full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_34_9.ps1
sample_34_9.ps1
# # Module manifest for module 'OCI.PSModules.Email' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Email.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f1bd31ba-98e7-4163-b9d9-5016214290ab' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Email Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Email.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEmailConfiguration', 'Get-OCIEmailDkim', 'Get-OCIEmailDkimsList', 'Get-OCIEmailDomain', 'Get-OCIEmailDomainsList', 'Get-OCIEmailSender', 'Get-OCIEmailSendersList', 'Get-OCIEmailSuppression', 'Get-OCIEmailSuppressionsList', 'Get-OCIEmailWorkRequest', 'Get-OCIEmailWorkRequestErrorsList', 'Get-OCIEmailWorkRequestLogsList', 'Get-OCIEmailWorkRequestsList', 'Move-OCIEmailDomainCompartment', 'Move-OCIEmailSenderCompartment', 'New-OCIEmailDkim', 'New-OCIEmailDomain', 'New-OCIEmailSender', 'New-OCIEmailSuppression', 'Remove-OCIEmailDkim', 'Remove-OCIEmailDomain', 'Remove-OCIEmailSender', 'Remove-OCIEmailSuppression', 'Update-OCIEmailDkim', 'Update-OCIEmailDomain', 'Update-OCIEmailSender' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Email' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_16_94.ps1
sample_16_94.ps1
. $PSScriptRoot\PathProcessingNonExistingPaths.ps1 . $PSScriptRoot\PathProcessingNoWildcards.ps1 . $PSScriptRoot\PathProcessingWildcards.ps1 # SIG # Begin signature block # MIIr5wYJKoZIhvcNAQcCoIIr2DCCK9QCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBF2ChhFuZtu/sb # TrXm58cjIv4frtrC6jBOv8SAH6m/8KCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzzCCGcsCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIB9CXSpIbuMufPrdf+IYmpZjR+jgo4SX # KH0BSPWT6PS2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # Tl2QpcMo9HW4DpT4gQtQb5+5lVspejZYgsdKIYZ3eaVJvJ9SCM7qN9h6q8yqhkGU # Ui4YYPM397jdiCHWx+GS7iJnf1CYX4ZJLBzxz9dCXP9MkKgN9cmNr1p2L04MZNCH # s9Lngz9PMJgCagIz+MWiQ0DSiGWBAe6ToW+kRxgpIBTdFhIzk9IsPiWs/1bFK/d9 # pwQb5l9cPUcF9//KHWOtbjsvZ/54kEKRO52IILZv6dJKxQzLe4SO/9ol4GdWGXD+ # Zs19DlSZmZQuuGKvOYsa6lybgJM/zmmuDZ4za0ibvPtArHZ1d6fTktjhmT8lciUV # I4SSxyNq+YJyl1tP1Q6A2KGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqG # SIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCDNlCO5hmvxyKP3MbY7xg0bAh9jCiusG5fhiMyRikrNDQIGZfxpKAHOGBMyMDI0 # MDQwMzIyNTgxNi41OTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIH # IDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1NDFaFw0y # NTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbzCVyYQNsz # 8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCddseF2i+aM # MjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4xLqv7DZUz # 8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+TgnrLR7A # TRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJsGEo3QrM # 2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9f7B0Ayh1 # 4Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stPaojR+PDA # 2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22XjaVVRwCgjg # JnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOnWRfe8N21 # tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/91QcGoZFm # VbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2MwqQIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4emancp6KPN+ # xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eoifm0Nud7 # /4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5EdeafH2A # oG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+xoD1qRz2 # QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7ws5YrA2I # 8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zHu2oGGeCB # g4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ03833Tsv # Tgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D18rZni9pU # wN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CINZmoirEWm # CtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvhy5ku/inU # ++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0SbQgS9qs # dzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDuHayKTCaY # sYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6bgJ9jAiGA8yMDI0MDQwMzE3MDE0MloYDzIw # MjQwNDA0MTcwMTQyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpuAn2AgEAMAoC # AQACAgSUAgH/MAcCAQACAhQ5MAoCBQDpuVt2AgEAMDYGCisGAQQBhFkKBAIxKDAm # MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN # AQELBQADggEBAD3Vla1jFcZVCUHeWybFSR/TXbfm6GGYLdMNaxcaZ4g4lneuf/Eq # Ep4fbwb8sWEF73tQFDTADNU5B/MXQ+Mi07oORkY4eXZfneDPAfcAJ1R5WFAmRzsF # EGJrz83IWcDF/fQnhIBN1glqCKxmckocX6+++QXWX04P5Tx9B+Pj9VZcayYbFH6e # F7l0BE9K+OKjNNtFYXE5RlmRTEy89btw82vdsUttKbqKwUda6W+9kpgCCUJipFxM # kGALgaRLvBTAUHfC7luPHhE2LNYj9ccBGKpzeJx5GaBeBeB8uptkYMlyO64bMmrq # XJatodVYkRR3A4Se6Tqm8LVw4KeZMB1U7VMxggQNMIIECQIBATCBkzB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TANBglg # hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqG # SIb3DQEJBDEiBCAAZhedgRZaK5HSdWmLoYmi7l7GxRjPSlOVwX+WEJ+YrjCB+gYL # KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsSDrXZ # 6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC # EzMAAAHt4V/L1felXXMAAQAAAe0wIgQgdGoqzWxBTvwHvsTIxYqr5oiVCTGJOeKF # nbWbhY8yNTgwDQYJKoZIhvcNAQELBQAEggIAkWogqlmJM4vJJwe3iOW69W7r6IiX # wAarqrNSqZOjR9Afc4HzUyKhD1ssWq9p7CBAHAizxtF8A3XzZ0s0Mvg7xwZzm8h6 # 3fjwJBHAI7T7divBJAw5wzvwQQ3pYnlSv9D9oCCDL7+2ZxjNDKzu0wzr3z7ra58B # C/rMRdFAMajwQq/SYIvMFJHe2Srr+w2PQMmF2Vzl1R4AxKZoqK808MFql2gDja4c # jP6X4tz3a7K9BJKUPMSLsC34BFS4YqHzoPQU1lQ7lWInqRBD8v4i5FAwSvId9Gix # PQMe4muk+3y0pXDAAOL8S+BDW1LgwIYx71ggwdEf3UTGbiVrSF7mTAi2U9j++yCK # Y7KvNub8NSM4wpF/82LaJmHSaJGczrAETKclLfDxaLE2/vkKOr7cABusD08Ka0+r # zOY4Y+bFDCD+yD4Sd5hv0X4JUuGu2frW0HjF6QB6CmS/anXrYQ7qoTBCK1V2gJxo # WpNPjlYXEQ0OF8C5fbyfHjMFwmdlTp4YzjPAD1urlK2WyepDLFgsUyd4j+d/h6M5 # 57IWaK4fsYACCkVY9fonrvQ0UqWwC+Nve625csCsqIIw5CT8y/5SDJScBNT/jwnR # egDIS8CiiPsYSBIhyTBfnXfbgthLZJcZiBRup9KXgCZcT9ygfe1Zt4g8LXJDQGIh # vqWgMc96IKuNDb8= # SIG # End signature block
combined_dataset/train/non-malicious/1083.ps1
1083.ps1
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) Describe 'Remove-DotNetAppSetting' { $appSettingName = "TEST_APP_SETTING_NAME" $appSettingValue = "TEST_APP_SETTING_VALUE" function Assert-AppSetting($Name, $value, [Switch]$Framework, [Switch]$Framework64, [Switch]$Clr2, [Switch]$Clr4) { $Name = $Name -replace "'","''" $command = @" Add-Type -AssemblyName System.Configuration `$config = [Configuration.ConfigurationManager]::OpenMachineConfiguration() `$appSettings = `$config.AppSettings.Settings if( `$appSettings['$Name'] ) { `$appSettings['$Name'].Value } else { `$null } "@ $runtimes = @() if( $Clr2 ) { $runtimes += 'v2.0' } if( $Clr4 ) { $runtimes += 'v4.0' } if( $runtimes.Length -eq 0 ) { throw "Must supply either or both the Clr2 and Clr2 switches." } $runtimes | ForEach-Object { $params = @{ Command = $command Encode = $true Runtime = $_ } if( $Framework64 ) { $actualValue = Invoke-PowerShell @params $actualValue | Should Be $Value } if( $Framework ) { $actualValue = Invoke-PowerShell @params -x86 $actualValue | Should Be $Value } } } function Remove-AppSetting { $appSettingName = $appSettingName -replace "'","''" $command = @" Add-Type -AssemblyName System.Configuration `$config = [Configuration.ConfigurationManager]::OpenMachineConfiguration() `$appSettings = `$config.AppSettings.Settings if( `$appSettings['$appSettingName'] ) { `$appSettings.Remove( '$appSettingName' ) `$config.Save() } "@ if( (Test-DotNet -V2) ) { Invoke-PowerShell -Command $command -Encode -x86 -Runtime 'v2.0' Invoke-PowerShell -Command $command -Encode -Runtime 'v2.0' } if( (Test-DotNet -V4 -Full) ) { Invoke-PowerShell -Command $command -Encode -x86 -Runtime 'v4.0' Invoke-PowerShell -Command $command -Encode -Runtime 'v4.0' } } BeforeEach { $Global:Error.Clear() if( $Host.Name -ne 'Windows PowerShell ISE Host' ) { Set-DotNetAppSetting -Name $appSettingName -Value $appSettingValue -Framework64 -Clr2 -Framework -Clr4 } } AfterEach { if( $Host.Name -ne 'Windows PowerShell ISE Host' ) { Remove-AppSetting } } if( $Host.Name -ne 'Windows PowerShell ISE Host' ) { It 'should update machine config .NET 2 x64' { if( -not (Test-DotNet -V2) ) { Fail ('.NET v2 is not installed') } Remove-DotNetAppSetting -Name $appSettingName -Framework64 -Clr2 Assert-AppSetting -Name $appSettingName -Value $null -Framework64 -Clr2 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework64 -Clr4 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework -Clr2 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework -Clr4 } It 'should update machine config .NET 2 x86' { if( -not (Test-DotNet -V2) ) { Fail ('.NET v2 is not installed') } Remove-DotNetAppSetting -Name $appSettingName -Framework -Clr2 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework64 -Clr2 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework64 -Clr4 Assert-AppSetting -Name $appSettingName -Value $null -Framework -Clr2 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework -Clr4 } It 'should update machine config .NET 4 x64' { if( -not (Test-DotNet -V4 -Full) ) { Fail ('.NET v4 full is not installed') } Remove-DotNetAppSetting -Name $appSettingName -Framework64 -Clr4 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework64 -Clr2 Assert-AppSetting -Name $appSettingName -Value $null -Framework64 -Clr4 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework -Clr2 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework -Clr4 } It 'should update machine config .NET 4 x86' { if( -not (Test-DotNet -V4 -Full) ) { Fail ('.NET v4 full is not installed') } Remove-DotNetAppSetting -Name $appSettingName -Framework64 -Clr4 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework64 -Clr2 Assert-AppSetting -Name $appSettingName -Value $null -Framework64 -Clr4 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework -Clr2 Assert-AppSetting -Name $appSettingName -Value $appSettingValue -Framework -Clr4 } It 'should remove app setting with sensitive characters' { $name = $value = '`1234567890-=qwertyuiop[]\a sdfghjkl;''zxcvbnm,./~!