eutPyfOievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8pp
# ZwLghT4z3mkGZjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrO
# XRpyXrTKUPe3kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxc
# yffwXhLu9HMU3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRy
# q5QPYPJHGA0Ty0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js24
# 9bqQOYPdpyOdgRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe
# 9WqdSezh8tytuulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4H
# Pzd+S0bBN3A3XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5
# OePyjnTaItTSY4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIw
# ggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA
# MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQD
# EylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0y
# MTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0
# ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveV
# U3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTI
# cVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36M
# EBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI
# NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxP
# LOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2l
# IH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDy
# t0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymei
# XtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1
# GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgV
# GD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQB
# gjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTu
# MB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsG
# AQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH
# AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1Ud
# EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYD
# VR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwv
# cHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEB
# BE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9j
# ZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQAD
# ggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/
# 2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvono
# aeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRW
# qveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8Atq
# gcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7
# hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkct
# wRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu
# +yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FB
# SX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/
# Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ
# 8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEw
# ggEBoYHZpIHWMIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA
# qROMbMS8JcUlcnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt
# cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOqwzeYwIhgPMjAyNDEwMDkwOTM5
# NTBaGA8yMDI0MTAxMDA5Mzk1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6rDN
# 5gIBADAHAgEAAgIS0DAHAgEAAgIS/jAKAgUA6rIfZgIBADA2BgorBgEEAYRZCgQC
# MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG
# SIb3DQEBCwUAA4IBAQBLCRbXud9m2v2bjrBy7Jvt49d5yTngqV6Bt966YGxjqzBG
# ULq3aPCeJy6fapHtYDQMwygtp/aGKqiVCsdcR4DNpmnLcukcyRj0J4czIDw1+ki0
# agiZ8nyanM9sn1iYZr+C+57I6D3bef4TPPg0gTSpaAO1bzPkpAzs62fnpfa8RbJ5
# mIBpgF1jKkaJaIZsK+Vp8Ppw5+sDnunnjTRPyawdj43e/kbvOm9rBhcZOf26XgB+
# WB0FfgZQIAKTIFflpZinBaRCJbWVOcKHsplj2UaO+4TrshyCTKDQeMqxToSdUHTQ
# feyiv9prjUkGvqa0YzfJZ+Hq25M2azwxJmbPW2fbMYIEDTCCBAkCAQEwgZMwfDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8w
# DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv
# BgkqhkiG9w0BCQQxIgQgJrw+Nhz0ZUNcsvdWvaGXXCZlqvBawH44LFHauS97MNkw
# gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuM
# aVOI3qDjSEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwAhMzAAAB/xI4fPfBZdahAAEAAAH/MCIEILPlFszD9PesFJXDx8ZRYglYRgUN
# 1GSNjGSgO6pqsj2wMA0GCSqGSIb3DQEBCwUABIICAJcQToCcMvR+OUZQYK2XunZm
# v/PzNeF4nJspUedJ84xAsRcQgnmGuD3h9R9rIzSE1m+h22uf0nuo/iyajTpQImdm
# 2EePrVYTSQtDYJ7ZvDsw5ronnFWxzShUjsSKm24SwP+b8uHrA6OoxbAzWo1jDE+t
# pQHkg+7e7hxxwcNiRyNxKDfovblbuZSj8EjP9FmLMeJOV9TIcgE64ehPu7KvxoBA
# oD1u1BHEPfnbSXe/oiRkDL9RYCPRSaCr2IESot3h+XgFvvwY7clTbno1R7z1u6dS
# tSd9/sN30jn/YR9OF6CeTjg4rlL4mLou/AimbUmpuIWlc0Q7Tje6z06VDz0/ZuS6
# 07aFxzgxfvRGp0paqakPBOZaOy/NhryYDvJ8bcc2HmeJwShYM0GuVuLh//VSIeOo
# rAd5ML59rIjKtmje/szwNBu2UCRqRWekHFCbMsEOmzWVM+0d16dj2CW+FymWimgF
# RZ36nIqRxLXrcPHTqtwKOi4It0AHhwIWs5RkW2Tj1Yc7L1YZi4Ekl9+eRoILkqBy
# 1hpKxvSa65phk+xevJmaeTsJUHyEK2nRkKzf6zj/NBNCtrqf+ikMB4SUeTT/vL44
# Z+IrUqDZn+pv7nbYu9mPY4RESzB6tXI1nn7crwGxzMzpsTcYYozTuS09NOaHNmuy
# GAJAQ1VNEpitjF5kHveE
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_54_32.ps1 | sample_54_32.ps1 | #!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../which/bin/which.js" $args
} else {
& "$basedir/node$exe" "$basedir/../which/bin/which.js" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../which/bin/which.js" $args
} else {
& "node$exe" "$basedir/../which/bin/which.js" $args
}
$ret=$LASTEXITCODE
}
exit $ret
# SIG # Begin signature block
# MIIn1AYJKoZIhvcNAQcCoIInxTCCJ8ECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD2ksuU5m/g2bf+
# RdBifYXvkeqsFujnPtMgyMDpX/cKQqCCDYswggYJMIID8aADAgECAhMzAAADhNlo
# fWbMdUuhAAAAAAOEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwNzEzMjM0NTM4WhcNMjQwOTE1MjM0NTM4WjCBiDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj
# cm9zb2Z0IDNyZCBQYXJ0eSBBcHBsaWNhdGlvbiBDb21wb25lbnQwggEiMA0GCSqG
# SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDOcuqjP/XRg6pKFeMaWfpMTgEZTBne4mxd
# XcEiErb/lZ9Yfxgxa8WhOA66XU+usOUDmo6z/WpI3KVFIuf4MrHh76xAL/HypU9b
# H7hvCG40do0YQxmymk+O25zXQ6Z0QKyKhDNU7K79OVWiE/QNRPXDxXj65HTqT2qb
# 5dVzDziesfrFpzzrkHtOzBikEEFl1oZfmZOy3lSeiiaVLwkgaoPpYMDK+WbANGXQ
# LQ6aP5vyWDtknjDP2F9gjp6j+Q67bCBjIs8FpdH2IN6HAvE3X/E4YOIOrZY2JYUz
# 9poFh1rrjkGuM4CT2tzdqhfkB28QOnuhEyJ+AmB3B01oL9ahNSiZAgMBAAGjggFz
# MIIBbzAfBgNVHSUEGDAWBgorBgEEAYI3TBEBBggrBgEFBQcDAzAdBgNVHQ4EFgQU
# HNwWRAxH9Xw4ZX9wXRlFc716vLwwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMNMjMxNTIyKzUwMTE0ODAfBgNV
# HSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNo
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0Ey
# MDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZF
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQ
# Q0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQEL
# BQADggIBACe+otxvOu3z6TOJ95EbPptRocynVoyom18xquOJSKeqDNItu2pmyVpa
# iZDhPstLyuo0mXyNLPh3TAl+botuUfpFZDOGzgmqWVBrdHQxsu3t++x6Gw0BJfQv
# n/c0/lU/jRTRTAp7S7jAqjqpyMc0yvrrL6xvUNn3rkLkdy2yXDHWpHdEx5JdpJDp
# gn5j1tv3GGdteYdhZlb2HolacViuJSbeMdG5sDDspcw8xY1Ds4FMXq7MYqLYQsr8
# KwXJZ95SboZ09V/5MOwpKGGhle0Bc5nAErdJBNjjaBLBMGDig9OV0Z3ZIfY4jOFl
# eTEsK5LOTQtSaNVD4rbG+QnMsweLag7qVM7z5IeOqE7UY/CfCEksl+hrKc3MBvdc
# yPcJ289x3gRkOH09FIjRIAfFpBDSkPj4HW5LKqNSv3AbFluKx6ZgbNYhwHxQSxDq
# YsTlAjtnbMjYI2RTrSIMjgGYRvfwa57ypyPdlyzm14Q5UNggsWyr1Og+QbQeW6+R
# CG6FuV/nEAYrMgeHlMQBd50aVhTdBeq5CR3Gz6q4aVL7nEdDR6eYuL0U1e4EoL2O
# YBok3y4rBL3r57nLEEZ6xMGAe5eHBPtgcuPw5S/aJDropeu+4BXSi5R/qGktTkbK
# flJMAlfXHL6a64o88h8i8ZZ4HHHM41qxMB52j9bgaCCQFJFlLJPvMIIHejCCBWKg
# AwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3Qg
# Q2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYw
# NzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjAN
# BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGf
# Qhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRg
# JGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NE
# t13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnn
# Db6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+E
# GvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+t
# GSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxh
# H2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AV
# s70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f
# 7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3D
# KI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9Jaw
# vEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1Ud
# DgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRy
# LToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDEx
# XzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0
# cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDEx
# XzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/
# BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2Nz
# L3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAA
# bwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUA
# A4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+
# vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4H
# Limb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6
# aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiX
# mE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn
# +N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAq
# ZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5h
# YbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/
# RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXm
# r/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMyk
# XcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEB
# MIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNV
# BAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOE2Wh9Zsx1
# S6EAAAAAA4QwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQB
# gjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkE
# MSIEINHHRjbLeUFexoxjnLvklJ7YbhYs4NLDTwPoOAxaRFwRMEIGCisGAQQBgjcC
# AQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAfVLnD37kOb2Lro10xYIbw+sda5il
# J8FCXfzxbUQ7faoIqFJOTxpK1CPCo6lEza0YQW1RDcmdlJDdQzcRg0MaTJOaN9H6
# hCUoSBzvb/dCP3nZvq3fsjDOEPmESfPTWY5BZBHWTumj9iDdsWeYTFI/hjDEdo3l
# HtH7lSNqHsSLW1Mq8jsRiepT23mPBmr8UihJM/7OfAs3rZuyYYGq9a62myFUYMlu
# BtmzRjZKBxG6mUq5nHhIoNCwW9pJQqyNhYrZwg1NLfl7uj4bEDlIlBYUqg2jBlcd
# HrfrWAxYhklyTwu1AgsjLMhntuihwb0pcxE3vJC/fgi1cqRdKb1J8CgcfaGCFykw
# ghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8w
# DQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYK
# KwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDxE4VovnjM4NAStuh9Rp2VtM2b
# fRK2ScVXBvGBn3VdJgIGZk31ElN7GBMyMDI0MDUyNDIxMjMxNi4zNjVaMASAAgH0
# oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0w
# KwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAk
# BgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxN
# aWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMA
# AAHdXVcdldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAKhOA5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T
# 52HXbN2g7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLa
# iAaobE5vFJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3e
# aryH+AKmv6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6N
# VnXMYOTRKuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHU
# pcHSODujlFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl
# 3hUKtuzYC1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+
# YcvBM834bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi
# 5Sa/ubGuYEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz
# 5WW7BA4wpmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXe
# PT6hMF0Il598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIB
# RTAdBgNVHQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cV
# XQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5t
# aWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUy
# MFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQ
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQl
# MjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAW
# BgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcN
# AQELBQADggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo
# 1Ooc9Shyvxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+
# O4VLS0LSmb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1
# zGpQ7HTxvfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJ
# NAF+5/5qBk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAqu
# BiDkYQ5kVfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNly
# EHHbQZDmi9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/v
# dYUqaJspupBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6
# hUDBBkvYh+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3
# KgqjqDOWInVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FC
# qY1sDUKUhRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCC
# BVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj
# cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMw
# MTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3mi
# y9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+
# Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3
# oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+
# tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0
# hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLN
# ueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZ
# nkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n
# 6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC
# 4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vc
# G9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtF
# tvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEE
# BQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNV
# HQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3
# TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br
# aW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkG
# CSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8E
# BTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRP
# ME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1
# Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEww
# SgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCd
# VX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQ
# dTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnu
# e99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYo
# VSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlC
# GVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZ
# lvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/
# ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtq
# RRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+
# y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgk
# NWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqK
# Oghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB
# 2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG
# A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD
# VQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXb
# NaDPxnyiDbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMDANBgkqhkiG9w0BAQUFAAIFAOn7FiowIhgPMjAyNDA1MjQyMTM1MzhaGA8y
# MDI0MDUyNTIxMzUzOFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6fsWKgIBADAH
# AgEAAgIA/zAHAgEAAgISkzAKAgUA6fxnqgIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# BQUAA4GBAKXmu6NuxwyfiUHWiVR0xKeUcfNWSw8QSeDv/phwcdUWvGh9sY+yRQeQ
# ncY7SkO+LDygNU9F/a7hA25U7qE6VnV+EgZ8JetkssWOXI8KCtZmNRS0vyT8km+e
# uwc5mW8XPyCR5IrpX95Wo6Ua0+vFGoKg3Suv9IPLoG6Opz+eNXiQMYIEDTCCBAkC
# AQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldSt
# qhsAAQAAAd0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG
# 9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgbELtoqo9jUafzcR9ti5h/v5IANOJ+305
# HCjjVo3XwCAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZ
# nHtH0Vk37UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
# YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIP9ip0qf5vILy8YS
# jcFhpRSQ6yeG1/aEKlvUmFwEgK86MA0GCSqGSIb3DQEBCwUABIICAFx3LQeXsZxf
# ecU6CILMJFR/uMj4dV1/PkzYns0I/r7yFerxUkzpKTfeq09nnt55bHO94tN4yBzA
# gJM2IJT9Gro0lHKD5JPWeKDuVvfIQpfTsQZQhI0jcZSjrv5KYJ5Lq2fU2VORPzrB
# sN/fPuMSf91u+qxOD6+AtgmpR7naJ8nb2BpXkrG7mzNxW5nxFJ6XWxnAspam12kj
# 2POvXajRQ6PQEUeAR8YyrQBYDb8N1+kRcbhhloeplVpEaONTIz9Fe37GElb8MGus
# 3sPT2f3UtRoRAhlN3/Q0PKI9Kq+EG0Y303JgYz0npvKmvOR2n8z6oJAUHpBW6Vzz
# IXsiQOMQEzB1PqBN08wIcxk9Z8qb5NIwAuoc+OpurJph/gWi0JCnJfVfCiFUMCbU
# hOWdwVFGuvJkkBcyNZjC4M8UI+NlWe+cI18z7zdU8D33iUb4TsKpVS0uvAtP9p2F
# 0yMzFVk6BfOOJQPkPWlAl9dpORVDH9+PftPzrTadhpZ/i/KYwDmBnGJNMAT6kxie
# vMYhYxLlbBZS8SYQ0qX54oTAjnA8ZrQwEjko09kV8SiNvkhKkiwr+Y1QwKHEcZSC
# aCfqPR9OvQjU5LoWrkk1oL0FDQnmvZEj6znjySfH2U6eUhT0+cM5POIxTJmEKP+k
# 4YEsRYSVE1g+YanutMG3MHU7Wya8naIb
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_58_49.ps1 | sample_58_49.ps1 | #!/usr/bin/env pwsh
$PlaywrightFileName = Join-Path $PSScriptRoot "Microsoft.Playwright.dll"
[Reflection.Assembly]::LoadFile($PlaywrightFileName) | Out-Null
exit [Microsoft.Playwright.Program]::Main($args)
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCoJjGbg2OY61ib
# Kwt3GCNoKEhugpoxT6j0VnwLrTwJMaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFVpdfgk6vo1WeGDLQ9ZujwX
# D0DmghRyBza6020VaYxOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAGW+oEuwliHbutmeBVtvPgl8vA8LyG9b/efwXnCM4qPhwnhPMB7eT9wH/
# KTM4I149kZshGl+1cwD+YEBIpPmkBlFH5LgCIK9Dr35SqEozApzteUvZwLt5m04D
# Qoc0mX9Zb3Z3ef5EQLJbjTC7Ncy/PzRkvZ4V4UOKRdY3TEoOo+pVSJRBeran9Fc/
# gPhnuoAup+SgQrvNQKVQdcdvBAcbcBg85hXV7saKGAciPDx4KmuufNYTrVmgipiU
# 1jvE0A0BoWXx5BRFI+5FYX6ePlB2OZxTO8ZPwN0JYOLbUlQe0Q99VBjfiIsge0sA
# +4WVv/M/bQ5jGVOK/jS5hUik+HsQXaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAKeTn41FqYye5qiLkZ40DQ+iDJoq7ApLAn++ImSULLbgIGZk4HtKLo
# GBMyMDI0MDUyMzE2MzYzMC42MThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOn515cwIhgPMjAyNDA1MjMyMjU2MjNaGA8yMDI0MDUyNDIyNTYyM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fnXlwIBADAHAgEAAgIFrTAHAgEAAgIRbDAKAgUA
# 6fspFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKLbQP2o2oYY1JaYkMBF
# HiXZsY2dNr0/C09TcOY4okFr9EZPWBhZV6P4pxnyiT+JFBgNnCf0rV64BS/LAdL4
# 8OdF6LLw39eOQ+18pq+ruk244YALqUlezhsROCUuwWIopCP+4iHJ7w8/yqUgEXj6
# UhTVXf80wr/97vE9Q0CeAeQuMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgPW4H6K1duXqId3eHmcPv6qrS+d8fAOL/zD5jGSnEpugwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEIKYxqWzLp6lAlWWdYPqylv8UYBtFQXVckK407fyIPsfd
# MA0GCSqGSIb3DQEBCwUABIICAA61xAy+yGXJyCIx8YftPmLUn/sWurYVyAM/X2Di
# 8+rEDuCvbrCHvcApeZXm3iOq+e8q2OQYCOsc/Rt1ck7uPyI+d9TrgUMMIhNoXTPM
# udTlsY+Ws6oSJVA7dXNkXfXG0cBm0FgRSF/G+E/joSbanwL726Av8cBLwO8ZknlO
# v9Zsvog6s6YMfcKM9Fv2grGzR4j1Dx/ijOD08mUEzrJtlMvbWvH3U6RMyqJr7ZLe
# JlSX5b+JPyDg3gEnKdQ6elT4AjiLnpW7B6wK3VchtDWKTUXx3crUKHDnYhBwNacH
# oeMUJy88vKFeRYpcQ5pzFoSsGyPntc/yldcSBKd6Uxf5FYbIr+4+mwhloUZKTp6l
# wWJxACbLYTNemG6Uv79PyHcH+FdJ88bE0Ce++tQP3CIZS0nOyUJgrgHLaIc1z1v5
# HCGaEIEjPZHBRBvwy+eWXJfccYPGBSNe6UBoUoaQtaS7NWDqAvFiv5vUpf6JE4jL
# k3xtiz2nMHcxeAFyeL4oKhbkSFsGWexxyyeiyNuazKqw7tBbczt96v5tewpDwi27
# HqWOwce4l204lclzQRXYc6YuvRCJ33ycqABNL9rqSDtAbeT5ATGpPU5KpRQ89DEu
# c4vG3Ixi2dkjBb12k/3gwQxWyeM/2tIXRKCz36JrfRpNeXeTOA7JOPb0iVWyJRRU
# RbJm
# SIG # End signature block
|
combined_dataset/train/non-malicious/ffdb7026-570c-4644-8a9f-b2c8fcdabfd5.ps1 | ffdb7026-570c-4644-8a9f-b2c8fcdabfd5.ps1 | # Code to auto update the Address policy, GAL, OAB and storage groups and mailbox databases of an Exchange 2007 server by John McLear
# This code is good for hosting providers or people who wish to use lots of storage groups and mailbox databases.
#
# Thanks to Joel Bennett (Jaykul) for general scripting help and the friendly folks in #powershell - freenode
#
# I rewrote this and didnt test before publishing so there may be some syntax errors.
#
# Created 07/09/2008
#################################################################################################################################
param([string]$fullname, [string]$mail2, [string]$typeofcustomer)
# PRE REQ - Create a container in your address lists called "Generic Address Book" or something similar - this is where we will store address lists!
# - Create a public folder database on your MB server - In $publicfolderDatabase our example is in storage group sg0 called Public Folder.
# We need to set some things manually too!
$yourinternaldomain = "domain.com" # ie contoso.com
$OABDistributionServer = "CASserver" # Your CAS server responsible for OAB distribution
$MailboxServer = "MBserver" # Shortname of your MailboxServer
$PublicFolderDatabase = $MailboxServer + '\\sg0\\Public Folder' # The Path to your public folder used for Address List distribution
$LogFilePath = "d:\\Program Files\\Microsoft\\Exchange Server\\Mailbox\\First Storage Group\\" # Where we will put the log files
$AdminName = "CN=Servers,CN=Exchange Administrative Group (TESTING23TESTY),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=contoso,DC=com" # This needs to be changed
echo "Fullname: $fullname" # full name of customer - this must be a unique value)
echo "Domain name: $mail2" # customers domain name ie fraggle.com
echo "Type of customer (1 is basic, 2 is standard, 3 is premium): $typeofcustomer" # Basically a premium customer will get their own mailboxdatabase - a basic or standard will share in one big database (know why before you use this!)
echo "Your internal domain: $yourinternaldomain" # The internal domain you set
# Lets go!
######################
Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin
# Loads exchange snap ins
new-AcceptedDomain -Name $mail2 -DomainName $mail2 -DomainType 'Authoritative'
# Creates an accepted domain
new-EmailAddressPolicy -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Priority 'Lowest' -EnabledEmailAddressTemplates SMTP:%m@$mail2,smtp:%g@$mail2,smtp:%1g.%s@$mail2,smtp:%m@$yourinternaldomain
# Creates a new address policy giving - you may wish to modify this to suit
set-EmailAddressPolicy -Identity $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Priority 'Lowest' -EnabledEmailAddressTemplates SMTP:%m@$mail2,smtp:%g@$mail2,smtp:%1g.%s@$mail2,smtp:%m@$yourinternaldomain
# Modifies the new address policy giving - you may wish to modify this to suit - Why modify? You may wish to update this at some point and its best practice to have a set command imho
new-GlobalAddressList -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname
# Create a new GAL
new-AddressList -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Container '\\Generic Address Book'
# Create a new address list in the Generic Address Book container - Modify your container to suit!
$fullname2 = '\\Generic Address book\\' + $fullname
# You may wish to modify the above to suit
$OABPoint = $OABdistributionServer + '\\OAB (Default Web Site)'
# You may wish to modify the above line to suit but I doubt it.
new-OfflineAddressBook -Name $fullname -Server $pinkyring -AddressLists $fullname2 -PublicFolderDistributionEnabled $false -VirtualDirectories $OABPoint
# Create a new Offline Address Book
Set-OfflineAddressBook -Identity $fullname -versions Version3, Version4 -PublicFolderDistributionEnabled $true -AddressLists $fullname2
# Set the OAB to V3, 4 and Public folder distribution.
Update-EmailAddressPolicy -Identity $fullname
# Update the Email Address Policy
Set-MailboxDatabase -Identity $fullname -OfflineAddressBook $fullname -PublicFolderDatabase $PublicFolderDatabase
# Set the Mailbox database of the customer to use the public folder database you created
$maildb = Get-MailboxDataBase | Select-String $fullname
echo $maildb
if ($maildb -match "sg")
# if there is a database for the fullname value then
{
echo "not making the DB"
}
else
{
if ($typeofcustomer -match "3")
# and if the type of customer is 3 (premium)
{
echo "making the DB" # this customer must be premium! good for them!!
$i = 1
for( $i=0; $i -lt 50; $i++ )
# for each count 1 to 50
{
$maildb = Get-MailboxDataBase | Select-String $fullname
echo $maildb
if ($maildb -match "sg")
# Check for a database
{ echo "database located" } # if database is found then do nothing
else
{
new-storagegroup sg$i
# creating 50 storage groups
new-mailboxdatabase -StorageGroup $MailboxServer\\sg$i -Name $fullname -EdbFilePath $LogFilePath + '\\' + $fullname.edb
# make a database on the server - we need to add incrementation on servername here..
mount-database -Identity "CN=$fullname,CN=sg$i,CN=InformationStore,CN=$MailboxServer,$AdminName"
# mount the database
$i++
# increase the storage group by 1
}
}
Set-MailboxDatabase -Identity $fullname -PublicFolderDatabase $PublicFolderDatabase
# set the public folder
}
else
{
echo "customer is a basic or standard customer so we are going to not create a DB"
Set-MailboxDatabase -Identity $fullname -OfflineAddressBook $fullname -PublicFolderDatabase $PublicFolderDatabase
}
}
|
combined_dataset/train/non-malicious/1979.ps1 | 1979.ps1 |
Describe "CliXml test" -Tags "CI" {
BeforeAll {
$testFilePath = Join-Path "testdrive:\" "testCliXml"
$subFilePath = Join-Path $testFilePath ".test"
if(test-path $testFilePath)
{
Remove-Item $testFilePath -Force -Recurse
}
New-Item -Path $testFilePath -ItemType Directory | Out-Null
New-Item -Path $subFilePath -ItemType Directory | Out-Null
Push-Location $testFilePath
class TestData
{
[string] $testName
[object] $inputObject
[string] $expectedError
[string] $testFile
TestData($name, $file, $inputObj, $error)
{
$this.testName = $name
$this.inputObject = $inputObj
$this.expectedError = $error
$this.testFile = $file
}
}
}
AfterAll {
Pop-Location
}
Context "Export-CliXml" {
BeforeAll {
$gpsList = Get-Process pwsh
$gps = $gpsList | Select-Object -First 1
$filePath = Join-Path $subFilePath 'gps.xml'
$testData = @()
$testData += [TestData]::new("with path as Null", [NullString]::Value, $gps, "ParameterArgumentValidationErrorNullNotAllowed,Microsoft.PowerShell.Commands.ExportClixmlCommand")
$testData += [TestData]::new("with path as Empty string", "", $gps, "ParameterArgumentValidationErrorEmptyStringNotAllowed,Microsoft.PowerShell.Commands.ExportClixmlCommand")
$testData += [TestData]::new("with path as non filesystem provider", "env:\", $gps, "ReadWriteFileNotFileSystemProvider,Microsoft.PowerShell.Commands.ExportClixmlCommand")
}
AfterEach {
Remove-Item $filePath -Force -ErrorAction SilentlyContinue
}
$testData | ForEach-Object {
It "$($_.testName)" {
$test = $_
{ Export-Clixml -Depth 1 -LiteralPath $test.testFile -InputObject $test.inputObject -Force } | Should -Throw -ErrorId $test.expectedError
}
}
It "can be created with literal path" {
$filePath = Join-Path $subFilePath 'gps.xml'
Export-Clixml -Depth 1 -LiteralPath $filePath -InputObject ($gpsList | Select-Object -First 1)
$filePath | Should -Exist
$fileContent = Get-Content $filePath
$isExisted = $false
foreach($item in $fileContent)
{
foreach($gpsItem in $gpsList)
{
$checkId = $gpsItem.Id
if (($null -ne $(Select-String -InputObject $item -SimpleMatch $checkId)) -and ($null -ne $(Select-String -InputObject $item -SimpleMatch "Id")))
{
$isExisted = $true
break;
}
}
}
$isExisted | Should -BeTrue
}
It "can be created with literal path using pipeline" {
$filePath = Join-Path $subFilePath 'gps.xml'
($gpsList | Select-Object -First 1) | Export-Clixml -Depth 1 -LiteralPath $filePath
$filePath | Should -Exist
$fileContent = Get-Content $filePath
$isExisted = $false
foreach($item in $fileContent)
{
foreach($gpsItem in $gpsList)
{
$checkId = $gpsItem.Id
if (($null -ne $(Select-String -InputObject $item -SimpleMatch $checkId)) -and ($null -ne $(Select-String -InputObject $item -SimpleMatch "Id")))
{
$isExisted = $true
break;
}
}
}
$isExisted | Should -BeTrue
}
}
Context "Import-CliXML" {
BeforeAll {
$gpsList = Get-Process pwsh
$gps = $gpsList | Select-Object -First 1
$filePath = Join-Path $subFilePath 'gps.xml'
$testData = @()
$testData += [TestData]::new("with path as Null", [NullString]::Value, $null, "ParameterArgumentValidationErrorNullNotAllowed,Microsoft.PowerShell.Commands.ImportClixmlCommand")
$testData += [TestData]::new("with path as Empty string", "", $null, "ParameterArgumentValidationErrorEmptyStringNotAllowed,Microsoft.PowerShell.Commands.ImportClixmlCommand")
$testData += [TestData]::new("with path as non filesystem provider", "env:\", $null, "ReadWriteFileNotFileSystemProvider,Microsoft.PowerShell.Commands.ImportClixmlCommand")
}
$testData | ForEach-Object {
It "$($_.testName)" {
$test = $_
{ Import-Clixml -LiteralPath $test.testFile } | Should -Throw -ErrorId $test.expectedError
}
}
It "can import from a literal path" {
Export-Clixml -Depth 1 -LiteralPath $filePath -InputObject $gps
$filePath | Should -Exist
$fileContent = Get-Content $filePath
$fileContent | Should -Not -Be $null
$importedProcess = Import-Clixml $filePath
$importedProcess.ProcessName | Should -Not -BeNullOrEmpty
$gps.ProcessName | Should -Be $importedProcess.ProcessName
$importedProcess.Id | Should -Not -BeNullOrEmpty
$gps.Id | Should -Be $importedProcess.Id
}
It "can import from a literal path using pipeline" {
$gps | Export-Clixml -Depth 1 -LiteralPath $filePath
$filePath | Should -Exist
$fileContent = Get-Content $filePath
$fileContent | Should -Not -Be $null
$importedProcess = Import-Clixml $filePath
$importedProcess.ProcessName | Should -Not -BeNullOrEmpty
$gps.ProcessName | Should -Be $importedProcess.ProcessName
$importedProcess.Id | Should -Not -BeNullOrEmpty
$gps.Id | Should -Be $importedProcess.Id
}
It "test follow-up for WinBlue: 161470 - Export-CliXml errors in WhatIf scenarios" {
$testPath = "testdrive:\Bug161470NonExistPath.txt"
Export-Clixml -Path $testPath -InputObject "string" -WhatIf
$testPath | Should -Not -Exist
}
It "should import PSCredential" {
$UserName = "Foo"
$pass = ConvertTo-SecureString (New-RandomHexString) -AsPlainText -Force
$cred = [PSCredential]::new($UserName, $pass)
$path = "$testdrive/cred.xml"
$cred | Export-Clixml -Path $path
$cred = Import-Clixml -Path $path
$cred.UserName | Should -BeExactly "Foo"
$cred.Password | Should -BeOfType "System.Security.SecureString"
}
}
}
Describe "Deserializing corrupted Cim classes should not instantiate non-Cim types" -Tags "Feature","Slow" {
BeforeAll {
$shouldRunTest = $IsWindows -and ((Get-Command calc.exe -ErrorAction SilentlyContinue) -ne $null)
$skipNotWindows = ! $shouldRunTest
if ( $shouldRunTest )
{
(Get-Process -Name 'win32calc','calculator' 2> $null) | Stop-Process -Force -ErrorAction SilentlyContinue
}
}
AfterAll {
if ( $shouldRunTest )
{
(Get-Process -Name 'win32calc','calculator' 2> $null) | Stop-Process -Force -ErrorAction SilentlyContinue
}
}
It "Verifies that importing the corrupted Cim class does not launch calc.exe" -skip:$skipNotWindows {
Import-Clixml -Path (Join-Path $PSScriptRoot "assets\CorruptedCim.clixml")
$calcProc = $null
$count = 0
while (!$calcProc -and ($count++ -lt 20))
{
$calcProc = Get-Process -Name 'win32calc','calculator' 2> $null
Start-Sleep -Milliseconds 500
}
$calcProc | Should -BeNullOrEmpty
}
}
|
combined_dataset/train/non-malicious/2792.ps1 | 2792.ps1 |
if (Get-Command logparser.exe) {
$lpquery = @"
SELECT
COUNT(IpAddr, Mac, Type) as ct,
IpAddr,
Mac,
Type
FROM
*arp.csv
GROUP BY
IpAddr,
Mac,
Type
ORDER BY
ct ASC
"@
& logparser -stats:off -i:csv -dtlines:0 -rtp:-1 "$lpquery"
} else {
$ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName)
"${ScriptName} requires logparser.exe in the path."
}
|
combined_dataset/train/non-malicious/Set-Wallpaper (CTP3)_2.ps1 | Set-Wallpaper (CTP3)_2.ps1 | #requires -version 2.0
## Set-Wallpaper - set your windows desktop wallpaper
###################################################################################################
## Usage:
## Set-Wallpaper "C:\\Users\\Joel\\Pictures\\Wallpaper\\Dual Monitor\\mandolux-tiger.jpg" "Tile"
## ls *.jpg | get-random | Set-Wallpaper
## ls *.jpg | get-random | Set-Wallpaper -Style "Stretch"
###################################################################################################
## History:
## v0.5 First release (on #PowerShell@irc.freenode.net)
## v1.0 Public release (http://www.poshcode.org/488)
## - Added Style: Tile|Center|Stretch
## v1.1 (http://poshcode.org/491)
## - Added "NoChange" style to just use the style setting already set
## - Made the Style parameter to the cmdlet optional
## v2.0 This Release
## - Updated for CTP3, and made it run as a script instead of a function.
###################################################################################################
[CmdletBinding()]
Param(
[Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("FullName")]
[string]
$Path
,
[Parameter(Position=1, Mandatory=$false)]
$Style = "NoChange"
)
BEGIN {
try {
$WP = [Wallpaper.Setter]
} catch {
$WP = add-type @"
using System;
using System.Runtime.InteropServices;
using Microsoft.Win32;
namespace Wallpaper
{
public enum Style : int
{
Tile, Center, Stretch, NoChange
}
public class Setter {
public const int SetDesktopWallpaper = 20;
public const int UpdateIniFile = 0x01;
public const int SendWinIniChange = 0x02;
[DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)]
private static extern int SystemParametersInfo (int uAction, int uParam, string lpvParam, int fuWinIni);
public static void SetWallpaper ( string path, Wallpaper.Style style ) {
SystemParametersInfo( SetDesktopWallpaper, 0, path, UpdateIniFile | SendWinIniChange );
RegistryKey key = Registry.CurrentUser.OpenSubKey("Control Panel\\\\Desktop", true);
switch( style )
{
case Style.Stretch :
key.SetValue(@"WallpaperStyle", "2") ;
key.SetValue(@"TileWallpaper", "0") ;
break;
case Style.Center :
key.SetValue(@"WallpaperStyle", "1") ;
key.SetValue(@"TileWallpaper", "0") ;
break;
case Style.Tile :
key.SetValue(@"WallpaperStyle", "1") ;
key.SetValue(@"TileWallpaper", "1") ;
break;
case Style.NoChange :
break;
}
key.Close();
}
}
}
"@ -Passthru
}
}
PROCESS {
Write-Verbose "Setting Wallpaper ($Style) to $(Convert-Path $Path)"
$WP::SetWallpaper( (Convert-Path $Path), $Style )
}
|
combined_dataset/train/non-malicious/sample_9_73.ps1 | sample_9_73.ps1 | #************************************************
# TS_MCALite.ps1
# Version 1.0.1
# Date: 7/17/2012
# Author: tspring
# Description: [Idea ID 4796] [Windows] MaxConcurrentApi Problem Detection Lite
# Rule number: 4796
# Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=4796
#************************************************
# 2023-02-20 WalterE mod Trap #we#
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber 4796
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_MaxConcurrentApiLite"
$PublicContent = "http://support.microsoft.com/kb/975363"
$Verbosity = "Error"
$Visibility = "4"
$SupportTopicsID = "18542"
$Title = $ScriptStrings.ID_MaxConcurrentApiLite_ST
$InformationCollected = new-object PSObject
$IssueDetected = $False
# ***************************
# Data Gathering
# ***************************
Function AppliesToSystem{
$RuleApplicable = $false
$cs = Get-CimInstance -class win32_computersystem
$DomainRole = $cs.domainrole
if ($DomainRole -le 1){ #MaxConcurrentApi outages do not apply to workstations.
$RuleApplicable = $false
}else{
if ($OSVersion.Major -lt 6){
$OS = Get-CimInstance -Class Win32_OperatingSystem
$sp = $OS.ServicePackMajorVersion
#Hotfix Check for presence of Netlogon Performance Counters: KB928576
if ($sp -ge 2){
if ((CheckMinimalFileVersion "$System32Folder\Nlperf.dll" 5 2 3790 4106) -and
(CheckMinimalFileVersion "$System32Folder\Netapi32.dll" 5 2 3790 4106) -and
(CheckMinimalFileVersion "$System32Folder\Netlogon.dll" 5 2 3790 4106))
{$RuleApplicable = $True}}
if ($sp -le 1){
if ((CheckMinimalFileVersion "$System32Folder\Nlperf.dll" 5 2 3790 2962) -and
(CheckMinimalFileVersion "$System32Folder\Netapi32.dll" 5 2 3790 2962) -and
(CheckMinimalFileVersion "$System32Folder\Netlogon.dll" 5 2 3790 2962))
{$RuleApplicable = $True}
}
}else{$RuleApplicable = $True}
}
if ($RuleApplicable -eq $True){
Write-DiagProgress -Activity $ScriptStrings.ID_MCALite_Status -Status $ScriptStrings.ID_MCALite_Wait
return $True
}
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if (AppliesToSystem){
function MCAProblemCheckLite {
param($InstanceName)
$DetectionTime = Get-Date
$ProblemDetected = $False
$SA = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Semaphore Acquires", $InstanceName)
$ST = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Semaphore Timeouts", $InstanceName)
$SW = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Semaphore Waiters", $InstanceName)
$SH = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Semaphore Holders", $InstanceName)
$ASHT = New-Object System.Diagnostics.PerformanceCounter("Netlogon", "Average Semaphore Hold Time", $InstanceName)
$SemAcquires = $SA.NextValue()
$SemTimeouts = $ST.NextValue()
$SemWaiters = $SW.NextValue()
$SemHolders = $SH.NextValue()
$SemHoldTime = $ASHT.NextValue()
#Detect problems. Exclude false positives if the counter has seen the buffer overrun bug from KB2685888.
if ((($SemWaiters -gt 0) -and (-not($SemWaiters -gt 4294000000))) -or (($SemTimeouts -gt 0) -and (-not($SemTimeouts -gt 4294000000)))){
$ProblemDetected = $true
}
$ReturnValues = new-object PSObject
$InstanceName = $InstanceName.replace('\','')
#Determine how long the computer has been running since last reboot.
$wmi = Get-CimInstance -Class Win32_OperatingSystem -ComputerName $ComputerName
$LocalDateTime = $wmi.LocalDateTime
$Uptime = $wmi.ConvertToDateTime($wmi.LocalDateTime) - $wmi.ConvertToDateTime($wmi.LastBootUpTime)
$Days = $Uptime.Days.ToString()
$Hours = $Uptime.Hours.ToString()
$UpTimeStatement = $Days + " days " + $Hours + " hours"
add-member -inputobject $ReturnValues -membertype noteproperty -name "Detection Time" -value $DetectionTime
add-member -inputobject $ReturnValues -membertype noteproperty -name "Time Since Last Reboot" -value $UpTimeStatement
add-member -inputobject $ReturnValues -membertype noteproperty -name "Trust Secure Channel To" -value $InstanceName
add-member -inputobject $ReturnValues -membertype noteproperty -name "Client Timeouts (over life of secure channel)" -value $SemTimeouts
add-member -inputobject $ReturnValues -membertype noteproperty -name "Clients Currently Waiting" -value $SemWaiters
add-member -inputobject $ReturnValues -membertype noteproperty -name "MaxConcurrentApi Thread Uses (Semaphore Acquires over life of secure channel)" -value $SemAcquires
add-member -inputobject $ReturnValues -membertype noteproperty -name "Semaphore Holders" -value $SemHolders
add-member -inputobject $ReturnValues -membertype noteproperty -name "Average Semaphore Hold Time" -value $SemHoldTime
add-member -inputobject $ReturnValues -membertype noteproperty -name "Problem Detected" -value $ProblemDetected
return $ReturnValues
}
function GetSecureChannelNames {
#Returns an array of secure channel names from the Netlogon performannce counter.
$Instances = New-Object System.Diagnostics.PerformanceCounterCategory("Netlogon")
$AllInstanceNames = $Instances.GetInstanceNames()
return $AllInstanceNames
}
$SCNames = GetSecureChannelNames
$LoopCounter = $SCNames.Count
for ($i = 0; $i -lt $LoopCounter; $i++){
$InformationCollected = MCAProblemCheckLite ($SCNames[$i])
if ($InformationCollected."Problem Detected" -eq $true){
$IssueDetected = $True
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title -MessageVersion 2
}
}
}
# *********************
# Root Cause processing
# *********************
if ($IssueDetected -eq $true){
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $True
}else{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $False
}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBW4lYWe/crdhSt
# x6OpSEPrv5sbxx0oQ2FG0U/hdMTjG6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKj4icJqRWSyqHa1zTQEpmAc
# 2t4D+nZxhRt+0XvNTzlOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEACFYcszD0SAW+8LGv7Mhba7G2lIvEH+VxJfKXHMHSU3w9uBKQN6XMWhTS
# SWbi5QN6CaTCEaYDr9svFVJmJi8iywqeYKZeeOKAAlaC3QI8BZPFInr8GSHdBN2R
# jTspQxbwFLSpXxTvl4nTtTGrwWwypeLLUSjyIBA0hbtpe3PRj+INXWV0vp0lTJ/U
# CtPPdV1AcB4oai5VB3WkyN4EpQf6zPyJShxVO4a1/d5Hfv//p0L0mnh1jHN+ylbY
# KepRGxQjZUd4kDNqCCarJiFCk4DDykkPWmaBy/d0ENxgl5geHoMLVUq+WMmFtGOW
# 0UijLwmp9lrc6Vn5jBguzxaeI9i5dKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCARNI2OhRF0AJyRx4IDpLrjOQBtY23bE6KaOGXg8MJnvwIGZv8ZfhGP
# GBMyMDI0MTAyODExNDAzOS44MzRaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMvJmpUXSLBAAEAAAH2MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZCMDUt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0UJeLMR/N9WPBZhuKVFF
# +eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5AjaVh19ZVjDChHzimxsoaXx
# Nu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7VONShujl1NCMkcgSrPdmd
# /8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzmkWJD0N+60IiogFBzg3yI
# SsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK/nV/aXjuo9LMrrRmn44o
# YYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2VmbNWCjQWq5G4YkrcqbPMa
# x7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL0hjxg44kpQn384V46o+z
# dQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6wGOrPfzIm0FdOn+xFo48E
# Rl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBcEFTOvS9E0diNu1eocw+Z
# Ckz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25gD8tO9zJg6g6fRpaZc43
# 9mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2HWfMoqqd9uiQ0hTUEhG4
# 4FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRIwZsJuOcJ
# fScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA13kBirH1cHu1
# WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTYxaPfp2IVFdgjaMaBi81w
# B8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuwgdIdQvqE0h8VQ5QW5sDV
# 4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB71a7dB9zgHOkW0hgUEeWO
# 9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NTEU/4vlvsRIMWT0jsnNI7
# 1jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3hOLblC1vxM3+wMyOh97aF
# Os7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDkC9AxXYB3yEtuwMs7pRWL
# yxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWiCVslJbFIIB/4Alv+jQJS
# KAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEPcEzG1dO9zIa1Mp32J+zz
# W3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJm41ErdiTjAmdClen9yl6
# HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFBtQNEzcCdh1GYw/6nzzNN
# t+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a06JFIuGFHIj/I+36ggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0MTAyOTEwMTYxNVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEAAgIV+jAHAgEAAgISoDAK
# AgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBpUFU4+vZJFyUm
# Vb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGXevIycaqI5McGg28UnXlT
# 85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQuxkh2lsfu3f8RO+rHyvy
# oc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMIGgIOURNjC5+mH+r4R0gk
# grO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnExw84j1PW/7aPVhavzoHfT
# 0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6jvcBxO0h6Uf9FkqnHwg7B
# sMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgFyzh2WOUI5MH
# lu6IdOWVbPgoS58tc2C5MUlVxJBbPzAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+LlQjG2ojCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLBAAEAAAH2
# MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhIwwAlMA0GCSqGSIb3DQEB
# CwUABIICABwGwYhXm+S3XuF4XtDa79djUfPU6e9Xd5Qr4TliC/7ZeJKdhAoy6HS4
# /mV5qrrOLPhnSzcpju2LKFQT+/np3b+1Al8ebf+wMeXQ6v1i5Sq6mkchjhuB85zO
# VAUeYG4xYzRr/IIC8JGzJghpsxvSNxC8rB0ei8wNs8rEffCvAK80OHQWqTNGNF03
# TVl0Z4KNhnw3G+mUc0uf08JnFfRP3lO447jm8ufSmf5G01p+XKD4lInJxaPSjkmz
# 1HrYzqoCfTdT3Dez5aKUdiehH90s1Pcvu3+ifLSvfzkJIaBI2t2yRyfuG2Mg+NJc
# tNSpFTa66stu+HOKjtUS3vHuUlnyZGZzqTyysQV7bBdfgc/AP5+ePb3D1DlLf/Sh
# auGbQfNRUafbaQQSBlSwkpO/XyOGfdKopcn8FlkTqolpjOYRkOgdB7mZuZ8b8EwZ
# pUFuqUwM/VL96HsCKKxWrAB+khSVY3trDs4sbLFvHmbKFeFJuuT/GjRZG/857Hmg
# KhVyg6y8Mnfli4jAaSkigjWg1qFmI+MDlMRwgr/RNq3ZpaEn6q5wckX1jw3ax/lq
# g53D0tK+ya+TA/tujN497ASy/0WWRFqhth+jqnG+HoJEnwhfVmz9f0PuDpuXwOsE
# iLLL9IXcJeaEVOZGQe7c5Fh89lCKtF2tYBDZzbEjCjCXO75fMCZw
# SIG # End signature block
|
combined_dataset/train/non-malicious/757.ps1 | 757.ps1 |
$null = New-Item -Path "$PSScriptRoot\foo[1].txt" -Force
Import-Module $PSScriptRoot\..\SampleModule.psd1
$WorkspaceRoot = Convert-Path $PSScriptRoot/..
Set-Location $WorkspaceRoot
Describe 'Verify Path Processing for Non-existing Paths Allowed Impl' {
It 'Processes non-wildcard absolute path to non-existing file via -Path param' {
New-File -Path $WorkspaceRoot\ReadmeNew.md | Should Be "$WorkspaceRoot\READMENew.md"
}
It 'Processes multiple absolute paths via -Path param' {
New-File -Path $WorkspaceRoot\Readme.md, $WorkspaceRoot\XYZZY.ps1 |
Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\XYZZY.ps1")
}
It 'Processes relative path via -Path param' {
New-File -Path ..\Examples\READMENew.md | Should Be "$WorkspaceRoot\READMENew.md"
}
It 'Processes multiple relative path via -Path param' {
New-File -Path ..\Examples\README.md, XYZZY.ps1 |
Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\XYZZY.ps1")
}
It 'Should accept pipeline input to Path' {
Get-ChildItem -LiteralPath "$WorkspaceRoot\Tests\foo[1].txt" | New-File | Should Be "$PSScriptRoot\foo[1].txt"
}
}
Describe 'Verify Path Processing for NO Wildcards Allowed Impl' {
It 'Processes non-wildcard absolute path via -Path param' {
Import-FileNoWildcard -Path $WorkspaceRoot\Readme.md | Should Be "$WorkspaceRoot\README.md"
}
It 'Processes multiple absolute paths via -Path param' {
Import-FileNoWildcard -Path $WorkspaceRoot\Readme.md, $WorkspaceRoot\PathProcessingWildcards.ps1 |
Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\PathProcessingWildcards.ps1")
}
It 'Processes relative path via -Path param' {
Import-FileNoWildcard -Path ..\examples\README.md | Should Be "$WorkspaceRoot\README.md"
}
It 'Processes multiple relative path via -Path param' {
Import-FileNoWildcard -Path ..\examples\README.md, .vscode\launch.json |
Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\.vscode\launch.json")
}
It 'Should accept pipeline input to Path' {
Get-ChildItem -LiteralPath "$WorkspaceRoot\Tests\foo[1].txt" | Import-FileNoWildcard | Should Be "$PSScriptRoot\foo[1].txt"
}
}
Describe 'Verify Path Processing for Wildcards Allowed Impl' {
It 'Processes non-wildcard absolute path via -Path param' {
Import-FileWildcard -Path $WorkspaceRoot\Readme.md | Should Be "$WorkspaceRoot\README.md"
}
It 'Processes multiple absolute paths via -Path param' {
Import-FileWildcard -Path $WorkspaceRoot\Readme.md, $WorkspaceRoot\PathProcessingWildcards.ps1 |
Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\PathProcessingWildcards.ps1")
}
It 'Processes wildcard absolute path via -Path param' {
$files = Import-FileWildcard -Path $WorkspaceRoot\*.psd1
$files.Count | Should Be 2
$files[0] | Should Be "$WorkspaceRoot\PSScriptAnalyzerSettings.psd1"
$files[1] | Should Be "$WorkspaceRoot\SampleModule.psd1"
}
It 'Processes wildcard relative path via -Path param' {
$files = Import-FileWildcard -Path *.psd1
$files.Count | Should Be 2
$files[0] | Should Be "$WorkspaceRoot\PSScriptAnalyzerSettings.psd1"
$files[1] | Should Be "$WorkspaceRoot\SampleModule.psd1"
}
It 'Processes relative path via -Path param' {
Import-FileWildcard -Path ..\examples\README.md | Should Be "$WorkspaceRoot\README.md"
}
It 'Processes multiple relative path via -Path param' {
Import-FileWildcard -Path ..\examples\README.md, .vscode\launch.json |
Should Be @("$WorkspaceRoot\README.md", "$WorkspaceRoot\.vscode\launch.json")
}
It 'DefaultParameterSet should be Path' {
$files = Import-FileWildcard *.psd1
$files.Count | Should Be 2
$files[0] | Should Be "$WorkspaceRoot\PSScriptAnalyzerSettings.psd1"
$files[1] | Should Be "$WorkspaceRoot\SampleModule.psd1"
}
It 'Should process absolute literal paths via -LiteralPath param'{
Import-FileWildcard -LiteralPath "$PSScriptRoot\foo[1].txt" | Should Be "$PSScriptRoot\foo[1].txt"
}
It 'Should process relative literal paths via -LiteralPath param'{
Import-FileWildcard -LiteralPath "..\examples\Tests\foo[1].txt" | Should Be "$PSScriptRoot\foo[1].txt"
}
It 'Should process multiple literal paths via -LiteralPath param'{
Import-FileWildcard -LiteralPath "..\examples\Tests\foo[1].txt", "$WorkspaceRoot\README.md" |
Should Be @("$PSScriptRoot\foo[1].txt", "$WorkspaceRoot\README.md")
}
It 'Should accept pipeline input to LiteralPath' {
Get-ChildItem -LiteralPath "$WorkspaceRoot\Tests\foo[1].txt" | Import-FileWildcard | Should Be "$PSScriptRoot\foo[1].txt"
}
}
|
combined_dataset/train/non-malicious/1381.ps1 | 1381.ps1 |
function Set-CSslCertificateBinding
{
[CmdletBinding(SupportsShouldProcess=$true)]
[OutputType([Carbon.Certificates.SslCertificateBinding])]
param(
[IPAddress]
$IPAddress = '0.0.0.0',
[UInt16]
$Port = 443,
[Parameter(Mandatory=$true)]
[Guid]
$ApplicationID,
[Parameter(Mandatory=$true)]
[ValidatePattern("^[0-9a-f]{40}$")]
[string]
$Thumbprint,
[Switch]
$PassThru
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
if( $IPAddress.AddressFamily -eq [Net.Sockets.AddressFamily]::InterNetworkV6 )
{
$ipPort = '[{0}]:{1}' -f $IPAddress,$Port
}
else
{
$ipPort = '{0}:{1}' -f $IPAddress,$Port
}
Remove-CSslCertificateBinding -IPAddress $IPAddress -Port $Port
$action = 'creating SSL certificate binding'
if( $pscmdlet.ShouldProcess( $IPPort, $action ) )
{
$appID = $ApplicationID.ToString('B')
Invoke-ConsoleCommand -Target $ipPort -Action $action -ScriptBlock {
netsh http add sslcert ipport=$ipPort certhash=$Thumbprint appid=$appID
}
if( $PassThru )
{
Get-CSslCertificateBinding -IPAddress $IPAddress -Port $Port
}
}
}
|
combined_dataset/train/non-malicious/sample_66_55.ps1 | sample_66_55.ps1 | <#
.Synopsis
Activate a Python virtual environment for the current PowerShell session.
.Description
Pushes the python executable for a virtual environment to the front of the
$Env:PATH environment variable and sets the prompt to signify that you are
in a Python virtual environment. Makes use of the command line switches as
well as the `pyvenv.cfg` file values present in the virtual environment.
.Parameter VenvDir
Path to the directory that contains the virtual environment to activate. The
default value for this is the parent of the directory that the Activate.ps1
script is located within.
.Parameter Prompt
The prompt prefix to display when this virtual environment is activated. By
default, this prompt is the name of the virtual environment folder (VenvDir)
surrounded by parentheses and followed by a single space (ie. '(.venv) ').
.Example
Activate.ps1
Activates the Python virtual environment that contains the Activate.ps1 script.
.Example
Activate.ps1 -Verbose
Activates the Python virtual environment that contains the Activate.ps1 script,
and shows extra information about the activation as it executes.
.Example
Activate.ps1 -VenvDir C:\Users\MyUser\Common\.venv
Activates the Python virtual environment located in the specified location.
.Example
Activate.ps1 -Prompt "MyPython"
Activates the Python virtual environment that contains the Activate.ps1 script,
and prefixes the current prompt with the specified string (surrounded in
parentheses) while the virtual environment is active.
.Notes
On Windows, it may be required to enable this Activate.ps1 script by setting the
execution policy for the user. You can do this by issuing the following PowerShell
command:
PS C:\> Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
For more information on Execution Policies:
https://go.microsoft.com/fwlink/?LinkID=135170
#>
Param(
[Parameter(Mandatory = $false)]
[String]
$VenvDir,
[Parameter(Mandatory = $false)]
[String]
$Prompt
)
<# Function declarations --------------------------------------------------- #>
<#
.Synopsis
Remove all shell session elements added by the Activate script, including the
addition of the virtual environment's Python executable from the beginning of
the PATH variable.
.Parameter NonDestructive
If present, do not remove this function from the global namespace for the
session.
#>
function global:deactivate ([switch]$NonDestructive) {
# Revert to original values
# The prior prompt:
if (Test-Path -Path Function:_OLD_VIRTUAL_PROMPT) {
Copy-Item -Path Function:_OLD_VIRTUAL_PROMPT -Destination Function:prompt
Remove-Item -Path Function:_OLD_VIRTUAL_PROMPT
}
# The prior PYTHONHOME:
if (Test-Path -Path Env:_OLD_VIRTUAL_PYTHONHOME) {
Copy-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME -Destination Env:PYTHONHOME
Remove-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME
}
# The prior PATH:
if (Test-Path -Path Env:_OLD_VIRTUAL_PATH) {
Copy-Item -Path Env:_OLD_VIRTUAL_PATH -Destination Env:PATH
Remove-Item -Path Env:_OLD_VIRTUAL_PATH
}
# Just remove the VIRTUAL_ENV altogether:
if (Test-Path -Path Env:VIRTUAL_ENV) {
Remove-Item -Path env:VIRTUAL_ENV
}
# Just remove VIRTUAL_ENV_PROMPT altogether.
if (Test-Path -Path Env:VIRTUAL_ENV_PROMPT) {
Remove-Item -Path env:VIRTUAL_ENV_PROMPT
}
# Just remove the _PYTHON_VENV_PROMPT_PREFIX altogether:
if (Get-Variable -Name "_PYTHON_VENV_PROMPT_PREFIX" -ErrorAction SilentlyContinue) {
Remove-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Scope Global -Force
}
# Leave deactivate function in the global namespace if requested:
if (-not $NonDestructive) {
Remove-Item -Path function:deactivate
}
}
<#
.Description
Get-PyVenvConfig parses the values from the pyvenv.cfg file located in the
given folder, and returns them in a map.
For each line in the pyvenv.cfg file, if that line can be parsed into exactly
two strings separated by `=` (with any amount of whitespace surrounding the =)
then it is considered a `key = value` line. The left hand string is the key,
the right hand is the value.
If the value starts with a `'` or a `"` then the first and last character is
stripped from the value before being captured.
.Parameter ConfigDir
Path to the directory that contains the `pyvenv.cfg` file.
#>
function Get-PyVenvConfig(
[String]
$ConfigDir
) {
Write-Verbose "Given ConfigDir=$ConfigDir, obtain values in pyvenv.cfg"
# Ensure the file exists, and issue a warning if it doesn't (but still allow the function to continue).
$pyvenvConfigPath = Join-Path -Resolve -Path $ConfigDir -ChildPath 'pyvenv.cfg' -ErrorAction Continue
# An empty map will be returned if no config file is found.
$pyvenvConfig = @{ }
if ($pyvenvConfigPath) {
Write-Verbose "File exists, parse `key = value` lines"
$pyvenvConfigContent = Get-Content -Path $pyvenvConfigPath
$pyvenvConfigContent | ForEach-Object {
$keyval = $PSItem -split "\s*=\s*", 2
if ($keyval[0] -and $keyval[1]) {
$val = $keyval[1]
# Remove extraneous quotations around a string value.
if ("'""".Contains($val.Substring(0, 1))) {
$val = $val.Substring(1, $val.Length - 2)
}
$pyvenvConfig[$keyval[0]] = $val
Write-Verbose "Adding Key: '$($keyval[0])'='$val'"
}
}
}
return $pyvenvConfig
}
<# Begin Activate script --------------------------------------------------- #>
# Determine the containing directory of this script
$VenvExecPath = Split-Path -Parent $MyInvocation.MyCommand.Definition
$VenvExecDir = Get-Item -Path $VenvExecPath
Write-Verbose "Activation script is located in path: '$VenvExecPath'"
Write-Verbose "VenvExecDir Fullname: '$($VenvExecDir.FullName)"
Write-Verbose "VenvExecDir Name: '$($VenvExecDir.Name)"
# Set values required in priority: CmdLine, ConfigFile, Default
# First, get the location of the virtual environment, it might not be
# VenvExecDir if specified on the command line.
if ($VenvDir) {
Write-Verbose "VenvDir given as parameter, using '$VenvDir' to determine values"
}
else {
Write-Verbose "VenvDir not given as a parameter, using parent directory name as VenvDir."
$VenvDir = $VenvExecDir.Parent.FullName.TrimEnd("\\/")
Write-Verbose "VenvDir=$VenvDir"
}
# Next, read the `pyvenv.cfg` file to determine any required value such
# as `prompt`.
$pyvenvCfg = Get-PyVenvConfig -ConfigDir $VenvDir
# Next, set the prompt from the command line, or the config file, or
# just use the name of the virtual environment folder.
if ($Prompt) {
Write-Verbose "Prompt specified as argument, using '$Prompt'"
}
else {
Write-Verbose "Prompt not specified as argument to script, checking pyvenv.cfg value"
if ($pyvenvCfg -and $pyvenvCfg['prompt']) {
Write-Verbose " Setting based on value in pyvenv.cfg='$($pyvenvCfg['prompt'])'"
$Prompt = $pyvenvCfg['prompt'];
}
else {
Write-Verbose " Setting prompt based on parent's directory's name. (Is the directory name passed to venv module when creating the virtual environment)"
Write-Verbose " Got leaf-name of $VenvDir='$(Split-Path -Path $venvDir -Leaf)'"
$Prompt = Split-Path -Path $venvDir -Leaf
}
}
Write-Verbose "Prompt = '$Prompt'"
Write-Verbose "VenvDir='$VenvDir'"
# Deactivate any currently active virtual environment, but leave the
# deactivate function in place.
deactivate -nondestructive
# Now set the environment variable VIRTUAL_ENV, used by many tools to determine
# that there is an activated venv.
$env:VIRTUAL_ENV = $VenvDir
$env:VIRTUAL_ENV_PROMPT = $Prompt
if (-not $Env:VIRTUAL_ENV_DISABLE_PROMPT) {
Write-Verbose "Setting prompt to '$Prompt'"
# Set the prompt to include the env name
# Make sure _OLD_VIRTUAL_PROMPT is global
function global:_OLD_VIRTUAL_PROMPT { "" }
Copy-Item -Path function:prompt -Destination function:_OLD_VIRTUAL_PROMPT
New-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Description "Python virtual environment prompt prefix" -Scope Global -Option ReadOnly -Visibility Public -Value $Prompt
function global:prompt {
Write-Host -NoNewline -ForegroundColor Green "($_PYTHON_VENV_PROMPT_PREFIX) "
_OLD_VIRTUAL_PROMPT
}
}
# Clear PYTHONHOME
if (Test-Path -Path Env:PYTHONHOME) {
Copy-Item -Path Env:PYTHONHOME -Destination Env:_OLD_VIRTUAL_PYTHONHOME
Remove-Item -Path Env:PYTHONHOME
}
# Add the venv to the PATH
Copy-Item -Path Env:PATH -Destination Env:_OLD_VIRTUAL_PATH
$Env:PATH = "$VenvExecDir$([System.IO.Path]::PathSeparator)$Env:PATH"
# SIG # Begin signature block
# MIIvKgYJKoZIhvcNAQcCoIIvGzCCLxcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBALKwKRFIhr2RY
# IW/WJLd9pc8a9sj/IoThKU92fTfKsKCCE8MwggWQMIIDeKADAgECAhAFmxtXno4h
# MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z
# ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z
# G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ
# anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s
# Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL
# 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb
# BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3
# JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c
# AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx
# YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0
# viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL
# T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud
# EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf
# Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk
# aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS
# PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK
# 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB
# cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp
# 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg
# dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri
# RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7
# 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5
# nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3
# i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H
# EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G
# CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C
# 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce
# 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da
# E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T
# SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA
# FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh
# D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM
# 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z
# 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05
# huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY
# mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP
# /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T
# AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD
# VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG
# A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY
# aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj
# ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV
# HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU
# cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN
# BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry
# sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL
# IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf
# Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh
# OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh
# dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV
# 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j
# wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH
# Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC
# XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l
# /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW
# eE4wggd3MIIFX6ADAgECAhAHHxQbizANJfMU6yMM0NHdMA0GCSqGSIb3DQEBCwUA
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwHhcNMjIwMTE3MDAwMDAwWhcNMjUwMTE1MjM1OTU5WjB8MQsw
# CQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29uMRIwEAYDVQQHEwlCZWF2ZXJ0b24x
# IzAhBgNVBAoTGlB5dGhvbiBTb2Z0d2FyZSBGb3VuZGF0aW9uMSMwIQYDVQQDExpQ
# eXRob24gU29mdHdhcmUgRm91bmRhdGlvbjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAKgc0BTT+iKbtK6f2mr9pNMUTcAJxKdsuOiSYgDFfwhjQy89koM7
# uP+QV/gwx8MzEt3c9tLJvDccVWQ8H7mVsk/K+X+IufBLCgUi0GGAZUegEAeRlSXx
# xhYScr818ma8EvGIZdiSOhqjYc4KnfgfIS4RLtZSrDFG2tN16yS8skFa3IHyvWdb
# D9PvZ4iYNAS4pjYDRjT/9uzPZ4Pan+53xZIcDgjiTwOh8VGuppxcia6a7xCyKoOA
# GjvCyQsj5223v1/Ig7Dp9mGI+nh1E3IwmyTIIuVHyK6Lqu352diDY+iCMpk9Zanm
# SjmB+GMVs+H/gOiofjjtf6oz0ki3rb7sQ8fTnonIL9dyGTJ0ZFYKeb6BLA66d2GA
# LwxZhLe5WH4Np9HcyXHACkppsE6ynYjTOd7+jN1PRJahN1oERzTzEiV6nCO1M3U1
# HbPTGyq52IMFSBM2/07WTJSbOeXjvYR7aUxK9/ZkJiacl2iZI7IWe7JKhHohqKuc
# eQNyOzxTakLcRkzynvIrk33R9YVqtB4L6wtFxhUjvDnQg16xot2KVPdfyPAWd81w
# tZADmrUtsZ9qG79x1hBdyOl4vUtVPECuyhCxaw+faVjumapPUnwo8ygflJJ74J+B
# Yxf6UuD7m8yzsfXWkdv52DjL74TxzuFTLHPyARWCSCAbzn3ZIly+qIqDAgMBAAGj
# ggIGMIICAjAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4E
# FgQUt/1Teh2XDuUj2WW3siYWJgkZHA8wDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQM
# MAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0wgaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRp
# Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNI
# QTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRwOi8vY3JsNC5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0Ex
# LmNybDA+BgNVHSAENzA1MDMGBmeBDAEEATApMCcGCCsGAQUFBwIBFhtodHRwOi8v
# d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUF
# BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu
# aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZI
# hvcNAQELBQADggIBABxv4AeV/5ltkELHSC63fXAFYS5tadcWTiNc2rskrNLrfH1N
# s0vgSZFoQxYBFKI159E8oQQ1SKbTEubZ/B9kmHPhprHya08+VVzxC88pOEvz68nA
# 82oEM09584aILqYmj8Pj7h/kmZNzuEL7WiwFa/U1hX+XiWfLIJQsAHBla0i7QRF2
# de8/VSF0XXFa2kBQ6aiTsiLyKPNbaNtbcucaUdn6vVUS5izWOXM95BSkFSKdE45O
# q3FForNJXjBvSCpwcP36WklaHL+aHu1upIhCTUkzTHMh8b86WmjRUqbrnvdyR2yd
# I5l1OqcMBjkpPpIV6wcc+KY/RH2xvVuuoHjlUjwq2bHiNoX+W1scCpnA8YTs2d50
# jDHUgwUo+ciwpffH0Riq132NFmrH3r67VaN3TuBxjI8SIZM58WEDkbeoriDk3hxU
# 8ZWV7b8AW6oyVBGfM06UgkfMb58h+tJPrFx8VI/WLq1dTqMfZOm5cuclMnUHs2uq
# rRNtnV8UfidPBL4ZHkTcClQbCoz0UbLhkiDvIS00Dn+BBcxw/TKqVL4Oaz3bkMSs
# M46LciTeucHY9ExRVt3zy7i149sd+F4QozPqn7FrSVHXmem3r7bjyHTxOgqxRCVa
# 18Vtx7P/8bYSBeS+WHCKcliFCecspusCDSlnRUjZwyPdP0VHxaZg2unjHY3rMYIa
# vTCCGrkCAQEwfTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu
# Yy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJT
# QTQwOTYgU0hBMzg0IDIwMjEgQ0ExAhAHHxQbizANJfMU6yMM0NHdMA0GCWCGSAFl
# AwQCAQUAoIHOMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcC
# AQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAqV3t0Ut29nKA9Aib3
# hB5YJarT1GGdhakqzlHz+gumODBiBgorBgEEAYI3AgEMMVQwUqBMgEoAQgB1AGkA
# bAB0ADoAIABSAGUAbABlAGEAcwBlAF8AdgAzAC4AMQAzAC4AMAByAGMAMQBfADIA
# MAAyADQAMAA3ADMAMQAuADAAMaECgAAwDQYJKoZIhvcNAQEBBQAEggIAFxu82YvE
# 47pbLsDEwG4qWNhP6nfRcp2qGGUIMjKB8wI8srCVc0VQ29FkU6mNZ8sR6VYKCvjr
# XHmilJyHd8uaoMvQNUPAtHiZDF6cguXN0ta1USxL+S8oinShAnfxWE3vTbvD0Nlb
# wPheRk8mRUJwDnH1Un9HChnvxRzqpcyqIphKWKimZ2U/NgVrIrljQCNZfzaMwT23
# XiCUW3LfZH5g8GlwqOjPGpwsvZ5WWTkAOmnKU8w8KSHRnNvxBAK8JrhfC53dQR25
# IH4oFl5sET0aM16g7w0KUCF0tmh98n4PlYewovzLWHwBxL+7xIZvzfWvjew9Yz2b
# v93UoeX7so/i0ttMyneYf8hOiRGjeQsCdnaWAL5raf+Zy9dfD0IsoLAwz+wA8tnd
# dbfdSmikEYnaJtW2iu/v7Y3PEazJvDay+ydgOkNiEypIWb5ajHWsxcwQNWssctSo
# u8+jpWPbLuWJciQ536h42+pIvGCU0hjNde/qp/N3ZY8iLnf8Tmj8VPD/jYUpceYr
# FS18GwtlgXf1vm6i6EkaDrke0bV/QBOzCftMZ6+DoamxIyJyWCvHySa8wCDML7iI
# ZJo9W40+oEZugj9614bmrtYIPcCWt134cgUjeTtvLiejCUfue1P3RfOtfJ+0K1Dv
# 0EAwDQf/xM8CLeUVYfA1U1f2hOitMHlHdG2hghdAMIIXPAYKKwYBBAGCNwMDATGC
# FywwghcoBgkqhkiG9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgG
# CyqGSIb3DQEJEAEEoGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEF
# AAQgOglg5NmloxH/nfFVDW3EoNbYH6ZJigJSmLk76M+M92QCEQD8KuCgcoyMXmTQ
# tBID26GpGA8yMDI0MDczMTIxNTc0NlqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85Sd
# CDmmv9s/X+VhFjANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UE
# ChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQg
# UlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoX
# DTM0MTAxMzIzNTk1OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0
# LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJ
# KoZIhvcNAQEBBQADggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEO
# CdwvSKOXejsqnGfcYhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrH
# mjsvlmbjaedp/lvD1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvK
# Xd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+
# 3RChG4PBuOZSlbVH13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV
# 5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0
# +9S769SgLDSb495uZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzh
# Ua+0rRUGFOpiCBPTaR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/
# eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7
# UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlw
# Jw1Pt7U20clfCKRwo+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQ
# ofM604qDy0B7AgMBAAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEE
# AjALBglghkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8w
# HQYDVR0OBBYEFKW27xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuG
# SWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQw
# OTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQG
# CCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKG
# TGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJT
# QTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIB
# AIEa1t6gqbWYF7xwjU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEv
# GN1Ott5s1+FgnCvt7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcig
# LiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvE
# xnvPnPp44pMadqJpddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W
# 8oM3NG6wQSbd3lqXTzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MA
# cN7MmJ4ZiQPq1JE3701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arA
# VeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6c
# Kmx5AdzaROY63jg7B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygW
# y2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9O
# TH0eaHDAdwrUAuBcYLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8
# WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQ
# BzY3tyRUfNhHrP0oZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEV
# MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t
# MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAw
# MDAwWhcNMzcwMzIyMjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5
# NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A
# MIICCgKCAgEAxoY1BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYR
# oUQVQl+kiPNo+n3znIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CE
# iiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCH
# RgB720RBidx8ald68Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5K
# fc71ORJn7w6lY2zkpsUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDni
# pUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2
# nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp
# 88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1C
# vwWcZklSUPRR8zZJTYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+
# 0wOI/rOP015LdhJRk8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl2
# 7KtdRnXiYKNYCQEoAA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOC
# AV0wggFZMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaa
# L3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1Ud
# DwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkw
# JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcw
# AoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJv
# b3RHNC5jcnQwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQu
# Y29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwB
# BAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+
# ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvX
# bYf6hCAlNDFnzbYSlm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tP
# iix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCy
# Xen/KFSJ8NWKcXZl2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpF
# yd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3
# fpNTrDsdCEkPlM05et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t
# 5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejx
# mF/7K9h+8kaddSweJywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxah
# ZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAA
# zV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vup
# L0QVSucTDh3bNzgaoSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghA
# GFowDQYJKoZIhvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lD
# ZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGln
# aUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEw
# OTIzNTk1OVowYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ
# MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1
# c3RlZCBSb290IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQ
# c2jeu+RdSjwwIjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW
# 61bGl20dq7J58soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU
# 0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzr
# yc/NrDRAX7F6Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17c
# jo+A2raRmECQecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypu
# kQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaP
# ZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUl
# ibaaRBkrfsCUtNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESV
# GnZifvaAsPvoZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2
# QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZF
# X50g/KEexcCPorF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1Ud
# EwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1Ud
# IwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5Bggr
# BgEFBQcBAQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNv
# bTBDBggrBgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lD
# ZXJ0QXNzdXJlZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8v
# Y3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEG
# A1UdIAQKMAgwBgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0
# Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+A
# ufih9/Jy3iS8UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51P
# pwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix
# 3P0c2PR3WlxUjG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVV
# a88nq2x2zm8jLfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6pe
# KOK5lDGCA3YwggNyAgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lD
# ZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYg
# U0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgB
# ZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcN
# AQkFMQ8XDTI0MDczMTIxNTc0NlowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvAr
# MsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZIhvcNAQkEMSIEICJNuOBm20PsFwZIuGMp
# UCOdnLFn+ButQWj5RTYhntv0MDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3t
# dCLM0dRAV2hBNm+CitpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICAJ30
# pPKEM1aCouyY6kDaq9gyv1dyXy7pdQlLY2qMW9m+7BiVyWmKbQ4V1sEcaSiARw/S
# +ndR1Dud+CW2hgLbFULYFVTvJo2YhSYQ/y0tisSyR8L71lGbDvCucJFkO2tiSP2m
# SOVMnr+v7sSrbrdlXBoJ8velGw4btK1u6MMoEdnjAXQxPDrGyRuYIwM8JZM0mJxL
# iEueb5et9jeOwRWnEKbkeU9eQLWlH8Kw/jWJmXEqAdagWn92WmKLHuLiSyVbBYNX
# 6yO/qmkdJ7gj3l1L1KBGD+aNov+Pa+Dl+XaThy2erFX1sXtdSTLPYh+d6G5avJih
# EmsSxGiXC35R4r9TbMsdV0tYchUtq+cEQIEv5lfGH0oFB3KIMakypw+uKVfPvtax
# C7WRFh/30rOdpedG2OemRBSnyR1YzI/Dr60KdhWvIoX1plzXvIeNwzBK90paUXYG
# ut5momzWOb6ck6OeWAeh4788Axrd2gEvXJuBc6mtNlTcIPWesFj6IEF58CFv329r
# mxVkLpnuVEJHZV0qzb/UBHUOSgCTDc3JqhKsxff2OamdH23rrZ/sToDWfxL/wSEQ
# QPQPP8glqey2iF9j/l0um3UFy0WwFvXWkIK2xq8d8Z+eHH6v6RRQ8hYxm9o6TtZ6
# nz7meSQ53s1WqgLLzsN8VP3o6cIJg5f0GmKeHkCh
# SIG # End signature block
|
combined_dataset/train/non-malicious/911.ps1 | 911.ps1 |
Add-WindowsFeature Web-Server
Get-Disk | Where partitionstyle -eq 'raw' | Initialize-Disk -PartitionStyle MBR -PassThru | New-Partition -AssignDriveLetter -UseMaximumSize | Format-Volume -FileSystem NTFS -NewFileSystemLabel "myDataDisk" -Confirm:$false
|
combined_dataset/train/non-malicious/sample_1_80.ps1 | sample_1_80.ps1 | param( [string]$DataPath, `
[switch]$AcceptEula, `
[switch]$Trace, `
[switch]$Logs, `
[switch]$Activity, `
[switch]$Fwd, `
[switch]$FwdCli, `
[switch]$RemShell, `
[switch]$HTTPSYS, `
[switch]$WinHTTP, `
[switch]$CAPI, `
[switch]$Kerberos, `
[switch]$NTLM, `
[switch]$PKU2U, `
[switch]$Schannel, `
[switch]$EventLog, `
[switch]$WMI, `
[switch]$Network, `
[switch]$PerfMon, `
[switch]$Kernel
)
$version = "WinRM-Collect (20230601)"
$DiagVersion = "WinRM-Diag (20230515)"
# by Gianni Bragante - gbrag@microsoft.com
Function Write-Diag {
param( [string] $msg )
$msg = (get-date).ToString("yyyyMMdd HH:mm:ss.fff") + " " + $msg
Write-Host $msg
$msg | Out-File -FilePath $diagfile -Append
}
Function WinRMTraceCapture {
Invoke-CustomCommand ("logman create trace 'WinRM-Trace' -ow -o '" + $TracesDir + "\WinRM-Trace-$env:COMPUTERNAME.etl" + "' -p 'Microsoft-Windows-WinRM' 0xffffffffffffffff 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 4096 -ets")
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{04C6E16D-B99F-4A3A-9B3E-B8325BBC781E}' 0xffffffffffffffff 0xff -ets" # Windows Remote Management Trace
if (-not $Activity -or $Fwd) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{699E309C-E782-4400-98C8-E21D162D7B7B}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Forwarding
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B977CF02-76F6-DF84-CC1A-6A4B232322B6}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-EventCollector
}
if (-not $Activity -or $RemShell) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{F1CAB2C0-8BEB-4FA2-90E1-8F17E0ACDD5D}' 0xffffffffffffffff 0xff -ets" # RemoteShellClient
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{03992646-3DFE-4477-80E3-85936ACE7ABB}' 0xffffffffffffffff 0xff -ets" # RemoteShell
}
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{72B18662-744E-4A68-B816-8D562289A850}' 0xffffffffffffffff 0xff -ets" # Windows HTTP Services
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{DD5EF90A-6398-47A4-AD34-4DCECDEF795F}' 0xffffffffffffffff 0xff -ets" # HTTP Service Trace
if ($HTTPSYS) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{F5344219-87A4-4399-B14A-E59CD118ABB8}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Http-SQM-Provider
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{08F93B14-1608-4A72-9CFA-457EECEDBBA7}' 0xffffffffffffffff 0xff -ets" # WebIo
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{C42A2738-2333-40A5-A32F-6ACC36449DCC}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-HttpLog
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{7B6BC78C-898B-4170-BBF8-1A469EA43FC5}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-HttpEvent
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{20F61733-57F1-4127-9F48-4AB7A9308AE2}' 0xffffffffffffffff 0xff -ets" # HttpSysGuid
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B1945E15-4933-460F-8103-AA611DDB663A}' 0xffffffffffffffff 0xff -ets" # HttpSysProvider
}
if (-not $Activity -or $WinHTTP) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{7D44233D-3055-4B9C-BA64-0D47CA40A232}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-WinHttp
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B3A7698A-0C45-44DA-B73D-E181C9B5C8E6}' 0xffffffffffffffff 0xff -ets" # WinHttp
}
if (-not $Activity -or $CAPI) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{5BBCA4A8-B209-48DC-A8C7-B23D3E5216FB}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-CAPI2
}
if (-not $Activity -or $Kerberos) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6B510852-3583-4E2D-AFFE-A67F9F223438}' 0xffffffffffffffff 0xff -ets" # Kerberos Authentication
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{BBA3ADD2-C229-4CDB-AE2B-57EB6966B0C4}' 0xffffffffffffffff 0xff -ets" # Kerberos Client
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{98E6CFCB-EE0A-41E0-A57B-622D4E1B30B1}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Security-Kerberos
}
if (-not $Activity -or $CredSSP) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6165F3E2-AE38-45D4-9B23-6B4818758BD9}' 0xffffffffffffffff 0xff -ets" # TSPkg
}
if (-not $Activity -or $NTLM) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{AC43300D-5FCC-4800-8E99-1BD3F85F0320}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-NTLM
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{C92CF544-91B3-4DC0-8E11-C580339A0BF8}' 0xffffffffffffffff 0xff -ets" # NTLM Security Protocol
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{5BBB6C18-AA45-49B1-A15F-085F7ED0AA90}' 0xffffffffffffffff 0xff -ets" # NTLM Authentication
}
if ($PKU2U) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{2A6FAF47-5449-4805-89A3-A504F3E221A6}' 0xffffffffffffffff 0xff -ets" # Pku2u Authentication
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B1108F75-3252-4B66-9239-80FD47E06494}' 0xffffffffffffffff 0xff -ets" # IdentityCommonLib
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{D93FE84A-795E-4608-80EC-CE29A96C8658}' 0xffffffffffffffff 0xff -ets" # IdentityListenerControlGuid
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{82C7D3DF-434D-44FC-A7CC-453A8075144E}' 0xffffffffffffffff 0xff -ets" # IDStore
}
if (-not $Activity -or $Schannel) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{1F678132-5938-4686-9FDC-C8FF68F15C85}' 0xffffffffffffffff 0xff -ets" # Schannel
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{37D2C3CD-C5D4-4587-8531-4696C44244C8}' 0xffffffffffffffff 0xff -ets" # SchannelWppGuid
}
if ($FwdCli) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{9D11915C-C654-4D73-A6D6-591570E011A0}' 0xffffffffffffffff 0xff -ets" # EvtFwdrWpp
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6FCDF39A-EF67-483D-A661-76D715C6B008}' 0xffffffffffffffff 0xff -ets" # ForwarderTrace
}
if ($FwdCli -or $EventLog) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{FC65DDD8-D6EF-4962-83D5-6E5CFE9CE148}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Eventlog
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B0CA1D82-539D-4FB0-944B-1620C6E86231}' 0xffffffffffffffff 0xff -ets" # EventlogTrace
}
if ($WMI) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{1418EF04-B0B4-4623-BF7E-D74AB47BBDAA}' 0xffffffffffffffff 0xff -ets" # WMI-Activity
}
if ($Network) {
Invoke-CustomCommand ("netsh trace start capture=yes scenario=netconnection maxsize=2048 report=disabled tracefile='" + $TracesDir + "NETCAP-" + $env:COMPUTERNAME + ".etl'")
}
if ($Kernel) {
Invoke-CustomCommand ("logman create trace 'NT Kernel Logger' -ow -o '" + $TracesDir + "\WinRM-Trace-kernel-$env:COMPUTERNAME.etl" + "' -p '{9E814AAD-3204-11D2-9A82-006008A86939}' 0x1 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 512 -ets")
}
if ($PerfMon) {
Invoke-CustomCommand ("Logman create counter 'WinRM-Trace-PerfMon' -f bincirc -max 2048 -c '\Process(*)\*' '\Processor(*)\*' '\PhysicalDisk(*)\*' '\Event Tracing for Windows Session(EventLog-*)\Events Lost' '\Event Tracing for Windows Session(EventLog-*)\Events Logged per sec' '\HTTP Service Request Queues(*)\*' -si 00:00:01 -o '" + $TracesDir + "WinRM-trace-$env:COMPUTERNAME.blg'")
Invoke-CustomCommand ("logman start 'WinRM-Trace-PerfMon'")
}
Write-Log "Trace capture started"
read-host "Press ENTER to stop the capture"
Invoke-CustomCommand "logman stop 'WinRM-Trace' -ets"
if ($Network) {
Invoke-CustomCommand "netsh trace stop"
}
if ($Kernel) {
Invoke-CustomCommand "logman stop 'NT Kernel Logger' -ets"
}
if ($PerfMon) {
Invoke-CustomCommand ("logman stop 'WinRM-Trace-PerfMon'")
Invoke-CustomCommand ("logman delete 'WinRM-Trace-PerfMon'")
}
Invoke-CustomCommand "tasklist /svc" -DestinationFile ("Traces\tasklist-$env:COMPUTERNAME.txt")
}
Function GetPlugins{
# This function is a contribution from Ga�tan Rabier
param(
[string] $WinRMPluginPath = "WSMan:\localhost\plugin"
)
Write-Log ("Parsing plugins from path " + $WinRMPluginPath)
$WinRMPlugins = Get-ChildItem $WinRMPluginPath
foreach ($Plugin in $WinRMPlugins) {
$PluginName = $Plugin.Name
$PluginURIs = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources).Name
$PluginDLL = (Get-ChildItem $WinRMPluginPath\$PluginName\Filename).Value
$PluginName | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
(" DLL: " + $PluginDLL) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
foreach ($PluginURI in $PluginURIs) {
$Capability = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Capability).Value
$SecurityContainerName = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Security).Name
$SecurityContainer = Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Security\$SecurityContainerName
$SecuritySddl = ($SecurityContainer |Where-Object {$_.Name -eq 'Sddl'}).Value
$SecuritySddlConverted = (ConvertFrom-SddlString $SecuritySddl).DiscretionaryAcl
$ResourceURI = ($SecurityContainer | Where-Object {$_.Name -eq 'ParentResourceUri'}).Value
(" URI: " + $ResourceURI) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
(" Capabilities: " + $Capability) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
(" Security descriptor : " + $SecuritySddlConverted) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
" " | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
Remove-Variable SecurityContainerName,SecurityContainer,ResourceURI,Capability,SecuritySddlConverted,SecuritySddl
}
}
}
Function EvtLogDetails {
param(
[string] $LogName
)
Write-Log ("Collecting the details for the " + $LogName + " log")
$cmd = "wevtutil gl " + $logname + " >>""" + $resDir + "\EventLogs.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log ("Collecting the details for the " + $LogName + " log")
$cmd = "wevtutil gli " + $logname + " >>""" + $resDir + "\EventLogs.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
"" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append
if ($logname -ne "ForwardedEvents") {
$evt = (Get-WinEvent -Logname $LogName -MaxEvents 1 -Oldest)
"Oldest " + $evt.TimeCreated + " (" + $evt.RecordID + ")" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append
$evt = (Get-WinEvent -Logname $LogName -MaxEvents 1)
"Newest " + $evt.TimeCreated + " (" + $evt.RecordID + ")" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append
"" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append
}
}
Function GetStore($store) {
$certlist = Get-ChildItem ("Cert:\LocalMachine\" + $store)
foreach ($cert in $certlist) {
$EKU = ""
foreach ($item in $cert.EnhancedKeyUsageList) {
if ($item.FriendlyName) {
$EKU += $item.FriendlyName + " / "
} else {
$EKU += $item.ObjectId + " / "
}
}
$row = $tbcert.NewRow()
foreach ($ext in $cert.Extensions) {
if ($ext.oid.value -eq "2.5.29.14") {
$row.SubjectKeyIdentifier = $ext.SubjectKeyIdentifier.ToLower()
} elseif (($ext.oid.value -eq "2.5.29.35") -or ($ext.oid.value -eq "2.5.29.1")) {
$asn = New-Object Security.Cryptography.AsnEncodedData ($ext.oid,$ext.RawData)
$aki = $asn.Format($true).ToString().Replace(" ","")
$aki = (($aki -split '\n')[0]).Replace("KeyID=","").Trim()
$row.AuthorityKeyIdentifier = $aki
} elseif (($ext.oid.value -eq "1.3.6.1.4.1.311.21.7") -or ($ext.oid.value -eq "1.3.6.1.4.1.311.20.2")) {
$asn = New-Object Security.Cryptography.AsnEncodedData ($ext.oid,$ext.RawData)
$tmpl = $asn.Format($true).ToString().Replace(" ","")
$template = (($tmpl -split '\n')[0]).Replace("Template=","").Trim()
$row.Template = $template
}
}
if ($EKU) {$EKU = $eku.Substring(0, $eku.Length-3)}
$row.Store = $store
$row.Thumbprint = $cert.Thumbprint.ToLower()
$row.Subject = $cert.Subject
$row.Issuer = $cert.Issuer
$row.NotAfter = $cert.NotAfter
$row.EnhancedKeyUsage = $EKU
$row.SerialNumber = $cert.SerialNumber.ToLower()
$tbcert.Rows.Add($row)
}
}
Function ChkCert($cert, $store, $descr) {
$cert = $cert.ToLower()
if ($cert) {
if ("0123456789abcdef".Contains($cert[0])) {
$aCert = $tbCert.Select("Thumbprint = '" + $cert + "' and $store")
if ($aCert.Count -gt 0) {
Write-Diag ("[INFO] The $descr certificate was found, the subject is " + $aCert[0].Subject)
if (($aCert[0].NotAfter) -gt (Get-Date)) {
Write-Diag ("[INFO] The $descr certificate will expire on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
} else {
Write-Diag ("[ERROR] The $descr certificate expired on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
}
} else {
Write-Diag "[ERROR] The certificate with thumbprint $cert was not found in $store"
}
} else {
Write-Diag "[ERROR] Invalid character in the $cert certificate thumbprint $cert"
}
} else {
Write-Diag "[ERROR] The thumbprint of $descr certificate is empty"
}
}
Function GetSubVal {
param( [string]$SubName, [string]$SubValue)
$SubProp = (Get-Item -Path ("HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions\" + $SubName) | Get-ItemProperty)
if ($SubProp.($SubValue)) {
return $SubProp.($SubValue)
} else {
$cm = $SubProp.ConfigurationMode
$subVal = (Get-Item -Path ("HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\ConfigurationModes\" + $cm) | Get-ItemProperty)
return $SubVal.($SubValue)
}
}
Function GetOwnerCim{
param( $prc )
$ret = Invoke-CimMethod -InputObject $prc -MethodName GetOwner
return ($ret.Domain + "\" + $ret.User)
}
Function GetOwnerWmi{
param( $prc )
$ret = $prc.GetOwner()
return ($ret.Domain + "\" + $ret.User)
}
$myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$myWindowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($myWindowsID)
$adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator
if (-not $myWindowsPrincipal.IsInRole($adminRole)) {
Write-Output "This script needs to be run as Administrator"
exit
}
$global:Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path
$resName = "WinRM-Results-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss)
if ($DataPath) {
if (-not (Test-Path $DataPath)) {
Write-Host "The folder $DataPath does not exist"
exit
}
$global:resDir = $DataPath + "\" + $resName
} else {
$global:resDir = $global:Root + "\" + $resName
} if ($DataPath) {
if (-not (Test-Path $DataPath)) {
Write-Host "The folder $DataPath does not exist"
exit
}
$global:resDir = $DataPath + "\" + $resName
} else {
$global:resDir = $global:Root + "\" + $resName
}
$diagfile = $global:resDir + "\WinRM-Diag.txt"
$global:outfile = $global:resDir + "\script-output.txt"
$global:errfile = $global:resDir + "\script-errors.txt"
Import-Module ($global:Root + "\Collect-Commons.psm1") -Force -DisableNameChecking
if (-not $Trace -and -not $Logs) {
Write-Host "WinRM-Collect: a data collection tools for WinRM troubleshooting"
Write-Host ""
Write-Host "Usage:"
Write-Host "WinRM-Collect -Logs"
Write-Host " Collects dumps, logs, registry keys, command outputs"
Write-Host ""
Write-Host "WinRM-Collect -Trace [[-Activity][-Fwd][-RemShell][-HTTP][-CAPI][-Kerberos][-CredSSP][-NTLM][-Schannel]] [-FwdCli][-EventLog][-Network][-Kernel][-PerfMon]"
Write-Host " Collects live trace"
Write-Host ""
Write-Host "WinRM-Collect -Logs -Trace [[-Activity][-Fwd][-RemShell][-HTTP][-CAPI][-Kerberos][-CredSSP][-NTLM][-Schannel]] [-FwdCli][-EventLog][-Network][-Kernel][-PerfMon]"
Write-Host " Collects live trace then -Logs data"
Write-Host ""
Write-Host "Parameters for -Trace :"
Write-Host " -Activity : Only trace WinRM basic log, less detailed and less noisy)"
Write-Host " -Fwd : Event Log Forwarding (enabled by default without -Activity)"
Write-Host " -RemShell : Remote Shell (enabled by default without -Activity)"
Write-Host " -HTTPSYS : HTTP.SYS tracing"
Write-Host " o If specified advanced HTTP.SYS tracing is enabled"
Write-Host " o If not specified basic HTTP.SYS tracing is enabled"
Write-Host " o With -Activity no HTTPS.SYS tracing, unless specified"
Write-Host " -WinHTTP : WinHTTP (enabled by default without -Activity)"
Write-Host " -CAPI : CAPI (enabled by default without -Activity)"
Write-Host " -Kerberos : Kerberos (enabled by default without -Activity)"
Write-Host " -CredSSP : CredSSP (enabled by default without -Activity)"
Write-Host " -NTLM : NTLM (enabled by default without -Activity)"
Write-Host " -Schannel : Schannel (enabled by default without -Activity)"
Write-Host " -WMI : WMI activity"
Write-Host ""
Write-Host " -FwdCli : Additional client side treacing for EventLog forwarding"
Write-Host " -EventLog : Event Log tracing (included in -FwdCli)"
Write-Host " -Network : Network capture"
Write-Host " -Kernel : Kernel Trace for process start and stop"
Write-Host " -PerfMon : Performance counters"
Write-Host ""
exit
}
$RdrOut = " >>""" + $global:outfile + """"
$RdrErr = " 2>>""" + $global:errfile + """"
$fqdn = [System.Net.Dns]::GetHostByName(($env:computerName)).HostName
$OSVer = ([environment]::OSVersion.Version.Major) + ([environment]::OSVersion.Version.Minor) /10
New-Item -itemtype directory -path $global:resDir | Out-Null
Write-Log $version
if ($AcceptEula) {
Write-Log "AcceptEula switch specified, silently continuing"
$eulaAccepted = ShowEULAIfNeeded "WinRM-Collect" 2
} else {
$eulaAccepted = ShowEULAIfNeeded "WinRM-Collect" 0
if($eulaAccepted -ne "Yes")
{
Write-Log "EULA declined, exiting"
exit
}
}
Write-Log "EULA accepted, continuing"
if ($Trace) {
$TracesDir = $global:resDir + "\Traces\"
New-Item -itemtype directory -path $TracesDir | Out-Null
WinRMTraceCapture
if (-not $Logs) {
exit
}
}
"Logman create counter FwdEvtPerf -o """ + $global:resDir + "\FwdEvtPerf.blg"" -f bin -v mmddhhmm -c ""\Process(*)\*"" ""\Processor(*)\*"" ""\PhysicalDisk(*)\*"" ""\Event Tracing for Windows Session(EventLog-*)\Events Lost"" ""\Event Tracing for Windows Session(EventLog-*)\Events Logged per sec"" ""\HTTP Service Request Queues(*)\*"" -si 00:00:01" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
"Logman start FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
"timeout 60" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
"Logman stop FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
"Logman delete FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
$cmd = $global:resDir + "\WEF-Perf.bat"
Write-Log $cmd
Start-Process $cmd -WindowStyle Minimized
Write-Log "Retrieving WinRM configuration"
$config = Get-ChildItem WSMan:\localhost\ -Recurse -ErrorAction Continue 2>>$global:errfile
if (!$config) {
Write-Log ("Cannot connect to localhost, trying with FQDN " + $fqdn)
Connect-WSMan -ComputerName $fqdn -ErrorAction Continue 2>>$global:errfile
$config = Get-ChildItem WSMan:\$fqdn -Recurse -ErrorAction Continue 2>>$global:errfile
GetPlugins -WinRMPluginPath (WSMan:\$fqdn\Plugin)
Disconnect-WSMan -ComputerName $fqdn -ErrorAction Continue 2>>$global:errfile
} else {
GetPlugins
}
$config | out-string -Width 500 | out-file -FilePath ($global:resDir + "\WinRM-config.txt")
Write-Log "winrm get winrm/config"
$cmd = "winrm get winrm/config >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "winrm e winrm/config/listener"
$cmd = "winrm e winrm/config/listener >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "winrm enum winrm/config/service/certmapping"
$cmd = "winrm enum winrm/config/service/certmapping >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "Collecting dump of the svchost process hosting the WinRM service"
$pidWinRM = FindServicePid "WinRM"
if ($pidWinRM) {
CreateProcDump $pidWinRM $global:resDir "svchost-WinRM"
}
Write-Log "Collecing the dumps of wsmprovhost.exe processes"
$list = get-process -Name "wsmprovhost" -ErrorAction SilentlyContinue 2>>$global:errfile
if (($list | Measure-Object).count -gt 0) {
foreach ($proc in $list)
{
Write-Log ("Found wsmprovhost.exe with PID " + $proc.Id)
CreateProcDump $proc.id $global:resDir
}
} else {
Write-Log "No wsmprovhost.exe processes found"
}
if ($pidWinRM) {
Write-Log ("The PID of the WinRM service is: " + $pidWinRM)
$pidWEC = FindServicePid "WecSvc"
if ($pidWEC) {
Write-Log ("The PID of the WecSvc service is: " + $pidWEC)
if ($pidWinRM -ne $pidWEC) {
Write-Log "WinRM and WecSvc are not in the same process"
CreateProcDump $pidWEC $global:resDir "scvhost-WEC"
}
}
}
Write-Log "Collecting dump of the SME.exe process"
$proc = get-process "SME" -ErrorAction SilentlyContinue
if ($proc) {
Write-Log "Process SME.EXE found with PID $proc.id"
CreateProcDump $proc.id $global:resDir
}
FileVersion -Filepath ($env:windir + "\system32\wsmsvc.dll") -Log $true
FileVersion -Filepath ($env:windir + "\system32\pwrshplugin.dll") -Log $true
if (Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions) {
Write-Log "Retrieving subscriptions configuration"
$cmd = "wecutil es 2>>""" + $global:errfile + """"
Write-log $cmd
$subList = Invoke-Expression $cmd
if ($subList -gt "") {
foreach($sub in $subList) {
Write-Log "Subscription: " + $sub
("Subscription: " + $sub) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
"-----------------------" | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
$cmd = "wecutil gs """ + $sub + """ /f:xml" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
$cmd = "wecutil gr """ + $sub + """" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
" " | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
}
}
}
Write-Log "Listing members of Event Log Readers group"
$cmd = "net localgroup ""Event Log Readers"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
if ($OSVer -le 6.3) {
Write-Log "Listing members of WinRMRemoteWMIUsers__ group"
$cmd = "net localgroup ""WinRMRemoteWMIUsers__"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
} else {
Write-Log "Listing members of Remote Management Users group"
$cmd = "net localgroup ""Remote Management Users"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
}
Write-Log "Listing members of Windows Admin Center CredSSP Administrators group"
$cmd = "net localgroup ""Windows Admin Center CredSSP Administrators"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
(" ") | Out-File -FilePath ($global:resDir + "\Groups.txt") -Append
($group + " = " + $strSID) | Out-File -FilePath ($global:resDir + "\Groups.txt") -Append
Write-Log "Getting the output of WHOAMI /all"
$cmd = "WHOAMI /all >>""" + $global:resDir + "\WHOAMI.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "Get-Culture output"
"Get-Culture" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-Culture | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Exporting registry key HKEY_USERS\S-1-5-20\Control Panel\International"
$cmd = "reg export ""HKEY_USERS\S-1-5-20\Control Panel\International"" """ + $global:resDir + "\InternationalNetworkService.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Get-WinSystemLocale output"
"Get-WinSystemLocale" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinSystemLocale | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinHomeLocation output"
"Get-WinHomeLocation" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinHomeLocation | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinUILanguageOverride output"
"Get-WinUILanguageOverride" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinUILanguageOverride | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinUserLanguageList output"
"Get-WinUserLanguageList" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinUserLanguageList | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinAcceptLanguageFromLanguageListOptOut output"
"Get-WinAcceptLanguageFromLanguageListOptOut" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinAcceptLanguageFromLanguageListOptOut | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinCultureFromLanguageListOptOut output"
"Get-Get-WinCultureFromLanguageListOptOut" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinCultureFromLanguageListOptOut | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinDefaultInputMethodOverride output"
"Get-WinDefaultInputMethodOverride" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinDefaultInputMethodOverride | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinLanguageBarOption output"
"Get-WinLanguageBarOption" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinLanguageBarOption | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-NetConnectionProfile output"
Get-NetConnectionProfile | Out-File -FilePath ($global:resDir + "\NetConnectionProfile.txt") -Append
Write-Log "Get-WSManCredSSP output"
Get-WSManCredSSP | Out-File -FilePath ($global:resDir + "\WSManCredSSP.txt") -Append
Write-Log "Exporting firewall rules"
$cmd = "netsh advfirewall firewall show rule name=all >""" + $global:resDir + "\FirewallRules.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Invoke-CustomCommand -Command "netstat -anob" -DestinationFile "netstat.txt"
Invoke-CustomCommand -Command "ipconfig /all" -DestinationFile "ipconfig.txt"
Invoke-CustomCommand -Command "auditpol /get /category:*" -DestinationFile "auditpol.txt"
Write-Log "Copying hosts and lmhosts"
if (Test-path -path C:\Windows\system32\drivers\etc\hosts) {
Copy-Item C:\Windows\system32\drivers\etc\hosts $global:resDir\hosts.txt -ErrorAction Continue 2>>$global:errfile
}
if (Test-Path -Path C:\Windows\system32\drivers\etc\lmhosts) {
Copy-Item C:\Windows\system32\drivers\etc\lmhosts $global:resDir\lmhosts.txt -ErrorAction Continue 2>>$global:errfile
}
$dir = $env:windir + "\system32\logfiles\HTTPERR"
if (Test-Path -path $dir) {
$last = Get-ChildItem -path ($dir) | Sort-Object CreationTime -Descending | Select-Object Name -First 1
Copy-Item ($dir + "\" + $last.name) $global:resDir\httperr.log -ErrorAction Continue 2>>$global:errfile
}
Write-Log "WinHTTP proxy configuration"
$cmd = "netsh winhttp show proxy >""" + $global:resDir + "\WinHTTP-Proxy.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "NSLookup WPAD"
"------------------" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append
"NSLookup WPAD" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append
"" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append
$cmd = "nslookup wpad >>""" + $global:resDir + "\WinHTTP-Proxy.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM"
$cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM """ + $global:resDir + "\WinRM.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN """+ $global:resDir + "\WSMAN.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
if (Test-Path HKLM:\Software\Policies\Microsoft\Windows\WinRM) {
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM"
$cmd = "reg export HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM """+ $global:resDir + "\WinRM-Policies.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
} else {
Write-Log "The registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM is not present"
}
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System """+ $global:resDir + "\System-Policies.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector """+ $global:resDir + "\EventCollector.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventForwarding"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventForwarding """+ $global:resDir + "\EventForwarding.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog """+ $global:resDir + "\EventLog-Policies.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL"
$cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL """+ $global:resDir + "\SCHANNEL.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography"
$cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography """+ $global:resDir + "\Cryptography.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography """+ $global:resDir + "\Cryptography-Policy.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa"
$cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa """+ $global:resDir + "\LSA.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP"
$cmd = "reg export HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP """+ $global:resDir + "\HTTP.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
if (Test-Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials) {
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials """+ $global:resDir + "\AllowFreshCredentials.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
} else {
Write-Log "The registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials is not present"
}
Export-EventLog "System"
Export-EventLog "Application"
Export-EventLog "Microsoft-Windows-CAPI2/Operational"
Export-EventLog "Microsoft-Windows-WinRM/Operational"
Export-EventLog "Microsoft-Windows-EventCollector/Operational"
Export-EventLog "Microsoft-Windows-Forwarding/Operational"
Export-EventLog "Microsoft-Windows-PowerShell/Operational"
Export-EventLog "Windows PowerShell"
Export-EventLog "PowerShellCore/Operational"
Export-EventLog "Microsoft-Windows-GroupPolicy/Operational"
Export-EventLog "Microsoft-Windows-Kernel-EventTracing/Admin"
Export-EventLog "Microsoft-ServerManagementExperience"
Export-EventLog "Microsoft-Windows-ServerManager-ConfigureSMRemoting/Operational"
Export-EventLog "Microsoft-Windows-ServerManager-DeploymentProvider/Operational"
Export-EventLog "Microsoft-Windows-ServerManager-MgmtProvider/Operational"
Export-EventLog "Microsoft-Windows-ServerManager-MultiMachine/Operational"
Export-EventLog "Microsoft-Windows-FileServices-ServerManager-EventProvider/Operational"
EvtLogDetails "Application"
EvtLogDetails "System"
EvtLogDetails "Security"
EvtLogDetails "ForwardedEvents"
Write-Log "Autologgers configuration"
Get-AutologgerConfig -Name EventLog-ForwardedEvents -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append
Get-AutologgerConfig -Name EventLog-System -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append
Get-AutologgerConfig -Name EventLog-Security -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append
Get-AutologgerConfig -Name EventLog-Application -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append
if ($OSVer -gt 6.1 ) {
Write-Log "Copying ServerManager configuration"
copy-item $env:APPDATA\Microsoft\Windows\ServerManager\ServerList.xml $global:resDir\ServerList.xml -ErrorAction Continue 2>>$global:errfile
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\ServicingStorage\ServerComponentCache"
$cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\ServicingStorage\ServerComponentCache"" """ + $global:resDir + "\ServerComponentCache.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
}
Write-Log "Get-Module output"
Get-Module -ListAvailable | Out-File -FilePath ($global:resDir + "\Get-Module.txt")
Write-Log "Exporting netsh http settings"
$cmd = "netsh http show sslcert >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "netsh http show urlacl >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "netsh http show servicestate >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "netsh http show iplisten >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
if (Test-Path HKLM:\SOFTWARE\Microsoft\InetStp) {
Write-Log "Exporting IIS configuration"
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list app >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list apppool >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list site >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list module >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list wp >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list vdir >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list config >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
} else {
Write-Log "IIS is not installed"
}
if (Test-Path -Path ($env:windir + "\System32\inetsrv\Config\ApplicationHost.config")) {
Write-Log "IIS ApplicationHost.config"
Copy-Item "C:\Windows\System32\inetsrv\Config\ApplicationHost.config" ($global:resDir + "\ApplicationHost.config")
}
$cmd = "setspn -L " + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching HTTP/" + $env:computername + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -Q HTTP/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching HTTP/" + $fqdn + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -Q HTTP/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching HTTP/" + $env:computername + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -F -Q HTTP/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching HTTP/" + $fqdn + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -F -Q HTTP/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching WSMAN/" + $env:computername + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -Q WSMAN/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching WSMAN/" + $fqdn + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -Q WSMAN/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching WSMAN/" + $env:computername + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -F -Q WSMAN/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching WSMAN/" + $fqdn + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -F -Q WSMAN/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
Write-Log "Collecting certificates details"
$cmd = "Certutil -verifystore -v MY > """ + $global:resDir + "\Certificates-My.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "Certutil -verifystore -v ROOT > """ + $global:resDir + "\Certificates-Root.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "Certutil -verifystore -v CA > """ + $global:resDir + "\Certificates-Intermediate.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$tbCert = New-Object system.Data.DataTable
$col = New-Object system.Data.DataColumn Store,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn Thumbprint,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn Subject,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn Issuer,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn NotAfter,([DateTime]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn IssuerThumbprint,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn EnhancedKeyUsage,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn SerialNumber,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn SubjectKeyIdentifier,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn AuthorityKeyIdentifier,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn Template,([string]); $tbCert.Columns.Add($col)
GetStore "My"
GetStore "CA"
GetStore "Root"
Write-Log "Matching issuer thumbprints"
$aCert = $tbCert.Select("Store = 'My' or Store = 'CA'")
foreach ($cert in $aCert) {
$aIssuer = $tbCert.Select("SubjectKeyIdentifier = '" + ($cert.AuthorityKeyIdentifier).tostring() + "'")
if ($aIssuer.Count -gt 0) {
$cert.IssuerThumbprint = ($aIssuer[0].Thumbprint).ToString()
}
}
$tbcert | Export-Csv ($global:resDir + "\certificates.tsv") -noType -Delimiter "`t"
Write-Log "PowerShell version"
$PSVersionTable | Out-File -FilePath ($global:resDir + "\PSVersion.txt") -Append
Write-Log "Collecting details about running processes"
if (ListProcsAndSvcs) {
CollectSystemInfoWMI
ExecQuery -Namespace "root\cimv2" -Query "select * from Win32_Product" | Sort-Object Name | Format-Table -AutoSize -Property Name, Version, Vendor, InstallDate | Out-String -Width 400 | Out-File -FilePath ($global:resDir + "\products.txt")
Write-Log "Collecting the list of installed hotfixes"
Get-HotFix -ErrorAction SilentlyContinue 2>>$global:errfile | Sort-Object -Property InstalledOn -ErrorAction Ignore | Out-File $global:resDir\hotfixes.txt
Write-Log "Collecing GPResult output"
$cmd = "gpresult /h """ + $global:resDir + "\gpresult.html""" + $RdrErr
write-log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
$cmd = "gpresult /r >""" + $global:resDir + "\gpresult.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
} else {
Write-Log "WMI is not working"
$proc = Get-Process | Where-Object {$_.Name -ne "Idle"}
$proc | Format-Table -AutoSize -property id, name, @{N="WorkingSet";E={"{0:N0}" -f ($_.workingset/1kb)};a="right"},
@{N="VM Size";E={"{0:N0}" -f ($_.VirtualMemorySize/1kb)};a="right"},
@{N="Proc time";E={($_.TotalProcessorTime.ToString().substring(0,8))}}, @{N="Threads";E={$_.threads.count}},
@{N="Handles";E={($_.HandleCount)}}, StartTime, Path |
Out-String -Width 300 | Out-File -FilePath ($global:resDir + "\processes.txt")
CollectSystemInfoNoWMI
}
Write-Diag ("[INFO] " + $DiagVersion)
# Diag start
function New-UrlAcl {
New-Object psobject -Property @{
Protocol = ''
Host = ''
Port = 0
Path = ''
Url = ''
Users = @()
}
}
function New-UrlAclUser {
New-Object psobject -Property @{
Name = ''
Listen = $false
Delegate = $false
SSDL = ''
}
}
function Get-UrlAcl { # Taken from https://www.powershellgallery.com/packages/HttpSys/1.0.1/Content/Get-UrlAcl.ps1 and modified to also run on PowerShell 4
[CmdletBinding()]
param(
[parameter(Position=0)]
[string]$Url,
[parameter()]
[int[]]$Port,
[string]$HostName,
[string]$Protocol
)
$cmd = "netsh http show urlacl"
if (-not [string]::IsNullOrWhiteSpace($Url)){
$cmd += " url=$Url"
}
$result = Invoke-Expression $cmd
$result = $result | Select-Object -Skip 4
$items = @()
$item = New-UrlAcl
$user = New-UrlAclUser
for ($i = 0; $i -lt $result.Length; $i++){
$line = $result[$i]
if ([string]::IsNullOrWhiteSpace($line)){
continue;
}
$splitIndex = $line.IndexOf(": ");
$key = $line.Substring(0,$splitIndex).Trim();
$value = $line.Substring($splitIndex + 2);
if ($key -eq "Reserved Url"){
$item = New-UrlAcl
$protocolSplitIndex = $value.IndexOf("://");
$item.Protocol = $value.Substring(0, $protocolSplitIndex)
$remainder = $value.Substring($protocolSplitIndex + 3)
$pathSplitIndex = $remainder.IndexOf("/")
$hostDetails = $remainder.Substring(0, $pathSplitIndex)
$hostParts = $hostDetails.Split(':')
$item.Host = $hostParts[0]
$item.Port = $hostParts[1]
$item.Path = $remainder.Substring($pathSplitIndex)
$item.Url = $value
$items += $item
}
if ($key -eq "User"){
$user = New-UrlAclUser
$user.Name = $value
$item.Users += $user
}
if ($key -eq "Listen"){
$user.Listen = if ($value -eq "Yes") { $true } else { $false }
}
if ($key -eq "Delegate"){
$user.Delegate = if ($value -eq "Yes") { $true } else { $false }
}
if ($key -eq "SDDL"){
$user.SSDL = $value
}
}
if (-not [string]::IsNullOrWhiteSpace($HostName)){
$items = $items | Where-Object { $_.Host -eq $HostName }
}
if (-not [string]::IsNullOrWhiteSpace($Protocol)){
$items = $items | Where-Object { $_.Protocol -eq $Protocol }
}
if ($null -ne $Port){
if ($Port -isnot [System.Array]){
$Port = @($Port)
}
if ($Port.Length -ge 0){
$items = $items | Where-Object { $Port -contains $_.Port }
}
}
return $items
}
Write-Diag "Retrieving URLACL information"
$urlACL = Get-UrlAcl
Write-Diag "[INFO] Checking HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\ClientAuthTrustMode"
$ClientAuthTrustMode = (Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel" | Select-Object -ExpandProperty "ClientAuthTrustMode" -ErrorAction SilentlyContinue)
if ($ClientAuthTrustMode -eq $null -or $ClientAuthTrustMode -eq 0) {
Write-Diag "[WARNING] 0 Machine Trust (default) - Requires that the client certificate is issued by a certificate in the Trusted Issuers list."
} elseif ($ClientAuthTrustMode -eq 1) {
Write-Diag "[WARNING] 1 Exclusive Root Trust - Requires that a client certificate chains to a root certificate contained in the caller-specified trusted issuer store. The certificate must also be issued by an issuer in the Trusted Issuers list"
} elseif ($ClientAuthTrustMode -eq 2) {
Write-Diag "[INFO] 2 Exclusive CA Trust - Requires that a client certificate chain to either an intermediate CA certificate or root certificate in the caller-specified trusted issuer store."
} else {
Write-Diag ("[ERROR] Invalid value " + $ClientAuthTrustMode)
}
$OSVer = [environment]::OSVersion.Version.Major + [environment]::OSVersion.Version.Minor * 0.1
$subDom = $false
$subWG = $false
$Subscriptions = Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions
foreach ($sub in $Subscriptions) {
Write-Diag ("[INFO] Found subscription " + $sub.PSChildname)
$SubProp = ($sub | Get-ItemProperty)
Write-Diag ("[INFO] SubscriptionType = " + $SubProp.SubscriptionType + ", ConfigurationMode = " + $SubProp.ConfigurationMode)
Write-Diag ("[INFO] MaxLatencyTime = " + (GetSubVal $sub.PSChildname "MaxLatencyTime") + ", HeartBeatInterval = " + (GetSubVal $sub.PSChildname "HeartBeatInterval"))
$logFile = (GetSubVal $sub.PSChildname "LogFile")
if ($logFile -ne "ForwardedEvents") {
Write-Diag ("[WARNING] LogFile = " + $logFile + ", this is a CUSTOM LOG")
} else {
Write-Diag ("[INFO] LogFile = " + $logFile)
}
if ($SubProp.AllowedSourceDomainComputers) {
Write-Diag "[INFO] AllowedSourceDomainComputers"
$ACL = (FindSep -FindIn $SubProp.AllowedSourceDomainComputers -Left ":P" -Right ")S:").replace(")(", ",").Split(",")
foreach ($ACE in $ACL) {
$SID = FindSep -FindIn $ACE -left ";;;"
$objSID = New-Object System.Security.Principal.SecurityIdentifier($SID)
$group = $objSID.Translate( [System.Security.Principal.NTAccount]).Value
Write-Diag "[INFO] $group ($SID)"
}
}
if ($SubProp.Locale) {
if ($SubProp.Locale -eq "en-US") {
Write-Diag "[INFO] The subscription's locale is set to en-US"
} else {
Write-Diag ("[WARNING] The subscription's locale is set to " + $SubProp.Locale)
}
} else {
Write-Diag "[INFO] The subscription's locale is not set, the default locale will be used."
}
if ($SubProp.AllowedSubjects) {
$subWG = $true
Write-Diag "[INFO] Listed non-domain computers:"
$list = $SubProp.AllowedSubjects -split ","
foreach ($item in $list) {
Write-Diag ("[INFO] " + $item)
}
} else {
Write-Diag "[INFO] No non-domain computers listed, that's ok if this is not a collector in workgroup environment"
}
if ($SubProp.AllowedIssuerCAs) {
$subWG = $true
Write-Diag "[INFO] Listed Issuer CAs:"
$list = $SubProp.AllowedIssuerCAs -split ","
foreach ($item in $list) {
Write-Diag ("[INFO] " + $item)
ChkCert -cert $item -store "(Store = 'CA' or Store = 'Root')" -descr "Issuer CA"
}
} else {
Write-Diag "[INFO] No Issuer CAs listed, that's ok if this is not a collector in workgroup environment"
}
$RegKey = (($sub.Name).replace("HKEY_LOCAL_MACHINE\","HKLM:\") + "\EventSources")
if (Test-Path -Path $RegKey) {
$sources = Get-ChildItem -Path $RegKey
if ($sources.Count -gt 4000) {
Write-Diag ("[WARNING] There are " + $sources.Count + " sources for this subscription")
} else {
Write-Diag ("[INFO] There are " + $sources.Count + " sources for this subscription")
}
} else {
Write-Diag ("[INFO] No sources found for the subscription " + $sub.Name)
}
}
if ($Subscriptions) {
$EventLost = (Get-Counter "\\$env:computername\Event Tracing for Windows Session(EventLog-ForwardedEvents)\Events Lost").CounterSamples[0].CookedValue
if ($EventLost -gt 100) {
Write-Diag ("[WARNING] " + $EventLost + " events lost for EventLog-ForwardedEvents")
} else {
Write-Diag ("[INFO] " + $EventLost + " events lost for EventLog-ForwardedEvents")
}
}
if ($OSVer -gt 6.1) {
Write-Diag "[INFO] Retrieving machine's IP addresses"
$iplist = Get-NetIPAddress
}
$pol = Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service -Name HttpCompatibilityListener -ErrorAction SilentlyContinue
if ($pol) {
if ($pol.HttpCompatibilityListener -eq 1) {
Write-Diag ("[WARNING] HTTP Compatibility listener (port 80) is enabled")
}
}
$pol = Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service -Name HttpsCompatibilityListener -ErrorAction SilentlyContinue
if ($pol) {
if ($pol.HttpsCompatibilityListener -eq 1) {
Write-Diag ("[WARNING] HTTPS Compatibility listener (port 443) is enabled")
}
}
Write-Diag "[INFO] Browsing listeners"
$HTTPListenerFound = $false
$listeners = Get-ChildItem WSMan:\localhost\Listener
foreach ($listener in $listeners) {
Write-Diag ("[INFO] Inspecting listener " + $listener.Name)
$prop = Get-ChildItem $listener.PSPath
if ($listener.keys[0] -eq "Transport=HTTP") {
$HTTPListenerFound = $true
}
foreach ($value in $prop) {
if ($value.Name -eq "CertificateThumbprint") {
if ($listener.keys[0].Contains("HTTPS")) {
$HTTPSListenerFound = $true
Write-Diag "[INFO] Found HTTPS listener"
$listenerThumbprint = $value.Value.ToLower()
Write-Diag "[INFO] Found listener certificate $listenerThumbprint"
if ($listenerThumbprint) {
ChkCert -cert $listenerThumbprint -descr "listener" -store "Store = 'My'"
}
}
}
if ($value.Name.Contains("ListeningOn")) {
$ip = ($value.value).ToString()
Write-Diag "[INFO] Listening on $ip"
if ($OSVer -gt 6.1) {
if (($iplist | Where-Object {$_.IPAddress -eq $ip } | measure-object).Count -eq 0 ) {
Write-Diag "[ERROR] IP address $ip not found"
}
}
}
}
}
if ($HTTPListenerFound) {
Write-Diag ("[INFO] HTTP listener found")
$HTTPURLACL = ($urlACL | Where-Object Port -eq 5985)
if ($HTTPURLACL) {
Write-Diag "[INFO] URLACL for port 5985 is present"
if ($HTTPURLACL.Protocol -ne "http") {
Write-Diag ("[ERROR] The protocol for port 5985 is not HTTP (" + $HTTPURLACL.Protocol + ")")
}
if ($HTTPURLACL.Users | Where-Object Name -eq "NT SERVICE\WinRM") {
Write-Diag ("[INFO] NT SERVICE\WinRM has permissions on port 5985")
} else {
Write-Diag ("[ERROR] NT SERVICE\WinRM is missing permissions on port 5985")
}
if ($HTTPURLACL.Users | Where-Object Name -eq "NT SERVICE\Wecsvc") {
Write-Diag ("[INFO] NT SERVICE\Wecsvc has permissions on port 5985")
} else {
Write-Diag ("[ERROR] NT SERVICE\Wecsvc is missing permissions on port 5985")
}
} else {
Write-Diag "[ERROR] HTTP Listener found but URLACL for port 5985 is missing"
}
} else {
Write-Diag ("[ERROR] The HTTP listener is missing")
}
if ($HTTPSListenerFound) {
Write-Diag ("[INFO] HTTP listener found")
$HTTPSURLACL = ($urlACL | Where-Object Port -eq 5986)
if ($HTTPSURLACL) {
Write-Diag "[INFO] URLACL for port 5986 is present"
if ($HTTPSURLACL.Protocol -ne "https") {
Write-Diag ("[ERROR] The protocol for port 5986 is not HTTPS (" + $HTTPSURLACL.Protocol + ")")
}
if ($HTTPSURLACL.Users | Where-Object Name -eq "NT SERVICE\WinRM") {
Write-Diag ("[INFO] NT SERVICE\WinRM has permissions on port 5986")
} else {
Write-Diag ("[ERROR] NT SERVICE\WinRM is missing permissions on port 5986")
}
if ($HTTPSURLACL.Users | Where-Object Name -eq "NT SERVICE\Wecsvc") {
Write-Diag ("[INFO] NT SERVICE\Wecsvc has permissions on port 5986")
} else {
Write-Diag ("[ERROR] NT SERVICE\Wecsvc is missing permissions on port 5986")
}
} else {
Write-Diag "[ERROR] HTTPS Listener found but URLACL for port 5986 is missing"
}
}
$svccert = Get-Item WSMan:\localhost\Service\CertificateThumbprint
if ($svccert.value ) {
Write-Diag ("[INFO] The Service Certificate thumbprint is " + $svccert.value)
ChkCert -cert $svccert.value -descr "Service" -store "Store = 'My'"
}
$remoteaccess = Get-Item WSMan:\localhost\Service\AllowRemoteAccess
if ($remoteaccess.Value -eq "true") {
Write-Diag "[INFO] AllowRemoteAccess = true"
} elseif ($remoteaccess.Value -eq "false") {
Write-Diag "[ERROR] AllowRemoteAccess = false, this machine will not accept remote WinRM connections"
} else {
Write-Diag "[ERROR] AllowRemoteAccess has an invalid value"
}
$ipfilter = Get-Item WSMan:\localhost\Service\IPv4Filter
if ($ipfilter.Value) {
if ($ipfilter.Value -eq "*") {
Write-Diag "[INFO] IPv4Filter = *"
} else {
Write-Diag ("[WARNING] IPv4Filter = " + $ipfilter.Value)
}
} else {
Write-Diag ("[WARNING] IPv4Filter is empty, WinRM will not listen on IPv4")
}
$ipfilter = Get-Item WSMan:\localhost\Service\IPv6Filter
if ($ipfilter.Value) {
if ($ipfilter.Value -eq "*") {
Write-Diag "[INFO] IPv6Filter = *"
} else {
Write-Diag ("[WARNING] IPv6Filter = " + $ipfilter.Value)
}
} else {
Write-Diag ("[WARNING] IPv6Filter is empty, WinRM will not listen on IPv6")
}
if (Test-Path -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager") {
$isForwarder = $True
$MaxFwd = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding').MaxForwardingRate
if ($MaxFwd) {
Write-Diag ("[ERROR] HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\MaxForwardingRate is set to " + $MaxFwd + ". This functionality is broken, see Bug 33554568. Remove the setting Configure Forwarder Resource Usage from the GPO to avoid performance issues")
}
$RegKey = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager')
Write-Diag "[INFO] Enumerating SubscriptionManager URLs at HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager"
$RegKey.PSObject.Properties | ForEach-Object {
If($_.Name -notlike '*PS*'){
Write-Diag ("[INFO] " + $_.Name + " " + $_.Value)
$IssuerCA = (FindSep -FindIn $_.Value -Left "IssuerCA=" -Right ",").ToLower()
if (-not $IssuerCA) {
$IssuerCA = (FindSep -FindIn $_.Value -Left "IssuerCA=" -Right "").ToLower()
}
if ($IssuerCA) {
if ("0123456789abcdef".Contains($IssuerCA[0])) {
Write-Diag ("[INFO] Found issuer CA certificate thumbprint " + $IssuerCA)
$aCert = $tbCert.Select("Thumbprint = '" + $IssuerCA + "' and (Store = 'CA' or Store = 'Root')")
if ($aCert.Count -eq 0) {
Write-Diag "[ERROR] The Issuer CA certificate was not found in CA or Root stores"
} else {
Write-Diag ("[INFO] Issuer CA certificate found in store " + $aCert[0].Store + ", subject = " + $aCert[0].Subject)
if (($aCert[0].NotAfter) -gt (Get-Date)) {
Write-Diag ("[INFO] The Issuer CA certificate will expire on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
} else {
Write-Diag ("[ERROR] The Issuer CA certificate expired on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
}
}
$aCliCert = $tbCert.Select("IssuerThumbprint = '" + $IssuerCA + "' and Store = 'My'")
if ($aCliCert.Count -eq 0) {
Write-Diag "[ERROR] Cannot find any certificate issued by this Issuer CA"
} else {
if ($PSVersionTable.psversion.ToString() -ge "3.0") {
Write-Diag "[INFO] Listing available client certificates from this IssuerCA"
$num = 0
foreach ($cert in $aCliCert) {
if ($cert.EnhancedKeyUsage.Contains("Client Authentication")) {
Write-Diag ("[INFO] Found client certificate " + $cert.Thumbprint + " " + $cert.Subject)
if (($Cert.NotAfter) -gt (Get-Date)) {
Write-Diag ("[INFO] The client certificate will expire on " + $cert.NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
} else {
Write-Diag ("[ERROR] The client certificate expired on " + $cert.NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
}
$certobj = Get-Item ("CERT:\Localmachine\My\" + $cert.Thumbprint)
$keypath = [io.path]::combine("$env:ProgramData\microsoft\crypto\rsa\machinekeys", $certobj.privatekey.cspkeycontainerinfo.uniquekeycontainername)
if ([io.file]::exists($keypath)) {
$acl = ((get-acl -path $keypath).Access | Where-Object {$_.IdentityReference -eq "NT AUTHORITY\NETWORK SERVICE"})
if ($acl) {
$rights = $acl.FileSystemRights.ToString()
if ($rights.contains("Read") -or $rights.contains("FullControl") ) {
Write-Diag ("[INFO] The NETWORK SERVICE account has permissions on the private key of this certificate: " + $rights)
} else {
Write-Diag ("[ERROR] Incorrect permissions for the NETWORK SERVICE on the private key of this certificate: " + $rights)
}
} else {
Write-Diag "[ERROR] Missing permissions for the NETWORK SERVICE account on the private key of this certificate"
}
} else {
Write-Diag "[ERROR] Cannot find the private key"
}
$num++
}
}
if ($num -eq 0) {
Write-Diag "[ERROR] Cannot find any client certificate issued by this Issuer CA"
} elseif ($num -gt 1) {
Write-Diag "[WARNING] More than one client certificate issued by this Issuer CA, the first certificate will be used by WinRM"
}
}
}
} else {
Write-Diag "[ERROR] Invalid character for the IssuerCA certificate in the SubscriptionManager URL"
}
}
}
}
$RegKey = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding')
if ($regkey.MaxForwardingRate) {
Write-Diag "[ERROR] MaxForwardingRate is configured, this feature does not work. Please remove this setting and see bug 33554568"
}
} else {
$isForwarder = $false
Write-Diag "[INFO] No SubscriptionManager URL configured. It's ok if this machine is not supposed to forward events."
}
if ((Get-CimInstance -ClassName Win32_ComputerSystem).PartOfDomain) {
$search = New-Object DirectoryServices.DirectorySearcher([ADSI]"GC://$env:USERDNSDOMAIN") # The SPN is searched in the forest connecting to a Global catalog
$SPNReg = ""
$SPN = "HTTP/" + $env:COMPUTERNAME
Write-Diag ("[INFO] Searching for the SPN $SPN")
$search.filter = "(servicePrincipalName=$SPN)"
$results = $search.Findall()
if ($results.count -gt 0) {
foreach ($result in $results) {
Write-Diag ("[INFO] The SPN HTTP/$env:COMPUTERNAME is registered for DNS name = " + $result.properties.dnshostname + ", DN = " + $result.properties.distinguishedname + ", Category = " + $result.properties.objectcategory)
if ($result.properties.objectcategory[0].Contains("Computer")) {
if (-not $result.properties.dnshostname[0].Contains($env:COMPUTERNAME)) {
Write-Diag ("[ERROR] The The SPN $SPN is registered for different DNS host name: " + $result.properties.dnshostname[0])
$SPNReg = "OTHER"
}
} else {
Write-Diag "[ERROR] The The SPN $SPN is NOT registered for a computer account"
$SPNReg = "OTHER"
}
}
if ($results.count -gt 1) {
Write-Diag "[ERROR] The The SPN $SPN is duplicate"
}
} else {
Write-Diag "[INFO] The The SPN $SPN was not found. That's ok, the SPN HOST/$env:COMPUTERNAME will be used"
}
$SPN = "HTTP/" + $env:COMPUTERNAME + ":5985"
Write-Diag ("[INFO] Searching for the SPN $SPN")
$search.filter = "(servicePrincipalName=$SPN)"
$results = $search.Findall()
if ($results.count -gt 0) {
foreach ($result in $results) {
Write-Diag ("[INFO] The SPN HTTP/$env:COMPUTERNAME is registered for DNS name = " + $result.properties.dnshostname + ", DN = " + $result.properties.distinguishedname + ", Category = " + $result.properties.objectcategory)
if ($result.properties.objectcategory[0].Contains("Computer")) {
if (-not $result.properties.dnshostname[0].Contains($env:COMPUTERNAME)) {
Write-Diag ("[ERROR] The The SPN $SPN is registered for different DNS host name: " + $result.properties.dnshostname[0])
}
} else {
Write-Diag "[ERROR] The The SPN $SPN is NOT registered for a computer account"
}
}
if ($results.count -gt 1) {
Write-Diag "[ERROR] The The SPN $SPN is duplicate"
}
} else {
if ($SPNReg -eq "OTHER") {
Write-Diag "[WARNING] The The SPN $SPN was not found. It is required to accept WinRM connections since the HTTP/$env:COMPUTERNAME is reqistered to another name"
}
}
if ($OSVer -le 6.3) {
Write-Diag "[INFO] Checking the WinRMRemoteWMIUsers__ group"
$search = New-Object DirectoryServices.DirectorySearcher([ADSI]"") # This is a Domain local group, therefore we need to collect to a non-global catalog
$search.filter = "(samaccountname=WinRMRemoteWMIUsers__)"
$results = $search.Findall()
if ($results.count -gt 0) {
Write-Diag ("[INFO] Found " + $results.Properties.distinguishedname)
if ($results.Properties.grouptype -eq -2147483644) {
Write-Diag "[INFO] WinRMRemoteWMIUsers__ is a Domain local group"
} elseif ($results.Properties.grouptype -eq -2147483646) {
Write-Diag "[WARNING] WinRMRemoteWMIUsers__ is a Global group"
} elseif ($results.Properties.grouptype -eq -2147483640) {
Write-Diag "[WARNING] WinRMRemoteWMIUsers__ is a Universal group"
}
if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") {
Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is also present as machine local group"
}
} else {
Write-Diag "[WARNING] The WinRMRemoteWMIUsers__ was not found in the domain"
if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") {
Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is present as machine local group"
} else {
Write-Diag "[ERROR] The group WinRMRemoteWMIUsers__ is not even present as machine local group"
}
}
}
if ((Get-ChildItem WSMan:\localhost\Service\Auth\Kerberos).value -eq "true") {
Write-Diag "[INFO] Kerberos authentication is enabled for the service"
} else {
Write-Diag "[WARNING] Kerberos authentication is disabled for the service"
}
} else {
Write-Diag "[INFO] The machine is not joined to a domain"
if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") {
Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is present as machine local group"
} else {
Write-Diag "[ERROR] The group WinRMRemoteWMIUsers__ is not present as machine local group"
}
if ((Get-ChildItem WSMan:\localhost\Service\Auth\Certificate).value -eq "false") {
Write-Diag "[WARNING] Certificate authentication is disabled for the service"
} else {
Write-Diag "[INFO] Certificate authentication is enabled for the service"
}
}
$HHTPParam = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters"
if (($HHTPParam.MaxFieldLength -gt 0) -and ($HHTPParam.MaxRequestBytes -gt 0)) {
Write-Diag ("[INFO] HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\MaxFieldLength = " + $HHTPParam.MaxFieldLength)
Write-Diag ("[INFO] HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\MaxRequestBytes = " + $HHTPParam.MaxRequestBytes)
} else {
Write-Diag ("[WARNING] MaxFieldLength and/or MaxRequestBytes are not defined in HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters. This may cause the request to fail with error 400 in complex AD environemnts. See KB 820129")
}
$iplisten = (Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" | Select-Object -ExpandProperty "ListenOnlyList" -ErrorAction SilentlyContinue)
if ($iplisten) {
Write-Diag ("[WARNING] The IPLISTEN list is not empty, the listed addresses are " + $iplisten)
} else {
Write-Diag "[INFO] The IPLISTEN list is empty. That's ok: WinRM will listen on all IP addresses"
}
$binval = (Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" -Name WinHttpSettings).WinHttPSettings
$proxylength = $binval[12]
if ($proxylength -gt 0) {
$proxy = -join ($binval[(12+3+1)..(12+3+1+$proxylength-1)] | % {([char]$_)})
Write-Diag ("[WARNING] A NETSH WINHTTP proxy is configured: " + $proxy)
$bypasslength = $binval[(12+3+1+$proxylength)]
if ($bypasslength -gt 0) {
$bypasslist = -join ($binval[(12+3+1+$proxylength+3+1)..(12+3+1+$proxylength+3+1+$bypasslength)] | % {([char]$_)})
Write-Diag ("[WARNING] Bypass list: " + $bypasslist)
} else {
Write-Diag "[WARNING] No bypass list is configured"
}
Write-Diag "[WARNING] WinRM does not work very well through proxies, make sure that the target machine is in the bypass list or remove the proxy"
} else {
Write-Diag "[INFO] No NETSH WINHTTP proxy is configured"
}
$th = (get-item WSMan:\localhost\Client\TrustedHosts).value
if ($th) {
Write-Diag ("[INFO] TrustedHosts contains: $th")
} else {
Write-Diag ("[INFO] TrustedHosts is not configured, it's ok it this machine is not supposed to connect to other machines using NTLM")
}
$psver = $PSVersionTable.PSVersion.Major.ToString() + $PSVersionTable.PSVersion.Minor.ToString()
if ($psver -eq "50") {
Write-Diag ("[WARNING] Windows Management Framework version " + $PSVersionTable.PSVersion.ToString() + " is no longer supported")
} else {
Write-Diag ("[INFO] Windows Management Framework version is " + $PSVersionTable.PSVersion.ToString() )
}
$clientcert = Get-ChildItem WSMan:\localhost\ClientCertificate
if ($clientcert.Count -gt 0) {
Write-Diag "[INFO] Client certificate mappings"
foreach ($certmap in $clientcert) {
Write-Diag ("[INFO] Certificate mapping " + $certmap.Name)
$prop = Get-ChildItem $certmap.PSPath
foreach ($value in $prop) {
Write-Diag ("[INFO] " + $value.Name + " " + $value.Value)
if ($value.Name -eq "Issuer") {
ChkCert -cert $value.Value -descr "mapping" -store "(Store = 'Root' or Store = 'CA')"
} elseif ($value.Name -eq "UserName") {
$usr = Get-CimInstance -ClassName Win32_UserAccount | Where-Object {$_.Name -eq $value.value}
if ($usr) {
if ($usr.Disabled) {
Write-Diag ("[ERROR] The local user account " + $value.value + " is disabled")
} else {
Write-Diag ("[INFO] The local user account " + $value.value + " is enabled")
}
} else {
Write-Diag ("[ERROR] The local user account " + $value.value + " does not exist")
}
} elseif ($value.Name -eq "Subject") {
if ($value.Value[0] -eq '"') {
Write-Diag "[ERROR] The subject does not have to be included in double quotes"
}
}
}
}
} else {
if ($subWG) {
Write-Diag "[ERROR] No client certificate mapping configured"
}
}
$aCert = $tbCert.Select("Store = 'Root' and Subject <> Issuer")
if ($aCert.Count -gt 0) {
Write-Diag "[ERROR] Found for non-Root certificates in the Root store"
foreach ($cert in $acert) {
Write-Diag ("[ERROR] Misplaced certificate " + $cert.Subject)
}
}
if ($isForwarder) {
$evtLogReaders = (Get-CimInstance -Query ("Associators of {Win32_Group.Domain='" + $env:COMPUTERNAME + "',Name='Event Log Readers'} where Role=GroupComponent") | Where {$_.Name -eq "NETWORK SERVICE"} | Measure-Object)
if ($evtLogReaders.Count -gt 0) {
Write-Diag "[INFO] The NETWORK SERVICE account is member of the Event Log Readers group"
} else {
Write-Diag "[WARNING] The NETWORK SERVICE account is NOT member of the Event Log Readers group, the events in the Security log cannot be forwarded"
}
}
$fwrules = (Get-NetFirewallPortFilter -Protocol TCP | Where { $_.localport -eq "5986" } | Get-NetFirewallRule)
if ($fwrules.count -eq 0) {
Write-Diag "[INFO] No firewall rule for port 5986"
} else {
Write-Diag "[INFO] Found firewall rule for port 5986"
}
$dir = $env:windir + "\system32\logfiles\HTTPERR"
if (Test-Path -path $dir) {
$httperrfiles = Get-ChildItem -path ($dir)
if ($httperrfiles.Count -gt 100) {
Write-Diag ("[WARNING] There are " + $httperrfiles.Count + " files in the folder " + $dir)
} else {
Write-Diag ("[INFO] There are " + $httperrfiles.Count + " files in the folder " + $dir)
}
$size = 0
foreach ($file in $httperrfiles) {
$size += $file.Length
}
$size = [System.Math]::Ceiling($size / 1024 / 1024) # Convert to MB
if ($size -gt 100) {
Write-Diag ("[WARNING] The folder " + $dir + " is using " + $size.ToString() + " MB of disk space")
} else {
Write-Diag ("[INFO] The folder " + $dir + " is using " + $size.ToString() + " MB of disk space")
}
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBdQdZ0sQcyhlnp
# vvn1S21gHDnw/ueJT0fNTnjQ7oTrAqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDgs
# at8ygU0by9RLfSDiOz9PULyupwmhKNIdeckk6iZLMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAQ+S8XwU4Xj35nZRsBqdjuU5fSU0mhruDmTZc
# iQOuEvQQlTDPWR5B2sBBY77p1H/x060HLLvyTka6zb5lOsZM5ySOybTCxT5iPyGh
# 2kkx+RWvOzhKP7HWIjc/JduH+mdFXnXmAqkI4cTuS6llkMg0Z2e1ePQBPFI4wVHL
# ByO4E2eQpNAWv2UH7n2ZvSxUA+rspUsU7p8HAaFPuKcvGoSrhnhjj1NJ/NzIm1L/
# pF3R6n3EU3N/i6QuJavnqyFpkMqLUndDA73BEl8MYouzrjQydbZ3pT/4WVRsOJbW
# IBzETGmOJO0dGDaWH6sTpSQqa2XT+HIhIBzKHEeT5PkUYQS44aGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC4AH+XHdOXCmpmB9uXm8B1zuRUGkuAuOwf
# J5FNprRBhQIGZxqPlgPeGBMyMDI0MTAyODExMzUyNi4xMTdaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwAB
# AAAB7jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7R
# EOOR7LzYCLXEtWgeqyOVlrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XS
# GjpJhpGx59fxMJoTYWPzzD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V
# 7+HhTR391TbC1beSxwXfdKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBT
# bU5fcm3bhhlRNw5d04Ld15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6l
# VqwbNQE11Oedn2uvRjKWEwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7r
# N/HYX6cCsC2soyXG3OwCtLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC
# 1dYW1jN77t5iSl5Wp1HKBp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd
# +yU8sgKn9MtVnQ65s6QG72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIW
# flgd/vEWfTNcPWEQj7fsWuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwC
# caY/WXsb/axkxB/zCTdHSBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+
# JbMjKmTdcjmSkb5oN8qU1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwg
# nr37xd+2v1/cdqYIMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSV
# pBnYkzX8f8GZjaOs577F9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUzna
# y2n9csfn3p6y7kYkHqtSugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPj
# QwZeI6EPj/OAtpYkT7IUXqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQ
# mAR9fqMNxjI3ZClVxA4wiM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7a
# LSKtDzOEUNs+ZtjhznmZgUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTs
# hU6G6sAYpbqdME/+/g1uer7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/
# 7XVBtFlxL/KgcQylJNnia+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5
# ZN0K8ju0vNVgF+Dv05sirPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4E
# zcw7E1OhtOMf7DHgPMWf6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnN
# znCpsEPZat0h+6d7ulRaWR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXji
# gdKlLQPBlX+9zOoGAJhoZfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCIo6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrGDAi
# GA8yMDI0MTAyODA2MTgwMFoYDzIwMjQxMDI5MDYxODAwWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyasYAgEAMAcCAQACAhINMAcCAQACAhMsMAoCBQDqyvyYAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAHjcl4rNXBxwyM5fS8nqOw6x8lf
# 1RsFqQupShcrwC+zbx/3nFA5U2pjnyqIPRnRv3+YzZWJA86L/bFfrALFHwZFiQib
# UCGunT1/7Sen3zbENCSolEjbtbHq62lXAEPeaATVETrPsonHGiwNLftMdCmo39FT
# NyrlQhHRdbBt3uFBhI9545thuGJ2/+0UmSqnPkdqfpFJFQTpQULXBp1kWqWbUOh4
# XKgSaYo4MltD4LJV2caY2i1Bat6OItzYNOIJyQHt76CRJn1pmJGtL23JryESkqvd
# MvekGpYuJDAsdSRy3PnzQRmMvOjZNt00Ur8dcXWMGrJ8g/ynoU/qpDG9BucxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F
# 0wIwspqdpwABAAAB7jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDCpMtE5sDGkFRq8ps0d0sVW8kY
# Qfm6dTpZLxtCtnmtbDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSV
# hfq+Vdf+DPs+5EIkBz9oCS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQg4YrvCq7S
# HssHwwbzF6sjf+O1VKt3mZP5Sd8ekjKw0bQwDQYJKoZIhvcNAQELBQAEggIAZVk5
# NKOrMSpxjoZqxYACi9Ic6Cx7JoRQS5amTLY/o+4eDWGby3CZrdF2nE6Xmv/N3ECN
# tsCRcFMvJJaHDVag1NRqcGJK3VD0sd3SPeRR1sJ8OxkrJfB3JRqvYH1NhI9vzQN/
# tVBdhO0pAqBnGviTBoWeiRlD18pwEFdmsKApCZOlIwFr5O7AyOi16E7el+emZamn
# /c8ijnE+i/RzHYyKUud3KJ4KThdX175zH3217wVtFeHDE83qZ9V3Nls6E5mP4gn8
# bGZ1ISWqANHmiRZrr1N4vK7SoNIKpvaAjdUCoyNcU13JwnPqq0VCWJNaLxyPc1bU
# uNBBV3xkGo+avCz4u1uMnmlY3HXUTVrENnz5/9RqifJuHYFdnlI2Q2Mluf4ellRF
# 0GD7/0v93eBZemPO66TzKsZBRU3RIfTUtx37x8NACFR+MgDX0TVtKrxcFz1fc3Tb
# bG4OF3w4tIowQCbrBLfGCSvwl22k4bD1kCpjQGVS1wR3V+48hMSl6lD6oUlb8lOu
# C3SraiQGEL5yOZZBTn7Doyd3DfaO603556WoEf3FSUwBuxokqexzXiHOhj/O1oOn
# hQ5XqhHNUr86s60HMLs69uX68NXlag8p8vrTA71V+hvOc9cpANHwUJNTTBNsuVXB
# fBX5h5xykiDX6cBYeQu1Gieqq5F1GKYZul+fwEs=
# SIG # End signature block
|
combined_dataset/train/non-malicious/ConvertFrom-Hashtable.ps1 | ConvertFrom-Hashtable.ps1 | # function ConvertFrom-Hashtable {
PARAM([[HashTable]$hashtable,[switch]$combine)
BEGIN { $output = New-Object PSObject }
PROCESS {
if($_) {
$hashtable = $_;
if(!$combine) {
$output = New-Object PSObject
}
}
$hashtable.GetEnumerator() |
ForEach-Object { Add-Member -inputObject $object `
-memberType NoteProperty -name $_.Name -value $_.Value }
$object
}
#}
|
combined_dataset/train/non-malicious/sample_49_49.ps1 | sample_49_49.ps1 | #
# Module manifest for module 'PowerShellEditorServices'
#
# Generated by: daviwil
#
# Generated on: 5/12/2016
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'PowerShellEditorServices.Commands.psm1'
# Version number of this module.
ModuleVersion = '0.2.0'
# ID used to uniquely identify this module
GUID = '6064d846-0fa0-4b6d-afc1-11e5bed3c4a9'
# Author of this module
Author = 'Microsoft'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2021 Microsoft Corporation.'
# Description of the functionality provided by this module
Description = 'Provides internal commands for PowerShell Editor Services that only work in an editor session.'
# Minimum version of the Windows PowerShell engine required by this module
# PowerShellVersion = ''
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
TypesToProcess = @('PowerShellEditorServices.Commands.types.ps1xml')
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @('Register-EditorCommand',
'Unregister-EditorCommand',
'Set-ScriptExtent',
'Find-Ast',
'Import-EditorCommand',
'ConvertFrom-ScriptExtent',
'ConvertTo-ScriptExtent',
'Get-Token',
'Out-CurrentFile',
'Join-ScriptExtent',
'Test-ScriptExtent',
'Open-EditorFile',
'New-EditorFile',
'Clear-Host')
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @('psedit', 'cls', 'clear')
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
LicenseUri = 'https://github.com/PowerShell/PowerShellEditorServices/blob/main/LICENSE'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/PowerShell/PowerShellEditorServices'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBt+StcIVetuDby
# 902lajDQ2qQXiESCCdRNEF0UMzYjVaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA4/y/sjLlmRsXzwQDnkVkt2
# laMBz4sMvyjZSuD010l/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEApVQBOEHKsYp6AN9492pFm7QfEciuc3KK/tVTDD/bff0mfoxdhyAd7Dtc
# CzglZaOq48xU63d1uR1+fa6zsjZWtBZEfk49HKvI31BDn5Ov43D1iLBZkVyzqtm6
# GnXC83TlHesfJg8GTFo/+9dKPZTFSuPYul+0t3TpFxn4scG7jxH/25R/HlW4tyoQ
# 0Xz4A28rAMsBPdZRUTX8F6WEuFHaeKzM35gTYb+DpMEoMpQaGn8K6zjx/IUJVUzd
# 0fkFJ2jqPh4hkDgGyhQN/eEB6TOB3/dSJdzsbyyZwsWXT7/izzQjLRLOwcCmmI7t
# OBRGpUS1j96Uwwrhm2jV9kcHyG4tlaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAGCnzhXJYggcppY91fQtCs5rdqsG0zwsazz8ATZjsOyAIGZjOZuljh
# GBMyMDI0MDUwMzIzMzAxOS4xMTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6d9ptjAiGA8yMDI0MDUwMzEzNDgz
# OFoYDzIwMjQwNTA0MTM0ODM4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp32m2
# AgEAMAcCAQACAhJJMAcCAQACAhNiMAoCBQDp4Ls2AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBACy1q2ghc4PlvMHrXkPPZpeX1RzSukofAZf+weOzlWP+Gh9M
# f8s6FvNU9PR4xkznPMg84mMYtiSGIty1A6urnSNPRuvssbpdvcRa0W/ez2R6SJCp
# atb8Bb16rBQ/kinFJHLSFJSDZOkvXRF2omT26IPhaFJNKOBYhATLoWa8jIgANUB3
# H1nsHnTnMV3vio4+9KL/q95cp2LryfDWYeafFILy9z/wy2Sq9C6ric2dUiTuuJjs
# OvjKobUeNj9oc6RaIyxoxuZEL1wJj1l6/OrVIyYADsbfFBJ/pz//XDsn0TZhHpoB
# sJHGJIRijeH/wlNmRDE/xQcvuVHXVRep+/B20FoxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAWYmlnCAoyxzgmOEfxGooQycC0W2scEyhYTw97h11KLDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s
# uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgtrKJnf3CDPZH5DRV77sxxZCw6OjO
# MlFDRyAgvKXVtS8wDQYJKoZIhvcNAQELBQAEggIAjP48ytL1tK/ELM0zDKLSCy79
# 2w/WsYMkkmdZYxh4DU+g8ZiduXWGyOWQ1qzz/skwpGMebm7hAfaFtnM9fWdTZ2N2
# dmJDzZkDV1Rz2Xcc3pvFM8VewhhfSr9lSyZUTXR/jGFzGYAGxBOD0Erjpwq9Ecjn
# WYANUTMb+/zASrB85guzAFtRbHHLOyzt5y+f3S3raRbX1fCgDUsbNUxXGxbBs411
# Wdpl9KOX+J6nn6CIZDLb9eOW6o/EgbN/EvdaM4fGUeg5S8OWH9swaFtP2rPaCrDJ
# wDkUfwYv+Uo9PE7DUUqtQr+6vXNUqay9CZPJtoOWPh8iGYzXMum+Oudmzkf9miJs
# Y7xmMM4Lx1Rizb5AXdDvqaIrwT7DG+q1oWiqUQNQEGDY52bDfCGKA0uloWOvv44B
# xX+YIdwq6KjOTmVZT5dJgNcWm7QkVRMq5N1PB/7nlFaIVy5ReyDZitG3GmBKzYvX
# tplL7Sv8T/OKcVJoXmA4pPio5vO9fx16zoGHd/wdqmj06LXLM9YMYvNNBDxuv3u+
# /e3JJBRkZh96pWWn+ATeH6JR8eZh2J4E4iJHXn8xA0GuedrmeYJ9rlt912fZ7vZE
# 6lXCihr4+4quqwJj+noPvkyggFRbh9zAURRTQVCOpYam+9bzpXx11sf1BcC3jyDj
# r4Ba++PzF5kL2udJ5T0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_11_79.ps1 | sample_11_79.ps1 | ConvertFrom-StringData @'
id_dirs=Collecting Directory Output
'@
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDRy8kiReDoGdLC
# nmSgV1SViLYbdod1BeCf8iKRZsAJtqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBwB
# ZDzd/IrSeeruLyCzZiqCAvZKGi1ApCKiuD7chcsIMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAZtGcrd0+tY4usurqqCX+xfKvLXHtdQSQnTFP
# m7u6E/v1izNTFC7ZjhQZjd/L9mbXmCjb4f+9wDLCdGR4QQoePp5kyMLkmcy2GWbo
# AGQJgunjdS3Twv2UhfZmWpe7TkQxydZuck5xd4EX1r8g0zdVBc9bMlPplVNftOLy
# tuDEr6MQWh4z4I2diFtgtdwqlAywDJAthsVXgqU1RaG8iF0E9Sb94KOuMr2yIROf
# 43hEtGSe3HnHkoKKi4dbF2qHNQIfJ0b6dz0Si8a7PDaGTHtBh0sATGMkzJ0p93lS
# uFQxg3qq43RNIQiB8q2OqIz/cIwNRX5W1GarvXFU49luMB0tYqGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCm5CJj8meudkiiZ+1tUol6WZsmMR1Dn49u
# vGi6ufHIfwIGZut+oGF8GBMyMDI0MTAyODExNDA0MS40MjZaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big
# r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF
# RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts
# urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF
# 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83
# 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ
# t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l
# RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT
# shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+
# vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7
# 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A
# SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt
# weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc
# D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL
# 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO
# RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H
# WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn
# jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va
# iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC
# 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K
# tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW
# wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w
# fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0
# MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA
# AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l
# eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L
# fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M
# Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a
# tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao
# 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgQAEbR2o6Z0O2ZqRgmkfVo836d1HJm1HoCWlGfuvKOGMwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3
# d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU
# R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICAIaHRV5jbKejQs0Y+CU8XmdbyojZOL0e
# E81EkTTvayD7SzrYEVzdp4gjlgrfjY49YrdFvP53p73VpwWBK/YhOV4Ii0iSXWDF
# XLKsb93aduoCEiFpOdsv6jBrDJB61zG5WQxDoS2hIuvFW5W3Lgj2oEgRWsK9FdV6
# dTWQgcadz7HBzEvVf3nNVXUi6uaSCrGsFIrwkfSpYJywj4CWa1mNRlz8FmU4AZzp
# m9JDWYKDzjCjvB56KbM0IvkQtAm3e6XQPNtpy6+iWT/3ESkFvp7Wd4R78zRMmIEk
# rfEfQB6nVhhn0KZNUe/fBYpfvOd9ncDzzMr6aQ93JiLmkbi6KqzcApHjTSR/NC/p
# mbz6sAjTBYxLTRZHMpRT0kFQzhqmadp1Nl/STWXlGVOwtRIs0qBv5lwYQ41JkD5u
# 4nQG1IorPHEzEryB3rhmWWDMCbp1WNc+pET3j9qmiAGdLvXe+RpxbnJ+8k1NgQsg
# vH7qWc41fEv4TuVXhUaew8p5srBFSyeCC1cA8BWqbB3ynroVRaBMuLZo/9FirCK0
# kklZfBiTbW2/wLY9dXtO7W/k89a6/waZOv5X6MsYELuODCDAlheVDMcq/t38h7Gm
# QXwTQ6PDV0Bn10S+YoBLLj1uWNOaO7ZzjoUl4HctXBlTzzKiqvqr3NgktSbuab/T
# oldl5wZYej3h
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_20_64.ps1 | sample_20_64.ps1 | #
# Module manifest for module 'OCI.PSModules.Opa'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Opa.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b3b17045-1e55-4c1b-8e02-641f25d4bb58'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Opa Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opa.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOpaInstance', 'Get-OCIOpaInstancesList',
'Get-OCIOpaWorkRequest', 'Get-OCIOpaWorkRequestErrorsList',
'Get-OCIOpaWorkRequestLogsList', 'Get-OCIOpaWorkRequestsList',
'Move-OCIOpaInstanceCompartment', 'New-OCIOpaInstance',
'Remove-OCIOpaInstance', 'Stop-OCIOpaWorkRequest',
'Update-OCIOpaInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opa'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Convert-BounceToX_5.ps1 | Convert-BounceToX_5.ps1 | # $Id: Convert-BounceToX500.ps1 610 2010-11-16 00:39:19Z jon $
# $Revision: 610 $
#.Synopsis
# Convert Bounce to X500
#.Description
# Convert URL Encoded address in a Bounce message to an X500 address
# that can be added as an alias to the mail-enabled object
#.Parameter bounceAddress
# URL Encoded bounce message address#
#.Example
# Convert-BounceToX500 "IMCEAEX-_O=CONTOSO_OU=First+20Administrative+20Group_cn=Recipients_cn=john+5Fjacob+2Esmith@contoso.com"
#.Example
# "IMCEAEX-_O=CONTOSO_OU=First+20Administrative+20Group_cn=Recipients_cn=john+5Fjacob+2Esmith@contoso.com"|Convert-BounceToX500
[CmdletBinding()]
PARAM (
[Parameter(Mandatory=$true,ValueFromPipeline=$true)][string]$bounceAddress
)
BEGIN
{
Add-Type -AssemblyName System.Web|Out-Null
}
PROCESS
{
if($_) {$bounceAddress = $_}
$bounceAddress = $bounceAddress -Replace "%2B","%" # This is a urlEncoded "+"
$bounceAddress = $bounceAddress -Replace "%3D","="
$bounceAddress = $bounceAddress -Replace "\\+","%"
$bounceAddress = $bounceAddress -Replace "_O=","/O="
$bounceAddress = $bounceAddress -Replace "_OU=","/OU="
$bounceAddress = $bounceAddress -Replace "_CN=","/CN="
if([Web.HttpUtility]::UrlDecode($bounceAddress) -match "(/o=.*)@[\\w\\d.]+$"){$matches[1]}
}
|
combined_dataset/train/non-malicious/1185.ps1 | 1185.ps1 |
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
function Start-Test
{
$dir = Join-Path -Path $env:TEMP -ChildPath ([IO.Path]::GetRandomFileName())
Install-Directory -Path $dir
}
function Stop-Test
{
if( (Test-Path -Path $dir -PathType Container) )
{
Remove-Item -Path $dir -Recurse
}
}
function Test-ShouldRemoveDirectory
{
Uninstall-Directory -Path $dir
Assert-NoError
Assert-DirectoryDoesNotExist $dir
}
function Test-ShouldHandleDirectoryThatDoesNotExist
{
Uninstall-Directory -Path $dir
Uninstall-Directory -Path $dir
Assert-NoError
Assert-DirectoryDoesNotExist $dir
}
function Test-ShouldDeleteRecursively
{
$filePath = Join-Path -Path $dir -ChildPath 'file'
New-Item -Path $filePath -ItemType 'File'
Uninstall-Directory -Path $dir -Recurse
Assert-NoError
Assert-DirectoryDoesNotExist $dir
} |
combined_dataset/train/non-malicious/sample_21_62.ps1 | sample_21_62.ps1 | #
# Module manifest for module 'OCI.PSModules.Databasemanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Databasemanagement.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '0faf82fb-82c6-40fe-bbd2-87626481a704'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Databasemanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatabasemanagementDataFiles',
'Add-OCIDatabasemanagementManagedDatabaseToManagedDatabaseGroup',
'Add-OCIDatabasemanagementmTasks',
'Confirm-OCIDatabasemanagementBasicFilter',
'Disable-OCIDatabasemanagementAutomaticInitialPlanCapture',
'Disable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask',
'Disable-OCIDatabasemanagementExternalDbSystemDatabaseManagement',
'Disable-OCIDatabasemanagementExternalDbSystemStackMonitoring',
'Disable-OCIDatabasemanagementExternalExadataInfrastructureManagement',
'Disable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask',
'Disable-OCIDatabasemanagementSqlPlanBaselinesUsage',
'Edit-OCIDatabasemanagementSnapshotSettings',
'Enable-OCIDatabasemanagementAutomaticInitialPlanCapture',
'Enable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask',
'Enable-OCIDatabasemanagementExternalDbSystemDatabaseManagement',
'Enable-OCIDatabasemanagementExternalDbSystemStackMonitoring',
'Enable-OCIDatabasemanagementExternalExadataInfrastructureManagement',
'Enable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask',
'Enable-OCIDatabasemanagementSqlPlanBaselinesUsage',
'Get-OCIDatabasemanagementAlertLogsList',
'Get-OCIDatabasemanagementAsmPropertiesList',
'Get-OCIDatabasemanagementAssociatedDatabasesList',
'Get-OCIDatabasemanagementAttentionLogsList',
'Get-OCIDatabasemanagementAwrDbReport',
'Get-OCIDatabasemanagementAwrDbsList',
'Get-OCIDatabasemanagementAwrDbSnapshotsList',
'Get-OCIDatabasemanagementAwrDbSqlReport',
'Get-OCIDatabasemanagementClusterCacheMetric',
'Get-OCIDatabasemanagementConsumerGroupPrivilegesList',
'Get-OCIDatabasemanagementCursorCacheStatementsList',
'Get-OCIDatabasemanagementDataAccessContainersList',
'Get-OCIDatabasemanagementDatabaseFleetHealthMetrics',
'Get-OCIDatabasemanagementDatabaseHomeMetrics',
'Get-OCIDatabasemanagementDatabaseParametersList',
'Get-OCIDatabasemanagementDbManagementPrivateEndpoint',
'Get-OCIDatabasemanagementDbManagementPrivateEndpointsList',
'Get-OCIDatabasemanagementExecutionPlanStatsComparision',
'Get-OCIDatabasemanagementExternalAsm',
'Get-OCIDatabasemanagementExternalAsmConfiguration',
'Get-OCIDatabasemanagementExternalAsmDiskGroupsList',
'Get-OCIDatabasemanagementExternalAsmInstance',
'Get-OCIDatabasemanagementExternalAsmInstancesList',
'Get-OCIDatabasemanagementExternalAsmsList',
'Get-OCIDatabasemanagementExternalAsmUsersList',
'Get-OCIDatabasemanagementExternalCluster',
'Get-OCIDatabasemanagementExternalClusterInstance',
'Get-OCIDatabasemanagementExternalClusterInstancesList',
'Get-OCIDatabasemanagementExternalClustersList',
'Get-OCIDatabasemanagementExternalDatabasesList',
'Get-OCIDatabasemanagementExternalDbHome',
'Get-OCIDatabasemanagementExternalDbHomesList',
'Get-OCIDatabasemanagementExternalDbNode',
'Get-OCIDatabasemanagementExternalDbNodesList',
'Get-OCIDatabasemanagementExternalDbSystem',
'Get-OCIDatabasemanagementExternalDbSystemConnector',
'Get-OCIDatabasemanagementExternalDbSystemConnectorsList',
'Get-OCIDatabasemanagementExternalDbSystemDiscoveriesList',
'Get-OCIDatabasemanagementExternalDbSystemDiscovery',
'Get-OCIDatabasemanagementExternalDbSystemsList',
'Get-OCIDatabasemanagementExternalExadataInfrastructure',
'Get-OCIDatabasemanagementExternalExadataInfrastructuresList',
'Get-OCIDatabasemanagementExternalExadataStorageConnector',
'Get-OCIDatabasemanagementExternalExadataStorageConnectorsList',
'Get-OCIDatabasemanagementExternalExadataStorageGrid',
'Get-OCIDatabasemanagementExternalExadataStorageServer',
'Get-OCIDatabasemanagementExternalExadataStorageServersList',
'Get-OCIDatabasemanagementExternalListener',
'Get-OCIDatabasemanagementExternalListenerServicesList',
'Get-OCIDatabasemanagementExternalListenersList',
'Get-OCIDatabasemanagementHeatWaveFleetMetric',
'Get-OCIDatabasemanagementIormPlan', 'Get-OCIDatabasemanagementJob',
'Get-OCIDatabasemanagementJobExecution',
'Get-OCIDatabasemanagementJobExecutionsList',
'Get-OCIDatabasemanagementJobRun',
'Get-OCIDatabasemanagementJobRunsList',
'Get-OCIDatabasemanagementJobsList',
'Get-OCIDatabasemanagementManagedDatabase',
'Get-OCIDatabasemanagementManagedDatabaseGroup',
'Get-OCIDatabasemanagementManagedDatabaseGroupsList',
'Get-OCIDatabasemanagementManagedDatabasesList',
'Get-OCIDatabasemanagementManagedMySqlDatabase',
'Get-OCIDatabasemanagementManagedMySqlDatabaseConfigurationDataList',
'Get-OCIDatabasemanagementManagedMySqlDatabasesList',
'Get-OCIDatabasemanagementManagedMySqlDatabaseSqlDataList',
'Get-OCIDatabasemanagementMySqlFleetMetric',
'Get-OCIDatabasemanagementNamedCredential',
'Get-OCIDatabasemanagementNamedCredentialsList',
'Get-OCIDatabasemanagementObjectPrivilegesList',
'Get-OCIDatabasemanagementOpenAlertHistory',
'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecution',
'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionScript',
'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionsList',
'Get-OCIDatabasemanagementOptimizerStatisticsCollectionAggregationsList',
'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperation',
'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperationsList',
'Get-OCIDatabasemanagementPdbMetrics',
'Get-OCIDatabasemanagementPreferredCredential',
'Get-OCIDatabasemanagementPreferredCredentialsList',
'Get-OCIDatabasemanagementProxiedForUsersList',
'Get-OCIDatabasemanagementProxyUsersList',
'Get-OCIDatabasemanagementRolesList',
'Get-OCIDatabasemanagementSqlExecutionPlan',
'Get-OCIDatabasemanagementSqlPlanBaseline',
'Get-OCIDatabasemanagementSqlPlanBaselineConfiguration',
'Get-OCIDatabasemanagementSqlPlanBaselineJobsList',
'Get-OCIDatabasemanagementSqlPlanBaselinesList',
'Get-OCIDatabasemanagementSqlTuningAdvisorTaskFindingsList',
'Get-OCIDatabasemanagementSqlTuningAdvisorTaskRecommendationsList',
'Get-OCIDatabasemanagementSqlTuningAdvisorTasksList',
'Get-OCIDatabasemanagementSqlTuningAdvisorTaskSummaryReport',
'Get-OCIDatabasemanagementSqlTuningSetsList',
'Get-OCIDatabasemanagementSystemPrivilegesList',
'Get-OCIDatabasemanagementTablespace',
'Get-OCIDatabasemanagementTablespacesList',
'Get-OCIDatabasemanagementTableStatisticsList',
'Get-OCIDatabasemanagementTopSqlCpuActivity',
'Get-OCIDatabasemanagementUser',
'Get-OCIDatabasemanagementUsersList',
'Get-OCIDatabasemanagementWorkRequest',
'Get-OCIDatabasemanagementWorkRequestErrorsList',
'Get-OCIDatabasemanagementWorkRequestLogsList',
'Get-OCIDatabasemanagementWorkRequestsList',
'Invoke-OCIDatabasemanagementCheckExternalDbSystemConnectorConnectionStatus',
'Invoke-OCIDatabasemanagementCheckExternalExadataStorageConnector',
'Invoke-OCIDatabasemanagementCloneSqlTuningTask',
'Invoke-OCIDatabasemanagementConfigureAutomaticCaptureFilters',
'Invoke-OCIDatabasemanagementConfigureAutomaticSpmEvolveAdvisorTask',
'Invoke-OCIDatabasemanagementDiscoverExternalExadataInfrastructure',
'Invoke-OCIDatabasemanagementDropSqlPlanBaselines',
'Invoke-OCIDatabasemanagementDropSqlsInSqlTuningSet',
'Invoke-OCIDatabasemanagementDropSqlTuningSet',
'Invoke-OCIDatabasemanagementDropSqlTuningTask',
'Invoke-OCIDatabasemanagementDropTablespace',
'Invoke-OCIDatabasemanagementFetchSqlTuningSet',
'Invoke-OCIDatabasemanagementImplementOptimizerStatisticsAdvisorRecommendations',
'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromAwr',
'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromCursorCache',
'Invoke-OCIDatabasemanagementLoadSqlTuningSet',
'Invoke-OCIDatabasemanagementPatchExternalDbSystemDiscovery',
'Invoke-OCIDatabasemanagementResizeDataFile',
'Invoke-OCIDatabasemanagementRunHistoricAddm',
'Invoke-OCIDatabasemanagementSaveSqlTuningSetAs',
'Invoke-OCIDatabasemanagementSummarizeAlertLogCounts',
'Invoke-OCIDatabasemanagementSummarizeAttentionLogCounts',
'Invoke-OCIDatabasemanagementSummarizeAwrDbCpuUsages',
'Invoke-OCIDatabasemanagementSummarizeAwrDbMetrics',
'Invoke-OCIDatabasemanagementSummarizeAwrDbParameterChanges',
'Invoke-OCIDatabasemanagementSummarizeAwrDbParameters',
'Invoke-OCIDatabasemanagementSummarizeAwrDbSnapshotRanges',
'Invoke-OCIDatabasemanagementSummarizeAwrDbSysstats',
'Invoke-OCIDatabasemanagementSummarizeAwrDbTopWaitEvents',
'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEventBuckets',
'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEvents',
'Invoke-OCIDatabasemanagementSummarizeExternalAsmMetrics',
'Invoke-OCIDatabasemanagementSummarizeExternalClusterMetrics',
'Invoke-OCIDatabasemanagementSummarizeExternalDbNodeMetrics',
'Invoke-OCIDatabasemanagementSummarizeExternalDbSystemAvailabilityMetrics',
'Invoke-OCIDatabasemanagementSummarizeExternalListenerMetrics',
'Invoke-OCIDatabasemanagementSummarizeJobExecutionsStatuses',
'Invoke-OCIDatabasemanagementSummarizeManagedDatabaseAvailabilityMetrics',
'Invoke-OCIDatabasemanagementSummarizeManagedMySqlDatabaseAvailabilityMetrics',
'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselines',
'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselinesByLastExecution',
'Invoke-OCIDatabasemanagementTestNamedCredential',
'Invoke-OCIDatabasemanagementTestPreferredCredential',
'Move-OCIDatabasemanagementDatabaseParameters',
'Move-OCIDatabasemanagementDbManagementPrivateEndpointCompartment',
'Move-OCIDatabasemanagementExternalDbSystemCompartment',
'Move-OCIDatabasemanagementExternalExadataInfrastructureCompartment',
'Move-OCIDatabasemanagementJobCompartment',
'Move-OCIDatabasemanagementManagedDatabaseGroupCompartment',
'Move-OCIDatabasemanagementNamedCredentialCompartment',
'Move-OCIDatabasemanagementPlanRetention',
'Move-OCIDatabasemanagementSpaceBudget',
'Move-OCIDatabasemanagementSqlPlanBaselinesAttributes',
'New-OCIDatabasemanagementAwrSnapshot',
'New-OCIDatabasemanagementDbManagementPrivateEndpoint',
'New-OCIDatabasemanagementExternalDbSystem',
'New-OCIDatabasemanagementExternalDbSystemConnector',
'New-OCIDatabasemanagementExternalDbSystemDiscovery',
'New-OCIDatabasemanagementExternalExadataInfrastructure',
'New-OCIDatabasemanagementExternalExadataStorageConnector',
'New-OCIDatabasemanagementJob',
'New-OCIDatabasemanagementManagedDatabaseGroup',
'New-OCIDatabasemanagementNamedCredential',
'New-OCIDatabasemanagementSqlTuningSet',
'New-OCIDatabasemanagementTablespace',
'Remove-OCIDatabasemanagementDataFile',
'Remove-OCIDatabasemanagementDbManagementPrivateEndpoint',
'Remove-OCIDatabasemanagementExternalDbSystem',
'Remove-OCIDatabasemanagementExternalDbSystemConnector',
'Remove-OCIDatabasemanagementExternalDbSystemDiscovery',
'Remove-OCIDatabasemanagementExternalExadataInfrastructure',
'Remove-OCIDatabasemanagementExternalExadataStorageConnector',
'Remove-OCIDatabasemanagementJob',
'Remove-OCIDatabasemanagementManagedDatabaseFromManagedDatabaseGroup',
'Remove-OCIDatabasemanagementManagedDatabaseGroup',
'Remove-OCIDatabasemanagementNamedCredential',
'Remove-OCIDatabasemanagementPreferredCredential',
'Reset-OCIDatabasemanagementDatabaseParameters',
'Start-OCIDatabasemanagementSqlTuningTask',
'Update-OCIDatabasemanagementDbManagementPrivateEndpoint',
'Update-OCIDatabasemanagementExternalAsm',
'Update-OCIDatabasemanagementExternalAsmInstance',
'Update-OCIDatabasemanagementExternalCluster',
'Update-OCIDatabasemanagementExternalClusterInstance',
'Update-OCIDatabasemanagementExternalDbHome',
'Update-OCIDatabasemanagementExternalDbNode',
'Update-OCIDatabasemanagementExternalDbSystem',
'Update-OCIDatabasemanagementExternalDbSystemConnector',
'Update-OCIDatabasemanagementExternalDbSystemDiscovery',
'Update-OCIDatabasemanagementExternalExadataInfrastructure',
'Update-OCIDatabasemanagementExternalExadataStorageConnector',
'Update-OCIDatabasemanagementExternalExadataStorageGrid',
'Update-OCIDatabasemanagementExternalExadataStorageServer',
'Update-OCIDatabasemanagementExternalListener',
'Update-OCIDatabasemanagementJob',
'Update-OCIDatabasemanagementManagedDatabase',
'Update-OCIDatabasemanagementManagedDatabaseGroup',
'Update-OCIDatabasemanagementNamedCredential',
'Update-OCIDatabasemanagementPreferredCredential',
'Update-OCIDatabasemanagementTablespace'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_34_28.ps1 | sample_34_28.ps1 | #
# Module manifest for module 'OCI.PSModules.Appmgmtcontrol'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Appmgmtcontrol.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd2facbcf-7202-47af-96ae-07771dc74773'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Appmgmtcontrol Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Appmgmtcontrol.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIAppmgmtcontrolMonitoringPlugin',
'Get-OCIAppmgmtcontrolMonitoredInstance',
'Get-OCIAppmgmtcontrolMonitoredInstancesList',
'Get-OCIAppmgmtcontrolWorkRequest',
'Get-OCIAppmgmtcontrolWorkRequestErrorsList',
'Get-OCIAppmgmtcontrolWorkRequestLogsList',
'Get-OCIAppmgmtcontrolWorkRequestsList',
'Invoke-OCIAppmgmtcontrolPublishTopProcessesMetrics'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Appmgmtcontrol'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/123.ps1 | 123.ps1 |
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-AADGroup(){
[cmdletbinding()]
param
(
$GroupName,
$id,
[switch]$Members
)
$graphApiVersion = "v1.0"
$Group_resource = "groups"
try {
if($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
elseif($GroupName -eq "" -or $GroupName -eq $null){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
else {
if(!$Members){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
elseif($Members){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'"
$Group = (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
if($Group){
$GID = $Group.id
$Group.displayName
write-host
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-iOSProvisioningProfile{
[cmdletbinding()]
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/iosLobAppProvisioningConfigurations?`$expand=assignments"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).value
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
write-host
write-host "-------------------------------------------------------------------"
Write-Host
write-host "Analysing iOS App Provisioning Profiles..." -ForegroundColor Yellow
Write-Host
write-host "-------------------------------------------------------------------"
write-host
$Profiles = (Get-iOSProvisioningProfile)
$Days = 30
$CSV = @()
$CSV += "iOSAppProvisioningProfileName,GroupAssignedName,ExpiryDate"
$GroupsOutput = @()
foreach ($Profile in $Profiles) {
$Payload = $Profile.payload
$payloadFileName = $Profile.payloadFileName
$PayloadRaw = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($Payload))
$Exp = ($PayloadRaw | C:\windows\System32\findstr.exe /i "date").trim()[3]
[datetime]$ProfileExpirationDate = $Exp.TrimStart('<date>').trimend('</date>')
$displayName = $Profile.displayName
$GroupID = ($Profile.assignments.target.groupId)
$CurrentTime = [System.DateTimeOffset]::Now
$TimeDifference = ($CurrentTime - $ProfileExpirationDate)
$TotalDays = ($TimeDifference.Days)
write-host "iOS App Provisioning Profile Name: $($displayName)"
if ($GroupID) {
foreach ($id in $GroupID) {
$GroupName = (Get-AADGroup -id $id).DisplayName
write-host "Group assigned: $($GroupName)"
$CSV += "$($displayName),$($GroupName),$($ProfileExpirationDate)"
}
}
else {
write-host "Group assigned: " -NoNewline
Write-Host "Unassigned"
$CSV += "$($displayName),,$($ProfileExpirationDate)"
}
if ($TotalDays -gt "0") {
Write-Host "iOS App Provisioning Profile Expiration Date: " -NoNewline
write-host "$($ProfileExpirationDate)" -ForegroundColor Red
}
elseif ($TotalDays -gt "-30") {
Write-Host "iOS App Provisioning Profile Expiration Date: " -NoNewline
write-host "$($ProfileExpirationDate)" -ForegroundColor Yellow
}
else {
Write-Host "iOS App Provisioning Profile: $($ProfileExpirationDate)"
}
Write-Host
write-host "-------------------------------------------------------------------"
write-host
}
if (!($Profiles.count -eq 0)) {
Write-Host "Export results? [Y]es, [N]o"
$conf = Read-Host
if ($conf -eq "Y"){
$parent = [System.IO.Path]::GetTempPath()
[string] $name = [System.Guid]::NewGuid()
New-Item -ItemType Directory -Path (Join-Path $parent $name) | Out-Null
$TempDirPath = "$parent$name"
$TempExportFilePath = "$($TempDirPath)\iOSAppProvisioningProfileExport.txt"
$CSV | Add-Content $TempExportFilePath -Force
Write-Host
Write-Host "$($TempExportFilePath)"
Write-Host
}
}
else {
write-host "No iOS App Provisioning Profiles found."
write-host
}
|
combined_dataset/train/non-malicious/sample_28_85.ps1 | sample_28_85.ps1 | #
# Module manifest for module 'OCI.PSModules.Secrets'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Secrets.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '9e5d79e8-8286-48b7-ab80-a55d8a9440d3'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Secrets Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Secrets.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCISecretsSecretBundle', 'Get-OCISecretsSecretBundleByName',
'Get-OCISecretsSecretBundleVersionsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Secrets'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3226.ps1 | 3226.ps1 |
describe 'New-PoshBotFileUpload' {
BeforeAll {
$readme = Join-Path -Path $env:BHProjectPath -ChildPath 'README.md'
}
it 'Returns a [PoshBot.File.Upload] object' {
$resp = New-PoshBotFileUpload -Path $readme
$resp.PSObject.TypeNames[0] | should be 'PoshBot.File.Upload'
}
it 'Will redirect to DM channel when told' {
$resp = New-PoshBotFileUpload -Path $readme -DM
$resp.DM | should be $true
}
it 'Has a valid [Title] field' {
$resp = New-PoshBotFileUpload -Path $readme -DM -Title 'README.md'
$resp.Title | should be 'README.md'
}
it 'Validates file exists' {
$guid = (New-Guid).ToString()
$badFile = Join-Path -Path $env:BHProjectPath -ChildPath "$($guid).txt"
{ New-PoshBotFileUpload -Path $badFile } | should throw
}
it 'Sends file content and not path' {
$resp = New-PoshBotFileUpload -Content 'foo'
$resp.Path | should be $null
}
it 'Has a valid [FileName] field when sending file content' {
$resp = New-PoshBotFileUpload -Content 'foo' -FileName 'foo.txt'
$resp.FileName | should be 'foo.txt'
}
it 'Has a valid [FileType] field when sending file content' {
$resp = New-PoshBotFileUpload -Content 'foo' -FileType 'powershell'
$resp.FileType | should be 'powershell'
}
it 'Sends file path and not content' {
$resp = New-PoshBotFileUpload -Path $readme
$resp.Content | should be $null
}
}
|
combined_dataset/train/non-malicious/O-ChristmasTree.ps1 | O-ChristmasTree.ps1 | ipmo PowerBoots
## Merry Christmas
boots {
$global:lights = @()
grid {
# A trunk
rectangle -width 20 -height 40 -fill brown -HorizontalAlignment Center -VerticalAlignment Bottom
# A perfect, triangular, tree
polygon -points { "87.5,0","0,150","175,150","87.5,0" } -margin "0,25,0,40" -fill darkgreen
# Christmas lights
1..60 | % { ellipse -width 2 -height 3 -fill red -HorizontalAlignment Center -VerticalAlignment Top -margin { $y = get-random -min 5 -max 140; $x = get-random -min 5 -max $($y * .75 + 5); if(Get-Random 1,0){ "{0},{1},0,0" -f $x,($y+30) } else { "0,{1},{0},0" -f $x,($y+30) } } -ov +global:lights }
# A Star topper
polygon -points { "15,0","25,30","0,10","30,10","5,30","15,0" } -fill white -HorizontalAlignment Center -VerticalAlignment Top -ov +global:lights
}
} -on_sourceinitialized {
# make all the lights blink!
$lights | % { $_.BeginAnimation( [System.Windows.Shapes.Shape]::OpacityProperty,
$(DoubleAnimation -From "1.0" -To $(Get-Random -Min 0.1 -Max 0.5) -Duration $("0:0:0.{0}" -f (Get-Random -Min 5 -Max 99)) -AutoReverse -RepeatBehavior ([system.windows.media.animation.RepeatBehavior]::Forever))) }
# Make the whole window draggable
} -on_mouseleftbuttondown {
$this.DragMove()
# Make the window (chromeless and) invisible except for the tree part....
} -windowstyle none -allowstransparency -background transparent -Topmost
## Happy New Year
boots {
$global:lights = @()
canvas {
# A light pole
rectangle -width 5 -height 500 -fill Gray -HorizontalAlignment Center -VerticalAlignment Bottom -"Canvas.Left" 82.5
# A Mirror ball ;)
ellipse -Width 50 -Height 50 -HorizontalAlignment Center -VerticalAlignment Top -Fill White -OV +global:lights -"Canvas.Left" 60
# Some rays of flickering light, for effect
polygon -HorizontalAlignment Center -VerticalAlignment Top -points "0,0", "75,10", "80,14",
"0,0", "-80,-10", "-75,-14",
"0,0", "60,40", "65,42",
"0,0", "-50,-30", "-57,-32",
"0,0", "75,-10", "85,-16",
"0,0", "-60,40", "-65,42" -fill LightYellow -margin "85,25,0,0" -Opacity 0.3 -OV +global:lights
} -width 170 -height 500
} -on_mouseleftbuttondown {
$this.DragMove()
} -on_sourceinitialized {
$lights | % {
$_.BeginAnimation( [System.Windows.Controls.Canvas]::TopProperty, $(DoubleAnimation -From 50 -To 550 -Duration '0:0:10') )
}
@($lights)[-1].BeginAnimation( [System.Windows.Shapes.Shape]::OpacityProperty,
$(DoubleAnimation -From "0.3" -To "0.0" -Duration "0:0:1" -AutoReverse -RepeatBehavior ([system.windows.media.animation.RepeatBehavior]::Forever)))
} -windowstyle none -allowstransparency -background transparent
|
combined_dataset/train/non-malicious/sample_2_82.ps1 | sample_2_82.ps1 | #************************************************
# DC_KIR-RBC-RegEntries.ps1
# Version 1.0
# Date: 2020
# Author: + Walter Eder (waltere@microsoft.com)
# Description: Collects KIR (for 2019) and RBC (for 2016) Registry Entries
# Called from: TS_AutoAddCommands_*.ps1
#*******************************************************
function InsertRegHeader(
[string] $RegHeader="",
[string]$OutputFile)
{
if($RegHeader -ne "")
{
$RegHeader | Out-File -FilePath $OutputFile -Append -Encoding Default
"=" * ($RegHeader.Length) | Out-File -FilePath $OutputFile -Append -Encoding Default
}
}
Import-LocalizedData -BindingVariable KirRegistryStrings
Write-DiagProgress -Activity $KirRegistryStrings.ID_KIRRegentriesActivity -Status $KirRegistryStrings.ID_KIRRegentriesStatus
$OutputFile = $ComputerName + "_reg_KIR-RBC_MyKnobs.txt"
$fileDescription = "KIR (for 2019) and RBC (for 2016) Registry Entries"
InsertRegHeader -OutputFile $OutputFile -RegHeader "KIR (for 2019) Registry Entries"
RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Policies" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false
Write-DiagProgress -Activity $KirRegistryStrings.ID_HivesRegentriesActivity -Status $KirRegistryStrings.ID_HivesRegentriesStatus
$OutputFile= $Computername + "_reg_System.HIV"
RegSave -RegistryKey "HKLM\SYSTEM" -OutputFile $OutputFile -fileDescription "Obtaining System Registry Hive"
$OutputFile= $Computername + "_reg_Software.HIV"
RegSave -RegistryKey "HKLM\Software" -OutputFile $OutputFile -fileDescription "Obtaining Software Registry Hive"
$OutputFile= $Computername + "_reg_Software_User.HIV"
RegSave -RegistryKey "HKCU\Software" -OutputFile $OutputFile -fileDescription "Obtaining Software_User Registry Hive"
Trap{WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;Continue}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABXOx0mJ2KgiQ1
# OlOqNCIJ99wsTSIA1UQCjacgGoEte6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMo0KTEPAWnT3sBsKPQToorj
# r1hUEDnvVM2k49Od8NYzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAlRSEU+qhPifhOMlQ+4JzCVr/9JbgO5AhQeaMqT8WoZL48xPBgkh5OWyw
# 5nE2yRTvQ3GQvG8ukQSZJ3IXP2PQElwKBB1Z4YQetrgWPK6zILBpltdPZVoWDGmz
# B0wGdRYp3zfzGYeuqdcjgByuwkgz5u0Jh7vsMsjMCPmmQmcPsEuovYgoD4SZYvKO
# NqcauBXS3iAXI4H5T0u7H1FgTQW/9UUKZOSAFkfWhFSdJ7u7EPgTJJECk968zWDQ
# FDlH6iuFWmt+0v7mgsg+HV1g9ccRySpxHbE4c4lpTdGXnD81kqAkOda9/SVaRiDe
# bfK/Y8LmjyfqJ5EuIT/EASw/CsE/qaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCqRiMK2AWyzlh4oiCNzRZwJjlE7zZkXCrtbi2iFOgm/gIGZxp1kNxK
# GBMyMDI0MTAyODExNDA0My41MDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1
# NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP
# AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU
# 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt
# n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp
# un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q
# lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld
# HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBnrpeRQ8JnLJkGLNf9pgh20nOdC4PWmXRfB0x06LAvJTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo
# rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn
# cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAe6HI4RC6Dq+xciKWK9ef2gyI
# LQZ/+hawNafVQJ1MTWXMnlHDCgkvM136aOB9bxok8T3Fvr6KSAZbErnDDR+8GzyA
# E2LTNV5XL24yjJP1skFpYgiloF5Ld2hgTfp1LCyvdL0oQk9xStxzPth/TaHd/KZb
# nISwd5BDqFUHDvECMth7kOnQ1XlDlB0qLs0HI5EoqfUTqTGXwjJ7X1C6Igh0yWmx
# xmvriKdHoPZdtdZjBswFCwZUWqeRbwiYo/cCNBxb8jbEAfsCpWeQAMjvkp7BoNhl
# VjFYUX1KFggTRXTgWJPthh0U60rrtpZoLGmUu4d9Hmu067PteWEGpNoaQ4KzbrPo
# L9lsaZ2ALEGD+7Ree97BWOVkvg0/t85auqMowDC64MDEfblNTJc3BsLpn/Vc7Ox4
# b1YKlwWT/vTlwgdsZnX0/psvWDcxgfetpcKBOnXI51jePaJxsCTLhEgpuCOTVapl
# FGJ4N1ekTwz0V+YOsNALJm9OHMSsBOy3n3bWT0DAK1J/RWZGXnYn57JaDoP5/wjc
# oEmhCcGy6Xxp5os4P/oJYMMeuVYfHtS+35JNt9zjqnxbiBwrhNY6Ax1O2I0xsEwf
# 1llGq37bfQ7BMxn9nuHtJ/s3UI5LaIzJ4JamDN55ogSTySY2DE5Wn7s2x0K2Anqv
# LtNTu1jf/fq7O9/OiqU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_14_91.ps1 | sample_14_91.ps1 | @{
GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59"
Author = "PowerShell"
CompanyName = "Microsoft Corporation"
Copyright = "Copyright (c) Microsoft Corporation."
ModuleVersion = "7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion = "3.0"
CmdletsToExport = @(
'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml',
'Import-Clixml', 'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv',
'Import-Csv', 'Get-Culture', 'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger',
'Register-EngineEvent', 'Write-Error', 'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event',
'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression', 'Out-File', 'Get-FileHash', 'Export-FormatData',
'Get-FormatData', 'Update-FormatData', 'New-Guid', 'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host',
'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json', 'ConvertTo-Json', 'Test-Json', 'Format-List',
'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown', 'Show-Markdown', 'Get-MarkdownOption',
'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object', 'Measure-Object',
'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output',
'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint',
'Get-PSBreakpoint', 'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession',
'Import-PSSession', 'Get-Random', 'Get-SecureRandom', 'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace',
'Disable-RunspaceDebug', 'Enable-RunspaceDebug', 'Get-RunspaceDebug', 'Start-Sleep', 'Join-String',
'Out-String', 'Select-String', 'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan',
'Get-TraceSource', 'Set-TraceSource', 'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData',
'Get-UICulture', 'Get-Unique', 'Get-Uptime', 'Clear-Variable', 'Get-Variable', 'New-Variable',
'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose', 'Write-Warning', 'Invoke-WebRequest',
'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List', 'Unblock-File'
)
FunctionsToExport = @()
AliasesToExport = @('fhx')
NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll")
HelpInfoURI = 'https://aka.ms/powershell73-help'
}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABNCVSZz1rOWiT
# w+vGPnwDRC41vPJncfHs3HcOOx4I46CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICvgCI9lBrSM9eTXBET5P5Nb
# 19+nZnyUuwlDL40vJitfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAhkpmvCpfqrLQmTBAg0wNn+Z7EVd9AGf8B9TCHT2SuAxMod2M3Ne2220B
# vF1AsmB7o59jCuACXIWZOMRynSYsWavG70MZ774vqtC6dldr7vmFmLcrThrAMYio
# r0BigFjVaKeWB4Lkx/AckpQooLbpAPDaNiN/KgAf+P1SLo/hCc5zPhZ/I7isyYWt
# 0gerkBRwaoYXnDEh6oKYKiZHwDwNLBDvXQLluUyfzEJd11Bxp3mZfttSAZlR2gvr
# Y16bh9+gXsZ4eA842lLG9MRNMtbqjifRZWI3DMkDvIkq/iE2cV6QhbtWX4S4QCLh
# 5b46Pp4YdR4d5KklJg5oL7cB8hW0eaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCYToNKTJu8Ivkbs/qku/OIdkjG9TFf8byJO8M8nrAJOwIGZusouX/J
# GBMyMDI0MTAxNjE1MjgzOC43OTFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C
# u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx
# /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV
# V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR
# 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp
# gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo
# j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4
# yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm
# TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi
# wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd
# 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s
# huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q
# lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG
# l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc
# 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A
# /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl
# SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4
# gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG
# 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt
# oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc
# 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn
# ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq
# Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/
# R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOq55qwwIhgPMjAyNDEwMTYwNzE1NTZaGA8yMDI0MTAxNzA3MTU1NlowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6rnmrAIBADAHAgEAAgIKRTAHAgEAAgIT6TAK
# AgUA6rs4LAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAp8cFV7atLwiq2
# dnPkg83Uqj7oYynJrPQScmqDOG3IGIBWqIqY7tU7TL/1Q8VpPeVk9xSSnYov6DsT
# En99jdRv24frwDsGkIdNn58R/uSoCouzaDjQ8QV2UUPlVinUiy/if6OzTlPRSX59
# V3kpBjOPy3Dh5jpONx+ilV07p9lrKo1Ql46TjTyuYYUqjUy+MQX0NYSL8glZsRIc
# vGDESlaDFVea3CGG5rtJqpvK79mBO8MOwfEq4n+NWDCH/HUy3LDE+QCigJbwcpXl
# gQEdEVL5/A74/mgRwipKVeKyAbEcLuyBCotYBqDPGD/dahYiRl5etaFAvnbeUOs3
# 6XRLGPdTMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgD3AqABECOdAx
# CDJJ0U6Vje0IKMNagDMa3O4wn9fQzBYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4
# MCIEIErcVc0RIxshTUI6qZ4IuOVVC6ePnWh7CJsP1w8IrGn7MA0GCSqGSIb3DQEB
# CwUABIICAFyMS2k1W0qGMdQv01vHWJ9/NDwInpatiW0Cza91ircj0EaSi56BIkyJ
# rBxwoCcJbqcDhLUEdfQtkfyvsfoe3I1/diyD1tH+S/lDncTNNKiGkM3EMCeqXGLY
# I4hySR92MWo61Fz1QGiPkf/+p0CBAMpigQqFYeBy3caWSaykh5T6jirMlITAGBZX
# I6FjoqPnpI6DOpNl0OSRZkYwX28ue5hhKMeT03LEFxedWAMtv5Z+w4XATcbZKgRA
# AHlT4VvVwal3df6Oc3GlrYcY/XzqP2XOAqQ6NxV1RojNnOm1B57XvYdoysB+iUq1
# 61dn6vhEcwCMR+EeuMlQ9oLltsEe/N1GAlSy7oMKtxcKD1el/bD+k6wWPoBCRbul
# VAnJCbIOpddjqV79egOKYPlpUunhFsKaRlP6Eb1W6ANYpgn/e4eymUr5amEdDgry
# ZBigYDsE2Nlzsn4HFha39LUNz6Rwan4xIuDq7zdUPcMgVTNTowVVrA6MUxxGorY4
# HmwODSauCQoiDZt6VzOeY3z9qmQwhVL8t26hTf4l7e7onYPGFGRIMrpnKWi8ZyW3
# YcGCE2J+gVcNuQuU4XPb9uU2WzHnpo3SucasKN3DkDZTF1/t+fxdWCDB2ZpuWUPz
# jzymRm+7I71mVX2OARLlwmHST7hOtZVxpuEtcyd9BLz9oUxFot6H
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_45_91.ps1 | sample_45_91.ps1 | #
# Module manifest for module 'OCI.PSModules.Functions'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Functions.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Functions Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList',
'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList',
'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList',
'Get-OCIFunctionsPbfListingVersion',
'Get-OCIFunctionsPbfListingVersionsList',
'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction',
'Move-OCIFunctionsApplicationCompartment',
'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction',
'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction',
'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_53_4.ps1 | sample_53_4.ps1 |
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Creates or updates the entity query.