@ Set-DotNetAppSetting -Name $name -Value $value -Framework64 -Clr4 Assert-AppSetting -Name $name -Value $value -Framework64 -Clr4 Remove-DotNetAppSetting -Name $name -Framework64 -Clr4 Assert-AppSetting -Name $name -Value $null -Framework64 -Clr4 } } It 'should require a framework flag' { $error.Clear() Remove-DotNetAppSetting -Name $appSettingName -Clr2 -ErrorACtion SilentlyContinue $error.Count | Should Be 1 ($error[0].Exception -like '*You must supply either or both of the Framework and Framework64 switches.') | Should Be $true } It 'should require a clr switch' { $error.Clear() Remove-DotNetAppSetting -Name $appSettingName -Framework -ErrorAction SilentlyContinue $error.Count | Should Be 1 ($error[0].Exception -like '*You must supply either or both of the Clr2 and Clr4 switches.') | Should Be $true } }
combined_dataset/train/non-malicious/1936.ps1
1936.ps1
Describe "Out-File DRT Unit Tests" -Tags "CI" { It "Should be able to write the contents into a file with -pspath" { $tempFile = Join-Path -Path $TestDrive -ChildPath "ExposeBug928965" { 1 | Out-File -PSPath $tempFile } | Should -Not -Throw $fileContents = Get-Content $tempFile $fileContents | Should -Be 1 Remove-Item $tempFile -Force } It "Should be able to write the contents into a file with -pspath" { $tempFile = Join-Path -Path $TestDrive -ChildPath "outfileAppendTest.txt" { 'This is first line.' | out-file $tempFile } | Should -Not -Throw { 'This is second line.' | out-file -append $tempFile } | Should -Not -Throw $tempFile |Should -FileContentMatch "first" $tempFile |Should -FileContentMatch "second" Remove-Item $tempFile -Force } } Describe "Out-File" -Tags "CI" { BeforeAll { $expectedContent = "some test text" $inObject = New-Object psobject -Property @{text=$expectedContent} $testfile = Join-Path -Path $TestDrive -ChildPath outfileTest.txt } AfterEach { Remove-Item -Path $testfile -Force } It "Should be able to be called without error" { { Out-File -FilePath $testfile } | Should -Not -Throw } It "Should be able to accept string input via piping" { { $expectedContent | Out-File -FilePath $testfile } | Should -Not -Throw $actual = Get-Content $testfile $actual | Should -Be $expectedContent } It "Should be able to accept string input via the InputObject switch" { { Out-File -FilePath $testfile -InputObject $expectedContent } | Should -Not -Throw $actual = Get-Content $testfile $actual | Should -Be $expectedContent } It "Should be able to accept object input" { { $inObject | Out-File -FilePath $testfile } | Should -Not -Throw { Out-File -FilePath $testfile -InputObject $inObject } | Should -Not -Throw } It "Should not overwrite when the noclobber switch is used" { Out-File -FilePath $testfile -InputObject $inObject { Out-File -FilePath $testfile -InputObject $inObject -NoClobber -ErrorAction SilentlyContinue } | Should -Throw "already exists." { Out-File -FilePath $testfile -InputObject $inObject -NoOverWrite -ErrorAction SilentlyContinue } | Should -Throw "already exists." $actual = Get-Content $testfile $actual[0] | Should -BeNullOrEmpty $actual[1] | Should -Match "text" $actual[2] | Should -Match "----" $actual[3] | Should -Match "some test text" } It "Should Append a new line when the append switch is used" { { Out-File -FilePath $testfile -InputObject $inObject } | Should -Not -Throw { Out-File -FilePath $testfile -InputObject $inObject -Append } | Should -Not -Throw $actual = Get-Content $testfile $actual[0] | Should -BeNullOrEmpty $actual[1] | Should -Match "text" $actual[2] | Should -Match "----" $actual[3] | Should -Match "some test text" $actual[4] | Should -BeNullOrEmpty $actual[5] | Should -BeNullOrEmpty $actual[6] | Should -Match "text" $actual[7] | Should -Match "----" $actual[8] | Should -Match "some test text" $actual[9] | Should -BeNullOrEmpty $actual[10] | Should -BeNullOrEmpty } It "Should limit each line to the specified number of characters when the width switch is used on objects" { Out-File -FilePath $testfile -Width 10 -InputObject $inObject $actual = Get-Content $testfile $actual[0] | Should -BeNullOrEmpty $actual[1] | Should -BeExactly "text" $actual[2] | Should -BeExactly "----" $actual[3] | Should -BeExactly "some test`u{2026}" } It "Should allow the cmdlet to overwrite an existing read-only file" { { Out-File -FilePath $testfile -InputObject $inObject } | Should -Not -Throw Set-ItemProperty -Path $testfile -Name IsReadOnly -Value $true { Out-File -FilePath $testfile -InputObject $inObject -Append -Force } | Should -Not -Throw $actual = Get-Content $testfile $actual[0] | Should -BeNullOrEmpty $actual[1] | Should -Match "text" $actual[2] | Should -Match "----" $actual[3] | Should -Match "some test text" $actual[4] | Should -BeNullOrEmpty $actual[5] | Should -BeNullOrEmpty $actual[6] | Should -Match "text" $actual[7] | Should -Match "----" $actual[8] | Should -Match "some test text" $actual[9] | Should -BeNullOrEmpty $actual[10] | Should -BeNullOrEmpty Set-ItemProperty -Path $testfile -Name IsReadOnly -Value $false } It "Should be able to use the 'Path' alias for the 'FilePath' parameter" { { Out-File -Path $testfile } | Should -Not -Throw } }
combined_dataset/train/non-malicious/PoshCode ISE Addon_1.ps1
PoshCode ISE Addon_1.ps1
\nif (!(Get-Module WPK)) {Import-Module -global WPK} if (!(Get-Module PoshCode)) {Import-Module -global PoshCode} Function Get-PoshCodePreferences { if (Get-Item $global:xmlPath -ErrorAction SilentlyContinue) { try { $pcPreferences = Import-Clixml -Path $global:xmlPath $global:PCSyntax = $pcPreferences.Syntax $global:PCExpiry = $pcPreferences.Expiry $global:PCAuthor = $pcPreferences.Author } catch { Write-Host "Import-CliXml failed with following error" return } } else { $global:PCSyntax = "posh" $global:PCExpiry = "forever" $global:PCAuthor = "$($env:USERNAME)" } } Function Save-PoshCodePreferences { param($syntax, $expiry, $author) $pcPreferences = New-Object PSObject $pcPreferences | Add-Member -MemberType NoteProperty -Name "Syntax" -Value $syntax $pcPreferences | Add-Member -MemberType NoteProperty -Name "Expiry" -Value $expiry $pcPreferences | Add-Member -MemberType NoteProperty -Name "Author" -Value $author try { Export-Clixml -InputObject $pcPreferences -Path $global:xmlPath -Force } catch { Write-Host "Export-Clixml; failed with the following error" Write-Host $error[0].InnerException return } [system.Windows.Forms.MessageBox]::show('Your preferences have been saved') } function Show-PoshCodeGUI { Get-PoshCodePreferences New-Window -Title "PoshCode addon" -WindowStartupLocation CenterScreen -Width 836 -Height 477 -Show -ResizeMode NoResize -On_Loaded { $txtPasteCode = $Window | Get-ChildControl txtPasteCode $cmbSyntax = $Window | Get-ChildControl cmbSyntax $cmbExpiry = $Window | Get-ChildControl cmbExpiry $txtTitle = $window | Get-ChildControl txtTitle $txtDescription = $window | Get-ChildControl txtDescription $txtAuthor = $window | Get-ChildControl txtAuthor $btnSavePref = $window | Get-ChildControl btnSavePref $btnSubmit = $window | Get-ChildControl btnSubmit } { New-Grid { New-TextBox -Name txtPasteCode -Margin "12,12,0,0" -Height 258 -Width 800 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Text $global:SelectedText ` -IsReadOnly -VerticalScrollBarVisibility "Auto" -HorizontalScrollBarVisibility "Auto" New-Label -Name lblLang -Margin "12,281,0,0" -Height 28 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Content "Scripting Language" -FontWeight "Bold" New-ComboBox -Name cmbSyntax -Margin "175,285,0,0" -Height 23 -Width 192 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Items $global:cmbSyntaxOptions -SelectedIndex $global:cmbSyntaxOptions.IndexOf($global:PCSyntax) New-Label -Name lblExpiry -Margin "12,321,0,0" -Height 28 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Content "Keep" -FontWeight "Bold" New-ComboBox -Name cmbExpiry -Margin "175,324,0,0" -Height 23 -Width 192 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Items $global:Expiry -SelectedIndex $global:Expiry.IndexOf($global:PCExpiry) New-Label -Name lblTitle -Margin "450,281,0,0" -Height 28 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Content "Title" -FontWeight "Bold" New-TextBox -Name txtTitle -Margin "570,285,0,0" -Height 23 -Width 192 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" New-Label -Name lblAuthor -Margin "450,321,0,0" -Height 28 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Content "Author" -FontWeight "Bold" New-TextBox -Name txtAuthor -Margin "570,324,0,0" -Height 23 -Width 192 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Text $global:PCAuthor New-Label -Name lblDescription -Margin "12,361,0,0" -Height 28 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Content "Description" -FontWeight "Bold" New-TextBox -Name txtDescription -Margin "175,361,0,0" -Height 35 -Width 590 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" New-Button -Name btnSavePref -Margin "280,400,0,0" -Height 23 -Width 110 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Content "Save Preferences" -On_Click { Save-PasteBinPreferences -Syntax $cmbSyntax.SelectedItem -Expiry $cmbExpiry.SelectedItem -Author $txtAuthor.Text } New-Button -Name btnSubmit -Margin "410,400,0,0" -Height 23 -Width 110 ` -HorizontalAlignment "Left" -VerticalAlignment "Top" -Content "Submit to PoshCode" -On_Click { $returnUri = $global:SelectedText | New-PoshCode -title $txtTitle.Text ` -description $txtDescription.Text -Author $txtAuthor.Text ` -keep $cmbExpiry.SelectedItem -Language $cmbSyntax.SelectedItem if ($returnUri) { [System.Diagnostics.Process]::Start($returnUri) $window.Close() } else { [system.Windows.Forms.MessageBox]::show('Error occured while uploading to PoshCode') $window.Close() } } } } } [System.Collections.ArrayList]$global:cmbSyntaxOptions = "posh","text","vbnet","xml","asp","bash","csharp" [System.Collections.ArrayList]$global:Expiry = "forever","day","month" $global:xmlPath = $("$env:APPDATA\\PoshCodePrefs.xml") if ($host.Name –eq 'Windows PowerShell ISE Host') { $scriptBlock = { if (($psISE.CurrentFile.Editor.SelectedText -ne "")) { $global:SelectedText = $psISE.CurrentFile.Editor.SelectedText } elseif (($psISE.CurrentFile.Editor.Text -ne "")) { $global:SelectedText = $psISE.CurrentFile.Editor.Text } else { [system.Windows.Forms.MessageBox]::show('There is nothing to upload. Select some text or open a script') return } Show-PoshCodeGUI } $submenus = $psise.CurrentPowerShellTab.AddOnsMenu.Submenus $menuExists = $false foreach ($menuItem in $subMenus) { if ($menuItem.DisplayName -eq "Send to Posh_Code") { $menuExists = $true } } if (!$menuExists) { $psISE.CurrentPowerShellTab.AddOnsMenu.SubMenus.Add("Send To Posh_Code",$ScriptBlock,"CTRL+ALT+C") } $ExecutionContext.SessionState.Module.OnRemove = { foreach ($menuItem in $subMenus) { if ($menuItem.DisplayName -eq "Send to PPosh_Code") { $submenus.Remove($menuItem) return } } } } else { Write-Host "This module is meant for either ISE or PGSE" return } Export-ModuleMember -Function * -Variable *
combined_dataset/train/non-malicious/1863.ps1
1863.ps1
Describe "Get-Module -ListAvailable" -Tags "CI" { BeforeAll { $originalPSModulePath = $env:PSModulePath New-Item -ItemType Directory -Path "$testdrive\Modules\Foo\1.1" -Force > $null New-Item -ItemType Directory -Path "$testdrive\Modules\Foo\2.0" -Force > $null New-Item -ItemType Directory -Path "$testdrive\Modules\Bar\Download" -Force > $null New-Item -ItemType Directory -Path "$testdrive\Modules\Zoo\Too" -Force > $null New-Item -ItemType Directory -Path "$testdrive\Modules\Az" -Force > $null New-ModuleManifest -Path "$testdrive\Modules\Foo\1.1\Foo.psd1" -ModuleVersion 1.1 New-ModuleManifest -Path "$testdrive\Modules\Foo\2.0\Foo.psd1" -ModuleVersion 2.0 New-ModuleManifest -Path "$testdrive\Modules\Bar\Bar.psd1" New-ModuleManifest -Path "$testdrive\Modules\Zoo\Zoo.psd1" New-ModuleManifest -Path "$testdrive\Modules\Az\Az.psd1" -ModuleVersion 1.1 New-Item -ItemType File -Path "$testdrive\Modules\Foo\1.1\Foo.psm1" > $null New-Item -ItemType File -Path "$testdrive\Modules\Foo\2.0\Foo.psm1" > $null New-Item -ItemType File -Path "$testdrive\Modules\Bar\Bar.psm1" > $null New-Item -ItemType File -Path "$testdrive\Modules\Bar\Download\Download.psm1" > $null New-Item -ItemType File -Path "$testdrive\Modules\Zoo\Zoo.psm1" > $null New-Item -ItemType File -Path "$testdrive\Modules\Zoo\Too\Zoo.psm1" > $null New-Item -ItemType File -Path "$testdrive\Modules\Az\Az.psm1" > $null $fullyQualifiedPathTestCases = @( @{ ModPath = "$TestDrive/Modules\Foo"; Name = 'Foo'; Version = '2.0'; Count = 1 } @{ ModPath = "$TestDrive\Modules/Foo\1.1/Foo.psd1"; Name = 'Foo'; Version = '1.1'; Count = 1 } @{ ModPath = "$TestDrive\Modules/Bar.psd1"; Name = 'Bar'; Version = '0.0'; Count = 1 } @{ ModPath = "$TestDrive\Modules\Zoo\Too\Zoo.psm1"; Name = 'Zoo'; Version = '0.0'; Count = 1 } ) $listModuleNameTestCases = @( @{ Name = 'Foo' TestCaseName = 'Match case' ExpectedName = 'Foo' ModuleVersion = '2.0' } @{ Name = 'foo' TestCaseName = 'Mismatched case' ExpectedName = 'Foo' ModuleVersion = '2.0' } ) $loadedModuleNameTestCases = @( @{ Name = 'Microsoft.PowerShell.Managemen*' TestCaseName = 'Wildcard' ExpectedName = 'Microsoft.PowerShell.Management' ModuleVersion = '7.0.0.0' } @{ Name = 'microsoft.powershell.managemen*' TestCaseName = 'Mismatched case' ExpectedName = 'Microsoft.PowerShell.Management' ModuleVersion = '7.0.0.0' } ) $env:PSModulePath = Join-Path $testdrive "Modules" } AfterAll { $env:PSModulePath = $originalPSModulePath } It "Get-Module -ListAvailable" { $modules = Get-Module -ListAvailable $modules.Count | Should -Be 5 $modules = $modules | Sort-Object -Property Name, Version $modules.Name -join "," | Should -BeExactly "Az,Bar,Foo,Foo,Zoo" $modules[0].Version | Should -Be "1.1" $modules[1].Version | Should -Be "0.0.1" $modules[2].Version | Should -Be '1.1' $modules[3].Version | Should -Be '2.0' } It "Get-Module <Name> -ListAvailable" { $modules = Get-Module F* -ListAvailable $modules.Count | Should -Be 2 $modules = $modules | Sort-Object -Property Version $modules.Name -join "," | Should -BeExactly "Foo,Foo" $modules[0].Version | Should -Be "1.1" $modules[1].Version | Should -Be "2.0" } It "Get-Module -ListAvailable -All" { $modules = Get-Module -ListAvailable -All $modules.Count | Should -Be 12 $modules = $modules | Sort-Object -Property Name, Path $modules.Name -join "," | Should -BeExactly "Az,Az,Bar,Bar,Download,Foo,Foo,Foo,Foo,Zoo,Zoo,Zoo" $modules[0].ModuleType | Should -BeExactly "Manifest" $modules[1].ModuleType | Should -BeExactly "Script" $modules[2].ModuleType | Should -BeExactly "Manifest" $modules[3].ModuleType | Should -BeExactly "Script" $modules[4].ModuleType | Should -BeExactly "Script" $modules[5].ModuleType | Should -BeExactly "Manifest" $modules[5].Version | Should -Be "1.1" $modules[6].ModuleType | Should -BeExactly "Script" $modules[7].ModuleType | Should -BeExactly "Manifest" $modules[7].Version | Should -Be "2.0" $modules[8].ModuleType | Should -BeExactly "Script" $modules[9].ModuleType | Should -BeExactly "Script" $modules[9].Path | Should -BeExactly (Resolve-Path "$testdrive\Modules\Zoo\Too\Zoo.psm1").Path $modules[10].ModuleType | Should -BeExactly "Manifest" $modules[10].Path | Should -BeExactly (Resolve-Path "$testdrive\Modules\Zoo\Zoo.psd1").Path $modules[11].ModuleType | Should -BeExactly "Script" $modules[11].Path | Should -BeExactly (Resolve-Path "$testdrive\Modules\Zoo\Zoo.psm1").Path } It "Get-Module <Name> -ListAvailable -All" { $modules = Get-Module down*, zoo -ListAvailable -All $modules.Count | Should -Be 4 $modules = $modules | Sort-Object -Property Name, Path $modules.Name -join "," | Should -BeExactly "Download,Zoo,Zoo,Zoo" $modules[0].Path | Should -BeExactly (Resolve-Path "$testdrive\Modules\Bar\Download\Download.psm1").Path $modules[1].Path | Should -BeExactly (Resolve-Path "$testdrive\Modules\Zoo\Too\Zoo.psm1").Path $modules[2].Path | Should -BeExactly (Resolve-Path "$testdrive\Modules\Zoo\Zoo.psd1").Path $modules[3].Path | Should -BeExactly (Resolve-Path "$testdrive\Modules\Zoo\Zoo.psm1").Path } It "Get-Module <Path> -ListAvailable" { $modules = Get-Module "$testdrive\Modules\*" -ListAvailable $modules.Count | Should -Be 5 $modules = $modules | Sort-Object -Property Name, Version $modules.Name -join "," | Should -BeExactly "Az,Bar,Foo,Foo,Zoo" $modules[2].Version | Should -Be "1.1" $modules[3].Version | Should -Be '2.0' } It "Get-Module <Path> -ListAvailable -All" { $modules = Get-Module "$testdrive\Modules\*" -ListAvailable -All $modules.Count | Should -Be 6 $modules = $modules | Sort-Object -Property Name, Path $modules.Name -join "," | Should -BeExactly "Az,Bar,Foo,Foo,Zoo,Zoo" $modules[4].Path | Should -BeExactly (Resolve-Path "$testdrive\Modules\Zoo\Too\Zoo.psm1").Path } It "Get-Module -FullyQualifiedName @{ModuleName = '<Name>' ; ModuleVersion = '<ModuleVersion>'} -ListAvailable - <TestCaseName>" -TestCases $listModuleNameTestCases { param( [Parameter(Mandatory = $true)] $Name, $TestCaseName, [Parameter(Mandatory = $true)] $ExpectedName, $ModuleVersion ) $moduleSpecification = @{ModuleName = $name ; ModuleVersion = $ModuleVersion} $modules = Get-Module -FullyQualifiedName $moduleSpecification -ListAvailable $modules | Should -HaveCount 1 $modules.Name | Should -BeExactly $ExpectedName $modules.Version | Should -BeExactly $ModuleVersion } It "Get-Module -FullyQualifiedName @{ModuleName = '<Name>' ; ModuleVersion = '<ModuleVersion>'} - <TestCaseName>" -TestCases $loadedModuleNameTestCases { param( [Parameter(Mandatory = $true)] $Name, $TestCaseName, [Parameter(Mandatory = $true)] $ExpectedName, $ModuleVersion ) $moduleSpecification = @{ModuleName = $name ; ModuleVersion = $ModuleVersion} $modules = Get-Module -FullyQualifiedName $moduleSpecification $modules | Should -HaveCount 1 $modules.Name | Should -BeExactly $ExpectedName $modules.Version | Should -BeExactly $ModuleVersion } It "Get-Module <Name> -Refresh -ListAvailable" { $modules = Get-Module -Name 'Zoo' -ListAvailable $modules | Should -HaveCount 1 $modules.Name | Should -BeExactly "Zoo" $modules.ExportedFunctions.Count | Should -Be 0 -Because 'No exports were defined' New-ModuleManifest -Path "$testdrive\Modules\Zoo\Zoo.psd1" -FunctionsToExport 'Test-ZooFunction' $modules = Get-Module -Name 'Zoo' -ListAvailable -Refresh $modules | Should -HaveCount 1 $modules.Name | Should -BeExactly "Zoo" $modules.ExportedFunctions.Count | Should -Be 1 -Because 'We added a new function to export' } It "Get-Module respects absolute paths in module specifications: <ModPath>" -TestCases $fullyQualifiedPathTestCases { param([string]$ModPath, [string]$Name, [string]$Version, [int]$Count) $modSpec = @{ ModuleName = $ModPath RequiredVersion = $Version } $modules = Get-Module -ListAvailable -FullyQualifiedName $modSpec $modules | Should -HaveCount $Count $modules[0].Name | Should -BeExactly $Name $modules.Version | Should -Contain $Version } Context "PSEdition" { BeforeAll { New-Item -ItemType Directory -Path "$testdrive\Modules\DesktopOnlyModule" -Force > $null New-Item -ItemType Directory -Path "$testdrive\Modules\CoreOnlyModule" -Force > $null New-Item -ItemType Directory -Path "$testdrive\Modules\CoreAndDesktopModule" -Force > $null New-ModuleManifest -Path "$testdrive\Modules\DesktopOnlyModule\DesktopOnlyModule.psd1" -CompatiblePSEditions Desktop New-ModuleManifest -Path "$testdrive\Modules\CoreOnlyModule\CoreOnlyModule.psd1" -CompatiblePSEditions Core New-ModuleManifest -Path "$testdrive\Modules\CoreAndDesktopModule\CoreAndDesktopModule.psd1" -CompatiblePSEditions Core, Desktop New-Item -ItemType File -Path "$testdrive\Modules\DesktopOnlyModule\DesktopOnlyModule.psm1" > $null New-Item -ItemType File -Path "$testdrive\Modules\CoreOnlyModule\CoreOnlyModule.psm1" > $null New-Item -ItemType File -Path "$testdrive\Modules\CoreAndDesktopModule\CoreAndDesktopModule.psm1" > $null } It "Get-Module -PSEdition <CompatiblePSEditions> -ListAvailable" -TestCases @( @{ CompatiblePSEditions = 'Desktop'; ExpectedModule = 'CoreAndDesktopModule', 'DesktopOnlyModule' }, @{ CompatiblePSEditions = 'Core' ; ExpectedModule = 'CoreAndDesktopModule', 'CoreOnlyModule' } ) { param ($CompatiblePSEditions, $ExpectedModule) $modules = Get-Module -PSEdition $CompatiblePSEditions -ListAvailable $modules | Should -HaveCount $ExpectedModule.Count $modules.Name | Sort-Object | Should -BeExactly $ExpectedModule } } Context "Module analysis shouldn't load assembly" { BeforeAll { $tempModulePath = Join-Path $TestDrive "TempModules" $testModuleDir = Join-Path $tempModulePath "MyModuelTest" $moduleManifest = Join-Path $testModuleDir "MyModuelTest.psd1" $assemblyPath = Join-Path $testModuleDir "MyModuelTestCommandAssembly.dll" $null = New-Item $testModuleDir -ItemType Directory -ErrorAction SilentlyContinue if (-not (Test-Path $moduleManifest)) { Set-Content $moduleManifest -Value @' @{ RootModule = 'MyModuelTestCommandAssembly.dll' ModuleVersion = '0.0.1' GUID = '5776ed43-1607-4e64-be76-acacdf8e9c8c' FunctionsToExport = @() CmdletsToExport = @("Get-Test") AliasesToExport = @() } '@ } $code = @' using System.Management.Automation; [Cmdlet("Get", "Test")] public class MyModuelTestCommand : PSCmdlet { protected override void ProcessRecord() { WriteObject("BLAH"); } } '@ if (-not (Test-Path $assemblyPath)) { Add-Type -TypeDefinition $code -OutputAssembly $assemblyPath } } It "'Get-Module -ListAvailable' should not load the module assembly" { $result = pwsh -noprofile -c "`$env:PSModulePath = '$tempModulePath'; `$module = Get-Module -ListAvailable; `$fullName = [System.AppDomain]::CurrentDomain.GetAssemblies() | Where-Object Location -eq $assemblyPath | Foreach-Object FullName; `$module.Name + `$fullName" $result | Should -BeExactly "MyModuelTest" } } } Describe 'Get-Module -ListAvailable with path' -Tags "CI" { BeforeAll { $moduleName = 'Banana' $modulePath = Join-Path $TestDrive $moduleName $v1 = '1.2.3' $v2 = '4.8.3' $v1DirPath = Join-Path $modulePath $v1 $v2DirPath = Join-Path $modulePath $v2 $manifestV1Path = Join-Path $v1DirPath "$moduleName.psd1" $manifestV2Path = Join-Path $v2DirPath "$moduleName.psd1" New-Item -ItemType Directory $modulePath New-Item -ItemType Directory -Path $v1DirPath New-Item -ItemType Directory -Path $v2DirPath New-ModuleManifest -Path $manifestV1Path -ModuleVersion $v1 New-ModuleManifest -Path $manifestV2Path -ModuleVersion $v2 } It "Gets all versions by path" { $modules = Get-Module -ListAvailable $modulePath | Sort-Object -Property Version $modules | Should -HaveCount 2 $modules[0].Name | Should -BeExactly $moduleName $modules[0].Path | Should -BeExactly $manifestV1Path $modules[0].Version | Should -Be $v1 $modules[1].Name | Should -BeExactly $moduleName $modules[1].Path | Should -BeExactly $manifestV2Path $modules[1].Version | Should -Be $v2 } It "Gets all versions by FullyQualifiedName with path with lower version" { $modules = Get-Module -ListAvailable -FullyQualifiedName @{ ModuleName = $modulePath; ModuleVersion = '0.0' } | Sort-Object -Property Version $modules | Should -HaveCount 2 $modules[0].Name | Should -BeExactly $moduleName $modules[0].Path | Should -BeExactly $manifestV1Path $modules[0].Version | Should -Be $v1 $modules[1].Name | Should -BeExactly $moduleName $modules[1].Path | Should -BeExactly $manifestV2Path $modules[1].Version | Should -Be $v2 } It "Gets high version by FullyQualifiedName with path with high version" { $modules = Get-Module -ListAvailable -FullyQualifiedName @{ ModuleName = $modulePath; ModuleVersion = '2.0' } | Sort-Object -Property Version $modules | Should -HaveCount 1 $modules[0].Name | Should -BeExactly $moduleName $modules[0].Path | Should -BeExactly $manifestV2Path $modules[0].Version | Should -Be $v2 } It "Gets low version by FullyQualifiedName with path with low maximum version" { $modules = Get-Module -ListAvailable -FullyQualifiedName @{ ModuleName = $modulePath; MaximumVersion = '2.0' } | Sort-Object -Property Version $modules | Should -HaveCount 1 $modules[0].Name | Should -BeExactly $moduleName $modules[0].Path | Should -BeExactly $manifestV1Path $modules[0].Version | Should -Be $v1 } It "Gets low version by FullyQualifiedName with path with low maximum version and version" { $modules = Get-Module -ListAvailable -FullyQualifiedName @{ ModuleName = $modulePath; MaximumVersion = '2.0'; ModuleVersion = '1.0' } | Sort-Object -Property Version $modules | Should -HaveCount 1 $modules[0].Name | Should -BeExactly $moduleName $modules[0].Path | Should -BeExactly $manifestV1Path $modules[0].Version | Should -Be $v1 } It "Gets correct version by FullyQualifiedName with path with required version" -TestCases @( @{ Version = $v1 } @{ Version = $v2 } ) { param([version]$Version) switch ($Version) { $v1 { $expectedPath = $manifestV1Path break } $v2 { $expectedPath = $manifestV2Path } } $modules = Get-Module -ListAvailable -FullyQualifiedName @{ ModuleName = $modulePath; RequiredVersion = $Version } $modules | Should -HaveCount 1 $modules[0].Name | Should -BeExactly $moduleName $modules[0].Path | Should -BeExactly $expectedPath $modules[0].Version | Should -Be $Version } }
combined_dataset/train/non-malicious/Ping-Subnet.ps1
Ping-Subnet.ps1
#requires -Version 2.0 Function Ping-Subnet { #.Synopsis # Ping a subnet returning all alive hosts. #.Example # Ping-Subnet -IP 192.168.1.0 -Netmask /24 #.Example # Ping-Subnet -IP 192.168.1.128 -Netmask 255.255.255.128 Param( [string] $IP, [string] $netmask ) Begin { $IPs = New-Object System.Collections.ArrayList $Jobs = New-Object System.Collections.ArrayList $max = 50 Function Get-NetworkAddress { #.Synopsis # Get the network address of a given lan segment #.Example # Get-NetworkAddress -IP 192.168.1.36 -mask 255.255.255.0 Param ( [string] $IP, [string] $Mask, [switch] $Binary ) Begin { $NetAdd = $null } Process { $BinaryIP = ConvertTo-BinaryIP $IP $BinaryMask = ConvertTo-BinaryIP $Mask 0..34 | %{ $IPBit = $BinaryIP.Substring($_,1) $MaskBit = $BinaryMask.Substring($_,1) IF ($IPBit -eq '1' -and $MaskBit -eq '1') { $NetAdd = $NetAdd + "1" } elseif ($IPBit -eq ".") { $NetAdd = $NetAdd +'.' } else { $NetAdd = $NetAdd + "0" } } if ($Binary) { return $NetAdd } else { return ConvertFrom-BinaryIP $NetAdd } } } Function ConvertTo-BinaryIP { #.Synopsis # Convert an IP address to binary #.Example # ConvertTo-BinaryIP -IP 192.168.1.1 Param ( [string] $IP ) Process { $out = @() Foreach ($octet in $IP.split('.')) { $strout = $null 0..7|% { IF (($octet - [math]::pow(2,(7-$_)))-ge 0) { $octet = $octet - [math]::pow(2,(7-$_)) [string]$strout = $strout + "1" } else { [string]$strout = $strout + "0" } } $out += $strout } return [string]::join('.',$out) } } Function ConvertFrom-BinaryIP { #.Synopsis # Convert from Binary to an IP address #.Example # Convertfrom-BinaryIP -IP 11000000.10101000.00000001.00000001 Param ( [string] $IP ) Process { $out = @() Foreach ($octet in $IP.split('.')) { $strout = 0 0..7|% { $bit = $octet.Substring(($_),1) IF ($bit -eq 1) { $strout = $strout + [math]::pow(2,(7-$_)) } } $out += $strout } return [string]::join('.',$out) } } Function ConvertTo-MaskLength { #.Synopsis # Convert from a netmask to the masklength #.Example # ConvertTo-MaskLength -Mask 255.255.255.0 Param ( [string] $mask ) Process { $out = 0 Foreach ($octet in $Mask.split('.')) { $strout = 0 0..7|% { IF (($octet - [math]::pow(2,(7-$_)))-ge 0) { $octet = $octet - [math]::pow(2,(7-$_)) $out++ } } } return $out } } Function ConvertFrom-MaskLength { #.Synopsis # Convert from masklength to a netmask #.Example # ConvertFrom-MaskLength -Mask /24 #.Example # ConvertFrom-MaskLength -Mask 24 Param ( [int] $mask ) Process { $out = @() [int]$wholeOctet = ($mask - ($mask % 8))/8 if ($wholeOctet -gt 0) { 1..