.Description
Creates or updates the entity query.
.Link
https://learn.microsoft.com/powershell/module/az.securityinsights/new-azsentinelentityquery
#>
function New-AzSentinelEntityQuery {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Models.Api20210901Preview.CustomEntityQuery])]
[CmdletBinding(DefaultParameterSetName = 'Activity', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')]
param(
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')]
[System.String]
# Gets subscription credentials which uniquely identify Microsoft Azure subscription.
# The subscription ID forms part of the URI for every service call.
${SubscriptionId},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Path')]
[System.String]
# The Resource Group Name.
${ResourceGroupName},
[Parameter(Mandatory)]
#[Alias('DataConnectionName')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Path')]
[System.String]
# The name of the workspace.
${WorkspaceName},
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Runtime.DefaultInfo(Script = '(New-Guid).Guid')]
[System.String]
# The Id of the Entity Query.
${Id},
[Parameter(Mandatory)]
[ArgumentCompleter( { param ( $CommandName, $EntityQueryName, $WordToComplete, $CommandAst, $FakeBoundParameters ) return @('Activity') })]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Support.EntityQueryKind]
# Kind of the the Entity Query
${Kind},
[Parameter(ParameterSetName = 'Activity', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[System.String]
${Title},
[Parameter(ParameterSetName = 'Activity', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[System.String]
${Content},
[Parameter(ParameterSetName = 'Activity', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[System.String]
${Description},
[Parameter(ParameterSetName = 'Activity', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[System.String]
${QueryDefinitionQuery},
[Parameter(ParameterSetName = 'Activity', Mandatory)]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Support.EntityType])]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Support.EntityType]
${InputEntityType},
[Parameter(ParameterSetName = 'Activity')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[String[]]
${RequiredInputFieldsSet},
[Parameter(ParameterSetName = 'Activity')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Models.Api20210901Preview.ActivityEntityQueriesPropertiesEntitiesFilter]
${EntitiesFilter},
[Parameter(ParameterSetName = 'Activity')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Body')]
[System.String]
${TemplateName},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
try {
if ($PSBoundParameters['Kind'] -eq 'Activity'){
$EntityQuery = [Microsoft.Azure.PowerShell.Cmdlets.SecurityInsights.Models.Api20210901Preview.ActivityCustomEntityQuery]::new()
$EntityQuery.Title = $PSBoundParameters['Title']
$null = $PSBoundParameters.Remove('Title')
$EntityQuery.Content = $PSBoundParameters['Content']
$null = $PSBoundParameters.Remove('Content')
$EntityQuery.Description = $PSBoundParameters['Description']
$null = $PSBoundParameters.Remove('Description')
$EntityQuery.QueryDefinitionQuery = $PSBoundParameters['QueryDefinitionQuery']
$null = $PSBoundParameters.Remove('QueryDefinitionQuery')
$EntityQuery.InputEntityType = $PSBoundParameters['InputEntityType']
$null = $PSBoundParameters.Remove('InputEntityType')
If($PSBoundParameters['RequiredInputFieldsSet']){
$EntityQuery.RequiredInputFieldsSet = $PSBoundParameters['RequiredInputFieldsSet']
$null = $PSBoundParameters.Remove('RequiredInputFieldsSet')
}
If($PSBoundParameters['EntitiesFilter']){
$EntityQuery.EntitiesFilter = $PSBoundParameters['EntitiesFilter']
$null = $PSBoundParameters.Remove('EntitiesFilter')
}
If($PSBoundParameters['TemplateName']){
$EntityQuery.TemplateName = $PSBoundParameters['TemplateName']
$null = $PSBoundParameters.Remove('TemplateName')
}
}
else {
Write-Error "This cmdlet only works with Entity Queries of the Activity kind."
break
}
#$EntityQuery.Kind = $PSBoundParameters['Kind']
$null = $PSBoundParameters.Remove('Kind')
$null = $PSBoundParameters.Add('EntityQuery', $EntityQuery)
Az.SecurityInsights.internal\New-AzSentinelEntityQuery @PSBoundParameters
}
catch {
throw
}
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAZsWMtmKE0UzZh
# oWU84ZLqUhfRMc1J9Z8oeG9fC31NGaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJTZz04OGLoc3EXWxj9ut8yO
# pNsY3zP4xWbM81qjSPyiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEATDsn1DWren4ZcWVjofdeliaIe6Alkct9MaglVFkNen91VF5RvU44lnPS
# VuFb3vlkkaPr0395zbn7j5bM3+h79A06zuMMOIfsS85/DftPQip/co/te7S05v6T
# 7/smE/MFaAv9ARxFtwX3IHGFQmTfT7E1vbYPkDM9Z7ISdJyym7OGz1G1Ww2wD8yS
# pIRe1MyGXM8TqTqgHngFWTNOlXvRV585WrLG49O53WNXPcJ+4/DijxrMbNXvjxmA
# nUg/ikDB6NRI3XtvVaWTYRi7tVbevX7+LaPGOA+04eFeu65uV7ZCxNN8dozcELD9
# njUzKkvqazDp8udPXTdBNoG/YOPLK6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCPmPw89/zf8YHT0do4n4kvg0k3pIAiV252VDfsyl0G3QIGZhfWS4aI
# GBMyMDI0MDQyMzEzMTUxMS41ODVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/
# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060
# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq
# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0
# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8
# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79
# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE
# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S
# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+
# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul
# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC
# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn
# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6
# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn
# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi
# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb
# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe
# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B
# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv
# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9
# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz
# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIknDAiGA8yMDI0MDQyMzEyMTQy
# MFoYDzIwMjQwNDI0MTIxNDIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0iSc
# AgEAMAoCAQACAgyFAgH/MAcCAQACAhNGMAoCBQDp03YcAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAAtBkyUdrM1hwbTBWCK48MGmKRxZss6LPFkY42ZOWnXs
# VX6ZpU1Gl/LHGQnpRZk6/hinddMaf7iclXFbDMTro7W58hCrRegPfWwTzs8g1aOM
# YXNAwJW30fwOsS6mecLg5zfkvBReOfq509wnpa0Ndwg6EQMGwD/BAq7tdePiGcew
# KasjknLTpYY7fgoW2Ncb0sgNMRHJId/wLrHwD90VtvkCEnw9OPR+IbvMfWkyCTqp
# PJ3Y0U/m/Oeqqoo9GDlFnX17f/az0HZjr4SZ9LXRqz8Qa4zlmb79kpVqf6nLoXJr
# 9P9oeI7iFIEHkb+mYdtENFDUMyhhduOhsqZHXwrf3QQxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB
# 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCA5+u/DOxnGTVW3ttkFhc6h+NkI0bx/qM540xNGBeql
# MzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE
# X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgUj1W10UOl24tqW0PGjrhbdiG
# 0wEdX5mXIsSe+QniYO0wDQYJKoZIhvcNAQELBQAEggIAiYzQpvqWnfsXx/aMHE4s
# oHWVf2VkfOjq3T8uvG7IOtbr9e80D5j3ShFNwzARpAKxukRu33zsGlq6i327lNLQ
# P2Gud/38TFZLyWba0W3F9wk0KerK80pakSkQ/sgNAv1ehWMqJmQmrg/mh25Em+NR
# IB9m/x1FVuZjY5UTEWqIjYrHhLr3ZE608K+kz41BWh0TRsMFz4a9sdfTNWU4++kU
# Duf8fxHsvnbqFGoyrJrQCqcEoGxc5EzCeb6iFGir0tYBlgzO0xvNk7tYjzht5rKL
# GnVOCp5sz6P7WCSDLECJUN5c4rU+GNi4wzjkK27pDPpoTVmmGJbL/v+tWo7739RB
# JJVmaPveFobEZN4RGW0sM5mYR/GO2dYcFW3HCxyieVs6l5oSiIearhmU5QnMRHBs
# 2p18ejkDtBRwRi+GUz0HhxwUDJfKky4lsqvQRcEbkNCv1vfyBaGkh8adlxZgl7kc
# jwRCGipsw8pMYIaAEjihn+/BtsBwptGEc/rS0J9EYUyTam85LKUGGDcmwxRqcchO
# YgX8BE1hav2ATTr3uNPeT68JBSrgZqE6JmCKPlbNfpKZNAQ7xvdMBDOtPQ268G/V
# t83FWipfuYXfLihXKGnpKIXe6/40kx0hShwX071YTtiqRHCv8jDAC/g1ivNfiKcC
# m3UPfCKK0r0dkWKFykYxUzU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_9_53.ps1 | sample_9_53.ps1 |
#************************************************
# DC_EnvVars.ps1
# Version 2.0
# Date: 10-09-2012
# Author: clandis, andret
# Description: Collects environment variables (output of SET command)
#************************************************
Import-LocalizedData -BindingVariable EnvVarsStrings
Write-DiagProgress -Activity $EnvVarsStrings.ID_EnvVarsOutput -Status $EnvVarsStrings.ID_EnvVarsObtaining
$OutputFile = $ComputerName + "_EnvironmentVariables.txt"
get-childitem env: | Format-Table -wrap | out-file $OutputFile
$fileDescription = "Environment Variables"
$sectionDescription = "Environment Variables"
CollectFiles -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
Trap{WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;Continue}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMXkftB73PgRjp
# 2b6MyaY14xoAte6TYqqIZUY7Me3o96CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIrt
# d3dGLEdOOgWXrWBoZ+9qfb91D++fMyGJZXgejTgLMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAhJ2me+j3xCOyBEQpdOV8618mK7+WSsQHVQf0
# s2/pXF5CcjTBdVCw2GuqTQv1f510VF0+gdZ7W6Kojkoyc2+XrL3flx6ZrXibNzQi
# lNaam9TytIue2hIUSV8afIli0nwPPN6JpS+touyvdO+ize7bU6+DsxuSn6h19u8r
# 9wlrD0fbKFR8EORVQZsIR7hNj4GqU0Roodgs7I+D5NOa0dKZqgfshi6X8RokSIyd
# +ve9EDBOlIkk7eQyea/pMZqEDtKn5Ugiaji4UTVuEaRfnvljt9mNO1JgdqITvJlD
# CK3ZPVMDle7QZ0ArcRIWdA51fxGeFh4fTvj3ziKryuwC1QRj6aGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDqmUgsbDN1lm3Qwtk1W+iCouDU5W/79wOr
# XIMiz+ABvgIGZutZ6YJkGBMyMDI0MTAyODExNDA0My44ODlaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX
# qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF
# IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN
# XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6
# cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN
# h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69
# l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC
# qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt
# xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V
# 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH
# 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+
# nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL
# ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i
# O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q
# +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF
# RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d
# 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di
# rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+
# yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M
# k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb
# YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l
# T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip
# L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0
# MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA
# AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr
# /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3
# qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3
# 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk
# wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP
# 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQg6cvT0FLO+yDdSyCDy+qHvqeSVBJMmIMYXpoKN4gRmdkwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI
# k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad
# RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAIUrqOXhpGRXvWPatqQ41EDPBBJhAkfb
# bH5/rgI3dfjg4X42lpPIHH6UZB0fZVSrE8DfksntBJkbvXu+xfUZOVmjC20kB/o/
# 2+Cs2cZBY2POESH5d8Kosopb0dx+HhZHmhUWSi2sDSLiEZ82D5rFe9g0wj6XyEVc
# QDK2ukszwUEp9JNjODQRqSRW0ApKngCg7OrzPinVckscck0YbNhwN+9rGeIPpG9g
# VZbZZrnzHyE/Lq5MwnpVXJ+qcq8t5Dx20NdXqC0AF7QrG+R14Ton3ylfA/qTFs9N
# x63xa1XG8IRMUBzlwDhh0t2I5Hc/B5T6hk3xEXgx4JZ06igqikjwN/HQbMceeniO
# 7fWL47k4QxJuRJ+9K/meo4ZTkgd9yrt2mbsSuv+SxntjwXUbF6g2klnjeEVjIxfu
# InMw75qqh/iXdq6u921esmx7Iq5kJF9Np3QOksYlInkWoKPAmeGvOrofUGZ6s9c1
# YW4EPvFI0s60xH9wYIfnC+Daf1hhL/qWFdQJxEhQraSsDGxRJN6kUv3f3jIVUp04
# RF90AZVsooGLK13JTYJz3MAVLm4oiJPitHrO7UWFbq09QdlvEbOg5Y1BpmuuHkR3
# e6KzV5fqn17W9aE9X+qKf+B+OBf0VslhBfBS9BbZ0Y/zUd97jR6Grpl7Org2UIFU
# 5PqDMhjIIBXy
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_44_8.ps1 | sample_44_8.ps1 | <#
.SYNOPSIS
Install and run the 'Microsoft.DotNet.VersionTools.Cli' tool with the 'trim-artifacts-version' command to trim the version from the NuGet assets file name.
.PARAMETER InputPath
Full path to directory where artifact packages are stored
.PARAMETER Recursive
Search for NuGet packages recursively
#>
Param(
[string] $InputPath,
[bool] $Recursive = $true
)
$CliToolName = "Microsoft.DotNet.VersionTools.Cli"
function Install-VersionTools-Cli {
param(
[Parameter(Mandatory=$true)][string]$Version
)
Write-Host "Installing the package '$CliToolName' with a version of '$version' ..."
$feed = "https://pkgs.dev.azure.com/dnceng/public/_packaging/dotnet-eng/nuget/v3/index.json"
$argumentList = @("tool", "install", "--local", "$CliToolName", "--add-source $feed", "--no-cache", "--version $Version", "--create-manifest-if-needed")
Start-Process "$dotnet" -Verbose -ArgumentList $argumentList -NoNewWindow -Wait
}
# -------------------------------------------------------------------
if (!(Test-Path $InputPath)) {
Write-Host "Input Path '$InputPath' does not exist"
ExitWithExitCode 1
}
$ErrorActionPreference = 'Stop'
Set-StrictMode -Version 2.0
$disableConfigureToolsetImport = $true
$global:LASTEXITCODE = 0
# `tools.ps1` checks $ci to perform some actions. Since the SDL
# scripts don't necessarily execute in the same agent that run the
# build.ps1/sh script this variable isn't automatically set.
$ci = $true
. $PSScriptRoot\..\tools.ps1
try {
$dotnetRoot = InitializeDotNetCli -install:$true
$dotnet = "$dotnetRoot\dotnet.exe"
$toolsetVersion = Read-ArcadeSdkVersion
Install-VersionTools-Cli -Version $toolsetVersion
$cliToolFound = (& "$dotnet" tool list --local | Where-Object {$_.Split(' ')[0] -eq $CliToolName})
if ($null -eq $cliToolFound) {
Write-PipelineTelemetryError -Force -Category 'Sdl' -Message "The '$CliToolName' tool is not installed."
ExitWithExitCode 1
}
Exec-BlockVerbosely {
& "$dotnet" $CliToolName trim-assets-version `
--assets-path $InputPath `
--recursive $Recursive
Exit-IfNZEC "Sdl"
}
}
catch {
Write-Host $_
Write-PipelineTelemetryError -Force -Category 'Sdl' -Message $_
ExitWithExitCode 1
}
|
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail_7.ps1 | Send-HTMLFormattedEmail_7.ps1 | ##################################################
# cmdlets
##################################################
#-------------------------------------------------
# Send-HTMLFormattedEmail
#-------------------------------------------------
# Usage: Send-HTMLFormattedEmail -?
#-------------------------------------------------
function Send-HTMLFormattedEmail {
<#
.Synopsis
Used to send an HTML Formatted Email.
.Description
Used to send an HTML Formatted Email that is based on an XSLT template.
.Parameter To
Email address or addresses for whom the message is being sent to.
Addresses should be seperated using ;.
.Parameter ToDisName
Display name for whom the message is being sent to.
.Parameter CC
Email address if you want CC a recipient.
Addresses should be seperated using ;.
.Parameter BCC
Email address if you want BCC a recipient.
Addresses should be seperated using ;.
.Parameter From
Email address for whom the message comes from.
.Parameter FromDisName
Display name for whom the message comes from.
.Parameter Subject
The subject of the email address.
.Parameter Content
The content of the message (to be inserted into the XSL Template).
.Parameter Relay
FQDN or IP of the SMTP relay to send the message to.
.XSLPath
The full path to the XSL template that is to be used.
#>
param(
[Parameter(Mandatory=$True)][String]$To,
[Parameter(Mandatory=$True)][String]$ToDisName,
[String]$CC,
[String]$BCC,
[Parameter(Mandatory=$True)][String]$From,
[Parameter(Mandatory=$True)][String]$FromDisName,
[Parameter(Mandatory=$True)][String]$Subject,
[Parameter(Mandatory=$True)][String]$Content,
[Parameter(Mandatory=$True)][String]$Relay,
[Parameter(Mandatory=$True)][String]$XSLPath
)
try {
# Load XSL Argument List
$XSLArg = New-Object System.Xml.Xsl.XsltArgumentList
$XSLArg.Clear()
$XSLArg.AddParam("To", $Null, $ToDisName)
$XSLArg.AddParam("Content", $Null, $Content)
# Load Documents
$BaseXMLDoc = New-Object System.Xml.XmlDocument
$BaseXMLDoc.LoadXml("<root/>")
$XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform
$XSLTrans.Load($XSLPath)
#Perform XSL Transform
$FinalXMLDoc = New-Object System.Xml.XmlDocument
$MemStream = New-Object System.IO.MemoryStream
$XMLWriter = [System.Xml.XmlWriter]::Create($MemStream)
$XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter)
$XMLWriter.Flush()
$MemStream.Position = 0
# Load the results
$FinalXMLDoc.Load($MemStream)
$Body = $FinalXMLDoc.Get_OuterXML()
# Create Message Object
$Message = New-Object System.Net.Mail.MailMessage
# Now Populate the Message Object.
$Message.Subject = $Subject
$Message.Body = $Body
$Message.IsBodyHTML = $True
# Add From
$MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName
$Message.From = $MessFrom
# Add To
$To = $To.Split(";") # Make an array of addresses.
$To | foreach {$Message.To.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object.
# Add CC
if ($CC){
$CC = $CC.Split(";") # Make an array of addresses.
$CC | foreach {$Message.CC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object.
}
# Add BCC
if ($BCC){
$BCC = $BCC.Split(";") # Make an array of addresses.
$BCC | foreach {$Message.BCC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object.
}
# Create SMTP Client
$Client = New-Object System.Net.Mail.SmtpClient $Relay
# Send The Message
$Client.Send($Message)
}
catch {
throw $_
}
}
##################################################
# Main
##################################################
Export-ModuleMember Send-HTMLFormattedEmail
### XSLT Template Example
<?xml version="1.0"?>
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
<xsl:output media-type="xml" omit-xml-declaration="yes" />
<xsl:param name="To"/>
<xsl:param name="Content"/>
<xsl:template match="/">
<html>
<head>
<title>My First Formatted Email</title>
</head>
<body>
<div width="400px">
<p>Dear <xsl:value-of select="$To" />,</p>
<p></p>
<p><xsl:value-of select="$Content" /></p>
<p></p>
<p><strong>Please do not respond to this email!</strong><br />
An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p>
<p></p>
<Address>
Many thanks from your:<br />
Really Cool IT Team<br />
</Address>
</div>
</body>
</html>
</xsl:template>
</xsl:stylesheet>
|
combined_dataset/train/non-malicious/3491.ps1 | 3491.ps1 |
function Test-GetBlueprintAssignment
{
$assignments = Get-AzBlueprintAssignment
Assert-True { $assignments.Count -ge 1 }
Assert-NotNull $assignments[0].Name
Assert-NotNull $assignments[0].Id
Assert-NotNull $assignments[0].BlueprintId
Assert-NotNull $assignments[0].Scope
Assert-NotNull $assignments[0].Location
}
function Test-NewBlueprintAssignment
{
$mgId = "AzBlueprintAssignTest"
$blueprintName = "Filiz-Ps-Test1"
$subscriptionId = "28cbf98f-381d-4425-9ac4-cf342dab9753"
$assignmentName = "PS-ScenarioTest-NewAssignment"
$location = "East US"
$params = @{audituseofclassicvirtualmachines_effect='Audit'}
$rg1 = @{name='bp-testrg';location='eastus'}
$rgs = @{ResourceGroup=$rg1}
$identity = "/subscriptions/996a2f3f-ee01-4ffd-9765-d2c3fc98f30a/resourceGroups/user-assigned-test/providers/Microsoft.ManagedIdentity/userAssignedIdentities/owner-identity"
$blueprint = Get-AzBlueprint -ManagementGroupId $mgId -Name $blueprintName -LatestPublished
Assert-NotNull $blueprint
$assignment = New-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location -Parameter $params -ResourceGroup $rgs -UserAssignedIdentity $identity
$expectedProvisioningState = "Creating"
Assert-NotNull $assignment
Assert-AreEqual $assignment.ProvisioningState $expectedProvisioningState
}
function Test-NewBlueprintAssignmentWithSystemAssignedIdentity
{
$subscriptionId = "0b1f6471-1bf0-4dda-aec3-cb9272f09590"
$assignmentName = "PS-ScenarioTest-NewSystemAssignedIdentityAssignment"
$location = "West US"
$blueprintName = "PS-SimpleBlueprintDefinition"
$deployment = New-AzDeployment -Name $blueprintName -Location $location -TemplateFile SubscriptionLevelSimpleBlueprint.json
Assert-AreEqual Succeeded $deployment.ProvisioningState
$blueprint = Get-AzBlueprint -SubscriptionId $subscriptionId -Name $blueprintName -LatestPublished
Assert-NotNull $blueprint
$assignment = New-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location
Assert-NotNull $assignment
}
function Test-SetBlueprintAssignment
{
$mgId = "AzBlueprintAssignTest"
$blueprintName = "Filiz-Ps-Test1"
$subscriptionId = "28cbf98f-381d-4425-9ac4-cf342dab9753"
$assignmentName = "PS-ScenarioTest-SetAssignment"
$location = "East US"
$params = @{audituseofclassicvirtualmachines_effect='Audit'}
$rg1 = @{name='bp-testrg';location='eastus'}
$rgs = @{ResourceGroup=$rg1}
$identity = "/subscriptions/996a2f3f-ee01-4ffd-9765-d2c3fc98f30a/resourceGroups/user-assigned-test/providers/Microsoft.ManagedIdentity/userAssignedIdentities/owner-identity"
$blueprint = Get-AzBlueprint -ManagementGroupId $mgId -Name $blueprintName -LatestPublished
Assert-NotNull $blueprint
$assignment = New-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location -Parameter $params -ResourceGroup $rgs -UserAssignedIdentity $identity
$expectedProvisioningState = "Creating"
Assert-NotNull $assignment
Assert-AreEqual $assignment.ProvisioningState $expectedProvisioningState
$assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName
$assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName
while($assigned.ProvisioningState -eq "Creating" -or $assigned.ProvisioningState -eq "Deploying" -or $assigned.ProvisioningState -eq "Waiting")
{
Wait-Seconds 10
$assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName
}
$newTestRg = "bp-testrg-new"
$rg1 = @{name= $newTestRg;location='eastus'}
$rgs = @{ResourceGroup=$rg1}
$assignment = Set-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location -Parameter $params -ResourceGroup $rgs -UserAssignedIdentity $identity
$expectedProvisioningState = "Creating"
Assert-NotNull $assignment
Assert-AreEqual $assignment.ProvisioningState $expectedProvisioningState
}
function Test-RemoveBlueprintAssignment
{
$mgId = "AzBlueprintAssignTest"
$blueprintName = "Filiz-Ps-Test1"
$subscriptionId = "28cbf98f-381d-4425-9ac4-cf342dab9753"
$assignmentName = "PS-ScenarioTest-RemoveAssignment"
$location = "East US"
$params = @{audituseofclassicvirtualmachines_effect='Audit'}
$rg1 = @{name='bp-testrg';location='eastus'}
$rgs = @{ResourceGroup=$rg1}
$identity = "/subscriptions/996a2f3f-ee01-4ffd-9765-d2c3fc98f30a/resourceGroups/user-assigned-test/providers/Microsoft.ManagedIdentity/userAssignedIdentities/owner-identity"
$blueprint = Get-AzBlueprint -ManagementGroupId $mgId -Name $blueprintName -LatestPublished
Assert-NotNull $blueprint
$assignment = New-AzBlueprintAssignment -Name $assignmentName -Blueprint $blueprint -SubscriptionId $subscriptionId -Location $location -Parameter $params -ResourceGroup $rgs -UserAssignedIdentity $identity
$expectedProvisioningState = "Creating"
Assert-NotNull $assignment
Assert-AreEqual $assignment.ProvisioningState $expectedProvisioningState
$assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName
while($assigned.ProvisioningState -eq "Creating" -or $assigned.ProvisioningState -eq "Deploying" -or $assigned.ProvisioningState -eq "Waiting")
{
Wait-Seconds 10
$assigned = Get-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignmentName
}
$removed = Remove-AzBlueprintAssignment -SubscriptionId $subscriptionId -Name $assignment.Name -PassThru
$expectedProvisioningState = "Deleting"
Assert-NotNull $removed
Assert-AreEqual $removed.Name $assignment.Name
Assert-AreEqual $removed.ProvisioningState $expectedProvisioningState
}
|
combined_dataset/train/non-malicious/Start-ComputerJobs_1.ps1 | Start-ComputerJobs_1.ps1 | #requires -version 2.0
function Start-ComputerJobs{
<#
.NOTES
Name: Start-ComputerJobs
Author: Tome Tanasovski
Created: 6/25/2010
Modified: 6/25/2010
Version: 1.1
Website: http://powertoe.wordpress.com
.SYNOPSIS
Multithreads a scriptblock with jobs
.DESCRIPTION
The Start-ComputerJobs cmdlet runs a specified scriptblock within a maximum number of simultaneously spawned Powershell jobs.
You must pass a list of ComputerNames to it. The names passed to the cmdlet will replace $computername within the scriptblock prior to starting each thread.
This can be thought of as a multithreaded approach to a foreach loop.
.PARAMETER ComputerName
Specifies a list of computers that you wish to inject into your scriptblock. The list of computer names will replace $computername in the script block. This does not actually need to be a list of computer names. It can be anything you wish to inject into your scriptblock.
.PARAMETER ScriptBlock
Specifies the commands to run in the background jobs. Enclose the commands in braces ({}) or use $ExecutionContext.InvokeCommand.NewScriptBlock to create a scriptblock.
The scriptblock must contain a $computername variable. $computername will be replaced by each entry into the pipeline or from the parameter ComputerName.
.PARAMETER Threads
Specifies the maximum number of jobs that can be simultaneously running at any given time.
This defaults to 10 if nothing is specified.
.EXAMPLE
"computer1","computer2","computer3","computer4","computer5" |Start-ComputerJobs -ScriptBlock {dir \\\\$computername\\c$}
.INPUTS
System.String
.OUTPUTS
PSObject
Returns the results of the commands in the job. It is the data returned from receive-job. If you're scriptblock contains write-host it will write that to the console as it is running. To avoid this you should just return objects within your scriptblock. i.e. Instead of write-host "text" just use "text"
#>
param(
[Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[string[]]$ComputerName,
[Parameter(Mandatory=$true)]
[ScriptBlock]$ScriptBlock,
[Parameter(Mandatory=$false)]
[ValidateScript({$_ -gt 0})]
[int32]$Threads = 10,
[Parameter(Mandatory=$false)]
[ValidateScript({$_ -gt 0})]
[int32]$Sleep = 5
)
BEGIN {
$firstrun = $true
$computers = @()
$curthreads = 0
$jobs = @()
$valid = $false
}
PROCESS {
if ($firstrun) {
$firstrun = $false
# Validate scriptblock - Making sure it has a $computername variable to use
if ($ScriptBlock -match '\\$computername') {
$valid = $true
} else {
Write-Error 'You must specify a scriptblock that contains a variable called $computername'
$valid = $false
}
}
if ($valid) {
foreach ($computer in $computername) {
while ($jobs.count -eq $Threads) {
$newjobs = @()
$jobs |foreach {
Receive-Job $_.id
if ($_.state -eq "Running" -or $_.HasMoreData) {
$newjobs += $_
}
else {
$_ |Remove-Job
}
}
$jobs = $newjobs
if ($jobs.count -eq $Threads) {
sleep $sleep
}
}
$runscript = $ExecutionContext.InvokeCommand.NewScriptBlock(($ScriptBlock -replace '\\$computername', "$computer"))
Write-Verbose "Starting Job for computer: $computer"
$jobs += Start-Job -ScriptBlock $runscript
$curthreads++
}
}
}
END {
while ($jobs.count -ne 0) {
$newjobs = @()
$jobs |foreach {
Receive-Job $_.id
if ($_.state -eq "Running" -or $_.HasMoreData) {
$newjobs += $_
}
else {
$_ |Remove-Job
}
}
$jobs = $newjobs
if ($jobs.count -gt 0) {
sleep $sleep
}
}
}
}
|
combined_dataset/train/non-malicious/Custom Accelerators_1.ps1 | Custom Accelerators_1.ps1 | #requires -version 2.0
## Custom Accelerators for PowerShell 2
####################################################################################################
## A script module for PowerShell 2 which allows the user to create their own custom type accelerators.
## Thanks to "Oisin Grehan for the discovery":http://www.nivot.org/2008/12/25/ListOfTypeAcceleratorsForPowerShellCTP3.aspx.
####################################################################################################
## Revision History
## v1.0 - Modularization of Oisin's idea, by Joel 'Jaykul' Bennett
## v2.0 - Update for RTM (nothing significant)
## v2.1 - Minor tweaks to make it more pipelineable (I'm including this in my Reflection module)
####################################################################################################
# get a reference to the Type
$xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators")
function Add-Accelerator {
<#
.Synopsis
Add a type accelerator to the current session
.Description
The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]).
.Example
Add-Accelerator list System.Collections.Generic.List``1
$list = New-Object list[string]
Creates an accelerator for the generic List[T] collection type, and then creates a list of strings.
.Example
Add-Accelerator "List T", GList System.Collections.Generic.List``1
$list = New-Object "list t[string]"
Creates two accelerators for the Generic List[T] collection type.
.Parameter Accelerator
The short form accelerator should be just the name you want to use (without square brackets).
.Parameter Type
The type you want the accelerator to accelerate (without square brackets)
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accelerator string, regex".
PowerShell requires arguments that are "types" to NOT have the square bracket type notation, because of the way the parsing engine works. You can either just type in the type as System.Int64, or you can put parentheses around it to help the parser out: ([System.Int64])
Also see the help for Get-Accelerator and Remove-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding()]
PARAM(
[Parameter(Position=0,ValueFromPipelineByPropertyName=$true)]
[Alias("Key","Name")]
[string[]]$Accelerator
,
[Parameter(Position=1,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[Alias("Value","FullName")]
[type]$Type
)
PROCESS {
# add a user-defined accelerator
foreach($a in $Accelerator) {
$xlr8r::Add( $a, $Type)
trap [System.Management.Automation.MethodInvocationException] {
if($xlr8r::get.keys -contains $a) {
Write-Error "Cannot add accelerator [$a] for [$($Type.FullName)]`n [$a] is already defined as [$($xlr8r::get[$a].FullName)]"
Continue;
}
throw
}
}
}
}
function Get-Accelerator {
<#
.Synopsis
Get one or more type accelerator definitions
.Description
The Get-Accelerator function allows you to look up the type accelerators (like [regex]) defined on your system by their short form or by type
.Example
Get-Accelerator System.String
Returns the KeyValue pair for the [System.String] accelerator(s)
.Example
Get-Accelerator ps*,wmi*
Returns the KeyValue pairs for the matching accelerator definition(s)
.Parameter Accelerator
One or more short form accelerators to search for (Accept wildcard characters).
.Parameter Type
One or more types to search for.
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accelerator string, regex".
Also see the help for Add-Accelerator and Remove-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding(DefaultParameterSetName="ByType")]
PARAM(
[Parameter(Position=0, ParameterSetName="ByAccelerator", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Key","Name")]
[string[]]$Accelerator
,
[Parameter(Position=0, ParameterSetName="ByType", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Value","FullName")]
[type[]]$Type
)
PROCESS {
# add a user-defined accelerator
switch($PSCmdlet.ParameterSetName) {
"ByAccelerator" {
$xlr8r::get.GetEnumerator() | % {
foreach($a in $Accelerator) {
if($_.Key -like $a) { $_ }
}
}
break
}
"ByType" {
if($Type -and $Type.Count) {
$xlr8r::get.GetEnumerator() | ? { $Type -contains $_.Value }
}
else {
$xlr8r::get.GetEnumerator() | %{ $_ }
}
break
}
}
}
}
function Remove-Accelerator {
<#
.Synopsis
Remove a type accelerator from the current session
.Description
The Remove-Accelerator function allows you to remove a simple type accelerator (like [regex]) from the current session. You can pass one or more accelerators, and even wildcards, but you should be aware that you can remove even the built-in accelerators.
.Example
Remove-Accelerator int
Add-Accelerator int Int64
Removes the "int" accelerator for Int32 and adds a new one for Int64. I can't recommend doing this, but it's pretty cool that it works:
So now, "$(([int]3.4).GetType().FullName)" would return "System.Int64"
.Example
Get-Accelerator System.Single | Remove-Accelerator
Removes both of the default accelerators for System.Single: [float] and [single]
.Example
Get-Accelerator System.Single | Remove-Accelerator -WhatIf
Demonstrates that Remove-Accelerator supports -Confirm and -Whatif. Will Print:
What if: Removes the alias [float] for type [System.Single]
What if: Removes the alias [single] for type [System.Single]
.Parameter Accelerator
The short form accelerator that you want to remove (Accept wildcard characters).
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accel string, regex".
Also see the help for Add-Accelerator and Get-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding(SupportsShouldProcess=$true)]
PARAM(
[Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Key","FullName")]
[string[]]$Accelerator
)
PROCESS {
foreach($a in $Accelerator) {
foreach($key in $xlr8r::Get.Keys -like $a) {
if($PSCmdlet.ShouldProcess( "Removes the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]",
"Remove the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]?",
"Removing Type Accelerator" )) {
# remove a user-defined accelerator
$xlr8r::remove($key)
}
}
}
}
}
Add-Accelerator list System.Collections.Generic.List``1
Add-Accelerator dictionary System.Collections.Generic.Dictionary``2
|
combined_dataset/train/non-malicious/sample_59_96.ps1 | sample_59_96.ps1 | #
# Module manifest for module 'OCI.PSModules.Waa'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Waa.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5e9163aa-454b-4b6c-b240-a7136ba9f82a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Waa Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waa.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIWaaWebAppAcceleration',
'Get-OCIWaaWebAppAccelerationPoliciesList',
'Get-OCIWaaWebAppAccelerationPolicy',
'Get-OCIWaaWebAppAccelerationsList', 'Get-OCIWaaWorkRequest',
'Get-OCIWaaWorkRequestErrorsList', 'Get-OCIWaaWorkRequestLogsList',
'Get-OCIWaaWorkRequestsList',
'Invoke-OCIWaaPurgeWebAppAccelerationCache',
'Move-OCIWaaWebAppAccelerationCompartment',
'Move-OCIWaaWebAppAccelerationPolicyCompartment',
'New-OCIWaaWebAppAcceleration',
'New-OCIWaaWebAppAccelerationPolicy',
'Remove-OCIWaaWebAppAcceleration',
'Remove-OCIWaaWebAppAccelerationPolicy',
'Update-OCIWaaWebAppAcceleration',
'Update-OCIWaaWebAppAccelerationPolicy'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waa'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_66_89.ps1 | sample_66_89.ps1 | #
# Module manifest for module 'OCI.PSModules.Servicemanagerproxy'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Servicemanagerproxy.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '01ac6ca4-c358-4958-baf9-455f6dd1de04'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Servicemanagerproxy Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicemanagerproxy.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIServicemanagerproxyServiceEnvironment',
'Get-OCIServicemanagerproxyServiceEnvironmentsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicemanagerproxy'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_8_94.ps1 | sample_8_94.ps1 | #************************************************
# TS_SurfacePro3DetectFirmwareVersions.ps1
# Version 1.0.09.19.14: Created and tested SurfacePro3 scripts from Sep12-19
# Date: 2014
# Author: bbenson
# Description: SurfacePro3DetectFirmwareVersions
#
# Rule GUID: 34F6567E-7B92-4C37-B1CA-5DE6E66D4881
#
# Files:
# TS_SurfacePro3DetectFirmwareVersions.ps1
# RC_SurfacePro3DetectFirmwareVersions.xml
# Include.xml
#
# Output files:
# none
#
# Called from: Networking and Setup Diagnostics
#************************************************
Import-LocalizedData -BindingVariable RegKeyCheck
Write-DiagProgress -Activity $RegKeyCheck.ID_SurfacePro3DetectFirmwareVersions -Status $RegKeyCheck.ID_SurfacePro3DetectFirmwareVersionsDesc
$RootCauseDetected = $false
$HasIssue = $false
$RootCauseName = "RC_SurfacePro3DetectFirmwareVersions"
#$PublicContent Title: "Surface Pro 3, Surface Pro 2, and Surface Pro firmware and driver packs"
$PublicContent = "http://www.microsoft.com/en-us/download/details.aspx?id=38826"
#InternalContent Title: "2961421 - Surface: How to check firmware versions"
$InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2961421"
$Verbosity = "Error"
$Visibility = "4"
$SupportTopicsID = "8041"
$InformationCollected = new-object PSObject
#********************
#Functions
#********************
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
$sku = $((Get-CimInstance win32_operatingsystem).OperatingSystemSKU)
Function isOSVersionAffected
{
if ($bn -eq 9600)
{
return $true
}
else
{
return $false
}
}
Function isSurfacePro3
{
# Check for: "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\BIOS"; SystemSKU = Surface_Pro_3
$regkeyBIOS = "HKLM:\HARDWARE\DESCRIPTION\System\BIOS"
If (test-path $regkeyBIOS)
{
$regvalueSystemSKUReg = Get-ItemProperty -path $regkeyBIOS -name "SystemSKU" -ErrorAction SilentlyContinue
$regvalueSystemSKU = $regvalueSystemSKUReg.SystemSKU
if ($regvalueSystemSKU -eq "Surface_Pro_3")
{
return $true
}
else
{
return $false
}
}
}
#********************
#Detection Logic and Alert Evaluation
#********************
if ((isOSVersionAffected) -and (isSurfacePro3))
{
# Using this method to detect the firmware version:
# Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{512B1F42-CCD2-403B-8118-2F54353A1226}" Filename = "SamFirmware.3.9.350.0.cap"
# Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{52D9DA80-3D55-47E4-A9ED-D538A9B88146}" Filename = "ECFirmware.38.6.50.0.cap"
# Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{5A2D987B-CB39-42FE-A4CF-D5D0ABAE3A08}" Filename = "UEFI.3.10.250.0.cap"
# Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{E5FFF56F-D160-4365-9E21-22B06F6746DD}" Filename = "TouchFirmware.426.27.66.0.cap"
#
# This method shows the correct driver if the driver is rolled back, but this is not needed since firmware cannot be rolled back.
# HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\UEFI\RES_{GUID}\0\Device Parameters
#
$regkeySamFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{512B1F42-CCD2-403B-8118-2F54353A1226}"
If (test-path $regkeySamFirmware)
{
$regvalueSamFirmwareFilename = Get-ItemProperty -path $regkeySamFirmware -name "Filename" -ErrorAction SilentlyContinue
if ($null -ne $regvalueSamFirmwareFilename)
{
$regvalueSamFirmwareFilename = $regvalueSamFirmwareFilename.Filename
$regvalueSamFirmwareFileNameLatest = "SamFirmware.3.9.350.0.cap"
}
$regvalueSamFirmwareVersion = Get-ItemProperty -path $regkeySamFirmware -name "Version" -ErrorAction SilentlyContinue
if ($null -ne $regvalueSamFirmwareVersion)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro System Aggregator Firmware" -value " "
$regvalueSamFirmwareVersion = $regvalueSamFirmwareVersion.Version
if ($regvalueSamFirmwareVersion -lt 50922320) # Hex 0x03090350
{
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Installed Version" -value $regvalueSamFirmwareFileName
add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Recommended Version" -value $regvalueSamFirmwareFileNameLatest
}
else
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Version: No Action Needed" -value $regvalueSamFirmwareFileName
}
}
}
$regkeyECFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{52D9DA80-3D55-47E4-A9ED-D538A9B88146}"
If (test-path $regkeyECFirmware)
{
$regvalueECFirmwareFileName = Get-ItemProperty -path $regkeyECFirmware -name "Filename" -ErrorAction SilentlyContinue
if ($null -ne $regvalueECFirmwareFileName)
{
$regvalueECFirmwareFileName = $regvalueECFirmwareFileName.Filename
$regvalueECFirmwareFileNameLatest = "ECFirmware.38.6.50.0"
}
$regvalueECFirmwareVersion = Get-ItemProperty -path $regkeyECFirmware -name "Version" -ErrorAction SilentlyContinue
if ($null -ne $regvalueECFirmwareVersion)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro Embedded Controller Firmware" -value " "
$regvalueECFirmwareVersion = $regvalueECFirmwareVersion.Version
if ($regvalueECFirmwareVersion -lt 3671632) # Hex 0x00380650
{
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Installed Version" -value $regvalueECFirmwareFileName
add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Recommended Version" -value $regvalueECFirmwareFileNameLatest
}
else
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Version: No Action Needed" -value $regvalueECFirmwareFileName
}
}
}
$regkeyUEFI = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{5A2D987B-CB39-42FE-A4CF-D5D0ABAE3A08}"
If (test-path $regkeyUEFI)
{
$regvalueUEFIFileName = Get-ItemProperty -path $regkeyUEFI -name "Filename" -ErrorAction SilentlyContinue
if ($null -ne $regvalueUEFIFileName)
{
$regvalueUEFIFileName = $regvalueUEFIFileName.Filename
$regvalueUEFIFileNameLatest = "UEFI.3.10.250.0.cap"
}
$regvalueUEFIVersion = Get-ItemProperty -path $regkeyUEFI -name "Version" -ErrorAction SilentlyContinue
if ($null -ne $regvalueUEFIVersion)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro UEFI" -value " "
$regvalueUEFIVersion = $regvalueUEFIVersion.Version
if ($regvalueUEFIVersion -lt 50987258) # Hex 0x030a00fa
{
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Installed Version" -value $regvalueUEFIFileName
add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Recommended Version" -value $regvalueUEFIFileNameLatest
}
else
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Version: No Action Needed" -value $regvalueUEFIFileName
}
}
}
$regkeyTouchFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{E5FFF56F-D160-4365-9E21-22B06F6746DD}"
If (test-path $regkeyTouchFirmware)
{
$regvalueTouchFirmwareFileName = Get-ItemProperty -path $regkeyTouchFirmware -name "Filename" -ErrorAction SilentlyContinue
if ($null -ne $regvalueTouchFirmwareFileName)
{
$regvalueTouchFirmwareFileName = $regvalueTouchFirmwareFileName.Filename
$regvalueTouchFirmwareFileNameLatest = "TouchFirmware.426.27.66.0"
}
$regvalueTouchFirmwareVersion = Get-ItemProperty -path $regkeyTouchFirmware -name "Version" -ErrorAction SilentlyContinue
if ($null -ne $regvalueTouchFirmwareVersion)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro Touch Controller Firmware" -value " "
$regvalueTouchFirmwareVersion = $regvalueTouchFirmwareVersion.Version
if ($regvalueTouchFirmwareVersion -lt 27925314) # Hex 0x01aa1b42
{
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Installed Version:" -value $regvalueTouchFirmwareFileName
add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Recommended Version" -value $regvalueTouchFirmwareFileNameLatest
}
else
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Version: No Action Needed" -value $regvalueTouchFirmwareFileName
}
}
}
if ($RootCauseDetected -eq $true)
{
"[info] RootCauseDetected: Completing RootCause" | WriteTo-StdOut
# Completing the Root Cause
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InternalContentURL $InternalContent -Verbosity $Verbosity -InformationCollected $InformationCollected -Visibility $Visibility -SupportTopicsID $SupportTopicsID -MessageVersion 1
}
else
{
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoUQYJKoZIhvcNAQcCoIIoQjCCKD4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB10HRFrv8HjhoX
# gsRZ5WnZzTq8vDo3ZWsTdcl0N9SmHKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFzW
# iMZmK36RHn34ITp+dpSCjzKsm6UyyzflaB7FrpOGMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAiMIJtLQjS/0BIq5AMQVvgGSufD6p29eTtyj5
# nRxyuY6sd7fbmPfqSD9SJ8UDGBeawEjmqQm4bKjkYOGL1UwSUE3bD/K6Ha6ZJcB8
# sA3ZX9pDsqHnG0EG6KziBeMLFsCaw+sn4kcY2JsmIp6bdH5JkIBUz1uzl3qGGKGh
# i4VvOpzK2TyQGHa0foj8n66/yx62Z6kS+P4gMwA679272DVjVVnoNy3VK/1l2vjT
# 47881DXeMwHhfytwxQEXJFf7x+HQjmIKwytBhz6EmHSJjsO52hi724dgrcOpVsWb
# N7S+INy1JLhS6DTzIGOPvbogGhwzazzGZi2gdeVMi4PwyCnBoKGCF6wwgheoBgor
# BgEEAYI3AwMBMYIXmDCCF5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCnlDISA3V/ssXwt4PRuitDHhoNLozWEyQm
# Ds7o9T+wQQIGZus6esmcGBIyMDI0MTAyODExNDA0MC4yOFowBIACAfSggdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAH5H2eN
# dauk8bEAAQAAAfkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjQwNzI1MTgzMTA5WhcNMjUxMDIyMTgzMTA5WjCB0zELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MkExQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC0
# PUwffIAdYc1WyUL4IFOP8yl3nksM+1CuE3tZ6oWFF4L3EpdKOhtbVkfMdTxXYE4l
# SJiDt8MnYDEZUbKi9S2AZmDb4Zq4UqTdmOOwtKyp6FgixRCuBf6v9UBNpbz841bL
# qU7IZnBmnF9XYRfioCHqZvaFp0C691tGXVArW18GVHd914IFAb7JvP0kVnjks3am
# zw1zXGvjU3xCLcpUkthfSJsRsCSSxHhtuzMLO9j691KuNbIoCNHpiBiFoFoPETYo
# MnaxBEUUX96ALEqCiB0XdUgmgIT9a7L0y4SDKl5rUd6LuUUa90tBkfkmjZBHm43y
# GIxzxnjtFEm4hYI57IgnVidGKKJulRnvb7Cm/wtOi/TIfoLkdH8Pz4BPi+q0/nsh
# NewP0M86hvy2O2x589xAl5tQ2KrJ/JMvmPn8n7Z34Y8JxcRih5Zn6euxlJ+t3kMc
# zii8KYPeWJ+BifOM6vLiCFBP9y+Z0fAWvrIkamFb8cbwZB35wHjDvAak6EdUlvLj
# iQZUrwzNj2zfYPLVMecmDynvLWwQbP8DXLzhm3qAiwhNhpxweEEqnhw5U2t+hFVT
# HYb/ROvsOTd+kJTy77miWo8/AqBmznuOX6U6tFWxfUBgSYCfILIaupEDOkZfKTUe
# 80gGlI025MFCTsUG+75imLoDtLZXZOPqXNhZUG+4YQIDAQABo4IBSTCCAUUwHQYD
# VR0OBBYEFInto7qclckj16KPNLlCRHZGWeAAMB8GA1UdIwQYMBaAFJ+nFV0AXmJd
# g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z
# b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt
# ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l
# AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA
# A4ICAQBmIAmAVuR/uN+HH+aZmWcZmulp74canFbGzwjv29RvwZCi7nQzWezuLAbY
# Jx2hdqrtWClWQ1/W68iGsZikoIFdD5JonY7QG/C4lHtSyBNoo3SP/J/d+kcPSS0f
# 4SQS4Zez0MEvK3vWK61WTCjD2JCZKTiggrxLwCs0alI7N6671N0mMGOxqya4n7ar
# lOOauAQrI97dMCkCKjxx3D9vVwECaO0ju2k1hXk/JEjcrU2G4OB8SPmTKcYX+6LM
# /U24dLEX9XWSz/a0ISiuKJwziTU8lNMDRMKM1uSmYFywAyXFPMGdayqcEK3135R3
# 1VrcjD0GzhxyuSAGMu2De9gZhqvrXmh9i1T526n4u5TR3bAEMQbWeFJYdo767bLp
# KLcBo0g23+k4wpTqXgBbS4NZQff04cfcSoUe1OyxldoM6O3JGBuowaaR/wojeohU
# FknZdCmeES5FuH4CCmZGf9rjXQOTtW0+Da4LjbZYsLwfwhWT8V6iJJLi8Wh2GdwV
# 60nRkrfrDEBrcWI+AF5tFbJW1nvreoMPPENvSYHocv0cR9Ns37igcKRlrUcqXwHS
# zxGIUEx/9bv47sQ9n7AwfzB2SNntJux1211GBEBGpHwgU9a6tD6yft+0SJ9qiPO4
# IRqFIByrzrKPBB5M831gb1vfhFO6ueSkP7A8ZMHVZxwymwuUzTCCB3EwggVZoAMC
# AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m
# dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy
# NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9
# DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2
# Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N
# 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc
# ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ
# j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk
# lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy
# L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M
# 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX
# pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU
# HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode
# 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA
# ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE
# FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB
# MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE
# AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB
# /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv
# b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt
# 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP
# MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++
# Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9
# QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2
# wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR
# AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z
# bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx
# t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3
# Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN
# uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z
# cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCqzlaNY7vNUAqY
# hx3CGqBm/KnpRqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MA0GCSqGSIb3DQEBCwUAAgUA6snJlzAiGA8yMDI0MTAyODA4MjgwN1oYDzIwMjQx
# MDI5MDgyODA3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqycmXAgEAMAcCAQAC
# AgheMAcCAQACAhNxMAoCBQDqyxsXAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG
# AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD
# ggEBABl2r45TbcRpRyHBC7Tfm1IOcpmVr24Oj3iI4YxR9hIegjEBKx/eOzYN7DEj
# OwXPW3wQtuz/tX5v6UtnblQPLlaEy4BpQXQMEroPYmeyPIlVJtxz7jyPpn/sWHzj
# L2RPxzkdRgvmQXY0mKqAco1FMt1mocHjYjhtX9/Pz8Ob/b0Zb4NHYgZhKy8vZ7vY
# C9+kq1Rk73hZ+e9FUC7grAeUiYZF3fQlSJbSoUEO+YDXbACDwUn/6aTqeEmMSlSq
# eshWE6pNkTQjkYmJUnJ0AWlYZB43BaKARszkCW9KuDKhAyGdqBFX8EeGOmEWAYS7
# o4XMf6DpsGJS78GyaWh0zj3NACAxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfkfZ411q6TxsQABAAAB+TANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCA/vjySoim1TLx7PFh+Nci4GZltq8hz6aRDGVYWYmBfMTCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EIDkjjMge8I37ZPrpFQ4sJmtQRV2gqUqXxV4I7lJs
# YtgQMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH5
# H2eNdauk8bEAAQAAAfkwIgQgJmu+NOFPuWOF/KqubUTlJN0adLdAcytn+UUcmQcH
# ut0wDQYJKoZIhvcNAQELBQAEggIAl7sqCZ4y/UwHpdpaoluj2INT9+VJ3+Swj2IP
# Je1aIjWW2DeO/Kjj/TCSmtHLRbxS0dMEoiKJUst5Ex9i4aQLykQ1PEHj9sd/OZtB
# SPl82s7vvc4ipgkN/HmCjauN6AKfXmhw58OXgTG8Oo1blMNej7aQpwZqyLLWHXqe
# lVDQqD3XrQ5VpCf1M/uOKZSnK0yTfti9x5SdFyfI57RwoeoPELdKDAQ2h6hgbhld
# sbMr4HEYL0pqbiVo0pSV3FGskvxpXhydASPLq/8UrfLDvq/qm8KglckSuhI/vICW
# 7PtParYQq/Qd7yrQ1wAH36QXUgULrTtf582WreIMU/K7xv38/FSJ/gJdA+v5mvEl
# uFpmhETTJxlbXtIWjX0Tea+B69fFReYz4dglfqgJ4Lk6TGW0El3DGZUPyK02Josg
# YJcqcO8a7h0TRjaZCoDtcyifF1mMFxQN75J2Bo6ousZ8A0CpUhCa6+8swuByJ00r
# CFwwc8hYl2JJqJARbh3zS87+kg572+modSIfDNNKoz6Gk4nqGiucNm12Vmow6c3p
# e6EzB6We8n6wK9GRwfO8lmLHHJ8qWtHR2eNRXKrH6WxOV4vR3bMO4f6oPDrncSqV
# JewV1M2xIA5xwoLgBRMdM7tfma0X5F3keceyzWj1xktvnFLo6y6rhcRP/oBXYxsg
# 9VybTNU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1931.ps1 | 1931.ps1 |
Describe "Set-Alias DRT Unit Tests" -Tags "CI" {
It "Set-Alias Invalid Scope Name should throw PSArgumentException"{
{ Set-Alias -Name "ABCD" -Value "foo" -Scope "bogus" } | Should -Throw -ErrorId "Argument,Microsoft.PowerShell.Commands.SetAliasCommand"
}
It "Set-Alias ReadOnly Force"{
Set-Alias -Name ABCD -Value "foo" -Option ReadOnly -Force:$true
$result=Get-Alias -Name ABCD
$result.Name| Should -BeExactly "ABCD"
$result.Definition| Should -BeExactly "foo"
$result.Description| Should -BeNullOrEmpty
$result.Options| Should -BeExactly "ReadOnly"
Set-Alias -Name ABCD -Value "foo" -Force:$true
$result=Get-Alias -Name ABCD
$result.Name| Should -BeExactly "ABCD"
$result.Definition| Should -BeExactly "foo"
$result.Description| Should -BeNullOrEmpty
$result.Options| Should -BeExactly "None"
}
It "Set-Alias Name And Value Valid"{
Set-Alias -Name ABCD -Value "MyCommand"
$result=Get-Alias -Name ABCD
$result.Name| Should -BeExactly "ABCD"
$result.Definition| Should -BeExactly "MyCommand"
$result.Description| Should -BeNullOrEmpty
$result.Options| Should -BeExactly "None"
}
It "Set-Alias Name And Value Positional Valid"{
Set-Alias -Name ABCD "foo"
$result=Get-Alias ABCD
$result.Name| Should -BeExactly "ABCD"
$result.Definition| Should -BeExactly "foo"
$result.Description| Should -BeNullOrEmpty
$result.Options| Should -BeExactly "None"
}
It "Set-Alias Description Valid"{
Set-Alias -Name ABCD -Value "MyCommand" -Description "test description"
$result=Get-Alias -Name ABCD
$result.Name| Should -BeExactly "ABCD"
$result.Definition| Should -BeExactly "MyCommand"
$result.Description| Should -BeExactly "test description"
$result.Options| Should -BeExactly "None"
}
It "Set-Alias Scope Valid"{
Set-Alias -Name ABCD -Value "localfoo" -scope local -Force:$true
Set-Alias -Name ABCD -Value "foo1" -scope "1" -Force:$true
$result=Get-Alias -Name ABCD
$result.Name| Should -BeExactly "ABCD"
$result.Definition| Should -BeExactly "localfoo"
$result.Description| Should -BeNullOrEmpty
$result.Options| Should -BeExactly "None"
$result=Get-Alias -Name ABCD -scope local
$result.Name| Should -BeExactly "ABCD"
$result.Definition| Should -BeExactly "localfoo"
$result.Description| Should -BeNullOrEmpty
$result.Options| Should -BeExactly "None"
$result=Get-Alias -Name ABCD -scope "1"
$result.Name| Should -BeExactly "ABCD"
$result.Definition| Should -BeExactly "foo1"
$result.Description| Should -BeNullOrEmpty
$result.Options| Should -BeExactly "None"
}
It "Set-Alias Expose Bug 1062958, BugId:905449"{
{ Set-Alias -Name "ABCD" -Value "foo" -Scope "-1" } | Should -Throw -ErrorId "ArgumentOutOfRange,Microsoft.PowerShell.Commands.SetAliasCommand"
}
}
Describe "Set-Alias" -Tags "CI" {
Mock Get-Date { return "Friday, October 30, 2015 3:38:08 PM" }
It "Should be able to set alias without error" {
{ set-alias -Name gd -Value Get-Date } | Should -Not -Throw
}
It "Should be able to have the same output between set-alias and the output of the function being aliased" {
set-alias -Name gd -Value Get-Date
gd | Should -Be $(Get-Date)
}
It "Should be able to use the sal alias" {
{ sal gd Get-Date } | Should -Not -Throw
}
It "Should have the same output between the sal alias and the original set-alias cmdlet" {
sal -Name gd -Value Get-Date
Set-Alias -Name gd2 -Value Get-Date
gd2 | Should -Be $(gd)
}
}
|
combined_dataset/train/non-malicious/4024.ps1 | 4024.ps1 |
function Test-CreatesNewSimpleResourceGroup
{
$rgname = Get-ResourceGroupName
$location = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
try
{
$actual = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval"}
$expected = Get-AzResourceGroup -Name $rgname
Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual $expected.Tags["testtag"] $actual.Tags["testtag"]
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-UpdatesExistingResourceGroup
{
$rgname = Get-ResourceGroupName
$location = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
try
{
Set-AzResourceGroup -Name $rgname -Tags @{testtag = "testval"} -ErrorAction SilentlyContinue
Assert-True { $Error[0] -like "*Provided resource group does not exist." }
$Error.Clear()
$new = New-AzResourceGroup -Name $rgname -Location $location
$actual = Set-AzResourceGroup -Name $rgname -Tags @{ testtag = "testval" }
$expected = Get-AzResourceGroup -Name $rgname
Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual 0 $new.Tags.Count
Assert-AreEqual $expected.Tags["testtag"] $actual.Tags["testtag"]
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-CreatesAndRemoveResourceGroupViaPiping
{
$rgname1 = Get-ResourceGroupName
$rgname2 = Get-ResourceGroupName
$location = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
New-AzResourceGroup -Name $rgname1 -Location $location
New-AzResourceGroup -Name $rgname2 -Location $location
$job = Get-AzResourceGroup | where {$_.ResourceGroupName -eq $rgname1 -or $_.ResourceGroupName -eq $rgname2} | Remove-AzResourceGroup -Force -AsJob
Wait-Job $job
Get-AzResourceGroup -Name $rgname1 -ErrorAction SilentlyContinue
Assert-True { $Error[0] -like "*Provided resource group does not exist." }
$Error.Clear()
Get-AzResourceGroup -Name $rgname2 -ErrorAction SilentlyContinue
Assert-True { $Error[0] -like "*Provided resource group does not exist." }
$Error.Clear()
}
function Test-GetNonExistingResourceGroup
{
$rgname = Get-ResourceGroupName
Get-AzResourceGroup -Name $rgname -ErrorAction SilentlyContinue
Assert-True { $Error[0] -like "*Provided resource group does not exist." }
$Error.Clear()
}
function Test-NewResourceGroupInNonExistingLocation
{
$rgname = Get-ResourceGroupName
Assert-Throws { New-AzResourceGroup -Name $rgname -Location 'non-existing' }
}
function Test-RemoveNonExistingResourceGroup
{
$rgname = Get-ResourceGroupName
Remove-AzResourceGroup -Name $rgname -Force -ErrorAction SilentlyContinue
Assert-True { $Error[0] -like "*Provided resource group does not exist." }
$Error.Clear()
}
function Test-AzureTagsEndToEnd
{
$tag1 = getAssetName
$tag2 = getAssetName
Clean-Tags
New-AzTag $tag1
$tag = Get-AzTag $tag1
Assert-AreEqual $tag1 $tag.Name
New-AzTag $tag1 value1
New-AzTag $tag1 value1
New-AzTag $tag1 value2
$tag = Get-AzTag $tag1
Assert-AreEqual 2 $tag.Values.Count
New-AzTag $tag2 value1
New-AzTag $tag2 value2
New-AzTag $tag2 value3
$tags = Get-AzTag
Assert-AreEqual 2 $tags.Count
$tag = Remove-AzTag $tag1 -Force -PassThru
$tags = Get-AzTag
Assert-AreEqual $tag1 $tag.Name
$tag = Remove-AzTag $tag2 value1 -Force -PassThru
$tags = Get-AzTag
Assert-AreEqual 0 $tags.Count
Assert-Throws { Get-AzTag "non-existing" }
Clean-Tags
}
function Test-NewDeploymentAndProviderRegistration
{
$rgname = Get-ResourceGroupName
$rname = Get-ResourceName
$location = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
$template = "Microsoft.Cache.0.4.0-preview"
$provider = "microsoft.cache"
try
{
$subscription = [Microsoft.WindowsAzure.Commands.Utilities.Common.AzureProfile]::Instance.CurrentSubscription
$client = New-Object Microsoft.Azure.Commands.Resources.Models.ResourcesClient $subscription
$providers = [Microsoft.WindowsAzure.Commands.Utilities.Common.AzureProfile]::Instance.CurrentSubscription.RegisteredResourceProvidersList
if( $providers -Contains $provider )
{
$client.UnregisterProvider($provider)
}
$deployment = New-AzResourceGroup -Name $rgname -Location $location -GalleryTemplateIdentity $template -cacheName $rname -cacheLocation $location
$client = New-Object Microsoft.Azure.Commands.Resources.Models.ResourcesClient $subscription
$providers = [Microsoft.WindowsAzure.Commands.Utilities.Common.AzureProfile]::Instance.CurrentSubscription.RegisteredResourceProvidersList
Assert-True { $providers -Contains $provider }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-RemoveDeployment
{
$deploymentName = "Test"
$templateUri = "https://gallery.azure.com/artifact/20140901/Microsoft.ResourceGroup.1.0.0/DeploymentTemplates/Template.json"
$rgName = "TestSDK0123"
try
{
New-AzResourceGroup -Name $rgName -Location "East US"
$job = New-AzResourceGroupDeployment -ResourceGroupName $rgName -Name $deploymentName -TemplateUri $templateUri -AsJob
Wait-Job $job
$deployment = Receive-Job $job
Assert-True { Remove-AzResourceGroupDeployment -ResourceGroupName $deployment.ResourceGroupName -Name $deployment.DeploymentName }
}
finally
{
Clean-ResourceGroup $rgName
}
}
function Test-FindResourceGroup
{
$rgname = Get-ResourceGroupName
$rgname2 = Get-ResourceGroupName
$location = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
$originalResorcrGroups = Get-AzResourceGroup
$originalCount = @($originalResorcrGroups).Count
try
{
$actual = New-AzResourceGroup -Name $rgname -Location $location -Tag @{ testtag = "testval" }
$actual2 = New-AzResourceGroup -Name $rgname2 -Location $location -Tag @{ testtag = "testval2" }
$expected1 = Get-AzResourceGroup -Name $rgname
Assert-AreEqual $expected1.ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual $expected1.Tags["testtag"] $actual.Tags["testtag"]
$expected2 = Get-AzResourceGroup -Name $rgname2
Assert-AreEqual $expected2.ResourceGroupName $actual2.ResourceGroupName
Assert-AreEqual $expected2.Tags["testtag"] $actual2.Tags["testtag"]
$expected2 = Get-AzResourceGroup -Name ($rgname2 + "*")
Assert-AreEqual $expected2.ResourceGroupName $actual2.ResourceGroupName
Assert-AreEqual $expected2.Tags["testtag"] $actual2.Tags["testtag"]
$expected3 = Get-AzResourceGroup
$expectedCount = $originalCount + 2
Assert-AreEqual @($expected3).Count $expectedCount
$expected3 = Get-AzResourceGroup -Name *
$expectedCount = $originalCount + 2
Assert-AreEqual @($expected3).Count $expectedCount
$expected4 = Get-AzResourceGroup -Tag @{ testtag = $null}
Assert-AreEqual @($expected4).Count 2
$expected5 = Get-AzResourceGroup -Tag @{ testtag = "testval" }
Assert-AreEqual @($expected5).Count 1
$expected6 = Get-AzResourceGroup -Tag @{ testtag2 = $null }
Assert-AreEqual @($expected6).Count 0
}
finally
{
Clean-ResourceGroup $rgname
Clean-ResourceGroup $rgname2
}
}
function Test-GetNonExistingResourceGroupWithDebugStream
{
$ErrorActionPreference="Continue"
$output = $(Get-AzResourceGroup -Name "InvalidNonExistRocks" -Debug) 2>&1 5>&1 | Out-String
$ErrorActionPreference="Stop"
Assert-True { $output -Like "*============================ HTTP RESPONSE ============================*" }
}
function Test-ExportResourceGroup
{
$rgname = Get-ResourceGroupName
$rname = Get-ResourceName
$rglocation = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
$apiversion = "2014-04-01"
$resourceType = "Providers.Test/statefulResources"
try
{
New-AzResourceGroup -Name $rgname -Location $rglocation
$r = New-AzResource -Name $rname -Location "centralus" -Tags @{ testtag = "testval"} -ResourceGroupName $rgname -ResourceType $resourceType -PropertyObject @{"administratorLogin" = "adminuser"; "administratorLoginPassword" = "P@ssword1"} -SkuObject @{ Name = "A0" } -ApiVersion $apiversion -Force
Assert-AreEqual $r.ResourceGroupName $rgname
$exportOutput = Export-AzResourceGroup -ResourceGroupName $rgname -Force
Assert-NotNull $exportOutput
Assert-True { $exportOutput.Path.Contains($rgname + ".json") }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ExportResourceGroupWithFiltering
{
$rgname = Get-ResourceGroupName
$rname1 = Get-ResourceName
$rname2 = Get-ResourceName
$rglocation = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
$apiversion = "2014-04-01"
$resourceType = "Providers.Test/statefulResources"
try
{
New-AzResourceGroup -Name $rgname -Location $rglocation
$r1 = New-AzResource -Name $rname1 -Location "centralus" -Tags @{ testtag = "testval"} -ResourceGroupName $rgname -ResourceType $resourceType -PropertyObject @{"administratorLogin" = "adminuser"; "administratorLoginPassword" = "P@ssword1"} -SkuObject @{ Name = "A0" } -ApiVersion $apiversion -Force
Assert-NotNull $r1.ResourceId
$r2 = New-AzResource -Name $rname2 -Location "centralus" -Tags @{ testtag = "testval"} -ResourceGroupName $rgname -ResourceType $resourceType -PropertyObject @{"administratorLogin" = "adminuser"; "administratorLoginPassword" = "P@ssword1"} -SkuObject @{ Name = "A0" } -ApiVersion $apiversion -Force
Assert-NotNull $r2.ResourceId
$exportOutput = Export-AzResourceGroup -ResourceGroupName $rgname -Force -Resource @($r2.ResourceId) -IncludeParameterDefaultValue -IncludeComments
Assert-NotNull $exportOutput
Assert-True { $exportOutput.Path.Contains($rgname + ".json") }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ResourceGroupWithPositionalParams
{
$rgname = Get-ResourceGroupName
$location = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
try
{
$ErrorActionPreference = "SilentlyContinue"
$Error.Clear()
$actual = New-AzResourceGroup $rgname $location
$expected = Get-AzResourceGroup $rgname
Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName
Remove-AzResourceGroup $rgname -Force
}
catch
{
Assert-True { $Error[0].Contains("Provided resource group does not exist.") }
}
} |
combined_dataset/train/non-malicious/sample_9_83.ps1 | sample_9_83.ps1 | #************************************************
# TS_DetectMTU1514.ps1
# Version 1.0
# Date: 02/06/2014
# Author: BBenson
# Description: Detect if LinkMTU is set to 1514.
# Rule number: 262751
# Rule ID: 7a316c95-272b-4207-983d-57acb91d0eea
# Rule URL: https://kse.microsoft.com/Contribute/Idea/1456f71b-f3ff-4247-ade1-d47b8ff1a4e6
# Purpose:
# 1. Determine which network adapters are of type Ethernet with "netsh int ipv4 show int"
# 2. RootCause detected if LinkMTU is set to 1514.
#************************************************
# 2023-02-20 WalterE mod Trap #we#
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_DetectMTU1514_Activity -Status $ScriptStrings.ID_DetectMTU1514_Status
$RootCauseDetected = $false
$RootCauseName = "RC_DetectMTU1514"
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
#-----ipv4
$OutputFileIPv4 = "DetectMTU1514_netsh-int-ipv4-show-int.TXT"
$NetSHCommandToExecute = "int ipv4 show int"
$CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFileIPv4 "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
$netshIPv4MTUSettings = Get-Content $OutputFileIPv4
[int]$netshIPv4MTUSettingsLen = $netshIPv4MTUSettings.length
#==========
# Read entire output file with contents from "netsh int ipv4 show int" into a PSObject.
#==========
# Creating IPv4MtuObj psobject
$ipObj = New-Object psobject
# find the line after the line of dashes
for ($i=0;$i -le $netshIPv4MTUSettingsLen;$i++){
#lines of interest after line that starts with dashes
$line = $null
$line = $netshIPv4MTUSettings[$i]
# Handling the first few lines by finding the line that starts with dashes
if ($line -match "---"){
$dashline = $i
$i++ #increment past the line of dashes
# all lines interesting after dash line
for ($j=1;$j -le $netshIPv4MTUSettingsLen;$j++){
#first line of interest
$line = $null
$line = $netshIPv4MTUSettings[$i]
if ($line -eq ""){
break
}
$delimiter = " "
$arrLine = [Regex]::Split($line, $delimiter)
$arrLineLen = $arrLine.length
$Idx = ""
$Met = ""
$MTU = ""
$State = ""
$Name = ""
$headerCounter = 0
for ($k=0;$k -le $arrLineLen;$k++){
#if non zero value, increment counter and proceed
if ($arrLine[$k] -ne ""){
#if headerCounter has been incremented, assign it to a variable.
if ($headerCounter -eq 0) { $Idx = $arrLine[$k] }
if ($headerCounter -eq 1) { $Met = $arrLine[$k] }
if ($headerCounter -eq 2) { $MTU = $arrLine[$k] }
if ($headerCounter -eq 3) { $State = $arrLine[$k] }
if ($headerCounter -eq 4){
$Name = $arrLine[$k]
do{
$k++
$Name = $Name + " " + $arrLine[$k]
} while($k -le $arrLineLen)
}
$headerCounter++
}
}
# define object
$psobj = New-Object psobject @{
"Idx" = $Idx
"Met" = $Met
"MTU" = $MTU
"State" = $State
"Name" = $Name
}
#create object
New-Variable -Name ('Int' + $Idx) -Value $psobj -Force
#add member
Add-Member -InputObject $ipObj -MemberType NoteProperty -Name "Int$Idx" -Value (get-variable -name Int$Idx).value -Force
#increment counter
$i++
}
}
#-----finding each interface in ipObj
$ipObjFile = "ipObj.TXT"
$ipObj | Format-List | Out-File $ipObjFile
$ipObjTxt = Get-Content $ipObjFile
[int]$ipObjTxtLen = $ipObjTxt.length
# "number of interfaces: " + $ipObjTxtLen
# loop through the lines of output, finding each interface number
for ($i=1;$i -le $ipObjTxtLen-1;$i++){
#==========
# Find Ethernet adapters with a LinkMTU of 1514
#==========
$netshIPv4PMTU = $null
if ($ipObjTxt[$i] -ne ""){
$line = $ipObjTxt[$i]
$delimiter = ":"
$arrLine = [Regex]::Split($line, $delimiter)
[string]$intID = ([string]$arrLine[0]).TrimEnd()
[string]$intName = ($ipObj.$intID.name).TrimEnd()
if ($ipObj.$intID.mtu -eq 1514){
#Problem detected.
$RootCauseDetected = $true
[int]$currentInterface = $ipObj.$intID.idx
add-member -inputobject $InformationCollected -membertype noteproperty -name "Interface $currentInterface" -value "MTU=1514"
}
}
}
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if ($RootCauseDetected -eq $true){
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "http://support.microsoft.com/kb/314496" -InformationCollected $InformationCollected -Verbosity "Error" -Visibility 4 -SupportTopicsID 8041 -Component "Networking"
}
# *********************
# Root Cause processing
# *********************
if ($RootCauseDetected){
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
}else{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBkoglaReZwevEh
# 40XVs1e9MGD7PtVaPzKyyxDTOhjHXqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOke
# w8QH1/qnIT4qfsWsRdh90lUuccTqrbcfziEHMgfVMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAYfKUTI03Zunw3Vx/plAkwpbUmGJNXmMVnZp6
# ybgHnA6XU9mnY1GjN6ge6EyRbKvlm1gIRdLYTvdZW9ECbC/lVXtWhAWNAblZOcps
# f0c+mZlhxwHMxGf4FSTe7AX25yWOZZCLa2oX2xzuq6rI8LA7zfFpu5EuS4Szh09a
# AEQMcyED+8E0gTJZd4mtNSOFctUJ3FadxRiXw355QE0ebuBzmP7HfRGfoXkjF/IL
# 8dbCzG5ATHCFbwo54dm86rxQMt21bUbcgZJjsypcpSGHnXZkSw9Ou6n69r8KinIb
# cIuCerml+Wc3aVhTDN8FpYYSIJTElFEeG1zeQ/ly2Bbjf0pSD6GCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCANIQHopU3f3Zjatl+oLvpMkhv+AUKzueNQ
# MPI7wKFKTgIGZutLSAOUGBMyMDI0MTAyODExNDA0MC43NTRaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4
# fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# yeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4d
# U4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqh
# hxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAn
# ncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTM
# KjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L
# 0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr
# 9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqf
# RuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbi
# aboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA
# 4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49
# tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUA
# p6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyf
# OievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkG
# Zjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3
# kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU
# 3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0T
# y0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOd
# gRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tyt
# uulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3
# XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTS
# Y4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUl
# cnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0
# MTAyOTA5Mzk0OVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEA
# AgIFPAIB/zAHAgEAAgIUKTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAuUNJmV2WEmZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaH
# yPjIBqzVVX+OsCmMA4rCSBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cq
# WgcxpcvR5+XFiKoxtNrZ+ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedW
# cWiD6dyYPjiJ10ZllDJAkIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7a
# Y8kNavDIwAwm/WFtYzSwFv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4
# swD4QJBUY7k+61Fk5XlZu6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgvxuIisAx8pZFiOjPiui3V3Jirf6jgvELHtDZvqHQWSgwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDj
# SEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/xI4fPfBZdahAAEAAAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJk
# D9cXZckbMA0GCSqGSIb3DQEBCwUABIICAEQB9rFuE2JGezIdF96563MJQMWf8TpB
# XSzR0ZkJvkok71km/FDkVvYqsFHxPG+aArOwntLj6VbzcOi2Llkn3CMNa52PnORV
# QyoMyJDkUxJ5ZAoBxAA5F6AktNxCElSXjqdkofoEEKJ/y4YOK8xtAw4owI7D4XYV
# f2IskoTYAjmzDXujnsYZT6n/HBRDYbVWWDG9Y2syoIqWHT3duGxirV2s/MJzFn8f
# WWht1zmLMXsaADyqJgOC6Z69M5UIoIaXQR+jU5BdN0rwaoLFXIrh+Z76SaXmnrEk
# 0/UaLRZc6hZris7pGpTAia3Nn3nCfovd0jayQMJsyX913rIbB5SDsKtvHMsglMu+
# jKTtQYUIrWXBYD0hqJhUO/WL9rXmMvhXKlPZezHQOdO9sS6EReEiNUNas2WL/QUh
# afkCKMhfM3M1sj57otkWh7EfHumLFad40oLrVA02FZA7uxWeo8DQzH5q+7CRTqhd
# wJJehojXBwyIgWq40jt78K+uenxMNiqLilIWSZflniVugnBCXA3bOuBLvY/qLof1
# xo5Jp+GKNp+rhDSlpwvUYvRLgVud0z/AV9Uqd1SSmxWg1mtWXW+/Eo90u4Va6FwV
# Dr4rn3BsJ+3UT7yEmJPhGUAxFyboJ5kg+PE+Te8DA+nHlpxzW4chw9xMIwTkCe/w
# zu85OLJFgV59
# SIG # End signature block
|
combined_dataset/train/non-malicious/1458.ps1 | 1458.ps1 |
function Install-CCertificate
{
[CmdletBinding(SupportsShouldProcess=$true,DefaultParameterSetName='FromFileInWindowsStore')]
[OutputType([Security.Cryptography.X509Certificates.X509Certificate2])]
param(
[Parameter(Mandatory=$true,Position=0,ParameterSetName='FromFileInWindowsStore')]
[Parameter(Mandatory=$true,Position=0,ParameterSetName='FromFileInCustomStore')]
[string]
$Path,
[Parameter(Mandatory=$true,Position=0,ParameterSetName='FromCertificateInWindowsStore')]
[Parameter(Mandatory=$true,Position=0,ParameterSetName='FromCertificateInCustomStore')]
[Security.Cryptography.X509Certificates.X509Certificate2]
$Certificate,
[Parameter(Mandatory=$true)]
[Security.Cryptography.X509Certificates.StoreLocation]
$StoreLocation,
[Parameter(Mandatory=$true,ParameterSetName='FromFileInWindowsStore')]
[Parameter(Mandatory=$true,ParameterSetName='FromCertificateInWindowsStore')]
[Security.Cryptography.X509Certificates.StoreName]
$StoreName,
[Parameter(Mandatory=$true,ParameterSetName='FromFileInCustomStore')]
[Parameter(Mandatory=$true,ParameterSetName='FromCertificateInCustomStore')]
[string]
$CustomStoreName,
[Parameter(ParameterSetName='FromFileInWindowsStore')]
[Parameter(ParameterSetName='FromFileInCustomStore')]
[Switch]
$Exportable,
[Parameter(ParameterSetName='FromFileInWindowsStore')]
[Parameter(ParameterSetName='FromFileInCustomStore')]
$Password,
[Management.Automation.Runspaces.PSSession[]]
$Session
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
if( $Password -and $Password -isnot [securestring] )
{
Write-Warning -Message ('You passed a plain text password to `Install-CCertificate`. A future version of Carbon will remove support for plain-text passwords. Please pass a `SecureString` instead.')
$Password = ConvertTo-SecureString -String $Password -AsPlainText -Force
}
if( $PSCmdlet.ParameterSetName -like 'FromFile*' )
{
$resolvedPath = Resolve-Path -Path $Path
if( -not $resolvedPath )
{
return
}
$Path = $resolvedPath.ProviderPath
$fileBytes = [IO.File]::ReadAllBytes($Path)
$encodedCert = [Convert]::ToBase64String( $fileBytes )
$keyFlags = [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::MachineKeySet
if( $StoreLocation -eq [Security.Cryptography.X509Certificates.StoreLocation]::CurrentUser )
{
$keyFlags = [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::UserKeySet
}
$keyFlags = $keyFlags -bor [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet
if( $Exportable )
{
$keyFlags = $keyFlags -bor [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable
}
$Certificate = Get-CCertificate -Path $Path -Password $Password -KeyStorageFlags $keyFlags
$fromFile = $true
}
else
{
$encodedCert = [Convert]::ToBase64String( $Certificate.RawData )
$keyFlags = 0
$fromFile = $false
}
$invokeCommandArgs = @{ }
if( $Session )
{
$invokeCommandArgs['Session'] = $Session
}
Invoke-Command @invokeCommandArgs -ScriptBlock {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$EncodedCertificate,
[securestring]
$Password,
[Parameter(Mandatory=$true)]
[Security.Cryptography.X509Certificates.StoreLocation]
$StoreLocation,
$StoreName,
[string]
$CustomStoreName,
[Security.Cryptography.X509Certificates.X509KeyStorageFlags]
$KeyStorageFlags,
[bool]
$WhatIf,
[Management.Automation.ActionPreference]
$Verbosity
)
Set-StrictMode -Version 'Latest'
$WhatIfPreference = $WhatIf
$VerbosePreference = $Verbosity
$tempDir = 'Carbon+Install-CCertificate+{0}' -f [IO.Path]::GetRandomFileName()
$tempDir = Join-Path -Path $env:TEMP -ChildPath $tempDir
New-Item -Path $tempDir -ItemType 'Directory' -WhatIf:$false | Out-Null
try
{
$certBytes = [Convert]::FromBase64String( $EncodedCertificate )
$certFilePath = Join-Path -Path $tempDir -ChildPath ([IO.Path]::GetRandomFileName())
[IO.File]::WriteAllBytes( $certFilePath, $certBytes )
$cert = New-Object 'Security.Cryptography.X509Certificates.X509Certificate2'
$cert.Import( $certFilePath, $Password, $KeyStorageFlags )
if( $CustomStoreName )
{
$store = New-Object 'Security.Cryptography.X509Certificates.X509Store' $CustomStoreName,$StoreLocation
}
else
{
$store = New-Object 'Security.Cryptography.X509Certificates.X509Store' ([Security.Cryptography.X509Certificates.StoreName]$StoreName),$StoreLocation
}
$store.Open( ([Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) )
$description = $cert.FriendlyName
if( -not $description )
{
$description = $cert.Subject
}
if( $PSCmdlet.ShouldProcess( ('install into {0}''s {1} store' -f $StoreLocation,$StoreName), ('{0} ({1})' -f $description,$cert.Thumbprint) ) )
{
Write-Verbose ('Installing certificate ''{0}'' ({1}) into {2}''s {3} store.' -f $description,$cert.Thumbprint,$StoreLocation,$StoreName)
$store.Add( $cert )
}
$store.Close()
}
finally
{
Remove-Item -Path $tempDir -Recurse -ErrorAction Ignore -WhatIf:$false -Force
}
} -ArgumentList $encodedCert,$Password,$StoreLocation,$StoreName,$CustomStoreName,$keyFlags,$WhatIfPreference,$VerbosePreference
return $Certificate
}
|
combined_dataset/train/non-malicious/sample_62_42.ps1 | sample_62_42.ps1 | # Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
<#
.Synopsis
Group Policy tools use administrative template files (.admx, .adml) to populate policy settings in the user interface.
This allows administrators to manage registry-based policy settings.
This script installes PowerShell Core Administrative Templates for Windows.
.Notes
The PowerShellCoreExecutionPolicy.admx and PowerShellCoreExecutionPolicy.adml files are
expected to be at the location specified by the Path parameter with default value of the location of this script.
#>
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]
[string] $Path = $PSScriptRoot
)
Set-StrictMode -Version 3.0
$ErrorActionPreference = 'Stop'
function Test-Elevated
{
[CmdletBinding()]
[OutputType([bool])]
Param()
# if the current Powershell session was called with administrator privileges,
# the Administrator Group's well-known SID will show up in the Groups for the current identity.
# Note that the SID won't show up unless the process is elevated.
return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544")
}
$IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows
if (-not $IsWindowsOs)
{
throw 'This script must be run on Windows.'
}
if (-not (Test-Elevated))
{
throw 'This script must be run from an elevated process.'
}
if ([System.Management.Automation.Platform]::IsNanoServer)
{
throw 'Group policy definitions are not supported on Nano Server.'
}
$admxName = 'PowerShellCoreExecutionPolicy.admx'
$admlName = 'PowerShellCoreExecutionPolicy.adml'
$admx = Get-Item -Path (Join-Path -Path $Path -ChildPath $admxName)
$adml = Get-Item -Path (Join-Path -Path $Path -ChildPath $admlName)
$admxTargetPath = Join-Path -Path $env:WINDIR -ChildPath "PolicyDefinitions"
$admlTargetPath = Join-Path -Path $admxTargetPath -ChildPath "en-US"
$files = @($admx, $adml)
foreach ($file in $files)
{
if (-not (Test-Path -Path $file))
{
throw "Could not find $($file.Name) at $Path"
}
}
Write-Verbose "Copying $admx to $admxTargetPath"
Copy-Item -Path $admx -Destination $admxTargetPath -Force
$admxTargetFullPath = Join-Path -Path $admxTargetPath -ChildPath $admxName
if (Test-Path -Path $admxTargetFullPath)
{
Write-Verbose "$admxName was installed successfully"
}
else
{
Write-Error "Could not install $admxName"
}
Write-Verbose "Copying $adml to $admlTargetPath"
Copy-Item -Path $adml -Destination $admlTargetPath -Force
$admlTargetFullPath = Join-Path -Path $admlTargetPath -ChildPath $admlName
if (Test-Path -Path $admlTargetFullPath)
{
Write-Verbose "$admlName was installed successfully"
}
else
{
Write-Error "Could not install $admlName"
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJ90/Icr8AC0PX
# PztF6dyoFT+ucLEEg+WYsxQzIJpS/KCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIARp
# rUuNhtpil9vE/G9ZX3FLF/w3czFFxBwWmQqTagvjMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAMSqkASF3uhPnw6SuFRSPjkcyCT1FXcyY8mCb
# t3caGD4arA9JJGQQNWtUjfMh55bb34W9nIlzZFshdM7rytsoVJtX7gLLnmKGo0M+
# x0HZwLWgJ2LDO2CMJZtqF58+5K600stAKG1JhykMhZVFPdMlKfJy/oPIIsY0sOIt
# Co8saVHfuDhnXIt59GJ8KWW2arnzFwyyJKJT0kiIET2ZQelqPp6rEiZYlKnKicDm
# BoIvrz7cUILq/P4Oe6T62/B7ghnC0wxy0XeJCPwptz8WtSLt7S0fRbiGQRu8SDBO
# KKXpLPzaLfCgY82Kx7Ha6I8ffrFo6aSeTo1AQIdVJpI1/0p3mqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAr1943bh/c+yRkv12Bc1zb6u290jeHmClh
# mRvDx7cDEgIGZkZGrqV1GBMyMDI0MDYxNzIyMTQyOC4wNjFaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB
# AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv
# QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed
# zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv
# 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY
# cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT
# EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ
# UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7
# b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD
# oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe
# h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69
# mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2
# t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx
# BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X
# pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t
# aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t
# uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM
# iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw
# psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL
# zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR
# J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB
# 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX
# WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV
# PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE
# K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hrywDAi
# GA8yMDI0MDYxNzE3MzcwNFoYDzIwMjQwNjE4MTczNzA0WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqGvLAAgEAMAcCAQACAgF1MAcCAQACAhNLMAoCBQDqHERAAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAJ1eAqlPiHGpwnxBXrClAWpAmr+
# kRbR82PCeyaVF0f60L1GYFkOhqYu30i9UTIvp046gCdXFh1Uy1Cm82Wm52t8fd06
# c8GM/HqfnLlNfOwnYTHtk5NA9pge5Iy3eZmse//V6qFT0iqWPwjQhwe3ZuuNRXbP
# RC61gFMvhbRJY8DDcdzwJi0uGFtNSc9iL5Ok7B+eryXmczO924oq+eSct2rB8YmD
# 2C6wjqJFoPZRRsxR38/TsW2zYoCQZjjE3wDXBZH1mX1ZJgMHY2eruJGya9y/DLli
# zcGUOuS8sROTUXUVz9UcvaHc7YDGL+JUrsDVv5avc3gqqR5edlvvBG6NYE0xggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+
# MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDMfc8ZXfklHO7Bzvg1HUkHBgEV
# 40Ve1khTWr8PC3KuAzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0u
# MVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgd1orjL9g
# TJS8HYILm61dqtHwhC4Yw7WbOn59a6wVpQwwDQYJKoZIhvcNAQELBQAEggIAqNFz
# M+CJ/bepTEgm8bZg8sGcKCGbfH/2dTPKfvJqpePSOSgzEMciktk2Ijhd4wPIMvSq
# 6kZtZ0rqJsHrnpT0g8eCaVPSal8G3AFBSodVJhNobIpG8rcjVofYkaGFKgCmi+Ht
# mY7pDsFLmQOI5vMRzqBQnWWuNYfpIFAqJL9jCpQi++ZGI+i6etLFjHiQS7qnY2ZI
# c6fVSqDbbTyFsQxQ79ILZZA9MXKRTloPihWKx3IV6rUeGemUt6bdggveyQk9R1Wr
# Bkg/kKWImnH37jKMvr90kpxffsaAbu3Woz23lxx841ihipzIBEw6oHzgRmCCkHQj
# ScO88SMCOMhW/weEKFywutnEdErnnauphSJ4OhqOOPqqR+xG81FJCyBiXjEiCQi0
# gSShEhrA8xVfUSFDdlYorwT7ttp8rqfIAhR+ibjtWDDaExx0AOtsy2krAa/zNxoY
# lmoxgJji3O1W6eIj9mHuW4/OhvaOUqSIkh+Ymq1mYhILxqYGiaijtJ1rXOra3gFP
# LJ+53geghyfoayiQPa8pGzM3P0U7uYIeVnMfHP78UTXvHKFxdXyhk2OOAbMVACxo
# vgvt0xCSVGzYPmLFe3f/RTytI+C2rneLUykndvpfaQ076XftF6l6wzcSHrFJ67lj
# 6i6sLso46PpND7NkTfK+UCTiKeaL7pSAFqhoHZw=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1278.ps1 | 1278.ps1 |
function Convert-CSecureStringToString
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[Security.SecureString]
$SecureString
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$stringPtr = [Runtime.InteropServices.Marshal]::SecureStringToBSTR($SecureString)
return [Runtime.InteropServices.Marshal]::PtrToStringAuto($stringPtr)
}
|
combined_dataset/train/non-malicious/sample_44_98.ps1 | sample_44_98.ps1 | # Use this PowerShell script to register required cmdlets
# The script must be executed as local admin
.\cru.ps1 -installcmdlet CredRoamLocalUserData
.\cru.ps1 -installcmdlet CredRoamADUserData -AcceptEula
.\cru.ps1 -installcmdlet CredRoamLVRData -AcceptEula
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBYpmDFRNih906W
# OB/muVcsNnDHhKIWlScJwhMYqn/TraCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILf2SvNPMthqieQR6kHBwnVn
# 90cpIwqk4reRPXCNwiR9MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAvj2hYffz0elENyD7R4Rb/F19GLWC1RWAomadd/sNfS+JEdChhJPemQh0
# 0PI6Gkx91CQ2Pnoyq+kKTmZkokGNGG7jug3WuKWlMopnm+AEhF9x3C5Y/dEBS7xE
# ry+dkIP46aWeVSz207FDZ5XJqAqyc9gttmGfUKGm7TFHLM9FfqYjE4s3+bcgM4cn
# khDiZyxDL6asEzL0mQIXTGDQLNxtJBPiS3v0uNc69j0PXlxAl4aRG11HyXVY3It8
# SaDXqb8gVKfqP/GwTi7jhzzAA8uv5ItSRXqILxjT1AlHoAr8sjaIk6MFU4s0rcG0
# c+awXqmrVVGE9uqeZ2r8vcfZK9I+0qGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAZZhHFhq2TXvNT8wk4b7lLM+OM4jhMMgNRhxgDrAQEzgIGZfL2iOqY
# GBMyMDI0MDQwNDEzMzIzNC41NzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6bki+TAiGA8yMDI0MDQwNDEzMDA0
# MVoYDzIwMjQwNDA1MTMwMDQxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpuSL5
# AgEAMAcCAQACAgWSMAcCAQACAhQrMAoCBQDpunR5AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAG6kGrF8OPKLvjr6MfOFrIpgI6F1MzoB4llcwVfJ7r82vJVl
# ud6ZpIyzIm3mhhDyD/7nnH8IeZSprBoWBN+BywLkWSNIq/u6QsJZTGN4xpeOke6n
# XbA32Dzcf6InTo18ULy3zHOyuImUw1zbShPgEiK+QGQCMOrsQCpYBDPA7cGMkUxg
# 4MXo6LexolmOLAoEVxYM6ZKfXlD9qa4+JiD8tKXNoKKq3shhmzxZCSl3b6V+azPr
# SE16oOFtqx5sDO+6gW3SS7ThHW943rTKm8aBbR+I/7VAQhynepUA1qFsl7aS0Tsg
# ItnPvfFqOFuONglLlOF/xdvrZu+PptXQj1wBw/AxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCADO4sCQkzJurDLgjtC2K546FbgHEMoZXUb5+vjw/BxUTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh8
# 41sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgt7igPF7A2P+C3XkMIr4Ley+T4rM5
# P9laYvw+yA3hwZgwDQYJKoZIhvcNAQELBQAEggIAadBkqqpJIS2yZIAuugsfqPRM
# StH3b9eJwi7TMajngfCDw5fNzfpyGSB1BbL16VsegxhwkOfGI7ZhbCdqyBar+p0x
# nUIYxE6u3xiiSJ183Tp7y71RxT4RBuYTupCbT3RPsqK/Zq1fNKL5Z+jXyQSn6TS2
# 0cc7Hi0Q3gtGwFrghy+VFaA1WJcIlP4pgPQ7q1jSZVzUYCCFR7UVN0O2DVJWYkqw
# 3ESZUiiH/BoxTlxNCHbjmy6k98LUMwQ4wnmAlX2eyxyXd+dz+ZhXcKmo9AIwjA2Z
# LLdHFjhFVUIpGOltKo3OQnJ/rHGIpf7jI2usHF1NRwZdOIOEh4pBYZxTPhD75lsF
# rIx6uQj8CHO8Jy5MYzdMPA59UAoUcvVx5QthujGQTqSTb7RXwUH1SvgXQdH8Q8ff
# HbPkEtwicy4HyMGaGMhxJPNACjrooAp88R/44EdIMLP8kKZK79xGPTMTanq68yVF
# p/iCp/I9j2NFJWL2ICPopBAlNsxmHPz2gQ1isfbSkzTZqNz9cDWgUGuRfFdBJDPv
# XAEwArhme4HEdKS5kq/jMBGPSmwlgYDLZaD+WDAq+o5qUTEQmL2/dEeKCpW9HAgV
# FSPC82QIe9JD3P+7weWvmCc0rD+TAtaJM9tD/g4hjhLLu5eHFPQtkMp7nBVetE9F
# m4Kljkkmzb1zKw5KtzU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/New-SQLComputerLogin.ps1 | New-SQLComputerLogin.ps1 | function New-SQLComputerLogin {
param(
[Parameter(Mandatory=$True,Position=0)]
[String]$SQLServer,
[Parameter(Mandatory=$True,Position=1)]
[String]$ComputerName,
[Switch]$Force
)
## Import-Module QAD, SQLPS -DisableNameChecking
$Computer = Get-QADComputer $ComputerName
#$NTAccountName = $Computer.NTAccountName
#if(!$SID) { $SID = $Computer.SID.ToString() }
invoke-sqlcmd -ServerInstance $SQLServer -Query "CREATE LOGIN [$($Computer.NTAccountName)] FROM WINDOWS" -ErrorVariable SqlError -ErrorAction SilentlyContinue
## If this principal already exists, fail, or clean it out and recreate it:
if($SqlError[0].Exception.Message.EndsWith("already exists.")) {
if(!$Force) {
Write-Error $SqlError[0].Exception
} else {
$ExistingAccount =
invoke-sqlcmd -ServerInstance $SQLServer -Query "select name, sid, create_date from sys.server_principals where type IN ('U','G')" |
add-member -membertype ScriptProperty SSDL { new-object security.principal.securityidentifier $this.SID, 0 } -passthru |
where-object {$_.SSDL -eq $Computer.SID}
invoke-sqlcmd -ServerInstance $SQLServer -Query "DROP LOGIN [$($ExistingAccount.Name)]" -ErrorAction Stop
invoke-sqlcmd -ServerInstance $SQLServer -Query "CREATE LOGIN [$($Computer.NTAccountName)] FROM WINDOWS"
}
}
}
|
combined_dataset/train/non-malicious/2332.ps1 | 2332.ps1 |
[CmdletBinding()]
[OutputType('Selected.Microsoft.Management.Infrastructure.CimInstance')]
param ()
begin {
$ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop
Set-StrictMode -Version Latest
}
process {
try {
$DhcpServers = Get-DhcpServerInDC | where { Test-Connection -ComputerName $_.DnsName -Quiet -Count 1 } | Select-Object -ExpandProperty DnsName
foreach ($DhcpServer in $DhcpServers) {
try {
try { $Scopes = Get-DhcpServerv4Scope -ComputerName $DhcpServer } catch {Write-Warning -Message "Error: $($_.Exception.Message)"}
foreach ($Scope in $Scopes) {
try { Get-DhcpServerv4Lease -ComputerName $DhcpServer -ScopeId $Scope.ScopeId | Select-Object * -ExcludeProperty 'Cim*' } catch { Write-Warning -Message "Error: $($_.Exception.Message)" }
}
} catch {
Write-Error -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)"
}
}
} catch {
Write-Error -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)"
}
} |
combined_dataset/train/non-malicious/sample_3_35.ps1 | sample_3_35.ps1 | #************************************************
# TS_EventLogStoppedGPPCheck.ps1
# Version 1.0.1
# Date: 4/3/2013
# Author: v-blchen
# Description: [Idea ID 7018] [Windows] Event Log Service won't start
# Rule number: 7018
# Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=7018
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber 7018
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_EventLogStoppedGPPCheck"
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
Function AppliesToSystem
{
return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) #Windows Sever 2008
}
Function IsGPPRegionalOptionsTurnedOn
{
$GroupPolicyHistoryPath = "$Env:APPDATA\..\Local\Microsoft\Group Policy\History"
if(Test-Path $GroupPolicyHistoryPath)
{
$RegionalOptionsXmlList = Get-childitem $GroupPolicyHistoryPath -Name 'RegionalOptions.xml' -recurse
if($null -ne $RegionalOptionsXmlList)
{
foreach($RegionalOptionsXmlPath in $RegionalOptionsXmlList)
{
[xml]$RegionalOptionsContent = get-content (join-Path $GroupPolicyHistoryPath $RegionalOptionsXmlPath)
if($null -ne $RegionalOptionsContent.Regional)
{
return $true
}
}
}
}
return $false
}
Function CheckHotFixKB951430Installed
{
$GpprefclDLLPath = join-path $env:windir "system32\Gpprefcl.dll"
if(CheckMinimalFileVersion $GpprefclDLLPath 6 0 6001 22474)
{
return $true
}
else
{
"Microsoft KB 951430 is not installed" | WriteTo-StdOut
return $false
}
}
Function EventLogServiceStoppedGPPCheck
{
if(IsGPPRegionalOptionsTurnedOn)
{
if(!(CheckHotFixKB951430Installed))
{
$EventLogService = Get-CimInstance win32_service -filter "name='eventlog'"
if(($EventLogService.State -eq 'stopped') -and ($EventLogService.ExitCode -eq 87))
{
"Event Log Service is stopped by invalid parameter" | WriteTo-StdOut
$InformationCollected | add-member -membertype noteproperty -name "GPP Enabled" -value "True"
$InformationCollected | add-member -membertype noteproperty -name "Event Log Service State" -value ($EventLogService.State)
$InformationCollected | add-member -membertype noteproperty -name "Event Log Service Exit Code" -value ($EventLogService.ExitCode)
return $true
}
}
}
else
{
"Group Policy Preferences is not turn on" | WriteTo-StdOut
}
return $false
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if (AppliesToSystem)
{
$RuleApplicable = EventLogServiceStoppedGPPCheck
if ($RuleApplicable)
{
$RootCauseDetected = $true
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZZfHGZy1pAnfq
# Rsgm4vu1YygtbCHTK2Pq8+Lt8fkNW6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEb6
# Dmyql//KTWUmNfSzluTedloMTurmUbg2TfpQklmdMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAfuPrgcK6BcdafuYE1PO5TzL7d+cLezzix28p
# C9JwYNVFO0iGsBQ1Dm3TmMDB7rjWimko6NhVLegv4QJHIFVN1wvKHbABKS1kYpIm
# q3LV3xWrQGXZeg8GgUIjCNrRvY3ukpFKeyoHe46CJolqpRxmru/aE6F4f/9p+XWs
# D/xWkC6pCotGWAdx6RL1HjC2aJOReEmAYvkmor0/kBEGh97MimwEjFD/JejDU6o6
# cIql8Ogupj1iKG/+7qdCeSqTUCP4ZBPWWQ8SUmGMmEad0LbeHwXgJT88Oq1Bv5Iu
# 4mPcojzk12Uj1SU8zAO8sa/1fEz9/0WUAgxcxx2NrQussMR4FaGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBOXDVcZGEo7bGlvG/r1qcGe4KqOB7GfBs2
# HKuZ8U9DawIGZut4BYxlGBMyMDI0MTAyODExNDA0MC4zOTFaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ
# lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38
# 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC
# fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D
# cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA
# ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT
# M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB
# Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo
# u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0
# PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88
# 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv
# eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/
# 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4
# Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6
# I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa
# QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV
# 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS
# s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5
# WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q
# 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK
# CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi
# TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y
# Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0
# MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA
# AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3
# UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS
# TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3
# FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO
# RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB
# NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQg+2V3l6LKFPA6zuTcrBKRjuIrHq636HD1exWRmdDDPhAwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT
# hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1
# KYILMA0GCSqGSIb3DQEBCwUABIICAKlZiimVU6rLk2n7c8nsfAIjJy7NBd1YbvM1
# Yb7ddJhI/7tJfpkrZX8k6DAnvDWnZkylq0B3PnLXRkrLWVnlU5eeX0KOtIjN96th
# K/T7GxIS5BTL+Kz6j+OstHBJEfvo1kJw9V6COUMiVt6el+IKDPCcQDcDR+LZU0Sf
# lbeUe4kOWbZgMfxxWPb7N/vRCtOWSyJsktm9stIr4Y9pzGbQ7bWskgw1tYoI55lz
# HeMfomm4trh2Qc93JMBaPwnGQUkk7o1mQmkYCiBRfqsEPY8D9q+oKOfkNXEudJne
# f582F7Kk8UxlVBDK+m9cofmIFQHy58pgRAT1V9JijqQ2Np1ioFP0ee+UiXrLK5dO
# tJpt1rTMVf1NnmDTAGo3TIKhPAVpLq+0iw8MpNGRIfSRIejhKv0qDSOfK5+qWxFU
# bKl2Qqv5lN0J8xsY4Jo6wjYxJo9T4mADuAXIX+BSVf0hNn5iNgqrmiSviBJvldCe
# m5mHPxDWQ2NW8LpJYCIWMmMsE86rrEpOHwYaHcDnXKAzzjxjc6haKAS+dO0CAFdn
# dfnzPzAgwwuslq5lG7R4Cwjsd9TsoiA4uQgfy0qUd2m8Y+ydC8U8D9l00idZ/RS6
# n0k6eJDsu/5VkNgmeExcJGx6ebxcDCQIEQKvF69L7TL/vKQ6KWgR65rX02J44D6x
# BFaktMxC
# SIG # End signature block
|
combined_dataset/train/non-malicious/wlanscan.ps1 | wlanscan.ps1 | # -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=
# Name: wlanscan
# Author: Kris Cieslak (defaultset.blogspot.com)
# Date: 2010-04-03
# Description: Simple script that uses netsh to show wireless networks.
#
# Parameters: wireless interface name (optional,but recommended if you have
# more than one card)
# Result: $ActiveNetworks
# Usage example: wlanscan WiFi
#
# -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-
PARAM ($ifname = "")
# Windows Vista/2008/7
if ((gwmi win32_operatingsystem).Version.Split(".")[0] -lt 6) {
throw "This script works on Windows Vista or higher."