$($wholeOctet) |%{ $out += "255" } } $subnet = ($mask - ($wholeOctet * 8)) if ($subnet -gt 0) { $octet = 0 0..($subnet - 1) | %{ $octet = $octet + [math]::pow(2,(7-$_)) } $out += $octet } for ($i=$out.count;$i -lt 4; $I++) { $out += 0 } return [string]::join('.',$out) } } Function Get-IPRange { #.Synopsis # Given an Ip and subnet, return every IP in that lan segment #.Example # Get-IPRange -IP 192.168.1.36 -Mask 255.255.255.0 #.Example # Get-IPRange -IP 192.168.5.55 -Mask /23 Param ( [string] $IP, [string] $netmask ) Process { iF ($netMask.length -le 3) { $masklength = $netmask.replace('/','') $Subnet = ConvertFrom-MaskLength $masklength } else { $Subnet = $netmask $masklength = ConvertTo-MaskLength -Mask $netmask } $network = Get-NetworkAddress -IP $IP -Mask $Subnet [int]$FirstOctet,[int]$SecondOctet,[int]$ThirdOctet,[int]$FourthOctet = $network.split('.') $TotalIPs = ([math]::pow(2,(32-$masklength)) -2) $blocks = ($TotalIPs - ($TotalIPs % 256))/256 if ($Blocks -gt 0) { 1..$blocks | %{ 0..255 |%{ if ($FourthOctet -eq 255) { If ($ThirdOctet -eq 255) { If ($SecondOctet -eq 255) { $FirstOctet++ $secondOctet = 0 } else { $SecondOctet++ $ThirdOctet = 0 } } else { $FourthOctet = 0 $ThirdOctet++ } } else { $FourthOctet++ } Write-Output ("{0}.{1}.{2}.{3}" -f ` $FirstOctet,$SecondOctet,$ThirdOctet,$FourthOctet) } } } $sBlock = $TotalIPs - ($blocks * 256) if ($sBlock -gt 0) { 1..$SBlock | %{ if ($FourthOctet -eq 255) { If ($ThirdOctet -eq 255) { If ($SecondOctet -eq 255) { $FirstOctet++ $secondOctet = 0 } else { $SecondOctet++ $ThirdOctet = 0 } } else { $FourthOctet = 0 $ThirdOctet++ } } else { $FourthOctet++ } Write-Output ("{0}.{1}.{2}.{3}" -f ` $FirstOctet,$SecondOctet,$ThirdOctet,$FourthOctet) } } } } } Process { #get every ip in scope Get-IPRange $IP $netmask | %{ [void]$IPs.Add($_) } #loop untill we've pinged them all While ($IPs.count -gt 0 -or $jobs.count -gt 0) { #if we have open spots kick off some more IF ($jobs.count -le $max) { # determin how many to kick off $addjobs = ($max - $jobs.count) Foreach ($IP in ($IPS | Select -first $addjobs)) { #save the job id, and move on [VOID]$Jobs.Add((gwmi -q "SELECT Address,StatusCode FROM Win32_Pingstatus WHERE Address = `'$IP`'" -asjob).Id) #remove the IP from our pool $IPs.Remove($IP) } } #we'll use this array to track what's comeback $Clean = @() Foreach ($J in $jobs) { # If this job is done get the results if ((Get-Job -id $j).JobStateInfo.state -eq 'Completed') { # if the ping was sucessfull return the IP Address write-output (Receive-Job -id $j) | ?{$_.StatusCode -eq 0}| select -expand Address # dispose of the job remove-job -id $j $clean += $j } } Foreach ($c in $Clean) { #remove the jobs that we just processed $jobs.remove($c) } } } }
combined_dataset/train/non-malicious/sample_9_41.ps1
sample_9_41.ps1
# Localized 10/16/2024 05:34 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=예(&Y) PromptNoString=아니요(&N) BundleFound=찾은 번들: {0} PackageFound=찾은 패키지: {0} EncryptedBundleFound=암호화된 번들 찾음: {0} EncryptedPackageFound=암호화된 패키지 찾음: {0} CertificateFound=찾은 인증서: {0} DependenciesFound=찾은 종속성 패키지: GettingDeveloperLicense=개발자 라이선스를 취득하는 중... InstallingCertificate=인증서를 설치하는 중... InstallingPackage=\n앱을 설치하는 중... AcquireLicenseSuccessful=개발자 라이선스를 취득했습니다. InstallCertificateSuccessful=인증서가 설치되었습니다. Success=\n성공: 앱이 설치되었습니다. WarningInstallCert=\n컴퓨터의 신뢰된 사용자 인증서 저장소에 디지털 인증서를 설치하려고 합니다. 이렇게 하면 보안상 심각하게 위험해지므로 이 디지털 인증서를 만든 사람을 신뢰하는 경우에만 해당 인증서를 설치해야 합니다.\n\n이 앱을 다 사용한 후에는 연결된 디지털 인증서를 수동으로 제거해야 합니다. 이 작업을 수행하는 방법에 대한 지침은 다음에서 확인할 수 있습니다. http://go.microsoft.com/fwlink/?LinkId=243053\n\n계속하시겠습니까?\n\n ElevateActions=\n이 앱을 설치하기 전에 다음을 수행해야 합니다. ElevateActionDevLicense=\t- 개발자 라이선스 취득 ElevateActionCertificate=\t- 서명 인증서 설치 ElevateActionsContinue=계속하려면 관리자 자격 증명이 필요합니다. UAC 프롬프트를 확인하고 메시지가 표시되는 경우 관리자 암호를 제공하십시오. ErrorForceElevate=계속하려면 관리자 자격 증명을 제공해야 합니다. 이 스크립트를 -Force 매개 변수 없이 실행하거나 권한이 높은 PowerShell 창에서 실행하십시오. ErrorForceDeveloperLicense=개발자 라이선스를 취득하려면 사용자 상호 작용이 필요합니다. 스크립트를 -Force 매개 변수 없이 다시 실행하십시오. ErrorLaunchAdminFailed=오류: 관리자로 새 프로세스를 시작할 수 없습니다. ErrorNoScriptPath=오류: 이 스크립트를 파일에서 시작해야 합니다. ErrorNoPackageFound=오류: 스크립트 디렉터리에서 패키지 또는 번들을 찾을 수 없습니다. 설치하려는 패키지 또는 번들이 이 스크립트와 같은 디렉터리에 있는지 확인하십시오. ErrorManyPackagesFound=오류: 스크립트 디렉터리에 둘 이상의 패키지 또는 번들이 있습니다. 설치하려는 패키지 또는 번들만 이 스크립트와 같은 디렉터리에 있는지 확인하십시오. ErrorPackageUnsigned=오류: 패키지 또는 번들이 디지털 서명되지 않았거나 해당 서명이 손상되었습니다. ErrorNoCertificateFound=오류: 스크립트 디렉터리에서 인증서를 찾을 수 없습니다. 설치하려는 패키지 또는 번들을 서명하는 데 사용된 인증서가 이 스크립트와 같은 디렉터리에 있는지 확인하십시오. ErrorManyCertificatesFound=오류: 스크립트 디렉터리에 둘 이상의 인증서가 있습니다. 설치하려는 패키지 또는 번들을 서명하는 데 사용된 인증서만 이 스크립트와 같은 디렉터리에 있는지 확인하세요. ErrorBadCertificate=오류: "{0}" 파일이 올바른 디지털 인증서가 아닙니다. CertUtil에서 오류 코드 {1}이(가) 반환되었습니다. ErrorExpiredCertificate=오류: 개발자 인증서 "{0}"이(가) 만료되었습니다. 시스템 클록이 올바른 날짜 및 시간으로 설정되지 않은 것 같습니다. 시스템 설정이 올바른 경우 앱 소유자에게 유효한 인증서로 패키지 또는 번들을 다시 만들도록 요청하십시오. ErrorCertificateMismatch=오류: 인증서가 패키지 또는 번들을 서명하는 데 사용된 인증서와 일치하지 않습니다. ErrorCertIsCA=오류: 인증서는 인증 기관일 수 없습니다. ErrorBannedKeyUsage=오류: 인증서의 키 사용은 {0}일 수 없습니다. 키 사용을 지정하지 않거나 키 사용이 "DigitalSignature"와 같아야 합니다. ErrorBannedEKU=오류: 인증서의 확장 키 사용은 {0}일 수 없습니다. 코드 서명 및 영구 서명 EKU만 사용할 수 있습니다. ErrorNoBasicConstraints=오류: 인증서에 기본 제약 조건 확장이 없습니다. ErrorNoCodeSigningEku=오류: 인증서에 코드 서명용 확장 키 사용이 없습니다. ErrorInstallCertificateCancelled=오류: 인증서 설치가 취소되었습니다. ErrorCertUtilInstallFailed=오류: 인증서를 설치할 수 없습니다. CertUtil에서 오류 코드 {0}이(가) 반환되었습니다. ErrorGetDeveloperLicenseFailed=오류: 개발자 라이선스를 취득할 수 없습니다. 자세한 내용은 http://go.microsoft.com/fwlink/?LinkID=252740을 참조하십시오. ErrorInstallCertificateFailed=오류: 인증서를 설치할 수 없습니다. 상태: {0}. 자세한 내용은 http://go.microsoft.com/fwlink/?LinkID=252740을 참조하십시오. ErrorAddPackageFailed=오류: 앱을 설치할 수 없습니다. ErrorAddPackageFailedWithCert=오류: 앱을 설치할 수 없습니다. 보안을 위해 앱을 설치할 수 있을 때까지 서명 인증서를 제거해 보십시오. 이 작업을 수행하는 방법에 대한 지침은 다음에서 확인할 수 있습니다.\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@
combined_dataset/train/non-malicious/199.ps1
199.ps1
Function Get-VMhostHbaInfo { [CmdletBinding()] PARAM ( [Parameter( Mandatory = $true, ValueFromPipeline = $true)] [String] $VMhost, [Parameter()] [ValidateScript({ Test-path -Path $_ -PathType Leaf })] [string] $PlinkPath = "C:\Program Files (x86)\PuTTY\plink.exe", [Parameter( HelpMessage = "Enter the ESXi account used for SSH connection/command.", Mandatory = $true)] [string] $Username, [Parameter( HelpMessage = "Enter the ESXi account's password.", Mandatory = $true)] [string] $Password ) BEGIN { TRY { IF (-not (Get-PSSnapin -Name VMware.VimAutomation.Core -ErrorAction 'SilentlyContinue')) { Write-Verbose -Message "BEGIN - Loading Vmware Snapin VMware.VimAutomation.Core..." Add-PSSnapin -Name VMware.VimAutomation.Core -ErrorAction Stop -ErrorVariable ErrorBeginAddPssnapin } IF (-not ($global:DefaultVIServer.count -gt 0)) { Write-Verbose -Message "BEGIN - Currently not connected to a vCenter..." Connect-VIServer -Server (Read-Host -Prompt "You are not connected to a VMware vCenter, Please enter the FQDN or IP of the vCenter") -ErrorAction Stop -ErrorVariable ErrorBeginConnectViServer } } CATCH { IF ($ErrorBeginAddPssnapin) { Write-Warning -Message "BEGIN - VMware Snapin VMware.VimAutomation.Core does not seem to be available" Write-Error -message $Error[0].Exception.Message } IF ($ErrorBeginConnectViServer) { Write-Warning -Message "BEGIN - Couldnt connect to the Vcenter" Write-Error -message $Error[0].Exception.Message } } } PROCESS { TRY { Write-verbose -Message "PROCESS - $Vmhost - Retrieving General Information ..." $hostsview = Get-View -ViewType HostSystem -Property ("runtime", "name", "config", "hardware") -Filter @{ "Name" = "$VMhost" } -ErrorAction Stop -ErrorVariable ErrorProcessGetView IF ($hostsview) { IF ($hostsview.runtime.PowerState -match "poweredOn") { Write-verbose -Message "PROCESS - $($hostview.name) - Status is Powered On" $esx = $hostsview | where-object { $_.runtime.PowerState -match "poweredOn" } FOREACH ($hba in ($esx.Config.StorageDevice.HostBusAdapter | Where-Object { $_.GetType().Name -eq "HostFibreChannelHba" })) { Write-Verbose -Message "PROCESS - $($esx.name) - Retrieving HBA information ..." $line = "" | Select-Object -Property HostName, HostProduct, HbaDevice, HbaWWN, HbaDriver, HbaModel, HbaFirmwareVersion, HWModel $line.HostName = $esx.name $line.HostProduct = $esx.config.product.fullName $line.HbaDevice = $hba.device $line.HbaWWN = ([regex]::matches("{0:x}" -f $hba.PortWorldWideName, '.{2}') | Foreach-object { $_.value }) -join ':' $line.HbaDriver = $hba.driver $line.HbaModel = $hba.model $line.HWModel = $esx.hardware.systemInfo.model Write-Verbose -Message "PROCESS - $($esx.name) - Retrieving HBA Advance information - checking SSH Service..." IF (((Get-View -ViewType HostSystem -ErrorAction Stop -ErrorVariable ErrorProcessGetViewTypeService -Filter @{ "Name" = $($ESX.name) }).config.service.service |where-object { $_.key -eq 'tsm-ssh' }).running) { if ($hba.driver -match "lpfc") { $remoteCommand = "head -9 /proc/scsi/lpfc*/* | grep -B1 $($line.HbaWWN) | grep -i 'firmware version' | sed 's/Firmware Version:\{0,1\} \(.*\)/\1/'" } elseif ($hba.driver -match "qla") { $remoteCommand = "head -8 /proc/scsi/qla*/* | grep -B2 $($hba.device) | grep -i 'firmware version' | head -1 | sed 's/.*Firmware version \(.*\), Driver version.*/\1/'" } $tmpStr = [string]::Format('& "{0}" {1} "{2}"', $PlinkPath, "-ssh " + $Username + "@" + $esx.Name + " -pw $Password", $remoteCommand + ";exit") $line.HbaFirmwareVersion = Invoke-Expression $tmpStr } ELSE { Write-Warning -Message "PROCESS - $($esx.name) - SSH Server is not enabled" $line.HbaFirmwareVersion = "" } Write-Verbose -Message "PROCESS - $($esx.name) - Output Result" Write-Output $line } } ELSE { Write-verbose -Message "PROCESS - Host: $($hostview.name) - Powered Off" } } ELSE { Write-Verbose -Message "PROCESS - Can't find any host" } } CATCH { Write-Warning -Message "PROCESS - Something Wrong happened" IF ($ErrorProcessGetView) { Write-Error -Message "PROCESS - Error while getting the host information" } IF ($ErrorProcessGetViewTypeService) { Write-Error -Message "PROCESS - Error while getting the host services information" } Write-Error -Message $($Error[0].Exception.Message) } } END { Write-Verbose -Message "END - End of Get-VMhostHbaInfo" } }