}
if ((gsv "wlansvc").Status -ne "Running" ) {
throw "WLAN AutoConfig service must be running."
}
$GLOBAL:ActiveNetworks = @();
$CurrentIfName = "";
$n = -1;
$iftest = $false;
netsh wlan show network mode=bssid | % {
if ( $_ -match "Interface") {
$CurrentIfName = [regex]::match($_.Replace("Interface name : ","")
,"\\w{1,}").ToString();
if (($CurrentIfName.ToLower() -eq $ifname.ToLower()) -or ($ifname.length -eq 0)) {
$iftest=$true;
} else { $iftest=$false }
}
$buf = [regex]::replace($_,"[ ]","");
if ([regex]::IsMatch($buf,"^SSID\\d{1,}(.)*") -and $iftest) {
$item = "" | Select-Object SSID,NetType,Auth,Encryption,BSSID,Signal,Radiotype,Channel;
$n+=1;
$item.SSID = [regex]::Replace($buf,"^SSID\\d{1,}:","");
$GLOBAL:ActiveNetworks+=$item;
}
if ([regex]::IsMatch($buf,"Networktype") -and $iftest) {
$GLOBAL:ActiveNetworks[$n].NetType=$buf.Replace("Networktype:","");
}
if ([regex]::IsMatch($buf,"Authentication") -and $iftest) {
$GLOBAL:ActiveNetworks[$n].Auth=$buf.Replace("Authentication:","");
}
if ([regex]::IsMatch($buf,"Encryption") -and $iftest) {
$GLOBAL:ActiveNetworks[$n].Encryption=$buf.Replace("Encryption:","");
}
if ([regex]::IsMatch($buf,"BSSID1") -and $iftest) {
$GLOBAL:ActiveNetworks[$n].BSSID=$buf.Replace("BSSID1:","");
}
if ([regex]::IsMatch($buf,"Signal") -and $iftest) {
$GLOBAL:ActiveNetworks[$n].Signal=$buf.Replace("Signal:","");
}
if ([regex]::IsMatch($buf,"Radiotype") -and $iftest) {
$GLOBAL:ActiveNetworks[$n].Radiotype=$buf.Replace("Radiotype:","");
}
if ([regex]::IsMatch($buf,"Channel") -and $iftest) {
$GLOBAL:ActiveNetworks[$n].Channel=$buf.Replace("Channel:","");
}
}
if ( ($CurrentIfName.ToLower() -eq $ifname.ToLower()) -or ($ifname.length -eq 0) ) {
write-host -ForegroundColor Yellow "`nInterface: "$CurrentIfName;
if (($GLOBAL:ActiveNetworks.length -gt 0)) {
$GLOBAL:ActiveNetworks | Sort-Object Signal -Descending |
ft @{Label = "BSSID"; Expression={$_.BSSID };width=18},
@{Label = "Channel"; Expression={$_.Channel};width=8},
@{Label = "Signal"; Expression={$_.Signal};width=7},
@{Label = "Encryption"; Expression={$_.Encryption};width=11},
@{Label = "Authentication"; Expression={$_.Auth};width=15},
SSID
} else {
Write-host "`n No active networks found.`n";
}
} else {
Write-host -ForegroundColor Red "`n Could not find interface: "$ifname"`n";
}
|
combined_dataset/train/non-malicious/3951.ps1 | 3951.ps1 |
function Test-GetAvailableAliasList
{
$location = Get-ProviderLocation ResourceManagement
try
{
$results = Get-AzAvailableServiceAlias -Location $location;
Assert-NotNull $results;
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/251.ps1 | 251.ps1 | Function Invoke-Ping
{
[cmdletbinding(DefaultParameterSetName = 'Ping')]
param (
[Parameter(ValueFromPipeline = $true,
ValueFromPipelineByPropertyName = $true,
Position = 0)]
[string[]]$ComputerName,
[Parameter(ParameterSetName = 'Detail')]
[validateset("*", "WSMan", "RemoteReg", "RPC", "RDP", "SMB")]
[string[]]$Detail,
[Parameter(ParameterSetName = 'Ping')]
[switch]$Quiet,
[int]$Timeout = 20,
[int]$Throttle = 100,
[switch]$NoCloseOnTimeout
)
Begin
{
function Invoke-Parallel
{
[cmdletbinding(DefaultParameterSetName = 'ScriptBlock')]
Param (
[Parameter(Mandatory = $false, position = 0, ParameterSetName = 'ScriptBlock')]
[System.Management.Automation.ScriptBlock]$ScriptBlock,
[Parameter(Mandatory = $false, ParameterSetName = 'ScriptFile')]
[ValidateScript({ test-path $_ -pathtype leaf })]
$ScriptFile,
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
[Alias('CN', '__Server', 'IPAddress', 'Server', 'ComputerName')]
[PSObject]$InputObject,
[PSObject]$Parameter,
[switch]$ImportVariables,
[switch]$ImportModules,
[int]$Throttle = 20,
[int]$SleepTimer = 200,
[int]$RunspaceTimeout = 0,
[switch]$NoCloseOnTimeout = $false,
[int]$MaxQueue,
[validatescript({ Test-Path (Split-Path $_ -parent) })]
[string]$LogFile = "C:\temp\log.log",
[switch]$Quiet = $false
)
Begin
{
if (-not $PSBoundParameters.ContainsKey('MaxQueue'))
{
if ($RunspaceTimeout -ne 0) { $script:MaxQueue = $Throttle }
else { $script:MaxQueue = $Throttle * 3 }
}
else
{
$script:MaxQueue = $MaxQueue
}
Write-Verbose "Throttle: '$throttle' SleepTimer '$sleepTimer' runSpaceTimeout '$runspaceTimeout' maxQueue '$maxQueue' logFile '$logFile'"
if ($ImportVariables -or $ImportModules)
{
$StandardUserEnv = [powershell]::Create().addscript({
$Modules = Get-Module | Select-Object -ExpandProperty Name
$Snapins = Get-PSSnapin | Select-Object -ExpandProperty Name
$Variables = Get-Variable | Select-Object -ExpandProperty Name
@{
Variables = $Variables
Modules = $Modules
Snapins = $Snapins
}
}).invoke()[0]
if ($ImportVariables)
{
Function _temp { [cmdletbinding()]
param () }
$VariablesToExclude = @((Get-Command _temp | Select-Object -ExpandProperty parameters).Keys + $PSBoundParameters.Keys + $StandardUserEnv.Variables)
Write-Verbose "Excluding variables $(($VariablesToExclude | Sort-Object) -join ", ")"
$UserVariables = @(Get-Variable | Where-Object { -not ($VariablesToExclude -contains $_.Name) })
Write-Verbose "Found variables to import: $(($UserVariables | Select-Object -expandproperty Name | Sort-Object) -join ", " | Out-String).`n"
}
if ($ImportModules)
{
$UserModules = @(Get-Module | Where-Object { $StandardUserEnv.Modules -notcontains $_.Name -and (Test-Path $_.Path -ErrorAction SilentlyContinue) } | Select-Object -ExpandProperty Path)
$UserSnapins = @(Get-PSSnapin | Select-Object -ExpandProperty Name | Where-Object { $StandardUserEnv.Snapins -notcontains $_ })
}
}
Function Get-RunspaceData
{
[cmdletbinding()]
param ([switch]$Wait)
Do
{
$more = $false
if (-not $Quiet)
{
Write-Progress -Activity "Running Query" -Status "Starting threads"`
-CurrentOperation "$startedCount threads defined - $totalCount input objects - $script:completedCount input objects processed"`
-PercentComplete $(Try { $script:completedCount / $totalCount * 100 }
Catch { 0 })
}
Foreach ($runspace in $runspaces)
{
$currentdate = Get-Date
$runtime = $currentdate - $runspace.startTime
$runMin = [math]::Round($runtime.totalminutes, 2)
$log = "" | Select-Object Date, Action, Runtime, Status, Details
$log.Action = "Removing:'$($runspace.object)'"
$log.Date = $currentdate
$log.Runtime = "$runMin minutes"
If ($runspace.Runspace.isCompleted)
{
$script:completedCount++
if ($runspace.powershell.Streams.Error.Count -gt 0)
{
$log.status = "CompletedWithErrors"
Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1]
foreach ($ErrorRecord in $runspace.powershell.Streams.Error)
{
Write-Error -ErrorRecord $ErrorRecord
}
}
else
{
$log.status = "Completed"
Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1]
}
$runspace.powershell.EndInvoke($runspace.Runspace)
$runspace.powershell.dispose()
$runspace.Runspace = $null
$runspace.powershell = $null
}
ElseIf ($runspaceTimeout -ne 0 -and $runtime.totalseconds -gt $runspaceTimeout)
{
$script:completedCount++
$timedOutTasks = $true
$log.status = "TimedOut"
Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1]
Write-Error "Runspace timed out at $($runtime.totalseconds) seconds for the object:`n$($runspace.object | out-string)"
if (!$noCloseOnTimeout) { $runspace.powershell.dispose() }
$runspace.Runspace = $null
$runspace.powershell = $null
$completedCount++
}
ElseIf ($runspace.Runspace -ne $null)
{
$log = $null
$more = $true
}
if ($logFile -and $log)
{
($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] | out-file $LogFile -append
}
}
$temphash = $runspaces.clone()
$temphash | Where-Object { $_.runspace -eq $Null } | ForEach-Object {
$Runspaces.remove($_)
}
if ($PSBoundParameters['Wait']) { Start-Sleep -milliseconds $SleepTimer }
}
while ($more -and $PSBoundParameters['Wait'])
}
if ($PSCmdlet.ParameterSetName -eq 'ScriptFile')
{
$ScriptBlock = [scriptblock]::Create($(Get-Content $ScriptFile | out-string))
}
elseif ($PSCmdlet.ParameterSetName -eq 'ScriptBlock')
{
[string[]]$ParamsToAdd = '$_'
if ($PSBoundParameters.ContainsKey('Parameter'))
{
$ParamsToAdd += '$Parameter'
}
$UsingVariableData = $Null
if ($PSVersionTable.PSVersion.Major -gt 2)
{
$UsingVariables = $ScriptBlock.ast.FindAll({ $args[0] -is [System.Management.Automation.Language.UsingExpressionAst] }, $True)
If ($UsingVariables)
{
$List = New-Object 'System.Collections.Generic.List`1[System.Management.Automation.Language.VariableExpressionAst]'
ForEach ($Ast in $UsingVariables)
{
[void]$list.Add($Ast.SubExpression)
}
$UsingVar = $UsingVariables | Group-Object Parent | ForEach-Object { $_.Group | Select-Object -First 1 }
$UsingVariableData = ForEach ($Var in $UsingVar)
{
Try
{
$Value = Get-Variable -Name $Var.SubExpression.VariablePath.UserPath -ErrorAction Stop
$NewName = ('$__using_{0}' -f $Var.SubExpression.VariablePath.UserPath)
[pscustomobject]@{
Name = $Var.SubExpression.Extent.Text
Value = $Value.Value
NewName = $NewName
NewVarName = ('__using_{0}' -f $Var.SubExpression.VariablePath.UserPath)
}
$ParamsToAdd += $NewName
}
Catch
{
Write-Error "$($Var.SubExpression.Extent.Text) is not a valid Using: variable!"
}
}
$NewParams = $UsingVariableData.NewName -join ', '
$Tuple = [Tuple]::Create($list, $NewParams)
$bindingFlags = [Reflection.BindingFlags]"Default,NonPublic,Instance"
$GetWithInputHandlingForInvokeCommandImpl = ($ScriptBlock.ast.gettype().GetMethod('GetWithInputHandlingForInvokeCommandImpl', $bindingFlags))
$StringScriptBlock = $GetWithInputHandlingForInvokeCommandImpl.Invoke($ScriptBlock.ast, @($Tuple))
$ScriptBlock = [scriptblock]::Create($StringScriptBlock)
Write-Verbose $StringScriptBlock
}
}
$ScriptBlock = $ExecutionContext.InvokeCommand.NewScriptBlock("param($($ParamsToAdd -Join ", "))`r`n" + $Scriptblock.ToString())
}
else
{
Throw "Must provide ScriptBlock or ScriptFile"; Break
}
Write-Debug "`$ScriptBlock: $($ScriptBlock | Out-String)"
Write-Verbose "Creating runspace pool and session states"
$sessionstate = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault()
if ($ImportVariables)
{
if ($UserVariables.count -gt 0)
{
foreach ($Variable in $UserVariables)
{
$sessionstate.Variables.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateVariableEntry -ArgumentList $Variable.Name, $Variable.Value, $null))
}
}
}
if ($ImportModules)
{
if ($UserModules.count -gt 0)
{
foreach ($ModulePath in $UserModules)
{
$sessionstate.ImportPSModule($ModulePath)
}
}
if ($UserSnapins.count -gt 0)
{
foreach ($PSSnapin in $UserSnapins)
{
[void]$sessionstate.ImportPSSnapIn($PSSnapin, [ref]$null)
}
}
}
$runspacepool = [runspacefactory]::CreateRunspacePool(1, $Throttle, $sessionstate, $Host)
$runspacepool.Open()
Write-Verbose "Creating empty collection to hold runspace jobs"
$Script:runspaces = New-Object System.Collections.ArrayList
$global:__bound = $false
$allObjects = @()
if ($PSBoundParameters.ContainsKey("inputObject"))
{
$global:__bound = $true
}
if ($LogFile)
{
New-Item -ItemType file -path $logFile -force | Out-Null
("" | Select-Object Date, Action, Runtime, Status, Details | ConvertTo-Csv -NoTypeInformation -Delimiter ";")[0] | Out-File $LogFile
}
$log = "" | Select-Object Date, Action, Runtime, Status, Details
$log.Date = Get-Date
$log.Action = "Batch processing started"
$log.Runtime = $null
$log.Status = "Started"
$log.Details = $null
if ($logFile)
{
($log | convertto-csv -Delimiter ";" -NoTypeInformation)[1] | Out-File $LogFile -Append
}
$timedOutTasks = $false
}
Process
{
if (-not $global:__bound)
{
$allObjects += $inputObject
}
else
{
$allObjects = $InputObject
}
}
End
{
Try
{
$totalCount = $allObjects.count
$script:completedCount = 0
$startedCount = 0
foreach ($object in $allObjects)
{
$powershell = [powershell]::Create()
if ($VerbosePreference -eq 'Continue')
{
[void]$PowerShell.AddScript({ $VerbosePreference = 'Continue' })
}
[void]$PowerShell.AddScript($ScriptBlock).AddArgument($object)
if ($parameter)
{
[void]$PowerShell.AddArgument($parameter)
}
if ($UsingVariableData)
{
Foreach ($UsingVariable in $UsingVariableData)
{
Write-Verbose "Adding $($UsingVariable.Name) with value: $($UsingVariable.Value)"
[void]$PowerShell.AddArgument($UsingVariable.Value)
}
}
$powershell.RunspacePool = $runspacepool
$temp = "" | Select-Object PowerShell, StartTime, object, Runspace
$temp.PowerShell = $powershell
$temp.StartTime = Get-Date
$temp.object = $object
$temp.Runspace = $powershell.BeginInvoke()
$startedCount++
Write-Verbose ("Adding {0} to collection at {1}" -f $temp.object, $temp.starttime.tostring())
$runspaces.Add($temp) | Out-Null
Get-RunspaceData
$firstRun = $true
while ($runspaces.count -ge $Script:MaxQueue)
{
if ($firstRun)
{
Write-Verbose "$($runspaces.count) items running - exceeded $Script:MaxQueue limit."
}
$firstRun = $false
Get-RunspaceData
Start-Sleep -Milliseconds $sleepTimer
}
}
Write-Verbose ("Finish processing the remaining runspace jobs: {0}" -f (@($runspaces | Where-Object { $_.Runspace -ne $Null }).Count))
Get-RunspaceData -wait
if (-not $quiet)
{
Write-Progress -Activity "Running Query" -Status "Starting threads" -Completed
}
}
Finally
{
if (($timedOutTasks -eq $false) -or (($timedOutTasks -eq $true) -and ($noCloseOnTimeout -eq $false)))
{
Write-Verbose "Closing the runspace pool"
$runspacepool.close()
}
[gc]::Collect()
}
}
}
Write-Verbose "PSBoundParameters = $($PSBoundParameters | Out-String)"
$bound = $PSBoundParameters.keys -contains "ComputerName"
if (-not $bound)
{
[System.Collections.ArrayList]$AllComputers = @()
}
}
Process
{
if ($bound)
{
$AllComputers = $ComputerName
}
Else
{
foreach ($Computer in $ComputerName)
{
$AllComputers.add($Computer) | Out-Null
}
}
}
End
{
$params = @($Detail, $Quiet)
$splat = @{
Throttle = $Throttle
RunspaceTimeout = $Timeout
InputObject = $AllComputers
parameter = $params
}
if ($NoCloseOnTimeout)
{
$splat.add('NoCloseOnTimeout', $True)
}
Invoke-Parallel @splat -ScriptBlock {
$computer = $_.trim()
$detail = $parameter[0]
$quiet = $parameter[1]
if ($detail)
{
Try
{
Function Test-Server
{
[cmdletBinding()]
param (
[parameter(
Mandatory = $true,
ValueFromPipeline = $true)]
[string[]]$ComputerName,
[switch]$All,
[parameter(Mandatory = $false)]
[switch]$CredSSP,
[switch]$RemoteReg,
[switch]$RDP,
[switch]$RPC,
[switch]$SMB,
[switch]$WSMAN,
[switch]$IPV6,
[Management.Automation.PSCredential]$Credential
)
begin
{
$total = Get-Date
$results = @()
if ($credssp -and -not $Credential)
{
Throw "Must supply Credentials with CredSSP test"
}
[string[]]$props = write-output Name, IP, Domain, Ping, WSMAN, CredSSP, RemoteReg, RPC, RDP, SMB
$Hash = @{ }
foreach ($prop in $props)
{
$Hash.Add($prop, $null)
}
function Test-Port
{
[cmdletbinding()]
Param (
[string]$srv,
$port = 135,
$timeout = 3000
)
$ErrorActionPreference = "SilentlyContinue"
$tcpclient = new-Object system.Net.Sockets.TcpClient
$iar = $tcpclient.BeginConnect($srv, $port, $null, $null)
$wait = $iar.AsyncWaitHandle.WaitOne($timeout, $false)
if (-not $wait)
{
$tcpclient.Close()
Write-Verbose "Connection Timeout to $srv`:$port"
$false
}
else
{
Try
{
$tcpclient.EndConnect($iar) | out-Null
$true
}
Catch
{
write-verbose "Error for $srv`:$port`: $_"
$false
}
$tcpclient.Close()
}
}
}
process
{
foreach ($name in $computername)
{
$dt = $cdt = Get-Date
Write-verbose "Testing: $Name"
$failed = 0
try
{
$DNSEntity = [Net.Dns]::GetHostEntry($name)
$domain = ($DNSEntity.hostname).replace("$name.", "")
$ips = $DNSEntity.AddressList | ForEach-Object{
if (-not (-not $IPV6 -and $_.AddressFamily -like "InterNetworkV6"))
{
$_.IPAddressToString
}
}
}
catch
{
$rst = New-Object -TypeName PSObject -Property $Hash | Select-Object -Property $props
$rst.name = $name
$results += $rst
$failed = 1
}
Write-verbose "DNS: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
if ($failed -eq 0)
{
foreach ($ip in $ips)
{
$rst = New-Object -TypeName PSObject -Property $Hash | Select-Object -Property $props
$rst.name = $name
$rst.ip = $ip
$rst.domain = $domain
if ($RDP -or $All)
{
try
{
$socket = New-Object Net.Sockets.TcpClient($name, 3389) -ErrorAction stop
if ($socket -eq $null)
{
$rst.RDP = $false
}
else
{
$rst.RDP = $true
$socket.close()
}
}
catch
{
$rst.RDP = $false
Write-Verbose "Error testing RDP: $_"
}
}
Write-verbose "RDP: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
if (test-connection $ip -count 2 -Quiet)
{
Write-verbose "PING: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
$rst.ping = $true
if ($WSMAN -or $All)
{
try
{
Test-WSMan $ip -ErrorAction stop | Out-Null
$rst.WSMAN = $true
}
catch
{
$rst.WSMAN = $false
Write-Verbose "Error testing WSMAN: $_"
}
Write-verbose "WSMAN: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
if ($rst.WSMAN -and $credssp)
{
try
{
Test-WSMan $ip -Authentication Credssp -Credential $cred -ErrorAction stop
$rst.CredSSP = $true
}
catch
{
$rst.CredSSP = $false
Write-Verbose "Error testing CredSSP: $_"
}
Write-verbose "CredSSP: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
}
}
if ($RemoteReg -or $All)
{
try
{
[Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine, $ip) | Out-Null
$rst.remotereg = $true
}
catch
{
$rst.remotereg = $false
Write-Verbose "Error testing RemoteRegistry: $_"
}
Write-verbose "remote reg: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
}
if ($RPC -or $All)
{
try
{
$w = [wmi] ''
$w.psbase.options.timeout = 15000000
$w.path = "\\$Name\root\cimv2:Win32_ComputerSystem.Name='$Name'"
$w | Select-Object none | Out-Null
$rst.RPC = $true
}
catch
{
$rst.rpc = $false
Write-Verbose "Error testing WMI/RPC: $_"
}
Write-verbose "WMI/RPC: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
}
if ($SMB -or $All)
{
try
{
$path = "\\$name\c$"
Push-Location -Path $path -ErrorAction stop
$rst.SMB = $true
Pop-Location
}
catch
{
$rst.SMB = $false
Write-Verbose "Error testing SMB: $_"
}
Write-verbose "SMB: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
}
}
else
{
$rst.ping = $false
$rst.wsman = $false
$rst.credssp = $false
$rst.remotereg = $false
$rst.rpc = $false
$rst.smb = $false
}
$results += $rst
}
}
Write-Verbose "Time for $($Name): $((New-TimeSpan $cdt ($dt)).totalseconds)"
Write-Verbose "----------------------------"
}
}
end
{
Write-Verbose "Time for all: $((New-TimeSpan $total ($dt)).totalseconds)"
Write-Verbose "----------------------------"
return $results
}
}
$TestServerParams = @{
ComputerName = $Computer
ErrorAction = "Stop"
}
if ($detail -eq "*")
{
$detail = "WSMan", "RemoteReg", "RPC", "RDP", "SMB"
}
$detail | Select-Object -Unique | Foreach-Object { $TestServerParams.add($_, $True) }
Test-Server @TestServerParams | Select-Object -Property $("Name", "IP", "Domain", "Ping" + $detail)
}
Catch
{
Write-Warning "Error with Test-Server: $_"
}
}
else
{
Try
{
$result = $null
if ($result = @(Test-Connection -ComputerName $computer -Count 2 -erroraction Stop))
{
$Output = $result | Select-Object -first 1 -Property Address,
IPV4Address,
IPV6Address,
ResponseTime,
@{ label = "STATUS"; expression = { "Responding" } }
if ($quiet)
{
$Output.address
}
else
{
$Output
}
}
}
Catch
{
if (-not $quiet)
{
if ($_ -match "No such host is known")
{
$status = "Unknown host"
}
elseif ($_ -match "Error due to lack of resources")
{
$status = "No Response"
}
else
{
$status = "Error: $_"
}
"" | Select-Object -Property @{ label = "Address"; expression = { $computer } },
IPV4Address,
IPV6Address,
ResponseTime,
@{ label = "STATUS"; expression = { $status } }
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/sample_11_45.ps1 | sample_11_45.ps1 | Signature-Version: 1.0
SHA-256-Digest-Manifest-Main-Attributes: g/TqwshCROFJVmhV1QEn61Fg1W2Oo
tyaowJxbJy6WMI=
SHA-256-Digest-Manifest: sLmosxa9qYRSiP8Jdd0CG1edmUi8x/G3yNnagMjj5Lc=
Created-By: 1.8.0_112 (Oracle Corporation)
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppServiceS
ubscription.class
SHA-256-Digest: +/Y04Ue8jByMXkPUOD6ilMcsil6ij/4d+ATD5aCH108=
Name: com/microsoft/azure/toolkit/lib/appservice/model/FlexConsumption
Configuration$FlexConsumptionConfigurationBuilder.class
SHA-256-Digest: 9sr8teyZlT6wnIf6E1XrwQktQtnZZ9kIlYUTPyTAGQ8=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceConfi
gUtils.class
SHA-256-Digest: 4IZOpny7k18BI0sVYnfq5BjyFWTMfmZx1c6HpYVrnvI=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/MSFunctionDepl
oyHandler.class
SHA-256-Digest: vvhVq1rMYppX6spnAV3laes7GSOUOL9yFSUJ1xSgg3w=
Name: com/microsoft/azure/toolkit/lib/appservice/config/FunctionAppCon
fig.class
SHA-256-Digest: bGczubxa9YzxhXuDdQ3a9RV2zROYkw0DZu29O05vCZs=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DiagnosticConfi
g$DiagnosticConfigBuilder.class
SHA-256-Digest: MgD3Tu8BI4Qywe38EE2hKija3lkaq9/U2zTY24qwHC0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F
unctionExtensionVersion.class
SHA-256-Digest: lpdkgCwfLfs9k791wvEmGqe9aBzT+xxE/66d4qq64ow=
Name: com/microsoft/azure/toolkit/lib/appservice/model/WebContainer.cl
ass
SHA-256-Digest: h9t81EzXrtCFyTqSt/Om3GBjiLJEIfPZXbJ5fj/UExk=
Name: com/microsoft/azure/toolkit/lib/legacy/docker/IDockerCredentialP
rovider.class
SHA-256-Digest: tqdIUMcBUh1yOXp7EzqdCu0Bu/R6x8b6oc7g4W0Qqwo=
Name: com/microsoft/azure/toolkit/lib/appservice/model/CsmDeploymentSt
atus$CsmDeploymentStatusBuilder.class
SHA-256-Digest: zwcePs51L8yPCvjJ6y3/hoeMT+qGInagt8Y3Wyv4N6w=
Name: com/microsoft/azure/toolkit/lib/appservice/model/KuduDeploymentR
esult$KuduDeploymentResultBuilder.class
SHA-256-Digest: m7ernkfoEMEMkA275U95hJ8V4kmW16/fKalKuIHplcM=
Name: com/microsoft/azure/toolkit/lib/appservice/model/CsmDeploymentSt
atus.class
SHA-256-Digest: jQ7DmCLKTHgIgC+ocqmovfBaZGwEpU9EX5w5HynbpTM=
Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi
le$PublishingProfileBuilder.class
SHA-256-Digest: u62b3m93DOk91ibvwqBhiSz4NYYh0EeXxExK+ry77us=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
Enum$Direction.class
SHA-256-Digest: ZhLtD2MMFHrvhtS3eFcWTiytRHcok5LfROiJRa63VAc=
Name: com/microsoft/azure/toolkit/lib/appservice/model/PricingTier.cla
ss
SHA-256-Digest: 4XIx6/uKAdcBFDemL6imd1g/WxPmuBJPrnJT8UoZymA=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/AzureWebApp.cl
ass
SHA-256-Digest: 7/qQU2o+uobT9HdPg6cpssR3UQ6nyJ4E3ZCTJ2Hs9zE=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R
etry$1.class
SHA-256-Digest: hCs3Ny/AhteTjySj1qH36NlP5A4iX9JiDuQB29Zh2JM=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppB
ase$1.class
SHA-256-Digest: 6y2UwGOrboPUmkApA1kjO0y6Gm9zOn4CdGZuXUbCdOY=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FlexFunctionDe
ployHandler.class
SHA-256-Digest: SJfUywgU0sAk+jHkiAFX75+mo4Toob1PVy4oOB9cExs=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromZipFunc
tionDeployHandler.class
SHA-256-Digest: sO9matz3oGzlX6VaUo+kH845N72cJ7XtrZJ5qszduvE=
Name: META-INF/aop-ajc.xml
SHA-256-Digest: Lmh7xWtzJ24Mbar0uNGgL4hM5bECwwFmQH/7y4FVnxo=
Name: com/microsoft/azure/toolkit/lib/appservice/file/IProcessClient.c
lass
SHA-256-Digest: jpC/cye6JFxVFfXxYHK1Ktaqf5YTTv/n3hm7MPLbHUc=
Name: com/microsoft/azure/toolkit/lib/appservice/config/RuntimeConfig.
class
SHA-256-Digest: veXfHDQK0xCTPRLDQ7u6Dl9Z/uE1OcXpsdSXjoYkcG4=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebApp.class
SHA-256-Digest: U+8iTbq2hD3jm8gZ3mJ/7rDOTuhZSNSNygEHeK47gow=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
$1.class
SHA-256-Digest: mWAePnqPjeshyBrre/NDU9fbLjwxT6m/HhoLjVbVKv8=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
$BindingEntity.class
SHA-256-Digest: wsUtfIC0EVwz0xIFaV4cu/NpXlkLihfnkQYWvDswSjU=
Name: com/microsoft/azure/toolkit/lib/appservice/AzureAppService.class
SHA-256-Digest: wUVumzYvgOqmVx74AN/vML1sjgGNVMcc9JxhC+OtD5Y=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
raft.class
SHA-256-Digest: y2IsbEFV60CNv4dULIZynTUuGpTCPnGoC0AUfvS3Q34=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionPackager$1.class
SHA-256-Digest: 3L1DLDswjBy/oFd++Lh/Z19l8YVdjXiK1NcGEJ+92Sc=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppBase.cla
ss
SHA-256-Digest: 04zlf6v8nXv+1wxSTN+yjyn+zaia3mCbQWDuPo21Yb4=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployType.clas
s
SHA-256-Digest: NhGl+/BDAsc9yKghSNu8cxkuWQQf7Pms0FVhYfx7rtI=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/ZIPFunctionDep
loyHandler.class
SHA-256-Digest: WbfNi+CRL8hTnNMoGZ4jqWO7MS4dReVhueUDCFlcKtw=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IOneDeploy.cla
ss
SHA-256-Digest: gcrNvE0Iqwa119yuc4W60/sqyQqmUVnNB6nFQ0qLTj0=
Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile$
Type.class
SHA-256-Digest: b5ail/4mKZ/r6+yNa07SIoOVGT7d+UMQzHeyi6XAjqk=
Name: bindings.json
SHA-256-Digest: rAgPyqyWEypznK8+mwPvSECqnuOpDfgzFmSFJmkhtlk=
Name: com/microsoft/azure/toolkit/lib/appservice/model/ErrorEntity.cla
ss
SHA-256-Digest: roSw74ePfOIujxJnUis252JR5Oq69PBYikdd5e7hBnI=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient$1.class
SHA-256-Digest: obhcylh31dgaXFIO1iFa4tfpg6Dbyu7kKbBHF91Ph4U=
Name: com/microsoft/azure/toolkit/lib/appservice/file/IFileClient.clas
s
SHA-256-Digest: 7Y0LIxH2divWNJ90I6pC3/nzae3ZBP32aU/u6WxRgW8=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
.class
SHA-256-Digest: kE9jldbCApCWxHTImqSWSFC1p7RbP62uDVu93sutNDc=
Name: com/microsoft/azure/toolkit/lib/legacy/function/Constants.class
SHA-256-Digest: 9HKz/7rWDfyrW+ZlED8VgW+hi+8jvM1sToTVe7dFahw=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppModule.c
lass
SHA-256-Digest: i1KXPoEyvhKK8kubnIwzd/eg2yzQH2E1uG6xSqZX6PQ=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat
ionHandlerImpl.class
SHA-256-Digest: whOxLRe2erKWYNzZrJg+KlP42I+4UThU4dvJUa6KRlg=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FTPFunctionDep
loyHandler.class
SHA-256-Digest: Tt6JvohNFuIJYsL+aHhabOSc6BkHB+Nl48ZNNWDAS7A=
Name: com/microsoft/azure/toolkit/lib/appservice/model/CommandOutput.c
lass
SHA-256-Digest: 7jnp2mx66WvaCA1PYYYPbwYuL8cKACRut8352kqguQM=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
$FunctionEntityBuilderImpl.class
SHA-256-Digest: iJDayBIZX7s2h2XlahaTJSfbjg5pE/qhY/H7LOW9IvU=
Name: builddef.lst
SHA-256-Digest: 7n9RBOy8pMGlsvaAzVw47t/cRM0CzVE3jxwYD8Xfu5U=
Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateWe
bAppTask.class
SHA-256-Digest: dAV9QHFFeyJWG3pFiywZXUSscUKDukOyGazIW6+Fqs8=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat
ionHandler.class
SHA-256-Digest: VKuA2zIGsuFRh9eYhFRSn1Gd2ZoVigVchU/PJZAgF/o=
Name: resources.json
SHA-256-Digest: MJyxajX0JKwAGeUJRXKxMbVpXKY0MEpWK8XxFa+//SQ=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Extende
dCustomBinding.class
SHA-256-Digest: JyUQYwEcNmC6Apv7DVZklWHyHFRDV8X9NmTSXOqe6BY=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura
tion$DockerConfigurationBuilder.class
SHA-256-Digest: iaRFgD+CShV6ukLXNZ0WEajxpNNsgiwXY0ygWiDabYQ=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient$CommandRequest.class
SHA-256-Digest: 7G9SJmq5TMqwG35P63gWALQpvaKWRR3PxT7IaToNufQ=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromBlobFun
ctionDeployHandler.class
SHA-256-Digest: beHyPzCU+QMgVrsMCzPK2JVP7p7rlPBCEwj1ojFDGT4=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient$KuduService.class
SHA-256-Digest: ERXWGrsX0jIgDuj6WeJ5u1BbkSqDTUC1PN9VH5SMK8w=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nTemplate.class
SHA-256-Digest: mSw7RrH/E8q+Q/nlRlCC6QWCQUoe710kAOiqfN2ZJm0=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployOptions$D
eployOptionsBuilder.class
SHA-256-Digest: gV7qDLJvr+ZkW1B43kXrnpWgGvZkCqmsYcpEGrWsR2E=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppB
ase.class
SHA-256-Digest: hDpAqrZNVkperNlkNXrn+aH99aHibkHwBuxeuH0dxt0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
Serializer.class
SHA-256-Digest: SDpbAMIZrWQIk1k613+mIUo1NSyoGSc6f4i3krK56Vw=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr
aft$Config.class
SHA-256-Digest: 9qYhJBmGILhaiypcGMKhVtYImcGLVqafzLqKD9uV4uk=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionsAnnotationConstants.class
SHA-256-Digest: Sx3SDbFvGPRHKT1stA7NhYJ/chDcqYpksWlMPQWKX1I=
Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceServiceSubs
cription.class
SHA-256-Digest: 7kihgyJrx3v6W/520OOd9sk1H2DhJbEs2KGEYp4uSOE=
Name: com/microsoft/azure/toolkit/lib/appservice/model/ErrorEntity$Err
orEntityBuilder.class
SHA-256-Digest: B/RrU/3YgIvs2GBxDKpLND9UYYRpend5yeZzUz4BuvA=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/IAnnota
table.class
SHA-256-Digest: BaKC5fvsRj+7I2DhCkzCOpSDQyIq8NNyVvaem2s3Gx0=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme
ntSlot.class
SHA-256-Digest: IG8kFEYo3e1tcyg2ur1xUjW7PdNhnMKIsiqUOPVJZLA=
Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServicePlan
Config$AppServicePlanConfigBuilder.class
SHA-256-Digest: NHRVNUZlj2rKS9YmtMS3oxCm55qfwgyIGhh4qKoGvl4=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nTemplate$Function.class
SHA-256-Digest: R4lXEw/IPaeGUGPVkLjT4uTqk+Z/wV8234PqVO8sXeU=
Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact$
WebAppArtifactBuilder.class
SHA-256-Digest: k6RLcI64XHQQe64eznCT8XZvSBvtGrV+RRhN9PWZ+j4=
Name: META-INF/maven/com.microsoft.azure/azure-toolkit-appservice-lib/
pom.xml
SHA-256-Digest: +LLEuoBF/mOF4Qb1cWUoOTEff97MOynwg4qqsWuAVNY=
Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/Default
FunctionProject.class
SHA-256-Digest: y4iem+li4mTavLcwqwrgPOkFbN8kaV/t9RA+5iP+5cg=
Name: com/microsoft/azure/toolkit/lib/appservice/model/Runtime.class
SHA-256-Digest: FNhXuz/elEHIxYGRw71OX8vo5IyTJhdApb7Co28cATU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio
nCoreToolsHandler.class
SHA-256-Digest: JOqTUULmjJdRZ6QovBFb51iEC1FFm9caxGTRUVb1vPI=
Name: META-INF/services/com.microsoft.azure.toolkit.lib.AzService
SHA-256-Digest: ZOS6Pq0SJp/sCq0MyE9XCOgJ/E5Z4iUF1KtSXlHuGdU=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient.class
SHA-256-Digest: F4RI3rA3XhvcfUPdY8gYYS5FzkNGqk2sVGUPPJUhW+E=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanMo
dule.class
SHA-256-Digest: dQRH/XYrgPuanutNovPku/p0PZ9DarBFJzyksD5Zrck=
Name: com/microsoft/azure/toolkit/lib/appservice/function/AzureFunctio
ns.class
SHA-256-Digest: wX2w1HuhN5KlbFmKMGrMzUkgXLp812qMjlOgD808wy8=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme
ntSlotModule.class
SHA-256-Digest: LOQC2/jMfE0efSolDqdarHjLquZejhK9xy0bqXUmHiQ=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IFunctionDeplo
yHandler.class
SHA-256-Digest: zig0WR5tUfApgUiaffDPCO15EPbhcMkWtgmHyGL5o+A=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Validat
orTemplate.class
SHA-256-Digest: 7vWweIrFZhetvD/Gk+tyR5Za1ZZaDigylvaMzgk0v70=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
$BindingEntity$BindingEntityBuilder.class
SHA-256-Digest: elKL++CECNE1RxwOWI7Rq8pkwaOQlnk3cI0Yo3Aw0Xw=
Name: com/microsoft/azure/toolkit/lib/appservice/model/TunnelStatus.cl
ass
SHA-256-Digest: O9UmJfhruINbDX9RTlhvWnp66Qm3rcmKUaIyzRXnKSY=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft.cl
ass
SHA-256-Digest: Y38dXISMkiUlF7kspIcfPzMIVxSKrz909D/1YtdulMg=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DeploymentBuild
Status.class
SHA-256-Digest: 67merSfq1nb5eFYkgCIzoUmUskpAkzsqMOqntoHW6CM=
Name: schema/appservice/CreateAppServicePlan.json
SHA-256-Digest: DGNGqLsn0X/uQJro8foH6iV2lsVf17DVsEUqgM0+Cgg=
Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask
.class
SHA-256-Digest: NjUJvok9SfftIGrvo4juwVsPI0n4o3zRMFcLpDjwhg0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat
eResources.class
SHA-256-Digest: 2ITdSv2JN0k4eOskHllCvjxS2MVW9zfCPvc06L/ZtRE=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient$CommandRequest$CommandRequestBuilderImpl.class
SHA-256-Digest: NS8lnM7oVzEdiC7GsCrZqMoLQDIyFvXHa4zG2jpWNkI=
Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile.
class
SHA-256-Digest: BBkVSz40gphAg6zRBA1pf7/Hkunz9oFV6SGssf/LmZY=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentType
.class
SHA-256-Digest: E6pjaxnya9f9lzoKED+T8qDo/x3QvzZxOieI3+u9nL0=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/DeployUtils.cl
ass
SHA-256-Digest: mrD2F8uXOjnldCwXbgHOlDieUJZLSdBdTX2rozV+DaY=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentSlot
Setting.class
SHA-256-Digest: KOgiFDRnKQBZF6bosv+wCU66aPzICB5wVJA6nMx+WHY=
Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServicePlan
Config.class
SHA-256-Digest: 6Ic5FA3K5bjaOUM2y8ses9tm5A4+FZwgJWaSFb5cRaQ=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceUtils
.class
SHA-256-Digest: jD9On7Xra174vxJi/uwz2VfcJKpG6i81dyQsLyPjpuQ=
Name: com/microsoft/azure/toolkit/lib/appservice/model/LogLevel.class
SHA-256-Digest: UBzOrrEw/TdjhkpMGF2/Y3AKE3X176j/gklPGXpAu0Y=
Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceAppBase.cla
ss
SHA-256-Digest: YqEWXT5XMbRQgRzT3G7BzEtrKnA4eP1EfQfjscC3otc=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command
HandlerImpl.class
SHA-256-Digest: PtlWVekP6qC67YLUUu1RyJoQ8csYBixSCu/yJerq/EY=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/Utils.class
SHA-256-Digest: clubhe0qX1tCLzQmfLEl/Rc9VcjktMqdUdWygPrvWqE=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionPackagerBase.class
SHA-256-Digest: 2swUd4oxEWqjAe2PhxU2W6jafJzjcCx+pWdwD9BOXvg=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
$BindingEntity$BindingEntityBuilderImpl.class
SHA-256-Digest: 2u7zKj44GpUTGl0CeJWFrZWx48Ytrd6FbHoAvVduNAk=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/FunctionCliReso
lver.class
SHA-256-Digest: Fly4d+hgCA2S0u9N1sfctr+RCXzrtRzy8+5Ihn0M7nA=
Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact.
class
SHA-256-Digest: P42lBunnEe1gg3Uyi6c2v7Fo47d2arnSrsbPf3JhKag=
Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi
le.class
SHA-256-Digest: HuRmMUY2kZFthtr8scGnK7XVsabkI55g7IjxpZUnFQ0=
Name: com/microsoft/azure/toolkit/lib/appservice/IDeploymentSlotModule
.class
SHA-256-Digest: IA2sD98BtFRAsGTQnvhAbzqTqoRWBSiOH726nCfJemc=
Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServiceConf
ig.class
SHA-256-Digest: i1+uG9ED7Z+pd1W5jVbJ4wlEKhF26wmZLnCpd2SuqTo=
Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/Default
FunctionProject$1.class
SHA-256-Digest: pCzebCjmY3Vf62u2tFpI9lLtSOQ4TIWU1IVcU40dg1Q=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif
act/FTPUploader.class
SHA-256-Digest: AGuH/8GYOuYWB0zYzZTU+zh3mdGYOCHeVmavknZGWlg=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura
tion$DockerConfigurationBuilderImpl.class
SHA-256-Digest: C5ytbYo2A3zxZEPxShgodUbPLuxxpJ+Ux40fOPIQBXE=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R
untimeConfiguration.class
SHA-256-Digest: 97QOEJ0z2Sgo5Z6uFP8xCp3T1tJSxLxW2qE1OpUJ+Lo=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
eploymentSlot.class
SHA-256-Digest: ZIboE/PQ+uUpGRcuzoYXbSVXv1wnYVuvAHpTI1Knmos=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/CommandUti
ls.class
SHA-256-Digest: 50JBjUebpZZHKjwZJsbiSSE8Vz9NPnDgeQ0Muf5rmvY=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R
etry.class
SHA-256-Digest: 1JN3C8Gh5Ft/3vW28Uh94Uj/L9AOK2J3+ouI1wF+L7U=
Name: com/microsoft/azure/toolkit/lib/appservice/model/JavaVersion.cla
ss
SHA-256-Digest: AzcN9Bk1uOYKXx2lFe79UDgX/LAH+kErRuy3aw04FYA=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nSettingTemplate$FunctionSettingTemplateBuilder.class
SHA-256-Digest: 4cMCBKaOLv6aTEVSi61niCTXtM7N2cg/KHVURciScHs=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio
nAnnotationClass.class
SHA-256-Digest: q4erbw4eJcdugpcToQ2Ius1EjrOxQzJMQ2gD2nRbQvI=
Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceResourceMod
ule.class
SHA-256-Digest: vCUBDO8pXxqYU8djZFT2Bxsf2u9SLfpmvsUSZE/RJWg=
Name: com/microsoft/azure/toolkit/lib/legacy/function/AzureStorageHelp
er.class
SHA-256-Digest: RtPpc5R/pHLmkGT1uol7Kab0jczFMmeVMPUGCQ7KRUw=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppM
odule.class
SHA-256-Digest: YoyddmC1E/+M+ofKiS9AoKTHdDZWuv5J62IfsBWFFw4=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd
minClient$FunctionsService.class
SHA-256-Digest: TCnPCVB/Dld6ldO8k3iY3LrqDFKuLmCxEokU/z/IKF0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command
Handler.class
SHA-256-Digest: VnugUcR03EQXPfXiUOGy3KHqf8cpzqZBULOZDcvQJmk=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio
nProject.class
SHA-256-Digest: zmkjDPf1c598WolyqzCMtVL8jg0VgDODhfGYxwDmki0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nSettingTemplate.class
SHA-256-Digest: KTXLfROoZugbhY4ZjaUmhSwuU3XvOT0zse0OiRhOOSU=
Name: com/microsoft/azure/toolkit/lib/appservice/model/ProcessInfo.cla
ss
SHA-256-Digest: agHhowwjC4OTya4BWAbEbsuguU5cVH5Pz+f0p/wk4/o=
Name: com/microsoft/azure/toolkit/lib/appservice/task/StreamingLogTask
.class
SHA-256-Digest: nnyr79t/efxKo2H8y+1udMb2UIGivBgSSaiDqjY5Juk=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionPackager$AzureFunctionPackagerHolder.class
SHA-256-Digest: lwxpNPZ5FzDuZs7+W3CeRdF5Qc4HqAHmeHpsSk04Vb8=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding
Template.class
SHA-256-Digest: ZDKdoOajiqDEs9pLOblgfTwm+PLZkZ1zAV+kxE0slGw=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
eploymentSlotModule.class
SHA-256-Digest: bjgRbwdXQs5A+NQIhVmn3zgHF2iXnyLmgOOTf+oue8Q=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt
ils$AjcClosure3.class
SHA-256-Digest: arZY8LRsTre0r4Du1rHI9QpN+FRTsoUAzUB3XAyh/EE=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding
Configuration.class
SHA-256-Digest: b4Yj24HLjumhI4AJSvN9A/oVIzPYrEpLy0gf/PXFy1E=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlan.c
lass
SHA-256-Digest: G/OlxK9sQmlmdYf1fHjCGnAWZLQuIsm0ibFPcfgq9As=
Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateFu
nctionAppTask.class
SHA-256-Digest: wIGq9XGF3dcc/cIeHZBP8VtJGFngQoLl5kDTQR80dMI=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd
minClient.class
SHA-256-Digest: YI6ZJbP1R5hs5Y7UteXW/o5w4BxvILtuqCCE+rkdaLg=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura
tion.class
SHA-256-Digest: 1SruYEpEtq07fm5VI3M27KvTmSk8QUMWeTl/kczKe+0=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient$CommandRequest$CommandRequestBuilder.class
SHA-256-Digest: unTnQmjh2L8LpyhzJ84LXfnuhuar00u9tgoIzqbgHf4=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura
tion$1.class
SHA-256-Digest: gDCdmjhRyH43GgBJO0okh4BOR/bvZvM2VLXIhYX/PG4=
Name: META-INF/maven/com.microsoft.azure/azure-toolkit-appservice-lib/
pom.properties
SHA-256-Digest: bd8M+Km+2a+pHa+EipYi3FZhCHxBwr2waPr/KXCvx5Y=
Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployFunctionAp
pTask.class
SHA-256-Digest: HVwCi67n8ahc/daHpbNH7PvTg/aBKLP41/B6Kv6TQLk=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nSettingTemplate$SettingEnum.class
SHA-256-Digest: xcnDs+JlQ8suoWTnS6xEDloZlwO99Ob/zgbFmH9nH60=
Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi
le$PublishingProfileBuilderImpl.class
SHA-256-Digest: Y3lQetjnhyJU3S/MzxZvDxTGNyU52onHzhYN1TGkkto=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployOptions.c
lass
SHA-256-Digest: Mt4R1MG27DxFNACQ1FEhoPf3EUt4YKr7hiIie535wz0=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
$FunctionEntityBuilder.class
SHA-256-Digest: 9WDBBJll4gh2zYbn3LDliSqUkdiNaanNEsBv1WwvpnI=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft$Co
nfig.class
SHA-256-Digest: 1csJJTPw1j0b5HfnJqebDPt3X9gnIbIzo+60zVDtBq0=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme
ntSlotDraft$Config.class
SHA-256-Digest: TLIz1VidA7DdvbfjUGa1wLPaet+lqGpXC9VBbJqCnA8=
Name: com/microsoft/azure/toolkit/lib/appservice/model/FlexConsumption
Configuration.class
SHA-256-Digest: fYa39WEd8oAO8e5Z+Nyfj5/AqVXd04gWF/qNperZSUE=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding
sTemplate.class
SHA-256-Digest: Vox0tD6BYwWNuJHoOPMd72LZZ1BtKnhJPvb681lExD4=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/AppServiceUtil
s.class
SHA-256-Digest: bgdg/7EsdCnBf8c3w2UlLncvzNu/oyYrt4PUnuf8v9w=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
Enum.class
SHA-256-Digest: qULuV33jvuhi80UYVFCeUsZ62Ebk2iQyuXJMaw1pfyQ=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R
etry$RetryBuilder.class
SHA-256-Digest: hPU7zgRd5QtH1Md0Koz/KfAK6qvs3JosOdGV+oFxv6Q=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio
nMethod.class
SHA-256-Digest: YvSP74f3dz+m4qm98x58jwGUJrMbgRbAavpepF1a1hc=
Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact$
WebAppArtifactBuilderImpl.class
SHA-256-Digest: 9sGcZPaDf+FAe6SkU45IMa99BzRFAfu9l5s1uMF7fac=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
Factory.class
SHA-256-Digest: NA2lL+tMbCvr2mDFzfMWsV7ZLV8OAWLjX6LAx21NSm8=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DockerImageTyp
e.class
SHA-256-Digest: DrmGjlUqQb7TKQhlaFHH+sAvlg3nHk6cxwpqCGAbm34=
Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact$
1.class
SHA-256-Digest: 1Nn+/W/OGHFmjPQ5P+mAGPIwyIgr0MkqRF3D4+EDfoM=
Name: com/microsoft/azure/toolkit/lib/appservice/model/OperatingSystem
.class
SHA-256-Digest: zh19Ey5aKAP2ma0pxcIpzFipHn6yk+nVOYZJfSmB6Ns=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/DateUtils.
class
SHA-256-Digest: mPqy1OeY4sH4d1GM7f8EIiHaFrq1sxeYR6nYUhT7vU0=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
.class
SHA-256-Digest: PhRXDXFdL2Pjzn8XDBZYZ28Yr9r8Rgm5ptx7m9ow6Fo=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F
unctionConfiguration.class
SHA-256-Digest: fzVY2bEdxkZvsrb1qHVorgzlpmxX/BhqHjmt+g8+Imw=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
eploymentSlotDraft$Config.class
SHA-256-Digest: xbPRFQsyBi4JgYtnVFPrZfqNPBYYySCuqzMExJrX4uk=
Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi
le$1.class
SHA-256-Digest: 46UGx2JjKzcK4vHdd7gZ+LovD5bykbLkBAcERShrf98=
Name: com/microsoft/azure/toolkit/lib/appservice/model/FunctionDeployT
ype.class
SHA-256-Digest: OjN0aljRR3apIJMTa1+PFxmMA01qmbe/qrAErJTN2y4=
Name: templates.json
SHA-256-Digest: q/Jo9Jy4HkGf+krojhnSlR1Hx1d63datH5OfXtpo9ic=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nTemplates.class
SHA-256-Digest: xlFJm4AyeSTQONBk4eZoIo/wuLIOvg5O07fJSjyuff4=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme
ntSlotDraft.class
SHA-256-Digest: /P0s61Ek/s+6Mzv53j83WMwu3eyhqKQEn1TRm2y5eMA=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat
eMetadata.class
SHA-256-Digest: RDpPw8pzxrvTAgGrZKvuLhx6+dytWViPNUOzJbXyHmU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R
etry$RetryBuilderImpl.class
SHA-256-Digest: mKzLin6TigR9LXBO0+sNYVN0mmz7URdrybv6cpytHbQ=
Name: com/microsoft/azure/toolkit/lib/appservice/model/KuduDeploymentR
esult.class
SHA-256-Digest: cEuc3ibmbdQxsO9x3c33xosb8L5MBtno6Uuut5b5LrQ=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr
aft.class
SHA-256-Digest: rd9IXXsi1GdBtZaYx9VcVPeI9euRv1w2Rx32BuM39vs=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt
ils.class
SHA-256-Digest: A2rFdgztOUyM/m/6QnzndW/ztDdqTWnx4F3euNPZRBM=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Extende
dCustomBinding.class
SHA-256-Digest: eYCi6frbrvYWoEef8U7YERGN5ggMQePS0O4ZHJti24g=
Name: schema/appservice/AppServicePlan.json
SHA-256-Digest: eO+yKXVggY/T7PYqwMKE1xsoLQ5Wz3LFfhktQrHlxm8=
Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask
$TrackDeploymentStatusTask.class
SHA-256-Digest: gKI6ZuVAFpF/eo0l15wolVfU2zlV84H8MXpRAyInRSo=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio
nAnnotation.class
SHA-256-Digest: TwFX3P2pZjIoaHAblyMxosA9YvMIErM9VhJhNkq9r6s=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt
ils$AjcClosure1.class
SHA-256-Digest: BAThOGH3Z3qMmSudJa7PAjrL07shfQErW/bi1J+qBBM=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio
nCoreToolsHandlerImpl.class
SHA-256-Digest: KBn+LPTe17qSO1RjTYct8LISe13Gp0ES3DEH+qo/d+k=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
eploymentSlotDraft.class
SHA-256-Digest: vvTtVclSD6k0u7HIokRr/7vhlCQa0dUMK8QoJFERbZw=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionApp.
class
SHA-256-Digest: 0AFOo2H8q8qkYvI5n4/E0k910609sdIr4BTQF7WGzY8=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionPackager.class
SHA-256-Digest: ThWy8YvrK7i87ClkFR7HUIRVPUSe7HYEbfIVnbeNm1w=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionsSer
viceSubscription.class
SHA-256-Digest: DiD/+2afTG96Y9ROMGAbBfZXk6P6wIP30rLhBe999j4=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DiagnosticConfi
g.class
SHA-256-Digest: +EnY0psWP8GwPMVYcz6frQOYCcCM4w49YB0b4FKm9Gw=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
raft$Config.class
SHA-256-Digest: L1ujoYQ0iaNLtpLEMqaWWwF8LOP9wRryqZR19tKMqIU=
|
combined_dataset/train/non-malicious/sample_38_92.ps1 | sample_38_92.ps1 | ConvertFrom-StringData -StringData @'
AdapterNotFound = 지정된 어댑터를 찾을 수 없음: {0}
InvalidParams = 유효하지 않은 매개변수 집합. 유효한 매개변수 세트를 확인하려면 cmdlet 도움말을 참조하십시오.
InvalidParamsAdapterAndName = 이름 및 어댑터 매개변수를 지정할 수 없습니다.
InvalidParamsConfigAndModule = 모듈과 구성 매개변수를 지정할 수 없습니다.
InvalidModule = {0}: {1}은(는) 유효하지 않은 모듈 이름입니다. 유효한 모듈을 살펴보려면 다음 명령을 사용하십시오. "Get-IntelEthernetLogConfig -Name "{0}""
InvalidSetting = {0}: {1}은(는) 유효한 설정 이름입니다. 유효한 설정을 보려면 다음 명령을 사용하십시오. "Get-IntelEthernetSetting -Name "{0}""
InvalidObject = {0} : 유효한 객체가 아닙니다. 유효한 객체 유형은 cmdlet 도움말을 참조하십시오.
InvalidSettingValueGeneric = 이 장치 또는 설정에 대해 지정한 값이 유효하지 않으므로 설정을 수정할 수 없습니다.
InvalidParamsAdapterOrName = 이름 또는 어댑터 매개변수를 지정해야 합니다.
InvalidParamsConfigOrModule = 모듈 또는 구성 매개변수를 지정해야 합니다.
InvalidLevel = {0}: {1}은(는) 유효한 레벨 이름입니다. 모듈당 유효한 수준을 확인하려면 다음 명령을 사용하십시오. "Get-IntelEthernetLogConfig -Name "{0}" -Module "{2}" | fl"
InvalidLevelWildcard = 레벨은 한 개의 로그 레벨과 일치해야 하지만, 임의 문자열은 한 개 이상과 일치합니다.
InvalidDriverLevel = 드라이버 모듈의 경우 수준을 Normal(보통) 또는 Verbose(자세히)로만 설정할 수 있습니다.
InvalidSubModule = {0}: {1}은(는) 유효한 하위 모듈 값이 아닙니다. 지원되는 하위 모듈 값 목록을 보려면 이 cmdlet에 대한 전체 도움말을 참조하십시오.
InvalidCluster = {0} : {1}은(는) 유효한 클러스터 이름이 아닙니다. 지원되는 -Cluster 목록을 보려면 이 cmdlet에 대한 전체 도움말을 참조하십시오.
FailedToReadCluster = 클러스터 {0}을(를) 읽는 동안 오류가 발생했습니다.
LogmanRunning = {0}에 대한 로깅이 이미 실행 중입니다.
LogmanFileExists = {0}에 대한 파일이 이미 존재합니다. 파일을 덮어쓰려면 -Force를 지정하고, 기존 파일에 추가하려면 -Append를 지정하거나 다른 파일 이름을 선택하십시오.
PathIncorrect = 지정된 경로가 존재하지 않거나 액세스 할 수 있는 권한이 없습니다. 정확한 경로를 지정하십시오.
NoLogsStarted = {0}에 대한 로그가 아직 시작되지 않았습니다.
OperationFailed = {0}: 이 장치에서 {1} 작동이 실패했습니다. 다시 시도하십시오.
NoCmdletSupport = {0}: 이 장치는 이 cmdlet를 지원하지 않거나 그것을 지원하는 드라이버가 없습니다.
NoConfigurationSupport = {0}: 이 장치는 구성 매개 변수를 지원하지 않습니다.
FolderFileNameExits = 귀하가 지정한 파일 이름과 같은 이름의 폴더가 이미 있습니다. 다른 이름을 지정해 주십시오.
InvalidConfigurationName = {0}: {1}은(는) 유효하지 않은 구성 이름입니다. 지원되는 -Configuration 목록을 보려면 이 cmdlet 전체 도움말을 확인하십시오.
GenericFailure = {0}: 이 장치에서 {2}에 대한 {1} 작동이 실패했습니다. 다시 시도하십시오.
NotSupported = 지원되지 않음
NotAvailable = 이용할 수 없습니다
Unknown = 알 수 없음
MiniHelpNotFound = 이 설정을 위한 도움말 콘텐츠를 찾을 수 없습니다.
IdentifyPortDisabledOrLowPower = 장치가 비활성화되었거나 저전력 상태에 있기 때문에 명령을 실행할 수 없습니다.
InvalidSettingValue = {0}: {1}은 {2}에 올바른 값이 아닙니다. 다음 명령을 사용해 올바른 값을 확인하십시오. "Get-IntelEthernetSetting -Name "{0}" -RegistryKeyword "{2}" | fl"
WritingDebugDump = 디버그 덤프 작성
RegisterCountersSuccess = {0}: 카운터 집합 등록을 완료했습니다.
RegisterCountersFailure = {0}: 카운터 집합 등록에 실패했습니다.
UnregisterCountersSuccess = {0}: 카운터 집합 등록이 해제 되었습니다.
UnregisterCountersFailure = {0}: 카운터 집합 등록 해제에 실패했습니다.
InvalidSystemConfigFailure = 이 cmdlet은 현재 시스템 설정을 지원하지 않습니다.
ProfileXmlError = PerformanceProfiles.xml에서 프로파일 설정을 가져오지 못했습니다. 최신 설치 패키지를 다운로드한 다음 다시 시도하십시오.
NoProfileSupport = {0}: 지정된 프로파일은 현재 환경에서 지원되지 않습니다. cmdlet 도움말을 참조하십시오.
TestSuccess = {0}: 테스트를 성공적으로 실행되었습니다.
TestFailure = {0}: 테스트 실행에 실패했습니다.
TestResultPass = 통과됨
TestResultFail = 실패됨
AdapterStartFail = {0}: 장치 시작에 실패했습니다.
NotStarted = 시작되지 않음
InProgress = 진행중
Done = 완료
MultiplePeers = 여러 개의 피어
Backplane = 백플레인
QSFP = QSFP
QSFPDirectAttach = QSFP+ 직접 부착
SFP = SFP
SFPDirectAttach = SFP+ 직접 부착
SFP28DirectAttach = SFP28 직접 부착
Copper = 구리
CX4Copper = CX4 Copper
CopperT = 구리-T
CopperTX = 구리-TX
SGMII = SGMII
Fiber = 광섬유
SRFiber = SR 광섬유
LRFiber = LR 광섬유
KXBackplane = KX/KX4 백플레인
XAUI = XAUI
AOCACC = AOC/ACC
BackplaneKR = 백플레인-KR
BackplaneKR1 = 백플레인-KR1
BackplaneKR2 = 백플레인-KR2
BackplaneKR2PAM4 = 백플레인-KR2-PAM4
BackplaneKR4 = 백플레인-KR4
BackplaneKR4PAM4 = 백플레인-KR4-PAM4
BackplaneKRPAM4 = 백플레인-KR-PAM4
BackplaneKRS = 백플레인-KR-S
BackplaneKX = 백플레인-KX
ChiptoChip = 칩 투 칩
DirectAttach = 직접 부착
DirectAttachCP2 = 직접 부착-CP2
DirectAttachCR = 직접 부착-CR
DirectAttachCR1 = 직접 부착-CR1
DirectAttachCR2 = 직접 부착-CR2
DirectAttachCR4 = 직접 부착-CR4
DirectAttachCRPAM4 = 직접 부착-CR-PAM4
DirectAttachCRS = 직접 부착-CR-S
FiberDR = 파이버-DR
FiberFR = 파이버-FR
FiberLR = 파이버-LR
FiberLR4 = 파이버-LR4
FiberLX = 파이버-LX
FiberSR = 파이버-SR
FiberSR2 = 파이버-SR2
FiberSR4 = 파이버-SR4
FiberSX = 파이버-SX
FiberX = 파이버-X
FullDuplex = 전이중
NotNegotiated = 협상되지 않음
Disabled = 비활성화됨
Active = 활성화
LinkUp = 링크 업
LinkUpNotMax = 링크업 - 이 장치가 가능한 최대 속도에서 연결되어 있지 않습니다
LinkDown = 링크 다운
NotPresent = 존재하지 않음
NegLaneSpeed25 = 2.5 GT/s
NegLaneSpeed50 = 5.0 GT/s
NegLaneSpeed80 = 8.0 GT/s
ISA = ISA
EISA = EISA
PCMCIA = PCMCIA
CardBus = CardBus
PCI = PCI
PCIX = PCI-X
PCIExpress = PCI Express
IOSF = IOSF
Normal = 정상
OverheatedStopped = 과열, 어댑터 중지됨
OverheatedReduced = 과열, 링크 속도 감소함
PortA = A
PortB = B
PortC = C
PortD = D
Profile = 프로파일
CustomSettings = 사용자 정의 설정
StandardServer = Standard Server
WebServer = Web Server
StorageServer = Storage Server
VirtServer = Virtualization Server (Hyper-V*)
LowLatency = Low Latency
StorageVirt = Storage + Virtualization
Register = 등록
EEPROM = EEPROM
MacLoopback = MAC 루프백
Interrupt = 중단됨
FIFO = FIFO
RunningTests = 테스트 실행 중... 이 작업은 몇 분 정도 소요될 수 있습니다. 중단하지 마십시오.
TestProgress = {1}의 {0} 테스트 실행 중 - {2}
'@
|
combined_dataset/train/non-malicious/1318.ps1 | 1318.ps1 |
function Uninstall-CScheduledTask
{
[CmdletBinding(DefaultParameterSetName='AsBuiltinPrincipal')]
param(
[Parameter(Mandatory=$true)]
[Alias('TaskName')]
[string]
$Name
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$Name = Join-Path -Path '\' -ChildPath $Name
$MAX_TRIES = 5
$tryNum = 0
do
{
if( -not (Test-CScheduledTask -Name $Name) )
{
Write-Verbose ('Scheduled task ''{0}'' not found.' -f $Name)
return
}
$lastTry = (++$tryNum -ge $MAX_TRIES)
Write-Verbose ('Deleting scheduled task ''{0}''.' -f $Name)
$errFile = Join-Path -Path $env:TEMP -ChildPath ('Carbon+Uninstall-CScheduledTask+{0}' -f ([IO.Path]::GetRandomFileName()))
schtasks.exe /delete /tn $Name '/F' 2> $errFile | ForEach-Object {
if( $_ -match '\bERROR\b' )
{
if( $lastTry -or $err -notmatch 'The function attempted to use a name that is reserved for use by another transaction' )
{
Write-Error $_
}
}
elseif( $_ -match '\bWARNING\b' )
{
Write-Warning $_
}
else
{
Write-Verbose $_
}
}
if( $LASTEXITCODE )
{
$err = (Get-Content -Path $errFile) -join ([Environment]::NewLine)
if( -not $lastTry -and $err -match 'The function attempted to use a name that is reserved for use by another transaction' )
{
if( $Global:Error.Count -gt 0 )
{
$Global:Error.RemoveAt(0)
}
if( $Global:Error.Count -gt 0 )
{
$Global:Error.RemoveAt(0)
}
Write-Verbose ('Failed to delete scheduled task ''{0}'' (found ''The function attempted to use a name that is reserved for use by another transaction.'' error). Retrying (attempt
Start-Sleep -Milliseconds 100
continue
}
Write-Error $err
break
}
}
while( $true -and -not $lastTry)
}
|
combined_dataset/train/non-malicious/List AD Attributes.ps1 | List AD Attributes.ps1 | $forest = [DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()
$Schema = $forest.schema
$Properties = $Schema.FindAllProperties()
foreach($property in $Properties)
{
"#################################"
"Name: {0}" -f $property.Name
"Link: {0}" -f $property.link
"LinkID: {0}" -f $property.linkid
if(!$?)
{
"Error: {0}" -f $error[0].message
}
"#################################"
}
|
combined_dataset/train/non-malicious/2975.ps1 | 2975.ps1 | param (
[Parameter(Mandatory)]
[string] $ApiKey
)
$VerbosePreference = 'Continue'
$ErrorActionPreference = 'Stop'
$baseDir = $PSScriptRoot
try {
$buildDir = "$baseDir\build\psgallery\Pester"
Write-Verbose 'Importing PowerShellGet module'
$psGet = Import-Module PowerShellGet -PassThru -Verbose:$false
& $psGet { [CmdletBinding()] param () Install-NuGetClientBinaries -CallerPSCmdlet $PSCmdlet -BootstrapNuGetExe -Force }
Write-Host 'Publishing module to PowerShellGet'
$null = Publish-Module -Path $buildDir -NuGetApiKey $ApiKey -Confirm:$false -Force
}
catch {
Write-Error -ErrorRecord $_
exit 1
}
|
combined_dataset/train/non-malicious/1868.ps1 | 1868.ps1 |
Add-TestDynamicType
Describe "Where-Object" -Tags "CI" {
BeforeAll {
$Computers = @(
[PSCustomObject]@{
ComputerName = "SPC-1234"
IPAddress = "192.168.0.1"
NumberOfCores = 1
Drives = 'C','D'
},
[PSCustomObject]@{
ComputerName = "BGP-5678"
IPAddress = ""
NumberOfCores = 2
Drives = 'C','D','E'
},
[PSCustomObject]@{
ComputerName = "MGC-9101"
NumberOfCores = 3
Drives = 'C'
}
)
}
It "Where-Object -Not Prop" {
$Result = $Computers | Where-Object -Not 'IPAddress'
$Result | Should -HaveCount 2
}
It 'Where-Object -FilterScript {$true -ne $_.Prop}' {
$Result = $Computers | Where-Object -FilterScript {$true -ne $_.IPAddress}
$Result | Should -HaveCount 2
}
It "Where-Object Prop" {
$Result = $Computers | Where-Object 'IPAddress'
$Result | Should -HaveCount 1
}
It 'Where-Object -FilterScript {$true -eq $_.Prop}' {
$Result = $Computers | Where-Object -FilterScript {$true -eq $_.IPAddress}
$Result | Should -HaveCount 1
}
It 'Where-Object -FilterScript {$_.Prop -contains Value}' {
$Result = $Computers | Where-Object -FilterScript {$_.Drives -contains 'D'}
$Result | Should -HaveCount 2
}
It 'Where-Object Prop -contains Value' {
$Result = $Computers | Where-Object Drives -contains 'D'
$Result | Should -HaveCount 2
}
It 'Where-Object -FilterScript {$_.Prop -in $Array}' {
$Array = 'SPC-1234','BGP-5678'
$Result = $Computers | Where-Object -FilterScript {$_.ComputerName -in $Array}
$Result | Should -HaveCount 2
}
It 'Where-Object $Array -in Prop' {
$Array = 'SPC-1234','BGP-5678'
$Result = $Computers | Where-Object ComputerName -in $Array
$Result | Should -HaveCount 2
}
It 'Where-Object -FilterScript {$_.Prop -ge 2}' {
$Result = $Computers | Where-Object -FilterScript {$_.NumberOfCores -ge 2}
$Result | Should -HaveCount 2
}
It 'Where-Object Prop -ge 2' {
$Result = $Computers | Where-Object NumberOfCores -ge 2
$Result | Should -HaveCount 2
}
It 'Where-Object -FilterScript {$_.Prop -gt 2}' {
$Result = $Computers | Where-Object -FilterScript {$_.NumberOfCores -gt 2}
$Result | Should -HaveCount 1
}
It 'Where-Object Prop -gt 2' {
$Result = $Computers | Where-Object NumberOfCores -gt 2
$Result | Should -HaveCount 1
}
It 'Where-Object -FilterScript {$_.Prop -le 2}' {
$Result = $Computers | Where-Object -FilterScript {$_.NumberOfCores -le 2}
$Result | Should -HaveCount 2
}
It 'Where-Object Prop -le 2' {
$Result = $Computers | Where-Object NumberOfCores -le 2
$Result | Should -HaveCount 2
}
It 'Where-Object -FilterScript {$_.Prop -lt 2}' {
$Result = $Computers | Where-Object -FilterScript {$_.NumberOfCores -lt 2}
$Result | Should -HaveCount 1
}
It 'Where-Object Prop -lt 2' {
$Result = $Computers | Where-Object NumberOfCores -lt 2
$Result | Should -HaveCount 1
}
It 'Where-Object -FilterScript {$_.Prop -Like Value}' {
$Result = $Computers | Where-Object -FilterScript {$_.ComputerName -like 'MGC-9101'}
$Result | Should -HaveCount 1
}
It 'Where-Object Prop -like Value' {
$Result = $Computers | Where-Object ComputerName -like 'MGC-9101'
$Result | Should -HaveCount 1
}
It 'Where-Object -FilterScript {$_.Prop -Match Pattern}' {
$Result = $Computers | Where-Object -FilterScript {$_.ComputerName -match '^MGC.+'}
$Result | Should -HaveCount 1
}
It 'Where-Object Prop -like Value' {
$Result = $Computers | Where-Object ComputerName -match '^MGC.+'
$Result | Should -HaveCount 1
}
It 'Where-Object should handle dynamic (DLR) objects' {
$dynObj = [TestDynamic]::new()
$Result = $dynObj, $dynObj | Where-Object FooProp -eq 123
$Result | Should -HaveCount 2
$Result[0] | Should -Be $dynObj
$Result[1] | Should -Be $dynObj
}
It 'Where-Object should handle dynamic (DLR) objects, even without property name hint' {
$dynObj = [TestDynamic]::new()
$Result = $dynObj, $dynObj | Where-Object HiddenProp -eq 789
$Result | Should -HaveCount 2
$Result[0] | Should -Be $dynObj
$Result[1] | Should -Be $dynObj
}
}
|
combined_dataset/train/non-malicious/sample_1_96.ps1 | sample_1_96.ps1 | ConvertFrom-StringData @'
progressbar_id_crm_unsupportedcustomapp_exists=Custom Applications Under CRMAppPool Check
progressbar_id_crm_unsupportedcustomapp_existsdesc=Creating an IIS application inside the Microsoft Dynamics CRM Website for any VDir and specifically within the ISV folder is not supported.
'@
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAfO7a0ItayoDn+
# W8S/SjnIMpCh4sjkKcrsGynSLkwOZ6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGKrMSVcl5uPIJn0P/xjzvz8
# DYZk5JY5CD4AWiLwUoo/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAsmEeO8a/YG7U/q2kjK2h5/kcW4+gc/yrgUhBct+5dt7v948s0jWCCQMh
# P4EXAaam8/Fzb8bVIUy8bHKgaMHVOxCcMrb9UAwjcw+q8PXkmcwyzwHdejS85bDH
# 3bPZMN4VTQNYLjITWAvC2mVXCj1pqZ1rx3cHEbn0p2q2+7wTURYmDk7eZlF+on/u
# FfoeE7L3TQUk4RgZzmcz1K1y2rzWP62LFKbPk0IZv79pVZUHvhWhNN4zU7WjFSJU
# /yGrejk2maF3jYMTMUTrH9K9zIZ4QTsAy2UnfLNdD28VT5TITvKeF8auAUjXdalQ
# zjUMLJo4miI/dscx7K3453pRH8aTmKGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDSDQqfXVYZ/zmAFg+GqDykL9YxMH8kZgSEp5NOs/dokQIGZutLSAN7
# GBMyMDI0MTAyODExNDAzOS44ODJaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4fPfBZdahAAEAAAH/MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjRDMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyeiV0pB7bg8/qc/mkiDd
# JXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4dU4VCkAZEXqvkxP5QNTtB
# G5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqhhxfHFV7vhtmqHLCCmDxh
# ZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAnncUdtp1xjGmCpdBMygk/
# K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTMKjYD6pLeBP0hZDh5P3f4
# xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L0SdR7qQlv5pwDNerbK3Y
# SEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr9/fIEpPAlC8YisxXaGX4
# RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqfRuWzdUir0Z3jiOOtaDq7
# XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbiaboi12usV8axtlT/dCeP
# C4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA4y3s6G+gQ35o90j2i6am
# aa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49tdsWTIgZWVOSS9uUHhSY
# kbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTD+pXk/rT/
# d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOSNN5MpLiyun
# m866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUAp6WtgolIrativXjOG1lI
# jayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyfOievfbsIzTk/G51+uiUJ
# k772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkGZjq/O4Z/PcmVGtjGps2T
# CtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3kN8N56jpl9kotLhdvd89
# RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU3dLYTAI91gTNUF7BA9q1
# EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0Ty0PD83aCt79Ra0IdDIMS
# uwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOdgRe8tXdGrgDoBeuVOK+c
# RClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tytuulYYcRK95qihF0irQs6
# /WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3XRROwAv016ICuT8hY1In
# yW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTSY4OGuGU1SXaH49JSP3t8
# yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUlcnPkwRLFRPXFspmggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0MTAyOTA5Mzk0OVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEAAgIFPAIB/zAHAgEAAgIU
# KTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAuUNJmV2WE
# mZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaHyPjIBqzVVX+OsCmMA4rC
# SBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cqWgcxpcvR5+XFiKoxtNrZ
# +ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedWcWiD6dyYPjiJ10ZllDJA
# kIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7aY8kNavDIwAwm/WFtYzSw
# Fv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4swD4QJBUY7k+61Fk5XlZ
# u6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgHshdMhEd
# edRzV0JaUATm5PVUGzck+QwUyoURSwyehdwwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDjSEV8upyn/TCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/xI4fPfBZdahAAEA
# AAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJkD9cXZckbMA0GCSqGSIb3
# DQEBCwUABIICAIBUIoIjnPyBRLDoSHrezfdTrAht9XJ74NmsbWNmJbffN7PQm808
# LeC8pCHK3swQhe9PteHJSOs8sNKAOx5N4FKb+ssl3c0JBJHtGV3tMMdvg/VjDs9b
# Di9EbB46Hp8pfhjpSHoVUwzj7AB3DPc5xCXcvunILIwVZIBkQvwGUViBY5ZzsyvL
# 1hv876oYm0xpQQekLt7EkHyBcUvUpHo2Cderfs8nH0MjDrQI9VvU4JeLkkYqmgM5
# lIquZQ3H9XBlFqgijTD25aeWo/FM4anF+yizd5itNEyIRRwnmsxKIxODQkDh6re9
# GYb6e+7q6AT9+V39GsFTJ9EFU5m21ZwkitaJDtiEJ5axTRvW+DLQYhMRYFrkPEva
# IxLJhzaNIHEWjf93yJ3rcR+zYMQATOI1LDTJlW2dLSDyLIGBo0usnghY601txgxD
# 0RSO1k9PZcpQt5+nysHYJJ0sgmY/VUZqvSOX52TQ/+z9Lp40sPT/BkpWIdVmlQpe
# 2P+mu3Jgzga84VW/o89zXaW2TgOFK1Q/b0E4ppkRhF+bHfHDcW2uWwfQBpvxpGLP
# gqP//GFrgEJjbYZ6ddoa5bg7leQOUw8+USg6fVgm8pY/fBncwwxduS8dJoCrMtZ/
# ylmZasoA/ICDY/byDFvZaw0jJqOnd6A3fAHvcsmwk8JyqS7CugsXxW2f
# SIG # End signature block
|
combined_dataset/train/non-malicious/Test-Server_2.ps1 | Test-Server_2.ps1 | Function Test-Server{
[cmdletBinding()]
param(
[parameter(Mandatory=$true,ValueFromPipeline=$true)]
[string[]]$ComputerName,
[parameter(Mandatory=$false)]
[switch]$CredSSP,
[Management.Automation.PSCredential] $Credential)
begin{
$total = Get-Date
$results = @()
if($credssp){if(!($credential)){Write-Host "must supply Credentials with CredSSP test";break}}
}
process{
foreach($name in $computername)
{
$dt = $cdt= Get-Date
Write-verbose "Testing: $Name"
$failed = 0
try{
$DNSEntity = [Net.Dns]::GetHostEntry($name)
$domain = ($DNSEntity.hostname).replace("$name.","")
$ips = $DNSEntity.AddressList | %{$_.IPAddressToString}
}
catch
{
$rst = "" | select Name,IP,Domain,Ping,WSMAN,CredSSP,RemoteReg,RPC,RDP
$rst.name = $name
$results += $rst
$failed = 1
}
Write-verbose "DNS: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
if($failed -eq 0){
foreach($ip in $ips)
{
$rst = "" | select Name,IP,Domain,Ping,WSMAN,CredSSP,RemoteReg,RPC,RDP
$rst.name = $name
$rst.ip = $ip
$rst.domain = $domain
####RDP Check (firewall may block rest so do before ping
try{
$socket = New-Object Net.Sockets.TcpClient($name, 3389)
if($socket -eq $null)
{
$rst.RDP = $false
}
else
{
$rst.RDP = $true
$socket.close()
}
}
catch
{
$rst.RDP = $false
}
Write-verbose "RDP: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
#########ping
if(test-connection $ip -count 1 -Quiet)
{
Write-verbose "PING: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
$rst.ping = $true
try{############wsman
Test-WSMan $ip | Out-Null
$rst.WSMAN = $true
}
catch
{$rst.WSMAN = $false}
Write-verbose "WSMAN: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
if($rst.WSMAN -and $credssp) ########### credssp
{
try{
Test-WSMan $ip -Authentication Credssp -Credential $cred
$rst.CredSSP = $true
}
catch
{$rst.CredSSP = $false}
Write-verbose "CredSSP: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
}
try ########remote reg
{
[Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine, $ip) | Out-Null
$rst.remotereg = $true
}
catch
{$rst.remotereg = $false}
Write-verbose "remote reg: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
try ######### wmi
{
$w = [wmi] ''
$w.psbase.options.timeout = 15000000
$w.path = "\\\\$Name\\root\\cimv2:Win32_ComputerSystem.Name='$Name'"
$w | select none | Out-Null
$rst.RPC = $true
}
catch
{$rst.rpc = $false}
Write-verbose "WMI: $((New-TimeSpan $dt ($dt = get-date)).totalseconds)"
}
else
{
$rst.ping = $false
$rst.wsman = $false
$rst.credssp = $false
$rst.remotereg = $false
$rst.rpc = $false
}
$results += $rst
}}
Write-Verbose "Time for $($Name): $((New-TimeSpan $cdt ($dt)).totalseconds)"
Write-Verbose "----------------------------"
}
}
end{
Write-Verbose "Time for all: $((New-TimeSpan $total ($dt)).totalseconds)"
Write-Verbose "----------------------------"
return $results
}
}
|
combined_dataset/train/non-malicious/sample_67_21.ps1 | sample_67_21.ps1 | # ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
param (
[Parameter(Mandatory=$true)]
[string] $FabricRuntimePackageOutputDirectory
)
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if(!$IsAdmin)
{
Write-host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
if(!$AcceptEULA.IsPresent)
{
$EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software.
[Y] Yes [N] No [?] Help (default is "N")'
if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y")
{
Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red"
exit 1
}
}
$ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition)
$DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents"
if(!(Test-Path $DeployerBinPath))
{
$DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe"
if(!(Test-Path $DCAutoExtractorPath))
{
Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location."
exit 1
}
#Extract DeploymentComponents
$DCExtractArguments = "/E /Y /L `"$ThisScriptPath`""
$DCExtractOutput = cmd.exe /c "$DCAutoExtractorPath $DCExtractArguments && exit 0 || exit 1"
if($LASTEXITCODE -eq 1)
{
Write-Host "Extracting DeploymentComponents Cab ran into an issue."
Write-Host $DCExtractOutput
exit 1
}
else
{
Write-Host "DeploymentComponents extracted."
}
}
$SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll"
if(!(Test-Path $SystemFabricModulePath))
{
Write-Host "Run the script local to the Standalone package directory."
exit 1
}
$ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1"
$FabricRuntimePackageOutputDirectoryAbsolutePath = Resolve-Path $FabricRuntimePackageOutputDirectory
if(!(Test-Path $FabricRuntimePackageOutputDirectoryAbsolutePath))
{
Write-Host "Output directory specified does not exist."
exit 1
}
# Invoke in separate AppDomain
$argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $FabricRuntimePackageOutputDirectoryAbsolutePath)
Powershell -Command {
param (
[Parameter(Mandatory=$true)]
[string] $DeployerBinPath,
[Parameter(Mandatory=$true)]
[string] $ServiceFabricPowershellModulePath,
[Parameter(Mandatory=$true)]
[string] $FabricRuntimePackageOutputDirectoryAbsolutePath
)
#Add FabricCodePath Environment Path
$env:path = "$($DeployerBinPath);" + $env:path
#Import Service Fabric Powershell Module
Import-Module $ServiceFabricPowershellModulePath
#Download Runtime Package
Try
{
$RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion -Latest
$RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $RuntimePackageDetails.GoalRuntimeVersion + ".cab"
$MicrosoftServiceFabricCabFilePath = Join-Path $FabricRuntimePackageOutputDirectoryAbsolutePath -ChildPath $RuntimeCabFilename
if(!(Test-Path $MicrosoftServiceFabricCabFilePath))
{
$Version = $RuntimePackageDetails.GoalRuntimeVersion
Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded."
(New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath)
Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath."
}
Resolve-Path $MicrosoftServiceFabricCabFilePath
}
Catch
{
Write-Host "Runtime package cannot be downloaded. Check you internet connectivity. If the cluster is not connected to the internet use DownloadServiceFabricRuntimePackage.ps1 script to download the latest package. Then run CreateServiceFabricCluster.ps1 -ClusterConfigurationFilePath <ClusterConfigFilePath> -FabricRuntimePackagePath <RuntimePackagePath> to create the cluster. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
} -args $argList -OutputFormat Text
$env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine")
# SIG # Begin signature block
# MIIdmwYJKoZIhvcNAQcCoIIdjDCCHYgCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUs/fl3ysxyqijyxkIu1UTIjuD
# pc+gghhfMIIE2jCCA8KgAwIBAgITMwAAAQ4bLwsITDNxqAAAAAABDjANBgkqhkiG
# 9w0BAQUFADB3MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSEw
# HwYDVQQDExhNaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EwHhcNMTgwODIzMjAyMDM5
# WhcNMTkxMTIzMjAyMDM5WjCByjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEm
# MCQGA1UECxMdVGhhbGVzIFRTUyBFU046MTJCNC0yRDVGLTg3RDQxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggEiMA0GCSqGSIb3DQEBAQUA
# A4IBDwAwggEKAoIBAQD2of4BuJr+l5YdMhnQvz9mz4sRndB3DovL3qM02OdJEAPl
# JqWDe8/ZdjYqpHBzMuPvkw8+JnoHr0TpY/WQFk/hE34F01TqkhsDuqsaLqe8V24m
# 8c9jcmfDcmx0yR7QZ/DdY8FbkrWck/ePKHKq4hRFhX2ynZlsVy0HGiuuSoj9q8iQ
# 5mku3z3DnC4heY9+v0h7KhKCgieimEqzrpHpvyHK+s91aMhpWjpTol0nZxyHbFTq
# 95wLkp6IqHIsyxtXwHJFmM+T3TVtccsxU2ckEvzJtzCm2Ee66HJBtI2G4OoSReK8
# 1BTC1xlNWQkSXLD5MvquL3dVevzEGDL9sCw5jyFxAgMBAAGjggEJMIIBBTAdBgNV
# HQ4EFgQUXpkTOkaccb8xG34+iCz+a4ZPT64wHwYDVR0jBBgwFoAUIzT42VJGcArt
# QPt2+7MrsMM1sw8wVAYDVR0fBE0wSzBJoEegRYZDaHR0cDovL2NybC5taWNyb3Nv
# ZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0VGltZVN0YW1wUENBLmNy
# bDBYBggrBgEFBQcBAQRMMEowSAYIKwYBBQUHMAKGPGh0dHA6Ly93d3cubWljcm9z
# b2Z0LmNvbS9wa2kvY2VydHMvTWljcm9zb2Z0VGltZVN0YW1wUENBLmNydDATBgNV
# HSUEDDAKBggrBgEFBQcDCDANBgkqhkiG9w0BAQUFAAOCAQEAMVyya9youGq7xaZi
# +3mc7Hv2USRlEsJny2Y9C0KHl1CUv3W1hLl9hHcOBTbYCkPybLbp4DDM00qGVQDt
# kBKoRHOESHd8xX7iP20EVj7YoH8bba8qoIVT/71F6tcldmwNaxA9TiLp9ClPhvOd
# fJBbN+Pem4DpPBT9NOgotvCBCFF0NXizqkk9wtEYdMTqxLYEs8napK/4rKx4CtW8
# IobSaURZhlRla9ph6BRkMQv1NcfsgzWgHkvT9RRL2zLSk7opGdo6HtUX6SCKFjQ7
# WaP8lllCOmpMVFNlSDpmY2GC9358vGL4scKii6lygcMevVlbxqmoV/ay0OyhKWNS
# tbZ54DCCBfQwggPcoAMCAQICEzMAAAECm/ALp45dw00AAAAAAQIwDQYJKoZIhvcN
# AQELBQAwfjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
# A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMTAeFw0xODA3MTIy
# MDA4NDhaFw0xOTA3MjYyMDA4NDhaMHQxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xHjAcBgNVBAMTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjCCASIw
# DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANQMBgSFCJYop+lrdNDiYZPjpTBf
# 9QjDW4T2wacw94hKh51p1Ph+8LLz89lGtOFkFf1vnsoWx1ioo5mM1af88Y0ad2Ds
# XUULx5tqUQmEA5LkEGqo+3I4DToEx7BWQS9MlKuwwMiiL5/R8wPZCQGlC6jdFaZe
# Yiihqq7b2tVEmqMJMtnFK9rsK20RjPXRHZpzcP+a+OilunSo6nZze9WW8Bi4J8zo
# 7ZRGEbhpl5X4mLNxmDHue9i7dbU5XyJkeQ1Z6qaEOPH6j2OXrFQXusmdP2UtN5fq
# fnAcmeXa4+puPtclHN8YBJ1r4EOEY28FSLG5XTwmaKwxyv1+7u7a22xGw1sCAwEA
# AaOCAXMwggFvMB8GA1UdJQQYMBYGCisGAQQBgjdMCAEGCCsGAQUFBwMDMB0GA1Ud
# DgQWBBSJFwWujTtn71whoV8lsN1JuTdO7zBFBgNVHREEPjA8pDowODEeMBwGA1UE
# CxMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMRYwFAYDVQQFEw0yMzAwMTIrNDM3OTY0
# MB8GA1UdIwQYMBaAFEhuZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBH
# oEWGQ2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNp
# Z1BDQTIwMTFfMjAxMS0wNy0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUF
# BzAChkVodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0Nv
# ZFNpZ1BDQTIwMTFfMjAxMS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG
# 9w0BAQsFAAOCAgEAk/YCcku0liV5Dhj7G7SYmGisI5nl62F8EeChIwDJfvNJKOB1
# /fNoxBnGoFZVaiK7NVUlG8FmcnOnYiK0QW6HMHosY6QmLX/5QLF4ecXD9XuNoefo
# QFZneTUEdmAmV402GZItm9ht0EFKxUzXHcd28nqzPyUTj43bK9dPFMnCZYqjG7nf
# 4sQYWAWs8e0MS+fkhH9EYstmopIqt8iRc0o8+4unKv/iYbQRWQHXi2uWIYatRm7b
# qplfsfBg6Oj4OSoSRlZ7WXt8DQL1nAIUthX8Z1v/siivkBGpOHz0RX8gH/Qrv1XJ
# LdVjU8DrF6Agi5gY5Vf1ApQyhBJvOlBv9daFEue3MwPBxUcw9oeP/H+JCmIZpRNI
# yw8+X5SAVlkws9PIdPogPc4xiG5asNzG5MivUwioKlk5unq6VD0wgz1BmW3Wz9jo
# sCWkPNSL5itVFHo+mpE5P4x+u1eElRAmQ8JmhNwrmSPMTU8l8dBAOUnvPy3RUbI+
# C70q1D2hb/VwqZ9rVZlBKWkSU6hL81PiyLZRN/1rvzvPrxfsgnhwoScAePRTs+HJ
# kUnmwLTPm9kxZVtAlwToOAGT4gnHK/v5vwh+ApOevIRAPEvCZfzu9TYUJTVrizEk
# QCVUA6RmR7PQI7aPF8mw72ByKIQk4KgINwrunNgHHoWLnM8Un6Hmku/VdYcwggYH
# MIID76ADAgECAgphFmg0AAAAAAAcMA0GCSqGSIb3DQEBBQUAMF8xEzARBgoJkiaJ
# k/IsZAEZFgNjb20xGTAXBgoJkiaJk/IsZAEZFgltaWNyb3NvZnQxLTArBgNVBAMT
# JE1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNzA0MDMx
# MjUzMDlaFw0yMTA0MDMxMzAzMDlaMHcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xITAfBgNVBAMTGE1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQTCC
# ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ+hbLHf20iSKnxrLhnhveLj
# xZlRI1Ctzt0YTiQP7tGn0UytdDAgEesH1VSVFUmUG0KSrphcMCbaAGvoe73siQcP
# 9w4EmPCJzB/LMySHnfL0Zxws/HvniB3q506jocEjU8qN+kXPCdBer9CwQgSi+aZs
# k2fXKNxGU7CG0OUoRi4nrIZPVVIM5AMs+2qQkDBuh/NZMJ36ftaXs+ghl3740hPz
# CLdTbVK0RZCfSABKR2YRJylmqJfk0waBSqL5hKcRRxQJgp+E7VV4/gGaHVAIhQAQ
# MEbtt94jRrvELVSfrx54QTF3zJvfO4OToWECtR0Nsfz3m7IBziJLVP/5BcPCIAsC
# AwEAAaOCAaswggGnMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFCM0+NlSRnAK
# 7UD7dvuzK7DDNbMPMAsGA1UdDwQEAwIBhjAQBgkrBgEEAYI3FQEEAwIBADCBmAYD
# VR0jBIGQMIGNgBQOrIJgQFYnl+UlE/wq4QpTlVnkpKFjpGEwXzETMBEGCgmSJomT
# 8ixkARkWA2NvbTEZMBcGCgmSJomT8ixkARkWCW1pY3Jvc29mdDEtMCsGA1UEAxMk
# TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5ghB5rRahSqClrUxz
# WPQHEy5lMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwubWljcm9zb2Z0LmNv
# bS9wa2kvY3JsL3Byb2R1Y3RzL21pY3Jvc29mdHJvb3RjZXJ0LmNybDBUBggrBgEF
# BQcBAQRIMEYwRAYIKwYBBQUHMAKGOGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
# a2kvY2VydHMvTWljcm9zb2Z0Um9vdENlcnQuY3J0MBMGA1UdJQQMMAoGCCsGAQUF
# BwMIMA0GCSqGSIb3DQEBBQUAA4ICAQAQl4rDXANENt3ptK132855UU0BsS50cVtt
# DBOrzr57j7gu1BKijG1iuFcCy04gE1CZ3XpA4le7r1iaHOEdAYasu3jyi9DsOwHu
# 4r6PCgXIjUji8FMV3U+rkuTnjWrVgMHmlPIGL4UD6ZEqJCJw+/b85HiZLg33B+Jw
# vBhOnY5rCnKVuKE5nGctxVEO6mJcPxaYiyA/4gcaMvnMMUp2MT0rcgvI6nA9/4UK
# E9/CCmGO8Ne4F+tOi3/FNSteo7/rvH0LQnvUU3Ih7jDKu3hlXFsBFwoUDtLaFJj1
# PLlmWLMtL+f5hYbMUVbonXCUbKw5TNT2eb+qGHpiKe+imyk0BncaYsk9Hm0fgvAL
# xyy7z0Oz5fnsfbXjpKh0NbhOxXEjEiZ2CzxSjHFaRkMUvLOzsE1nyJ9C/4B5IYCe
# FTBm6EISXhrIniIh0EPpK+m79EjMLNTYMoBMJipIJF9a6lbvpt6Znco6b72BJ3QG
# Ee52Ib+bgsEnVLaxaj2JoXZhtG6hE6a/qkfwEm/9ijJssv7fUciMI8lmvZ0dhxJk
# Aj0tr1mPuOQh5bWwymO0eFQF1EEuUKyUsKV4q7OglnUa2ZKHE3UiLzKoCG6gW4wl
# v6DvhMoh1useT8ma7kng9wFlb4kLfchpyOZu6qeXzjEp/w7FW1zYTRuh2Povnj8u
# VRZryROj/TCCB3owggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQELBQAw
# gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
# KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
# MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmlu
# ZyBQQ0EgMjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQ
# HC6t2G6qghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vGEtgL8DjCmQaw
# yDnVARQxQtOJDXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/XllnKYBoF
# 6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5kNXimoGMP
# LdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt7UOR
# g9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKdgCz1
# TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
# mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
# D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZ
# xe/CHFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4
# X7IvhNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11g
# lZo+TzOE2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEE
# AYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0fBFMwUTBP
# oE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRSMFAw
# TgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
# TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
# BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIg
# HQBMAGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4g
# HTANBgkqhkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3S
# eQyQwWVfLiw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQfYtGUFXYDJJ8
# 0hpLHPM8QotS0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32mkHSDjfTL
# JgJGKsKKELukqQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr3vw70L01
# 724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsatruWy
# 2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNNZgvA
# s0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
# Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
# pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1
# eBrs6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BX
# IqF4ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJz
# Ew16UM0xggSmMIIEogIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAy
# MDExAhMzAAABApvwC6eOXcNNAAAAAAECMAkGBSsOAwIaBQCggbowGQYJKoZIhvcN
# AQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUw
# IwYJKoZIhvcNAQkEMRYEFIhboonRzh3kYumP29LfTo7qX5bgMFoGCisGAQQBgjcC
# AQwxTDBKoCSAIgBNAGkAYwByAG8AcwBvAGYAdAAgAFcAaQBuAGQAbwB3AHOhIoAg
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3dpbmRvd3MwDQYJKoZIhvcNAQEBBQAE
# ggEAQe28BR/W654xLEgVfF8E/xcAxFRsb+ThRQMqAWt+sdMxVHpAaAZocfdkdnXe
# 5v2N4l21WurUX2h1TeWKTpErOmTLVvxb98SFdCAAPLM/dImXroMqGww+824ZSARm
# y6HSzcY9phZr5H8uu+OENTC5aYONEZouXxDvurXYY5aOpOTmWU9RwKU74HGRlW1e
# 4w9fqYYPXuhjB40eqWwb4mKH12WTDw/JvhofPXtEwrCVFp7nnkx9u5jVobwM01VE
# mMKzV0GHgzH9TtCkzy2n8WvRtvNsTPRc8RRqibMOILDcHPK+yF/LwjmIPrkqXnfv
# I6KF20fnD4yIVV9CM0n/WoqrCaGCAigwggIkBgkqhkiG9w0BCQYxggIVMIICEQIB
# ATCBjjB3MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSEwHwYD
# VQQDExhNaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0ECEzMAAAEOGy8LCEwzcagAAAAA
# AQ4wCQYFKw4DAhoFAKBdMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZI
# hvcNAQkFMQ8XDTE4MTEyMTEzMzg0OVowIwYJKoZIhvcNAQkEMRYEFM91ADY+m7rE
# dmjxS9TuTRAZWgKfMA0GCSqGSIb3DQEBBQUABIIBAJ+7oIN/SsP4MYBehXFpKZe0
# EonTgsTSInRoiWOFqrx8RoxvjzDXFesJyqbs3k4Y8A0qeMBmI0lKZMuf7XBn72C4
# bSxux/7zoFwIA2QzXZNURAk6d1PvFkiGvUuN5Su7uunVwLwJfZ/bqkveDCEFuBDG
# MtSvHWCaDXpfWTuqOrgYQweWX95A0PZsNI9TmIYBiGBankLP2bgsTmp+fHLxcZ3p
# 90bxWCfvO1E96qNm/XAAencr3QTuuWfcs1nTSpP3rmHsXbjez+LphcA17MFPScU9
# 5ROoechsJ1QUtOZ7cVPOaFuoot+Z0ZilEDwNkQMGeVF6FozLcOpEy6AY/YAk9gY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_51_34.ps1 | sample_51_34.ps1 | /*!-----------------------------------------------------------------------------
* Copyright (c) Microsoft Corporation. All rights reserved.
* Version: 0.46.0(21007360cad28648bdf46282a2592cb47c3a7a6f)
* Released under the MIT license
* https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt
*-----------------------------------------------------------------------------*/
define("vs/basic-languages/powerquery/powerquery", ["require"],(require)=>{
"use strict";
var moduleExports = (() => {
var __defProp = Object.defineProperty;
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
var __getOwnPropNames = Object.getOwnPropertyNames;
var __hasOwnProp = Object.prototype.hasOwnProperty;
var __export = (target, all) => {
for (var name in all)
__defProp(target, name, { get: all[name], enumerable: true });
};
var __copyProps = (to, from, except, desc) => {
if (from && typeof from === "object" || typeof from === "function") {
for (let key of __getOwnPropNames(from))
if (!__hasOwnProp.call(to, key) && key !== except)
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
}
return to;
};
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
// src/basic-languages/powerquery/powerquery.ts
var powerquery_exports = {};
__export(powerquery_exports, {
conf: () => conf,
language: () => language
});
var conf = {
comments: {
lineComment: "//",
blockComment: ["/*", "*/"]
},
brackets: [
["[", "]"],
["(", ")"],
["{", "}"]
],
autoClosingPairs: [
{ open: '"', close: '"', notIn: ["string", "comment", "identifier"] },
{ open: "[", close: "]", notIn: ["string", "comment", "identifier"] },
{ open: "(", close: ")", notIn: ["string", "comment", "identifier"] },
{ open: "{", close: "}", notIn: ["string", "comment", "identifier"] }
]
};
var language = {
defaultToken: "",
tokenPostfix: ".pq",
ignoreCase: false,
brackets: [
{ open: "[", close: "]", token: "delimiter.square" },
{ open: "{", close: "}", token: "delimiter.brackets" },
{ open: "(", close: ")", token: "delimiter.parenthesis" }
],
operatorKeywords: ["and", "not", "or"],
keywords: [
"as",
"each",
"else",
"error",
"false",
"if",
"in",
"is",
"let",
"meta",
"otherwise",
"section",
"shared",
"then",
"true",
"try",
"type"
],
constructors: ["#binary", "#date", "#datetime", "#datetimezone", "#duration", "#table", "#time"],
constants: ["#infinity", "#nan", "#sections", "#shared"],
typeKeywords: [
"action",
"any",
"anynonnull",
"none",
"null",
"logical",
"number",
"time",
"date",
"datetime",
"datetimezone",
"duration",
"text",
"binary",
"list",
"record",
"table",
"function"
],
builtinFunctions: [
"Access.Database",
"Action.Return",
"Action.Sequence",
"Action.Try",
"ActiveDirectory.Domains",
"AdoDotNet.DataSource",
"AdoDotNet.Query",
"AdobeAnalytics.Cubes",
"AnalysisServices.Database",
"AnalysisServices.Databases",
"AzureStorage.BlobContents",
"AzureStorage.Blobs",
"AzureStorage.Tables",
"Binary.Buffer",
"Binary.Combine",
"Binary.Compress",
"Binary.Decompress",
"Binary.End",
"Binary.From",
"Binary.FromList",
"Binary.FromText",
"Binary.InferContentType",
"Binary.Length",
"Binary.ToList",
"Binary.ToText",
"BinaryFormat.7BitEncodedSignedInteger",
"BinaryFormat.7BitEncodedUnsignedInteger",
"BinaryFormat.Binary",
"BinaryFormat.Byte",
"BinaryFormat.ByteOrder",
"BinaryFormat.Choice",
"BinaryFormat.Decimal",
"BinaryFormat.Double",
"BinaryFormat.Group",
"BinaryFormat.Length",
"BinaryFormat.List",
"BinaryFormat.Null",
"BinaryFormat.Record",
"BinaryFormat.SignedInteger16",
"BinaryFormat.SignedInteger32",
"BinaryFormat.SignedInteger64",
"BinaryFormat.Single",
"BinaryFormat.Text",
"BinaryFormat.Transform",
"BinaryFormat.UnsignedInteger16",
"BinaryFormat.UnsignedInteger32",
"BinaryFormat.UnsignedInteger64",
"Byte.From",
"Character.FromNumber",
"Character.ToNumber",
"Combiner.CombineTextByDelimiter",
"Combiner.CombineTextByEachDelimiter",
"Combiner.CombineTextByLengths",
"Combiner.CombineTextByPositions",
"Combiner.CombineTextByRanges",
"Comparer.Equals",
"Comparer.FromCulture",
"Comparer.Ordinal",
"Comparer.OrdinalIgnoreCase",
"Csv.Document",
"Cube.AddAndExpandDimensionColumn",
"Cube.AddMeasureColumn",
"Cube.ApplyParameter",
"Cube.AttributeMemberId",
"Cube.AttributeMemberProperty",
"Cube.CollapseAndRemoveColumns",
"Cube.Dimensions",
"Cube.DisplayFolders",
"Cube.Measures",
"Cube.Parameters",
"Cube.Properties",
"Cube.PropertyKey",
"Cube.ReplaceDimensions",
"Cube.Transform",
"Currency.From",
"DB2.Database",
"Date.AddDays",
"Date.AddMonths",
"Date.AddQuarters",
"Date.AddWeeks",
"Date.AddYears",
"Date.Day",
"Date.DayOfWeek",
"Date.DayOfWeekName",
"Date.DayOfYear",
"Date.DaysInMonth",
"Date.EndOfDay",
"Date.EndOfMonth",
"Date.EndOfQuarter",
"Date.EndOfWeek",
"Date.EndOfYear",
"Date.From",
"Date.FromText",
"Date.IsInCurrentDay",
"Date.IsInCurrentMonth",
"Date.IsInCurrentQuarter",
"Date.IsInCurrentWeek",
"Date.IsInCurrentYear",
"Date.IsInNextDay",
"Date.IsInNextMonth",
"Date.IsInNextNDays",
"Date.IsInNextNMonths",
"Date.IsInNextNQuarters",
"Date.IsInNextNWeeks",
"Date.IsInNextNYears",
"Date.IsInNextQuarter",
"Date.IsInNextWeek",
"Date.IsInNextYear",
"Date.IsInPreviousDay",
"Date.IsInPreviousMonth",
"Date.IsInPreviousNDays",
"Date.IsInPreviousNMonths",
"Date.IsInPreviousNQuarters",
"Date.IsInPreviousNWeeks",
"Date.IsInPreviousNYears",
"Date.IsInPreviousQuarter",
"Date.IsInPreviousWeek",
"Date.IsInPreviousYear",
"Date.IsInYearToDate",
"Date.IsLeapYear",
"Date.Month",
"Date.MonthName",
"Date.QuarterOfYear",
"Date.StartOfDay",
"Date.StartOfMonth",
"Date.StartOfQuarter",
"Date.StartOfWeek",
"Date.StartOfYear",
"Date.ToRecord",
"Date.ToText",
"Date.WeekOfMonth",
"Date.WeekOfYear",
"Date.Year",
"DateTime.AddZone",
"DateTime.Date",
"DateTime.FixedLocalNow",
"DateTime.From",
"DateTime.FromFileTime",
"DateTime.FromText",
"DateTime.IsInCurrentHour",
"DateTime.IsInCurrentMinute",
"DateTime.IsInCurrentSecond",
"DateTime.IsInNextHour",
"DateTime.IsInNextMinute",
"DateTime.IsInNextNHours",
"DateTime.IsInNextNMinutes",
"DateTime.IsInNextNSeconds",
"DateTime.IsInNextSecond",
"DateTime.IsInPreviousHour",
"DateTime.IsInPreviousMinute",
"DateTime.IsInPreviousNHours",
"DateTime.IsInPreviousNMinutes",
"DateTime.IsInPreviousNSeconds",
"DateTime.IsInPreviousSecond",
"DateTime.LocalNow",
"DateTime.Time",
"DateTime.ToRecord",
"DateTime.ToText",
"DateTimeZone.FixedLocalNow",
"DateTimeZone.FixedUtcNow",
"DateTimeZone.From",
"DateTimeZone.FromFileTime",
"DateTimeZone.FromText",
"DateTimeZone.LocalNow",
"DateTimeZone.RemoveZone",
"DateTimeZone.SwitchZone",
"DateTimeZone.ToLocal",
"DateTimeZone.ToRecord",
"DateTimeZone.ToText",
"DateTimeZone.ToUtc",
"DateTimeZone.UtcNow",
"DateTimeZone.ZoneHours",
"DateTimeZone.ZoneMinutes",
"Decimal.From",
"Diagnostics.ActivityId",
"Diagnostics.Trace",
"DirectQueryCapabilities.From",
"Double.From",
"Duration.Days",
"Duration.From",
"Duration.FromText",
"Duration.Hours",
"Duration.Minutes",
"Duration.Seconds",
"Duration.ToRecord",
"Duration.ToText",
"Duration.TotalDays",
"Duration.TotalHours",
"Duration.TotalMinutes",
"Duration.TotalSeconds",
"Embedded.Value",
"Error.Record",
"Excel.CurrentWorkbook",
"Excel.Workbook",
"Exchange.Contents",
"Expression.Constant",
"Expression.Evaluate",
"Expression.Identifier",
"Facebook.Graph",
"File.Contents",
"Folder.Contents",
"Folder.Files",
"Function.From",
"Function.Invoke",
"Function.InvokeAfter",
"Function.IsDataSource",
"GoogleAnalytics.Accounts",
"Guid.From",
"HdInsight.Containers",
"HdInsight.Contents",
"HdInsight.Files",
"Hdfs.Contents",
"Hdfs.Files",
"Informix.Database",
"Int16.From",
"Int32.From",
"Int64.From",
"Int8.From",
"ItemExpression.From",
"Json.Document",
"Json.FromValue",
"Lines.FromBinary",
"Lines.FromText",
"Lines.ToBinary",
"Lines.ToText",
"List.Accumulate",
"List.AllTrue",
"List.Alternate",
"List.AnyTrue",
"List.Average",
"List.Buffer",
"List.Combine",
"List.Contains",
"List.ContainsAll",
"List.ContainsAny",
"List.Count",
"List.Covariance",
"List.DateTimeZones",
"List.DateTimes",
"List.Dates",
"List.Difference",
"List.Distinct",
"List.Durations",
"List.FindText",
"List.First",
"List.FirstN",
"List.Generate",
"List.InsertRange",
"List.Intersect",
"List.IsDistinct",
"List.IsEmpty",
"List.Last",
"List.LastN",
"List.MatchesAll",
"List.MatchesAny",
"List.Max",
"List.MaxN",
"List.Median",
"List.Min",
"List.MinN",
"List.Mode",
"List.Modes",
"List.NonNullCount",
"List.Numbers",
"List.PositionOf",
"List.PositionOfAny",
"List.Positions",
"List.Product",
"List.Random",
"List.Range",
"List.RemoveFirstN",
"List.RemoveItems",
"List.RemoveLastN",
"List.RemoveMatchingItems",
"List.RemoveNulls",
"List.RemoveRange",
"List.Repeat",
"List.ReplaceMatchingItems",
"List.ReplaceRange",
"List.ReplaceValue",
"List.Reverse",
"List.Select",
"List.Single",
"List.SingleOrDefault",
"List.Skip",
"List.Sort",
"List.StandardDeviation",
"List.Sum",
"List.Times",
"List.Transform",
"List.TransformMany",
"List.Union",
"List.Zip",
"Logical.From",
"Logical.FromText",
"Logical.ToText",
"MQ.Queue",
"MySQL.Database",
"Number.Abs",
"Number.Acos",
"Number.Asin",
"Number.Atan",
"Number.Atan2",
"Number.BitwiseAnd",
"Number.BitwiseNot",
"Number.BitwiseOr",
"Number.BitwiseShiftLeft",
"Number.BitwiseShiftRight",
"Number.BitwiseXor",
"Number.Combinations",
"Number.Cos",
"Number.Cosh",
"Number.Exp",
"Number.Factorial",
"Number.From",
"Number.FromText",
"Number.IntegerDivide",
"Number.IsEven",
"Number.IsNaN",
"Number.IsOdd",
"Number.Ln",
"Number.Log",
"Number.Log10",
"Number.Mod",
"Number.Permutations",
"Number.Power",
"Number.Random",
"Number.RandomBetween",
"Number.Round",
"Number.RoundAwayFromZero",
"Number.RoundDown",
"Number.RoundTowardZero",
"Number.RoundUp",
"Number.Sign",
"Number.Sin",
"Number.Sinh",
"Number.Sqrt",
"Number.Tan",
"Number.Tanh",
"Number.ToText",
"OData.Feed",
"Odbc.DataSource",
"Odbc.Query",
"OleDb.DataSource",
"OleDb.Query",
"Oracle.Database",
"Percentage.From",
"PostgreSQL.Database",
"RData.FromBinary",
"Record.AddField",
"Record.Combine",
"Record.Field",
"Record.FieldCount",
"Record.FieldNames",
"Record.FieldOrDefault",
"Record.FieldValues",
"Record.FromList",
"Record.FromTable",
"Record.HasFields",
"Record.RemoveFields",
"Record.RenameFields",
"Record.ReorderFields",
"Record.SelectFields",
"Record.ToList",
"Record.ToTable",
"Record.TransformFields",
"Replacer.ReplaceText",
"Replacer.ReplaceValue",
"RowExpression.Column",
"RowExpression.From",
"Salesforce.Data",
"Salesforce.Reports",
"SapBusinessWarehouse.Cubes",
"SapHana.Database",
"SharePoint.Contents",
"SharePoint.Files",
"SharePoint.Tables",
"Single.From",
"Soda.Feed",
"Splitter.SplitByNothing",
"Splitter.SplitTextByAnyDelimiter",
"Splitter.SplitTextByDelimiter",
"Splitter.SplitTextByEachDelimiter",
"Splitter.SplitTextByLengths",
"Splitter.SplitTextByPositions",
"Splitter.SplitTextByRanges",
"Splitter.SplitTextByRepeatedLengths",
"Splitter.SplitTextByWhitespace",
"Sql.Database",
"Sql.Databases",
"SqlExpression.SchemaFrom",
"SqlExpression.ToExpression",
"Sybase.Database",
"Table.AddColumn",
"Table.AddIndexColumn",
"Table.AddJoinColumn",
"Table.AddKey",
"Table.AggregateTableColumn",
"Table.AlternateRows",
"Table.Buffer",
"Table.Column",
"Table.ColumnCount",
"Table.ColumnNames",
"Table.ColumnsOfType",
"Table.Combine",
"Table.CombineColumns",
"Table.Contains",
"Table.ContainsAll",
"Table.ContainsAny",
"Table.DemoteHeaders",
"Table.Distinct",
"Table.DuplicateColumn",
"Table.ExpandListColumn",
"Table.ExpandRecordColumn",
"Table.ExpandTableColumn",
"Table.FillDown",
"Table.FillUp",
"Table.FilterWithDataTable",
"Table.FindText",
"Table.First",
"Table.FirstN",
"Table.FirstValue",
"Table.FromColumns",
"Table.FromList",
"Table.FromPartitions",
"Table.FromRecords",
"Table.FromRows",
"Table.FromValue",
"Table.Group",
"Table.HasColumns",
"Table.InsertRows",
"Table.IsDistinct",
"Table.IsEmpty",
"Table.Join",
"Table.Keys",
"Table.Last",
"Table.LastN",
"Table.MatchesAllRows",
"Table.MatchesAnyRows",
"Table.Max",
"Table.MaxN",
"Table.Min",
"Table.MinN",
"Table.NestedJoin",
"Table.Partition",
"Table.PartitionValues",
"Table.Pivot",
"Table.PositionOf",
"Table.PositionOfAny",
"Table.PrefixColumns",
"Table.Profile",
"Table.PromoteHeaders",
"Table.Range",
"Table.RemoveColumns",
"Table.RemoveFirstN",
"Table.RemoveLastN",
"Table.RemoveMatchingRows",
"Table.RemoveRows",
"Table.RemoveRowsWithErrors",
"Table.RenameColumns",
"Table.ReorderColumns",
"Table.Repeat",
"Table.ReplaceErrorValues",
"Table.ReplaceKeys",
"Table.ReplaceMatchingRows",
"Table.ReplaceRelationshipIdentity",
"Table.ReplaceRows",
"Table.ReplaceValue",
"Table.ReverseRows",
"Table.RowCount",
"Table.Schema",
"Table.SelectColumns",
"Table.SelectRows",
"Table.SelectRowsWithErrors",
"Table.SingleRow",
"Table.Skip",
"Table.Sort",
"Table.SplitColumn",
"Table.ToColumns",
"Table.ToList",
"Table.ToRecords",
"Table.ToRows",
"Table.TransformColumnNames",
"Table.TransformColumnTypes",
"Table.TransformColumns",
"Table.TransformRows",
"Table.Transpose",
"Table.Unpivot",
"Table.UnpivotOtherColumns",
"Table.View",
"Table.ViewFunction",
"TableAction.DeleteRows",
"TableAction.InsertRows",
"TableAction.UpdateRows",
"Tables.GetRelationships",
"Teradata.Database",
"Text.AfterDelimiter",
"Text.At",
"Text.BeforeDelimiter",
"Text.BetweenDelimiters",
"Text.Clean",
"Text.Combine",
"Text.Contains",
"Text.End",
"Text.EndsWith",
"Text.Format",
"Text.From",
"Text.FromBinary",
"Text.Insert",
"Text.Length",
"Text.Lower",
"Text.Middle",
"Text.NewGuid",
"Text.PadEnd",
"Text.PadStart",
"Text.PositionOf",
"Text.PositionOfAny",
"Text.Proper",
"Text.Range",
"Text.Remove",
"Text.RemoveRange",
"Text.Repeat",
"Text.Replace",
"Text.ReplaceRange",
"Text.Select",
"Text.Split",
"Text.SplitAny",
"Text.Start",
"Text.StartsWith",
"Text.ToBinary",
"Text.ToList",
"Text.Trim",
"Text.TrimEnd",
"Text.TrimStart",
"Text.Upper",
"Time.EndOfHour",
"Time.From",
"Time.FromText",
"Time.Hour",
"Time.Minute",
"Time.Second",
"Time.StartOfHour",
"Time.ToRecord",
"Time.ToText",
"Type.AddTableKey",
"Type.ClosedRecord",
"Type.Facets",
"Type.ForFunction",
"Type.ForRecord",
"Type.FunctionParameters",
"Type.FunctionRequiredParameters",
"Type.FunctionReturn",
"Type.Is",
"Type.IsNullable",
"Type.IsOpenRecord",
"Type.ListItem",
"Type.NonNullable",
"Type.OpenRecord",
"Type.RecordFields",
"Type.ReplaceFacets",
"Type.ReplaceTableKeys",
"Type.TableColumn",
"Type.TableKeys",
"Type.TableRow",
"Type.TableSchema",
"Type.Union",
"Uri.BuildQueryString",
"Uri.Combine",
"Uri.EscapeDataString",
"Uri.Parts",
"Value.Add",
"Value.As",
"Value.Compare",
"Value.Divide",
"Value.Equals",
"Value.Firewall",
"Value.FromText",
"Value.Is",
"Value.Metadata",
"Value.Multiply",
"Value.NativeQuery",
"Value.NullableEquals",
"Value.RemoveMetadata",
"Value.ReplaceMetadata",
"Value.ReplaceType",
"Value.Subtract",
"Value.Type",
"ValueAction.NativeStatement",
"ValueAction.Replace",
"Variable.Value",
"Web.Contents",
"Web.Page",
"WebAction.Request",
"Xml.Document",
"Xml.Tables"
],
builtinConstants: [
"BinaryEncoding.Base64",
"BinaryEncoding.Hex",
"BinaryOccurrence.Optional",
"BinaryOccurrence.Repeating",
"BinaryOccurrence.Required",
"ByteOrder.BigEndian",
"ByteOrder.LittleEndian",
"Compression.Deflate",
"Compression.GZip",
"CsvStyle.QuoteAfterDelimiter",
"CsvStyle.QuoteAlways",
"Culture.Current",
"Day.Friday",
"Day.Monday",
"Day.Saturday",
"Day.Sunday",
"Day.Thursday",
"Day.Tuesday",
"Day.Wednesday",
"ExtraValues.Error",
"ExtraValues.Ignore",
"ExtraValues.List",
"GroupKind.Global",
"GroupKind.Local",
"JoinAlgorithm.Dynamic",
"JoinAlgorithm.LeftHash",
"JoinAlgorithm.LeftIndex",
"JoinAlgorithm.PairwiseHash",
"JoinAlgorithm.RightHash",
"JoinAlgorithm.RightIndex",
"JoinAlgorithm.SortMerge",
"JoinKind.FullOuter",
"JoinKind.Inner",
"JoinKind.LeftAnti",
"JoinKind.LeftOuter",
"JoinKind.RightAnti",
"JoinKind.RightOuter",
"JoinSide.Left",
"JoinSide.Right",
"MissingField.Error",
"MissingField.Ignore",
"MissingField.UseNull",
"Number.E",
"Number.Epsilon",
"Number.NaN",
"Number.NegativeInfinity",
"Number.PI",
"Number.PositiveInfinity",
"Occurrence.All",
"Occurrence.First",
"Occurrence.Last",
"Occurrence.Optional",
"Occurrence.Repeating",
"Occurrence.Required",
"Order.Ascending",
"Order.Descending",
"Precision.Decimal",
"Precision.Double",
"QuoteStyle.Csv",
"QuoteStyle.None",
"RelativePosition.FromEnd",
"RelativePosition.FromStart",
"RoundingMode.AwayFromZero",
"RoundingMode.Down",
"RoundingMode.ToEven",
"RoundingMode.TowardZero",
"RoundingMode.Up",
"SapHanaDistribution.All",
"SapHanaDistribution.Connection",
"SapHanaDistribution.Off",
"SapHanaDistribution.Statement",
"SapHanaRangeOperator.Equals",
"SapHanaRangeOperator.GreaterThan",
"SapHanaRangeOperator.GreaterThanOrEquals",
"SapHanaRangeOperator.LessThan",
"SapHanaRangeOperator.LessThanOrEquals",
"SapHanaRangeOperator.NotEquals",
"TextEncoding.Ascii",
"TextEncoding.BigEndianUnicode",
"TextEncoding.Unicode",
"TextEncoding.Utf16",
"TextEncoding.Utf8",
"TextEncoding.Windows",
"TraceLevel.Critical",
"TraceLevel.Error",
"TraceLevel.Information",
"TraceLevel.Verbose",
"TraceLevel.Warning",
"WebMethod.Delete",
"WebMethod.Get",
"WebMethod.Head",
"WebMethod.Patch",
"WebMethod.Post",
"WebMethod.Put"
],
builtinTypes: [
"Action.Type",
"Any.Type",
"Binary.Type",
"BinaryEncoding.Type",
"BinaryOccurrence.Type",
"Byte.Type",
"ByteOrder.Type",
"Character.Type",
"Compression.Type",
"CsvStyle.Type",
"Currency.Type",
"Date.Type",
"DateTime.Type",
"DateTimeZone.Type",
"Day.Type",
"Decimal.Type",
"Double.Type",
"Duration.Type",
"ExtraValues.Type",
"Function.Type",
"GroupKind.Type",
"Guid.Type",
"Int16.Type",
"Int32.Type",
"Int64.Type",
"Int8.Type",
"JoinAlgorithm.Type",
"JoinKind.Type",
"JoinSide.Type",
"List.Type",
"Logical.Type",
"MissingField.Type",
"None.Type",
"Null.Type",
"Number.Type",
"Occurrence.Type",
"Order.Type",
"Password.Type",
"Percentage.Type",
"Precision.Type",
"QuoteStyle.Type",
"Record.Type",
"RelativePosition.Type",
"RoundingMode.Type",
"SapHanaDistribution.Type",
"SapHanaRangeOperator.Type",
"Single.Type",
"Table.Type",
"Text.Type",
"TextEncoding.Type",
"Time.Type",
"TraceLevel.Type",
"Type.Type",
"Uri.Type",
"WebMethod.Type"
],
tokenizer: {
root: [
// quoted identifier
[/#"[\w \.]+"/, "identifier.quote"],
// numbers
[/\d*\.\d+([eE][\-+]?\d+)?/, "number.float"],
[/0[xX][0-9a-fA-F]+/, "number.hex"],
[/\d+([eE][\-+]?\d+)?/, "number"],
// keywords
[
/(#?[a-z]+)\b/,
{
cases: {
"@typeKeywords": "type",
"@keywords": "keyword",
"@constants": "constant",
"@constructors": "constructor",
"@operatorKeywords": "operators",
"@default": "identifier"
}
}
],
// built-in types
[
/\b([A-Z][a-zA-Z0-9]+\.Type)\b/,
{
cases: {
"@builtinTypes": "type",
"@default": "identifier"
}
}
],
// other built-ins
[
/\b([A-Z][a-zA-Z0-9]+\.[A-Z][a-zA-Z0-9]+)\b/,
{
cases: {
"@builtinFunctions": "keyword.function",
"@builtinConstants": "constant",
"@default": "identifier"
}
}
],
// other identifiers
[/\b([a-zA-Z_][\w\.]*)\b/, "identifier"],
{ include: "@whitespace" },
{ include: "@comments" },
{ include: "@strings" },
[/[{}()\[\]]/, "@brackets"],
[/([=\+<>\-\*&@\?\/!])|([<>]=)|(<>)|(=>)|(\.\.\.)|(\.\.)/, "operators"],
[/[,;]/, "delimiter"]
],
whitespace: [[/\s+/, "white"]],
comments: [
["\\/\\*", "comment", "@comment"],
["\\/\\/+.*", "comment"]
],
comment: [
["\\*\\/", "comment", "@pop"],
[".", "comment"]
],
strings: [['"', "string", "@string"]],
string: [
['""', "string.escape"],
['"', "string", "@pop"],
[".", "string"]
]
}
};
return __toCommonJS(powerquery_exports);
})();
return moduleExports;
});
|
combined_dataset/train/non-malicious/sample_21_72.ps1 | sample_21_72.ps1 | # Copyright 2021-2023 VMware, Inc.
# SPDX-License-Identifier: Apache-2
<#
.SYNOPSIS
VMware Tools script for managing the Salt minion on a Windows guest
.DESCRIPTION
This script manages the Salt minion on a Windows guest. The minion is a OneDir
build hosted on https://repo.saltproject.io/salt/py3/onedir/. You can install
the minion, remove it, check script dependencies, get the Salt minion
installation status, and reset the Salt minion configuration.
When this script is run without any parameters, the action is obtained from
guestVars (if present). If no action is found, the script will exit with a
scriptFailed exit code.
If an action is passed on the CLI or found in guestVars, minion config options
(master=198.51.100.1, etc.) are queried from guestVars. Config options are then
obtained from tools.conf. Config options obtained from tools.conf will overwrite
any config options obtained from guestVars with the same name. Config options
passed on the CLI will overwrite any config options obtained from either of the
previous two methods. The order of precedence is CLI options first, then
tools.conf, and finally guestVars.
This script returns exit codes to signal its success or failure. The exit codes
are as follows:
0 - scriptSuccess
126 - scriptFailed
130 - scriptTerminated
If the Status option is passed, then the exit code will signal the status of the
Salt minion installation. Status exit codes are as follows:
100 - installed
101 - installing
102 - notInstalled
103 - installFailed
104 - removing
105 - removeFailed
106 - externalInstall
NOTE: This script must be run with Administrator privileges
.EXAMPLE
PS>svtminion.ps1 -Install
PS>svtminion.ps1 -Install -MinionVersion 3004-1 master=192.168.10.10 id=dev_box
PS>svtminion.ps1 -Install -Source https://my.domain.com/vmtools/salt
.EXAMPLE
PS>svtminion.ps1 -Clear
.EXAMPLE
PS>svtminion.ps1 -Status
.EXAMPLE
PS>svtminion.ps1 -Depend
.EXAMPLE
PS>svtminion.ps1 -Remove -LogLevel debug
#>
[CmdletBinding(DefaultParameterSetName = "Install")]
param(
[Parameter(Mandatory=$false, ParameterSetName="Install")]
[Alias("i")]
# Downloads, installs, and starts the salt-minion service. Exits with
# scriptFailed exit (126) code under the following conditions:
# - Existing Standard Salt Installation detected
# - Unknown status found
# - Installation in progress
# - Removal in progress
# - Installation failed
# - Missing script dependencies
#
# Exits with scriptSuccess exit code (0) under the following conditions:
# - Installed successfully
# - Already installed
[Switch] $Install,
[Parameter(Mandatory=$false, ParameterSetName="Install")]
[Alias("m")]
# The version of Salt minion to install. Default is "latest".
[String] $MinionVersion="latest",
[Parameter(Mandatory=$false, ParameterSetName="Install")]
[Alias("j")]
# The url or path to the repo containing the installers and, preferably, the
# repo.json file. This would contain a directory structure similar to that
# found at the default location:
#
# https://repo.saltproject.io/salt/py3/onedir
#
# The root of this directory preferably contains a file named `repo.json`
# which contains the information about the installer versions available.
# If this file not available, this script will scan the directory for the
# requested version.
#
# This can handle most common protocols: http, https, ftp, unc, local
[String] $Source="https://repo.saltproject.io/salt/py3/onedir",
[Parameter(Mandatory=$false, ParameterSetName="Install",
Position=0, ValueFromRemainingArguments=$true)]
# Any number of minion config options specified by the name of the config
# option as found in Salt documentation. All options will be lower-cased and
# written to the minion config as passed. All values are in the key=value
# format. For example: master=localhost
[String[]] $ConfigOptions,
[Parameter(Mandatory=$false, ParameterSetName="Remove")]
[Alias("r")]
# Stops and uninstalls the salt-minion service. Exits with scriptFailed exit
# code (126) under the following conditions:
# - Unknown status found
# - Installation in progress
# - Removal in progress
# - Installation failed
# - Missing script dependencies
#
# Exits with scriptSuccess exit code (0) under the following conditions:
# - Removed successfully
# - Already removed
[Switch] $Remove,
[Parameter(Mandatory=$false, ParameterSetName="Clear")]
[Alias("c")]
# Resets the salt-minion by randomizing the minion ID and removing the
# minion keys. The randomized minion ID will be the old minion ID, an
# underscore, and 5 random digits.
#
# Exits with scriptFailed exit code (126) under the following conditions:
# - Unknown status found
# - Missing script dependencies
#
# Exits with scriptSuccess exit code (0) under the following conditions:
# - Cleared successfully
# - Not installed
[Switch] $Clear,
[Parameter(Mandatory=$false, ParameterSetName="Status")]
[Alias("s")]
# Gets the status of the Salt minion installation. This command returns an
# exit code that corresponds to one of the following:
# 100 - installed
# 101 - installing
# 102 - notInstalled
# 103 - installFailed
# 104 - removing
# 105 - removeFailed
# 106 - externalInstall
#
# Exits with scriptFailed exit code (126) under the following conditions:
# - Unknown status found
# - Missing script dependencies
[Switch] $Status,
[Parameter(Mandatory=$false, ParameterSetName="Depend")]
[Alias("d")]
# Ensures the required dependencies are available. Exits with a scriptFailed
# exit code (126) if any dependencies are missing. Exits with a
# scriptSuccess exit code (0) if all dependencies are present.
[Switch] $Depend,
[Parameter(Mandatory=$false, ParameterSetName="Install")]
[Parameter(ParameterSetName="Clear")]
[Parameter(ParameterSetName="Status")]
[Parameter(ParameterSetName="Depend")]
[Parameter(ParameterSetName="Remove")]
[Alias("l")]
[ValidateSet(
"silent",
"error",
"warning",
"info",
"debug",
IgnoreCase=$true)]
[String]
# Sets the log level to display and log. Default is warning. Silent
# suppresses all logging output. Available options are:
# - silent
# - error
# - warning
# - info
# - debug
# Logs are placed in C:\Windows\temp and are named according to the action
# the script is performing and a timestamp for when the script was run.
# This is a sample name:
# `vmware-svtminion-<action>-<timestamp>.log`
$LogLevel = "warning",
[Parameter(Mandatory=$false, ParameterSetName="Help")]
[Parameter(ParameterSetName="Install")]
[Parameter(ParameterSetName="Clear")]
[Parameter(ParameterSetName="Status")]
[Parameter(ParameterSetName="Depend")]
[Parameter(ParameterSetName="Remove")]
[Alias("h")]
[Switch]
# Displays help for this script.
$Help,
[Parameter(Mandatory=$false, ParameterSetName="Version")]
[Parameter(ParameterSetName="Install")]
[Parameter(ParameterSetName="Clear")]
[Parameter(ParameterSetName="Status")]
[Parameter(ParameterSetName="Depend")]
[Parameter(ParameterSetName="Remove")]
[Alias("v")]
[Switch]
# Displays the version of this script.
$Version
)
# Set TLS1.2 as default
[System.Net.ServicePointManager]::SecurityProtocol = `
[System.Net.SecurityProtocolType]'Tls12'
################################ HELP/VERSION ##################################
# We'll put these functions first because they don't require administrator
# privileges to run
# Check for help switch
if ($help) {
# Get the full script name
$this_script = & {$myInvocation.ScriptName}
Get-Help $this_script -Detailed
exit 0
}
# This value is populated via CICD during build
# $script_version = "SCRIPT_VERSION_REPLACE"
$script_version = "1.6"
if ($Version) {
Write-Host $script_version
exit 0
}
# Only run on 64-bit architecture
if ( [System.IntPtr]::Size -eq 4 ) {
Write-Host "This script only supports 64-bit architecture"
exit 0
}
################################# STATUS CODES #################################
$STATUS_CODES = @{
"scriptSuccess" = 0;
"installed" = 100;
"installing" = 101;
"notInstalled" = 102;
"installFailed" = 103;
"removing" = 104;
"removeFailed" = 105;
"externalInstall" = 106;
"scriptFailed" = 126;
"scriptTerminated" = 130;
100 = "installed";
101 = "installing";
102 = "notInstalled";
103 = "installFailed"
104 = "removing";
105 = "removeFailed";
106 = "externalInstall";
}
################################ REQUIREMENTS ##################################
# Make sure the script is run as Administrator
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
if (!($Principal.IsInRole(
[System.Security.Principal.WindowsBuiltInRole]::Administrator
))) {
Write-Host "This script must run as Administrator" -ForegroundColor Red
exit $STATUS_CODES["scriptFailed"]
}
################################# LOGGING ######################################
$LOG_LEVELS = @{
"silent" = 0;
"error" = 1;
"warning" = 2;
"info" = 3;
"debug" = 4
}
$log_level_value = $LOG_LEVELS[$LogLevel.ToLower()]
################################# SETTINGS #####################################
$global:ErrorActionPreference = "Stop"
$global:ProgressPreference = "SilentlyContinue"
$Script:log_cleared = $false
$download_retry_count = 5
$script_date = Get-Date -Format "yyyyMMddHHmmss"
$script_name = $MyInvocation.MyCommand.Name
$script_log_dir = "$env:SystemRoot\Temp"
# log file name: vmware-svtminion-{0}-20211019152012.log
$script_log_base_name = "vmware-$($script_name.Split(".")[0])-{0}"
$script_log_name = "$script_log_base_name-$script_date.log"
$script_log_file_count = 5
$action_list = @("install", "remove", "depend", "clear", "status")
################################# VARIABLES ####################################
# Repository locations and names
$salt_name = "salt"
$base_url = $Source
$default_source = "https://repo.saltproject.io/salt/py3/onedir"
$pre_3006_source = "https://repo.saltproject.io/salt/vmware-tools-onedir"
# Salt file and directory locations
$base_salt_install_location = "$env:ProgramFiles\Salt Project"
$salt_dir = "$base_salt_install_location\$salt_name"
$salt_bin = "$salt_dir\salt\salt.exe" # Tiamat Builds
$salt_minion_bin = "$salt_dir\salt-minion.exe" # Relenv Builds
$ssm_bin = "$salt_dir\ssm.exe"
$base_salt_config_location = "$env:ProgramData\Salt Project"
$salt_root_dir = "$base_salt_config_location\$salt_name"
$salt_config_dir = "$salt_root_dir\conf"
$salt_config_name = "minion"
$salt_config_file = "$salt_config_dir\$salt_config_name"
$salt_pki_dir = "$salt_config_dir\pki\$salt_config_name"
$salt_log_dir = "$salt_root_dir\var\log\salt"
# Files/Dirs to remove
$file_dirs_to_remove = New-Object System.Collections.Generic.List[String]
$file_dirs_to_remove.Add($base_salt_config_location) | Out-Null
$file_dirs_to_remove.Add($base_salt_install_location) | Out-Null
# Old Salt install location left behind by older versions of Salt
# Pre 3004
$file_dirs_to_remove.Add("C:\salt") | Out-Null
## VMware registry locations
$salt_base_reg = "HKLM:\SOFTWARE\Salt Project\salt"
$vmtools_base_reg = "HKLM:\SOFTWARE\VMware, Inc.\VMware Tools"
$vmtools_salt_minion_status_name = "SaltMinionStatus"
try{
$reg_key = Get-ItemProperty $vmtools_base_reg
} catch {
if (Test-Path $vmtools_base_reg) {
$msg = "VMware Tools not installed: $_"
Write-Host $msg
exit $STATUS_CODES["scriptFailed"]
}
}
if (!($reg_key.PSObject.Properties.Name -contains "InstallPath")) {
if (Test-Path $vmtools_base_reg) {
# Only error out on systems with VMware Tools installed
$msg = "Unable to find VMware Tools installation"
Write-Host $msg
exit $STATUS_CODES["scriptFailed"]
}
} else {
## VMware file and directory locations
$vmtools_reg = Get-ItemProperty -Path $vmtools_base_reg -Name "InstallPath"
$vmtools_base_dir = $vmtools_reg.InstallPath
$vmtools_conf_dir = "$env:ProgramData\VMware\VMware Tools"
$vmtools_conf_file = "$vmtools_conf_dir\tools.conf"
$vmtoolsd_bin = "$vmtools_base_dir\vmtoolsd.exe"
}
# If VMTools reg path exists, then we're on a VMTools system
if ( Test-Path $vmtools_base_reg ) {
$reg_path = $vmtools_base_reg
} else {
$reg_path = $salt_base_reg
if ( !(Test-Path $salt_base_reg) ) {
New-Item -Path "$salt_base_reg" -Force
}
}
## VMware guestVars file and directory locations
$guestvars_base = "guestinfo./vmware.components"
$guestvars_section = "salt_minion"
$guestvars_salt = "$guestvars_base.$guestvars_section"
$guestvars_salt_args = "$guestvars_salt.args"
$guestvars_salt_desired_state = "$guestvars_salt.desiredstate"
################################ TEST FUNCTIONS ################################
function Get-Version {
return $script_version
}
############################### HELPER FUNCTIONS ###############################
function Clear-OldLogs {
$filter = "*$script_log_base_name*.log" -f $Action.ToLower()
$files = Get-ChildItem $script_log_dir -Filter $filter | Sort-Object
$total_files = $files.Count
try {
foreach ($file in $files) {
if ($total_files -ge $script_log_file_count) {
# Remove the file/dir/synlink/junction
$file_obj = Get-Item -Path $file.FullName
if ($file_obj -is [System.IO.DirectoryInfo]) {
[System.IO.Directory]::Delete(`
$file.FullName, $true) | Out-Null
} else {
[System.IO.File]::Delete($file.FullName) | Out-Null
}
$total_files -= 1
} else {
break
}
}
} finally {
$Script:log_cleared = $true
}
}
function Write-Log {
# Function for writing logs to the screen and to the log file
#
# Args:
# Message (string): The log message
# Level (string):
# The log level. Must be one of error, info, warning, debug. Default
# is info
[CmdletBinding()]
param(
[Parameter(Mandatory=$true, Position=0)]
[String] $Message,
[Parameter()]
[ValidateSet("error", "info", "warning", "debug", IgnoreCase=$true)]
[String] $Level = "info"
)
$Level = $Level.ToUpper()
$level_text = $Level + " " * (7 - $Level.Length)
$script_pid = $PID + " " * (5 - $PID.Length)
if ( $LOG_LEVELS[$Level.ToLower()] -le $log_level_value ) {
$date_time = Get-Date -Format "yyyy-MM-dd:HH:mm:ss.ffff"
$timestamp = Get-Date -Format "HH:mm:ss.ffff"
$log_message = "[$timestamp] [$level_text] $Message"
$log_file_message = "[$date_time] [$script_pid] [$level_text] $Message"
if (!(Test-Path($script_log_dir))) {
Write-Host "[$timestamp] [INFO ] : Creating log file directory"
New-Item -Path $script_log_dir -Type Directory | Out-Null
}
if (!($action_list -contains $Action)) { $Action = "Default" }
if (!$Script:log_cleared) {
Clear-OldLogs
}
$log_path = "$script_log_dir\$script_log_name" -f $Action
Add-Content -Path $log_path.ToLower() -Value $log_file_message
switch ($Level) {
"ERROR" { $color = "Red" }
"WARNING" { $color = "Yellow" }
default { $color = "White"}
}
Write-Host $log_message -ForegroundColor $color
}
}
function Get-ScriptRunningStatus {
# Try to detect if this script is already running under another process
#
# Returns True if running, otherwise False
Write-Log "Checking for a running instance of this script" -Level info
#Get all running powershell processes
$filter = "Name='powershell.exe' AND CommandLine LIKE '%$script_name%'"
$processes = Get-WmiObject Win32_Process -Filter $filter | `
Select-Object CommandLine,ProcessId
$process_found = $false
foreach ($process in $processes) {
[Int32]$process_pid = $process.ProcessId
[String]$process_cmd = $process.commandline
#Are other instances of this script already running?
if (($process_cmd -match $script_name) -And ($process_pid -ne $PID)) {
$process_found = $true
}
}
if ($process_found) {
Write-Log "Found running instance in PID: $process_pid" -Level debug
return $true
} else {
Write-Log "Running instance not detected" -Level debug
return $false
}
}
function Get-Status {
# Read the status out of the registry. If the key is missing that means
# notInstalled
#
# Returns the error level number
$script_running_status = Get-ScriptRunningStatus
Write-Log "Getting status" -Level info
try {
$current_status = Get-ItemProperty `
-Path $reg_path `
-Name $vmtools_salt_minion_status_name
$current_status = $current_status.($vmtools_salt_minion_status_name)
Write-Log "Found status code: $current_status" -Level debug
} catch {
Write-Log "Key not set, not installed : $_" -Level debug
$current_status = $STATUS_CODES["notInstalled"]
}
# If status is 101 or 104 (installing or removing) but there isn't another
# script running, then the status is installFailed or removeFailed
$list_ing = @($STATUS_CODES["installing"], $STATUS_CODES["removing"])
if (($list_ing -contains $current_status) -and !($script_running_status)) {
switch ($current_status) {
$STATUS_CODES["installing"] {
Write-Log "Found failed install" -Level debug
$current_status = $STATUS_CODES["installFailed"]
}
$STATUS_CODES["removing"] {
Write-Log "Found failed remove" -Level debug
$current_status = $STATUS_CODES["removeFailed"]
}
}
}
if ($STATUS_CODES.keys -contains $current_status) {
$status_lookup = $STATUS_CODES[$current_status]
Write-Log "Found status: $status_lookup" -Level debug
} else {
Write-Log "Unknown status code: $current_status" -Level debug
}
return $current_status
}
function Set-Status {
# Set the numeric value of the status in the registry. notInstalled means to
# remove the key
#
# Args:
# NewStatus (string):
# The status to set. Must be one of the following:
# - installed
# - installing
# - notInstalled
# - installFailed
# - removing
# - removeFailed
# - externalInstall
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateSet(
"installed",
"installing",
"notInstalled",
"installFailed",
"removing",
"removeFailed",
"externalInstall"
)]
[String] $NewStatus
)
Write-Log "Setting status: $NewStatus" -Level info
$status_code = $STATUS_CODES[$NewStatus]
# If it's notInstalled, just remove the property name
if ($status_code -eq $STATUS_CODES["notInstalled"]) {
try {
Remove-ItemProperty -Path "$reg_path"`
-Name $vmtools_salt_minion_status_name
$key = "$reg_path\$vmtools_salt_minion_status_name"
Write-Log "Removed reg key: $key" -Level debug
Write-Log "Set status to $NewStatus" -Level debug
} catch [System.Management.Automation.PSArgumentException] {
Write-Log "Reg key not present: $key" -Level debug
Write-Log "Status already set to: $NewStatus" -Level debug
} catch {
Write-Log "Error removing reg key: $_" -Level error
exit $STATUS_CODES["scriptFailed"]
}
} else {
try {
New-ItemProperty -Path "$reg_path"`
-Name $vmtools_salt_minion_status_name `
-Value $status_code `
-Force | Out-Null
Write-Log "Set status to $NewStatus" -Level debug
} catch {
if (Test-Path $vmtools_base_reg) {
Write-Log "Error writing status: $_" -Level error
exit $STATUS_CODES["scriptFailed"]
} else {
Write-Log "Error writing status: $_" -Level warning
}
}
}
}
function Set-FailedStatus {
# Sets the status if either add or remove fails, each sets a different
# status if it fails
switch ($Action.ToLower()) {
"install" { Set-Status installFailed }
"remove" { Set-Status removeFailed }
}
}
function Get-WebFile{
# Downloads a file from the web. Enables the TLS1.2 protocol. If the
# download times out, wait 10 seconds and try again. Continues retrying
# until the download retry count max is reached
#
# Used by:
# - Get-SaltFromWeb
#
# Args:
# Url (string): The url for the file to download
# OutFile (string): The location to put the downloaded file
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Url,
[Parameter(Mandatory=$true)]
[String] $OutFile
)
$parent_dir = Split-Path $OutFile
if ( !( Test-Path $parent_dir )) {
New-Item $parent_dir -Type Directory | Out-Null
}
$url_name = $Url.SubString($Url.LastIndexOf('/'))
$tries = 1
$success = $false
while (!$success){
try {
# Download the file
$msg = "Downloading (try: $tries/$download_retry_count): $url_name"
Write-Log $msg -Level debug
Invoke-WebRequest -Uri $Url -OutFile $OutFile
} catch {
Write-Log "Error downloading: $Url" -Level warning
Write-Log "Error message: $_" -Level warning
} finally {
$tries++
if ((Test-Path -Path "$OutFile") `
-and `
((Get-Item "$OutFile").Length -gt 0kb
)) {
Write-Log "Finished downloading: $url_name" -Level debug
$success = $true
} else {
if ($tries -gt $download_retry_count) {
Write-Log "Retry count exceeded" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
Write-Log "Trying again after 10 seconds" -Level warning
Start-Sleep -Seconds 10
}
}
}
}
function Get-HashFromFile {
# Gets the hash for the file from the hash file which contains a list of
# hashes and their files
#
# Used by:
# - Get-SaltFromWeb
#
# Args:
# HashFile (string): The file containing the hashes
# FileName (string): The name of the file to search for in the hash file
#
# Returns:
# Returns the hash for the specified file
# Errors:
# If there is an error, set the failed status and exit with an error
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $HashFile,
[Parameter(Mandatory=$true)]
[String] $FileName
)
Write-Log "Loading hashfile: $HashFile" -Level debug
$lines = Get-Content -Path $HashFile
Write-Log "Searching for hash for: $FileName" -Level debug
foreach ($line in $lines) {
$file_hash, $file_name = $line -split "\s+"
if ($FileName -eq $file_name) {
Write-Log "Found hash: $file_hash" -Level debug
return $file_hash
}
}
Write-Log "No hash found for: $FileName" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
function Expand-ZipFile {
# Extract a zip file
#
# Used by:
# - Install-SaltMinion
#
# Args:
# ZipFile (string): The file to extract
# Destination (string): The location to extract to
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
[CmdletBinding()]
param(
[Parameter(Mandatory = $true)]
[string] $ZipFile,
[Parameter(Mandatory = $true)]
[string] $Destination
)
if (!(Test-Path -Path $Destination)) {
Write-Log "Creating missing directory: $Destination" -Level debug
New-Item -ItemType directory -Path $Destination
}
Write-Log "Unzipping '$ZipFile' to '$Destination'" -Level debug
if ($PSVersionTable.PSVersion.Major -ge 5) {
# PowerShell 5 introduced Expand-Archive
Write-Log "Using Expand-Archive to unzip"
try{
Expand-Archive -Path $ZipFile -DestinationPath $Destination -Force
} catch {
Write-Log "Failed to unzip $ZipFile : $_" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
} else {
# This method will work with older versions of powershell, but it is
# slow
Write-Log "Using Shell.Application to unzip"
$objShell = New-Object -Com Shell.Application
$objZip = $objShell.NameSpace($ZipFile)
try{
foreach ($item in $objZip.Items()) {
$objShell.Namespace($Destination).CopyHere($item, 0x14)
}
} catch {
Write-Log "Failed to unzip $ZipFile : $_" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
Write-Log "Finished unzipping '$ZipFile' to '$Destination'" -Level debug
}
function Add-SystemPathValue{
# Add a new entry to the system path environment variable. Only adds the new
# path if it does not already exist.
#
# Used by:
# - Install-SaltMinion
#
# Args:
# Path (string): The target path to add
#
# Warning:
# Logs a warning if the target path does not exist
[Cmdletbinding()]
param (
[parameter(Mandatory=$True)]
[String]$Path
)
$key = "HKLM:\System\CurrentControlSet\Control\Session Manager\Environment"
# Make sure the target folder exists
Write-Log "Ensuring target path exists" -Level debug
if (!(Test-Path $Path)) {
Write-Log "Target path does not exist: $Path" -Level warning
}
Write-Log "Getting current system path" -Level debug
$current_path = (Get-ItemProperty -Path $key -Name Path).Path
$new_path_list = New-Object System.Collections.Generic.List[String]
Write-Log "Verifying the target path is not already present" -Level debug
$regex_path = $Path.Replace("\", "\\")
foreach ($item in $current_path.Split(";")) {
# Bail if we find the new path in the current path
if ($item -imatch "^$regex_path(\\)?$") {
Write-Log "Target path already exists: $Path" -Level warning
return
} else {
# Add the item to our new path array
$new_path_list.Add($item) | Out-Null
}
}
# Add the new path to the array
Write-Log "Adding target path: $Path" -Level debug
$new_path_list.Add($Path) | Out-Null
$new_path = $new_path_list -join ";"
try{
Write-Log "Updating system path" -Level debug
Set-ItemProperty -Path $key -Name Path -Value $new_path
} catch {
Write-Log "Failed to add $Path the system path" -Level warning
Write-Log "Tried to write: $new_path" -Level warning
Write-Log "Error message: $_" -Level warning
}
$env:Path = [System.Environment]::GetEnvironmentVariable("Path","Machine")
}
function Remove-SystemPathValue {
# Removes the specified target path from the system path environment
# variable
#
# Used by:
# - Remove-SaltMinion
#
# Args
# Path (string): The target path to remove
[Cmdletbinding()]
param (
[parameter(Mandatory=$True)]
[String]$Path
)
Write-Log "Removing from system path: $Path" -Level info
$key = "HKLM:\System\CurrentControlSet\Control\Session Manager\Environment"
Write-Log "Getting current system path" -Level debug
$current_path = (Get-ItemProperty -Path $key -Name Path).Path
$new_path_list = New-Object System.Collections.Generic.List[String]
Write-Log "Searching for $Path" -Level debug
$regex_path = $Path.Replace("\", "\\")
$removed = 0
foreach ($item in $current_path.Split(";")) {
# Don't add if we find the new path
if ($item -imatch "^$regex_path(\\)?$") {
Write-Log "Removing target path: $Path" -Level debug
$removed = 1
} else {
# Add the item to our new path array
$new_path_list.Add($item) | Out-Null
}
}
if ($removed) {
$new_path = $new_path_list -join ";"
try {
Write-Log "Updating system path" -Level debug
Set-ItemProperty -Path $key -Name Path -Value $new_path
} catch {
$msg = "Failed to remove $Path from the system path: $new_path"
Write-Log $msg -Level warning
Write-Log "Tried to write: $new_path" -Level warning
Write-Log "Error message: $_" -level warning
}
}
$env:Path = [System.Environment]::GetEnvironmentVariable("Path","Machine")
}
function Remove-FileOrFolder {
# Removes a file or a folder recursively from the system. Takes ownership of
# the file or directory before removing
#
# Used by:
# - Remove-SaltMinion
# - Reset-SaltMinion
#
# Args:
# Path (string): The file or folder to remove
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path
)
if (!(Test-Path -Path $Path)) {
Write-Log "Path not found: $Path" -Level debug
return
}
$tries = 1
$max_tries = 5
$success = $false
while (!$success) {
$msg = "Removing (try: $tries/$max_tries): $Path"
Write-Log $msg -Level debug
try {
# Remove the file/dir/symlink/junction
if ((Get-Item -Path $Path) -is [System.IO.DirectoryInfo]) {
if (Get-IsReparsePoint -Path $Path) {
Write-Log "Removing reparse point" -Level debug
[System.IO.Directory]::Delete($Path, $true) | Out-Null
} else {
Write-Log "Removing directory" -Level debug
# Handles nested readonly files
Remove-Item -Path $Path -Force -Recurse
}
} else {
Write-Log "Removing file" -Level debug
[System.IO.File]::Delete($Path) | Out-Null
}
} catch {
Write-Log "Error removing: $Path" -Level warning
Write-Log "Error message: $_" -Level warning
} finally {
$tries++
if (!(Test-Path -Path $Path)) {
Write-Log "Finished removing $Path" -Level debug
$success = $true
} else {
if ($tries -gt $max_tries) {
Write-Log "Retry count exceeded" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
if ((Get-Item -Path $Path) -is [System.IO.DirectoryInfo]) {
Write-Log "Taking ownership: $Path" -Level debug
takeown /a /r /d Y /f $Path *> $null
if ($LASTEXITCODE) {
Write-Log "Directory does not exist" -Level debug
}
}
Write-Log "Trying again after 5 seconds" -Level warning
Start-Sleep -Seconds 5
}
}
}
}
function Get-GuestVars {
# Get guestvars data using vmtoolsd.exe
# They can be set on the host using vmrun.exe
#
# vmrun writeVariable "d:\VMWare\Windows Server 2019\Windows Server
# 2019.vmx" guestVar /vmware.components.salt_minion.args
# "master=192.168.0.12 id=test_id"
#
# Used by:
# - Get-ConfigGuestVars
#
# Args:
# GuestVarsPath (string):
# The option to get from the guestvars repository. Likely one of the
# following:
# - Action: guestinfo.vmware.components.salt_minion
# - Minion Config: guestinfo.vmware.components.salt_minion.args
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $GuestVarsPath
)
If ( !$vmtoolsd_bin -or !(Test-Path $vmtoolsd_bin) ) {
$msg = "vmtoolsd.exe not found. GuestVars data will not be available"
Write-Log $msg -Level warning
return ""
}
$arguments = "--cmd `"info-get $GuestVarsPath`""
try {
$ProcessInfo = New-Object System.Diagnostics.ProcessStartInfo
$ProcessInfo.FileName = $vmtoolsd_bin
$ProcessInfo.Arguments = $arguments
$ProcessInfo.RedirectStandardError = $true
$ProcessInfo.RedirectStandardOutput = $true
$ProcessInfo.UseShellExecute = $false
$Process = New-Object System.Diagnostics.Process
$Process.StartInfo = $ProcessInfo
$Process.Start() | Out-Null
$Process.WaitForExit()
$stdout = $Process.StandardOutput.ReadToEnd()
$exitcode = $Process.ExitCode
} catch {
$msg = "vmtoolsd.exe encountered an error. " +
"GuestVars data will not be available"
Write-Log $msg -Level warning
return ""
}
if ($exitcode -eq 0) {
return $stdout.Trim()
} else {
return ""
}
}
function _parse_config {
# Parse config options that are in the format key=value. These can be passed
# on the cli, guestvars, or tools.conf
#
# Used by:
# - Get-ConfigCLI
# - Get-ConfigGuestVars
# - Get-ConfigToolsConf
#
# Args:
# KeyValues (string[])
# A list of string values in the key=value format
#
# Returns:
# A hash table containing the config options and their values
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String[]] $KeyValues
)
$config_options = @{}
foreach ($key_value in $KeyValues.Split()) {
if ($key_value -like "*=*") {
Write-Log "Found config: $key_value" -Level debug
$key, $value = $key_value -split "="
if ($value) {
$config_options[$key.ToLower()] = $value.ToLower()
} else {
Write-Log "No config value specified: $key_value" -Level warning
}
} else {
Write-Log "Invalid config format ignored: $key_value" -Level warning
}
}
$count = $config_options.Count
Write-Log "Found $count config options" -Level debug
return $config_options
}
function Get-ConfigCLI {
# Get salt-minion configuration options from arguments passed on the
# command line. These key/value pairs are already in the ConfigOptions
# variable populated by the powershell cli parser. They should be a space
# delimited list of options in the key=value format.
#
# Used by:
# - Get-MinionConfig
#
# Return hashtable
Write-Log "Checking for CLI config options" -Level debug
if ($ConfigOptions) {
return _parse_config $ConfigOptions
} else {
Write-Log "Minion config not passed on CLI" -Level debug
}
}
function Get-ConfigGuestVars {
# Get salt-minion configuration options defined in the guestvars. That
# should be a space delimited list of options in the key=value format.
#
# Used by:
# - Get-MinionConfig
#
# Return hashtable
Write-Log "Checking for GuestVars config options" -Level debug
$config_options = Get-GuestVars -GuestVarsPath $guestvars_salt_args
if ($config_options) {
return _parse_config $config_options
} else {
Write-Log "Minion config not defined in guestvars" -Level debug
}
}
function Read-IniContent {
# Create a hash table with values from an ini file. Each section will
# contain a sub hash table with key/value pairs
#
# Used by:
# - Get-ConfigToolsConf
#
# Args:
# FilePath (string): The location of the ini file to read
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $FilePath
)
if (!(Test-Path -Path $FilePath)) {
Write-Log "File not found: $FilePath" -Level warning
return @{}
}
$ini = @{}
switch -regex -file $FilePath {
# [Section]
"^(?![#,;])\[(.+)\]$" {
$section = $matches[1]
$ini[$section.Trim()] = @{}
}
# key=value
"^(?![#,;])(.+?)\s*=(.*)$" {
$key,$value = $matches[1..2]
$ini[$section.Trim()][$key.Trim()] = $value.Trim()
}
}
return $ini
}
function Get-ConfigToolsConf {
# Get salt-minion configuration options defined in tools.conf. That should
# be all keys/value pairs under the [salt_minion] section of the tools.conf
# ini file.
#
# Used by:
# - Get-MinionConfig
#
# Return hashtable
if ( !$vmtools_conf_file -or !(Test-Path $vmtools_conf_file) ) {
Write-Log "tools.conf not found" -Level debug
return @{}
}
$config_options = Read-IniContent -FilePath $vmtools_conf_file
Write-Log "Checking for tools.conf config options" -Level debug
if ($config_options.ContainsKey($guestvars_section)) {
$count = $config_options[$guestvars_section].Count
Write-Log "Found $count config options" -Level debug
return $config_options[$guestvars_section]
} else {
Write-Log "Minion config not defined in tools.conf" -Level debug
return @{}
}
}
function Get-MinionConfig {
# Get the minion config values to be placed in the minion config file. The
# Order of priority is as follows:
# - Get config from GuestVars (defined by VMware Tools)
# - Get config from tools.conf (defined by VMware Tools - older method),
# overwrites guestVars with the same name
# - Get config from the CLI (options passed to the script), overwrites
# guestVars and tools.conf settings with the same name
# - No config found, use Salt minion defaults (master: salt, id: hostname)
#
# Used by:
# - Add-MinionConfig
#
# Returns a hash table of options or null if no options found
Write-Log "Getting minion config" -Level info
$config_options = @{}
# Get guestVars config, conflicting values will be overwritten by guestvars
$gv_config = Get-ConfigGuestVars
if ($gv_config) {
foreach ($row in $gv_config.GetEnumerator()) {
if ($row.Value) {
$config_options[$row.Name] = $row.Value
}
}
}
# Get tools.conf config first
$tc_config = Get-ConfigToolsConf
if ($tc_config) {
foreach ($row in $tc_config.GetEnumerator()) {
if ($row.Value) {
$config_options[$row.Name] = $row.Value
}
}
}
# Get cli config, conflicting values will be overwritten by cli
$cli_config = Get-ConfigCLI
if ($cli_config) {
foreach ($row in $cli_config.GetEnumerator()) {
if ($row.Value) {
$config_options[$row.Name] = $row.Value
}
}
}
return $config_options
}
function Get-IsReparsePoint {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path
)
$fd_path = Get-Item -Path $Path
return [bool]($fd_path.Attributes -band [IO.FileAttributes]::ReparsePoint)
}
function Get-IsSecureOwner {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path
)
$acl = Get-Acl -Path $Path
$owner = (($acl | Select-Object Owner).Owner).ToLower()
if ($owner -eq "nt authority\system") {
return $true
}
if ($owner -eq "builtin\administrators") {
return $true
}
return $false
}
function Set-Security {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path,
[Parameter(Mandatory=$false)]
[String] $Owner = "BUILTIN\Administrators"
)
Write-Log "Setting Security: $Path" -Level info
Write-Log "Getting ACL: $Path" -Level debug
$path_acl = Get-Acl -Path $Path
Write-Log "Setting Sddl" -Level debug
$Sddl = 'D:PAI(A;OICI;0x1200a9;;;WD)(A;OICI;FA;;;SY)(A;OICI;FA;;;BA)'
$path_acl.SetSecurityDescriptorSddlForm($Sddl)
Write-Log "Setting Owner" -Level debug
$path_acl.SetOwner([System.Security.Principal.NTAccount]"$Owner")
Write-Log "Writing New ACL" -Level debug
Set-Acl -Path $Path -AclObject $path_acl
}
function New-SecureDirectory {
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String] $Path
)
if (Test-Path -Path $Path) {
if (Get-IsReparsePoint -Path $Path) {
Write-Log "Found reparse point: $Path" -Level warning
Write-Log "Renaming reparse point (.insecure): $Path" -Level warning
Move-item -Path $Path `
-Destination "$Path-$script_date.insecure" | Out-Null
$msg = "Insecure reparse point renamed: $Path-$script_date.insecure"
Write-Log $msg -Level debug
}
}
if (Test-Path -Path $Path) {
if (!(Get-IsSecureOwner -Path $Path)) {
Write-Log "Found insecure owner: $Path" -Level warning
Write-Log "Renaming file/dir (.insecure): $Path" -Level warning
Move-Item -Path $Path `
-Destination "$Path-$script_date.insecure" | Out-Null
$msg = "Insecure file/dir renamed: $Path-$script_date.insecure"
Write-Log $msg -Level debug
}
}
$tries = 1
$max_tries = 5
while ($true) {
# Remove any existing file or directory if it exists
if (Test-Path -Path $Path) {
Write-Log "Removing existing file/directory: $Path" -Level debug
Remove-FileOrFolder -Path $Path
}
$msg = "Creating secure directory (try: $tries/$max_tries): $Path"
Write-Log $msg -Level debug
try {
New-Item -Path $Path -Type Directory | Out-Null
} catch {
if ($tries -le $max_tries) {
$msg = "Failed to create directory: $Path. Trying again..."
Write-Log $msg -Level warning
$tries++
continue
} else {
$msg = "Failed to create secure directory. Try limit exceeded."
Write-Log $msg -Level error
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
Set-Security -Path $Path
if((Get-ChildItem -Path $Path | Measure-Object).Count -ne 0) {
# Someone is competing with us
if ($tries -le $max_tries) {
$msg = "Expected empty directory. Trying again..."
Write-Log $msg -Level warning
$tries += 1
continue
} else {
$msg = "Expected empty directory. Try limit exceeded."
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
Write-Log "Secure directory created successfully" -Level debug
break
}
}
function Add-MinionConfig {
# Write minion config options to the minion config file
# New-SecureDirectory will handle reparse points and ownership issues
New-SecureDirectory -Path $base_salt_config_location
# Child directories will inherit permissions from the parent
if ( !( Test-Path -path $salt_root_dir ) ) {
New-Item -Path $salt_root_dir -Type Directory | Out-Null
}
if ( !( Test-Path -path $salt_config_dir ) ) {
New-Item -Path $salt_config_dir -Type Directory | Out-Null
}
if ( !( Test-Path -path $salt_pki_dir ) ) {
New-Item -Path "$salt_pki_dir" -Type Directory | Out-Null
}
if ( !( Test-Path -path $salt_log_dir ) ) {
New-Item -Path "$salt_log_dir" -Type Directory | Out-Null
}
# Create additional directories
$cache_dir = "$salt_root_dir\var\cache\salt\minion"
if ( !( Test-Path -path "$salt_config_dir\minion.d" ) ) {
New-Item -Path "$salt_config_dir\minion.d" -Type Directory | Out-Null
}
if ( !( Test-Path -path "$cache_dir\extmods\grains" ) ) {
New-Item -Path "$cache_dir\extmods\grains" -Type Directory | Out-Null
}
if ( !( Test-Path -path "$cache_dir\proc" ) ) {
New-Item -Path "$cache_dir\proc" -Type Directory | Out-Null
}
if ( !( Test-Path -path "$salt_root_dir\var\run" ) ) {
New-Item -Path "$salt_root_dir\var\run" -Type Directory | Out-Null
}
# Get the minion config
$config_options = Get-MinionConfig
if ($config_options.Count -eq 0) {
Write-Log "No minion config found. Defaults will be used" -Level debug
}
# These settings are for pre 3004 versions of Salt
# Add root_dir to point to ProgramData
$config_options["root_dir"] = $salt_root_dir
# Add log_file to point to ProgramData
$config_options["log_file"] = "$salt_log_dir\minion"
$new_content = New-Object System.Collections.Generic.List[String]
$comment = "# Minion configuration file - created by VMTools Salt script"
$new_content.Add($comment)
foreach ($row in $config_options.GetEnumerator()) {
$new_content.Add("$($row.Name): $($row.Value)") | Out-Null
}
$config_content = $new_content -join "`r`n"
try {
Write-Log "Writing minion config" -Level info
Set-Content -Path $salt_config_file -Value $config_content
Write-Log "Finished writing minion config" -Level debug
} catch {
$msg = "Failed to write minion config: $config_content : $_"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
function Start-MinionService {
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String] $ServiceName = "salt-minion"
)
try {
$service = Get-Service -Name $ServiceName
} catch {
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
# We'll hard fail here because the service is not present
Write-Log "$ServiceName is not installed" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
# Not sure this is needed as the Start-Service cmdlet seems to wait until
# the service is started before returning
$tries = 1
$max_tries = 5
while ($service.Status -ne "Running") {
if ($service.Status -eq "Stopped") {
# Start the minion service
Write-Log "Starting the $ServiceName service" -Level info
try {
Start-Service -Name $ServiceName *> $null
} catch {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
$service.Refresh()
if ($service.Status -eq "Running") {
Write-Log "Service started successfully" -Level debug
} else {
if ($tries -le $max_tries) {
$msg = "Service not started. Waiting 1 second to try again..."
Write-Log $msg -Level debug
$tries += 1
Start-Sleep -Seconds 1
} else {
$msg = "Failed to start the $ServiceName service. "
$msg += "Exceeded max tries"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
}
function Stop-MinionService {
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String] $ServiceName = "salt-minion"
)
try {
$service = Get-Service -Name $ServiceName
} catch {
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
# We'll return here because we don't need to stop a service that
# isn't installed
Write-Log "$ServiceName is not installed" -Level info
return
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
# Not sure this is needed as the Stop-Service cmdlet seems to wait until
# the service is stopped before returning
$tries = 1
$max_tries = 5
while ($service.Status -ne "Stopped") {
if (($service.Status -eq "Running") -or `
($service.Status -eq "Paused")) {
# Start the minion service
Write-Log "Stop the $ServiceName service" -Level info
try {
Stop-Service -Name $ServiceName *> $null
} catch {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
$service.Refresh()
if ($service.Status -eq "Stopped") {
Write-Log "Service stopped successfully" -Level debug
} else {
if ($tries -le $max_tries) {
$msg = "Service not stopped. Waiting 1 second to try again..."
Write-Log $msg -Level debug
$tries += 1
Start-Sleep -Seconds 1
} else {
$msg = "Failed to stop the $ServiceName service. "
$msg += "Exceeded max tries"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
}
function Get-RandomizedMinionId {
# Generate a randomized minion id
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String] $Prefix = "minion",
[Parameter(Mandatory=$false)]
[String] $Length = 5
)
$chars = (0x30..0x39) + ( 0x41..0x5A) + ( 0x61..0x7A)
$rand_chars = $chars | Get-Random -Count $Length
$rand_string = -join ($rand_chars | ForEach-Object {[char]$_})
return -join ($Prefix, "_", $rand_string)
}
############################### MAIN FUNCTIONS #################################
function Confirm-Dependencies {
# Check that the required dependencies for this script are present on the
# system
#
# Return:
# Bool: False if missing dependencies, otherwise True
$deps_present = $true
Write-Log "Checking dependencies" -Level info
# Files required by this script
$salt_dep_files = @{}
# $salt_dep_files["dep_name.exe"] = "path\to\dep_name.exe"
foreach ($file in $salt_dep_files.Keys) {
Write-Log "Looking for $file in $($salt_dep_files[$file])" -Level debug
if(!(Test-Path("$($salt_dep_files[$file])\$file"))) {
$msg = "Unable to find $file in $($salt_dep_files[$file])"
Write-Log $msg -Level error
$deps_present = $false
}
}
return $deps_present
}
function Get-SaltVersion {
# This function is needed for unit testing
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path
)
if ( Test-Path -Path "$Path\salt-call.exe" ) {
# 3006 and later packages
Write-Log "Running: $Path\salt-call.exe" -Level debug
$ver = . $Path\salt-call.exe --version
} elseif ( Test-Path -Path "$Path\bin\python.exe" ) {
# Pre 3006 Packages
$python_bin = "$Path\bin\python.exe"
Write-Log "Running: $python_bin" -Level debug
$ver = . $python_bin -E -s $Path\bin\Scripts\salt-call --version
} elseif ( Test-Path -Path "$Path\bin\salt.exe" ) {
# Tiamat Packages
Write-Log "Running: $Path\bin\salt.exe" -Level debug
$ver = . $Path\bin\salt.exe --version
}
return $ver.Trim("salt-call ")
}
function Find-StandardSaltInstallation {
# Find an existing standard Salt installation
#
# Return:
# Bool: True if standard installation found, otherwise False
# First we'll look for the install_dir registry entry
# If we find that, we'll use it to detect the version
# This works for 3004 and newer versions of Salt
$salt_path = $null
try {
$dir_path = (Get-Item -Path $salt_base_reg).GetValue("install_dir")
} catch {}
if ($dir_path -ne $null) {
$dir_path = [System.Environment]::ExpandEnvironmentVariables($dir_path)
Write-Host $dir_path
if ( Test-Path -Path $dir_path ) {
$version = Get-SaltVersion -Path $dir_path
Write-Log "Standard Installation detected" -Level error
Write-Log "Version: $version" -Level error
Write-Log "Path: $dir_path" -Level error
return $true
}
}
# We'll look in the old C:\salt location for python.exe
# This handles all older versions of Salt
if (Test-Path -Path "C:\salt\bin\python.exe") {
$version = Get-SaltVersion -Path "C:\salt"
Write-Log "Standard Installation detected" -Level error
Write-Log "Version: $version" -Level error
Write-Log "Path: C:\salt" -Level error
return $true
}
Write-Log "Standard Installation not detected" -Level debug
return $false
}
function Convert-PSObjectToHashtable {
param (
[Parameter(ValueFromPipeline)]
$InputObject
)
if ($null -eq $InputObject) { return $null }
$is_enum = $InputObject -is [System.Collections.IEnumerable]
$not_string = $InputObject -isnot [string]
if ($is_enum -and $not_string) {
$collection = @(
foreach ($object in $InputObject) {
Convert-PSObjectToHashtable $object
}
)
Write-Output -NoEnumerate $collection
} elseif ($InputObject -is [PSObject]) {
$hash = @{}
foreach ($property in $InputObject.PSObject.Properties) {
$hash[$property.Name] = Convert-PSObjectToHashtable $property.Value
}
$hash
} else {
$InputObject
}
}
function Get-MajorVersion {
# Parses a version string and returns the major version
#
# Args:
# Version (string): The Version to parse
[CmdletBinding()]
param(
[Parameter(Mandatory=$true, Position=0)]
[String] $Version
)
if ( !($Version.Contains(".")) -and ($Version.ToLower() -ne "latest")) {
return $Version
}
try {
$parsed_version = [System.Version]::Parse($Version)
return $parsed_version.Major.ToString()
} catch {
# We might hit this if there is text in the minor version
$regex = [regex]"^(\d+)\.([\w\-]+)$"
$match = $regex.Match($Version)
if ( $match.Success ) {
return $match.Groups[1].Value
}
}
return ""
}
function Get-SaltPackageInfo {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $MinionVersion
)
if ( $MinionVersion.ToLower() -ne "latest" ) {
# A specific version has been passed.
# Let's check if we're looking at the default location hosted by Salt
# If we are, we'll want to adjust for pre-3006 versions if passed
# If the user specified a Source, we just trust they have it set up for
# the version they are passing
$uri = [System.Uri]($base_url)
if ( $uri.AbsoluteUri -eq $default_source ) {
# Let's check for a pre 3006 version
$major_version = Get-MajorVersion -Version $MinionVersion
if ( $major_version -lt "3006" ) {
# This is an older version, use the older URL
$base_url = $pre_3006_source
} else {
# This is a new URL, and a version was passed, let's look in
# minor
if ( $MinionVersion.ToLower() -ne $major_version.ToLower() ) {
$base_url = "$base_url/minor"
}
}
}
}
$enc = [System.Text.Encoding]::UTF8
try {
$response = Invoke-WebRequest -Uri "$base_url/repo.json" `
-UseBasicParsing
if ($response.Content.GetType().Name -eq "Byte[]") {
$psobj = $enc.GetString($response.Content) | ConvertFrom-Json
} else {
$psobj = $response.Content | ConvertFrom-Json
}
$hash = Convert-PSObjectToHashtable $psobj
} catch {
Write-Log "repo.json not found at: $base_url" -Level debug
$hash = @{}
}
$salt_file_name = ""
$salt_version = ""
$salt_sha512 = ""
$search_version = $MinionVersion.ToLower()
if ($hash.Contains($search_version)) {
foreach ($item in $hash.($search_version).Keys) {
if ($item.EndsWith(".zip")) {
if ($item.Contains("amd64")) {
$salt_file_name = $hash.($search_version).($item).name
$salt_version = $hash.($search_version).($item).version
$salt_sha512 = $hash.($search_version).($item).SHA512
}
}
}
}
if ($salt_file_name -and $salt_version -and $salt_sha512) {
$salt_url = @($base_url, $salt_version, $salt_file_name) -join "/"
$major_version = Get-MajorVersion -Version $salt_version
if ( $major_version -ge "3006" ) {
if ( !($base_url.Contains("minor")) ) {
$salt_url = @(
$base_url, "minor", $salt_version, $salt_file_name
) -join "/"
}
}
Write-Log "Found installer: $salt_file_name" -Level debug
Write-Log "Found version: $salt_version" -Level debug
Write-Log "Found sha512: $salt_sha512" -Level debug
Write-Log "Found URL: $salt_url" -Level debug
return @{
url = $salt_url;
hash = $salt_sha512;
file_name = $salt_file_name;
version = $salt_version
}
} else {
# Since there's no repo.json, we need to look in the directory for the
# URL and HASH. The version can also be `latest` but expects a symlink
# named `latest` that points to the directory containing the latest
# version of Salt
$salt_file_name = $null
$salt_version = $null
# Fix URL
$major_version = Get-MajorVersion -Version $search_version
if ( $major_version -ge "3006" ) {
if ( !($base_url.Contains("minor")) ) {
$base_url = @($base_url, "minor") -join "/"
}
}
# Invoke-WebRequest will not work on a local file directory so we need
# to detect the URL scheme. Use Invoke-WebRequest to get the directory
# contents if URL scheme is http/https/ftp. Not tested with FTP
if ($base_url -match "^(http\:|https\:|ftp\:).*") {
$dir_url = @($base_url, $search_version) -join "/"
Write-Log "Looking for version in web directory: $dir_url" `
-Level debug
try {
$dir_contents = Invoke-WebRequest -Uri $dir_url -UseBasicParsing
} catch {
Write-Log "Directory not found: $dir_url" -Level debug
return @{}
}
# Look for the zip file in the directory
foreach ($link in $dir_contents.Links) {
if ($link.href.EndsWith(".zip")) {
if ($link.href.Contains("-amd64")) {
$salt_file_name = $link.href
}
}
}
}
# Get the directory contents if URL is Drive Letter or UNC
elseif ($base_url -match "^(\w\:|\\\\).*") {
$dir_url = "$base_url\$search_version"
Write-Log "Looking for version in local directory: $dir_url" `
-Level debug
try {
$salt_file_name = Get-ChildItem -Path $dir_url -Filter "*.zip"
} catch {
Write-Log "Directory not found: $dir_url" -Level debug
return @{}
}
if ($salt_file_name.Length -gt 0) {
$salt_file_name = $salt_file_name[0].Name
}
} else {
Write-Log "Unknown source url type: $dir_url" -Level debug
return @{}
}
# Verify that we found a file name
if ($salt_file_name.Length -eq 0) {
Write-Log "Zip file not found in directory: $dir_url" -Level debug
return @{}
}
# Since we have a zip file, get the version and sha file from it
if ( $salt_file_name.Contains("onedir") ) {
$salt_version = (
$salt_file_name -split "-onedir-"
)[0].Split("-", 2)[1]
} else {
$salt_version = (
$salt_file_name -split "-windows-"
)[0].Split("-", 2)[1]
}
$sha_file_name = "salt-$($salt_version)_SHA512"
# Get the contents of the sha file
try {
# We can use Invoke-WebRequest as long as we're looking at a file
$response = Invoke-WebRequest -Uri "$dir_url/$sha_file_name" `
-UseBasicParsing
} catch {
Write-Log "Could not retrieve sha file: $dir_url/$sha_file_name" `
-Level debug
return @{}
}
$salt_sha512 = $null
# Get the sha out of the sha file
ForEach ($line in $response.RawContent.Split([Environment]::NewLine)) {
if ($line.EndsWith(".zip")) {
$salt_sha512 = $line.Split()[0]
}
}
# Verify that a sha was retrieved
if ($null -eq $salt_sha512) {
Write-Log "Sha not found in file: $dir_url/$sha_file_name" `
-Level debug
return @{}
}
Write-Log "Found installer: $salt_file_name" -Level debug
Write-Log "Found version: $salt_version" -Level debug
Write-Log "Found sha512: $salt_sha512" -Level debug
return @{
url = @($dir_url, $salt_file_name) -join "/";
hash = $salt_sha512;
file_name = $salt_file_name;
version = $salt_version
}
}
}
function Get-FileHash {
# Get-FileHash is a built-in cmdlet in powershell 5+ but we need to support
# powershell 3. This will overwrite the powershell 5 commandlet only for
# this script. But it will provide the missing cmdlet for powershell 3
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path,
[Parameter(Mandatory=$false)]
[ValidateSet(
"SHA1",
"SHA256",
"SHA384",
"SHA512",
# https://serverfault.com/questions/820300/
# why-isnt-mactripledes-algorithm-output-in-powershell-stable
"MACTripleDES", # don't use
"MD5",
"RIPEMD160",
IgnoreCase=$true)]
[String] $Algorithm = "SHA256"
)
if ( !(Test-Path $Path) ) {
Write-Log "Invalid path for hashing: $Path" -Level debug
return @{}
}
if ( (Get-Item -Path $Path) -isnot [System.IO.FileInfo]) {
Write-Log "Not a file for hashing: $Path" -Level debug
return @{}
}
$Path = Resolve-Path -Path $Path
Switch ($Algorithm) {
SHA1 {
# We're doing this in 2 lines to comply with the 80 char limit
$hasher = [System.Security.Cryptography.SHA1CryptoServiceProvider]
$hasher = $hasher::Create()
}
SHA256 {
$hasher = [System.Security.Cryptography.SHA256]::Create()
}
SHA384 {
$hasher = [System.Security.Cryptography.SHA384]::Create()
}
SHA512 {
$hasher = [System.Security.Cryptography.SHA512]::Create()
}
MACTripleDES {
$hasher = [System.Security.Cryptography.MACTripleDES]::Create()
}
MD5 {
$hasher = [System.Security.Cryptography.MD5]::Create()
}
RIPEMD160 {
$hasher = [System.Security.Cryptography.RIPEMD160]::Create()
}
}
Write-Log "Hashing using $Algorithm algorithm" -Level debug
try {
$data = [System.IO.File]::OpenRead($Path)
$hash = $hasher.ComputeHash($data)
$hash = [System.BitConverter]::ToString($hash) -replace "-",""
return @{
Path = $Path;
Algorithm = $Algorithm.ToUpper();
Hash = $hash
}
} catch {
Write-Log "Error hashing: $Path" -Level debug
return @{}
} finally {
if ($null -ne $data) {
$data.Close()
}
}
}
function Get-SaltFromWeb {
# Download the Salt OneDir zip file from the web and verify the hash
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
# Make sure the download directory exists
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Url,
[Parameter(Mandatory=$true)]
[String] $Destination,
[Parameter(Mandatory=$true)]
[String] $Hash
)
# Download the Salt file
Write-Log "Downloading Salt" -Level info
Get-WebFile -Url $Url -OutFile $Destination
# Get the hash for the Salt file
$file_hash = (Get-FileHash -Path $Destination -Algorithm SHA512).Hash
Write-Log "Verifying hash" -Level info
if ($file_hash -like $Hash) {
Write-Log "Hash verified" -Level debug
} else {
Write-Log "Failed to verify hash:" -Level error
Write-Log " - $file_hash" -Level error
Write-Log " - $Hash" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
function New-SaltCallScript {
# Create the salt-call.bat script for Tiamat builds
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
# The location to create the script
[String] $Path
)
$content = @(
":: Copyright (c) 2021-2023 VMware, Inc. All rights reserved.",
"",
":: Script for starting the Salt-Minion",
":: Accepts all parameters that Salt-Minion Accepts",
"@ echo off",
"",
":: Define Variables",
"Set SaltBin=%~dp0\salt\salt.exe",
"",
"net session >nul 2>&1",
"if %errorLevel%==0 (",
" :: Launch Script",
" `"%SaltBin%`" call %*",
") else (",
" echo ***** This script must be run as Administrator *****",
")"
)
$file_content = $content -join "`r`n"
Set-Content -Path $Path -Value $file_content
}
function New-SaltMinionScript {
# Create the salt-minion.bat script for Tiamat builds
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
# The location to create the script
[String] $Path
)
$content = @(
":: Copyright (c) 2021-2023 VMware, Inc. All rights reserved.",
"",
":: Script for starting the Salt-Minion"
":: Accepts all parameters that Salt-Minion Accepts",
"@ echo off",
"",
":: Define Variables",
"Set SaltBin=%~dp0\salt\salt.exe",
"",
"net session >nul 2>&1",
'if %errorLevel%==0 (',
" :: Launch Script",
" `"%SaltBin%`" minion %*",
") else (",
" echo ***** This script must be run as Administrator *****",
")"
)
$file_content = $content -join "`r`n"
Set-Content -Path $Path -Value $file_content
}
function Install-SaltMinion-Tiamat {
# Installs the Tiamat build of the Salt minion. Performs the following:
# - Copies the helper scripts into C:\ProgramFiles\Salt Project\Salt
# - Registers the salt-minion service
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
# 1. Copy the helper scripts into Program Files
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Version
)
Write-Log "Copying scripts ($Version)" -Level info
try {
Write-Log "Creating $salt_dir\salt-call.bat" -Level debug
New-SaltCallScript -Path "$salt_dir\salt-call.bat"
} catch {
Write-Log "Failed to create $salt_dir\salt-call.bat" -Level error
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
try {
Write-Log "Creating $salt_dir\salt-minion.bat" -Level debug
New-SaltMinionScript -Path "$salt_dir\salt-minion.bat"
} catch {
Write-Log "Failed to create $salt_dir\salt-minion.bat" -Level error
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
# 2. Register the salt-minion service
Write-Log "Registering the salt-minion service ($Version)" -Level info
& $ssm_bin install salt-minion "$salt_bin" `
"minion -c """"$salt_config_dir"""" -l quiet" *> $null
$description = "Salt Minion from VMware Tools ($Version)"
& $ssm_bin set salt-minion Description $description
}
function Install-SaltMinion-Relenv {
# Installs the Relenv build of the Salt minion. Performs the following:
# - Registers the salt-minion service
# 1. Register the salt-minion service
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Version
)
Write-Log "Registering the salt-minion service ($Version)" -Level info
#
& $ssm_bin install salt-minion "$salt_minion_bin" `
"-c """"$salt_config_dir"""" -l quiet" *> $null
$description = "Salt Minion from VMware Tools ($Version)"
& $ssm_bin set salt-minion Description $description
}
function Install-SaltMinion
{
# Installs the Salt minion. Performs the following:
# - Expands the zipfile into C:\Program Files\Salt Project
# - Detects Relenv vs Tiamat build and calls the appropriate install
# function
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
# 1. Unzip into Program Files
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path,
[Parameter(Mandatory=$true)]
[String] $Version
)
Write-Log "Unzipping Salt (this may take a few minutes)" -Level info
Expand-ZipFile -ZipFile $Path -Destination $base_salt_install_location
Write-Log "Removing zipfile: $Path" -Level debug
Remove-Item -Path $Path
# 2. Determine if this is a Tiamat package or a Relenv package
# - salt-minion.exe in the root = Relenv = post-3005
# - salt\salt.exe in the root = Tiamat = pre-3006
if ( Test-Path -Path "$salt_minion_bin") {
Write-Log "Found post-3005 Package"
Install-SaltMinion-Relenv -Version $Version
}
elseif ( Test-Path -Path "$salt_bin" ) {
Write-Log "Found pre-3006 Package"
Install-SaltMinion-Tiamat -Version $Version
} else {
Write-Log "Unknown Package Type" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
# Common service settings
Write-Log "Configuring the salt-minion service" -Level info
& $ssm_bin set salt-minion Start SERVICE_AUTO_START *> $null
& $ssm_bin set salt-minion AppStopMethodConsole 24000 *> $null
& $ssm_bin set salt-minion AppStopMethodWindow 2000 *> $null
& $ssm_bin set salt-minion AppRestartDelay 60000 *> $null
# 3. Verify that the service is installed
try {
Get-Service -Name salt-minion
Write-Log "salt-minion service installed successfully" -Level debug
} catch {
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
$msg = "Failed to install salt-minion service"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
# 4. Modify the system path
Write-Log "Adding Salt to the path" -Level info
Add-SystemPathValue -Path $salt_dir
}
function Remove-SaltMinion {
# Uninstall the Salt minion. Performs the following steps:
# - Stop the salt-minion service
# - Remove the salt-minion service
# - Remove the directories in Program Files and ProgramData
# - Remove the registry entries
# - Remove the entry from the system path
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
# Does the service exist
try {
# This command will throw an exception if the service is missing
$service = Get-Service -Name salt-minion
# Stop the minion service
Stop-MinionService
# Delete the service
Write-Log "Uninstalling salt-minion service" -Level info
$service = Get-WmiObject -Class Win32_Service `
-Filter "Name='salt-minion'"
$service.delete() *> $null
try {
# This command will throw an exception if the service is missing
$service = Get-Service -Name salt-minion
# If we were able to connect to the service, no exception thrown,
# then we failed to remove the service
Write-Log "Failed to uninstall salt-minion service" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
} catch {
# This would catch a missing service after the removal meaning the
# service was removed successfully
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
$msg = "Finished uninstalling salt-minion service"
Write-Log $msg -Level debug
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
} catch {
# This would catch a missing service before trying to Stop and Remove it
# That would mean the service is already removed
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
# We'll return here because we don't need to remove a service
# that isn't installed
Write-Log "salt-minion service not found" -Level warning
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
# 3. Remove the files
# Do this in a for loop for logging
foreach ($item in $file_dirs_to_remove) {
Remove-FileOrFolder -Path $item
}
# 4. Remove entry from the path
Remove-SystemPathValue -Path $salt_dir
}
function Reset-SaltMinion {
# Resets the salt-minion environment in preperation for imaging. Performs
# the following steps:
# - Remove minion_id file
# - Randomize the minion id in the minion config
# - Remove the minion public and private keys
Write-Log "Resetting Salt minion" -Level info
Remove-FileOrFolder "$salt_config_file\minion_id"
# Comment out id: in the minion config
$new_content = New-Object System.Collections.Generic.List[String]
if (Test-Path -Path "$salt_config_file") {
Write-Log "Searching minion config file for id" -Level debug
foreach ($line in Get-Content $salt_config_file) {
if ($line -match "^id:.*$") {
Write-Log "Commenting out the id" -Level debug
$new_content.Add("#" + $line) | Out-Null
$random_id = Get-RandomizedMinionId -Prefix $line.Split("")[1]
$new_content.Add("id: $random_id") | Out-Null
} else {
$new_content.Add($line) | Out-Null
}
}
$config_content = $new_content -join "`r`n"
Write-Log "Writing new minion config"
try {
Set-Content -Path $salt_config_file -Value $config_content
} catch {
Write-Log "Failed to write new minion config : $_" -Level error
exit $STATUS_CODES["scriptFailed"]
}
}
# Remove minion keys (minion.pem and minion.pub"
Remove-FileOrFolder -Path "$salt_pki_dir\minion.pem"
Remove-FileOrFolder -Path "$salt_pki_dir\minion.pub"
Write-Log "Salt minion reset successfully" -Level info
}
function Install {
# Set status and update the log
Write-Log "Installing Salt minion" -Level info
Set-Status installing
# Make sure the base install location exists
if ( !( Test-Path -Path $base_salt_install_location) ) {
Write-Log "Creating directory: $base_salt_install_location" -Level debug
New-Item -Path $base_salt_install_location -Type Directory | Out-Null
}
# Get URL from repo.json
$info = Get-SaltPackageInfo -MinionVersion $MinionVersion
if ($info.Count -eq 0) {
$msg = "Failed to get Package Info for Version: $MinionVersion"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
$zip_file = "$base_salt_install_location\$($info.file_name)"
# Download Salt from the Web
Get-SaltFromWeb -Url $info.url -Destination $zip_file -Hash $info.hash
# Install the Salt Package
Install-SaltMinion -Path $zip_file -Version $info.version
# Generate and update the minion config
Add-MinionConfig
# Start the Minion Service
Start-MinionService
# Update the Status and output the Log
Set-Status installed
Write-Log "Salt minion installed successfully" -Level info
}
function Remove {
Write-Log "Removing Salt minion" -Level info
Set-Status removing
Remove-SaltMinion
Set-Status notInstalled
Write-Log "Salt minion removed successfully" -Level info
}
################################### MAIN #######################################
function Main {
# Check for Action. If not specified on the command line, get it from
# guestVars
if ($Install) { $Action = "install" }
if ($Status) { $Action = "status" }
if ($Depend) { $Action = "depend" }
if ($Clear) { $Action = "clear" }
if ($Remove) { $Action = "remove" }
if (!$Action) {
# We're not logging yet because we don't know the status
$Action = Get-GuestVars -GuestVarsPath $guestvars_salt_desired_state
if (!$Action) {
$msg = "No action found in guestVars or specified on CLI"
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
Write-Host "Please specify an action" -ForegroundColor Yellow
return $STATUS_CODES["scriptFailed"]
}
switch ($Action.ToLower()) {
"present" { $Action = "install" }
"absent" { $Action = "remove" }
}
}
if (!($action_list -contains $Action.ToLower())) {
$msg = "Invalid action: $Action - Must be one of [$action_list]"
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
Write-Host "Please specify a valid action" -ForegroundColor Yellow
return $STATUS_CODES["scriptFailed"]
}
# Let's confirm dependencies
if (!(Confirm-Dependencies)) {
Write-Log "Missing script dependencies" -Level error
Write-Host "Missing script dependencies" -ForegroundColor Red
return $STATUS_CODES["scriptFailed"]
}
# Perform the action
switch ($Action.ToLower()) {
"depend" {
# If we've gotten this far, dependencies have been confirmed
Write-Host "Found all dependencies"
return $STATUS_CODES["scriptSuccess"]
}
"install" {
# Let's make sure there's not already a standard Salt installation
# on the system
if (Find-StandardSaltInstallation) {
$msg = "Found an existing Salt installation on the system."