combined_dataset/train/non-malicious/4347.ps1
4347.ps1
function Get-InstalledModuleDetails { [CmdletBinding()] param ( [Parameter()] [string] $Name, [Parameter()] [string] $RequiredVersion, [Parameter()] [string] $MinimumVersion, [Parameter()] [string] $MaximumVersion ) Set-InstalledModulesVariable $wildcardPattern = New-Object System.Management.Automation.WildcardPattern "$Name*",$script:wildcardOptions $nameWildcardPattern = New-Object System.Management.Automation.WildcardPattern $Name,$script:wildcardOptions $script:PSGetInstalledModules.GetEnumerator() | Microsoft.PowerShell.Core\ForEach-Object { if($wildcardPattern.IsMatch($_.Key)) { $InstalledModuleDetails = $_.Value if(-not $Name -or $nameWildcardPattern.IsMatch($InstalledModuleDetails.PSGetItemInfo.Name)) { if (Test-ItemPrereleaseVersionRequirements -Version $InstalledModuleDetails.PSGetItemInfo.Version ` -RequiredVersion $RequiredVersion ` -MinimumVersion $MinimumVersion ` -MaximumVersion $MaximumVersion) { $InstalledModuleDetails } } } } }
combined_dataset/train/non-malicious/2948.ps1
2948.ps1
Framework '4.8' task default -depends MsBuild task MsBuild { if ( $IsMacOS -OR $IsLinux ) {} else { $output = &msbuild /version /nologo 2>&1 Assert ($output -NotLike '15.0') '$output should contain 15.0' } }
combined_dataset/train/non-malicious/2089.ps1
2089.ps1
Describe "Handle ByRef-like types gracefully" -Tags "CI" { BeforeAll { $code = @' using System; using System.Management.Automation; namespace DotNetInterop { public class Test { public Span<int> this[int i] { get { return default(Span<int>); } set { DoNothing(value); } } public static Span<int> Space { get { return default(Span<int>); } set { DoNothing(value); } } public Span<int> Room { get { return default(Span<int>); } set { DoNothing(value); } } private static void DoNothing(Span<int> param) { } public string PrintMySpan(string str, ReadOnlySpan<char> mySpan = default) { if (mySpan.Length == 0) { return str; } else { return str + mySpan.Length; } } public Span<int> GetSpan(int[] array) { return array.AsSpan(); } } public class Test2 { public Test2(ReadOnlySpan<char> span) { name = $"Number of chars: {span.Length}"; } public Test2() {} private string name = "Hello World"; public string this[ReadOnlySpan<char> span] { get { return name; } set { name = value; } } public string Name => name; } public class CodeMethods { public static ReadOnlySpan<char> GetProperty(PSObject instance) { return default(ReadOnlySpan<char>); } public static void SetProperty(PSObject instance, ReadOnlySpan<char> span) { } public static string RunMethod(PSObject instance, string str, ReadOnlySpan<char> span) { return str + span.Length; } } public ref struct MyByRefLikeType { public MyByRefLikeType(int i) { } public static int Index; } public class ExampleProblemClass { public void ProblemMethod(ref MyByRefLikeType value) { } } } '@ if (-not ("DotNetInterop.Test" -as [type])) { Add-Type -TypeDefinition $code -IgnoreWarnings } $testObj = [DotNetInterop.Test]::new() $test2Obj = [DotNetInterop.Test2]::new() } It "New-Object should fail gracefully when used for a ByRef-like type" { { New-Object -TypeName 'System.Span[string]' } | Should -Throw -ErrorId "CannotInstantiateBoxedByRefLikeType,Microsoft.PowerShell.Commands.NewObjectCommand" { New-Object -TypeName 'DotNetInterop.MyByRefLikeType' } | Should -Throw -ErrorId "CannotInstantiateBoxedByRefLikeType,Microsoft.PowerShell.Commands.NewObjectCommand" } It "The 'new' method call should fail gracefully when used on a ByRef-like type" { { [System.Span[string]]::new() } | Should -Throw -ErrorId "CannotInstantiateBoxedByRefLikeType" { [DotNetInterop.MyByRefLikeType]::new() } | Should -Throw -ErrorId "CannotInstantiateBoxedByRefLikeType" } It "Calling constructor of a ByRef-like type via dotnet adapter should fail gracefully - <Number>" -TestCases @( @{ Number = 1; Script = { [System.Span[string]]::new.Invoke("abc") } } @{ Number = 2; Script = { [DotNetInterop.MyByRefLikeType]::new.Invoke(2) } } ) { param($Script) $expectedError = $null try { & $Script } catch { $expectedError = $_ } $expectedError | Should -Not -BeNullOrEmpty $expectedError.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly "CannotInstantiateBoxedByRefLikeType" } It "Cast to a ByRef-like type should fail gracefully" { { [System.Span[int]] ([int[]]1,2,3) } | Should -Throw -ErrorId "InvalidCastToByRefLikeType" { [DotNetInterop.MyByRefLikeType] "text" } | Should -Throw -ErrorId "InvalidCastToByRefLikeType" } It "LanguagePrimitives.ConvertTo should fail gracefully for a ByRef-like type '<Name>'" -TestCases @( @{ Name = "Span"; Type = [System.Span[int]] } @{ Name = "MyByRefLikeType"; Type = [DotNetInterop.MyByRefLikeType] } ) { param($Type) $expectedError = $null try { [System.Management.Automation.LanguagePrimitives]::ConvertTo(([int[]]1,2,3), $Type) } catch { $expectedError = $_ } $expectedError | Should -Not -BeNullOrEmpty $expectedError.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly "InvalidCastToByRefLikeType" } It "Getting value of a ByRef-like type instance property should not throw and should return null, even in strict mode - <Mechanism>" -TestCases @( @{ Mechanism = "Compiler/Binder"; Script = { [System.Text.Encoding]::ASCII.Preamble } } @{ Mechanism = "Dotnet-Adapter"; Script = { [System.Text.Encoding]::ASCII.PSObject.Properties["Preamble"].Value } } ) { param($Script) try { Set-StrictMode -Version latest & $Script | Should -Be $null } finally { Set-StrictMode -Off } } It "Setting value of a ByRef-like type instance property should fail gracefully - <Mechanism>" -TestCases @( @{ Mechanism = "Compiler/Binder"; Script = { $testObj.Room = [int[]](1,2,3) } } @{ Mechanism = "Dotnet-Adapter"; Script = { $testObj.PSObject.Properties["Room"].Value = [int[]](1,2,3) } } ) { param($Script) $Script | Should -Throw -ErrorId "CannotAccessByRefLikePropertyOrField" } It "<Action> value of a ByRef-like type static property should fail gracefully" -TestCases @( @{ Action = "Getting"; Script = { [DotNetInterop.Test]::Space } } @{ Action = "Setting"; Script = { [DotNetInterop.Test]::Space = "blah" } } ) { param($Script) $Script | Should -Throw -ErrorId "CannotAccessByRefLikePropertyOrField" } It "Invoke a method with optional ByRef-like parameter could work" { $testObj.PrintMySpan("Hello") | Should -BeExactly "Hello" } It "Invoke a method with ByRef-like parameter should fail gracefully - <Mechanism>" -TestCases @( @{ Mechanism = "Compiler/Binder"; Script = { $testObj.PrintMySpan("Hello", 1) } } @{ Mechanism = "Dotnet-Adapter"; Script = { $testObj.psobject.Methods["PrintMySpan"].Invoke("Hello", 1) } } ) { param($Script) $Script | Should -Throw -ErrorId "MethodArgumentConversionInvalidCastArgument" } It "Invoke a method with ByRef-like return type should fail gracefully - Compiler/Binder" { { $testObj.GetSpan([int[]]@(1,2,3)) } | Should -Throw -ErrorId "CannotCallMethodWithByRefLikeReturnType" } It "Invoke a method with ByRef-like return type should fail gracefully - Dotnet-Adapter" { $expectedError = $null try { $testObj.psobject.Methods["GetSpan"].Invoke([int[]]@(1,2,3)) } catch { $expectedError = $_ } $expectedError | Should -Not -BeNullOrEmpty $expectedError.