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
return $STATUS_CODES["externalInstall"]
}
# If status is installed, installing, or removing, bail out
$current_status = Get-Status
if ($STATUS_CODES.keys -notcontains $current_status) {
$msg = "Unknown status code: $current_status"
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
return $STATUS_CODES["scriptFailed"]
}
switch ($current_status) {
$STATUS_CODES["installed"] {
Write-Host "Already installed"
return $STATUS_CODES["scriptSuccess"]
}
$STATUS_CODES["installing"] {
Write-Host "Installation in progress"
return $STATUS_CODES["scriptFailed"]
}
$STATUS_CODES["removing"] {
Write-Host "Removal in progress"
return $STATUS_CODES["scriptFailed"]
}
$STATUS_CODES["removeFailed"] {
# We want to clean up anything left behind by a failed
# remove
Remove
}
$STATUS_CODES["installFailed"] {
# We want to clean up anything left behind by a failed
# install
Remove
}
}
Install
Write-Host "Salt minion installed successfully"
return $STATUS_CODES["scriptSuccess"]
}
"remove" {
# Let's make sure we're not trying to remove a standard Salt
# installation on the system
if (Find-StandardSaltInstallation) {
$msg = "Found an existing Salt installation on the system."
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
return $STATUS_CODES["externalInstall"]
}
# If status is installing, notInstalled, or removing, bail out
$current_status = Get-Status
if ($STATUS_CODES.keys -notcontains $current_status) {
$msg = "Unknown status code: $current_status"
Write-Host $msg -Level error
return $STATUS_CODES["scriptFailed"]
}
switch ($current_status) {
$STATUS_CODES["installing"] {
Write-Host "Installation in progress"
return $STATUS_CODES["scriptFailed"]
}
$STATUS_CODES["notInstalled"] {
Write-Host "Already uninstalled"
return $STATUS_CODES["scriptSuccess"]
}
$STATUS_CODES["removing"] {
Write-Host "Removal in progress"
return $STATUS_CODES["scriptFailed"]
}
}
Remove
Write-Host "Salt minion removed successfully"
return $STATUS_CODES["scriptSuccess"]
}
"clear" {
# If not installed (0), bail out
$current_status = Get-Status
if ($STATUS_CODES.keys -notcontains $current_status) {
$msg = "Unknown status code: $current_status"
Write-Host $msg -Level error
return $STATUS_CODES["scriptFailed"]
}
if ($current_status -ne $STATUS_CODES["installed"]) {
Write-Host "Not installed. Reset will not continue"
return $STATUS_CODES["scriptSuccess"]
}
Reset-SaltMinion
Write-Host "Salt minion reset successfully"
return $STATUS_CODES["scriptSuccess"]
}
"status" {
# Let's check for a standard Salt installation first
if (Find-StandardSaltInstallation) {
$msg = "Found an existing Salt installation on the system."
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
return $STATUS_CODES["externalInstall"]
}
$exit_code = Get-Status
if ($STATUS_CODES.keys -notcontains $exit_code) {
Write-Host "Unknown status code: $exit_code"
return $STATUS_CODES["scriptFailed"]
}
Write-Host "Found status: $($STATUS_CODES[$exit_code])"
return $exit_code
}
}
}
# Allow importing for testing
if (($Action) -and ($Action.ToLower() -eq "test")) {
exit $STATUS_CODES["scriptSuccess"]
}
try {
$exit_code = Main
exit $exit_code
} finally {
if ($null -eq $exit_code) {
Write-Host "Script Terminated..."
exit $STATUS_CODES["scriptTerminated"]
}
}
|
combined_dataset/train/non-malicious/get windows product key_4.ps1 | get windows product key_4.ps1 | function get-windowsproductkey([string]$computer)
{
$Reg = [WMIClass] ("\\\\" + $computer + "\\root\\default:StdRegProv")
$values = [byte[]]($reg.getbinaryvalue(2147483650,"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion","DigitalProductId").uvalue)
$lookup = [char[]]("B","C","D","F","G","H","J","K","M","P","Q","R","T","V","W","X","Y","2","3","4","6","7","8","9")
$keyStartIndex = [int]52;
$keyEndIndex = [int]($keyStartIndex + 15);
$decodeLength = [int]29
$decodeStringLength = [int]15
$decodedChars = new-object char[] $decodeLength
$hexPid = new-object System.Collections.ArrayList
for ($i = $keyStartIndex; $i -le $keyEndIndex; $i++){ [void]$hexPid.Add($values[$i]) }
for ( $i = $decodeLength - 1; $i -ge 0; $i--)
{
if (($i + 1) % 6 -eq 0){$decodedChars[$i] = '-'}
else
{
$digitMapIndex = [int]0
for ($j = $decodeStringLength - 1; $j -ge 0; $j--)
{
$byteValue = [int](($digitMapIndex * [int]256) -bor [byte]$hexPid[$j]);
$hexPid[$j] = [byte] ([math]::Floor($byteValue / 24));
$digitMapIndex = $byteValue % 24;
$decodedChars[$i] = $lookup[$digitMapIndex];
}
}
}
$STR = ''
$decodedChars | % { $str+=$_}
$STR
}
get-windowsproductkey .
|
combined_dataset/train/non-malicious/sample_43_21.ps1 | sample_43_21.ps1 | #
# Module manifest for module 'ThreadJob'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = '.\Microsoft.PowerShell.ThreadJob.dll'
# Version number of this module.
ModuleVersion = '2.0.3'
# ID used to uniquely identify this module
GUID = '0e7b895d-2fec-43f7-8cae-11e8d16f6e40'
Author = 'Microsoft Corporation'
CompanyName = 'Microsoft Corporation'
Copyright = '(c) Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = "
PowerShell's built-in BackgroundJob jobs (Start-Job) are run in separate processes on the local machine.
They provide excellent isolation but are resource heavy. Running hundreds of BackgroundJob jobs can quickly
absorb system resources.
This module extends the existing PowerShell BackgroundJob to include a new thread based ThreadJob job. This is a
lighter weight solution for running concurrent PowerShell scripts that works within the existing PowerShell job
infrastructure.
ThreadJob jobs will tend to run quicker because there is lower overhead and they do not use the remoting serialization
system. And they will use up fewer system resources. In addition output objects returned from the job will be
'live' since they are not re-hydrated from the serialization system. However, there is less isolation. If one
ThreadJob job crashes the process then all ThreadJob jobs running in that process will be terminated.
This module exports a single cmdlet, Start-ThreadJob, which works similarly to the existing Start-Job cmdlet.
The main difference is that the jobs which are created run in separate threads within the local process.
One difference is that ThreadJob jobs support a ThrottleLimit parameter to limit the number of running jobs,
and thus active threads, at a time. If more jobs are started then they go into a queue and wait until the current
number of jobs drops below the throttle limit.
Source for this module is at GitHub. Please submit any issues there.
https://github.com/PaulHigin/PSThreadJob
Added Runspace cleanup.
Added Using variable expression support.
Added StreamingHost parameter to stream host data writes to a provided host object.
Added Information stream handling.
Bumped version to 2.0.0, and now only support PowerShell version 5.1 and higher.
Fixed using keyword bug with PowerShell preview version, and removed unneeded version check.
Added setting current working directory to running jobs, when available.
Added help URI to module.
"
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.1'
# Cmdlets to export from this module
CmdletsToExport = 'Start-ThreadJob'
HelpInfoURI = 'https://go.microsoft.com/fwlink/?linkid=2113345'
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCv4Sy4df4Y/sf/
# 4d7im71N8tCny9H0XszagzRNoGf2raCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHladHYi2lfI6orS+P2p3tLX
# iHwb+pI1x7mEwA8VwGMTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAJWsEdgQFLu/2/K+184cobDXbEG4Y19OmmCi/9yJ9wRcZI3/yo/WEkszZ
# 5F0/vO1SzwRn9jVdB4d5pVGvtS0URM0derfF5by/6BjOfC/5+akaJHGCDcrc17NW
# REWk3pYekLB/p+mqeYhBEs3gZVg5JZEWU2ILRMwefOF5TCqoEeTFWzlgjKnGCuP9
# i/FvE0bX9uLLu4DwOm5burC4tyh9fzoNotra/1DWjxprUcqYYOCaE4NptRLnaXXO
# PGo3grd9JV1finlqFozCy6ErWgxvk/gM0SvDhHhD5yrUopK9E5OfsP0vL13VrSEF
# sbwrizX4ZRGbzNfU4BTB7Y4WbXdFnKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDd9gvLTyCQTEweHSyAt7WPYvHCYcHot091/jFuDkcHsAIGZdXka4Vv
# GBMyMDI0MDIyNjAzMDQwOS4yODRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmGUQ8wIhgPMjAyNDAyMjYwNzUxNDNaGA8yMDI0MDIyNzA3NTE0M1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6YZRDwIBADAHAgEAAgIEcjAHAgEAAgIRUzAKAgUA
# 6YeijwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEXucbh1tCcsJZWNnBcf
# 7jkJdUv4YIHByK+BElcS3eGuZnkZq6zVfDAPvRPGYzMhNpGNwYlkloeIzASLudYq
# bx7DNKo75D9n6pBRiXv44CFLBS9j7duhNIE5Bnf+5TgaYBQD3x8bUwbhQH0o9chw
# h4owHYvXt9yG/XVvbkBkpf+UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgapbsK+3tbkekBIkmAd6nCr6KSkNWogcEtV5pKJX0mFEwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIHRiS6x7wpBZr2axMZanzXPRYDxQ+PGoOo0lbMr5jh5X
# MA0GCSqGSIb3DQEBCwUABIICAFqbmg5hKk0ac5g51LiUbFDSHmvfk9cZILfEE7Ct
# 67YUkoc1sWDSmQyefYVV0LoPcdEwx8XPtJfDq1QDnrJhAemAPt3Oqq09C2H6j6H2
# cF1GqrdnfD5J1W9rtZs3hxNSArP+E5Mh7TdiyTCjlezZprES+Asn/wK86u+PeRam
# lbQ2Rg8jL/9Dd84rD4k3wW7H1A8Yl1Ckh7RxfN7oQJokAcSNZyV1gsnRV1qPHwML
# 7BU3g25BHVADpVyM7OujmUca5A635VKeXg2eMmEqjsVv9LiNC74U1BMERQDY+zn4
# rZCVOUFeVgsObbEDSu+4otJ83Q/Mj3DeVj32EYOGNEdmZAxREk2Ip5bhCTnjsRZr
# q3YnB/fwIchw4lzOn+l0MT24kBJpOArGKPbYIk/EM8R/TvgwtMDjrsBClXC9F1Ke
# suJjqeH37qPpTWceVYyPcPc8sMWmc28HvsfZIdhc0B5z/zIuXzKg3VNSLYUnR6pY
# kXjo5htO7uflNXdo7qW3TogIubSIme8U4RERSGg0LblbqQbm/KiSDQnwRfsh+nAU
# 1njnJCglXgqgLQDmd1mdUtfU9w6EgWo6K5iB7tF7pVLeOt0gEEHrrJJXrErhjPaO
# GnkzqW70zvnKMwGDLbWVcLF196tZSybohxz755Pf1gEkNMKidd2TI9WUee+ndI+T
# L5wf
# SIG # End signature block
|
combined_dataset/train/non-malicious/716.ps1 | 716.ps1 |
function New-RsRestFolder
{
[CmdletBinding()]
param(
[Parameter(Mandatory = $True)]
[string]
$RsFolder,
[Parameter(Mandatory = $True)]
[Alias('Name')]
[string]
$FolderName,
[string]
$ReportPortalUri,
[Alias('ApiVersion')]
[ValidateSet("v2.0")]
[string]
$RestApiVersion = "v2.0",
[Alias('ReportServerCredentials')]
[System.Management.Automation.PSCredential]
$Credential,
[Microsoft.PowerShell.Commands.WebRequestSession]
$WebSession
)
Begin
{
$WebSession = New-RsRestSessionHelper -BoundParameters $PSBoundParameters
$ReportPortalUri = Get-RsPortalUriHelper -WebSession $WebSession
$foldersUri = $ReportPortalUri + "api/$RestApiVersion/Folders"
}
Process
{
try
{
if ($RsFolder -eq '/')
{
$TargetFolderPath = "/$FolderName"
}
else
{
$TargetFolderPath = "$RsFolder/$FolderName"
}
Write-Verbose "Creating folder $TargetFolderPath..."
$payload = @{
"@odata.type" = "
"Path" = $RsFolder;
"Name" = $FolderName;
}
$payloadJson = ConvertTo-Json $payload
if ($Credential -ne $null)
{
$response = Invoke-WebRequest -Uri $foldersUri -Method Post -WebSession $WebSession -Body ([System.Text.Encoding]::UTF8.GetBytes($payloadJson)) -ContentType "application/json" -Credential $Credential -Verbose:$false
}
else
{
$response = Invoke-WebRequest -Uri $foldersUri -Method Post -WebSession $WebSession -Body ([System.Text.Encoding]::UTF8.GetBytes($payloadJson)) -ContentType "application/json" -UseDefaultCredentials -Verbose:$false
}
Write-Verbose "Folder $TargetFolderPath was created successfully!"
return ConvertFrom-Json $response.Content
}
catch
{
throw (New-Object System.Exception("Failed to create folder '$FolderName' in '$RsFolder': $($_.Exception.Message)", $_.Exception))
}
}
} |
combined_dataset/train/non-malicious/4136.ps1 | 4136.ps1 |
[CmdletBinding()]
param ()
function Uninstall-MSIByName {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][String]$ApplicationName,
[ValidateNotNullOrEmpty()][String]$Switches
)
$Executable = $Env:windir + "\system32\msiexec.exe"
$Uninstall = Get-ChildItem HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue
If (((Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture).OSArchitecture) -eq "64-Bit") {
$Uninstall += Get-ChildItem HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue
}
$Key = $uninstall | foreach-object { Get-ItemProperty REGISTRY::$_ } | where-object { $_.DisplayName -like "*$ApplicationName*" }
If ($Key -ne $null) {
Write-Host "Uninstall"$Key.DisplayName"....." -NoNewline
$Parameters = "/x " + $Key.PSChildName + [char]32 + $Switches
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010) -or ($ErrCode -eq 1605)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
}
}
}
Uninstall-MSIByName -ApplicationName "Adobe Acrobat" -Switches "/qb- /norestart"
Uninstall-MSIByName -ApplicationName "Adobe Reader" -Switches "/qb- /norestart"
|
combined_dataset/train/non-malicious/183.ps1 | 183.ps1 | function Get-LocalGroup
{
PARAM
(
[Alias('cn')]
[String[]]$ComputerName = $Env:COMPUTERNAME,
[String]$AccountName,
[System.Management.Automation.PsCredential]$Credential
)
$Splatting = @{
Class = "Win32_Group"
Namespace = "root\cimv2"
Filter = "LocalAccount='$True'"
}
If ($PSBoundParameters['Credential']) { $Splatting.Credential = $Credential }
Foreach ($Computer in $ComputerName)
{
TRY
{
Write-Verbose -Message "[PROCESS] ComputerName: $Computer"
Get-WmiObject @Splatting -ComputerName $Computer | Select-Object -Property Name, Caption, Status, SID, SIDType, Domain, Description
}
CATCH
{
Write-Warning -Message "[PROCESS] Issue connecting to $Computer"
}
}
} |
combined_dataset/train/non-malicious/sample_31_51.ps1 | sample_31_51.ps1 | <###################################################
# #
# Copyright (c) Microsoft. All rights reserved. #
# #
##################################################>
Import-Module -Name "$PSScriptRoot\..\RoleHelpers.psm1" -DisableNameChecking
$HostInstallKBsStatusFilePath = "$($env:systemdrive)\MASLogs\HostInstallKBsStatusFile.xml"
function Test-KBsInstallationFailure
{
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]
$HostName
)
$ErrorActionPreference = 'stop'
Trace-Execution "Checking if remote host '$HostName' is reachable."
if(-not (Test-Path "\\$HostName\C$"))
{
throw "Remote host's C drive is not reachable. Host name: '$HostName'"
}
$HostInstallKBsStatusFileRemotePath = "\\$HostName\C$\MASLogs\HostInstallKBsStatusFile.xml"
Trace-Execution "Checking if host install-KBs status file: '$HostInstallKBsStatusFileRemotePath' exists..."
if(test-path $HostInstallKBsStatusFileRemotePath)
{
Trace-Execution "Found the file: $HostInstallKBsStatusFileRemotePath."
[xml] $xmlStatus = Get-Content -Path $HostInstallKBsStatusFileRemotePath
if([string]::IsNullOrEmpty($xmlStatus.Host.Status))
{
throw "Xml present in file is not as expected. file: $HostInstallKBsStatusFileRemotePath"
}
if($xmlStatus.Host.Status -eq "Error")
{
Trace-Execution "KB installation failed on the host."
return $true
}
}
return $false
}
function Delete-HostInstallKBsStatusFile
{
$ErrorActionPreference = 'stop'
Trace-Execution "Deleting host install-KBs status file: $HostInstallKBsStatusFilePath ..."
if(test-path $HostInstallKBsStatusFilePath)
{
Trace-Execution "Found and deleting file: $HostInstallKBsStatusFilePath ..."
Remove-Item -path $HostInstallKBsStatusFilePath -Force
}
}
function Create-HostInstallKBsStatusFile
{
$ErrorActionPreference = 'stop'
Trace-Execution "Creating host install-KBs status file: $HostInstallKBsStatusFilePath ..."
$xmlStatus = "<Host><Status>Error</Status></Host>"
Set-Content -Value $xmlStatus -Path $HostInstallKBsStatusFilePath -Force
}
Export-ModuleMember Test-KBsInstallationFailure
Export-ModuleMember Delete-HostInstallKBsStatusFile
Export-ModuleMember Create-HostInstallKBsStatusFile
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCyGHsxzYyuMBrC
# KzVUjdHhgUbEfG8i2PGLQXMFsLX1T6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMOKxSVdVEXK1pKnxXUat9lg
# fCFHFfjFtNHKgFPtg37+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAdHY6Gq2NvAJGoW+qZt8qXj7unjLWWJ1FjqR1q5H9Yj3EtVEhheNDtYYv
# VCabO3w/RWLS4yER7Nlp4KPNeIvYfL96go6RI/hG498AYtWvcoO7wN0O+t69ItOH
# wpn8sCUbp5Vhq3cps3s22z4o6bBHb/kkdTN7ccZq7IJr2Aler+WlxQ2H/iL90IXT
# xwQAyIoTOW16vKcYCpApO16nCflSrvlJPZA/DFoBvaoQEI8eustg4kSlDItaJG7q
# VafmxU/SRmnnPWek09AH58yhh0Is/TZUt8vscyGmbPa3TBIXLytLi1EoxyaDKSTo
# XeNweR8BB6sFKQ0TwiZugFuXamSw4qGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAngOaMgjpWzMC7gjxLejtm3/3rCypXAgKLl/U1aqKfeAIGZbqk0RXh
# GBMyMDI0MDIxMjE0MDUzMC4xNzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA
# 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/
# fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly
# OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc
# Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgrPpVgPElOpZZPv9Cw7HaVufKDHfjnXx5PIKh6n+eT/swgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao
# MA0GCSqGSIb3DQEBCwUABIICAF4JRLNHvO3t+omgjcj3ie2hGSkD8kDmvVw2MRUs
# VUT0AwrzTbI2Km6QjaGew9jiSEMacMrQhTdEP8uEQEP3oJvgXz97iT1HnwNftn69
# ymWUHcpsN2ZlbwPnwtXcdStLidM2gex9AcpTTIubp5+fUENaig/EMMql1v+CQ8oI
# s+RvybZZXt38iZj8Iplpn2cKi/LW9tR8CCt+ZMBhzEl8XxcM9YPU23/6pyCVMHn/
# AOGROmFNVNA9ilZai7B/ldgZL/UBjDp+kt04MYukDuRNz/hc5mjxryxLLLCtUTKN
# 0gLBv3zdEvE3B65wfFBguP0DoOnE8iB9nPY5vaeuBBTz4nDa7HoVhQbiXp54NlJh
# lcaE74rohQGKktseoOQkhEI4jECz9yiBCuapDvVeDqFoYbPI+BiqZS+cfxIlS9GB
# Rqa2BrPA/Al/DxCNCg+k+AzT4LHksjwICs6zCGdeqHetfxRtJjF53zEYeAnw1DsN
# 7d4at66q2eYEraf+vWC51O72mKba92UD20PdZ+w/2Y99G3lm1MYpg1QX21g2EwND
# Dw1xFz6zhM29p3UE3bJWnS6pQyh0sJ1JxBeAaAU66otobXBUQc5MFmQnH0Ex+93F
# cI5s4RQWGxZwWywERaKZF2Cd/rjCDmBYjwOZJQskx9yjogH7F3CQnON9nEesAr4e
# JaWc
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_26_32.ps1 | sample_26_32.ps1 | #
# Module manifest for module 'OCI.PSModules.Networkfirewall'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Networkfirewall.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6a784c1a-dca2-489e-beb9-d910537df35b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Networkfirewall Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkfirewall.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCINetworkfirewall', 'Get-OCINetworkfirewallAddressList',
'Get-OCINetworkfirewallAddressListsList',
'Get-OCINetworkfirewallApplication',
'Get-OCINetworkfirewallApplicationGroup',
'Get-OCINetworkfirewallApplicationGroupsList',
'Get-OCINetworkfirewallApplicationsList',
'Get-OCINetworkfirewallDecryptionProfile',
'Get-OCINetworkfirewallDecryptionProfilesList',
'Get-OCINetworkfirewallDecryptionRule',
'Get-OCINetworkfirewallDecryptionRulesList',
'Get-OCINetworkfirewallMappedSecret',
'Get-OCINetworkfirewallMappedSecretsList',
'Get-OCINetworkfirewallPoliciesList',
'Get-OCINetworkfirewallPolicy',
'Get-OCINetworkfirewallSecurityRule',
'Get-OCINetworkfirewallSecurityRulesList',
'Get-OCINetworkfirewallService',
'Get-OCINetworkfirewallServiceList',
'Get-OCINetworkfirewallServiceListsList',
'Get-OCINetworkfirewallServicesList', 'Get-OCINetworkfirewallsList',
'Get-OCINetworkfirewallUrlList',
'Get-OCINetworkfirewallUrlListsList',
'Get-OCINetworkfirewallWorkRequest',
'Get-OCINetworkfirewallWorkRequestErrorsList',
'Get-OCINetworkfirewallWorkRequestLogsList',
'Get-OCINetworkfirewallWorkRequestsList',
'Invoke-OCINetworkfirewallApplyNetworkFirewallPolicy',
'Invoke-OCINetworkfirewallBulkUploadAddressLists',
'Invoke-OCINetworkfirewallBulkUploadApplicationGroups',
'Invoke-OCINetworkfirewallBulkUploadApplications',
'Invoke-OCINetworkfirewallBulkUploadDecryptionProfiles',
'Invoke-OCINetworkfirewallBulkUploadDecryptionRules',
'Invoke-OCINetworkfirewallBulkUploadMappedSecrets',
'Invoke-OCINetworkfirewallBulkUploadSecurityRules',
'Invoke-OCINetworkfirewallBulkUploadServiceLists',
'Invoke-OCINetworkfirewallBulkUploadServices',
'Invoke-OCINetworkfirewallBulkUploadUrlLists',
'Invoke-OCINetworkfirewallCloneNetworkFirewallPolicy',
'Invoke-OCINetworkfirewallMigrateNetworkFirewallPolicy',
'Move-OCINetworkfirewallCompartment',
'Move-OCINetworkfirewallPolicyCompartment',
'New-OCINetworkfirewall', 'New-OCINetworkfirewallAddressList',
'New-OCINetworkfirewallApplication',
'New-OCINetworkfirewallApplicationGroup',
'New-OCINetworkfirewallDecryptionProfile',
'New-OCINetworkfirewallDecryptionRule',
'New-OCINetworkfirewallMappedSecret',
'New-OCINetworkfirewallPolicy',
'New-OCINetworkfirewallSecurityRule',
'New-OCINetworkfirewallService',
'New-OCINetworkfirewallServiceList',
'New-OCINetworkfirewallUrlList', 'Remove-OCINetworkfirewall',
'Remove-OCINetworkfirewallAddressList',
'Remove-OCINetworkfirewallApplication',
'Remove-OCINetworkfirewallApplicationGroup',
'Remove-OCINetworkfirewallDecryptionProfile',
'Remove-OCINetworkfirewallDecryptionRule',
'Remove-OCINetworkfirewallMappedSecret',
'Remove-OCINetworkfirewallPolicy',
'Remove-OCINetworkfirewallSecurityRule',
'Remove-OCINetworkfirewallService',
'Remove-OCINetworkfirewallServiceList',
'Remove-OCINetworkfirewallUrlList',
'Stop-OCINetworkfirewallWorkRequest', 'Update-OCINetworkfirewall',
'Update-OCINetworkfirewallAddressList',
'Update-OCINetworkfirewallApplication',
'Update-OCINetworkfirewallApplicationGroup',
'Update-OCINetworkfirewallDecryptionProfile',
'Update-OCINetworkfirewallDecryptionRule',
'Update-OCINetworkfirewallMappedSecret',
'Update-OCINetworkfirewallPolicy',
'Update-OCINetworkfirewallSecurityRule',
'Update-OCINetworkfirewallService',
'Update-OCINetworkfirewallServiceList',
'Update-OCINetworkfirewallUrlList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkfirewall'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/4217.ps1 | 4217.ps1 |
function New-InMemoryModule
{
Param
(
[Parameter(Position = 0)]
[ValidateNotNullOrEmpty()]
[String]
$ModuleName = [Guid]::NewGuid().ToString()
)
$LoadedAssemblies = [AppDomain]::CurrentDomain.GetAssemblies()
ForEach ($Assembly in $LoadedAssemblies) {
if ($Assembly.FullName -and ($Assembly.FullName.Split(',')[0] -eq $ModuleName)) {
return $Assembly
}
}
$DynAssembly = New-Object Reflection.AssemblyName($ModuleName)
$Domain = [AppDomain]::CurrentDomain
$AssemblyBuilder = $Domain.DefineDynamicAssembly($DynAssembly, 'Run')
$ModuleBuilder = $AssemblyBuilder.DefineDynamicModule($ModuleName, $False)
return $ModuleBuilder
}
function func
{
Param
(
[Parameter(Position = 0, Mandatory = $True)]
[String]
$DllName,
[Parameter(Position = 1, Mandatory = $True)]
[String]
$FunctionName,
[Parameter(Position = 2, Mandatory = $True)]
[Type]
$ReturnType,
[Parameter(Position = 3)]
[Type[]]
$ParameterTypes,
[Parameter(Position = 4)]
[Runtime.InteropServices.CallingConvention]
$NativeCallingConvention,
[Parameter(Position = 5)]
[Runtime.InteropServices.CharSet]
$Charset,
[Switch]
$SetLastError
)
$Properties = @{
DllName = $DllName
FunctionName = $FunctionName
ReturnType = $ReturnType
}
if ($ParameterTypes) { $Properties['ParameterTypes'] = $ParameterTypes }
if ($NativeCallingConvention) { $Properties['NativeCallingConvention'] = $NativeCallingConvention }
if ($Charset) { $Properties['Charset'] = $Charset }
if ($SetLastError) { $Properties['SetLastError'] = $SetLastError }
New-Object PSObject -Property $Properties
}
function Add-Win32Type
{
[OutputType([Hashtable])]
Param(
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]
[String]
$DllName,
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]
[String]
$FunctionName,
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]
[Type]
$ReturnType,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[Type[]]
$ParameterTypes,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[Runtime.InteropServices.CallingConvention]
$NativeCallingConvention = [Runtime.InteropServices.CallingConvention]::StdCall,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[Runtime.InteropServices.CharSet]
$Charset = [Runtime.InteropServices.CharSet]::Auto,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[Switch]
$SetLastError,
[Parameter(Mandatory = $True)]
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})]
$Module,
[ValidateNotNull()]
[String]
$Namespace = ''
)
BEGIN
{
$TypeHash = @{}
}
PROCESS
{
if ($Module -is [Reflection.Assembly])
{
if ($Namespace)
{
$TypeHash[$DllName] = $Module.GetType("$Namespace.$DllName")
}
else
{
$TypeHash[$DllName] = $Module.GetType($DllName)
}
}
else
{
if (!$TypeHash.ContainsKey($DllName))
{
if ($Namespace)
{
$TypeHash[$DllName] = $Module.DefineType("$Namespace.$DllName", 'Public,BeforeFieldInit')
}
else
{
$TypeHash[$DllName] = $Module.DefineType($DllName, 'Public,BeforeFieldInit')
}
}
$Method = $TypeHash[$DllName].DefineMethod(
$FunctionName,
'Public,Static,PinvokeImpl',
$ReturnType,
$ParameterTypes)
$i = 1
ForEach($Parameter in $ParameterTypes)
{
if ($Parameter.IsByRef)
{
[void] $Method.DefineParameter($i, 'Out', $Null)
}
$i++
}
$DllImport = [Runtime.InteropServices.DllImportAttribute]
$SetLastErrorField = $DllImport.GetField('SetLastError')
$CallingConventionField = $DllImport.GetField('CallingConvention')
$CharsetField = $DllImport.GetField('CharSet')
if ($SetLastError) { $SLEValue = $True } else { $SLEValue = $False }
$Constructor = [Runtime.InteropServices.DllImportAttribute].GetConstructor([String])
$DllImportAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($Constructor,
$DllName, [Reflection.PropertyInfo[]] @(), [Object[]] @(),
[Reflection.FieldInfo[]] @($SetLastErrorField, $CallingConventionField, $CharsetField),
[Object[]] @($SLEValue, ([Runtime.InteropServices.CallingConvention] $NativeCallingConvention), ([Runtime.InteropServices.CharSet] $Charset)))
$Method.SetCustomAttribute($DllImportAttribute)
}
}
END
{
if ($Module -is [Reflection.Assembly])
{
return $TypeHash
}
$ReturnTypes = @{}
ForEach ($Key in $TypeHash.Keys)
{
$Type = $TypeHash[$Key].CreateType()
$ReturnTypes[$Key] = $Type
}
return $ReturnTypes
}
}
function psenum
{
[OutputType([Type])]
Param
(
[Parameter(Position = 0, Mandatory = $True)]
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})]
$Module,
[Parameter(Position = 1, Mandatory = $True)]
[ValidateNotNullOrEmpty()]
[String]
$FullName,
[Parameter(Position = 2, Mandatory = $True)]
[Type]
$Type,
[Parameter(Position = 3, Mandatory = $True)]
[ValidateNotNullOrEmpty()]
[Hashtable]
$EnumElements,
[Switch]
$Bitfield
)
if ($Module -is [Reflection.Assembly])
{
return ($Module.GetType($FullName))
}
$EnumType = $Type -as [Type]
$EnumBuilder = $Module.DefineEnum($FullName, 'Public', $EnumType)
if ($Bitfield)
{
$FlagsConstructor = [FlagsAttribute].GetConstructor(@())
$FlagsCustomAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($FlagsConstructor, @())
$EnumBuilder.SetCustomAttribute($FlagsCustomAttribute)
}
ForEach ($Key in $EnumElements.Keys)
{
$Null = $EnumBuilder.DefineLiteral($Key, $EnumElements[$Key] -as $EnumType)
}
$EnumBuilder.CreateType()
}
function field
{
Param
(
[Parameter(Position = 0, Mandatory = $True)]
[UInt16]
$Position,
[Parameter(Position = 1, Mandatory = $True)]
[Type]
$Type,
[Parameter(Position = 2)]
[UInt16]
$Offset,
[Object[]]
$MarshalAs
)
@{
Position = $Position
Type = $Type -as [Type]
Offset = $Offset
MarshalAs = $MarshalAs
}
}
function struct
{
[OutputType([Type])]
Param
(
[Parameter(Position = 1, Mandatory = $True)]
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})]
$Module,
[Parameter(Position = 2, Mandatory = $True)]
[ValidateNotNullOrEmpty()]
[String]
$FullName,
[Parameter(Position = 3, Mandatory = $True)]
[ValidateNotNullOrEmpty()]
[Hashtable]
$StructFields,
[Reflection.Emit.PackingSize]
$PackingSize = [Reflection.Emit.PackingSize]::Unspecified,
[Switch]
$ExplicitLayout
)
if ($Module -is [Reflection.Assembly])
{
return ($Module.GetType($FullName))
}
[Reflection.TypeAttributes] $StructAttributes = 'AnsiClass,
Class,
Public,
Sealed,
BeforeFieldInit'
if ($ExplicitLayout)
{
$StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::ExplicitLayout
}
else
{
$StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::SequentialLayout
}
$StructBuilder = $Module.DefineType($FullName, $StructAttributes, [ValueType], $PackingSize)
$ConstructorInfo = [Runtime.InteropServices.MarshalAsAttribute].GetConstructors()[0]
$SizeConst = @([Runtime.InteropServices.MarshalAsAttribute].GetField('SizeConst'))
$Fields = New-Object Hashtable[]($StructFields.Count)
ForEach ($Field in $StructFields.Keys)
{
$Index = $StructFields[$Field]['Position']
$Fields[$Index] = @{FieldName = $Field; Properties = $StructFields[$Field]}
}
ForEach ($Field in $Fields)
{
$FieldName = $Field['FieldName']
$FieldProp = $Field['Properties']
$Offset = $FieldProp['Offset']
$Type = $FieldProp['Type']
$MarshalAs = $FieldProp['MarshalAs']
$NewField = $StructBuilder.DefineField($FieldName, $Type, 'Public')
if ($MarshalAs)
{
$UnmanagedType = $MarshalAs[0] -as ([Runtime.InteropServices.UnmanagedType])
if ($MarshalAs[1])
{
$Size = $MarshalAs[1]
$AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo,
$UnmanagedType, $SizeConst, @($Size))
}
else
{
$AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo, [Object[]] @($UnmanagedType))
}
$NewField.SetCustomAttribute($AttribBuilder)
}
if ($ExplicitLayout) { $NewField.SetOffset($Offset) }
}
$SizeMethod = $StructBuilder.DefineMethod('GetSize',
'Public, Static',
[Int],
[Type[]] @())
$ILGenerator = $SizeMethod.GetILGenerator()
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder)
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Call,
[Type].GetMethod('GetTypeFromHandle'))
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Call,
[Runtime.InteropServices.Marshal].GetMethod('SizeOf', [Type[]] @([Type])))
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Ret)
$ImplicitConverter = $StructBuilder.DefineMethod('op_Implicit',
'PrivateScope, Public, Static, HideBySig, SpecialName',
$StructBuilder,
[Type[]] @([IntPtr]))
$ILGenerator2 = $ImplicitConverter.GetILGenerator()
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Nop)
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldarg_0)
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder)
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call,
[Type].GetMethod('GetTypeFromHandle'))
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call,
[Runtime.InteropServices.Marshal].GetMethod('PtrToStructure', [Type[]] @([IntPtr], [Type])))
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Unbox_Any, $StructBuilder)
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ret)
$StructBuilder.CreateType()
}
filter Get-IniContent {
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$True)]
[Alias('FullName')]
[ValidateScript({ Test-Path -Path $_ })]
[String[]]
$Path
)
ForEach($TargetPath in $Path) {
$IniObject = @{}
Switch -Regex -File $TargetPath {
"^\[(.+)\]"
{
$Section = $matches[1].Trim()
$IniObject[$Section] = @{}
$CommentCount = 0
}
"^(;.*)$"
{
$Value = $matches[1].Trim()
$CommentCount = $CommentCount + 1
$Name = 'Comment' + $CommentCount
$IniObject[$Section][$Name] = $Value
}
"(.+?)\s*=(.*)"
{
$Name, $Value = $matches[1..2]
$Name = $Name.Trim()
$Values = $Value.split(',') | ForEach-Object {$_.Trim()}
if($Values -isnot [System.Array]) {$Values = @($Values)}
$IniObject[$Section][$Name] = $Values
}
}
$IniObject
}
}
filter Get-IPAddress {
[CmdletBinding()]
param(
[Parameter(Position=0, ValueFromPipeline=$True)]
[Alias('HostName')]
[String]
$ComputerName = $Env:ComputerName
)
try {
$Computer = $ComputerName | Get-NameField
@(([Net.Dns]::GetHostEntry($Computer)).AddressList) | ForEach-Object {
if ($_.AddressFamily -eq 'InterNetwork') {
$Out = New-Object PSObject
$Out | Add-Member Noteproperty 'ComputerName' $Computer
$Out | Add-Member Noteproperty 'IPAddress' $_.IPAddressToString
$Out
}
}
}
catch {
Write-Verbose -Message 'Could not resolve host to an IP Address.'
}
}
filter Convert-NameToSid {
[CmdletBinding()]
param(
[Parameter(Mandatory=$True, ValueFromPipeline=$True)]
[String]
[Alias('Name')]
$ObjectName,
[String]
$Domain
)
$ObjectName = $ObjectName -Replace "/","\"
if($ObjectName.Contains("\")) {
$Domain = $ObjectName.Split("\")[0]
$ObjectName = $ObjectName.Split("\")[1]
}
elseif(-not $Domain) {
$Domain = (Get-NetDomain).Name
}
try {
$Obj = (New-Object System.Security.Principal.NTAccount($Domain, $ObjectName))
$SID = $Obj.Translate([System.Security.Principal.SecurityIdentifier]).Value
$Out = New-Object PSObject
$Out | Add-Member Noteproperty 'ObjectName' $ObjectName
$Out | Add-Member Noteproperty 'SID' $SID
$Out
}
catch {
Write-Verbose "Invalid object/name: $Domain\$ObjectName"
$Null
}
}
filter Convert-SidToName {
[CmdletBinding()]
param(
[Parameter(Mandatory=$True, ValueFromPipeline=$True)]
[String]
[ValidatePattern('^S-1-.*')]
$SID
)
try {
$SID2 = $SID.trim('*')
Switch ($SID2) {
'S-1-0' { 'Null Authority' }
'S-1-0-0' { 'Nobody' }
'S-1-1' { 'World Authority' }
'S-1-1-0' { 'Everyone' }
'S-1-2' { 'Local Authority' }
'S-1-2-0' { 'Local' }
'S-1-2-1' { 'Console Logon ' }
'S-1-3' { 'Creator Authority' }
'S-1-3-0' { 'Creator Owner' }
'S-1-3-1' { 'Creator Group' }
'S-1-3-2' { 'Creator Owner Server' }
'S-1-3-3' { 'Creator Group Server' }
'S-1-3-4' { 'Owner Rights' }
'S-1-4' { 'Non-unique Authority' }
'S-1-5' { 'NT Authority' }
'S-1-5-1' { 'Dialup' }
'S-1-5-2' { 'Network' }
'S-1-5-3' { 'Batch' }
'S-1-5-4' { 'Interactive' }
'S-1-5-6' { 'Service' }
'S-1-5-7' { 'Anonymous' }
'S-1-5-8' { 'Proxy' }
'S-1-5-9' { 'Enterprise Domain Controllers' }
'S-1-5-10' { 'Principal Self' }
'S-1-5-11' { 'Authenticated Users' }
'S-1-5-12' { 'Restricted Code' }
'S-1-5-13' { 'Terminal Server Users' }
'S-1-5-14' { 'Remote Interactive Logon' }
'S-1-5-15' { 'This Organization ' }
'S-1-5-17' { 'This Organization ' }
'S-1-5-18' { 'Local System' }
'S-1-5-19' { 'NT Authority' }
'S-1-5-20' { 'NT Authority' }
'S-1-5-80-0' { 'All Services ' }
'S-1-5-32-544' { 'BUILTIN\Administrators' }
'S-1-5-32-545' { 'BUILTIN\Users' }
'S-1-5-32-546' { 'BUILTIN\Guests' }
'S-1-5-32-547' { 'BUILTIN\Power Users' }
'S-1-5-32-548' { 'BUILTIN\Account Operators' }
'S-1-5-32-549' { 'BUILTIN\Server Operators' }
'S-1-5-32-550' { 'BUILTIN\Print Operators' }
'S-1-5-32-551' { 'BUILTIN\Backup Operators' }
'S-1-5-32-552' { 'BUILTIN\Replicators' }
'S-1-5-32-554' { 'BUILTIN\Pre-Windows 2000 Compatible Access' }
'S-1-5-32-555' { 'BUILTIN\Remote Desktop Users' }
'S-1-5-32-556' { 'BUILTIN\Network Configuration Operators' }
'S-1-5-32-557' { 'BUILTIN\Incoming Forest Trust Builders' }
'S-1-5-32-558' { 'BUILTIN\Performance Monitor Users' }
'S-1-5-32-559' { 'BUILTIN\Performance Log Users' }
'S-1-5-32-560' { 'BUILTIN\Windows Authorization Access Group' }
'S-1-5-32-561' { 'BUILTIN\Terminal Server License Servers' }
'S-1-5-32-562' { 'BUILTIN\Distributed COM Users' }
'S-1-5-32-569' { 'BUILTIN\Cryptographic Operators' }
'S-1-5-32-573' { 'BUILTIN\Event Log Readers' }
'S-1-5-32-574' { 'BUILTIN\Certificate Service DCOM Access' }
'S-1-5-32-575' { 'BUILTIN\RDS Remote Access Servers' }
'S-1-5-32-576' { 'BUILTIN\RDS Endpoint Servers' }
'S-1-5-32-577' { 'BUILTIN\RDS Management Servers' }
'S-1-5-32-578' { 'BUILTIN\Hyper-V Administrators' }
'S-1-5-32-579' { 'BUILTIN\Access Control Assistance Operators' }
'S-1-5-32-580' { 'BUILTIN\Access Control Assistance Operators' }
Default {
$Obj = (New-Object System.Security.Principal.SecurityIdentifier($SID2))
$Obj.Translate( [System.Security.Principal.NTAccount]).Value
}
}
}
catch {
Write-Verbose "Invalid SID: $SID"
$SID
}
}
filter Convert-ADName {
[CmdletBinding()]
param(
[Parameter(Mandatory=$True, ValueFromPipeline=$True)]
[String]
$ObjectName,
[String]
[ValidateSet("NT4","DN","Simple","Canonical")]
$InputType,
[String]
[ValidateSet("NT4","DN","Simple","Canonical")]
$OutputType
)
$NameTypes = @{
'DN' = 1
'Canonical' = 2
'NT4' = 3
'Simple' = 5
}
if(-not $PSBoundParameters['InputType']) {
if( ($ObjectName.split('/')).Count -eq 2 ) {
$ObjectName = $ObjectName.replace('/', '\')
}
if($ObjectName -match "^[A-Za-z]+\\[A-Za-z ]+") {
$InputType = 'NT4'
}
elseif($ObjectName -match "^[A-Za-z ]+@[A-Za-z\.]+") {
$InputType = 'Simple'
}
elseif($ObjectName -match "^[A-Za-z\.]+/[A-Za-z]+/[A-Za-z/ ]+") {
$InputType = 'Canonical'
}
elseif($ObjectName -match '^CN=.*') {
$InputType = 'DN'
}
else {
Write-Warning "Can not identify InType for $ObjectName"
}
}
elseif($InputType -eq 'NT4') {
$ObjectName = $ObjectName.replace('/', '\')
}
if(-not $PSBoundParameters['OutputType']) {
$OutputType = Switch($InputType) {
'NT4' {'Canonical'}
'Simple' {'NT4'}
'DN' {'NT4'}
'Canonical' {'NT4'}
}
}
$Domain = Switch($InputType) {
'NT4' { $ObjectName.split("\")[0] }
'Simple' { $ObjectName.split("@")[1] }
'Canonical' { $ObjectName.split("/")[0] }
'DN' {$ObjectName.subString($ObjectName.IndexOf('DC=')) -replace 'DC=','' -replace ',','.'}
}
function Invoke-Method([__ComObject] $Object, [String] $Method, $Parameters) {
$Output = $Object.GetType().InvokeMember($Method, "InvokeMethod", $Null, $Object, $Parameters)
if ( $Output ) { $Output }
}
function Set-Property([__ComObject] $Object, [String] $Property, $Parameters) {
[Void] $Object.GetType().InvokeMember($Property, "SetProperty", $Null, $Object, $Parameters)
}
$Translate = New-Object -ComObject NameTranslate
try {
Invoke-Method $Translate "Init" (1, $Domain)
}
catch [System.Management.Automation.MethodInvocationException] {
}
Set-Property $Translate "ChaseReferral" (0x60)
try {
Invoke-Method $Translate "Set" ($NameTypes[$InputType], $ObjectName)
(Invoke-Method $Translate "Get" ($NameTypes[$OutputType]))
}
catch [System.Management.Automation.MethodInvocationException] {
}
}
filter Get-NameField {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline = $True, ValueFromPipelineByPropertyName = $True)]
[Object]
$Object,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[String]
$DnsHostName,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[String]
$Name
)
if($PSBoundParameters['DnsHostName']) {
$DnsHostName
}
elseif($PSBoundParameters['Name']) {
$Name
}
elseif($Object) {
if ( [bool]($Object.PSobject.Properties.name -match "dnshostname") ) {
$Object.dnshostname
}
elseif ( [bool]($Object.PSobject.Properties.name -match "name") ) {
$Object.name
}
else {
$Object
}
}
else {
return $Null
}
}
function Convert-LDAPProperty {
param(
[Parameter(Mandatory=$True, ValueFromPipeline=$True)]
[ValidateNotNullOrEmpty()]
$Properties
)
$ObjectProperties = @{}
$Properties.PropertyNames | ForEach-Object {
if (($_ -eq "objectsid") -or ($_ -eq "sidhistory")) {
$ObjectProperties[$_] = (New-Object System.Security.Principal.SecurityIdentifier($Properties[$_][0],0)).Value
}
elseif($_ -eq "objectguid") {
$ObjectProperties[$_] = (New-Object Guid (,$Properties[$_][0])).Guid
}
elseif( ($_ -eq "lastlogon") -or ($_ -eq "lastlogontimestamp") -or ($_ -eq "pwdlastset") -or ($_ -eq "lastlogoff") -or ($_ -eq "badPasswordTime") ) {
if ($Properties[$_][0] -is [System.MarshalByRefObject]) {
$Temp = $Properties[$_][0]
[Int32]$High = $Temp.GetType().InvokeMember("HighPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null)
[Int32]$Low = $Temp.GetType().InvokeMember("LowPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null)
$ObjectProperties[$_] = ([datetime]::FromFileTime([Int64]("0x{0:x8}{1:x8}" -f $High, $Low)))
}
else {
$ObjectProperties[$_] = ([datetime]::FromFileTime(($Properties[$_][0])))
}
}
elseif($Properties[$_][0] -is [System.MarshalByRefObject]) {
$Prop = $Properties[$_]
try {
$Temp = $Prop[$_][0]
Write-Verbose $_
[Int32]$High = $Temp.GetType().InvokeMember("HighPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null)
[Int32]$Low = $Temp.GetType().InvokeMember("LowPart", [System.Reflection.BindingFlags]::GetProperty, $null, $Temp, $null)
$ObjectProperties[$_] = [Int64]("0x{0:x8}{1:x8}" -f $High, $Low)
}
catch {
$ObjectProperties[$_] = $Prop[$_]
}
}
elseif($Properties[$_].count -eq 1) {
$ObjectProperties[$_] = $Properties[$_][0]
}
else {
$ObjectProperties[$_] = $Properties[$_]
}
}
New-Object -TypeName PSObject -Property $ObjectProperties
}
filter Get-DomainSearcher {
param(
[Parameter(ValueFromPipeline=$True)]
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[String]
$ADSprefix,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
if(-not $Credential) {
if(-not $Domain) {
$Domain = (Get-NetDomain).name
}
elseif(-not $DomainController) {
try {
$DomainController = ((Get-NetDomain).PdcRoleOwner).Name
}
catch {
throw "Get-DomainSearcher: Error in retrieving PDC for current domain"
}
}
}
elseif (-not $DomainController) {
try {
$DomainController = ((Get-NetDomain -Credential $Credential).PdcRoleOwner).Name
}
catch {
throw "Get-DomainSearcher: Error in retrieving PDC for current domain"
}
if(!$DomainController) {
throw "Get-DomainSearcher: Error in retrieving PDC for current domain"
}
}
$SearchString = "LDAP://"
if($DomainController) {
$SearchString += $DomainController
if($Domain){
$SearchString += '/'
}
}
if($ADSprefix) {
$SearchString += $ADSprefix + ','
}
if($ADSpath) {
if($ADSpath -Match '^GC://') {
$DN = $AdsPath.ToUpper().Trim('/')
$SearchString = ''
}
else {
if($ADSpath -match '^LDAP://') {
if($ADSpath -match "LDAP://.+/.+") {
$SearchString = ''
}
else {
$ADSpath = $ADSpath.Substring(7)
}
}
$DN = $ADSpath
}
}
else {
if($Domain -and ($Domain.Trim() -ne "")) {
$DN = "DC=$($Domain.Replace('.', ',DC='))"
}
}
$SearchString += $DN
Write-Verbose "Get-DomainSearcher search string: $SearchString"
if($Credential) {
Write-Verbose "Using alternate credentials for LDAP connection"
$DomainObject = New-Object DirectoryServices.DirectoryEntry($SearchString, $Credential.UserName, $Credential.GetNetworkCredential().Password)
$Searcher = New-Object System.DirectoryServices.DirectorySearcher($DomainObject)
}
else {
$Searcher = New-Object System.DirectoryServices.DirectorySearcher([ADSI]$SearchString)
}
$Searcher.PageSize = $PageSize
$Searcher.CacheResults = $False
$Searcher
}
filter Get-NetDomain {
param(
[Parameter(ValueFromPipeline=$True)]
[String]
$Domain,
[Management.Automation.PSCredential]
$Credential
)
if($Credential) {
Write-Verbose "Using alternate credentials for Get-NetDomain"
if(!$Domain) {
$Domain = $Credential.GetNetworkCredential().Domain
Write-Verbose "Extracted domain '$Domain' from -Credential"
}
$DomainContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Domain', $Domain, $Credential.UserName, $Credential.GetNetworkCredential().Password)
try {
[System.DirectoryServices.ActiveDirectory.Domain]::GetDomain($DomainContext)
}
catch {
Write-Verbose "The specified domain does '$Domain' not exist, could not be contacted, there isn't an existing trust, or the specified credentials are invalid."
$Null
}
}
elseif($Domain) {
$DomainContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Domain', $Domain)
try {
[System.DirectoryServices.ActiveDirectory.Domain]::GetDomain($DomainContext)
}
catch {
Write-Verbose "The specified domain '$Domain' does not exist, could not be contacted, or there isn't an existing trust."
$Null
}
}
else {
[System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
}
}
filter Get-NetForest {
param(
[Parameter(ValueFromPipeline=$True)]
[String]
$Forest,
[Management.Automation.PSCredential]
$Credential
)
if($Credential) {
Write-Verbose "Using alternate credentials for Get-NetForest"
if(!$Forest) {
$Forest = $Credential.GetNetworkCredential().Domain
Write-Verbose "Extracted domain '$Forest' from -Credential"
}
$ForestContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Forest', $Forest, $Credential.UserName, $Credential.GetNetworkCredential().Password)
try {
$ForestObject = [System.DirectoryServices.ActiveDirectory.Forest]::GetForest($ForestContext)
}
catch {
Write-Verbose "The specified forest '$Forest' does not exist, could not be contacted, there isn't an existing trust, or the specified credentials are invalid."
$Null
}
}
elseif($Forest) {
$ForestContext = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext('Forest', $Forest)
try {
$ForestObject = [System.DirectoryServices.ActiveDirectory.Forest]::GetForest($ForestContext)
}
catch {
Write-Verbose "The specified forest '$Forest' does not exist, could not be contacted, or there isn't an existing trust."
return $Null
}
}
else {
$ForestObject = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()
}
if($ForestObject) {
$ForestSid = (New-Object System.Security.Principal.NTAccount($ForestObject.RootDomain,"krbtgt")).Translate([System.Security.Principal.SecurityIdentifier]).Value
$Parts = $ForestSid -Split "-"
$ForestSid = $Parts[0..$($Parts.length-2)] -join "-"
$ForestObject | Add-Member NoteProperty 'RootDomainSid' $ForestSid
$ForestObject
}
}
filter Get-NetForestDomain {
param(
[Parameter(ValueFromPipeline=$True)]
[String]
$Forest,
[Management.Automation.PSCredential]
$Credential
)
$ForestObject = Get-NetForest -Forest $Forest -Credential $Credential
if($ForestObject) {
$ForestObject.Domains
}
}
filter Get-NetDomainController {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$True)]
[String]
$Domain,
[String]
$DomainController,
[Switch]
$LDAP,
[Management.Automation.PSCredential]
$Credential
)
if($LDAP -or $DomainController) {
Get-NetComputer -Domain $Domain -DomainController $DomainController -Credential $Credential -FullData -Filter '(userAccountControl:1.2.840.113556.1.4.803:=8192)'
}
else {
$FoundDomain = Get-NetDomain -Domain $Domain -Credential $Credential
if($FoundDomain) {
$Founddomain.DomainControllers
}
}
}
function Get-NetComputer {
[CmdletBinding()]
Param (
[Parameter(ValueFromPipeline=$True)]
[Alias('HostName')]
[String]
$ComputerName = '*',
[String]
$SPN,
[String]
$OperatingSystem,
[String]
$ServicePack,
[String]
$Filter,
[Switch]
$Printers,
[Switch]
$Ping,
[Switch]
$FullData,
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[String]
$SiteName,
[Switch]
$Unconstrained,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
begin {
$CompSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -ADSpath $ADSpath -PageSize $PageSize -Credential $Credential
}
process {
if ($CompSearcher) {
if($Unconstrained) {
Write-Verbose "Searching for computers with for unconstrained delegation"
$Filter += "(userAccountControl:1.2.840.113556.1.4.803:=524288)"
}
if($Printers) {
Write-Verbose "Searching for printers"
$Filter += "(objectCategory=printQueue)"
}
if($SPN) {
Write-Verbose "Searching for computers with SPN: $SPN"
$Filter += "(servicePrincipalName=$SPN)"
}
if($OperatingSystem) {
$Filter += "(operatingsystem=$OperatingSystem)"
}
if($ServicePack) {
$Filter += "(operatingsystemservicepack=$ServicePack)"
}
if($SiteName) {
$Filter += "(serverreferencebl=$SiteName)"
}
$CompFilter = "(&(sAMAccountType=805306369)(dnshostname=$ComputerName)$Filter)"
Write-Verbose "Get-NetComputer filter : $CompFilter"
$CompSearcher.filter = $CompFilter
if(-not $FullData) {
$Null = $CompSearcher.PropertiesToLoad.Add('dnshostname')
}
try {
ForEach($ComputerResult in $CompSearcher.FindAll()) {
if($ComputerResult) {
$Up = $True
if($Ping) {
$Up = Test-Connection -Count 1 -Quiet -ComputerName $ComputerResult.properties.dnshostname
}
if($Up) {
if ($FullData) {
$Computer = Convert-LDAPProperty -Properties $ComputerResult.Properties
$Computer.PSObject.TypeNames.Add('PowerView.Computer')
$Computer
}
else {
$ComputerResult.properties.dnshostname
}
}
}
}
$CompSearcher.dispose()
}
catch {
Write-Warning "Error: $_"
}
}
}
}
function Get-ADObject {
[CmdletBinding()]
Param (
[Parameter(ValueFromPipeline=$True)]
[String]
$SID,
[String]
$Name,
[String]
$SamAccountName,
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[String]
$Filter,
[Switch]
$ReturnRaw,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
process {
if($SID -and (-not $Domain)) {
try {
$Name = Convert-SidToName $SID
if($Name) {
$Canonical = Convert-ADName -ObjectName $Name -InputType NT4 -OutputType Canonical
if($Canonical) {
$Domain = $Canonical.split("/")[0]
}
else {
Write-Verbose "Error resolving SID '$SID'"
return $Null
}
}
}
catch {
Write-Verbose "Error resolving SID '$SID' : $_"
return $Null
}
}
$ObjectSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize
if($ObjectSearcher) {
if($SID) {
$ObjectSearcher.filter = "(&(objectsid=$SID)$Filter)"
}
elseif($Name) {
$ObjectSearcher.filter = "(&(name=$Name)$Filter)"
}
elseif($SamAccountName) {
$ObjectSearcher.filter = "(&(samAccountName=$SamAccountName)$Filter)"
}
try {
$Results = $ObjectSearcher.FindAll()
$Results | Where-Object {$_} | ForEach-Object {
if($ReturnRaw) {
$_
}
else {
Convert-LDAPProperty -Properties $_.Properties
}
}
$Results.dispose()
}
catch {
Write-Verbose "Error building the searcher object!"
}
$ObjectSearcher.dispose()
}
}
}
function Get-NetOU {
[CmdletBinding()]
Param (
[Parameter(ValueFromPipeline=$True)]
[String]
$OUName = '*',
[String]
$GUID,
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[Switch]
$FullData,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
begin {
$OUSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize
}
process {
if ($OUSearcher) {
if ($GUID) {
$OUSearcher.filter="(&(objectCategory=organizationalUnit)(name=$OUName)(gplink=*$GUID*))"
}
else {
$OUSearcher.filter="(&(objectCategory=organizationalUnit)(name=$OUName))"
}
try {
$Results = $OUSearcher.FindAll()
$Results | Where-Object {$_} | ForEach-Object {
if ($FullData) {
$OU = Convert-LDAPProperty -Properties $_.Properties
$OU.PSObject.TypeNames.Add('PowerView.OU')
$OU
}
else {
$_.properties.adspath
}
}
$Results.dispose()
$OUSearcher.dispose()
}
catch {
Write-Warning $_
}
}
}
}
function Get-NetSite {
[CmdletBinding()]
Param (
[Parameter(ValueFromPipeline=$True)]
[String]
$SiteName = "*",
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[String]
$GUID,
[Switch]
$FullData,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
begin {
$SiteSearcher = Get-DomainSearcher -ADSpath $ADSpath -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSprefix "CN=Sites,CN=Configuration" -PageSize $PageSize
}
process {
if($SiteSearcher) {
if ($GUID) {
$SiteSearcher.filter="(&(objectCategory=site)(name=$SiteName)(gplink=*$GUID*))"
}
else {
$SiteSearcher.filter="(&(objectCategory=site)(name=$SiteName))"
}
try {
$Results = $SiteSearcher.FindAll()
$Results | Where-Object {$_} | ForEach-Object {
if ($FullData) {
$Site = Convert-LDAPProperty -Properties $_.Properties
$Site.PSObject.TypeNames.Add('PowerView.Site')
$Site
}
else {
$_.properties.name
}
}
$Results.dispose()
$SiteSearcher.dispose()
}
catch {
Write-Verbose $_
}
}
}
}
function Get-DomainSID {
param(
[String]
$Domain,
[String]
$DomainController
)
$ComputerSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController
$ComputerSearcher.Filter = '(sAMAccountType=805306369)'
$Null = $ComputerSearcher.PropertiesToLoad.Add('objectsid')
$Result = $ComputerSearcher.FindOne()
if(-not $Result) {
Write-Verbose "Get-DomainSID: no results retrieved"
}
else {
$DCObject = Convert-LDAPProperty -Properties $Result.Properties
$DCSID = $DCObject.objectsid
$DCSID.Substring(0, $DCSID.LastIndexOf('-'))
}
}
function Get-NetFileServer {
[CmdletBinding()]
param(
[String]
$Domain,
[String]
$DomainController,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
function Split-Path {
param([String]$Path)
if ($Path -and ($Path.split("\\").Count -ge 3)) {
$Temp = $Path.split("\\")[2]
if($Temp -and ($Temp -ne '')) {
$Temp
}
}
}
$UserSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -PageSize $PageSize
$UserSearcher.filter = "(&(samAccountType=805306368)(|(homedirectory=*)(scriptpath=*)(profilepath=*)))"
$UserSearcher.PropertiesToLoad.AddRange(('homedirectory', 'scriptpath', 'profilepath'))
Sort-Object -Unique -InputObject $(ForEach($UserResult in $UserSearcher.FindAll()) {if($UserResult.Properties['homedirectory']) {Split-Path($UserResult.Properties['homedirectory'])}if($UserResult.Properties['scriptpath']) {Split-Path($UserResult.Properties['scriptpath'])}if($UserResult.Properties['profilepath']) {Split-Path($UserResult.Properties['profilepath'])}})
}
function Get-DFSshare {
[CmdletBinding()]
param(
[String]
[ValidateSet("All","V1","1","V2","2")]
$Version = "All",
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
function Parse-Pkt {
[CmdletBinding()]
param(
[byte[]]
$Pkt
)
$bin = $Pkt
$blob_version = [bitconverter]::ToUInt32($bin[0..3],0)
$blob_element_count = [bitconverter]::ToUInt32($bin[4..7],0)
$offset = 8
$object_list = @()
for($i=1; $i -le $blob_element_count; $i++){
$blob_name_size_start = $offset
$blob_name_size_end = $offset + 1
$blob_name_size = [bitconverter]::ToUInt16($bin[$blob_name_size_start..$blob_name_size_end],0)
$blob_name_start = $blob_name_size_end + 1
$blob_name_end = $blob_name_start + $blob_name_size - 1
$blob_name = [System.Text.Encoding]::Unicode.GetString($bin[$blob_name_start..$blob_name_end])
$blob_data_size_start = $blob_name_end + 1
$blob_data_size_end = $blob_data_size_start + 3
$blob_data_size = [bitconverter]::ToUInt32($bin[$blob_data_size_start..$blob_data_size_end],0)
$blob_data_start = $blob_data_size_end + 1
$blob_data_end = $blob_data_start + $blob_data_size - 1
$blob_data = $bin[$blob_data_start..$blob_data_end]
switch -wildcard ($blob_name) {
"\siteroot" { }
"\domainroot*" {
$root_or_link_guid_start = 0
$root_or_link_guid_end = 15
$root_or_link_guid = [byte[]]$blob_data[$root_or_link_guid_start..$root_or_link_guid_end]
$guid = New-Object Guid(,$root_or_link_guid)
$prefix_size_start = $root_or_link_guid_end + 1
$prefix_size_end = $prefix_size_start + 1
$prefix_size = [bitconverter]::ToUInt16($blob_data[$prefix_size_start..$prefix_size_end],0)
$prefix_start = $prefix_size_end + 1
$prefix_end = $prefix_start + $prefix_size - 1
$prefix = [System.Text.Encoding]::Unicode.GetString($blob_data[$prefix_start..$prefix_end])
$short_prefix_size_start = $prefix_end + 1
$short_prefix_size_end = $short_prefix_size_start + 1
$short_prefix_size = [bitconverter]::ToUInt16($blob_data[$short_prefix_size_start..$short_prefix_size_end],0)
$short_prefix_start = $short_prefix_size_end + 1
$short_prefix_end = $short_prefix_start + $short_prefix_size - 1
$short_prefix = [System.Text.Encoding]::Unicode.GetString($blob_data[$short_prefix_start..$short_prefix_end])
$type_start = $short_prefix_end + 1
$type_end = $type_start + 3
$type = [bitconverter]::ToUInt32($blob_data[$type_start..$type_end],0)
$state_start = $type_end + 1
$state_end = $state_start + 3
$state = [bitconverter]::ToUInt32($blob_data[$state_start..$state_end],0)
$comment_size_start = $state_end + 1
$comment_size_end = $comment_size_start + 1
$comment_size = [bitconverter]::ToUInt16($blob_data[$comment_size_start..$comment_size_end],0)
$comment_start = $comment_size_end + 1
$comment_end = $comment_start + $comment_size - 1
if ($comment_size -gt 0) {
$comment = [System.Text.Encoding]::Unicode.GetString($blob_data[$comment_start..$comment_end])
}
$prefix_timestamp_start = $comment_end + 1
$prefix_timestamp_end = $prefix_timestamp_start + 7
$prefix_timestamp = $blob_data[$prefix_timestamp_start..$prefix_timestamp_end]
$state_timestamp_start = $prefix_timestamp_end + 1
$state_timestamp_end = $state_timestamp_start + 7
$state_timestamp = $blob_data[$state_timestamp_start..$state_timestamp_end]
$comment_timestamp_start = $state_timestamp_end + 1
$comment_timestamp_end = $comment_timestamp_start + 7
$comment_timestamp = $blob_data[$comment_timestamp_start..$comment_timestamp_end]
$version_start = $comment_timestamp_end + 1
$version_end = $version_start + 3
$version = [bitconverter]::ToUInt32($blob_data[$version_start..$version_end],0)
$dfs_targetlist_blob_size_start = $version_end + 1
$dfs_targetlist_blob_size_end = $dfs_targetlist_blob_size_start + 3
$dfs_targetlist_blob_size = [bitconverter]::ToUInt32($blob_data[$dfs_targetlist_blob_size_start..$dfs_targetlist_blob_size_end],0)
$dfs_targetlist_blob_start = $dfs_targetlist_blob_size_end + 1
$dfs_targetlist_blob_end = $dfs_targetlist_blob_start + $dfs_targetlist_blob_size - 1
$dfs_targetlist_blob = $blob_data[$dfs_targetlist_blob_start..$dfs_targetlist_blob_end]
$reserved_blob_size_start = $dfs_targetlist_blob_end + 1
$reserved_blob_size_end = $reserved_blob_size_start + 3
$reserved_blob_size = [bitconverter]::ToUInt32($blob_data[$reserved_blob_size_start..$reserved_blob_size_end],0)
$reserved_blob_start = $reserved_blob_size_end + 1
$reserved_blob_end = $reserved_blob_start + $reserved_blob_size - 1
$reserved_blob = $blob_data[$reserved_blob_start..$reserved_blob_end]
$referral_ttl_start = $reserved_blob_end + 1
$referral_ttl_end = $referral_ttl_start + 3
$referral_ttl = [bitconverter]::ToUInt32($blob_data[$referral_ttl_start..$referral_ttl_end],0)
$target_count_start = 0
$target_count_end = $target_count_start + 3
$target_count = [bitconverter]::ToUInt32($dfs_targetlist_blob[$target_count_start..$target_count_end],0)
$t_offset = $target_count_end + 1
for($j=1; $j -le $target_count; $j++){
$target_entry_size_start = $t_offset
$target_entry_size_end = $target_entry_size_start + 3
$target_entry_size = [bitconverter]::ToUInt32($dfs_targetlist_blob[$target_entry_size_start..$target_entry_size_end],0)
$target_time_stamp_start = $target_entry_size_end + 1
$target_time_stamp_end = $target_time_stamp_start + 7
$target_time_stamp = $dfs_targetlist_blob[$target_time_stamp_start..$target_time_stamp_end]
$target_state_start = $target_time_stamp_end + 1
$target_state_end = $target_state_start + 3
$target_state = [bitconverter]::ToUInt32($dfs_targetlist_blob[$target_state_start..$target_state_end],0)
$target_type_start = $target_state_end + 1
$target_type_end = $target_type_start + 3
$target_type = [bitconverter]::ToUInt32($dfs_targetlist_blob[$target_type_start..$target_type_end],0)
$server_name_size_start = $target_type_end + 1
$server_name_size_end = $server_name_size_start + 1
$server_name_size = [bitconverter]::ToUInt16($dfs_targetlist_blob[$server_name_size_start..$server_name_size_end],0)
$server_name_start = $server_name_size_end + 1
$server_name_end = $server_name_start + $server_name_size - 1
$server_name = [System.Text.Encoding]::Unicode.GetString($dfs_targetlist_blob[$server_name_start..$server_name_end])
$share_name_size_start = $server_name_end + 1
$share_name_size_end = $share_name_size_start + 1
$share_name_size = [bitconverter]::ToUInt16($dfs_targetlist_blob[$share_name_size_start..$share_name_size_end],0)
$share_name_start = $share_name_size_end + 1
$share_name_end = $share_name_start + $share_name_size - 1
$share_name = [System.Text.Encoding]::Unicode.GetString($dfs_targetlist_blob[$share_name_start..$share_name_end])
$target_list += "\\$server_name\$share_name"
$t_offset = $share_name_end + 1
}
}
}
$offset = $blob_data_end + 1
$dfs_pkt_properties = @{
'Name' = $blob_name
'Prefix' = $prefix
'TargetList' = $target_list
}
$object_list += New-Object -TypeName PSObject -Property $dfs_pkt_properties
$prefix = $null
$blob_name = $null
$target_list = $null
}
$servers = @()
$object_list | ForEach-Object {
if ($_.TargetList) {
$_.TargetList | ForEach-Object {
$servers += $_.split("\")[2]
}
}
}
$servers
}
function Get-DFSshareV1 {
[CmdletBinding()]
param(
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
$DFSsearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize
if($DFSsearcher) {
$DFSshares = @()
$DFSsearcher.filter = "(&(objectClass=fTDfs))"
try {
$Results = $DFSSearcher.FindAll()
$Results | Where-Object {$_} | ForEach-Object {
$Properties = $_.Properties
$RemoteNames = $Properties.remoteservername
$Pkt = $Properties.pkt
$DFSshares += $RemoteNames | ForEach-Object {
try {
if ( $_.Contains('\') ) {
New-Object -TypeName PSObject -Property @{'Name'=$Properties.name[0];'RemoteServerName'=$_.split("\")[2]}
}
}
catch {
Write-Verbose "Error in parsing DFS share : $_"
}
}
}
$Results.dispose()
$DFSSearcher.dispose()
if($pkt -and $pkt[0]) {
Parse-Pkt $pkt[0] | ForEach-Object {
if ($_ -ne "null") {
New-Object -TypeName PSObject -Property @{'Name'=$Properties.name[0];'RemoteServerName'=$_}
}
}
}
}
catch {
Write-Warning "Get-DFSshareV1 error : $_"
}
$DFSshares | Sort-Object -Property "RemoteServerName"
}
}
function Get-DFSshareV2 {
[CmdletBinding()]
param(
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
$DFSsearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize
if($DFSsearcher) {
$DFSshares = @()
$DFSsearcher.filter = "(&(objectClass=msDFS-Linkv2))"
$DFSSearcher.PropertiesToLoad.AddRange(('msdfs-linkpathv2','msDFS-TargetListv2'))
try {
$Results = $DFSSearcher.FindAll()
$Results | Where-Object {$_} | ForEach-Object {
$Properties = $_.Properties
$target_list = $Properties.'msdfs-targetlistv2'[0]
$xml = [xml][System.Text.Encoding]::Unicode.GetString($target_list[2..($target_list.Length-1)])
$DFSshares += $xml.targets.ChildNodes | ForEach-Object {
try {
$Target = $_.InnerText
if ( $Target.Contains('\') ) {
$DFSroot = $Target.split("\")[3]
$ShareName = $Properties.'msdfs-linkpathv2'[0]
New-Object -TypeName PSObject -Property @{'Name'="$DFSroot$ShareName";'RemoteServerName'=$Target.split("\")[2]}
}
}
catch {
Write-Verbose "Error in parsing target : $_"
}
}
}
$Results.dispose()
$DFSSearcher.dispose()
}
catch {
Write-Warning "Get-DFSshareV2 error : $_"
}
$DFSshares | Sort-Object -Unique -Property "RemoteServerName"
}
}
$DFSshares = @()
if ( ($Version -eq "all") -or ($Version.endsWith("1")) ) {
$DFSshares += Get-DFSshareV1 -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize
}
if ( ($Version -eq "all") -or ($Version.endsWith("2")) ) {
$DFSshares += Get-DFSshareV2 -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize
}
$DFSshares | Sort-Object -Property ("RemoteServerName","Name") -Unique
}
function Get-GptTmpl {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$True, ValueFromPipeline=$True)]
[String]
$GptTmplPath,
[Switch]
$UsePSDrive
)
begin {
if($UsePSDrive) {
$Parts = $GptTmplPath.split('\')
$FolderPath = $Parts[0..($Parts.length-2)] -join '\'
$FilePath = $Parts[-1]
$RandDrive = ("abcdefghijklmnopqrstuvwxyz".ToCharArray() | Get-Random -Count 7) -join ''
Write-Verbose "Mounting path $GptTmplPath using a temp PSDrive at $RandDrive"
try {
$Null = New-PSDrive -Name $RandDrive -PSProvider FileSystem -Root $FolderPath -ErrorAction Stop
}
catch {
Write-Verbose "Error mounting path $GptTmplPath : $_"
return $Null
}
$TargetGptTmplPath = $RandDrive + ":\" + $FilePath
}
else {
$TargetGptTmplPath = $GptTmplPath
}
}
process {
try {
Write-Verbose "Attempting to parse GptTmpl: $TargetGptTmplPath"
$TargetGptTmplPath | Get-IniContent -ErrorAction SilentlyContinue
}
catch {
}
}
end {
if($UsePSDrive -and $RandDrive) {
Write-Verbose "Removing temp PSDrive $RandDrive"
Get-PSDrive -Name $RandDrive -ErrorAction SilentlyContinue | Remove-PSDrive -Force
}
}
}
function Get-GroupsXML {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$True, ValueFromPipeline=$True)]
[String]
$GroupsXMLPath,
[Switch]
$UsePSDrive
)
begin {
if($UsePSDrive) {
$Parts = $GroupsXMLPath.split('\')
$FolderPath = $Parts[0..($Parts.length-2)] -join '\'
$FilePath = $Parts[-1]
$RandDrive = ("abcdefghijklmnopqrstuvwxyz".ToCharArray() | Get-Random -Count 7) -join ''
Write-Verbose "Mounting path $GroupsXMLPath using a temp PSDrive at $RandDrive"
try {
$Null = New-PSDrive -Name $RandDrive -PSProvider FileSystem -Root $FolderPath -ErrorAction Stop
}
catch {
Write-Verbose "Error mounting path $GroupsXMLPath : $_"
return $Null
}
$TargetGroupsXMLPath = $RandDrive + ":\" + $FilePath
}
else {
$TargetGroupsXMLPath = $GroupsXMLPath
}
}
process {
try {
Write-Verbose "Attempting to parse Groups.xml: $TargetGroupsXMLPath"
[XML]$GroupsXMLcontent = Get-Content $TargetGroupsXMLPath -ErrorAction Stop
$GroupsXMLcontent | Select-Xml "//Groups" | Select-Object -ExpandProperty node | ForEach-Object {
$Groupname = $_.Group.Properties.groupName
$GroupSID = $_.Group.Properties.GroupSid
if(-not $LocalSid) {
if($Groupname -match 'Administrators') {
$GroupSID = 'S-1-5-32-544'
}
elseif($Groupname -match 'Remote Desktop') {
$GroupSID = 'S-1-5-32-555'
}
elseif($Groupname -match 'Guests') {
$GroupSID = 'S-1-5-32-546'
}
else {
$GroupSID = Convert-NameToSid -ObjectName $Groupname | Select-Object -ExpandProperty SID
}
}
$Members = $_.Group.Properties.members | Select-Object -ExpandProperty Member | Where-Object { $_.action -match 'ADD' } | ForEach-Object {
if($_.sid) { $_.sid }
else { $_.name }
}
if ($Members) {
if($_.Group.filters) {
$Filters = $_.Group.filters.GetEnumerator() | ForEach-Object {
New-Object -TypeName PSObject -Property @{'Type' = $_.LocalName;'Value' = $_.name}
}
}
else {
$Filters = $Null
}
if($Members -isnot [System.Array]) { $Members = @($Members) }
$GPOGroup = New-Object PSObject
$GPOGroup | Add-Member Noteproperty 'GPOPath' $TargetGroupsXMLPath
$GPOGroup | Add-Member Noteproperty 'Filters' $Filters
$GPOGroup | Add-Member Noteproperty 'GroupName' $GroupName
$GPOGroup | Add-Member Noteproperty 'GroupSID' $GroupSID
$GPOGroup | Add-Member Noteproperty 'GroupMemberOf' $Null
$GPOGroup | Add-Member Noteproperty 'GroupMembers' $Members
$GPOGroup
}
}
}
catch {
}
}
end {
if($UsePSDrive -and $RandDrive) {
Write-Verbose "Removing temp PSDrive $RandDrive"
Get-PSDrive -Name $RandDrive -ErrorAction SilentlyContinue | Remove-PSDrive -Force
}
}
}
function Get-NetGPOGroup {
[CmdletBinding()]
Param (
[String]
$GPOname = '*',
[String]
$DisplayName,
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[Switch]
$ResolveMemberSIDs,
[Switch]
$UsePSDrive,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200
)
$Option = [System.StringSplitOptions]::RemoveEmptyEntries
$GPOSearcher = Get-DomainSearcher -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $ADSpath -PageSize $PageSize
$GPOSearcher.filter="(&(objectCategory=groupPolicyContainer)(name=*)(gpcfilesyspath=*))"
$GPOSearcher.PropertiesToLoad.AddRange(('displayname', 'name', 'gpcfilesyspath'))
ForEach($GPOResult in $GPOSearcher.FindAll()) {
$GPOdisplayName = $GPOResult.Properties['displayname']
$GPOname = $GPOResult.Properties['name']
$GPOPath = $GPOResult.Properties['gpcfilesyspath']
Write-Verbose "Get-NetGPOGroup: enumerating $GPOPath"
$ParseArgs = @{
'GptTmplPath' = "$GPOPath\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf"
'UsePSDrive' = $UsePSDrive
}
$Inf = Get-GptTmpl @ParseArgs
if($Inf -and ($Inf.psbase.Keys -contains 'Group Membership')) {
$Memberships = @{}
ForEach ($Membership in $Inf.'Group Membership'.GetEnumerator()) {
$Group, $Relation = $Membership.Key.Split('__', $Option) | ForEach-Object {$_.Trim()}
$MembershipValue = $Membership.Value | Where-Object {$_} | ForEach-Object { $_.Trim('*') } | Where-Object {$_}
if($ResolveMemberSIDs) {
$GroupMembers = @()
ForEach($Member in $MembershipValue) {
if($Member -and ($Member.Trim() -ne '')) {
if($Member -notmatch '^S-1-.*') {
$MemberSID = Convert-NameToSid -Domain $Domain -ObjectName $Member | Select-Object -ExpandProperty SID
if($MemberSID) {
$GroupMembers += $MemberSID
}
else {
$GroupMembers += $Member
}
}
else {
$GroupMembers += $Member
}
}
}
$MembershipValue = $GroupMembers
}
if(-not $Memberships[$Group]) {
$Memberships[$Group] = @{}
}
if($MembershipValue -isnot [System.Array]) {$MembershipValue = @($MembershipValue)}
$Memberships[$Group].Add($Relation, $MembershipValue)
}
ForEach ($Membership in $Memberships.GetEnumerator()) {
if($Membership -and $Membership.Key -and ($Membership.Key -match '^\*')) {
$GroupSID = $Membership.Key.Trim('*')
if($GroupSID -and ($GroupSID.Trim() -ne '')) {
$GroupName = Convert-SidToName -SID $GroupSID
}
else {
$GroupName = $False
}
}
else {
$GroupName = $Membership.Key
if($GroupName -and ($GroupName.Trim() -ne '')) {
if($Groupname -match 'Administrators') {
$GroupSID = 'S-1-5-32-544'
}
elseif($Groupname -match 'Remote Desktop') {
$GroupSID = 'S-1-5-32-555'
}
elseif($Groupname -match 'Guests') {
$GroupSID = 'S-1-5-32-546'
}
elseif($GroupName.Trim() -ne '') {
$GroupSID = Convert-NameToSid -Domain $Domain -ObjectName $Groupname | Select-Object -ExpandProperty SID
}
else {
$GroupSID = $Null
}
}
}
$GPOGroup = New-Object PSObject
$GPOGroup | Add-Member Noteproperty 'GPODisplayName' $GPODisplayName
$GPOGroup | Add-Member Noteproperty 'GPOName' $GPOName
$GPOGroup | Add-Member Noteproperty 'GPOPath' $GPOPath
$GPOGroup | Add-Member Noteproperty 'GPOType' 'RestrictedGroups'
$GPOGroup | Add-Member Noteproperty 'Filters' $Null
$GPOGroup | Add-Member Noteproperty 'GroupName' $GroupName
$GPOGroup | Add-Member Noteproperty 'GroupSID' $GroupSID
$GPOGroup | Add-Member Noteproperty 'GroupMemberOf' $Membership.Value.Memberof
$GPOGroup | Add-Member Noteproperty 'GroupMembers' $Membership.Value.Members
$GPOGroup
}
}
$ParseArgs = @{
'GroupsXMLpath' = "$GPOPath\MACHINE\Preferences\Groups\Groups.xml"
'UsePSDrive' = $UsePSDrive
}
Get-GroupsXML @ParseArgs | ForEach-Object {
if($ResolveMemberSIDs) {
$GroupMembers = @()
ForEach($Member in $_.GroupMembers) {
if($Member -and ($Member.Trim() -ne '')) {
if($Member -notmatch '^S-1-.*') {
$MemberSID = Convert-NameToSid -Domain $Domain -ObjectName $Member | Select-Object -ExpandProperty SID
if($MemberSID) {
$GroupMembers += $MemberSID
}
else {
$GroupMembers += $Member
}
}
else {
$GroupMembers += $Member
}
}
}
$_.GroupMembers = $GroupMembers
}
$_ | Add-Member Noteproperty 'GPODisplayName' $GPODisplayName
$_ | Add-Member Noteproperty 'GPOName' $GPOName
$_ | Add-Member Noteproperty 'GPOType' 'GroupPolicyPreferences'
$_
}
}
}
function Find-GPOLocation {
[CmdletBinding()]
Param (
[String]
$Domain,
[String]
$DomainController,
[String]
$LocalGroup = 'Administrators',
[Switch]
$UsePSDrive,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200
)
$TargetSIDs = @('*')
if($LocalGroup -like "*Admin*") {
$TargetLocalSID = 'S-1-5-32-544'
}
elseif ( ($LocalGroup -like "*RDP*") -or ($LocalGroup -like "*Remote*") ) {
$TargetLocalSID = 'S-1-5-32-555'
}
elseif ($LocalGroup -like "S-1-5-*") {
$TargetLocalSID = $LocalGroup
}
else {
throw "LocalGroup must be 'Administrators', 'RDP', or a 'S-1-5-X' SID format."
}
if(-not $TargetSIDs) {
throw "No effective target SIDs!"
}
Write-Verbose "TargetLocalSID: $TargetLocalSID"
Write-Verbose "Effective target SIDs: $TargetSIDs"
$GPOGroupArgs = @{
'Domain' = $Domain
'DomainController' = $DomainController
'UsePSDrive' = $UsePSDrive
'ResolveMemberSIDs' = $True
'PageSize' = $PageSize
}
Sort-Object -Property GPOName -Unique -InputObject $(ForEach($GPOGroup in (Get-NetGPOGroup @GPOGroupArgs)) {
if($GPOgroup.GroupSID -match $TargetLocalSID) {
ForEach($GPOgroupMember in $GPOgroup.GroupMembers) {
if($GPOgroupMember) {
if ( ($TargetSIDs[0] -eq '*') -or ($TargetSIDs -Contains $GPOgroupMember) ) {
$GPOgroup
}
}
}
}
if( ($GPOgroup.GroupMemberOf -contains $TargetLocalSID) ) {
if( ($TargetSIDs[0] -eq '*') -or ($TargetSIDs -Contains $GPOgroup.GroupSID) ) {
$GPOgroup
}
}
}) | ForEach-Object {
$GPOname = $_.GPODisplayName
write-verbose "GPOname: $GPOname"
$GPOguid = $_.GPOName
$GPOPath = $_.GPOPath
$GPOType = $_.GPOType
if($_.GroupMembers) {
$GPOMembers = $_.GroupMembers
}
else {
$GPOMembers = $_.GroupSID
}
$Filters = $_.Filters
if(-not $TargetObject) {
$TargetObjectSIDs = $GPOMembers
}
else {
$TargetObjectSIDs = $TargetObject
}
Get-NetOU -Domain $Domain -DomainController $DomainController -GUID $GPOguid -FullData -PageSize $PageSize | ForEach-Object {
if($Filters) {
$FilterValue = $Filters.Value
$OUComputers = ForEach($OUComputer in (Get-NetComputer -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $_.ADSpath -PageSize $PageSize)) {
if($OUComputer.ToLower() -match $Filters.Value) {
$OUComputer
}
}
}
else {
$OUComputers = Get-NetComputer -Domain $Domain -DomainController $DomainController -Credential $Credential -ADSpath $_.ADSpath -PageSize $PageSize
}
if($OUComputers) {
if($OUComputers -isnot [System.Array]) {$OUComputers = @($OUComputers)}
ForEach ($TargetSid in $TargetObjectSIDs) {
$Object = Get-ADObject -SID $TargetSid
if (-not $Object) {
$Object = Get-ADObject -SID $TargetSid -Domain $Domain -DomainController $DomainController -Credential $Credential -PageSize $PageSize
}
if($Object) {
$MemberDN = $Object.distinguishedName
$ObjectDomain = $MemberDN.subString($MemberDN.IndexOf("DC=")) -replace 'DC=','' -replace ',','.'
$IsGroup = @('268435456','268435457','536870912','536870913') -contains $Object.samaccounttype
$GPOLocation = New-Object PSObject
$GPOLocation | Add-Member Noteproperty 'ObjectDomain' $ObjectDomain
$GPOLocation | Add-Member Noteproperty 'ObjectName' $Object.samaccountname
$GPOLocation | Add-Member Noteproperty 'ObjectDN' $Object.distinguishedname
$GPOLocation | Add-Member Noteproperty 'ObjectSID' $Object.objectsid
$GPOLocation | Add-Member Noteproperty 'IsGroup' $IsGroup
$GPOLocation | Add-Member Noteproperty 'GPODomain' $Domain
$GPOLocation | Add-Member Noteproperty 'GPODisplayName' $GPOname
$GPOLocation | Add-Member Noteproperty 'GPOGuid' $GPOGuid
$GPOLocation | Add-Member Noteproperty 'GPOPath' $GPOPath
$GPOLocation | Add-Member Noteproperty 'GPOType' $GPOType
$GPOLocation | Add-Member Noteproperty 'ContainerName' $_.distinguishedname
$GPOLocation | Add-Member Noteproperty 'ComputerName' $OUComputers
$GPOLocation.PSObject.TypeNames.Add('PowerView.GPOLocalGroup')
$GPOLocation
}
}
}
}
Get-NetSite -Domain $Domain -DomainController $DomainController -GUID $GPOguid -PageSize $PageSize -FullData | ForEach-Object {
ForEach ($TargetSid in $TargetObjectSIDs) {
$Object = Get-ADObject -SID $TargetSid
if (-not $Object) {
$Object = Get-ADObject -SID $TargetSid -Domain $Domain -DomainController $DomainController -Credential $Credential -PageSize $PageSize
}
if($Object) {
$MemberDN = $Object.distinguishedName
$ObjectDomain = $MemberDN.subString($MemberDN.IndexOf("DC=")) -replace 'DC=','' -replace ',','.'