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly "CannotCallMethodWithByRefLikeReturnType" } It "Access static property of a ByRef-like type" { [DotNetInterop.MyByRefLikeType]::Index = 10 [DotNetInterop.MyByRefLikeType]::Index | Should -Be 10 } It "Get access of an indexer that returns ByRef-like type should return null in no-strict mode" { $testObj[1] | Should -Be $null } It "Get access of an indexer that returns ByRef-like type should fail gracefully in strict mode" { try { Set-StrictMode -Version latest { $testObj[1] } | Should -Throw -ErrorId "CannotIndexWithByRefLikeReturnType" } finally { Set-StrictMode -Off } } It "Set access of an indexer that accepts ByRef-like type value should fail gracefully" { { $testObj[1] = 1 } | Should -Throw -ErrorId "CannotIndexWithByRefLikeReturnType" } It "Create instance of type with method that use a ByRef-like type as a ByRef parameter" { $obj = [DotNetInterop.ExampleProblemClass]::new() $obj | Should -BeOfType DotNetInterop.ExampleProblemClass } Context "Passing value that is implicitly/explicitly castable to ByRef-like parameter in method invocation" { BeforeAll { $ps = [powershell]::Create() $ps.AddCommand("Update-TypeData"). AddParameter("TypeName", "DotNetInterop.Test2"). AddParameter("MemberType", "CodeMethod"). AddParameter("MemberName", "RunTest"). AddParameter("Value", [DotNetInterop.CodeMethods].GetMethod('RunMethod')).Invoke() $ps.Commands.Clear() $ps.AddCommand("Update-TypeData"). AddParameter("TypeName", "DotNetInterop.Test2"). AddParameter("MemberType", "CodeProperty"). AddParameter("MemberName", "TestName"). AddParameter("Value", [DotNetInterop.CodeMethods].GetMethod('GetProperty')). AddParameter("SecondValue", [DotNetInterop.CodeMethods].GetMethod('SetProperty')).Invoke() $ps.Commands.Clear() $ps.AddScript('$test = [DotNetInterop.Test2]::new()').Invoke() $ps.Commands.Clear() } AfterAll { $ps.Dispose() } It "Support method calls with ByRef-like parameter as long as the argument can be casted to the ByRef-like type" { $testObj.PrintMySpan("abc", "def") | Should -BeExactly "abc3" $testObj.PrintMySpan("abc", "Hello".ToCharArray()) | Should -BeExactly "abc5" { $testObj.PrintMySpan("abc", 12) } | Should -Throw -ErrorId "MethodArgumentConversionInvalidCastArgument" $path = [System.IO.Path]::GetTempPath() [System.IO.Path]::IsPathRooted($path.ToCharArray()) | Should -Be $true } It "Support constructor calls with ByRef-like parameter as long as the argument can be casted to the ByRef-like type" { $result = [DotNetInterop.Test2]::new("abc") $result.Name | Should -BeExactly "Number of chars: 3" { [DotNetInterop.Test2]::new(12) } | Should -Throw -ErrorId "MethodCountCouldNotFindBest" } It "Support indexing operation with ByRef-like index as long as the argument can be casted to the ByRef-like type" { $test2Obj["abc"] | Should -BeExactly "Hello World" $test2Obj["abc"] = "pwsh" $test2Obj["abc"] | Should -BeExactly "pwsh" } It "Support CodeMethod with ByRef-like parameter as long as the argument can be casted to the ByRef-like type" { $result = $ps.AddScript('$test.RunTest("Hello", "World".ToCharArray())').Invoke() $ps.Commands.Clear() $result.Count | Should -Be 1 $result[0] | Should -Be 'Hello5' } It "Return null for getter access of a CodeProperty that returns a ByRef-like type, even in strict mode" { $result = $ps.AddScript( 'try { Set-StrictMode -Version latest; $test.TestName } finally { Set-StrictMode -Off }').Invoke() $ps.Commands.Clear() $result.Count | Should -Be 1 $result[0] | Should -Be $null } It "Fail gracefully for setter access of a CodeProperty that returns a ByRef-like type" { $result = $ps.AddScript('$test.TestName = "Hello"').Invoke() $ps.Commands.Clear() $result.Count | Should -Be 0 $ps.Streams.Error[0].FullyQualifiedErrorId | Should -Be "CannotAccessByRefLikePropertyOrField" } } }
combined_dataset/train/non-malicious/4055.ps1
4055.ps1
param([string]$refPath=$(throw 'You must provide a path to a reference XML file'), [string]$diffPath=$(throw 'You must provide a path to a second XML file - duh')) $ref = Import-CliXml $refPath | Sort Name $diff = Import-CliXml $diffPath | sort Name Compare-Object $ref $diff -property Name,CommandType -sync 1000 | sort CommandType, Name
combined_dataset/train/non-malicious/sample_39_67.ps1
sample_39_67.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Creates (or updates) an Application Insights component. Note: You cannot specify a different value for InstrumentationKey nor AppId in the Put operation. .Description Creates (or updates) an Application Insights component. Note: You cannot specify a different value for InstrumentationKey nor AppId in the Put operation. .Link https://learn.microsoft.com/powershell/module/az.applicationinsights/update-azapplicationinsights #> function Update-AzApplicationInsights { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api202002.IApplicationInsightsComponent])] [CmdletBinding(PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [Alias("ApplicationInsightsComponentName", "ComponentName")] [System.String] # The name of the Application Insights component resource. ${Name}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.ApplicationType])] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.ApplicationType] # Type of application being monitored. ${ApplicationType}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Disable IP masking. ${DisableIPMasking}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Disable Non-AAD based Auth. ${DisableLocalAuth}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Resource etag ${Etag}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.FlowType])] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.FlowType] # Used by the Application Insights system to determine what kind of flow this component was created by. # This is to be set to 'Bluefield' when creating/updating a component via the REST API. ${FlowType}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Force users to create their own storage account for profiler and debugger. ${ForceCustomerStorageForProfiler}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # The unique application ID created when a new application is added to HockeyApp, used for communications with HockeyApp. ${HockeyAppId}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Purge data immediately after 30 days. ${ImmediatePurgeDataOn30Day}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.IngestionMode])] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.IngestionMode] # Indicates the flow of the ingestion. ${IngestionMode}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.PublicNetworkAccessType])] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.PublicNetworkAccessType] # The network access type for accessing Application Insights ingestion. ${PublicNetworkAccessForIngestion}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.PublicNetworkAccessType])] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.PublicNetworkAccessType] # The network access type for accessing Application Insights query. ${PublicNetworkAccessForQuery}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.RequestSource])] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.RequestSource] # Describes what tool created this Application Insights component. # Customers using this API should set this to the default 'rest'. ${RequestSource}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Int32] # Retention period in days. ${RetentionInDays}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Double] # Percentage of the data produced by the application being monitored that is being sampled for Application Insights telemetry. ${SamplingPercentage}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Alias("Tags")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api202002.IComponentsResourceTags]))] [System.Collections.Hashtable] # Resource tags ${Tag}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Resource Id of the log analytics workspace which the data will be ingested to. # This property is required to create an application with this API version. # Applications from older versions will not have this property. ${WorkspaceResourceId}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { # add PS bound parameters to run test $EnvPSBoundParameters = @{} if ($PSBoundParameters.ContainsKey('Debug')) { $EnvPSBoundParameters['Debug'] = $Debug } if ($PSBoundParameters.ContainsKey('HttpPipelineAppend')) { $EnvPSBoundParameters['HttpPipelineAppend'] = $HttpPipelineAppend } if ($PSBoundParameters.ContainsKey('HttpPipelinePrepend')) { $EnvPSBoundParameters['HttpPipelinePrepend'] = $HttpPipelinePrepend } if ($PSBoundParameters.ContainsKey('Proxy')) { $EnvPSBoundParameters['Proxy'] = $Proxy } if ($PSBoundParameters.ContainsKey('ProxyCredential')) { $EnvPSBoundParameters['ProxyCredential'] = $ProxyCredential } if ($PSBoundParameters.ContainsKey('ProxyUseDefaultCredentials')) { $EnvPSBoundParameters['ProxyUseDefaultCredentials'] = $ProxyUseDefaultCredentials } if ($PSBoundParameters.ContainsKey('SubscriptionId')) { $EnvPSBoundParameters['SubscriptionId'] = $SubscriptionId } if ($PSBoundParameters.ContainsKey('ResourceGroupName')) { $EnvPSBoundParameters['ResourceGroupName'] = $ResourceGroupName } if ($PSBoundParameters.ContainsKey('Name')) { $EnvPSBoundParameters['Name'] = $Name } try { $component = . Get-AzApplicationInsights @EnvPSBoundParameters } catch { Write-Warning "component $($PSBoundParameters['Name']) is not existed in Resource Group $($PSBoundParameters["ResourceGroupName"])" return } $PSBoundParameters["Location"] = $component.Location $PSBoundParameters["Kind"] = $component.Kind if (!$PSBoundParameters.ContainsKey("ApplicationType") -and ($null -ne $component.ApplicationType)) { $PSBoundParameters["ApplicationType"] = $component.ApplicationType } if (!$PSBoundParameters.ContainsKey("DisableIPMasking") -and ($null -ne $component.DisableIPMasking)) { $PSBoundParameters["DisableIPMasking"] = $component.DisableIPMasking } if (!$PSBoundParameters.ContainsKey("DisableLocalAuth") -and ($null -ne $component.DisableLocalAuth)) { $PSBoundParameters["DisableLocalAuth"] = $component.DisableLocalAuth } if (!$PSBoundParameters.ContainsKey("Etag") -and ($null -ne $component.Etag)) { $PSBoundParameters["Etag"] = $component.Etag } if (!