$IsGroup = @('268435456','268435457','536870912','536870913') -contains $Object.samaccounttype
$AppliedSite = New-Object PSObject
$GPOLocation | Add-Member Noteproperty 'ObjectDomain' $ObjectDomain
$AppliedSite | Add-Member Noteproperty 'ObjectName' $Object.samaccountname
$AppliedSite | Add-Member Noteproperty 'ObjectDN' $Object.distinguishedname
$AppliedSite | Add-Member Noteproperty 'ObjectSID' $Object.objectsid
$AppliedSite | Add-Member Noteproperty 'IsGroup' $IsGroup
$AppliedSite | Add-Member Noteproperty 'GPODomain' $Domain
$AppliedSite | Add-Member Noteproperty 'GPODisplayName' $GPOname
$AppliedSite | Add-Member Noteproperty 'GPOGuid' $GPOGuid
$AppliedSite | Add-Member Noteproperty 'GPOPath' $GPOPath
$AppliedSite | Add-Member Noteproperty 'GPOType' $GPOType
$AppliedSite | Add-Member Noteproperty 'ContainerName' $_.distinguishedname
$AppliedSite | Add-Member Noteproperty 'ComputerName' $_.siteobjectbl
$AppliedSite.PSObject.TypeNames.Add('PowerView.GPOLocalGroup')
$AppliedSite
}
}
}
}
}
function Get-NetLocalGroup {
[CmdletBinding(DefaultParameterSetName = 'WinNT')]
param(
[Parameter(ParameterSetName = 'API', Position=0, ValueFromPipeline=$True)]
[Parameter(ParameterSetName = 'WinNT', Position=0, ValueFromPipeline=$True)]
[Alias('HostName')]
[String[]]
$ComputerName = $Env:ComputerName,
[Parameter(ParameterSetName = 'WinNT')]
[Parameter(ParameterSetName = 'API')]
[ValidateScript({Test-Path -Path $_ })]
[Alias('HostList')]
[String]
$ComputerFile,
[Parameter(ParameterSetName = 'WinNT')]
[Parameter(ParameterSetName = 'API')]
[String]
$GroupName = 'Administrators',
[Parameter(ParameterSetName = 'API')]
[Switch]
$API,
[Switch]
$IsDomain,
[ValidateNotNullOrEmpty()]
[String]
$DomainSID
)
process {
$Servers = @()
if($ComputerFile) {
$Servers = Get-Content -Path $ComputerFile
}
else {
$Servers += $ComputerName | Get-NameField
}
ForEach($Server in $Servers) {
if($API) {
$QueryLevel = 2
$PtrInfo = [IntPtr]::Zero
$EntriesRead = 0
$TotalRead = 0
$ResumeHandle = 0
$Result = $Netapi32::NetLocalGroupGetMembers($Server, $GroupName, $QueryLevel, [ref]$PtrInfo, -1, [ref]$EntriesRead, [ref]$TotalRead, [ref]$ResumeHandle)
$Offset = $PtrInfo.ToInt64()
$LocalUsers = @()
if (($Result -eq 0) -and ($Offset -gt 0)) {
$Increment = $LOCALGROUP_MEMBERS_INFO_2::GetSize()
for ($i = 0; ($i -lt $EntriesRead); $i++) {
$NewIntPtr = New-Object System.Intptr -ArgumentList $Offset
$Info = $NewIntPtr -as $LOCALGROUP_MEMBERS_INFO_2
$Offset = $NewIntPtr.ToInt64()
$Offset += $Increment
$SidString = ''
$Result2 = $Advapi32::ConvertSidToStringSid($Info.lgrmi2_sid, [ref]$SidString);$LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if($Result2 -eq 0) {
}
else {
$IsGroup = $($Info.lgrmi2_sidusage -ne 'SidTypeUser')
$LocalUsers += @{
'ComputerName' = $Server
'AccountName' = $Info.lgrmi2_domainandname
'SID' = $SidString
'IsGroup' = $IsGroup
'Type' = 'LocalUser'
}
}
}
$Null = $Netapi32::NetApiBufferFree($PtrInfo)
$MachineSid = ($LocalUsers | Where-Object {$_['SID'] -like '*-500'})['SID']
$MachineSid = $MachineSid.Substring(0, $MachineSid.LastIndexOf('-'))
try {
ForEach($LocalUser in $LocalUsers) {
if($DomainSID -and ($LocalUser['SID'] -match $DomainSID)) {
$LocalUser['IsDomain'] = $True
}
elseif($LocalUser['SID'] -match $MachineSid) {
$LocalUser['IsDomain'] = $False
}
else {
$LocalUser['IsDomain'] = $True
}
if($IsDomain) {
if($LocalUser['IsDomain']) {
$LocalUser
}
}
else {
$LocalUser
}
}
}
catch { }
}
else {
}
}
else {
try {
$LocalUsers = @()
$Members = @($([ADSI]"WinNT://$Server/$GroupName,group").psbase.Invoke('Members'))
$Members | ForEach-Object {
$LocalUser = ([ADSI]$_)
$AdsPath = $LocalUser.InvokeGet('AdsPath').Replace('WinNT://', '')
if(([regex]::Matches($AdsPath, '/')).count -eq 1) {
$MemberIsDomain = $True
$Name = $AdsPath.Replace('/', '\')
}
else {
$MemberIsDomain = $False
$Name = $AdsPath.Substring($AdsPath.IndexOf('/')+1).Replace('/', '\')
}
$IsGroup = ($LocalUser.SchemaClassName -like 'group')
if($IsDomain) {
if($MemberIsDomain) {
$LocalUsers += @{
'ComputerName' = $Server
'AccountName' = $Name
'SID' = ((New-Object System.Security.Principal.SecurityIdentifier($LocalUser.InvokeGet('ObjectSID'),0)).Value)
'IsGroup' = $IsGroup
'IsDomain' = $MemberIsDomain
'Type' = 'LocalUser'
}
}
}
else {
$LocalUsers += @{
'ComputerName' = $Server
'AccountName' = $Name
'SID' = ((New-Object System.Security.Principal.SecurityIdentifier($LocalUser.InvokeGet('ObjectSID'),0)).Value)
'IsGroup' = $IsGroup
'IsDomain' = $MemberIsDomain
'Type' = 'LocalUser'
}
}
}
$LocalUsers
}
catch {
Write-Verbose "Get-NetLocalGroup error for $Server : $_"
}
}
}
}
}
filter Get-NetLoggedon {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$True)]
[Alias('HostName')]
[Object[]]
[ValidateNotNullOrEmpty()]
$ComputerName = 'localhost'
)
$Computer = $ComputerName | Get-NameField
$QueryLevel = 1
$PtrInfo = [IntPtr]::Zero
$EntriesRead = 0
$TotalRead = 0
$ResumeHandle = 0
$Result = $Netapi32::NetWkstaUserEnum($Computer, $QueryLevel, [ref]$PtrInfo, -1, [ref]$EntriesRead, [ref]$TotalRead, [ref]$ResumeHandle)
$Offset = $PtrInfo.ToInt64()
if (($Result -eq 0) -and ($Offset -gt 0)) {
$Increment = $WKSTA_USER_INFO_1::GetSize()
for ($i = 0; ($i -lt $EntriesRead); $i++) {
$NewIntPtr = New-Object System.Intptr -ArgumentList $Offset
$Info = $NewIntPtr -as $WKSTA_USER_INFO_1
$LoggedOn = $Info | Select-Object *
$LoggedOn | Add-Member Noteproperty 'ComputerName' $Computer
$Offset = $NewIntPtr.ToInt64()
$Offset += $Increment
$LoggedOn
}
$Null = $Netapi32::NetApiBufferFree($PtrInfo)
}
else {
Write-Verbose "Error: $(([ComponentModel.Win32Exception] $Result).Message)"
}
}
filter Get-NetSession {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$True)]
[Alias('HostName')]
[Object[]]
[ValidateNotNullOrEmpty()]
$ComputerName = 'localhost',
[String]
$UserName = ''
)
$Computer = $ComputerName | Get-NameField
$QueryLevel = 10
$PtrInfo = [IntPtr]::Zero
$EntriesRead = 0
$TotalRead = 0
$ResumeHandle = 0
$Result = $Netapi32::NetSessionEnum($Computer, '', $UserName, $QueryLevel, [ref]$PtrInfo, -1, [ref]$EntriesRead, [ref]$TotalRead, [ref]$ResumeHandle)
$Offset = $PtrInfo.ToInt64()
if (($Result -eq 0) -and ($Offset -gt 0)) {
$Increment = $SESSION_INFO_10::GetSize()
for ($i = 0; ($i -lt $EntriesRead); $i++) {
$NewIntPtr = New-Object System.Intptr -ArgumentList $Offset
$Info = $NewIntPtr -as $SESSION_INFO_10
$Sessions = $Info | Select-Object *
$Sessions | Add-Member Noteproperty 'ComputerName' $Computer
$Offset = $NewIntPtr.ToInt64()
$Offset += $Increment
$Sessions
}
$Null = $Netapi32::NetApiBufferFree($PtrInfo)
}
else {
Write-Verbose "Error: $(([ComponentModel.Win32Exception] $Result).Message)"
}
}
filter Get-LoggedOnLocal {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$True)]
[Alias('HostName')]
[Object[]]
[ValidateNotNullOrEmpty()]
$ComputerName = 'localhost'
)
$ComputerName = Get-NameField -Object $ComputerName
try {
$Reg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('Users', "$ComputerName")
$Reg.GetSubKeyNames() | Where-Object { $_ -match 'S-1-5-21-[0-9]+-[0-9]+-[0-9]+-[0-9]+$' } | ForEach-Object {
$UserName = Convert-SidToName $_
$Parts = $UserName.Split('\')
$UserDomain = $Null
$UserName = $Parts[-1]
if ($Parts.Length -eq 2) {
$UserDomain = $Parts[0]
}
$LocalLoggedOnUser = New-Object PSObject
$LocalLoggedOnUser | Add-Member Noteproperty 'ComputerName' "$ComputerName"
$LocalLoggedOnUser | Add-Member Noteproperty 'UserDomain' $UserDomain
$LocalLoggedOnUser | Add-Member Noteproperty 'UserName' $UserName
$LocalLoggedOnUser | Add-Member Noteproperty 'UserSID' $_
$LocalLoggedOnUser
}
}
catch { }
}
function Get-NetDomainTrust {
[CmdletBinding()]
param(
[Parameter(Position=0, ValueFromPipeline=$True)]
[String]
$Domain,
[String]
$DomainController,
[String]
$ADSpath,
[Switch]
$API,
[Switch]
$LDAP,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
begin {
$TrustAttributes = @{
[uint32]'0x00000001' = 'non_transitive'
[uint32]'0x00000002' = 'uplevel_only'
[uint32]'0x00000004' = 'quarantined_domain'
[uint32]'0x00000008' = 'forest_transitive'
[uint32]'0x00000010' = 'cross_organization'
[uint32]'0x00000020' = 'within_forest'
[uint32]'0x00000040' = 'treat_as_external'
[uint32]'0x00000080' = 'trust_uses_rc4_encryption'
[uint32]'0x00000100' = 'trust_uses_aes_keys'
[uint32]'0x00000200' = 'cross_organization_no_tgt_delegation'
[uint32]'0x00000400' = 'pim_trust'
}
}
process {
if(-not $Domain) {
$SourceDomain = (Get-NetDomain -Credential $Credential).Name
}
else {
$SourceDomain = $Domain
}
if($LDAP -or $ADSPath) {
$TrustSearcher = Get-DomainSearcher -Domain $SourceDomain -DomainController $DomainController -Credential $Credential -PageSize $PageSize -ADSpath $ADSpath
$SourceSID = Get-DomainSID -Domain $SourceDomain -DomainController $DomainController
if($TrustSearcher) {
$TrustSearcher.Filter = '(objectClass=trustedDomain)'
$Results = $TrustSearcher.FindAll()
$Results | Where-Object {$_} | ForEach-Object {
$Props = $_.Properties
$DomainTrust = New-Object PSObject
$TrustAttrib = @()
$TrustAttrib += $TrustAttributes.Keys | Where-Object { $Props.trustattributes[0] -band $_ } | ForEach-Object { $TrustAttributes[$_] }
$Direction = Switch ($Props.trustdirection) {
0 { 'Disabled' }
1 { 'Inbound' }
2 { 'Outbound' }
3 { 'Bidirectional' }
}
$ObjectGuid = New-Object Guid @(,$Props.objectguid[0])
$TargetSID = (New-Object System.Security.Principal.SecurityIdentifier($Props.securityidentifier[0],0)).Value
$DomainTrust | Add-Member Noteproperty 'SourceName' $SourceDomain
$DomainTrust | Add-Member Noteproperty 'SourceSID' $SourceSID
$DomainTrust | Add-Member Noteproperty 'TargetName' $Props.name[0]
$DomainTrust | Add-Member Noteproperty 'TargetSID' $TargetSID
$DomainTrust | Add-Member Noteproperty 'ObjectGuid' "{$ObjectGuid}"
$DomainTrust | Add-Member Noteproperty 'TrustType' $($TrustAttrib -join ',')
$DomainTrust | Add-Member Noteproperty 'TrustDirection' "$Direction"
$DomainTrust.PSObject.TypeNames.Add('PowerView.DomainTrustLDAP')
$DomainTrust
}
$Results.dispose()
$TrustSearcher.dispose()
}
}
elseif($API) {
if(-not $DomainController) {
$DomainController = Get-NetDomainController -Credential $Credential -Domain $SourceDomain | Select-Object -First 1 | Select-Object -ExpandProperty Name
}
if($DomainController) {
$PtrInfo = [IntPtr]::Zero
$Flags = 63
$DomainCount = 0
$Result = $Netapi32::DsEnumerateDomainTrusts($DomainController, $Flags, [ref]$PtrInfo, [ref]$DomainCount)
$Offset = $PtrInfo.ToInt64()
if (($Result -eq 0) -and ($Offset -gt 0)) {
$Increment = $DS_DOMAIN_TRUSTS::GetSize()
for ($i = 0; ($i -lt $DomainCount); $i++) {
$NewIntPtr = New-Object System.Intptr -ArgumentList $Offset
$Info = $NewIntPtr -as $DS_DOMAIN_TRUSTS
$Offset = $NewIntPtr.ToInt64()
$Offset += $Increment
$SidString = ""
$Result = $Advapi32::ConvertSidToStringSid($Info.DomainSid, [ref]$SidString);$LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if($Result -eq 0) {
Write-Verbose "Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
else {
$DomainTrust = New-Object PSObject
$DomainTrust | Add-Member Noteproperty 'SourceDomain' $SourceDomain
$DomainTrust | Add-Member Noteproperty 'SourceDomainController' $DomainController
$DomainTrust | Add-Member Noteproperty 'NetbiosDomainName' $Info.NetbiosDomainName
$DomainTrust | Add-Member Noteproperty 'DnsDomainName' $Info.DnsDomainName
$DomainTrust | Add-Member Noteproperty 'Flags' $Info.Flags
$DomainTrust | Add-Member Noteproperty 'ParentIndex' $Info.ParentIndex
$DomainTrust | Add-Member Noteproperty 'TrustType' $Info.TrustType
$DomainTrust | Add-Member Noteproperty 'TrustAttributes' $Info.TrustAttributes
$DomainTrust | Add-Member Noteproperty 'DomainSid' $SidString
$DomainTrust | Add-Member Noteproperty 'DomainGuid' $Info.DomainGuid
$DomainTrust.PSObject.TypeNames.Add('PowerView.APIDomainTrust')
$DomainTrust
}
}
$Null = $Netapi32::NetApiBufferFree($PtrInfo)
}
else {
Write-Verbose "Error: $(([ComponentModel.Win32Exception] $Result).Message)"
}
}
else {
Write-Verbose "Could not retrieve domain controller for $Domain"
}
}
else {
$FoundDomain = Get-NetDomain -Domain $Domain -Credential $Credential
if($FoundDomain) {
$FoundDomain.GetAllTrustRelationships() | ForEach-Object {
$_.PSObject.TypeNames.Add('PowerView.DomainTrust')
$_
}
}
}
}
}
function Get-NetForestTrust {
[CmdletBinding()]
param(
[Parameter(Position=0,ValueFromPipeline=$True)]
[String]
$Forest,
[Management.Automation.PSCredential]
$Credential
)
process {
$FoundForest = Get-NetForest -Forest $Forest -Credential $Credential
if($FoundForest) {
$FoundForest.GetAllTrustRelationships() | ForEach-Object {
$_.PSObject.TypeNames.Add('PowerView.ForestTrust')
$_
}
}
}
}
function Invoke-MapDomainTrust {
[CmdletBinding()]
param(
[Switch]
$LDAP,
[String]
$DomainController,
[ValidateRange(1,10000)]
[Int]
$PageSize = 200,
[Management.Automation.PSCredential]
$Credential
)
$SeenDomains = @{}
$Domains = New-Object System.Collections.Stack
$CurrentDomain = (Get-NetDomain -Credential $Credential).Name
$Domains.push($CurrentDomain)
while($Domains.Count -ne 0) {
$Domain = $Domains.Pop()
if ($Domain -and ($Domain.Trim() -ne "") -and (-not $SeenDomains.ContainsKey($Domain))) {
Write-Verbose "Enumerating trusts for domain '$Domain'"
$Null = $SeenDomains.add($Domain, "")
try {
if($LDAP -or $DomainController) {
$Trusts = Get-NetDomainTrust -Domain $Domain -LDAP -DomainController $DomainController -PageSize $PageSize -Credential $Credential
}
else {
$Trusts = Get-NetDomainTrust -Domain $Domain -PageSize $PageSize -Credential $Credential
}
if($Trusts -isnot [System.Array]) {
$Trusts = @($Trusts)
}
if(-not ($LDAP -or $DomainController) ) {
$Trusts += Get-NetForestTrust -Forest $Domain -Credential $Credential
}
if ($Trusts) {
if($Trusts -isnot [System.Array]) {
$Trusts = @($Trusts)
}
ForEach ($Trust in $Trusts) {
if($Trust.SourceName -and $Trust.TargetName) {
$SourceDomain = $Trust.SourceName
$TargetDomain = $Trust.TargetName
$TrustType = $Trust.TrustType
$TrustDirection = $Trust.TrustDirection
$ObjectType = $Trust.PSObject.TypeNames | Where-Object {$_ -match 'PowerView'} | Select-Object -First 1
$Null = $Domains.Push($TargetDomain)
$DomainTrust = New-Object PSObject
$DomainTrust | Add-Member Noteproperty 'SourceDomain' "$SourceDomain"
$DomainTrust | Add-Member Noteproperty 'SourceSID' $Trust.SourceSID
$DomainTrust | Add-Member Noteproperty 'TargetDomain' "$TargetDomain"
$DomainTrust | Add-Member Noteproperty 'TargetSID' $Trust.TargetSID
$DomainTrust | Add-Member Noteproperty 'TrustType' "$TrustType"
$DomainTrust | Add-Member Noteproperty 'TrustDirection' "$TrustDirection"
$DomainTrust.PSObject.TypeNames.Add($ObjectType)
$DomainTrust
}
}
}
}
catch {
Write-Verbose "[!] Error: $_"
}
}
}
}
function New-ThreadedFunction {
[CmdletBinding()]
Param(
[Parameter(Position = 0, Mandatory = $True, ValueFromPipeline = $True, ValueFromPipelineByPropertyName = $True)]
[String[]]
$ComputerName,
[Parameter(Position = 1, Mandatory = $True)]
[System.Management.Automation.ScriptBlock]
$ScriptBlock,
[Parameter(Position = 2)]
[Hashtable]
$ScriptParameters,
[Int]
[ValidateRange(1, 100)]
$Threads = 20,
[Switch]
$NoImports
)
BEGIN {
$SessionState = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault()
$SessionState.ApartmentState = [System.Threading.Thread]::CurrentThread.GetApartmentState()
if (-not $NoImports) {
$MyVars = Get-Variable -Scope 2
$VorbiddenVars = @('?','args','ConsoleFileName','Error','ExecutionContext','false','HOME','Host','input','InputObject','MaximumAliasCount','MaximumDriveCount','MaximumErrorCount','MaximumFunctionCount','MaximumHistoryCount','MaximumVariableCount','MyInvocation','null','PID','PSBoundParameters','PSCommandPath','PSCulture','PSDefaultParameterValues','PSHOME','PSScriptRoot','PSUICulture','PSVersionTable','PWD','ShellId','SynchronizedHash','true')
ForEach ($Var in $MyVars) {
if ($VorbiddenVars -NotContains $Var.Name) {
$SessionState.Variables.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateVariableEntry -ArgumentList $Var.name,$Var.Value,$Var.description,$Var.options,$Var.attributes))
}
}
ForEach ($Function in (Get-ChildItem Function:)) {
$SessionState.Commands.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateFunctionEntry -ArgumentList $Function.Name, $Function.Definition))
}
}
$Pool = [RunspaceFactory]::CreateRunspacePool(1, $Threads, $SessionState, $Host)
$Pool.Open()
$Method = $Null
ForEach ($M in [PowerShell].GetMethods() | Where-Object { $_.Name -eq 'BeginInvoke' }) {
$MethodParameters = $M.GetParameters()
if (($MethodParameters.Count -eq 2) -and $MethodParameters[0].Name -eq 'input' -and $MethodParameters[1].Name -eq 'output') {
$Method = $M.MakeGenericMethod([Object], [Object])
break
}
}
$Jobs = @()
$ComputerName = $ComputerName | Where-Object { $_ -and ($_ -ne '') }
Write-Verbose "[New-ThreadedFunction] Total number of hosts: $($ComputerName.count)"
if ($Threads -ge $ComputerName.Length) {
$Threads = $ComputerName.Length
}
$ElementSplitSize = [Int]($ComputerName.Length/$Threads)
$ComputerNamePartitioned = @()
$Start = 0
$End = $ElementSplitSize
for($i = 1; $i -le $Threads; $i++) {
$List = New-Object System.Collections.ArrayList
if ($i -eq $Threads) {
$End = $ComputerName.Length
}
$List.AddRange($ComputerName[$Start..($End-1)])
$Start += $ElementSplitSize
$End += $ElementSplitSize
$ComputerNamePartitioned += @(,@($List.ToArray()))
}
Write-Verbose "[New-ThreadedFunction] Total number of threads/partitions: $Threads"
ForEach ($ComputerNamePartition in $ComputerNamePartitioned) {
$PowerShell = [PowerShell]::Create()
$PowerShell.runspacepool = $Pool
$Null = $PowerShell.AddScript($ScriptBlock).AddParameter('ComputerName', $ComputerNamePartition)
if ($ScriptParameters) {
ForEach ($Param in $ScriptParameters.GetEnumerator()) {
$Null = $PowerShell.AddParameter($Param.Name, $Param.Value)
}
}
$Output = New-Object Management.Automation.PSDataCollection[Object]
$Jobs += @{
PS = $PowerShell
Output = $Output
Result = $Method.Invoke($PowerShell, @($Null, [Management.Automation.PSDataCollection[Object]]$Output))
}
}
}
END {
Write-Verbose "[New-ThreadedFunction] Threads executing"
Do {
ForEach ($Job in $Jobs) {
$Job.Output.ReadAll()
}
Start-Sleep -Seconds 1
}
While (($Jobs | Where-Object { -not $_.Result.IsCompleted }).Count -gt 0)
Write-Verbose "[New-ThreadedFunction] Waiting 120 seconds for final cleanup..."
Start-Sleep -Seconds 120
ForEach ($Job in $Jobs) {
$Job.Output.ReadAll()
$Job.PS.Dispose()
}
$Pool.Dispose()
Write-Verbose "[New-ThreadedFunction] all threads completed"
}
}
function Get-GlobalCatalogUserMapping {
[CmdletBinding()]
param(
[ValidatePattern('^GC://')]
[String]
$GlobalCatalog
)
if(-not $PSBoundParameters['GlobalCatalog']) {
$GCPath = ([ADSI]'LDAP://RootDSE').dnshostname
$ADSPath = "GC://$GCPath"
Write-Verbose "Enumerated global catalog location: $ADSPath"
}
else {
$ADSpath = $GlobalCatalog
}
$UserDomainMappings = @{}
$UserSearcher = Get-DomainSearcher -ADSpath $ADSpath
$UserSearcher.filter = '(samAccountType=805306368)'
$UserSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname', 'cn', 'objectsid'))
ForEach($User in $UserSearcher.FindAll()) {
$UserName = $User.Properties['samaccountname'][0].ToUpper()
$UserDN = $User.Properties['distinguishedname'][0]
if($UserDN -and ($UserDN -ne '')) {
if (($UserDN -match 'ForeignSecurityPrincipals') -and ($UserDN -match 'S-1-5-21')) {
try {
if(-not $MemberSID) {
$MemberSID = $User.Properties['cn'][0]
}
$UserSid = (New-Object System.Security.Principal.SecurityIdentifier($User.Properties['objectsid'][0],0)).Value
$MemberSimpleName = Convert-SidToName -SID $UserSid | Convert-ADName -InputType 'NT4' -OutputType 'Canonical'
if($MemberSimpleName) {
$UserDomain = $MemberSimpleName.Split('/')[0]
}
else {
Write-Verbose "Error converting $UserDN"
$UserDomain = $Null
}
}
catch {
Write-Verbose "Error converting $UserDN"
$UserDomain = $Null
}
}
else {
$UserDomain = ($UserDN.subString($UserDN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.').ToUpper()
}
if($UserDomain) {
if(-not $UserDomainMappings[$UserName]) {
$UserDomainMappings[$UserName] = @($UserDomain)
}
elseif($UserDomainMappings[$UserName] -notcontains $UserDomain) {
$UserDomainMappings[$UserName] += $UserDomain
}
}
}
}
$UserSearcher.dispose()
$UserDomainMappings
}
function Invoke-BloodHound {
[CmdletBinding(DefaultParameterSetName = 'CSVExport')]
param(
[Parameter(ValueFromPipeline=$True)]
[Alias('HostName')]
[String[]]
[ValidateNotNullOrEmpty()]
$ComputerName,
[String]
$ComputerADSpath,
[String]
$UserADSpath,
[String]
$Domain,
[String]
$DomainController,
[String]
[ValidateSet('Group', 'Containers', 'ACLs', 'ComputerOnly', 'LocalGroup', 'GPOLocalGroup', 'Session', 'LoggedOn', 'Stealth', 'Trusts', 'Default')]
$CollectionMethod = 'Default',
[Switch]
$SearchForest,
[Parameter(ParameterSetName = 'CSVExport')]
[ValidateScript({ Test-Path -Path $_ })]
[String]
$CSVFolder = $(Get-Location),
[Parameter(ParameterSetName = 'CSVExport')]
[ValidateNotNullOrEmpty()]
[String]
$CSVPrefix,
[Parameter(ParameterSetName = 'RESTAPI', Mandatory = $True)]
[URI]
$URI,
[Parameter(ParameterSetName = 'RESTAPI', Mandatory = $True)]
[String]
[ValidatePattern('.*:.*')]
$UserPass,
[ValidatePattern('^GC://')]
[String]
$GlobalCatalog,
[Switch]
$SkipGCDeconfliction,
[ValidateRange(1,50)]
[Int]
$Threads = 20,
[ValidateRange(1,5000)]
[Int]
$Throttle = 1000
)
BEGIN {
Switch ($CollectionMethod) {
'Group' { $UseGroup = $True; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True }
'Containers' { $UseContainers = $True; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True }
'ACLs' { $UseGroup = $False; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True; $UseACLs = $True }
'ComputerOnly' { $UseGroup = $False; $UseLocalGroup = $True; $UseSession = $True; $UseLoggedOn = $True; $SkipGCDeconfliction2 = $False }
'LocalGroup' { $UseLocalGroup = $True; $SkipGCDeconfliction2 = $True }
'GPOLocalGroup' { $UseGPOGroup = $True; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True }
'Session' { $UseSession = $True; $SkipGCDeconfliction2 = $False }
'LoggedOn' { $UseLoggedOn = $True; $SkipGCDeconfliction2 = $True }
'Trusts' { $UseDomainTrusts = $True; $SkipComputerEnumeration = $True; $SkipGCDeconfliction2 = $True }
'Stealth' {
$UseGroup = $True
$UseContainers = $True
$UseGPOGroup = $True
$UseSession = $True
$UseDomainTrusts = $True
$SkipGCDeconfliction2 = $False
}
'Default' {
$UseGroup = $True
$UseContainers = $True
$UseLocalGroup = $True
$UseSession = $True
$UseLoggedOn = $False
$UseDomainTrusts = $True
$SkipGCDeconfliction2 = $False
}
}
if($SkipGCDeconfliction) {
$SkipGCDeconfliction2 = $True
}
$GCPath = ([ADSI]'LDAP://RootDSE').dnshostname
$GCADSPath = "GC://$GCPath"
$ACLGeneralRightsRegex = [regex] 'GenericAll|GenericWrite|WriteOwner|WriteDacl'
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
try {
$OutputFolder = $CSVFolder | Resolve-Path -ErrorAction Stop | Select-Object -ExpandProperty Path
}
catch {
throw "Error: $_"
}
if($CSVPrefix) {
$CSVExportPrefix = "$($CSVPrefix)_"
}
else {
$CSVExportPrefix = ''
}
Write-Output "Writing output to CSVs in: $OutputFolder\$CSVExportPrefix"
if($UseSession -or $UseLoggedon) {
$SessionPath = "$OutputFolder\$($CSVExportPrefix)user_sessions.csv"
$Exists = [System.IO.File]::Exists($SessionPath)
$SessionFileStream = New-Object IO.FileStream($SessionPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read)
$SessionWriter = New-Object System.IO.StreamWriter($SessionFileStream)
$SessionWriter.AutoFlush = $True
if (-not $Exists) {
$SessionWriter.WriteLine('"ComputerName","UserName","Weight"')
}
}
if($UseGroup) {
$GroupPath = "$OutputFolder\$($CSVExportPrefix)group_memberships.csv"
$Exists = [System.IO.File]::Exists($GroupPath)
$GroupFileStream = New-Object IO.FileStream($GroupPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read)
$GroupWriter = New-Object System.IO.StreamWriter($GroupFileStream)
$GroupWriter.AutoFlush = $True
if (-not $Exists) {
$GroupWriter.WriteLine('"GroupName","AccountName","AccountType"')
}
}
if($UseContainers) {
$ContainerPath = "$OutputFolder\$($CSVExportPrefix)container_structure.csv"
$Exists = [System.IO.File]::Exists($ContainerPath)
$ContainerFileStream = New-Object IO.FileStream($ContainerPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read)
$ContainerWriter = New-Object System.IO.StreamWriter($ContainerFileStream)
$ContainerWriter.AutoFlush = $True
if (-not $Exists) {
$ContainerWriter.WriteLine('"ContainerType","ContainerName","ContainerGUID","ContainerBlocksInheritence","ObjectType","ObjectName","ObjectGUIDorSID"')
}
$GPLinkPath = "$OutputFolder\$($CSVExportPrefix)container_gplinks.csv"
$Exists = [System.IO.File]::Exists($GPLinkPath)
$GPLinkFileStream = New-Object IO.FileStream($GPLinkPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read)
$GPLinkWriter = New-Object System.IO.StreamWriter($GPLinkFileStream)
$GPLinkWriter.AutoFlush = $True
if (-not $Exists) {
$GPLinkWriter.WriteLine('"ObjectType","ObjectName","ObjectGUID","GPODisplayName","GPOGUID","IsEnforced"')
}
}
if($UseACLs) {
$ACLPath = "$OutputFolder\$($CSVExportPrefix)acls.csv"
$Exists = [System.IO.File]::Exists($ACLPath)
$ACLFileStream = New-Object IO.FileStream($ACLPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read)
$ACLWriter = New-Object System.IO.StreamWriter($ACLFileStream)
$ACLWriter.AutoFlush = $True
if (-not $Exists) {
$ACLWriter.WriteLine('"ObjectName","ObjectType","ObjectGuid","PrincipalName","PrincipalType","ActiveDirectoryRights","ACEType","AccessControlType","IsInherited"')
}
}
if($UseLocalGroup -or $UseGPOGroup) {
$LocalAdminPath = "$OutputFolder\$($CSVExportPrefix)local_admins.csv"
$Exists = [System.IO.File]::Exists($LocalAdminPath)
$LocalAdminFileStream = New-Object IO.FileStream($LocalAdminPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read)
$LocalAdminWriter = New-Object System.IO.StreamWriter($LocalAdminFileStream)
$LocalAdminWriter.AutoFlush = $True
if (-not $Exists) {
$LocalAdminWriter.WriteLine('"ComputerName","AccountName","AccountType"')
}
}
if($UseDomainTrusts) {
$TrustsPath = "$OutputFolder\$($CSVExportPrefix)trusts.csv"
$Exists = [System.IO.File]::Exists($TrustsPath)
$TrustsFileStream = New-Object IO.FileStream($TrustsPath, [System.IO.FileMode]::Append, [System.IO.FileAccess]::Write, [IO.FileShare]::Read)
$TrustWriter = New-Object System.IO.StreamWriter($TrustsFileStream)
$TrustWriter.AutoFlush = $True
if (-not $Exists) {
$TrustWriter.WriteLine('"SourceDomain","TargetDomain","TrustDirection","TrustType","Transitive"')
}
}
}
else {
$WebClient = New-Object System.Net.WebClient
$Base64UserPass = [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($UserPass))
$WebClient.Headers.Add('Accept','application/json; charset=UTF-8')
$WebClient.Headers.Add('Authorization',"Basic $Base64UserPass")
try {
$Null = $WebClient.DownloadString($URI.AbsoluteUri + 'user/neo4j')
Write-Verbose "Connection established with neo4j ingestion interface at $($URI.AbsoluteUri)"
$Authorized = $True
}
catch {
$Authorized = $False
throw "Error connecting to Neo4j rest REST server at '$($URI.AbsoluteUri)'"
}
Write-Output "Sending output to neo4j RESTful API interface at: $($URI.AbsoluteUri)"
$Null = [Reflection.Assembly]::LoadWithPartialName("System.Web.Extensions")
function ConvertTo-Json20([object] $Item){
$ps_js = New-Object System.Web.Script.Serialization.javascriptSerializer
return $ps_js.Serialize($item)
}
$Authorized = $True
$Statements = New-Object System.Collections.ArrayList
$Null = $Statements.Add( @{ "statement"="CREATE CONSTRAINT ON (c:User) ASSERT c.UserName IS UNIQUE" } )
$Null = $Statements.Add( @{ "statement"="CREATE CONSTRAINT ON (c:Computer) ASSERT c.ComputerName IS UNIQUE"} )
$Null = $Statements.Add( @{ "statement"="CREATE CONSTRAINT ON (c:Group) ASSERT c.GroupName IS UNIQUE" } )
$Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements }
$JsonRequest = ConvertTo-Json20 $Json
$Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest)
$Statements.Clear()
}
$UserDomainMappings = @{}
if(-not $SkipGCDeconfliction2) {
if($PSBoundParameters['GlobalCatalog']) {
$UserDomainMappings = Get-GlobalCatalogUserMapping -GlobalCatalog $GlobalCatalog
}
else {
$UserDomainMappings = Get-GlobalCatalogUserMapping
}
}
$DomainShortnameMappings = @{}
if($Domain) {
$TargetDomains = @($Domain)
}
elseif($SearchForest) {
$TargetDomains = Get-NetForestDomain | Select-Object -ExpandProperty Name
}
else {
$TargetDomains = @( (Get-NetDomain).Name )
}
if($UseGroup -and $TargetDomains) {
$Title = (Get-Culture).TextInfo
ForEach ($TargetDomain in $TargetDomains) {
Write-Verbose "Enumerating group memberships for domain $TargetDomain"
$GroupDNMappings = @{}
$PrimaryGroups = @{}
$DomainSID = Get-DomainSID -Domain $TargetDomain -DomainController $DomainController
$ObjectSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController -ADSPath $UserADSpath
$ObjectSearcher.Filter = '(memberof=*)'
$Null = $ObjectSearcher.PropertiesToLoad.AddRange(('samaccountname', 'distinguishedname', 'cn', 'dnshostname', 'samaccounttype', 'primarygroupid', 'memberof'))
$Counter = 0
$ObjectSearcher.FindAll() | ForEach-Object {
if($Counter % 1000 -eq 0) {
Write-Verbose "Group object counter: $Counter"
if($GroupWriter) {
$GroupWriter.Flush()
}
[GC]::Collect()
}
$Properties = $_.Properties
$MemberDN = $Null
$MemberDomain = $Null
try {
$MemberDN = $Properties['distinguishedname'][0]
if (($MemberDN -match 'ForeignSecurityPrincipals') -and ($MemberDN -match 'S-1-5-21')) {
try {
if(-not $MemberSID) {
$MemberSID = $Properties.cn[0]
}
$MemberSimpleName = Convert-SidToName -SID $MemberSID | Convert-ADName -InputType 'NT4' -OutputType 'Canonical'
if($MemberSimpleName) {
$MemberDomain = $MemberSimpleName.Split('/')[0]
}
else {
Write-Verbose "Error converting $MemberDN"
}
}
catch {
Write-Verbose "Error converting $MemberDN"
}
}
else {
$MemberDomain = $MemberDN.subString($MemberDN.IndexOf("DC=")) -replace 'DC=','' -replace ',','.'
}
}
catch {}
if (@('268435456','268435457','536870912','536870913') -contains $Properties['samaccounttype']) {
$ObjectType = 'group'
if($Properties['samaccountname']) {
$MemberName = $Properties['samaccountname'][0]
}
else {
try {
$MemberName = Convert-SidToName $Properties['cn'][0]
}
catch {
$MemberName = $Properties['cn'][0]
}
}
if ($MemberName -Match "\\") {
$AccountName = $MemberName.split('\')[1] + '@' + $MemberDomain
}
else {
$AccountName = "$MemberName@$MemberDomain"
}
}
elseif (@('805306369') -contains $Properties['samaccounttype']) {
$ObjectType = 'computer'
if ($Properties['dnshostname']) {
$AccountName = $Properties['dnshostname'][0]
}
}
elseif (@('805306368') -contains $Properties['samaccounttype']) {
$ObjectType = 'user'
if($Properties['samaccountname']) {
$MemberName = $Properties['samaccountname'][0]
}
else {
try {
$MemberName = Convert-SidToName $Properties['cn'][0]
}
catch {
$MemberName = $Properties['cn'][0]
}
}
if ($MemberName -Match "\\") {
$AccountName = $MemberName.split('\')[1] + '@' + $MemberDomain
}
else {
$AccountName = "$MemberName@$MemberDomain"
}
}
else {
Write-Verbose "Unknown account type for object $($Properties['distinguishedname']) : $($Properties['samaccounttype'])"
}
if($AccountName -and (-not $AccountName.StartsWith('@'))) {
$MemberPrimaryGroupName = $Null
try {
if($AccountName -match $TargetDomain) {
if($Properties['primarygroupid'] -and $Properties['primarygroupid'][0] -and ($Properties['primarygroupid'][0] -ne '')) {
$PrimaryGroupSID = "$DomainSID-$($Properties['primarygroupid'][0])"
if($PrimaryGroups[$PrimaryGroupSID]) {
$PrimaryGroupName = $PrimaryGroups[$PrimaryGroupSID]
}
else {
$RawName = Convert-SidToName -SID $PrimaryGroupSID
if ($RawName -notmatch '^S-1-.*') {
$PrimaryGroupName = $RawName.split('\')[-1]
$PrimaryGroups[$PrimaryGroupSID] = $PrimaryGroupName
}
}
if ($PrimaryGroupName) {
$MemberPrimaryGroupName = "$PrimaryGroupName@$TargetDomain"
}
}
else { }
}
}
catch { }
if($MemberPrimaryGroupName) {
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$GroupWriter.WriteLine("`"$MemberPrimaryGroupName`",`"$AccountName`",`"$ObjectType`"")
}
else {
$ObjectTypeCap = $Title.ToTitleCase($ObjectType)
$Null = $Statements.Add( @{ "statement"="MERGE ($($ObjectType)1:$ObjectTypeCap { name: UPPER('$AccountName') }) MERGE (group2:Group { name: UPPER('$MemberPrimaryGroupName') }) MERGE ($($ObjectType)1)-[:MemberOf]->(group2)" } )
}
}
ForEach($GroupDN in $_.properties['memberof']) {
$GroupDomain = $GroupDN.subString($GroupDN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.'
if($GroupDNMappings[$GroupDN]) {
$GroupName = $GroupDNMappings[$GroupDN]
}
else {
$GroupName = Convert-ADName -ObjectName $GroupDN
if($GroupName) {
$GroupName = $GroupName.Split('\')[-1]
}
else {
$GroupName = $GroupDN.SubString(0, $GroupDN.IndexOf(',')).Split('=')[-1]
}
$GroupDNMappings[$GroupDN] = $GroupName
}
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$GroupWriter.WriteLine("`"$GroupName@$GroupDomain`",`"$AccountName`",`"$ObjectType`"")
}
else {
$ObjectTypeCap = $Title.ToTitleCase($ObjectType)
$Null = $Statements.Add( @{ "statement"="MERGE ($($ObjectType)1:$ObjectTypeCap { name: UPPER('$AccountName') }) MERGE (group2:Group { name: UPPER('$GroupName@$GroupDomain') }) MERGE ($($ObjectType)1)-[:MemberOf]->(group2)" } )
if ($Statements.Count -ge $Throttle) {
$Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements }
$JsonRequest = ConvertTo-Json20 $Json
$Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest)
$Statements.Clear()
}
}
}
$Counter += 1
}
}
$ObjectSearcher.Dispose()
if ($PSCmdlet.ParameterSetName -eq 'RESTAPI') {
$Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements }
$JsonRequest = ConvertTo-Json20 $Json
$Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest)
$Statements.Clear()
}
Write-Verbose "Done with group enumeration for domain $TargetDomain"
}
[GC]::Collect()
}
if ($UseContainers -and $TargetDomains) {
ForEach ($TargetDomain in $TargetDomains) {
Write-Verbose "Enumerating container memberships and gpLinks for domain: $TargetDomain"
$OUs = New-Object System.Collections.Queue
$GPOSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController
$GPOSearcher.filter="(&(objectCategory=groupPolicyContainer)(name=*)(gpcfilesyspath=*))"
$GPOSearcher.PropertiesToLoad.AddRange(('displayname', 'name'))
$GPOs = @{}
ForEach($GPOResult in $GPOSearcher.FindAll()) {
$GPOdisplayName = $GPOResult.Properties['displayname'][0]
$GPOname = $GPOResult.Properties['name'][0]
$GPOName = $GPOName.Substring(1, $GPOName.Length-2)
$GPOs[$GPOname] = $GPOdisplayName
}
$DomainSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController
$DomainSearcher.SearchScope = 'Base'
$Null = $DomainSearcher.PropertiesToLoad.AddRange(('gplink', 'objectguid'))
$DomainObject = $DomainSearcher.FindOne()
$DomainGUID = (New-Object Guid (,$DomainObject.Properties['objectguid'][0])).Guid
if ($DomainObject.Properties['gplink']) {
$DomainObject.Properties['gplink'][0].split('][') | ForEach-Object {
if ($_.startswith('LDAP')) {
$Parts = $_.split(';')
$GPODN = $Parts[0]
if ($Parts[1] -eq 2) { $Enforced = $True }
else { $Enforced = $False }
$i = $GPODN.IndexOf("CN=")+4
$GPOName = $GPODN.subString($i, $i+25)
$GPODisplayName = $GPOs[$GPOname]
$GPLinkWriter.WriteLine("`"domain`",`"$TargetDomain`",`"$DomainGUID`",`"$GPODisplayName`",`"$GPOName`",`"$Enforced`"")
}
}
}
$DomainSearcher.SearchScope = 'OneLevel'
$Null = $DomainSearcher.PropertiesToLoad.AddRange(('name'))
$DomainSearcher.Filter = "(objectClass=container)"
$DomainSearcher.FindAll() | ForEach-Object {
$ContainerName = ,$_.Properties['name'][0]
$ContainerPath = $_.Properties['adspath']
Write-Verbose "ContainerPath: $ContainerPath"
$ContainerSearcher = Get-DomainSearcher -ADSpath $ContainerPath
$Null = $ContainerSearcher.PropertiesToLoad.AddRange(('name', 'objectsid', 'samaccounttype'))
$ContainerSearcher.Filter = '(|(samAccountType=805306368)(samAccountType=805306369))'
$ContainerSearcher.SearchScope = 'SubTree'
$ContainerSearcher.FindAll() | ForEach-Object {
$ObjectName = ,$_.Properties['name'][0]
Write-Verbose "ObjectName: $ObjectName"
if ( (,$_.Properties['samaccounttype'][0]) -eq '805306368') {
$ObjectType = 'user'
}
else {
$ObjectType = 'computer'
}
$ObjectSID = (New-Object System.Security.Principal.SecurityIdentifier($_.Properties['objectsid'][0],0)).Value
$ContainerWriter.WriteLine("`"domain`",`"$TargetDomain`",`"$DomainGUID`",`"$False`",`"$ObjectType`",`"$ObjectName`",`"$ObjectSID`"")
}
$ContainerSearcher.Dispose()
}
$DomainSearcher.SearchScope = 'OneLevel'
$Null = $DomainSearcher.PropertiesToLoad.AddRange(('name', 'objectguid', 'gplink'))
$DomainSearcher.Filter = "(objectCategory=organizationalUnit)"
$DomainSearcher.FindAll() | ForEach-Object {
$OUGuid = (New-Object Guid (,$_.Properties['objectguid'][0])).Guid
$OUName = ,$_.Properties['name'][0]
$ContainerWriter.WriteLine("`"domain`",`"$TargetDomain`",`"$DomainGUID`",`"$False`",`"ou`",`"$OUName`",`"$OUGuid`"")
$OUs.Enqueue($_.Properties['adspath'])
}
$DomainSearcher.Dispose()
while ($OUs.Count -gt 0) {
$ADSPath = $OUs.Dequeue()
Write-Verbose "Enumerating OU: '$ADSPath'"
$DomainSearcher = Get-DomainSearcher -ADSpath $ADSPath
$Null = $DomainSearcher.PropertiesToLoad.AddRange(('name', 'objectguid', 'gplink', 'gpoptions'))
$DomainSearcher.SearchScope = 'Base'
$OU = $DomainSearcher.FindOne()
$OUGuid = (New-Object Guid (,$OU.Properties['objectguid'][0])).Guid
$OUName = ,$OU.Properties['name'][0]
$ContainerBlocksInheritence = $False
if ($OU.Properties['gpoptions'] -and ($OU.Properties['gpoptions'] -eq 1)) {
$ContainerBlocksInheritence = $True
}
if ($OU.Properties['gplink'] -and $OU.Properties['gplink'][0]) {
$OU.Properties['gplink'][0].split('][') | ForEach-Object {
if ($_.startswith('LDAP')) {
$Parts = $_.split(';')
$GPODN = $Parts[0]
if ($Parts[1] -eq 2) { $Enforced = $True }
else { $Enforced = $False }
$i = $GPODN.IndexOf('CN=', [System.StringComparison]::CurrentCultureIgnoreCase)+4
$GPOName = $GPODN.SubString($i, $i+25)
$GPODisplayName = $GPOs[$GPOname]
$GPLinkWriter.WriteLine("`"ou`",`"$OUName`",`"$OUGuid`",`"$GPODisplayName`",`"$GPOName`",`"$Enforced`"")
}
}
}
$Null = $DomainSearcher.PropertiesToLoad.AddRange(('name', 'objectsid', 'objectguid', 'gplink', 'gpoptions', 'objectclass'))
$DomainSearcher.Filter = '(|(samAccountType=805306368)(samAccountType=805306369)(objectclass=organizationalUnit))'
$DomainSearcher.SearchScope = 'OneLevel'
$DomainSearcher.FindAll() | ForEach-Object {
if ($_.Properties['objectclass'] -contains 'organizationalUnit') {
$SubOUName = ,$_.Properties['name'][0]
$SubOUGuid = (New-Object Guid (,$_.Properties['objectguid'][0])).Guid
$ContainerWriter.WriteLine("`"ou`",`"$OUName`",`"$OUGuid`",`"$ContainerBlocksInheritence`",`"ou`",`"$SubOUName`",`"$SubOUGuid`"")
$OUs.Enqueue($_.Properties['adspath'])
}
elseif ($_.Properties['objectclass'] -contains 'computer') {
$SubComputerName = ,$_.Properties['name'][0]
$SubComputerSID = (New-Object System.Security.Principal.SecurityIdentifier($_.Properties['objectsid'][0],0)).Value
$ContainerWriter.WriteLine("`"ou`",`"$OUName`",`"$OUGuid`",`"$ContainerBlocksInheritence`",`"computer`",`"$SubComputerName`",`"$SubComputerSID`"")
}
else {
$SubUserName = ,$_.Properties['name'][0]
$SubUserSID = (New-Object System.Security.Principal.SecurityIdentifier($_.Properties['objectsid'][0],0)).Value
$ContainerWriter.WriteLine("`"ou`",`"$OUName`",`"$OUGuid`",`"$ContainerBlocksInheritence`",`"user`",`"$SubUserName`",`"$SubUserSID`"")
}
}
$DomainSearcher.Dispose()
}
Write-Verbose "Done with container memberships and gpLink enumeration for domain: $TargetDomain"
}
[GC]::Collect()
}
if($UseACLs -and $TargetDomains) {
$PrincipalMapping = @{}
$Counter = 0
$CommonSidMapping = @{
'S-1-0' = @('Null Authority', 'USER')
'S-1-0-0' = @('Nobody', 'USER')
'S-1-1' = @('World Authority', 'USER')
'S-1-1-0' = @('Everyone', 'GROUP')
'S-1-2' = @('Local Authority', 'USER')
'S-1-2-0' = @('Local', 'GROUP')
'S-1-2-1' = @('Console Logon', 'GROUP')
'S-1-3' = @('Creator Authority', 'USER')
'S-1-3-0' = @('Creator Owner', 'USER')
'S-1-3-1' = @('Creator Group', 'GROUP')
'S-1-3-2' = @('Creator Owner Server', 'COMPUTER')
'S-1-3-3' = @('Creator Group Server', 'COMPUTER')
'S-1-3-4' = @('Owner Rights', 'GROUP')
'S-1-4' = @('Non-unique Authority', 'USER')
'S-1-5' = @('NT Authority', 'USER')
'S-1-5-1' = @('Dialup', 'GROUP')
'S-1-5-2' = @('Network', 'GROUP')
'S-1-5-3' = @('Batch', 'GROUP')
'S-1-5-4' = @('Interactive', 'GROUP')
'S-1-5-6' = @('Service', 'GROUP')
'S-1-5-7' = @('Anonymous', 'GROUP')
'S-1-5-8' = @('Proxy', 'GROUP')
'S-1-5-9' = @('Enterprise Domain Controllers', 'GROUP')
'S-1-5-10' = @('Principal Self', 'USER')
'S-1-5-11' = @('Authenticated Users', 'GROUP')
'S-1-5-12' = @('Restricted Code', 'GROUP')
'S-1-5-13' = @('Terminal Server Users', 'GROUP')
'S-1-5-14' = @('Remote Interactive Logon', 'GROUP')
'S-1-5-15' = @('This Organization ', 'GROUP')
'S-1-5-17' = @('This Organization ', 'GROUP')
'S-1-5-18' = @('Local System', 'USER')
'S-1-5-19' = @('NT Authority', 'USER')
'S-1-5-20' = @('NT Authority', 'USER')
'S-1-5-80-0' = @('All Services ', 'GROUP')
'S-1-5-32-544' = @('Administrators', 'GROUP')
'S-1-5-32-545' = @('Users', 'GROUP')
'S-1-5-32-546' = @('Guests', 'GROUP')
'S-1-5-32-547' = @('Power Users', 'GROUP')
'S-1-5-32-548' = @('Account Operators', 'GROUP')
'S-1-5-32-549' = @('Server Operators', 'GROUP')
'S-1-5-32-550' = @('Print Operators', 'GROUP')
'S-1-5-32-551' = @('Backup Operators', 'GROUP')
'S-1-5-32-552' = @('Replicators', 'GROUP')
'S-1-5-32-554' = @('Pre-Windows 2000 Compatible Access', 'GROUP')
'S-1-5-32-555' = @('Remote Desktop Users', 'GROUP')
'S-1-5-32-556' = @('Network Configuration Operators', 'GROUP')
'S-1-5-32-557' = @('Incoming Forest Trust Builders', 'GROUP')
'S-1-5-32-558' = @('Performance Monitor Users', 'GROUP')
'S-1-5-32-559' = @('Performance Log Users', 'GROUP')
'S-1-5-32-560' = @('Windows Authorization Access Group', 'GROUP')
'S-1-5-32-561' = @('Terminal Server License Servers', 'GROUP')
'S-1-5-32-562' = @('Distributed COM Users', 'GROUP')
'S-1-5-32-569' = @('Cryptographic Operators', 'GROUP')
'S-1-5-32-573' = @('Event Log Readers', 'GROUP')
'S-1-5-32-574' = @('Certificate Service DCOM Access', 'GROUP')
'S-1-5-32-575' = @('RDS Remote Access Servers', 'GROUP')
'S-1-5-32-576' = @('RDS Endpoint Servers', 'GROUP')
'S-1-5-32-577' = @('RDS Management Servers', 'GROUP')
'S-1-5-32-578' = @('Hyper-V Administrators', 'GROUP')
'S-1-5-32-579' = @('Access Control Assistance Operators', 'GROUP')
'S-1-5-32-580' = @('Access Control Assistance Operators', 'GROUP')
}
ForEach ($TargetDomain in $TargetDomains) {
Write-Verbose "Enumerating ACLs for objects in domain: $TargetDomain"
$ObjectSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController -ADSPath $UserADSpath
$ObjectSearcher.SecurityMasks = [System.DirectoryServices.SecurityMasks]'Dacl,Owner'
$ObjectSearcher.Filter = '(|(samAccountType=805306368)(samAccountType=805306369)(samAccountType=268435456)(samAccountType=268435457)(samAccountType=536870912)(samAccountType=536870913)(objectCategory=groupPolicyContainer))'
$ObjectSearcher.PropertiesToLoad.AddRange(('distinguishedName','samaccountname','dnshostname','displayname','objectclass','objectsid','name','ntsecuritydescriptor'))
$ObjectSearcher.FindAll() | ForEach-Object {
$Object = $_.Properties
if($Object -and $Object.distinguishedname -and $Object.distinguishedname[0]) {
$DN = $Object.distinguishedname[0]
$ObjectDomain = $DN.SubString($DN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.'
$ObjectName, $ObjectADType, $ObjectGuid = $Null
if ($Object.objectclass.contains('computer')) {
$ObjectADType = 'COMPUTER'
if ($Object.dnshostname) {
$ObjectName = $Object.dnshostname[0]
}
}
elseif ($Object.objectclass.contains('groupPolicyContainer')) {
$ObjectADType = 'GPO'
$ObjectGuid = $Object.name[0].trim('{}')
$ObjectDisplayName = $Object.displayname[0]
$ObjectName = "$ObjectDisplayName@$ObjectDomain"
}
else {
if($Object.samaccountname) {
$ObjectSamAccountName = $Object.samaccountname[0]
}
else {
$ObjectSamAccountName = $Object.name[0]
}
$ObjectName = "$ObjectSamAccountName@$ObjectDomain"
if ($Object.objectclass.contains('group')) {
$ObjectADType = 'GROUP'
}
elseif ($Object.objectclass.contains('user')) {
$ObjectADType = 'USER'
}
else {
$ObjectADType = 'OTHER'
}
}
if ($ObjectName -and $ObjectADType) {
try {
$SecDesc = New-Object -TypeName Security.AccessControl.RawSecurityDescriptor -ArgumentList $Object['ntsecuritydescriptor'][0], 0
$SecDesc| Select-Object -Expand DiscretionaryAcl | ForEach-Object {
$Counter += 1
if($Counter % 10000 -eq 0) {
Write-Verbose "ACE counter: $Counter"
if($ACLWriter) {
$ACLWriter.Flush()
}
[GC]::Collect()
}
$RawActiveDirectoryRights = ([Enum]::ToObject([System.DirectoryServices.ActiveDirectoryRights], $_.AccessMask))
if (
( ($RawActiveDirectoryRights -match 'GenericAll|GenericWrite') -and (-not $_.ObjectAceType -or $_.ObjectAceType -eq '00000000-0000-0000-0000-000000000000') ) -or
( ($RawActiveDirectoryRights -match 'WriteProperty') -and (-not $_.ObjectAceType -or $_.ObjectAceType -eq '00000000-0000-0000-0000-000000000000') ) -or
( ($RawActiveDirectoryRights -match 'ExtendedRight') -and (-not $_.ObjectAceType -or $_.ObjectAceType -eq '00000000-0000-0000-0000-000000000000') ) -or
($RawActiveDirectoryRights -match 'WriteDacl|WriteOwner') -or
(($_.ObjectAceType -eq '00299570-246d-11d0-a768-00aa006e0529') -and ($RawActiveDirectoryRights -match 'ExtendedRight')) -or
(($_.ObjectAceType -eq 'bf9679c0-0de6-11d0-a285-00aa003049e2') -and ($RawActiveDirectoryRights -match 'WriteProperty')) -or
(($_.ObjectAceType -eq 'bf9679a8-0de6-11d0-a285-00aa003049e2') -and ($RawActiveDirectoryRights -match 'WriteProperty')) -or
(($_.ObjectAceType -eq 'f30e3bc1-9ff0-11d1-b603-0000f80367c1') -and ($RawActiveDirectoryRights -match 'WriteProperty'))
) {
$PrincipalSid = $_.SecurityIdentifier.ToString()
$PrincipalSimpleName, $PrincipalObjectClass, $ACEType = $Null
$ActiveDirectoryRights = $ACLGeneralRightsRegex.Matches($RawActiveDirectoryRights) | Select-Object -ExpandProperty Value
if (-not $ActiveDirectoryRights) {
if ($RawActiveDirectoryRights -match 'ExtendedRight') {
$ActiveDirectoryRights = 'ExtendedRight'
}
else {
$ActiveDirectoryRights = 'WriteProperty'
}
$ACEType = Switch ($_.ObjectAceType) {
'00299570-246d-11d0-a768-00aa006e0529' {'User-Force-Change-Password'}
'bf9679c0-0de6-11d0-a285-00aa003049e2' {'Member'}
'bf9679a8-0de6-11d0-a285-00aa003049e2' {'Script-Path'}
'f30e3bc1-9ff0-11d1-b603-0000f80367c1' {'GPC-File-Sys-Path'}
Default {'All'}
}
}
if ($PrincipalMapping[$PrincipalSid]) {
$PrincipalSimpleName, $PrincipalObjectClass = $PrincipalMapping[$PrincipalSid]
}
elseif ($CommonSidMapping[$PrincipalSid]) {
$PrincipalName, $PrincipalObjectClass = $CommonSidMapping[$PrincipalSid]
$PrincipalSimpleName = "$PrincipalName@$TargetDomain"
$PrincipalMapping[$PrincipalSid] = $PrincipalSimpleName, $PrincipalObjectClass
}
else {
$SIDSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController
$SIDSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname','dnshostname','objectclass'))
$SIDSearcher.Filter = "(objectsid=$PrincipalSid)"
$PrincipalObject = $SIDSearcher.FindOne()
if ((-not $PrincipalObject) -and ((-not $DomainController) -or (-not $DomainController.StartsWith('GC:')))) {
$GCSearcher = Get-DomainSearcher -ADSpath $GCADSPath
$GCSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname','dnshostname','objectclass'))
$GCSearcher.Filter = "(objectsid=$PrincipalSid)"
$PrincipalObject = $GCSearcher.FindOne()
}
if ($PrincipalObject) {
if ($PrincipalObject.Properties.objectclass.contains('computer')) {
$PrincipalObjectClass = 'COMPUTER'
$PrincipalSimpleName = $PrincipalObject.Properties.dnshostname[0]
}
else {
$PrincipalSamAccountName = $PrincipalObject.Properties.samaccountname[0]
$PrincipalDN = $PrincipalObject.Properties.distinguishedname[0]
$PrincipalDomain = $PrincipalDN.SubString($PrincipalDN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.'
$PrincipalSimpleName = "$PrincipalSamAccountName@$PrincipalDomain"
if ($PrincipalObject.Properties.objectclass.contains('group')) {
$PrincipalObjectClass = 'GROUP'
}
elseif ($PrincipalObject.Properties.objectclass.contains('user')) {
$PrincipalObjectClass = 'USER'
}
else {
$PrincipalObjectClass = 'OTHER'
}
}
}
else {
Write-Verbose "SID not resolved: $PrincipalSid"
}
$PrincipalMapping[$PrincipalSid] = $PrincipalSimpleName, $PrincipalObjectClass
}
if ($PrincipalSimpleName -and $PrincipalObjectClass) {
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$ACLWriter.WriteLine("`"$ObjectName`",`"$ObjectADType`",`"$ObjectGuid`",`"$PrincipalSimpleName`",`"$PrincipalObjectClass`",`"$ActiveDirectoryRights`",`"$ACEType`",`"$($_.AceQualifier)`",`"$($_.IsInherited)`"")
}
else {
Write-Warning 'TODO: implement neo4j RESTful API ingestion for ACLs!'
}
}
}
}
$SecDesc | Select-Object -Expand Owner | ForEach-Object {
$Counter += 1
if($Counter % 10000 -eq 0) {
Write-Verbose "ACE counter: $Counter"
if($ACLWriter) {
$ACLWriter.Flush()
}
[GC]::Collect()
}
if ($_ -and $_.Value) {
$PrincipalSid = $_.Value
$PrincipalSimpleName, $PrincipalObjectClass, $ACEType = $Null
if ($PrincipalMapping[$PrincipalSid]) {
$PrincipalSimpleName, $PrincipalObjectClass = $PrincipalMapping[$PrincipalSid]
}
elseif ($CommonSidMapping[$PrincipalSid]) {
$PrincipalName, $PrincipalObjectClass = $CommonSidMapping[$PrincipalSid]
$PrincipalSimpleName = "$PrincipalName@$TargetDomain"
$PrincipalMapping[$PrincipalSid] = $PrincipalSimpleName, $PrincipalObjectClass
}
else {
$SIDSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController
$SIDSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname','dnshostname','objectclass'))
$SIDSearcher.Filter = "(objectsid=$PrincipalSid)"
$PrincipalObject = $SIDSearcher.FindOne()
if ((-not $PrincipalObject) -and ((-not $DomainController) -or (-not $DomainController.StartsWith('GC:')))) {
$GCSearcher = Get-DomainSearcher -ADSpath $GCADSPath
$GCSearcher.PropertiesToLoad.AddRange(('samaccountname','distinguishedname','dnshostname','objectclass'))
$GCSearcher.Filter = "(objectsid=$PrincipalSid)"
$PrincipalObject = $GCSearcher.FindOne()
}
if ($PrincipalObject) {
if ($PrincipalObject.Properties.objectclass.contains('computer')) {
$PrincipalObjectClass = 'COMPUTER'
$PrincipalSimpleName = $PrincipalObject.Properties.dnshostname[0]
}
else {
$PrincipalSamAccountName = $PrincipalObject.Properties.samaccountname[0]
$PrincipalDN = $PrincipalObject.Properties.distinguishedname[0]
$PrincipalDomain = $PrincipalDN.SubString($PrincipalDN.IndexOf('DC=')) -replace 'DC=','' -replace ',','.'
$PrincipalSimpleName = "$PrincipalSamAccountName@$PrincipalDomain"
if ($PrincipalObject.Properties.objectclass.contains('group')) {
$PrincipalObjectClass = 'GROUP'
}
elseif ($PrincipalObject.Properties.objectclass.contains('user')) {
$PrincipalObjectClass = 'USER'
}
else {
$PrincipalObjectClass = 'OTHER'
}
}
}
else {
Write-Verbose "SID not resolved: $PrincipalSid"
}
$PrincipalMapping[$PrincipalSid] = $PrincipalSimpleName, $PrincipalObjectClass
}
if ($PrincipalSimpleName -and $PrincipalObjectClass) {
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$ACLWriter.WriteLine("`"$ObjectName`",`"$ObjectADType`",`"$ObjectGuid`",`"$PrincipalSimpleName`",`"$PrincipalObjectClass`",`"Owner`",`"`",`"AccessAllowed`",`"False`"")
}
else {
Write-Warning 'TODO: implement neo4j RESTful API ingestion for ACLs!'
}
}
}
}
}
catch {
Write-Verbose "ACL ingestion error: $_"
}
}
}
}
}
}
if($UseDomainTrusts -and $TargetDomains) {
Write-Verbose "Mapping domain trusts"
Invoke-MapDomainTrust | ForEach-Object {
if($_.SourceDomain) {
$SourceDomain = $_.SourceDomain
}
else {
$SourceDomain = $_.SourceName
}
if($_.TargetDomain) {
$TargetDomain = $_.TargetDomain
}
else {
$TargetDomain = $_.TargetName
}
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$TrustWriter.WriteLine("`"$SourceDomain`",`"$TargetDomain`",`"$($_.TrustDirection)`",`"$($_.TrustType)`",`"$True`"")
}
else {
$Null = $Statements.Add( @{ "statement"="MERGE (SourceDomain:Domain { name: UPPER('$SourceDomain') }) MERGE (TargetDomain:Domain { name: UPPER('$TargetDomain') })" } )
$TrustType = $_.TrustType
$Transitive = $True
Switch ($_.TrustDirection) {
'Inbound' {
$Null = $Statements.Add( @{ "statement"="MERGE (SourceDomain)-[:TrustedBy{ TrustType: UPPER('$TrustType'), Transitive: UPPER('$Transitive')}]->(TargetDomain)" } )
}
'Outbound' {
$Null = $Statements.Add( @{ "statement"="MERGE (TargetDomain)-[:TrustedBy{ TrustType: UPPER('$TrustType'), Transitive: UPPER('$Transitive')}]->(SourceDomain)" } )
}
'Bidirectional' {
$Null = $Statements.Add( @{ "statement"="MERGE (TargetDomain)-[:TrustedBy{ TrustType: UPPER('$TrustType'), Transitive: UPPER('$Transitive')}]->(SourceDomain) MERGE (SourceDomain)-[:TrustedBy{ TrustType: UPPER('$TrustType'), Transitive: UPPER('$Transitive')}]->(TargetDomain)" } )
}
}
}
}
if ($PSCmdlet.ParameterSetName -eq 'RESTAPI') {
$Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements }
$JsonRequest = ConvertTo-Json20 $Json
$Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest)
$Statements.Clear()
}
Write-Verbose "Done mapping domain trusts"
}
if($UseGPOGroup -and $TargetDomains) {
ForEach ($TargetDomain in $TargetDomains) {
Write-Verbose "Enumerating GPO local group memberships for domain $TargetDomain"
Find-GPOLocation -Domain $TargetDomain -DomainController $DomainController | ForEach-Object {
$AccountName = "$($_.ObjectName)@$($_.ObjectDomain)"
ForEach($Computer in $_.ComputerName) {
if($_.IsGroup) {
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$LocalAdminWriter.WriteLine("`"$Computer`",`"$AccountName`",`"group`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (group:Group { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$Computer') }) MERGE (group)-[:AdminTo]->(computer)" } )
}
}
else {
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$LocalAdminWriter.WriteLine("`"$Computer`",`"$AccountName`",`"user`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$Computer') }) MERGE (user)-[:AdminTo]->(computer)" } )
}
}
}
}
Write-Verbose "Done enumerating GPO local group memberships for domain $TargetDomain"
}
Write-Verbose "Done enumerating GPO local group"
}
$CurrentUser = ([Environment]::UserName).toLower()
$HostEnumBlock = {
Param($ComputerName, $CurrentUser2, $UseLocalGroup2, $UseSession2, $UseLoggedon2, $DomainSID2)
ForEach ($TargetComputer in $ComputerName) {
$Up = Test-Connection -Count 1 -Quiet -ComputerName $TargetComputer
if($Up) {
if($UseLocalGroup2) {
$Results = Get-NetLocalGroup -ComputerName $TargetComputer -API -IsDomain -DomainSID $DomainSID2
if($Results) {
$Results
}
else {
Get-NetLocalGroup -ComputerName $TargetComputer -IsDomain -DomainSID $DomainSID2
}
}
$IPAddress = @(Get-IPAddress -ComputerName $TargetComputer)[0].IPAddress
if($UseSession2) {
ForEach ($Session in $(Get-NetSession -ComputerName $TargetComputer)) {
$UserName = $Session.sesi10_username
$CName = $Session.sesi10_cname
if($CName -and $CName.StartsWith("\\")) {
$CName = $CName.TrimStart("\")
}
if (($UserName) -and ($UserName.trim() -ne '') -and ($UserName -notmatch '\$') -and ($UserName -notmatch $CurrentUser2)) {
try {
$CNameDNSName = [System.Net.Dns]::GetHostEntry($CName) | Select-Object -ExpandProperty HostName
}
catch {
$CNameDNSName = $CName
}
@{
'UserDomain' = $Null
'UserName' = $UserName
'ComputerName' = $TargetComputer
'IPAddress' = $IPAddress
'SessionFrom' = $CName
'SessionFromName' = $CNameDNSName
'LocalAdmin' = $Null
'Type' = 'UserSession'
}
}
}
}
if($UseLoggedon2) {
ForEach ($User in $(Get-NetLoggedon -ComputerName $TargetComputer)) {
$UserName = $User.wkui1_username
$UserDomain = $User.wkui1_logon_domain
if($TargetComputer -notmatch "^$UserDomain") {
if (($UserName) -and ($UserName.trim() -ne '') -and ($UserName -notmatch '\$')) {
@{
'UserDomain' = $UserDomain
'UserName' = $UserName
'ComputerName' = $TargetComputer
'IPAddress' = $IPAddress
'SessionFrom' = $Null
'SessionFromName' = $Null
'LocalAdmin' = $Null
'Type' = 'UserSession'
}
}
}
}
ForEach ($User in $(Get-LoggedOnLocal -ComputerName $TargetComputer)) {
$UserName = $User.UserName
$UserDomain = $User.UserDomain
if($TargetComputer -notmatch "^$UserDomain") {
@{
'UserDomain' = $UserDomain
'UserName' = $UserName
'ComputerName' = $TargetComputer
'IPAddress' = $IPAddress
'SessionFrom' = $Null
'SessionFromName' = $Null
'LocalAdmin' = $Null
'Type' = 'UserSession'
}
}
}
}
}
}
}
}
PROCESS {
if ($TargetDomains -and (-not $SkipComputerEnumeration)) {
if($Statements) {
$Statements.Clear()
}
[Array]$TargetComputers = @()
ForEach ($TargetDomain in $TargetDomains) {
$DomainSID = Get-DomainSid -Domain $TargetDomain
$ScriptParameters = @{
'CurrentUser2' = $CurrentUser
'UseLocalGroup2' = $UseLocalGroup
'UseSession2' = $UseSession
'UseLoggedon2' = $UseLoggedon
'DomainSID2' = $DomainSID
}
if($CollectionMethod -eq 'Stealth') {
Write-Verbose "Executing stealth computer enumeration of domain $TargetDomain"
Write-Verbose "Querying domain $TargetDomain for File Servers"
$TargetComputers += Get-NetFileServer -Domain $TargetDomain -DomainController $DomainController
Write-Verbose "Querying domain $TargetDomain for DFS Servers"
$TargetComputers += ForEach($DFSServer in $(Get-DFSshare -Domain $TargetDomain -DomainController $DomainController)) {
$DFSServer.RemoteServerName
}
Write-Verbose "Querying domain $TargetDomain for Domain Controllers"
$TargetComputers += ForEach($DomainController in $(Get-NetDomainController -LDAP -DomainController $DomainController -Domain $TargetDomain)) {
$DomainController.dnshostname
}
$TargetComputers = $TargetComputers | Where-Object {$_ -and ($_.Trim() -ne '')} | Sort-Object -Unique
}
else {
if($ComputerName) {
Write-Verbose "Using specified -ComputerName target set"
if($ComputerName -isnot [System.Array]) {$ComputerName = @($ComputerName)}
$TargetComputers = $ComputerName
}
else {
Write-Verbose "Enumerating all machines in domain $TargetDomain"
$ComputerSearcher = Get-DomainSearcher -Domain $TargetDomain -DomainController $DomainController -ADSPath $ComputerADSpath
$ComputerSearcher.filter = '(sAMAccountType=805306369)'
$Null = $ComputerSearcher.PropertiesToLoad.Add('dnshostname')
$TargetComputers = $ComputerSearcher.FindAll() | ForEach-Object {$_.Properties.dnshostname}
$ComputerSearcher.Dispose()
}
}
$TargetComputers = $TargetComputers | Where-Object { $_ }
New-ThreadedFunction -ComputerName $TargetComputers -ScriptBlock $HostEnumBlock -ScriptParameters $ScriptParameters -Threads $Threads | ForEach-Object {
if($_['Type'] -eq 'UserSession') {
if($_['SessionFromName']) {
try {
$SessionFromName = $_['SessionFromName']
$UserName = $_['UserName'].ToUpper()
$ComputerDomain = $_['SessionFromName'].SubString($_['SessionFromName'].IndexOf('.')+1).ToUpper()
if($UserDomainMappings) {
$UserDomain = $Null
if($UserDomainMappings[$UserName]) {
if($UserDomainMappings[$UserName].Count -eq 1) {
$UserDomain = $UserDomainMappings[$UserName]
$LoggedOnUser = "$UserName@$UserDomain"
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"1`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '1'}]->(user)" } )
}
}
else {
$ComputerDomain = $_['SessionFromName'].SubString($_['SessionFromName'].IndexOf('.')+1).ToUpper()
$UserDomainMappings[$UserName] | ForEach-Object {
if($_ -eq $ComputerDomain) {
$UserDomain = $_
$LoggedOnUser = "$UserName@$UserDomain"
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"1`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '1'}]->(user)" } )
}
}
else {
$UserDomain = $_
$LoggedOnUser = "$UserName@$UserDomain"
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"2`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '2'}]->(user)" } )
}
}
}
}
}
else {
$LoggedOnUser = "$UserName@UNKNOWN"
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"2`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '2'}]->(user)" } )
}
}
}
else {
$LoggedOnUser = "$UserName@$ComputerDomain"
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"2`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$LoggedOnUser') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '2'}]->(user)"} )
}
}
}
catch {
Write-Warning "Error extracting domain from $SessionFromName"
}
}
elseif($_['SessionFrom']) {
$SessionFromName = $_['SessionFrom']
$LoggedOnUser = "$($_['UserName'])@UNKNOWN"
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$SessionWriter.WriteLine("`"$SessionFromName`",`"$LoggedOnUser`",`"2`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER(`"$LoggedOnUser`") }) MERGE (computer:Computer { name: UPPER(`"$SessionFromName`") }) MERGE (computer)-[:HasSession {Weight: '2'}]->(user)"} )
}
}
else {
$UserDomain = $_['UserDomain']
$UserName = $_['UserName']
try {
if($DomainShortnameMappings[$UserDomain]) {
$AccountName = "$UserName@$($DomainShortnameMappings[$UserDomain])"
}
else {
$MemberSimpleName = "$UserDomain\$UserName" | Convert-ADName -InputType 'NT4' -OutputType 'Canonical'
if($MemberSimpleName) {
$MemberDomain = $MemberSimpleName.Split('/')[0]
$AccountName = "$UserName@$MemberDomain"
$DomainShortnameMappings[$UserDomain] = $MemberDomain
}
else {
$AccountName = "$UserName@UNKNOWN"
}
}
$SessionFromName = $_['ComputerName']
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$SessionWriter.WriteLine("`"$SessionFromName`",`"$AccountName`",`"1`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$SessionFromName') }) MERGE (computer)-[:HasSession {Weight: '1'}]->(user)" } )
}
}
catch {
Write-Verbose "Error converting $UserDomain\$UserName : $_"
}
}
}
elseif($_['Type'] -eq 'LocalUser') {
$Parts = $_['AccountName'].split('\')
$UserDomain = $Parts[0]
$UserName = $Parts[-1]
if($DomainShortnameMappings[$UserDomain]) {
$AccountName = "$UserName@$($DomainShortnameMappings[$UserDomain])"
}
else {
$MemberSimpleName = "$UserDomain\$UserName" | Convert-ADName -InputType 'NT4' -OutputType 'Canonical'
if($MemberSimpleName) {
$MemberDomain = $MemberSimpleName.Split('/')[0]
$AccountName = "$UserName@$MemberDomain"
$DomainShortnameMappings[$UserDomain] = $MemberDomain
}
else {
$AccountName = "$UserName@UNKNOWN"
}
}
$ComputerName = $_['ComputerName']
if($_['IsGroup']) {
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$LocalAdminWriter.WriteLine("`"$ComputerName`",`"$AccountName`",`"group`"")
}
else {
$Null = $Statements.Add( @{ "statement"="MERGE (group:Group { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$ComputerName') }) MERGE (group)-[:AdminTo]->(computer)" } )
}
}
else {
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
$LocalAdminWriter.WriteLine("`"$ComputerName`",`"$AccountName`",`"user`"")
}
else {
$Null = $Statements.Add( @{"statement"="MERGE (user:User { name: UPPER('$AccountName') }) MERGE (computer:Computer { name: UPPER('$ComputerName') }) MERGE (user)-[:AdminTo]->(computer)" } )
}
}
}
if (($PSCmdlet.ParameterSetName -eq 'RESTAPI') -and ($Statements.Count -ge $Throttle)) {
$Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements }
$JsonRequest = ConvertTo-Json20 $Json
$Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest)
$Statements.Clear()
[GC]::Collect()
}
}
}
}
}
END {
if ($PSCmdlet.ParameterSetName -eq 'CSVExport') {
if($SessionWriter) {
$SessionWriter.Dispose()
$SessionFileStream.Dispose()
}
if($GroupWriter) {
$GroupWriter.Dispose()
$GroupFileStream.Dispose()
}
if($ContainerWriter) {
$ContainerWriter.Dispose()
$ContainerFileStream.Dispose()
}
if($GPLinkWriter) {
$GPLinkWriter.Dispose()
$GPLinkFileStream.Dispose()
}
if($ACLWriter) {
$ACLWriter.Dispose()
$ACLFileStream.Dispose()
}
if($LocalAdminWriter) {
$LocalAdminWriter.Dispose()
$LocalAdminFileStream.Dispose()
}
if($TrustWriter) {
$TrustWriter.Dispose()
$TrustsFileStream.Dispose()
}
Write-Output "Done writing output to CSVs in: $OutputFolder\$CSVExportPrefix"
}
else {
$Json = @{ "statements"=[System.Collections.Hashtable[]]$Statements }
$JsonRequest = ConvertTo-Json20 $Json
$Null = $WebClient.UploadString($URI.AbsoluteUri + "db/data/transaction/commit", $JsonRequest)
$Statements.Clear()
Write-Output "Done sending output to neo4j RESTful API interface at: $($URI.AbsoluteUri)"
}
[GC]::Collect()
}
}
$Mod = New-InMemoryModule -ModuleName Win32
$FunctionDefinitions = @(
(func netapi32 NetWkstaUserEnum ([Int]) @([String], [Int], [IntPtr].MakeByRefType(), [Int], [Int32].MakeByRefType(), [Int32].MakeByRefType(), [Int32].MakeByRefType())),
(func netapi32 NetSessionEnum ([Int]) @([String], [String], [String], [Int], [IntPtr].MakeByRefType(), [Int], [Int32].MakeByRefType(), [Int32].MakeByRefType(), [Int32].MakeByRefType())),
(func netapi32 NetLocalGroupGetMembers ([Int]) @([String], [String], [Int], [IntPtr].MakeByRefType(), [Int], [Int32].MakeByRefType(), [Int32].MakeByRefType(), [Int32].MakeByRefType())),
(func netapi32 DsEnumerateDomainTrusts ([Int]) @([String], [UInt32], [IntPtr].MakeByRefType(), [IntPtr].MakeByRefType())),
(func netapi32 NetApiBufferFree ([Int]) @([IntPtr])),
(func advapi32 ConvertSidToStringSid ([Int]) @([IntPtr], [String].MakeByRefType()) -SetLastError)
)
$WKSTA_USER_INFO_1 = struct $Mod WKSTA_USER_INFO_1 @{
wkui1_username = field 0 String -MarshalAs @('LPWStr')
wkui1_logon_domain = field 1 String -MarshalAs @('LPWStr')
wkui1_oth_domains = field 2 String -MarshalAs @('LPWStr')
wkui1_logon_server = field 3 String -MarshalAs @('LPWStr')
}
$SESSION_INFO_10 = struct $Mod SESSION_INFO_10 @{
sesi10_cname = field 0 String -MarshalAs @('LPWStr')
sesi10_username = field 1 String -MarshalAs @('LPWStr')
sesi10_time = field 2 UInt32
sesi10_idle_time = field 3 UInt32
}
$SID_NAME_USE = psenum $Mod SID_NAME_USE UInt16 @{
SidTypeUser = 1
SidTypeGroup = 2
SidTypeDomain = 3
SidTypeAlias = 4
SidTypeWellKnownGroup = 5
SidTypeDeletedAccount = 6
SidTypeInvalid = 7
SidTypeUnknown = 8
SidTypeComputer = 9
}
$LOCALGROUP_MEMBERS_INFO_2 = struct $Mod LOCALGROUP_MEMBERS_INFO_2 @{
lgrmi2_sid = field 0 IntPtr
lgrmi2_sidusage = field 1 $SID_NAME_USE
lgrmi2_domainandname = field 2 String -MarshalAs @('LPWStr')
}
$DsDomainFlag = psenum $Mod DsDomain.Flags UInt32 @{
IN_FOREST = 1
DIRECT_OUTBOUND = 2
TREE_ROOT = 4
PRIMARY = 8
NATIVE_MODE = 16
DIRECT_INBOUND = 32
} -Bitfield
$DsDomainTrustType = psenum $Mod DsDomain.TrustType UInt32 @{
DOWNLEVEL = 1
UPLEVEL = 2
MIT = 3
DCE = 4
}
$DsDomainTrustAttributes = psenum $Mod DsDomain.TrustAttributes UInt32 @{
NON_TRANSITIVE = 1
UPLEVEL_ONLY = 2
FILTER_SIDS = 4
FOREST_TRANSITIVE = 8
CROSS_ORGANIZATION = 16
WITHIN_FOREST = 32
TREAT_AS_EXTERNAL = 64
}
$DS_DOMAIN_TRUSTS = struct $Mod DS_DOMAIN_TRUSTS @{
NetbiosDomainName = field 0 String -MarshalAs @('LPWStr')
DnsDomainName = field 1 String -MarshalAs @('LPWStr')
Flags = field 2 $DsDomainFlag
ParentIndex = field 3 UInt32
TrustType = field 4 $DsDomainTrustType
TrustAttributes = field 5 $DsDomainTrustAttributes
DomainSid = field 6 IntPtr
DomainGuid = field 7 Guid
}
$Types = $FunctionDefinitions | Add-Win32Type -Module $Mod -Namespace 'Win32'
$Netapi32 = $Types['netapi32']
$Advapi32 = $Types['advapi32']
Set-Alias Get-BloodHoundData Invoke-BloodHound
|
combined_dataset/train/non-malicious/3383.ps1 | 3383.ps1 |
$commands =
function Test-SetAzureStorageBlobContent
{
Assert-ThrowsContains {
Set-AzureStorageBlobContent -File "foo.txt" -Container foo -Blob foo -BlobType Block
} "Could not get the storage context. Please pass in a storage context or set the current storage context." > $null
}
function Test-UpdateStorageAccount
{
$accounts = Get-AzureStorageAccount
$subscription = $(Get-AzureSubscription -Current).SubscriptionName
Set-AzureSubscription -SubscriptionName $subscription -CurrentStorageAccountName $accounts[0].StorageAccountName
$storageAccountName = $(Get-AzureStorageContainer)[0].Context.StorageAccountName
Assert-AreEqual $storageAccountName $accounts[0].StorageAccountName
Set-AzureSubscription -SubscriptionName $subscription -CurrentStorageAccountName $accounts[1].StorageAccountName
$storageAccountName = $(Get-AzureStorageContainer)[0].Context.StorageAccountName
Assert-AreEqual $storageAccountName $accounts[1].StorageAccountName
}
[CmdletBinding]
function Get-IncompleteHelp
{
Get-Help azure | where {[System.String]::IsNullOrEmpty($_.Synopsis) -or `
[System.String]::Equals($_.Synopsis, (Get-Command $_.Name).Definition, `
[System.StringComparison]::OrdinalIgnoreCase)} | % {Write-Output $_.Name}
} |
combined_dataset/train/non-malicious/785.ps1 | 785.ps1 |
function Find-Ast {
[CmdletBinding(PositionalBinding=$false, DefaultParameterSetName='FilterScript')]
param(
[Parameter(Position=0, ParameterSetName='FilterScript')]
[ValidateNotNullOrEmpty()]
[scriptblock]
$FilterScript = { $true },
[Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName='FilterScript')]
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.Ast]
$Ast,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$Before,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$Family,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Closest', 'F')]
[switch]
$First,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Furthest')]
[switch]
$Last,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Parent')]
[switch]
$Ancestor,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$IncludeStartingAst,
[Parameter(ParameterSetName='AtCursor')]
[switch]
$AtCursor
)
begin {
if ($PSVersionTable.PSVersion.Major -ge 4) {
$variableType = [System.Management.Automation.PSVariable]
function InvokeWithContext {
param([scriptblock]$Filter, [System.Management.Automation.Language.Ast]$DollarUnder)
return $Filter.InvokeWithContext(
$null,
[Activator]::CreateInstance($variableType, @('_', $DollarUnder)),
$aAst)
}
} else {
$FilterScript = [scriptblock]::Create($FilterScript.ToString())
function InvokeWithContext {
param([scriptblock]$Filter, [System.Management.Automation.Language.Ast]$DollarUnder)
return $DollarUnder | & { process { $Filter.InvokeReturnAsIs($DollarUnder) } }
}
}
function GetAllFamily {
param($Start)
if ($Before.IsPresent) {
$parent = $Start
for ($parent; $parent = $parent.Parent) { $parent }
return
}
return $Start.FindAll({ $true }, $true)
}
function GetAllAsts {
param($Start)
$predicate = [Func[System.Management.Automation.Language.Ast,bool]]{
$args[0] -ne $Ast
}
$topParent = Find-Ast -Ast $Start -Ancestor -Last -IncludeStartingAst
if (-not $topParent) { $topParent = $Start }
if ($Before.IsPresent) {
$result = [Linq.Enumerable]::TakeWhile(
$topParent.FindAll({ $true }, $true),
$predicate) -as [System.Management.Automation.Language.Ast[]]
[array]::Reverse($result)
return $result
}
return [Linq.Enumerable]::SkipWhile(
$topParent.FindAll({ $true }, $true),
$predicate)
}
}
process {
if ($Ancestor.IsPresent) {
$Family = $Before = $true
}
$context = $psEditor.GetEditorContext()
if (-not $Ast -and $context) {
$Ast = $context.CurrentFile.Ast
}
switch ($PSCmdlet.ParameterSetName) {
AtCursor {
$cursorLine = $context.CursorPosition.Line - 1
$cursorColumn = $context.CursorPosition.Column - 1
$cursorOffset = $Ast.Extent.Text |
Select-String "(.*\r?\n){$cursorLine}.{$cursorColumn}" |
ForEach-Object { $PSItem.Matches.Value.Length }
Find-Ast -Last {
$cursorOffset -ge $PSItem.Extent.StartOffset -and
$cursorOffset -le $PSItem.Extent.EndOffset
}
}
FilterScript {
if (-not $Ast) { return }
if ($Before.IsPresent -and
$Family.IsPresent -and
$Last.IsPresent -and -not
$Ast.Parent -and
$Ast -is [System.Management.Automation.Language.ScriptBlockAst])
{ return $Ast }
if ($Family.IsPresent) {
$asts = GetAllFamily $Ast
} else {
$asts = GetAllAsts $Ast
}
$checkFirstAst = -not $IncludeStartingAst
foreach ($aAst in $asts) {
if ($checkFirstAst) {
if ($aAst -eq $Ast) {
$checkFirstAst = $false
continue
}
}
$shouldReturn = InvokeWithContext $FilterScript $aAst
if (-not $shouldReturn) { continue }
if (-not $Last.IsPresent) {
$aAst
if ($First.IsPresent) { break }
} else {
$lastMatch = $aAst
if ($First.IsPresent) {
$aAst
$First = $false
}
}
}
if ($Last.IsPresent) { return $lastMatch }
}
}
}
}
|
combined_dataset/train/non-malicious/Add-SqlTable_4.ps1 | Add-SqlTable_4.ps1 | try {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop}
catch {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo"}
try {add-type -AssemblyName "Microsoft.SqlServer.Smo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop}
catch {add-type -AssemblyName "Microsoft.SqlServer.Smo"}
#######################
function Get-SqlType
{
param([string]$TypeName)
switch ($TypeName)
{
'Boolean' {[Data.SqlDbType]::Bit}
'Byte[]' {[Data.SqlDbType]::VarBinary}
'Byte' {[Data.SQLDbType]::VarBinary}
'Datetime' {[Data.SQLDbType]::DateTime}
'Decimal' {[Data.SqlDbType]::Decimal}
'Double' {[Data.SqlDbType]::Float}
'Guid' {[Data.SqlDbType]::UniqueIdentifier}
'Int16' {[Data.SQLDbType]::SmallInt}
'Int32' {[Data.SQLDbType]::Int}
'Int64' {[Data.SqlDbType]::BigInt}
default {[Data.SqlDbType]::VarChar}
}
} #Get-SqlType
#######################
<#
.SYNOPSIS
Creates a SQL Server table from a DataTable
.DESCRIPTION
Creates a SQL Server table from a DataTable using SMO.
.EXAMPLE
$dt = Invoke-Sqlcmd2 -ServerInstance "Z003\\R2" -Database pubs "select * from authors"; Add-SqlTable -ServerInstance "Z003\\R2" -Database pubscopy -TableName authors -DataTable $dt
This example loads a variable dt of type DataTable from a query and creates an empty SQL Server table
.EXAMPLE
$dt = Get-Alias | Out-DataTable; Add-SqlTable -ServerInstance "Z003\\R2" -Database pubscopy -TableName alias -DataTable $dt
This example creates a DataTable from the properties of Get-Alias and creates an empty SQL Server table.
.NOTES
Add-SqlTable uses SQL Server Management Objects (SMO). SMO is installed with SQL Server Management Studio and is available
as a separate download: http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=ceb4346f-657f-4d28-83f5-aae0c5c83d52
Version History
v1.0 - Chad Miller - Initial Release
v1.1 - Chad Miller - Updated documentation
v1.2 - Chad Miller - Add loading Microsoft.SqlServer.ConnectionInfo
v1.3 - Chad Miller - Added error handling
v1.4 - Chad Miller - Add VarCharMax and VarBinaryMax handling
#>
function Add-SqlTable
{
[CmdletBinding()]
param(
[Parameter(Position=0, Mandatory=$true)] [string]$ServerInstance,
[Parameter(Position=1, Mandatory=$true)] [string]$Database,
[Parameter(Position=2, Mandatory=$true)] [String]$TableName,
[Parameter(Position=3, Mandatory=$true)] [System.Data.DataTable]$DataTable,
[Parameter(Position=4, Mandatory=$false)] [string]$Username,
[Parameter(Position=5, Mandatory=$false)] [string]$Password,
[ValidateRange(0,8000)]
[Parameter(Position=6, Mandatory=$false)] [Int32]$MaxLength=1000
)
try {
if($Username)
{ $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $ServerInstance,$Username,$Password }
else
{ $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $ServerInstance }
$con.Connect()
$server = new-object ("Microsoft.SqlServer.Management.Smo.Server") $con
$db = $server.Databases[$Database]
$table = new-object ("Microsoft.SqlServer.Management.Smo.Table") $db, $TableName
foreach ($column in $DataTable.Columns)
{
$sqlDbType = [Microsoft.SqlServer.Management.Smo.SqlDataType]"$(Get-SqlType $column.DataType.Name)"
if ($sqlDbType -eq 'VarBinary' -or $sqlDbType -eq 'VarChar')
{
if ($MaxLength -gt 0)
{$dataType = new-object ("Microsoft.SqlServer.Management.Smo.DataType") $sqlDbType, $MaxLength}
else
{ $sqlDbType = [Microsoft.SqlServer.Management.Smo.SqlDataType]"$(Get-SqlType $column.DataType.Name)Max"
$dataType = new-object ("Microsoft.SqlServer.Management.Smo.DataType") $sqlDbType
}
}
else
{ $dataType = new-object ("Microsoft.SqlServer.Management.Smo.DataType") $sqlDbType }
$col = new-object ("Microsoft.SqlServer.Management.Smo.Column") $table, $column.ColumnName, $dataType
$col.Nullable = $column.AllowDBNull
$table.Columns.Add($col)
}
$table.Create()
}
catch {
$message = $_.Exception.GetBaseException().Message
Write-Error $message
}
} #Add-SqlTable
|
combined_dataset/train/non-malicious/sample_18_61.ps1 | sample_18_61.ps1 | #
# Module manifest for module 'OCI.PSModules.Apigateway'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apigateway.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6afcef29-4171-4ad7-a267-5ec2cf2367ad'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apigateway Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apigateway.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApigatewayApi', 'Get-OCIApigatewayApiContent',
'Get-OCIApigatewayApiDeploymentSpecification',
'Get-OCIApigatewayApisList', 'Get-OCIApigatewayApiValidations',
'Get-OCIApigatewayCertificate', 'Get-OCIApigatewayCertificatesList',
'Get-OCIApigatewayDeployment', 'Get-OCIApigatewayDeploymentsList',
'Get-OCIApigatewayGateway', 'Get-OCIApigatewayGatewaysList',
'Get-OCIApigatewaySdk', 'Get-OCIApigatewaySdkLanguageTypesList',
'Get-OCIApigatewaySdksList', 'Get-OCIApigatewaySubscriber',
'Get-OCIApigatewaySubscribersList', 'Get-OCIApigatewayUsagePlan',
'Get-OCIApigatewayUsagePlansList', 'Get-OCIApigatewayWorkRequest',
'Get-OCIApigatewayWorkRequestErrorsList',
'Get-OCIApigatewayWorkRequestLogsList',
'Get-OCIApigatewayWorkRequestsList',
'Move-OCIApigatewayApiCompartment',
'Move-OCIApigatewayCertificateCompartment',
'Move-OCIApigatewayDeploymentCompartment',
'Move-OCIApigatewayGatewayCompartment',
'Move-OCIApigatewaySubscriberCompartment',
'Move-OCIApigatewayUsagePlanCompartment', 'New-OCIApigatewayApi',
'New-OCIApigatewayCertificate', 'New-OCIApigatewayDeployment',
'New-OCIApigatewayGateway', 'New-OCIApigatewaySdk',
'New-OCIApigatewaySubscriber', 'New-OCIApigatewayUsagePlan',
'Remove-OCIApigatewayApi', 'Remove-OCIApigatewayCertificate',
'Remove-OCIApigatewayDeployment', 'Remove-OCIApigatewayGateway',
'Remove-OCIApigatewaySdk', 'Remove-OCIApigatewaySubscriber',
'Remove-OCIApigatewayUsagePlan', 'Stop-OCIApigatewayWorkRequest',
'Update-OCIApigatewayApi', 'Update-OCIApigatewayCertificate',
'Update-OCIApigatewayDeployment', 'Update-OCIApigatewayGateway',
'Update-OCIApigatewaySdk', 'Update-OCIApigatewaySubscriber',
'Update-OCIApigatewayUsagePlan'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apigateway'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3451.ps1 | 3451.ps1 |
function Test-GetNonExistingDataFactory
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
Assert-ThrowsContains { Get-AzDataFactory -ResourceGroupName $rgname -Name $dfname } "ResourceNotFound"
}
function Test-CreateDataFactory
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
try
{
$actual = New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
$expected = Get-AzDataFactory -ResourceGroupName $rgname -Name $dfname
Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual $expected.DataFactoryName $actual.DataFactoryName
}
finally
{
Clean-DataFactory $rgname $dfname
}
}
function Test-DeleteDataFactoryWithDataFactoryParameter
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
$df = New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
Remove-AzDataFactory -DataFactory $df -Force
}
function Test-DataFactoryPiping
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
Get-AzDataFactory -ResourceGroupName $rgname | Remove-AzDataFactory -Force
Assert-ThrowsContains { Get-AzDataFactory -ResourceGroupName $rgname -Name $dfname } "ResourceNotFound"
} |
combined_dataset/train/non-malicious/171.ps1 | 171.ps1 | Function Test-ADCredential {
Param($username, $password, $domain)
Add-Type -AssemblyName System.DirectoryServices.AccountManagement
$ct = [System.DirectoryServices.AccountManagement.ContextType]::Domain
$pc = New-Object System.DirectoryServices.AccountManagement.PrincipalContext($ct, $domain)
New-Object PSObject -Property @{
UserName = $username;
IsValid = $pc.ValidateCredentials($username, $password).ToString()
}
}
|
combined_dataset/train/non-malicious/1811.ps1 | 1811.ps1 |
Describe "Get-Item" -Tags "CI" {
BeforeAll {
if ( $IsWindows ) {
$skipNotWindows = $false
}
else {
$skipNotWindows = $true
}
}
It "Should list all the items in the current working directory when asterisk is used" {
$items = Get-Item (Join-Path -Path $PSScriptRoot -ChildPath "*")
,$items | Should -BeOfType 'System.Object[]'
}
It "Should return the name of the current working directory when a dot is used" {
$item = Get-Item $PSScriptRoot
$item | Should -BeOfType 'System.IO.DirectoryInfo'
$item.Name | Should -BeExactly (Split-Path $PSScriptRoot -Leaf)
}
It "Should return the proper Name and BaseType for directory objects vs file system objects" {
$rootitem = Get-Item $PSScriptRoot
$rootitem | Should -BeOfType 'System.IO.DirectoryInfo'
$childitem = (Get-Item (Join-Path -Path $PSScriptRoot -ChildPath Get-Item.Tests.ps1))
$childitem | Should -BeOfType 'System.IO.FileInfo'
}
It "Using -literalpath should find no additional files" {
$null = New-Item -type file "$TESTDRIVE/file[abc].txt"
$null = New-Item -type file "$TESTDRIVE/filea.txt"
$item = Get-Item -literalpath "$TESTDRIVE/file[abc].txt"
@($item).Count | Should -Be 1
$item.Name | Should -BeExactly 'file[abc].txt'
}
It "Should have mode flags set" {
Get-ChildItem $PSScriptRoot | foreach-object { $_.Mode | Should -Not -BeNullOrEmpty }
}
It "Should not return the item unless force is used if hidden" {
${hiddenFile} = "${TESTDRIVE}/.hidden.txt"
${item} = New-Item -type file "${hiddenFile}"
if ( ${IsWindows} ) {
attrib +h "$hiddenFile"
}
${result} = Get-Item "${hiddenFile}" -ErrorAction SilentlyContinue
${result} | Should -BeNullOrEmpty
${result} = Get-Item -force "${hiddenFile}" -ErrorAction SilentlyContinue
${result}.FullName | Should -BeExactly ${item}.FullName
}
It "Should get properties for special reparse points" -skip:$skipNotWindows {
$result = Get-Item -Path $HOME/Cookies -Force
$result.LinkType | Should -BeExactly "Junction"
$result.Target | Should -Not -BeNullOrEmpty
$result.Name | Should -BeExactly "Cookies"
$result.Mode | Should -BeExactly "l--hs"
$result.Exists | Should -BeTrue
}
It "Should return correct result for ToString() on root of drive" {
$root = $IsWindows ? "${env:SystemDrive}\" : "/"
(Get-Item -Path $root).ToString() | Should -BeExactly $root
}
Context "Test for Include, Exclude, and Filter" {
BeforeAll {
${testBaseDir} = "${TESTDRIVE}/IncludeExclude"
$null = New-Item -Type Directory "${testBaseDir}"
$null = New-Item -Type File "${testBaseDir}/file1.txt"
$null = New-Item -Type File "${testBaseDir}/file2.txt"
}
It "Should respect -Exclude" {
$result = Get-Item "${testBaseDir}/*" -Exclude "file2.txt"
($result).Count | Should -Be 1
$result.Name | Should -BeExactly "file1.txt"
}
It "Should respect -Include" {
$result = Get-Item "${testBaseDir}/*" -Include "file2.txt"
($result).Count | Should -Be 1
$result.Name | Should -BeExactly "file2.txt"
}
It "Should respect -Filter" {
$result = Get-Item "${testBaseDir}/*" -Filter "*2*"
($result).Count | Should -Be 1
$result.Name | Should -BeExactly "file2.txt"
}
It "Should respect combinations of filter, include, and exclude" {
$result = get-item "${testBaseDir}/*" -filter *.txt -include "file[12].txt" -exclude file2.txt
($result).Count | Should -Be 1
$result.Name | Should -BeExactly "file1.txt"
}
}
Context "Error Condition Checking" {
It "Should return an error if the provider does not exist" {
{ Get-Item BadProvider::/BadFile -ErrorAction Stop } | Should -Throw -ErrorId "ProviderNotFound,Microsoft.PowerShell.Commands.GetItemCommand"
}
It "Should return an error if the drive does not exist" {
{ Get-Item BadDrive:/BadFile -ErrorAction Stop } | Should -Throw -ErrorId "DriveNotFound,Microsoft.PowerShell.Commands.GetItemCommand"
}
}
Context "Alternate Stream Tests" {
BeforeAll {
if ( $skipNotWindows )
{
return
}
$altStreamPath = "$TESTDRIVE/altStream.txt"
$stringData = "test data"
$streamName = "test"
$item = new-item -type file $altStreamPath
Set-Content -path $altStreamPath -Stream $streamName -Value $stringData
}
It "Should find an alternate stream if present" -skip:$skipNotWindows {
$result = Get-Item $altStreamPath -Stream $streamName
$result.Length | Should -Be ($stringData.Length + [Environment]::NewLine.Length)
$result.Stream | Should -Be $streamName
}
}
Context "Registry Provider" {
It "Can retrieve an item from registry" -skip:$skipNotWindows {
${result} = Get-Item HKLM:/Software
${result} | Should -BeOfType "Microsoft.Win32.RegistryKey"
}
}
Context "Environment provider" -tag "CI" {
BeforeAll {
$env:testvar="b"
$env:testVar="a"
}
AfterAll {
Clear-Item -Path env:testvar -ErrorAction SilentlyContinue
Clear-Item -Path env:testVar -ErrorAction SilentlyContinue
}
It "get-item testVar" {
(get-item env:\testVar).Value | Should -BeExactly "a"
}
It "get-item is case-sensitive/insensitive as appropriate" {
$expectedValue = "b"
if($IsWindows)
{
$expectedValue = "a"
}
(get-item env:\testvar).Value | Should -BeExactly $expectedValue
}
}
}
Describe "Get-Item environment provider on Windows with accidental case-variant duplicates" -Tags "Scenario" {
BeforeAll {
$env:testVar = 'a'
}
AfterAll {
$env:testVar = $null
}
It "Reports the effective value among accidental case-variant duplicates on Windows" -skip:$skipNotWindows {
if (-not (Get-Command -ErrorAction Ignore node.exe)) {
Write-Warning "Test skipped, because prerequisite Node.js is not installed."
} else {
$valDirect, $valGetItem, $unused = node.exe -pe @"
env = {}
env.testVar = process.env.testVar // include the original case variant with its original value.
env.TESTVAR = 'b' // redefine with a case variant name and different value
// Note: Which value will win is not deterministic(!); what matters, however, is that both
// $env:testvar and Get-Item env:testvar report the same value.
// The nondeterministic behavior makes it hard to prove that the values are *always* the
// same, however.
require('child_process').execSync(\"\\\"$($PSHOME -replace '\\', '/')/pwsh.exe\\\" -noprofile -command `$env:testvar, (Get-Item env:testvar).Value\", { env: env }).toString()
"@
$valGetItem | Should -BeExactly $valDirect
}
}
}
|
combined_dataset/train/non-malicious/2424.ps1 | 2424.ps1 | [CmdletBinding()]
param(
[Parameter(Mandatory)]
[string[]]$ComputerName,
[Parameter(Mandatory)]
[pscredential]$Credential
)
$Header = @"
<style>
table {
font-family: "Trebuchet MS", Arial, Helvetica, sans-serif;
border-collapse: collapse;
width: 100%;
}
th {
padding-top: 12px;
padding-bottom: 12px;
text-align: left;
background-color:
color: white;
}
</style>
"@
$scriptBlock = {
$output = @{
'ServerName' = (hostname)
'IPAddress' = $null
'OperatingSystem' = $null
'AvailableDriveSpace (GB)' = $null
'Memory (GB)' = $null
'UserProfilesSize (MB)' = $null
'StoppedServices' = $null
}
$userProfileSize = (Get-ChildItem -Path 'C:\Users' -File -Recurse | Measure-Object -Property Length -Sum).Sum
$output.'UserProfilesSize (MB)' = [math]::Round($userProfileSize / 1GB, 1)
$output.'IPAddress' = (Get-CimInstance -ClassName Win32_NetworkAdapterConfiguration -Filter "IPEnabled = 'True'").IPAddress[0]
$output.'OperatingSystem' = (Get-CimInstance -ClassName Win32_OperatingSystem).Caption
$output.'Memory (GB)' = (Get-CimInstance -ClassName Win32_PhysicalMemory | Measure-Object -Property Capacity -Sum).Sum /1GB
$output.'AvailableDriveSpace (GB)' = (Get-CimInstance -ClassName Win32_LogicalDisk |
Select-Object -Property DeviceID, @{Name='FreeSpace'; Expression={ [Math]::Round(($_.Freespace / 1GB), 1) } } |
Measure-Object -Property FreeSpace -Sum).Sum
$output.'StoppedServices' = (Get-Service | Where-Object { $_.Status -eq 'Stopped' } | Measure-Object).Count
[pscustomobject]$output
}
$icmParams = @{
ComputerName = $ComputerName
ScriptBlock = $scriptBlock
Credential = $Credential
}
$report = Invoke-Command @icmParams | Select-Object -Property * -ExcludeProperty 'RunspaceId','PSComputerName','PSShowComputerName' | ConvertTo-Html -Fragment
ConvertTo-HTML -PreContent "<h1>Server Information Report</h1>" -PostContent $report -Head $Header | Out-File ServerReport.html
Invoke-Item ServerReport.html
|
combined_dataset/train/non-malicious/sample_9_12.ps1 | sample_9_12.ps1 | #************************************************
# RS_BPAinfo.ps1
# 2023-02-20 WalterE mod Trap #we#
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
. ./utils_cts.ps1
SkipSecondExecution
if($debug -eq $true){[void]$shell.popup("Run RS_BPAInfo.ps1")}
$BPAXMLFile = [System.IO.Path]::GetFullPath($PWD.Path + ("\..\BPAResults.XML"))
if($debug -eq $true){[void]$shell.popup("BPAXMLFile: " + $BPAXMLFile)}
if (Test-Path $BPAXMLFile) {
[xml] $XMLResults = Get-Content -Path $BPAXMLFile
$BPAModels = $XMLResults.SelectNodes("(//BPAModel[Object[(Property[@Name=`'Severity`'] = `'Warning`') or (Property[@Name=`'Severity`'] = `'Error`')]])")
$X = 0
ForEach ($BPAModel in $BPAModels){
forEach ($Object in $BPAModel.SelectNodes("(Object[(Property[@Name=`'Severity`'] = `'Warning`') or (Property[@Name=`'Severity`'] = `'Error`')])")){
$X += 1
$BPAMSG_Summary = new-object PSObject
add-member -inputobject $BPAMSG_Summary -membertype noteproperty -name "Category" -value $Object.SelectSingleNode("Property[@Name='Category']").InnerText
add-member -inputobject $BPAMSG_Summary -membertype noteproperty -name "Source" -value ($BPAModel.ReportTitle)
add-member -inputobject $BPAMSG_Summary -membertype noteproperty -name "Resolution" -value $Object.SelectSingleNode("Property[@Name='Resolution']").InnerText
add-member -inputobject $BPAMSG_Summary -membertype noteproperty -name "Additional Information" -value ("<a target=`"_blank`" href = `"" + $Object.SelectSingleNode("Property[@Name='Help']").InnerText + "`">" + $Object.SelectSingleNode("Property[@Name='Help']").InnerText + "</a>")
$BPAMSG_Summary | ConvertTo-Xml2 | update-diagreport -ID ($X.ToString() + "_BPA") -name $Object.SelectSingleNode("Property[@Name='Problem']").InnerText -verbosity $Object.SelectSingleNode("Property[@Name='Severity']").InnerText
}
$MoreInfo_Summary = new-object PSObject
$MoreInfoMsg = "Please open the <a href= `"`#" + $BPAModel.OutputFileName + "`">" + ($BPAModel.ReportTitle) + "</a> report for more information. You can calso go to the internal web site <a target=`"_blank`" href=`"http://winbpa`">http://winbpa</a> to submit a BPA rule suggestion."
add-member -inputobject $MoreInfo_Summary -membertype noteproperty -name "Message" -value $MoreInfoMsg
$MoreInfo_Summary | ConvertTo-Xml2 | update-diagreport -ID ($X.ToString() + "ZZ_BPA") -name "More Information" -verbosity "Informational"
}
Remove-Item $BPAXMLFile
}
if($debug -eq $true){[void]$shell.popup("RS_BPAInfo.ps1 finished")}
# SIG # Begin signature block
# MIIoUQYJKoZIhvcNAQcCoIIoQjCCKD4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3gx0bZLhuL7zo
# X+FAxZ+cVw4ofw8DqpU6uFQ5Kn+k1KCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPdn
# HVhfw0R2w0g8oqZapK8WNGsaNkYjIANA6tQ5kMzEMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAjvomPzOL2I5C2L6dDQfCtLcKDS6MMhSvqXuR
# MLxxmOirxaJSJ85qPaQVs6wem0c7H8ls+JOS9wEkhkYprgNzfn6suxoGROBH0tqj
# biB0UZBQV5F8T/P2BhIPZhSl/d5EAsiFC99SP0s9tpRQ9pRIIz/9zV8ljo+VvpiM
# j9U9+daDZ8lnUv60THSwjaK75onP3D0T4fFB61W/QEd/lXnQwBhEw+XFOrrKkB3b
# nvA7YlgJ0Jl9WJOm4Vv5DxIDuHXLwbl6s6FT3J7Tp3MRHmzCk+mBeYZGhEfUjXaA
# Faqb1lG7TrkkVh3mjbrghblH5PxDxAvOoGUNXMr4Tak+OXBuhqGCF6wwgheoBgor
# BgEEAYI3AwMBMYIXmDCCF5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCB4u+D56HUmByx4fo09+FabVqYBFi2JbDt7
# Fyjg3Kx9fgIGZus6esnlGBIyMDI0MTAyODExNDA0Mi43MVowBIACAfSggdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAH5H2eN
# dauk8bEAAQAAAfkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjQwNzI1MTgzMTA5WhcNMjUxMDIyMTgzMTA5WjCB0zELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MkExQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC0
# PUwffIAdYc1WyUL4IFOP8yl3nksM+1CuE3tZ6oWFF4L3EpdKOhtbVkfMdTxXYE4l
# SJiDt8MnYDEZUbKi9S2AZmDb4Zq4UqTdmOOwtKyp6FgixRCuBf6v9UBNpbz841bL
# qU7IZnBmnF9XYRfioCHqZvaFp0C691tGXVArW18GVHd914IFAb7JvP0kVnjks3am
# zw1zXGvjU3xCLcpUkthfSJsRsCSSxHhtuzMLO9j691KuNbIoCNHpiBiFoFoPETYo
# MnaxBEUUX96ALEqCiB0XdUgmgIT9a7L0y4SDKl5rUd6LuUUa90tBkfkmjZBHm43y
# GIxzxnjtFEm4hYI57IgnVidGKKJulRnvb7Cm/wtOi/TIfoLkdH8Pz4BPi+q0/nsh
# NewP0M86hvy2O2x589xAl5tQ2KrJ/JMvmPn8n7Z34Y8JxcRih5Zn6euxlJ+t3kMc
# zii8KYPeWJ+BifOM6vLiCFBP9y+Z0fAWvrIkamFb8cbwZB35wHjDvAak6EdUlvLj
# iQZUrwzNj2zfYPLVMecmDynvLWwQbP8DXLzhm3qAiwhNhpxweEEqnhw5U2t+hFVT
# HYb/ROvsOTd+kJTy77miWo8/AqBmznuOX6U6tFWxfUBgSYCfILIaupEDOkZfKTUe
# 80gGlI025MFCTsUG+75imLoDtLZXZOPqXNhZUG+4YQIDAQABo4IBSTCCAUUwHQYD
# VR0OBBYEFInto7qclckj16KPNLlCRHZGWeAAMB8GA1UdIwQYMBaAFJ+nFV0AXmJd
# g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z
# b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt
# ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l
# AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA
# A4ICAQBmIAmAVuR/uN+HH+aZmWcZmulp74canFbGzwjv29RvwZCi7nQzWezuLAbY
# Jx2hdqrtWClWQ1/W68iGsZikoIFdD5JonY7QG/C4lHtSyBNoo3SP/J/d+kcPSS0f
# 4SQS4Zez0MEvK3vWK61WTCjD2JCZKTiggrxLwCs0alI7N6671N0mMGOxqya4n7ar
# lOOauAQrI97dMCkCKjxx3D9vVwECaO0ju2k1hXk/JEjcrU2G4OB8SPmTKcYX+6LM
# /U24dLEX9XWSz/a0ISiuKJwziTU8lNMDRMKM1uSmYFywAyXFPMGdayqcEK3135R3
# 1VrcjD0GzhxyuSAGMu2De9gZhqvrXmh9i1T526n4u5TR3bAEMQbWeFJYdo767bLp
# KLcBo0g23+k4wpTqXgBbS4NZQff04cfcSoUe1OyxldoM6O3JGBuowaaR/wojeohU
# FknZdCmeES5FuH4CCmZGf9rjXQOTtW0+Da4LjbZYsLwfwhWT8V6iJJLi8Wh2GdwV
# 60nRkrfrDEBrcWI+AF5tFbJW1nvreoMPPENvSYHocv0cR9Ns37igcKRlrUcqXwHS
# zxGIUEx/9bv47sQ9n7AwfzB2SNntJux1211GBEBGpHwgU9a6tD6yft+0SJ9qiPO4
# IRqFIByrzrKPBB5M831gb1vfhFO6ueSkP7A8ZMHVZxwymwuUzTCCB3EwggVZoAMC
# AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m
# dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy
# NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9
# DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2
# Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N
# 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc
# ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ
# j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk
# lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy
# L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M
# 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX
# pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU
# HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode
# 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA
# ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE
# FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB
# MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE
# AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB
# /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv
# b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt
# 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP
# MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++
# Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9
# QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2
# wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR
# AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z
# bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx
# t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3
# Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN
# uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z
# cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCqzlaNY7vNUAqY
# hx3CGqBm/KnpRqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MA0GCSqGSIb3DQEBCwUAAgUA6snJlzAiGA8yMDI0MTAyODA4MjgwN1oYDzIwMjQx
# MDI5MDgyODA3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqycmXAgEAMAcCAQAC
# AgheMAcCAQACAhNxMAoCBQDqyxsXAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG
# AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD
# ggEBABl2r45TbcRpRyHBC7Tfm1IOcpmVr24Oj3iI4YxR9hIegjEBKx/eOzYN7DEj
# OwXPW3wQtuz/tX5v6UtnblQPLlaEy4BpQXQMEroPYmeyPIlVJtxz7jyPpn/sWHzj
# L2RPxzkdRgvmQXY0mKqAco1FMt1mocHjYjhtX9/Pz8Ob/b0Zb4NHYgZhKy8vZ7vY
# C9+kq1Rk73hZ+e9FUC7grAeUiYZF3fQlSJbSoUEO+YDXbACDwUn/6aTqeEmMSlSq
# eshWE6pNkTQjkYmJUnJ0AWlYZB43BaKARszkCW9KuDKhAyGdqBFX8EeGOmEWAYS7
# o4XMf6DpsGJS78GyaWh0zj3NACAxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfkfZ411q6TxsQABAAAB+TANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCDhcmpYN8UJqsOnIhnfAC1usdc9vfDX9Ha0LqnjUXIkUDCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EIDkjjMge8I37ZPrpFQ4sJmtQRV2gqUqXxV4I7lJs
# YtgQMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH5
# H2eNdauk8bEAAQAAAfkwIgQgJmu+NOFPuWOF/KqubUTlJN0adLdAcytn+UUcmQcH
# ut0wDQYJKoZIhvcNAQELBQAEggIAFqyTTG8SZ/2/eo2Xtb+cZBfRKmsBS2ByysV3
# 2JIT4IqPyOtW8l9+xYg0qriYP4DngsehKLnDjs7YGKtQ5RZD1otD9bnUoZxeKVLJ
# sdrupibn+Qr9Qxuzmb14Ak0RFoGfgKdnAyl6IV5OTVu8w5rk+eZ3NizSOD31QgME
# mKZNdIM9ThznynphBYw7pEDW6QCPLFRJnSsx6gBAU4/vMPR0eJI2+xTzcXWOZXqV
# 4Q7kE8hBwlyooQgglYcgI3nla7Mdy9Le+Eh4d0fRcs14qKdoh/LLa3Fsp1dvFNpS
# laQB9E7/Qapz0IZd7b3o9IGJTAdT02zIoyhXCGtc+yYN9DBVZhev1eRvf/53CvTz
# H87Ttdpl6wpS5CDavBjTtaNTKUeIErQCjSGVv8hi0M4salWlv+9s5XxFZ7h+BKXA
# pL4M5yDx977SLHyjKVxqA2SXsoC2WyCk4LQIXqSgzzcYRYET0juUNuSDOtjJey4a
# HQAABeglbCh0sIK6FlCeHlPYHWq/k6BmDyjq5r8tIaTpF1QgOo9QN2XnyJybTjzi
# JgUUbsrDmylu7nFs5TZyP+eYndJU6I9ETimXKeXz4hRSj0sPCHiU6W79LoXxXv0g
# 6TVpLud8nj+pY7/3P18CjKF2bPtQRXUgvYTORn1wCJzpJ4o+K5ZRjm62xHAibyUx
# tNTNOPE=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_9_58.ps1 | sample_9_58.ps1 | # 2023-02-24 WalterE mod Trap #we#
$startTime_AutoAdd = Get-Date
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: common ---"
# version of the psSDP Diagnostic - "_psSDP_DiagnosticVersion.TXT"
Run-DiagExpression .\DC_NetworkingDiagnostic.ps1
# MSInfo
Run-DiagExpression .\DC_MSInfo.ps1
# Obtain pstat output
Run-DiagExpression .\DC_PStat.ps1
# CheckSym
Run-DiagExpression .\DC_ChkSym.ps1
# AutoRuns Information
Run-DiagExpression .\DC_Autoruns.ps1
# Collects Windows Server 2008/R2 Server Manager Information
Run-DiagExpression .\DC_ServerManagerInfo.ps1
# List Schedule Tasks using schtasks.exe utility
Run-DiagExpression .\DC_ScheduleTasks.ps1
# Collect Machine Registry Information for Setup and Performance Diagnostics
Run-DiagExpression .\DC_RegistrySetupPerf.ps1
# GPResults.exe Output
Run-DiagExpression .\DC_RSoP.ps1
# Basic System Information
Run-DiagExpression .\DC_BasicSystemInformation.ps1
# Basic System Information TXT output
Run-DiagExpression .\DC_BasicSystemInformationTXT.ps1
# Services
Run-DiagExpression .\DC_Services.ps1
# TaskListSvc
Run-DiagExpression .\DC_TaskListSvc.ps1
# User Rights (privileges) via the userrights.exe tool
Run-DiagExpression .\DC_UserRights.ps1
# WhoAmI
Run-DiagExpression .\DC_Whoami.ps1
# PoolMon
Run-DiagExpression .\DC_PoolMon.ps1
# Collects registry entries for KIR (for 2019) and RBC (for 2016)
Run-DiagExpression .\DC_KIR-RBC-RegEntries.ps1
#_# Collect summary report
Run-DiagExpression .\DC_SummaryReliability.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Network ---"
Run-DiagExpression .\DC_Get_Network.ps1
Run-DiagExpression .\DC_Firewall-Component.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: SVUP ---"
#Event Logs - System & Application logs
$EventLogNames = "System", "Application", "Security"
Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -Days 15
Run-DiagExpression .\TS_Virtualization.ps1
# WMI Query to Security Center
Run-DiagExpression .\DC_WMISecurityCenter.ps1
Run-DiagExpression .\DC_EnvVars.ps1
#_# Run-DiagExpression .\DC_Office_Inventory.ps1 -> ROIscan
Run-DiagExpression .\DC_ROIScan.ps1
#Run Query_Registry. This collects all of the HKLM txt files
Run-DiagExpression .\DC_Query_Registry.ps1
#Run-DiagExpression .\DC_RegistryFEPClient.ps1
Run-DiagExpression .\DC_Reg_ACLs.ps1
Run-DiagExpression .\DC_Dirs.ps1
#Run-DiagExpression .\DC_Driver_Dir.ps1
Run-DiagExpression .\DC_FileVersions.ps1
Run-DiagExpression .\DC_Handle.ps1
Run-DiagExpression .\DC_Hardware.ps1
Run-DiagExpression .\DC_Disk_Quota.ps1
Run-DiagExpression .\DC_Certificates.ps1
Run-DiagExpression .\DC_Get-Files.ps1
#_# Run-DiagExpression .\DC_Checksym.ps1 #see common DC_ChkSym
Run-DiagExpression .\DC_WGADiag.ps1
Run-DiagExpression .\DC_File_ACLs.ps1
Run-DiagExpression .\DC_ClassRegistration.ps1
Run-DiagExpression .\DC_Descriptors.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Setup ---"
# Fltmc
Run-DiagExpression .\DC_Fltmc.ps1
# Obtain information about Upper and lower filters Information fltrfind.exe utility
Run-DiagExpression .\DC_Fltrfind.ps1
# Collects Windows and ConfigMgr OSD Logs #_# added 2021.12.08
Run-DiagExpression .\DC_CollectWindowsLogs.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Update ---"
# Update History
Run-DiagExpression .\DC_UpdateHistory.ps1
# Collect WindowsUpdate.Log
Run-DiagExpression .\DC_WindowsUpdateLog.ps1
# Hotfix Rollups
Run-DiagExpression .\DC_HotfixRollups.ps1
$stopTime_AutoAdd = Get-Date
$duration = $(New-TimeSpan -Start $startTime_AutoAdd -End $stopTime_AutoAdd)
Write-Host "*** $(Get-Date -UFormat "%R:%S") DONE (Dur: $duration) TS_AutoAddCommands_SUVP.ps1 SkipTS: $Global:skipTS - SkipBPA: $Global:skipBPA"
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBBkEy1s/nDxwCH
# b5UIAtESJoBlvZU+hpwI4mgUqeisnqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDSY
# EdyOipEbew3pvVcQ7yFXfGZXIbPBiTK+A1ag4xqxMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAGEv/d+i1rO8x16k458wjeVbk6/jqoEmq+GEG
# WUu6uy4pM8eQtmLZcSkS7mgD3ZCYo4BAkYi05KVk5iGlqEcJ3r1jReaZAPxh+dG+
# 9tGrC/iqaQUAdu80iPqoHkK9tqPtP/z6Y9jA8wx1dzzQBmkW9LIAQQ/2ju1GNaE1
# sefM/zZdNbYcqou2WiohmOYLRUfzYLaAxuK+dgQS5ZNuCaPg2IKmTWwHLn4CeLa8
# 3/GwzjC4Bbd53SqGIjdoViD6D28zXavfHzwHwLLH4Px+TtR50Df/kHz0ZJuEntEk
# NpxtfGAuNLeqAb0yFld4aIMgpCjyEgCIYSyQf2k59Wf6OJnh0aGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCACetCs1cAW53qFcbvNXktcEmopAbnPCU+u
# +jIwEqNnswIGZut4BYxUGBMyMDI0MTAyODExNDAzOS45OTFaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ
# lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38
# 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC
# fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D
# cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA
# ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT
# M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB
# Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo
# u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0
# PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88
# 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv
# eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/
# 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4
# Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6
# I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa
# QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV
# 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS
# s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5
# WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q
# 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK
# CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi
# TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y
# Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0
# MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA
# AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3
# UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS
# TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3
# FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO
# RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB
# NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgAMh8TZUztYpd2o8x14YTy6JLiuTJcLSaLGgBP7Ev+78wgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT
# hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1
# KYILMA0GCSqGSIb3DQEBCwUABIICAECrfNCmmQeE7Z2PBSejskaBvk0ILD7afAE+
# Q9OKlQM6ND5B8QyNjBEETgXYuJEVEYOHbuFbvjWacPeB6gy1iJ+aPPBciyRub5Gb
# zt791rpzwL95OBX1f8wAMzLxCHIpJTX3ufaxOhwPPKLjni0UzQOcH+iEIyERhu0n
# 8qEE8DbMGG4kV3xmx3Xobq4jAj6QtRIOeQot7ManO8Wa7taZmOvPM4/Mg2dwyzAt
# rIpE1z5d1PVDP3o3mb5Ah6QF63Xzr1fi/RXWugASiX3T0QHPCR5Svag843vy9ZdS
# A8Rdidrz61rw/crCiu9lhwF7eCYvFp8Qlzppn0q7Mu7T/Zt52AXASqWkAzhbw+7f
# pZoXhteUnCIk18qT8e8mZ947HpEIMNU8LUypb1VTpVPS+ZEkW4kz4YJPUbaQNFv7
# 90rrysIsnKT7d1wzHJdlc+RRY+mVBSQVofRlQQ/dgoPmiRLSIQVlVtygKBOkvB5y
# 8uA2zW7c43XAtFi69UDpq+b9GFB9N3GOg58/1dmcQszUKT7W5o+27f8/ebs3uW27
# w2sXv2B6eekHbhuM/Cs6CCuCeOC8Uh9rJE+AY+GpMwgTgFWjVQErejWc5M2XM/w/
# 0buKn0OMiCa9gEq++CKKenI8+dPP00TXcHLWshrT57XPn+c2rJ0sIdL9myg8IQcT
# P+HKQ3GU
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_9_57.ps1 | sample_9_57.ps1 | ConvertFrom-StringData @'
id_ctssnmp=SNMP
id_ctssnmpdescription=Collects information about SNMP.
'@
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBZJek0Hywgv+/D
# JUzKZik4sZZw4iybPYizGaWFX5prw6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGKW
# kf4ybRdkxQaz/K2TF677uweqfyxthAmOdsj8Q/MYMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAEo1S80MZhMhvroviMtghSbnBE0BU9bYF3eWu
# OPkcMcaVML8Yt64ieZXRgrPK2lLwCkTcPMF/XqrWQ2e3sf9Ko7hgwW7q81BfZKHW
# Kta54G4+DX1lEkqlKRM0qzlmOQDvPNAhCeV+XdZQvymzsZpXshhwUWuEnGpaS3x3
# pRJLISROZJ12n6WsgSowqoER6oCfpfeYHWrDz2HOvmSUdxe+3eqtpAm5FTqj+0sQ
# GrhNqxekySM7mLmrV9J3z5VwdUkLDCwQ/yzoOfb5YxPOtMb6EptgHQ0QeYereVOD
# PD1iE6q7KKsZr/yWNbWEuSRPjlwGbO/WKFwQXy7WntEDWnhr0KGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAfq46u5yOQrIIOjCUNLdCFPtOLPq6O9qSu
# jBXC8495AgIGZxp1kNxDGBMyMDI0MTAyODExNDA0My4yMzNaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgAB
# AAAB6TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yr
# APJnV6A7aZYnTw/yx90u1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZ
# Y5O8PCBu7Gq+x5Xe6plQt4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7L
# MpKwIKQMwXDctYKvCyQy6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5Mx
# ylRdTS7E1Jocl30NgcBiJfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9d
# xsyvng0lUVY+urq/G8QRFoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTp
# w2I6ZWaIhPwMu5DvdkEGzV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0
# VJBSGV+h66ZcaUJOxpbSIjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDC
# xHG4mW3mpNQopM/U1WJnjssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOa
# mGfwvkIe7dkylzm8BeAUQC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKF
# I30u9YlxDTzAuLDK073cndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022
# +yPwclmykssk30a4Rp3v9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYj
# uIj0Wuv+jcjtB+xOMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe6
# 1AE90Ken2XPgQHJDiS4SbLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz
# /HciZooyeoAvkHQaHmLhwBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20
# QpHDEukwKR8kfaBEX83AyvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQg
# eEBr8E4K2wQ2WXI/ZJxZS/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/Jnj
# XMChnm9bLDD1waJ7TPp5wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6
# QjegHzndX/tZrY792dfRAXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWG
# XYJL5H6LNnKyXJVEw/1FbO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsH
# ptAvREqCc+/YxzhIKkA88Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFv
# NRhh8ZBAenn1pW+5UBGYz2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMl
# PG3YjuqFxidiIsoAw2+MhI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2j
# JWgq7VlBuP1BuXjZ3qgym9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCraYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAi
# GA8yMDI0MTAyODA0MjY1NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyZEPAgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHt
# BHop/3nnFpjQj8V83hqU5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9x
# vEgbrAR5K6X+m/0UulYtn4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9M
# pP5gv2jcKAx6bUdU1GWpun+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC
# 5l3l2pWNTP/uI425dd/qlyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRc
# vA2b/9gGyJGQQ0VcBEldHI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekP
# cTB+XfESNgABAAAB6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDjLAVHBUQnZ9p830JPkz1g8/pP
# 0THDOnQjsZLI8gQ1ZTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniX
# aTcmj1TKQWF+x2U4riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5
# BbZ0l6HNgYtnviUBT9VncdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIABg0J
# b15Vhz4RxWBnsuxqjUyaDd/509IOY+CyBn1F7vzYW6mf0xW60vx1b4uArPeI0Idt
# HF8OUPbe4jZsMgf4aWnb1sP3swNtmdFUcm4u4H/eNbGm/oZ8iyiqfOVbsf9FrkXf
# mkYJql9IGymoQiPGyokfWw5oFAOjljyE3AoZ23i8Rt6KcmX3I5+OowQJ+pulmlDR
# BHANcbZbHq5yOlb+ek556BnTyAvsTJjaWXa7okJDG0lGpqeRgAg17v8ECMivlraA
# mkRR+jgTQa2KJN8DPPqjQb33/STfV30ujZoSvHRBwO2oSMU+7NF84lOZQsMiI53F
# SPOI/8gTAXtBerUwujKLGyAOT3dnurbPmO9hnm/gmLiVjrGD6eqaFmQ+SX95McE8
# 3VmqK+15vSsj7rSNJC8+4AFLF7x2ev61Ph16wUvdCisr7qaSOAJzYhL+b6ORJ6B6
# wx9AakUAIyyPN2/eTYr8pKBul3CEO61btO2CRBuXA1hkCvudkoG2vc/px5ILiTDY
# x600Hgy2yv6sTxyrzzW8V9emYbekQFy9gvku40gzEWU6CKqajL1FeVHuHjVjeYz3
# 9eaSSmwIL2owVb9VCsinlKKY6MP5Fa4o4Wm/pdgtgLhflEnYOxHkheHRuCEVXyQQ
# PBL5NAZWoOhTvpWqvLKkpZE3cU/D/2vCSkNv8nI=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4006.ps1 | 4006.ps1 |
$testReposInfo = @{
VsoGit = @{
Name = "AASourceControl-VsoGit"
RepoUrl = "https://francisco-gamino.visualstudio.com/_git/VsoGit-SwaggerAndCmdletsTests"
Branch = "preview"
FolderPath = "Azure/MyRunbooks"
SourceType = "VsoGit"
PersonalAccessToken = "3qdxa22lutnhezd4atpna74jn3m7wgo6o6kfbwezjfnvgbjhvoca"
}
VsoTfvc = @{
Name = "AASourceControl-VsoTfvc"
RepoUrl = "https://francisco-gamino.visualstudio.com/VsoTfvc-SwaggerAndCmdletsTests/_versionControl"
FolderPath = "/MyRunbooks"
SourceType = "VsoTfvc"
PersonalAccessToken = "3qdxa22lutnhezd4atpna74jn3m7wgo6o6kfbwezjfnvgbjhvoca"
}
GitHub = @{
Name = "AASourceControl-GitHub"
RepoUrl = "https://github.com/Francisco-Gamino/SwaggerAndCmdletsTests.git"
Branch = "master"
FolderPath = "/"
SourceType = "GitHub"
PersonalAccessToken = "5fd81166a9ebaebc60da4756f2094a598f1d4c01"
}
}
$resourceGroupName = "frangom-test"
$automationAccountName = "frangom-sdkCmdlet-tests"
function EnsureSourceControlDoesNotExist
{
Param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[String]
$Name
)
$sourceControl = Get-AzAutomationSourceControl -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $Name `
-ErrorAction SilentlyContinue
if ($sourceControl)
{
Remove-AzAutomationSourceControl -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $Name
}
}
function WaitForSourceControlSyncJobState
{
Param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[String]
$Name,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[Guid]
$JobId,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[String]
$ExpectedState
)
$waitTimeInSeconds = 2
$retries = 40
$jobCompleted = Retry-Function {
return (Get-AzAutomationSourceControlSyncJob -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $Name `
-JobId $JobId).ProvisioningState -eq $ExpectedState } $null $retries $waitTimeInSeconds
Assert-True {$jobCompleted -gt 0} "Timeout waiting for provisioning state to reach '$ExpectedState'"
}
function Test-CreateVsoGitSourceControlAndSync
{
$sourceControl = $testReposInfo["VsoGit"]
try
{
EnsureSourceControlDoesNotExist -Name $sourceControl.Name
$accessToken = ConvertTo-SecureString -String $sourceControl.PersonalAccessToken -AsPlainText -Force
$createdSourceControl = New-AzAutomationSourceControl -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-RepoUrl $sourceControl.RepoUrl `
-Branch $sourceControl.Branch `
-SourceType $sourceControl.SourceType `
-FolderPath $sourceControl.FolderPath `
-AccessToken $accessToken `
-DoNotPublishRunbook
Assert-NotNull $createdSourceControl "Failed to create VsoGit source control."
$propertiesToValidate = @("Name", "RepoUrl", "SourceType", "Branch", "FolderPath")
foreach ($property in $propertiesToValidate)
{
Assert-AreEqual $sourceControl.$property $createdSourceControl.$property `
"'$property' of created source control does not match. Expected:$($sourceControl.$property). Actual: $($createdSourceControl.$property)"
}
$updatedSourceControl = Update-AzAutomationSourceControl -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-PublishRunbook $true
$expectedPropertyValue = "True"
Assert-AreEqual $updatedSourceControl.PublishRunbook $expectedPropertyValue `
"'PublishRunbook' property does not match. Expected: $expectedPropertyValue. Actual: $($updatedSourceControl.PublishRunbook)"
$jobId = "0bfa6b49-c08c-4b2f-853e-08128c3c86ee"
Start-AzAutomationSourceControlSyncJob -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-JobId $jobId
WaitForSourceControlSyncJobState -Name $sourceControl.Name -JobId $jobId -ExpectedState Completed
$streams = Get-AzAutomationSourceControlSyncJobOutput -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-JobId $jobId `
-Stream Output | % Summary
Assert-True {$streams.count -gt 0} "Failed to get Output stream via Get-AzAutomationSourceControlSyncJobOutput "
}
finally
{
EnsureSourceControlDoesNotExist -Name $sourceControl.Name
}
}
function Test-CreateVsoTfvcSourceControlAndSync
{
$sourceControl = $testReposInfo["VsoTfvc"]
try
{
EnsureSourceControlDoesNotExist -Name $sourceControl.Name
$accessToken = ConvertTo-SecureString -String $sourceControl.PersonalAccessToken -AsPlainText -Force
$createdSourceControl = New-AzAutomationSourceControl -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-RepoUrl $sourceControl.RepoUrl `
-SourceType $sourceControl.SourceType `
-FolderPath $sourceControl.FolderPath `
-AccessToken $accessToken `
-DoNotPublishRunbook
Assert-NotNull $createdSourceControl "Failed to create VsoGit source control."
$propertiesToValidate = @("Name", "RepoUrl", "SourceType", "FolderPath")
foreach ($property in $propertiesToValidate)
{
Assert-AreEqual $sourceControl.$property $createdSourceControl.$property `
"'$property' of created source control does not match. Expected:$($sourceControl.$property) Actual: $($createdSourceControl.$property)"
}
$updatedSourceControl = Update-AzAutomationSourceControl -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-PublishRunbook $true
$expectedPropertyValue = "True"
Assert-AreEqual $updatedSourceControl.PublishRunbook $expectedPropertyValue `
"'PublishRunbook' property does not match. Expected: $expectedPropertyValue. Actual: $($updatedSourceControl.PublishRunbook)"
$jobId = "27dcdb17-1f65-42e9-9eeb-088a5f50eeb8"
Start-AzAutomationSourceControlSyncJob -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-JobId $jobId
WaitForSourceControlSyncJobState -Name $sourceControl.Name -JobId $jobId -ExpectedState Completed
$streams = Get-AzAutomationSourceControlSyncJobOutput -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-JobId $jobId `
-Stream Output | % Summary
Assert-True {$streams.count -gt 0} "Failed to get Output stream via Get-AzAutomationSourceControlSyncJobOutput "
}
finally
{
EnsureSourceControlDoesNotExist -Name $sourceControl.Name
}
}
function Test-CreateGitHubSourceControlAndSync
{
$sourceControl = $testReposInfo["GitHub"]
try
{
EnsureSourceControlDoesNotExist -Name $sourceControl.Name
$accessToken = ConvertTo-SecureString -String $sourceControl.PersonalAccessToken -AsPlainText -Force
$createdSourceControl = New-AzAutomationSourceControl -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-RepoUrl $sourceControl.RepoUrl `
-Branch $sourceControl.Branch `
-SourceType $sourceControl.SourceType `
-FolderPath $sourceControl.FolderPath `
-AccessToken $accessToken `
-DoNotPublishRunbook
Assert-NotNull $createdSourceControl "Failed to create VsoGit source control."
$propertiesToValidate = @("Name", "RepoUrl", "SourceType", "Branch", "FolderPath")
foreach ($property in $propertiesToValidate)
{
Assert-AreEqual $sourceControl.$property $createdSourceControl.$property `
"'$property' of created source control does not match. Expected:$($sourceControl.$property) Actual: $($createdSourceControl.$property)"
}
$updatedSourceControl = Update-AzAutomationSourceControl -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-PublishRunbook $true
$expectedPropertyValue = "True"
Assert-AreEqual $updatedSourceControl.PublishRunbook $expectedPropertyValue `
"'PublishRunbook' property does not match. Expected: $expectedPropertyValue. Actual: $($updatedSourceControl.PublishRunbook)"
$jobId = "f7dd56e6-0da3-442a-b1c5-3027065c7786"
Start-AzAutomationSourceControlSyncJob -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-JobId $jobId
WaitForSourceControlSyncJobState -Name $sourceControl.Name -JobId $jobId -ExpectedState Completed
$streams = Get-AzAutomationSourceControlSyncJobOutput -ResourceGroupName $resourceGroupName `
-AutomationAccountName $automationAccountName `
-Name $sourceControl.Name `
-JobId $jobId `
-Stream Output | % Summary
Assert-True {$streams.count -gt 0} "Failed to get Output stream via Get-AzAutomationSourceControlSyncJobOutput "
}
finally
{
EnsureSourceControlDoesNotExist -Name $sourceControl.Name
}
} |
combined_dataset/train/non-malicious/580.ps1 | 580.ps1 |
function Add-SPOField
{
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true, Position=1)]
[string] $listTitle,
[Parameter(Mandatory=$true, Position=2)]
[string] $fieldName,
[Parameter(Mandatory=$true, Position=3)]
[string] $fieldXML
)
$web = $clientContext.Web
$list = $web.Lists.GetByTitle($listTitle)
$fields = $list.Fields
$clientContext.Load($fields)
$clientContext.ExecuteQuery()
if (!(Test-SPOField $list $fields $fieldName))
{
$field = $list.Fields.AddFieldAsXml($fieldXML, $true, [Microsoft.SharePoint.Client.AddFieldOptions]::AddToAllContentTypes);
$list.Update()
$clientContext.ExecuteQuery()
Write-Host "Field $fieldName added to list $listTitle" -foregroundcolor black -backgroundcolor yellow
}
else
{
Write-Host "Field $fieldName already exists in list $listTitle" -foregroundcolor black -backgroundcolor yellow
}
}
|
combined_dataset/train/non-malicious/Audit Script.ps1 | Audit Script.ps1 | #####################################################
# Audit script by Alan Renouf - Virtu-Al #
# Blog: http://teckinfo.blogspot.com/ #
# #
# Usage: Audit.ps1 'path' #
# #
# The file needs to be a plain text list of #
# computers to be audited one on each line #
# #
#####################################################
param( [string] $auditlist)
if ($auditlist -eq ""){
Write-Host "No list specified, using Localhost"
$targets = "localhost"
}
else
{
if ((Test-Path $auditlist) -eq $false)
{
Write-Host "Invalid audit path specified: $auditlist"
exit
}
else
{
Write-Host "Using Audit list: $auditlist"
$Targets = Get-Content $auditlist
}
}
$Date = Get-Date
Foreach ($Target in $Targets)
{
$Filename = ".\\" + $Target + "_" + $date.Hour + $date.Minute + "_" + $Date.Day + "-" + $Date.Month + "-" + $Date.Year + ".htm"
# =====================================================================================================================
# CREATE HTML OUTPUT
# =====================================================================================================================
Write-Output " "| out-file -Append -encoding ASCII -filepath $Filename
Write-Output '<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output '<html ES_auditInitialized='false'><head><title>Audit</title>'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "<META http-equiv=Content-Type content='text/html; charset=windows-1252'>"| out-file -Append -encoding ASCII -filepath $Filename
# ---------- Start of Style Definition Section ------------------------------------------------------------------------
Write-Output "<STYLE type=text/css>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " DIV .expando {DISPLAY: block; FONT-WEIGHT: normal; FONT-SIZE: 8pt; RIGHT: 10px; COLOR: #ffffff; FONT-FAMILY: Tahoma; POSITION: absolute; TEXT-DECORATION: underline}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " TABLE {TABLE-LAYOUT: fixed; FONT-SIZE: 100%; WIDTH: 100%}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " #objshowhide {PADDING-RIGHT: 10px; FONT-WEIGHT: bold; FONT-SIZE: 8pt; Z-INDEX: 2; CURSOR: hand; COLOR: #000000; MARGIN-RIGHT: 0px; FONT-FAMILY: Tahoma; TEXT-ALIGN: right; TEXT-DECORATION: underline; WORD-WRAP: normal}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " .heading0_expanded {BORDER-RIGHT: #bbbbbb 1px solid; PADDING-RIGHT: 5em; BORDER-TOP: #bbbbbb 1px solid; DISPLAY: block; PADDING-LEFT: 8px; FONT-WEIGHT: bold; FONT-SIZE: 8pt; MARGIN-BOTTOM: -1px; MARGIN-LEFT: 0px; BORDER-LEFT: #bbbbbb 1px solid; WIDTH: 100%; CURSOR: hand; COLOR: #FFFFFF; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: #bbbbbb 1px solid; FONT-FAMILY: Tahoma; POSITION: relative; HEIGHT: 2.25em; BACKGROUND-COLOR: #cc0000}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " .heading1 {BORDER-RIGHT: #bbbbbb 1px solid; PADDING-RIGHT: 5em; BORDER-TOP: #bbbbbb 1px solid; DISPLAY: block; PADDING-LEFT: 16px; FONT-WEIGHT: bold; FONT-SIZE: 8pt; MARGIN-BOTTOM: -1px; MARGIN-LEFT: 5px; BORDER-LEFT: #bbbbbb 1px solid; WIDTH: 100%; CURSOR: hand; COLOR: #ffffff; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: #bbbbbb 1px solid; FONT-FAMILY: Tahoma; POSITION: relative; HEIGHT: 2.25em; BACKGROUND-COLOR: #7BA7C7}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " .heading2 {BORDER-RIGHT: #bbbbbb 1px solid; PADDING-RIGHT: 5em; BORDER-TOP: #bbbbbb 1px solid; DISPLAY: block; PADDING-LEFT: 16px; FONT-WEIGHT: bold; FONT-SIZE: 8pt; MARGIN-BOTTOM: -1px; MARGIN-LEFT: 5px; BORDER-LEFT: #bbbbbb 1px solid; WIDTH: 100%; CURSOR: hand; COLOR: #ffffff; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: #bbbbbb 1px solid; FONT-FAMILY: Tahoma; POSITION: relative; HEIGHT: 2.25em; BACKGROUND-COLOR: #A5A5A5}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " .tableDetail {BORDER-RIGHT: #bbbbbb 1px solid; BORDER-TOP: #bbbbbb 1px solid; DISPLAY: block; PADDING-LEFT: 16px; FONT-SIZE: 8pt;MARGIN-BOTTOM: -1px; PADDING-BOTTOM: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #bbbbbb 1px solid; WIDTH: 100%; COLOR: #000000; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: #bbbbbb 1px solid; FONT-FAMILY: Tahoma; POSITION: relative; BACKGROUND-COLOR: #f9f9f9}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " .filler {BORDER-RIGHT: medium none; BORDER-TOP: medium none; DISPLAY: block; BACKGROUND: none transparent scroll repeat 0% 0%; MARGIN-BOTTOM: -1px; FONT: 100%/8px Tahoma; MARGIN-LEFT: 43px; BORDER-LEFT: medium none; COLOR: #ffffff; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: medium none; POSITION: relative}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " .Solidfiller {BORDER-RIGHT: medium none; BORDER-TOP: medium none; DISPLAY: block; BACKGROUND: none transparent scroll repeat 0% 0%; MARGIN-BOTTOM: -1px; FONT: 100%/8px Tahoma; MARGIN-LEFT: 0px; BORDER-LEFT: medium none; COLOR: #000000; MARGIN-RIGHT: 0px; PADDING-TOP: 4px; BORDER-BOTTOM: medium none; POSITION: relative; BACKGROUND-COLOR: #000000}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " td {VERTICAL-ALIGN: TOP; FONT-FAMILY: Tahoma}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " th {VERTICAL-ALIGN: TOP; COLOR: #cc0000; TEXT-ALIGN: left}"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "</STYLE>"| out-file -Append -encoding ASCII -filepath $Filename
# ---------- End of Style Definition Section --------------------------------------------------------------------------
# ---------- Start of Control Script Section --------------------------------------------------------------------------
Write-Output "<SCRIPT language=vbscript>"| out-file -Append -encoding ASCII -filepath $Filename
# ---------- Declare Global Variables for Routines --------------------------------------------------------------------
Write-Output " strShowHide = 1"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' strShow = "show"'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' strHide = "hide"'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' strShowAll = "show all"'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' strHideAll = "hide all"'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "Function window_onload()"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' If UCase(document.documentElement.getAttribute("ES_auditInitialized")) <> "TRUE" Then'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Set objBody = document.body.all"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " For Each obji in objBody"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " If IsSectionHeader(obji) Then"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " If IsSectionExpandedByDefault(obji) Then"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " ShowSection obji"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Else"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " HideSection obji"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Next"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " objshowhide.innerText = strShowAll"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' document.documentElement.setAttribute "ES_auditInitialized", "true"'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "End Function"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "Function IsSectionExpandedByDefault(objHeader)"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' IsSectionExpandedByDefault = (Right(objHeader.className, Len("_expanded")) = "_expanded")'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "End Function"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "Function document_onclick()"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Set strsrc = window.event.srcElement"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' While (strsrc.className = "sectionTitle" or strsrc.className = "expando")'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Set strsrc = strsrc.parentElement"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Wend"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " If Not IsSectionHeader(strsrc) Then Exit Function"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " ToggleSection strsrc"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " window.event.returnValue = False"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "End Function"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "Sub ToggleSection(objHeader)"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' SetSectionState objHeader, "toggle"'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "End Sub"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "Sub SetSectionState(objHeader, strState)"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " i = objHeader.sourceIndex"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Set all = objHeader.parentElement.document.all"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' While (all(i).className <> "container")'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " i = i + 1"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Wend"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Set objContainer = all(i)"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' If strState = "toggle" Then'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' If objContainer.style.display = "none" Then'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' SetSectionState objHeader, "show" '| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Else"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' SetSectionState objHeader, "hide" '| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Else"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Set objExpando = objHeader.children.item(1)"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' If strState = "show" Then'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' objContainer.style.display = "block" '| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " objExpando.innerText = strHide"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' ElseIf strState = "hide" Then'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' objContainer.style.display = "none" '| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " objExpando.innerText = strShow"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "End Sub"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "Function objshowhide_onClick()"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Set objBody = document.body.all"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Select Case strShowHide"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Case 0"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " strShowHide = 1"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " objshowhide.innerText = strShowAll"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " For Each obji In objBody"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " If IsSectionHeader(obji) Then"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " HideSection obji"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Next"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Case 1"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " strShowHide = 0"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " objshowhide.innerText = strHideAll"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " For Each obji In objBody"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " If IsSectionHeader(obji) Then"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " ShowSection obji"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End If"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " Next"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " End Select"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "End Function"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output 'Function IsSectionHeader(obj) : IsSectionHeader = (obj.className = "heading0_expanded") Or (obj.className = "heading1_expanded") Or (obj.className = "heading1") Or (obj.className = "heading2"): End Function'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output 'Sub HideSection(objHeader) : SetSectionState objHeader, "hide" : End Sub'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output 'Sub ShowSection(objHeader) : SetSectionState objHeader, "show": End Sub'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "</SCRIPT>"| out-file -Append -encoding ASCII -filepath $Filename
# ---------- End of Control Script Section ----------------------------------------------------------------------------
Write-Output " </HEAD>"| out-file -Append -encoding ASCII -filepath $Filename
# ---------- End of Head Section --------------------------------------------------------------------------------------
# ---------- Start of Body Section ------------------------------------------------------------------------------------
Write-Output "<BODY>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' <p><b><font face="Arial" size="5">'$Target' Audit<hr size="8" color="#CC0000"></font></b>'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' <font face="Arial" size="1"><b><i>Version 1.0 by Alan Renouf (Virtu-Al)</i></b></font><br>'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output ' <font face="Arial" size="1">Report generated on ' (Get-Date) '</font></p>'| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "<TABLE cellSpacing=0 cellPadding=0>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TBODY>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TR>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TD>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV id=objshowhide tabIndex=0><FONT face=Arial></FONT></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </TD>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </TR>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </TBODY>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "</TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
write-output "Writing Detail for $Target"
$ComputerSystem = Get-WmiObject -computername $Target Win32_ComputerSystem
switch ($ComputerSystem.DomainRole)
{
0 { $ComputerRole = "Standalone Workstation" }
1 { $ComputerRole = "Member Workstation" }
2 { $ComputerRole = "Standalone Server" }
3 { $ComputerRole = "Member Server" }
4 { $ComputerRole = "Domain Controller" }
5 { $ComputerRole = "Domain Controller" }
default { $ComputerRole = "Information not available" }
}
$OperatingSystems = Get-WmiObject -computername $Target Win32_OperatingSystem
$TimeZone = Get-WmiObject -computername $Target Win32_Timezone
$Keyboards = Get-WmiObject -computername $Target Win32_Keyboard
$SchedTasks = Get-WmiObject -computername $Target Win32_ScheduledJob
$BootINI = $OperatingSystems.SystemDrive + "boot.ini"
$RecoveryOptions = Get-WmiObject -computername $Target Win32_OSRecoveryConfiguration
# ---------- Start of COMPUTER DETAILS Section HTML Code --------------------------------------------------------------
Write-Output "<DIV class=heading0_expanded>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>$target Details</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "</DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output "<DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
# ---------- Start of COMPUTER DETAILS - GENERAL Sub Section HTML Code ------------------------------------------------
write-output "..Computer Details"
Write-Output "<DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>General</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Computer Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'> " $ComputerSystem.Name "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Computer Role</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'> $ComputerRole </font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
switch ($ComputerRole)
{
"Member Workstation" { Write-Output " <th width='25%'><b>Computer Domain</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename }
"Domain Controller" { Write-Output " <th width='25%'><b>Computer Domain</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename }
"Member Server" { Write-Output " <th width='25%'><b>Computer Domain</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename }
default { Write-Output " <th width='25%'><b>Computer Workgroup</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename}
}
Write-Output " <td width='75%'>" $ComputerSystem.Domain "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Operating System</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $OperatingSystems.Caption "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Service Pack</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $OperatingSystems.CSDVersion "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>System Root</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $OperatingSystems.SystemDrive "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Manufacturer</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $ComputerSystem.Manufacturer "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Model</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $ComputerSystem.Model "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Number of Processors</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $ComputerSystem.NumberOfProcessors "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Memory</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $ComputerSystem.TotalPhysicalMemory "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Registered User</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $ComputerSystem.PrimaryOwnerName "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Registered Organisation</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $OperatingSystems.Organization "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Last System Boot</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
$LBTime=$OperatingSystems.ConvertToDateTime($OperatingSystems.Lastbootuptime)
Write-Output " <td width='75%'>" $LBTime "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- End of COMPUTER DETAILS - GENERAL Sub-section HTML Code --------------------------------------------------
# ---------- Start of COMPUTER DETAILS - HOFIXES Sub-section HTML Code ------------------------------------------------
write-output "..Hotfix Information"
$colQuickFixes = Get-WmiObject Win32_QuickFixEngineering
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>HotFixes</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>HotFix Number</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='75%'><b>Description</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
ForEach ($objQuickFix in $colQuickFixes)
{
if ($objQuickFix.HotFixID -ne "File 1")
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'>" $objQuickFix.HotFixID "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $objQuickFix.Description "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- End of COMPUTER DETAILS - HOFIXES Sub-section HTML Code --------------------------------------------------
#---------- Start of COMPUTER DETAILS - LOGICAL DISK CONFIGURATION Sub-section HTML Code -----------------------------
write-output "..Logical Disks"
$colDisks = Get-WmiObject -ComputerName $Target Win32_LogicalDisk
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>Logical Disk Configuration</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='15%'><b>Drive Letter</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='20%'><b>Label</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='20%'><b>File System</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='15%'><b>Disk Size</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='15%'><b>Disk Free Space</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='15%'><b>% Free Space</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Foreach ($objDisk in $colDisks)
{
if ($objDisk.DriveType -eq 3)
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='15%'>"$objDisk.DeviceID"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'>"$objDisk.VolumeName"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'>"$objDisk.FileSystem"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
$disksize = [math]::round(($objDisk.size / 1048576))
Write-Output " <td width='15%'>"$disksize" MB</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
$freespace = [math]::round(($objDisk.FreeSpace / 1048576))
Write-Output " <td width='15%'>"$Freespace" MB</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
$percFreespace=[math]::round(((($objDisk.FreeSpace / 1048576)/($objDisk.Size / 1048676)) * 100),0)
Write-Output " <td width='15%'>"$percFreespace" %</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
# ---------- End of COMPUTER DETAILS - LOGICAL DISK CONFIGURATION Sub-section HTML Code -------------------------------
# ---------- Start of COMPUTER DETAILS - NIC CONFIGURATION Sub-section HTML Code --------------------------------------
write-output "..Network Configuration"
$NICCount = 0
$colAdapters = Get-WmiObject -ComputerName $Target Win32_NetworkAdapterConfiguration
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>NIC Configuration</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
$NICCount = 0
Foreach ($objAdapter in $colAdapters)
{
if ($objAdapter.IPEnabled -eq "True")
{
$NICCount = $NICCount + 1
If ($NICCount -gt 1)
{
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=Solidfiller></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Description</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $objAdapter.Description "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Physical address</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $objAdapter.MACaddress "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
If ($objAdapter.IPAddress -ne $Null)
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>IP Address / Subnet Mask</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $objAdapter.IPAddress " / " $objAdapter.IPSubnet "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Default Gateway</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $objAdapter.DefaultIPGateway "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>DHCP enabled</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
If ($objAdapter.DHCPEnabled -eq "True")
{
Write-Output " <td width='75%'>Yes</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Else
{
Write-Output " <td width='75%'>No</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>DNS Servers</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>"| out-file -Append -encoding ASCII -filepath $Filename
If ($objAdapter.DNSServerSearchOrder -ne $Null)
{
Write-Output $objAdapter.DNSServerSearchOrder | out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Primary WINS Server</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $objAdapter.WINSPrimaryServer "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Secondary WINS Server</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $objAdapter.WINSSecondaryServer "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
$NICCount = $NICCount + 1
}
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- End of COMPUTER DETAILS - NIC CONFIGURATION Sub-section HTML Code ----------------------------------------
#---------- Start of COMPUTER DETAILS - Software Sub-section HTML Code -------------------------------------------
if ((get-wmiobject -namespace "root/cimv2" -list) | ? {$_.name -match "Win32_Product"})
{
write-output "..Installed Software"
$colShares = get-wmiobject -ComputerName $Target Win32_Product | select Name,Version,Vendor,InstallDate
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>Software</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Version</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Vendor</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Install Date</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Foreach ($objShare in $colShares)
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='50%'>" $objShare.Name "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'>" $objShare.Version "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='15%'>" $objShare.Vendor "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='15%'>" $objShare.InstallDate "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
}
# ---------- End of COMPUTER DETAILS - Software Sub-section HTML Code ---------------------------------------------
#---------- Start of COMPUTER DETAILS - LOCAL SHARES Sub-section HTML Code -------------------------------------------
write-output "..Local Shares"
$colShares = Get-wmiobject -ComputerName $Target Win32_Share
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>Local Shares</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Share</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Path</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='50%'><b>Comment</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Foreach ($objShare in $colShares)
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'>" $objShare.Name "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'>" $objShare.Path "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='50%'>" $objShare.Caption "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- End of COMPUTER DETAILS - LOCAL SHARES Sub-section HTML Code ---------------------------------------------
#---------- Start of COMPUTER DETAILS - PRINTERS Sub-section HTML Code -----------------------------------------------
Write-output "..Printers"
$colInstalledPrinters = Get-WmiObject -ComputerName $Target Win32_Printer
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>Printers</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Printer</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Location</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Default Printer</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Portname</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Foreach ($objPrinter in $colInstalledPrinters)
{
If ($objPrinter.Name -eq "")
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='100%'>No Printers Installed</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Else
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'>" $objPrinter.Name "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'>" $objPrinter.Location "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
if ($objPrinter.Default -eq "True")
{
Write-Output " <td width='25%'>Yes</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Else
{
Write-Output " <td width='25%'>No</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " <td width='25%'>"$objPrinter.Portname"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- End of COMPUTER DETAILS - PRINTERS Sub-section HTML Code -------------------------------------------------
#---------- Start of COMPUTER DETAILS - SERVICES Sub-section HTML Code -----------------------------------------------
Write-Output "..Services"
$colListOfServices = Get-WmiObject -ComputerName $Target Win32_Service
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>Services</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='20%'><b>Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='20%'><b>Account</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='20%'><b>Start Mode</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='20%'><b>State</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='20%'><b>Expected State</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Foreach ($objService in $colListOfServices)
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'>"$objService.Caption"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'>"$objService.Startname"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'>"$objService.StartMode"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
If ($objService.StartMode -eq "Auto")
{
if ($objService.State -eq "Stopped")
{
Write-Output " <td width='20%'><font color='#FF0000'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'><font face='Wingdings'color='#FF0000'>ű</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
}
If ($objService.StartMode -eq "Auto")
{
if ($objService.State -eq "Running")
{
Write-Output " <td width='20%'><font color='#009900'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'><font face='Wingdings'color='#009900'>ü</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
}
If ($objService.StartMode -eq "Disabled")
{
If ($objService.State -eq "Running")
{
Write-Output " <td width='20%'><font color='#FF0000'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'><font face='Wingdings'color='#FF0000'>ű</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
}
If ($objService.StartMode -eq "Disabled")
{
if ($objService.State -eq "Stopped")
{
Write-Output " <td width='20%'><font color='#009900'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'><font face='Wingdings'color='#009900'>ü</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
}
If ($objService.StartMode -eq "Manual")
{
Write-Output " <td width='20%'><font color='#009900'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'><font face='Wingdings'color='#009900'>ü</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
If ($objService.State -eq "Paused")
{
Write-Output " <td width='20%'><font color='#FF9933'>"$objService.State"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='20%'><font face='Wingdings'color='#009900'>ü</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- End of COMPUTER DETAILS - SERVICES Sub-section HTML Code -------------------------------------------------
#---------- Start of COMPUTER DETAILS - REGIONAL SETTINGS Sub-section HTML Code --------------------------------------
Write-Output "..Regional Options"
$ObjKeyboards = Get-WmiObject -ComputerName $Target Win32_Keyboard
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>Regional Settings</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Time Zone</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $TimeZone.Description "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Country Code</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $OperatingSystems.Countrycode "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Locale</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $OperatingSystems.Locale"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Operating System Language</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $OperatingSystems.OSLanguage"</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
switch ($ObjKeyboards.Layout)
{
"00000402"{ $keyb = "BG" }
"00000404"{ $keyb = "CH" }
"00000405"{ $keyb = "CZ" }
"00000406"{ $keyb = "DK" }
"00000407"{ $keyb = "GR" }
"00000408"{ $keyb = "GK" }
"00000409"{ $keyb = "US" }
"0000040A"{ $keyb = "SP" }
"0000040B"{ $keyb = "SU" }
"0000040C"{ $keyb = "FR" }
"0000040E"{ $keyb = "HU" }
"0000040F"{ $keyb = "IS" }
"00000410"{ $keyb = "IT" }
"00000411"{ $keyb = "JP" }
"00000412"{ $keyb = "KO" }
"00000413"{ $keyb = "NL" }
"00000414"{ $keyb = "NO" }
"00000415"{ $keyb = "PL" }
"00000416"{ $keyb = "BR" }
"00000418"{ $keyb = "RO" }
"00000419"{ $keyb = "RU" }
"0000041A"{ $keyb = "YU" }
"0000041B"{ $keyb = "SL" }
"0000041C"{ $keyb = "US" }
"0000041D"{ $keyb = "SV" }
"0000041F"{ $keyb = "TR" }
"00000422"{ $keyb = "US" }
"00000423"{ $keyb = "US" }
"00000424"{ $keyb = "YU" }
"00000425"{ $keyb = "ET" }
"00000426"{ $keyb = "US" }
"00000427"{ $keyb = "US" }
"00000804"{ $keyb = "CH" }
"00000809"{ $keyb = "UK" }
"0000080A"{ $keyb = "LA" }
"0000080C"{ $keyb = "BE" }
"00000813"{ $keyb = "BE" }
"00000816"{ $keyb = "PO" }
"00000C0C"{ $keyb = "CF" }
"00000C1A"{ $keyb = "US" }
"00001009"{ $keyb = "US" }
"0000100C"{ $keyb = "SF" }
"00001809"{ $keyb = "US" }
"00010402"{ $keyb = "US" }
"00010405"{ $keyb = "CZ" }
"00010407"{ $keyb = "GR" }
"00010408"{ $keyb = "GK" }
"00010409"{ $keyb = "DV" }
"0001040A"{ $keyb = "SP" }
"0001040E"{ $keyb = "HU" }
"00010410"{ $keyb = "IT" }
"00010415"{ $keyb = "PL" }
"00010419"{ $keyb = "RU" }
"0001041B"{ $keyb = "SL" }
"0001041F"{ $keyb = "TR" }
"00010426"{ $keyb = "US" }
"00010C0C"{ $keyb = "CF" }
"00010C1A"{ $keyb = "US" }
"00020408"{ $keyb = "GK" }
"00020409"{ $keyb = "US" }
"00030409"{ $keyb = "USL" }
"00040409"{ $keyb = "USR" }
"00050408"{ $keyb = "GK" }
default { $keyb = "Unknown" }
}
Write-Output " <th width='25%'><b>Keyboard Layout</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='75%'>" $keyb "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </div>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- End of COMPUTER DETAILS - REGIONAL SETTINGS Sub-section HTML Code ----------------------------------------
#---------- Start of COMPUTER DETAILS - EVENT LOGS Sub-section HTML Code ---------------------------------------------
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading1>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>Event Logs</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- Start of COMPUTER DETAILS - EVENT LOGS - EVENT LOG SETTINGS Sub-section HTML Code ------------------------
Write-Output "..Event Log Settings"
$colLogFiles = Get-WmiObject -ComputerName $Target Win32_NTEventLogFile
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading2>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>Event Log Settings</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Log Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Overwrite Outdated Records</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Maximum Size</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='25%'><b>Current Size</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
ForEach ($objLogFile in $colLogfiles)
{
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'>" $objLogFile.LogFileName "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
If ($objLogfile.OverWriteOutdated -lt 0)
{
Write-Output " <td width='25%'>Never</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
if ($objLogFile.OverWriteOutdated -eq 0)
{
Write-Output " <td width='25%'>As needed</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Else
{
Write-Output " <td width='25%'>After " $objLogFile.OverWriteOutdated " days</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " <td width='25%'>" (($objLogfile.MaxFileSize)/1024) " KB</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='25%'>" (($objLogfile.FileSize)/1024) " KB</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=filler></DIV>"| out-file -Append -encoding ASCII -filepath $Filename
#---------- End of COMPUTER DETAILS - EVENT LOGS - EVENT LOG SETTINGS Sub-section HTML Code --------------------------
# ---------- Start of COMPUTER DETAILS - EVENT LOGS - ERROR ENTRIES Sub-section HTML Code -----------------------------
write-output "..Event Log Errors"
$WmidtQueryDT = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime([DateTime]::Now.AddDays(-14))
$colLoggedEvents = Get-WmiObject -computer "Localhost" -query ("Select * from Win32_NTLogEvent Where Type='Error' and TimeWritten >='" + $WmidtQueryDT + "'")
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=heading2>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <SPAN class=sectionTitle tabIndex=0>ERROR Entries</SPAN>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <A class=expando href='#'></A>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=container>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <DIV class=tableDetail>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='10%'><b>Event Code</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='10%'><b>Source Name</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='15%'><b>Time</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='10%'><b>Log</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <th width='55%'><b>Message</b></font></th>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
ForEach ($objEvent in $colLoggedEvents)
{
$dtmEventDate = $ObjEvent.ConvertToDateTime($objEvent.TimeWritten)
Write-Output " <tr>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='10%'>" $objEvent.EventCode "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='10%'>" $objEvent.SourceName "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='15%'>" $dtmEventDate "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='10%'>" $objEvent.LogFile "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " <td width='55%'>" $objEvent.Message "</font></td>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </tr>"| out-file -Append -encoding ASCII -filepath $Filename
}
Write-Output " </TABLE>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DIV>"| out-file -Append -encoding ASCII -filepath $Filename
Write-Output " </DI
|
combined_dataset/train/non-malicious/sample_3_45.ps1 | sample_3_45.ps1 | #************************************************
# TS_MemoryManagerSystemPagesCheck.ps1
# Version 1.0.1
# Date: 5/14/2012
# Author: v-kaw
# Description: [Idea ID 2389] [Windows] Hang caused by kernel memory depletion due 'SystemPages' reg key with wrong value
# Rule number: 2389
# Rule URL: //sharepoint/sites/rules/Rule%20Submissions/Forms/DispForm.aspx?ID=2389
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber 2389
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_MemoryManagerSystemPagesCheck"
$PublicContent = "http://technet.microsoft.com/en-us/library/aa996786(EXCHG.80).aspx"
$InternalContent = ""
$Verbosity = "Warning"
$Visibility = "4"
$SupportTopicsID = "8125"
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
# **************
# Detection Logic
# **************
function CheckSystemPages()
{
$Path='HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management'
if(Test-Path $Path)
{
$SystemPages = (Get-ItemProperty -Path $Path).SystemPages
if(($null -ne $SystemPages) -and ($SystemPages -ne 0))
{
Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name 'SystemPages current value' -Value ("0x{0:X8}" -f $SystemPages)
return $true
}
}
return $false
}
#Check to see if rule is applicable to this computer
if (($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2))
{
$RuleApplicable = $true
#Detect root cause
if (CheckSystemPages)
{
$RootCauseDetected = $true
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -SolutionTitle $ScriptStrings.ID_MemoryManagerSystemPagesCheck_SD
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCChNyAJoITslVYa
# SNII43LWjg0nYTLohXPkOsyKYqJsUaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINU16KKa4t7Xt2GpCWcWFB/O
# c7iVpASO1bY7w3L962nCMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAHds6j1lR9fyKu1v1mf7CyKajpSWvN0/I8AmM4x6inD08UNW3X9Q4TS4f
# VNEuBswOwwCFZpLCJSUmtzQfGVWHH/WuSwl6DU6+9qqRuriPSu4dsuW2IM5KoTY0
# A5ggyaI0dotIhs9dze1JVOYaEyG6EMFJGuynDXIxjZbQEdTndXP5jT696Uhmns4/
# TqCMj5IpZYJgSpexcpv4lX7LfTrdnKPyUVG+P668TKMoMz+WO/j5x/kk4DdWpRbh
# ibnHBkqyPEviDiv2tGeHiNZQLqeAzVJ6TmKlxBgeqYSMdWsqgkUBZ76Ixv2WiC+n
# KS9FpUk52Oz6PUtIFVy+I3FC7+11WKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCoIkFElxjupj4q5Cyt+E8ETTvpTYPp0U5eH8cyq+g4JgIGZxqDjw9Z
# GBMyMDI0MTAyODExNDA0MC4yNjlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz
# OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P
# AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR
# rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C
# Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm
# xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy
# fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo
# 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB
# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCCAo3vhSwJ7kCqP4UZ6A+NmZ8XgFxW20gCdJkCGkfAR
# jzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q
# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy
# SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIASBfG7vJk5xiT6frrZUJa
# pAh7zbEaJpnWKObM2vq5qdougFDxeFn31DaIohN95FaEaiQKZ570pYU4UVEoy4xG
# 6MUJgxBEddksAonARebYsVDJwx592mKKY0ZEFlpWlVf5kPvUQV3iD7JDDaNG0+0W
# SfTu3I3rXguy4JHn3/nSZOlyr1CGtpFtTTAw8q3IwpV3uEP7GBYwuEYdQBrLfewM
# OeUHhHFgKozfnvP4osDQthMwnMUP8v/C0ujAVWGF2foF5IzCZuRW2v48KjvZteE9
# iO3jGO6vjA63eFacKAcVMKcd/gofMFhRf8mpnJ+gUfMpZLckMFs56p3jlGxPqF+w
# FAuoNVfLsrYXjnH7Td4CBVLS8OzMfkklv8Hcqj4CK7F5C02t3xcOHPMDEpQjQ7Gl
# GmxhBdjsaIXecQKMSd5vttqCCMgW1ktjgEksdKCkSRzTJ94NQ8WoW1qGVwmhnpfX
# vvOdF8CA29rlieBFzZUQ/qzbjMlgJIs0aaz0gTV9pA7iRyke60JQVY+BTmh3WTHi
# joZpqN/ReU82Q6ELquV9fXfKj86DYBTIxjbv4hTKy4xCAlP9QF/bzaCzhwHlv0zQ
# x0u3QTtY0SxJ0eJRKIx/krJnLJJDc7Zbk73e89I9fy6ETV9SsEJ9Npayvwqiv+V5
# IZ6UQXtjkIfydhW+6rLn2rM=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_62_14.ps1 | sample_62_14.ps1 | #
# Module manifest for module 'OCI.PSModules.Servicemanagerproxy'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Servicemanagerproxy.dll'
# Version number of this module.
ModuleVersion = '88.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '01ac6ca4-c358-4958-baf9-455f6dd1de04'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Servicemanagerproxy Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicemanagerproxy.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIServicemanagerproxyServiceEnvironment',
'Get-OCIServicemanagerproxyServiceEnvironmentsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicemanagerproxy'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3701.ps1 | 3701.ps1 |
function Get-AzVMGuestPolicyStatus-VmNameScope
{
$rgName = "vivga"
$vmName = "Viv1809SDDC"
$reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName
Assert-NotNull $reports
Assert-True { $reports.Count -gt 0 }
}
function Get-AzVMGuestPolicyStatus-VmNameScope_Custom
{
$rgName = "aashishCustomrole7ux"
$vmName = "aashishCustomrole7ux"
$reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName
Assert-NotNull $reports
Assert-True { $reports.Count -gt 0 }
}
function Get-AzVMGuestPolicyStatus-InitiativeIdScope
{
$rgName = "vivga"
$vmName = "Viv1809SDDC"
$initiativeId = "/providers/Microsoft.Authorization/policySetDefinitions/25ef9b72-4af2-4501-acd1-fc814e73dde1"
$reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeId $initiativeId
Assert-NotNull $reports
Assert-True { $reports.Count -gt 0 }
}
function Get-AzVMGuestPolicyStatus-InitiativeIdScope_Custom
{
$rgName = "aashishCustomrole7ux"
$vmName = "aashishCustomrole7ux"
$initiativeId = "/subscriptions/b5e4748c-f69a-467c-8749-e2f9c8cd3db0/providers/Microsoft.Authorization/policySetDefinitions/60062d3c-3282-4a3d-9bc4-3557dded22ca"
$reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeId $initiativeId
Assert-NotNull $reports
Assert-True { $reports.Count -gt 0 }
}
function Get-AzVMGuestPolicyStatus-InitiativeNameScope
{
$rgName = "vivga"
$vmName = "Viv1809SDDC"
$initiativeName = "25ef9b72-4af2-4501-acd1-fc814e73dde1"
$reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName
Assert-NotNull $reports
Assert-True { $reports.Count -gt 0 }
}
function Get-AzVMGuestPolicyStatus-InitiativeNameScope_Custom
{
$rgName = "aashishCustomrole7ux"
$vmName = "aashishCustomrole7ux"
$initiativeName = "60062d3c-3282-4a3d-9bc4-3557dded22ca"
$reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName
Assert-NotNull $reports
Assert-True { $reports.Count -gt 0 }
}
function Get-AzVMGuestPolicyStatus-ReportIdScope
{
$rgName = "vivga"
$vmName = "Viv1809SDDC"
$initiativeName = "25ef9b72-4af2-4501-acd1-fc814e73dde1"
$reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName
Assert-NotNull $reports
Assert-True { $reports.Count -gt 0 }
$Id= $reports[0].ReportId;
$report = Get-AzVMGuestPolicyStatus -ReportId $Id
Assert-NotNull $report
}
function Get-AzVMGuestPolicyStatus-ReportIdScope_Custom
{
$rgName = "aashishCustomrole7ux"
$vmName = "aashishCustomrole7ux"
$initiativeName = "60062d3c-3282-4a3d-9bc4-3557dded22ca"
$reports = Get-AzVMGuestPolicyStatus -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName
Assert-NotNull $reports
Assert-True { $reports.Count -gt 0 }
$Id= $reports[0].ReportId;
$report = Get-AzVMGuestPolicyStatus -ReportId $Id
Assert-NotNull $report
}
|
combined_dataset/train/non-malicious/DefaultParameterValues_2.ps1 | DefaultParameterValues_2.ps1 | # DefaultParameters Module
# 1.3 - fixed denable/disable, added get and remove, and improved import and set
# 1.2 - added help and commands to enable/disable the defaults
# 1.0 - initial release
function Export-DefaultParameter {
#.Synopsis
# Exports the current default parameter values
[CmdletBinding()]
param(
# The path to export default parameter values to (defaults to "DefaultParameterValues.clixml" in your profile directory)
[String]$Path = $(Join-Path (Split-Path $Profile.CurrentUserAllHosts -Parent) DefaultParameterValues.clixml)
)
Export-CliXml -InputObject $Global:PSDefaultParameterValues -Path $Path
}
function Import-DefaultParameter {
#.Synopsis
# Imports new default parameter values
[CmdletBinding()]
param(
# The path to import default parameter values from (defaults to "DefaultParameterValues.clixml" in your profile directory)
[String]$Path = $(Join-Path (Split-Path $Profile.CurrentUserAllHosts -Parent) DefaultParameterValues.clixml),
# If set, overwrite current values (otherwise, keep current values)
[Switch]$Force
)
$TempParameterValues = $Global:PSDefaultParameterValues
if(Test-Path $Path) {
[System.Management.Automation.DefaultParameterDictionary]$NewValues =
Import-CliXml -Path ${ProfileDir}\\DefaultParameterValues.clixml
$repeats = @()
foreach($key in $NewValues.Keys) {
# don't import the disabled state, that's just silly
if($key -eq "disabled") { continue }
if($Global:PSDefaultParameterValues.ContainsKey($key)) {
$command,$parameter = $key -split ":"
if($Force) {
$repeats += [PSCustomObject]@{Command=$Command;Parameter=$Parameter;NewDefault=$NewValues.$key;OldDefault=$Global:PSDefaultParameterValues.$Key}
$Global:PSDefaultParameterValues.$Key = $NewValues.$key
} else {
$repeats += [PSCustomObject]@{Command=$Command;Parameter=$Parameter;CurrentDefault=$Global:PSDefaultParameterValues.$Key;SkippedValue=$NewValues.$key}
}
} else {
$Global:PSDefaultParameterValues.$Key = $NewValues.$key
}
}
if($repeats.Count) {
$Width = &{
$Local:ErrorActionPreference = "SilentlyContinue"
$Width = $Host.UI.RawUI.BufferSize.Width - 2
if($Width) { $Width } else { 80 }
}
if($Force) {
Write-Warning ("Some defaults overwritten:`n{0}" -f ($repeats | Out-String -Width $Width))
} else {
Write-Warning ("Some defaults already defined, use -Force to overwrite:`n{0}" -f ($repeats | Out-String -Width $Width))
}
}
# Make sure that everything is enabled
$Global:PSDefaultParameterValues["Disabled"] = $false
} else {
Write-Warning "Default Parameter file not found: '$Path'"
}
}
function Set-DefaultParameter {
#.Synopsis
# Sets a default parameter value for a command
#.Description
# Safely sets the default parameter value for a command, making sure that you've correctly typed the command and parameter combination
[CmdletBinding(DefaultParameterSetName="Colonated", SupportsShouldProcess=$true, ConfirmImpact="Low")]
param(
# The command that you want to change the default value of a parameter for
[parameter(Position=0,Mandatory=$true,ParameterSetName="Colonated")]
[parameter(Position=0,Mandatory=$true,ParameterSetName="SeparateInputs")]
$Command,
# The name of the parameter that you want to change the default value for
[parameter(Position=1,Mandatory=$true,ParameterSetName="SeparateInputs")]
$Parameter,
# The new default parameter value
[parameter(Position=1,Mandatory=$true,ParameterSetName="Colonated")]
[parameter(Position=2,Mandatory=$true,ParameterSetName="SeparateInputs")]
$Value
)
if($PSCmdlet.ParameterSetName -eq "Colonated") {
$command,$parameter = $command -split ":"
}
if($parameter.StartsWith("-")) {
$parameter = $parameter.TrimStart("-")
}
## Resolve the parameter to be sure
$cmd = Get-Command $command | Select -First 1
$parameters = $cmd.Parameters.Values
$param = @($parameters | Where-Object { $_.Name -match $parameter -or $_.Aliases -match $parameter} | Select -Expand Name -Unique)
if(!$param) {
$param = @($parameters | Where-Object { $_.Name -match "${parameter}*"} | Select -First 1 -Expand Name)
if(!$param) {
$param = @($parameters | Where-Object { $_.Aliases -match "${parameter}*"} | Select -First 1 -Expand Name)
}
}
if($param.Count -eq 1) {
if($cmd.CommandType -eq "Alias") {
$Command = $cmd.DisplayName
} else {
$Command = $cmd.Name
}
Write-Verbose "Setting Parameter $parameter on ${Command} to default: $($param[0])"
$Key = "${Command}:$($param[0])"
if( $Global:PSDefaultParameterValues.ContainsKey($Key) ) {
$WI = "Overwrote the default parameter value for '$Key' with $Value"
$CF = "Overwrite the existing default parameter value for '$Key'? ($($Global:PSDefaultParameterValues.$Key))"
} else {
$WI = "Added a default parameter value for '$Key' = $Value"
$CF = "Add a default parameter value for '$Key'? ($($Global:PSDefaultParameterValues.$Key))"
}
if($PSCmdlet.ShouldProcess( $WI, $CI, "Setting Default Parameter Values" )) {
$Global:PSDefaultParameterValues.$Key = $Value
}
} else {
Write-Warning "Parameter $parameter not found on ${Command}"
}
}
function Get-DefaultParameter {
#.Synopsis
# Gets the default parameter value for a command, if it's been set
#.Description
# Gets the default parameter value for a command from $PSDefaultParameterValues
[CmdletBinding(DefaultParameterSetName="Colonated")]
param(
# The command that you want to change the default value of a parameter for (allows wildcards)
[parameter(Position=0,Mandatory=$false)]
[string]$Command = "*",
# The name of the parameter that you want to change the default value for (allows wildcards)
[parameter(Position=1,Mandatory=$true,ParameterSetName="SeparateInputs")]
[string]$Parameter
)
if($PSCmdlet.ParameterSetName -eq "Colonated") {
$command,$parameter = $command -split ":"
}
if($parameter.StartsWith("-")) {
$parameter = $parameter.TrimStart("-")
}
$repeats = @()
foreach($key in $Global:PSDefaultParameterValues.Keys) {
# Handle the disabled state:
if($key -eq "disabled" -and $Global:PSDefaultParameterValues["Disabled"]) {
Write-Warning "Default Parameter Values are DISABLED and will not be used:"
continue
}
if($key -like "${Command}:${Parameter}*") {
$Cmd,$Param = $key -split ":"
$repeats += [PSCustomObject]@{Command=$Cmd;Parameter=$Param;CurrentDefault=$Global:PSDefaultParameterValues.$Key}
} else {
Write-Verbose "'$key' is -not -like '${Command}:${Parameter}*'"
}
}
$repeats
}
function Remove-DefaultParameter {
#.Synopsis
# Removed the default parameter value for a command, if it's been set
#.Description
# Removes the default parameter value for a command from $PSDefaultParameterValues
[CmdletBinding(DefaultParameterSetName="Colonated", SupportsShouldProcess=$true, ConfirmImpact="Low")]
param(
# The command that you want to change the default value of a parameter for (allows wildcards)
[parameter(Position=0,Mandatory=$false)]
[string]$Command = "*",
# The name of the parameter that you want to change the default value for (allows wildcards)
[parameter(Position=1,Mandatory=$true,ParameterSetName="SeparateInputs")]
[string]$Parameter
)
if($PSCmdlet.ParameterSetName -eq "Colonated") {
$command,$parameter = $command -split ":"
}
if($parameter.StartsWith("-")) {
$parameter = $parameter.TrimStart("-")
}
$keys
foreach($key in $Global:PSDefaultParameterValues.Keys | Where { $_ -like "${Command}:${Parameter}*" }) {
# Handle the disabled state:
if($key -ne "disabled") {
if($PSCmdlet.ShouldProcess( "Removed the default parameter value for '$Key'",
"Remove the default parameter value for '$Key'?",
"Removing Default Parameter Values" )) {
$Global:PSDefaultParameterValues.Remove($key)
}
}
}
}
function Disable-DefaultParameter {
#.Synopsis
# Turns OFF default parameters
#.Description
# By setting $PSDefaultParameterValues["Disabled"] to $true, we make sure that NONE of our default parameter values will be used
[CmdletBinding()]
param()
$Global:PSDefaultParameterValues["Disabled"]=$true
}
function Enable-DefaultParameter {
#.Synopsis
# Turns ON default parameters
#.Description
# By setting $PSDefaultParameterValues["Disabled"] to $false, we make sure that all of our default parameter values will be used
[CmdletBinding()]
param()
$Global:PSDefaultParameterValues["Disabled"]=$false
}
Set-Alias Add-DefaultParameter Set-DefaultParameter -ErrorAction SilentlyContinue
Import-DefaultParameter
|
combined_dataset/train/non-malicious/sample_62_81.ps1 | sample_62_81.ps1 | #
# Copyright (c) Microsoft Corporation.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
#
# culture="en-US"
ConvertFrom-StringData @'
###PSLOC
InValidUri=InValid Uri: '{0}'. A sample valid uri: https://www.powershellgallery.com/api/v2/.
PathDoesNotExist=Path: '{0}' does not exist
VersionError=MinimumVersion should be less than the maximumVersion. The MinimumVersion or maximumVersion cannot be used with the RequiredVersion in the same command.
UnexpectedArgument=Unexpected argument type: '{0}'
SourceNotFound=Source '{0}' not found. Please make sure you register it.
CallingFunction="Call a function '{0}'".
###PSLOC
'@
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAXoZvT6Sxwjlb6
# K13DPDb7ghCGgYKA5tdcnEQXeEdnE6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJxA+NogklrB4tpUObA+I3df
# cmORxJJ2UKVVYDnxVeCLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAie6WFBnhOdqCeg19/438meTFmRE3+tpOI0qEo5uqCQcs0l9sWxuKRl2f
# STtG+zPwlgQMCMLBO2g6FhzhGyA7b0cY5DdPmsUOPNCLZLYtM61c/t9sTLGMCQqr
# qe+SfILhN5x1punHWgKJpr/cQ9Fy5cpkHpmp2z4eH2aorCFKzc+ssQHzXf7H+5oS
# fDg3f5rQmEvecJbOKk5yyfFB2spTPV5637QO3pyMde4p4mOnW8DtQloeoArMUb0q
# fhqA/GUDGbMk+iA49FSlBBQsVoGNYqUdPgSFdyEuWLePtsJeBLsfMfr/6pwNl6Y2
# 1i+hFG9m6ddzdOAZbtsvxdfbZMIepaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCIWKw+pbhj2hBzOd81ICL28RoBID6ig9dLHNDIQEFtBQIGZk3YA/sm
# GBMyMDI0MDUyMzE2NDM0Ni4zNzVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOn5p+IwIhgPMjAyNDA1MjMxOTMyNTBaGA8yMDI0MDUyNDE5MzI1MFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fmn4gIBADAHAgEAAgINYjAHAgEAAgIRNDAKAgUA
# 6fr5YgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHpsm5q0ZdHBaeprgjNS
# yd0ojEpghZykcYvC4kIp8xAzjXyUJcyGaJzLDxqNBeAVauNvfMjIRz0BkdK0PWPI
# Q9gkZioVL04NJ5sejbf0SubFs8In3i91dxRqRqp7GWDF7W+LPx+GhPmu+8g8xmz3
# Z8iVuzX9WbSBunphA+N0UNp4MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgTU0u4wm9Gi9HUAZyzeYnb9hwOMnr3Zdy81NZiOIuFr0wgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIBwT6TUhjH6lGpefusVS7qAzvvAD8invIFPZYh3t3r3H
# MA0GCSqGSIb3DQEBCwUABIICADa+nsZafyaG9M74DPopV8EOBMiPtbhsVXhPxbDG
# Y1wnxyxxIZ3z9PQT3wh44XwhLnBhwAuWNLNpQekLijb+uKr+2GdG7U70rag5wE4J
# MXeuSdmZy6WtDRQ22ch3uDYcpC/UqnGjyskAHGnd5i7z433gStG5RTT/KeQVPE/0
# 5/opspznV8Q4YRZC7PidzHeiaCbkf+v/bCMLU4yv2Zc4jWQc582NkixnYOFiWnUP
# Rcx5bTjXkUdyZli9aHRTHVsxWhftizu5G2pqL2nzohlNqjPUK07AYt8xsPo7NoGT
# oaxpXp6lxNK353uk5fuCjZcFkI3ZybyTMgjQ6yZvWHOvt7hAfzZtPLbDiv3gmcM0
# BdpYNZj1V3CBIERcp+zkVvD39r8Wv6wp3byH7ea+mlIABYVsTqJl4zVDnACUOPtW
# w/3wHqkszDqoynQNhsL6qswCgdFSjE6yJkRMOQeMJI51vIDuwRzzJw1jPEhWJ5uJ
# iMb1/hGztov3GStrtLXDUETBceEQamcEbPR6GS76xsg4TlCTH2IMbaQ5UAeHNogm
# MwCk3goyX5Qod7tdm9YCN9+YuyQEoHaLq/vW+NTaxwygs4mNE0sNnmXx3XHgRDvq
# bQKY/Dyim5N+i+bbQiRjGiqUEMiTvlgu4V+UpeXh+mP8TAwqcRNHESWp9y09xf+O
# uSAf
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_27_3.ps1 | sample_27_3.ps1 | #
# Module manifest for module 'OCI.PSModules.Cloudguard'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '416303ec-c9d6-4a65-8413-14973e520be8'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudguard Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCICloudguardCompartment',
'Get-OCICloudguardConditionMetadataType',
'Get-OCICloudguardConditionMetadataTypesList',
'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule',
'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource',
'Get-OCICloudguardDataSourceEventsList',
'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector',
'Get-OCICloudguardDetectorRecipe',
'Get-OCICloudguardDetectorRecipeDetectorRule',
'Get-OCICloudguardDetectorRecipeDetectorRulesList',
'Get-OCICloudguardDetectorRecipesList',
'Get-OCICloudguardDetectorRule',
'Get-OCICloudguardDetectorRulesList',
'Get-OCICloudguardDetectorsList',
'Get-OCICloudguardImpactedResourcesList',
'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList',
'Get-OCICloudguardManagedListTypesList',
'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem',
'Get-OCICloudguardProblemEndpointsList',
'Get-OCICloudguardProblemEntitiesList',
'Get-OCICloudguardProblemHistoriesList',
'Get-OCICloudguardProblemsList',
'Get-OCICloudguardRecommendationsList',
'Get-OCICloudguardResourceProfile',
'Get-OCICloudguardResourceProfileEndpointsList',
'Get-OCICloudguardResourceProfileImpactedResourcesList',
'Get-OCICloudguardResourceProfilesList',
'Get-OCICloudguardResourceTypesList',
'Get-OCICloudguardResponderActivitiesList',
'Get-OCICloudguardResponderExecution',
'Get-OCICloudguardResponderExecutionsList',
'Get-OCICloudguardResponderRecipe',
'Get-OCICloudguardResponderRecipeResponderRule',
'Get-OCICloudguardResponderRecipeResponderRulesList',
'Get-OCICloudguardResponderRecipesList',
'Get-OCICloudguardResponderRule',
'Get-OCICloudguardResponderRulesList',
'Get-OCICloudguardSecurityPoliciesList',
'Get-OCICloudguardSecurityPolicy',
'Get-OCICloudguardSecurityRecipe',
'Get-OCICloudguardSecurityRecipesList',
'Get-OCICloudguardSecurityZone',
'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting',
'Get-OCICloudguardSightingEndpointsList',
'Get-OCICloudguardSightingImpactedResourcesList',
'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList',
'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe',
'Get-OCICloudguardTargetDetectorRecipeDetectorRule',
'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList',
'Get-OCICloudguardTargetDetectorRecipesList',
'Get-OCICloudguardTargetResponderRecipe',
'Get-OCICloudguardTargetResponderRecipeResponderRule',
'Get-OCICloudguardTargetResponderRecipeResponderRulesList',
'Get-OCICloudguardTargetResponderRecipesList',
'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList',
'Get-OCICloudguardWorkRequest',
'Get-OCICloudguardWorkRequestErrorsList',
'Get-OCICloudguardWorkRequestLogsList',
'Get-OCICloudguardWorkRequestsList',
'Invoke-OCICloudguardExecuteResponderExecution',
'Invoke-OCICloudguardRequestRiskScores',
'Invoke-OCICloudguardRequestSecurityScores',
'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend',
'Invoke-OCICloudguardRequestSummarizedActivityProblems',
'Invoke-OCICloudguardRequestSummarizedProblems',
'Invoke-OCICloudguardRequestSummarizedResponderExecutions',
'Invoke-OCICloudguardRequestSummarizedRiskScores',
'Invoke-OCICloudguardRequestSummarizedSecurityScores',
'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores',
'Invoke-OCICloudguardRequestSummarizedTrendProblems',
'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores',
'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions',
'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores',
'Invoke-OCICloudguardSkipBulkResponderExecution',
'Invoke-OCICloudguardSkipResponderExecution',
'Invoke-OCICloudguardTriggerResponder',
'Move-OCICloudguardDataSourceCompartment',
'Move-OCICloudguardDetectorRecipeCompartment',
'Move-OCICloudguardManagedListCompartment',
'Move-OCICloudguardResponderRecipeCompartment',
'Move-OCICloudguardSecurityRecipeCompartment',
'Move-OCICloudguardSecurityZoneCompartment',
'New-OCICloudguardDataMaskRule', 'New-OCICloudguardDataSource',
'New-OCICloudguardDetectorRecipe',
'New-OCICloudguardDetectorRecipeDetectorRule',
'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe',
'New-OCICloudguardSecurityRecipe', 'New-OCICloudguardSecurityZone',
'New-OCICloudguardTarget', 'New-OCICloudguardTargetDetectorRecipe',
'New-OCICloudguardTargetResponderRecipe',
'Remove-OCICloudguardCompartment',
'Remove-OCICloudguardDataMaskRule',
'Remove-OCICloudguardDataSource',
'Remove-OCICloudguardDetectorRecipe',
'Remove-OCICloudguardDetectorRecipeDetectorRule',
'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource',
'Remove-OCICloudguardManagedList',
'Remove-OCICloudguardResponderRecipe',
'Remove-OCICloudguardSecurityRecipe',
'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget',
'Remove-OCICloudguardTargetDetectorRecipe',
'Remove-OCICloudguardTargetResponderRecipe',
'Stop-OCICloudguardWorkRequest',
'Update-OCICloudguardBulkProblemStatus',
'Update-OCICloudguardConfiguration',
'Update-OCICloudguardDataMaskRule',
'Update-OCICloudguardDataSource',
'Update-OCICloudguardDetectorRecipe',
'Update-OCICloudguardDetectorRecipeDetectorRule',
'Update-OCICloudguardManagedList',
'Update-OCICloudguardProblemStatus',
'Update-OCICloudguardResponderRecipe',
'Update-OCICloudguardResponderRecipeResponderRule',
'Update-OCICloudguardSecurityRecipe',
'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget',
'Update-OCICloudguardTargetDetectorRecipe',
'Update-OCICloudguardTargetDetectorRecipeDetectorRule',
'Update-OCICloudguardTargetResponderRecipe',
'Update-OCICloudguardTargetResponderRecipeResponderRule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.