$PSBoundParameters.ContainsKey("FlowType") -and ($null -ne $component.FlowType)) { $PSBoundParameters["FlowType"] = $component.FlowType } if (!$PSBoundParameters.ContainsKey("ForceCustomerStorageForProfiler") -and ($null -ne $component.ForceCustomerStorageForProfiler)) { $PSBoundParameters["ForceCustomerStorageForProfiler"] = $component.ForceCustomerStorageForProfiler } if (!$PSBoundParameters.ContainsKey("HockeyAppId") -and ($null -ne $component.HockeyAppId)) { $PSBoundParameters["HockeyAppId"] = $component.HockeyAppId } if (!$PSBoundParameters.ContainsKey("ImmediatePurgeDataOn30Day") -and ($null -ne $component.ImmediatePurgeDataOn30Day)) { $PSBoundParameters["ImmediatePurgeDataOn30Day"] = $component.ImmediatePurgeDataOn30Day } if (!$PSBoundParameters.ContainsKey("IngestionMode") -and ($null -ne $component.IngestionMode)) { $PSBoundParameters["IngestionMode"] = $component.IngestionMode } if (!$PSBoundParameters.ContainsKey("PublicNetworkAccessForIngestion") -and ($null -ne $component.PublicNetworkAccessForIngestion)) { $PSBoundParameters["PublicNetworkAccessForIngestion"] = $component.PublicNetworkAccessForIngestion } if (!$PSBoundParameters.ContainsKey("PublicNetworkAccessForQuery") -and ($null -ne $component.PublicNetworkAccessForQuery)) { $PSBoundParameters["PublicNetworkAccessForQuery"] = $component.PublicNetworkAccessForQuery } if (!$PSBoundParameters.ContainsKey("RequestSource") -and ($null -ne $component.RequestSource)) { $PSBoundParameters["RequestSource"] = $component.RequestSource } if (!$PSBoundParameters.ContainsKey("RetentionInDays") -and ($null -ne $component.RetentionInDay)) { $PSBoundParameters["RetentionInDays"] = $component.RetentionInDay } if (!$PSBoundParameters.ContainsKey("SamplingPercentage") -and ($null -ne $component.SamplingPercentage)) { $PSBoundParameters["SamplingPercentage"] = $component.SamplingPercentage } if (!$PSBoundParameters.ContainsKey("Tag") -and ($null -ne $component.Tag)) { $PSBoundParameters["Tag"] = [System.Collections.Hashtable]$component.Tag.AdditionalProperties } if (!$PSBoundParameters.ContainsKey("WorkspaceResourceId") -and ![System.String]::IsNullOrEmpty($component.WorkspaceResourceId)) { $PSBoundParameters["WorkspaceResourceId"] = $component.WorkspaceResourceId } . New-AzApplicationInsights @PSBoundParameters } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCADj+Me+YgKA/k1 # Py8QJmUNXUQitJMCtLm9nrv8m/2s1KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGyIWGOgAw6urrUzXlW5pH9C # lxYw0SlZbhjdNdrBBLw7MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAOjm58cVaCuHqWOiiXvOj1/h5OEAHyCS5Gsl6kj7jyLDg9sIjWLkKhdYX # 9O0i5UFFAi9YN9Rwa4YsEaqrMQOl+IA/PVcyvDIIe5XIusYEL3jlrRd16eEt0DtL # GTHq75Pvjmj0pkrclmI+JK/jizsSsyIMchIGSy02WtVxYIJncXdq0dPpM155TPr2 # C5jjqj3B8kRWmFrCYf7iDUNyfE+9F6HYhnsyjIcfMxFq0tcIhrpwNEMDVBF9Z7gg # GgW8BNZz8lkcsuTvCKdhZSIcXPMG0A6Okn+1PLDM1ybcLn6LTK9/03AbGc9CJk1Z # D8/qopabULoO6iLhbu+hKRoR5aBj9KGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAfMwaKe2aJIvRKKVYvrxk9021xrnfygJVfLO5X5uVNZgIGZiAsyEE5 # GBMyMDI0MDQyMzEzMTUyNC4xNTFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA # 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031 # XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP # CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa # SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgRBLMurTbQUDMHEc0hXhvPqxqGiYxwReu3w3Im6Sur7kwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z # MA0GCSqGSIb3DQEBCwUABIICAEVzdWLJDSo/CPFyaA+e9Jgl4Oq1R9berd2wvBHs # EbfADArcTtDyW8GsTamYIShWOGdnMmxz1NBMhlZ+UOhCkvFBpoLlsOPAXIpmQ6kx # A+QzgbaOwi3LiR+tiHJBLTT8ip9qvqBBZafrszVpmkxvJ5rYduQMCs5nQOdOG+3s # D0/mpxM+ocJ2eqmjSPFG6wdoeLaZkbjjeR+WqhzG9pVuuQGFRfeM6+xo8Xsl7bdI # DmRnlNEZOHYJbtSPAT7M/L/keQpHMbv3FJGA6pWjjWqS5IConHQWIgr/cOpLvFcj # Kgd286guR9dMlMKJSwntWtd2vr/DQg1lP5B0/oIO7HPVBcXxhdPt6nSOU06nFvH8 # eeakiHdN10SmAWR2e5mObmitAMNWke/4i+7HThdFO7gO4VxKmfWIRsNS+5Te3rT+ # rVVOZnhmTDPAMOcfImIAAbgeFLjMD9yjtp6Dr2d0trzJUbs4SrOZIKDfe/Rv5qDc # jjzwxgdBW7ZUiv3qa6oTLXK2n8ew8iXvkyPgvRbkOOtdZr2H8ORS4rky5w2CRRBV # ihl7sC3z+8V9RIZYzoG6LlOODPL1ALXJhPRad0mu3+ASBdPsVUct1fkkJb8pIl+8 # MpzkADEMljJTOpCaGdmVlD/5By6DbbG6DJDpI6CQ/5oSIh69HvRY2cXwwAOGxzpi # EwUk # SIG # End signature block
combined_dataset/train/non-malicious/sample_47_12.ps1
sample_47_12.ps1
주제 about_IntelEthernetCmdlets 짧은 설명 IntelEthernetCmdlets 모듈을 사용하여 정보를 가져오거나 구성 설정 또는 인텔(R) 이더넷 장치를 지원해 디버그 문제에 대해 설명합니다. 긴 설명 IntelEthernetCmdlets 모듈은 시스템 내 인텔(R) 이더넷 장치에 대한 정보를 가져오거나 설정을 구성할 수 있는 cmdlet이 포함됩니다. 펌웨어 로그를 지원하는 장치에는 문제를 디버그하는 데 도움이 되는 로그를 구성하고 생성할 수 있습니다. 모든 하드웨어 및 운영 채제가 모든 cmdlet을 지원하는 것은 아닙니다. 펌웨어 로깅은 인텔(R) 이더넷 700 시리즈 장치를 지원하지 않습니다. 참고: 온라인 도움말(get-help -online)이 지원되지 않습니다. 시스템 요구 사항 - Microsoft* Windows* PowerShell* 버전 5.1 이상 - .NET 버전 3.5 이상 IntelEthernetCmdlets를 사용하기 전에 기본 드라이버를 설치해야 합니다. 드라이버 설치 방법에 대한 자세한 내용은 인텔(R) 이더넷 어댑터와 장치 사용자 가이드를 참조하십시오. 이더넷 CMDLET Get-IntelEthernet Get-IntelEthernet cmdlet은 시스템의 인텔 이더넷 장치에 대한 기본적인 정보를 표시합니다. Get-IntelEthernetSetting Get-IntelEthernetSetting cmdlet은 시스템에 있는 인텔 이더넷 장치에 대해 지원되는 모든 설정을 표시합니다. Get-IntelEthernetProfileSetting Get-IntelEthernetProfileSetting cmdlet 은 지정된 Ethernet 장치와 프로파일 조합에 대한 설정과 해당 값을 표시합니다. 설정 이름과 설정이 변경될 값을 보여주는 정보가 표에 표시됩니다. Set-IntelEthernetSetting Set-IntelEthernetSetting cmdlet은 인텔 이더넷 장치에 대한 설정을 구성합니다. Invoke-IntelEthernetIdentifyPort Invoke-IntelEthernetIdentifyPort cmdlet은 정의된 시간(초) 동안 인텔 이더넷 장치의 지정된 포트에 있는 LED를 깜박입니다. Test-IntelEthernetHardware Test-IntelEthernetHardware cmdlet은 지정된 어댑터에서 하드웨어 테스트를 실행하고 결과를 표시합니다. 참고: 모든 장치가 모든 진단 테스트를 지원하지는 않습니다. 이더넷 디버그 CMDLETS Get-IntelEthernetDCBStatus Get-IntelEthernetDCBStatus는 어댑터에 대한 데이터 센터 브리징(DCB) 상태 디버그 정보를 출력합니다. 이 cmdlet의 출력은 DCB 상태의 스냅샷이며, 파일로 출력하기 위해 형식화됩니다. Register-IntelEthernetRDMACounterSet Register-IntelEthernetRDMACounterSet cmdlet은 특정 장치의 RDMA 통계 카운터를 perfmon으로 등록합니다. 이 cmdlet을 사용해 카운터를 다시 등록할 수도 있습니다. Unregister-IntelEthernetRDMACounterSet Unregister-IntelEthernetRDMACounterSet cmdlet은 perfmon에서 RDMA 통계 카운터를 등록 취소합니다. 펌웨어 로깅 및 디버그 CMDLETS Get-IntelEthernetLogConfig Get-IntelEthernetLogConfig cmdlet을 사용하면 인텔 이더넷 장치에서 지원되는 이벤트 카테고리에 대한 로그 구성을 표시할 수 있습니다. Set-IntelEthernetLogConfig Set-IntelEthernetLogConfig cmdlet을 사용하면 인텔 이더넷 장치에서 지원되는 이벤트 카테고리(&quot;모듈&quot;이라고 함)에 대한 로그 메시지 수준을 설정할 수 있습니다. Start-IntelEthernetLog Start-IntelEthernetLog는 펌웨어 로깅을 지원하는 인텔 이더넷 장치 드라이버 로그를 수집하기 시작합니다. Stop-IntelEthernetLog Stop-IntelEthernetLog는 Start-IntelEthernetLog cmdlet에 의해 시작된 드라이버 로그를 중지합니다. Disable-IntelEthernetLogConfig Disable-IntelEthernetLogConfig cmdlet은 로그 수준을 Disabled로 설정하여 지원되는 인텔 이더넷 장치에서 모든 이벤트 카테고리에 대한 드라이버 로깅을 비활성화합니다. Reset-IntelEthernetLogConfig Reset-IntelEthernetLogConfig cmdlet은 로깅을 지원하는 인텔 이더넷 장치의 장치의 모든 모듈을 드라이버의 기본 로그 수준으로 재설정합니다. Write-IntelEthernetDebugDump Write-IntelEthernetDebugDump cmdlet은 지원되는 인텔 이더넷 장치에 대한 디버그 덤프 결과를 파일에 기록합니다. 관련 항목 Get-IntelEthernet Get-IntelEthernetSetting Get-IntelEthernetProfileSetting Set-IntelEthernetSetting Invoke-IntelEthernetIdentifyPort Test-IntelEthernetHardware Get-IntelEthernetDCBStatus Register-IntelEthernetRDMACounterSet Unregister-IntelEthernetRDMACounterSet Get-IntelEthernetLogConfig Set-IntelEthernetLogConfig Start-IntelEthernetLog Stop-IntelEthernetLog Disable-IntelEthernetLogConfig Reset-IntelEthernetLogConfig Write-IntelEthernetDebugDump
combined_dataset/train/non-malicious/sample_28_24.ps1
sample_28_24.ps1
# # Module manifest for module 'OCI.PSModules.Certificatesmanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Certificatesmanagement.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c420014c-ae2b-4d3a-a11e-e78a626f134b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Certificatesmanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Certificatesmanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICertificatesmanagementAssociation', 'Get-OCICertificatesmanagementAssociationsList', 'Get-OCICertificatesmanagementCaBundle', 'Get-OCICertificatesmanagementCaBundlesList', 'Get-OCICertificatesmanagementCertificate', 'Get-OCICertificatesmanagementCertificateAuthoritiesList', 'Get-OCICertificatesmanagementCertificateAuthority', 'Get-OCICertificatesmanagementCertificateAuthorityVersion', 'Get-OCICertificatesmanagementCertificateAuthorityVersionsList', 'Get-OCICertificatesmanagementCertificatesList', 'Get-OCICertificatesmanagementCertificateVersion', 'Get-OCICertificatesmanagementCertificateVersionsList', 'Invoke-OCICertificatesmanagementRevokeCertificateAuthorityVersion', 'Invoke-OCICertificatesmanagementRevokeCertificateVersion', 'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityVersionDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateVersionDeletion', 'Move-OCICertificatesmanagementCaBundleCompartment', 'Move-OCICertificatesmanagementCertificateAuthorityCompartment', 'Move-OCICertificatesmanagementCertificateCompartment', 'New-OCICertificatesmanagementCaBundle', 'New-OCICertificatesmanagementCertificate', 'New-OCICertificatesmanagementCertificateAuthority', 'Remove-OCICertificatesmanagementCaBundle', 'Stop-OCICertificatesmanagementCertificateAuthorityDeletion', 'Stop-OCICertificatesmanagementCertificateAuthorityVersionDeletion', 'Stop-OCICertificatesmanagementCertificateDeletion', 'Stop-OCICertificatesmanagementCertificateVersionDeletion', 'Update-OCICertificatesmanagementCaBundle', 'Update-OCICertificatesmanagementCertificate', 'Update-OCICertificatesmanagementCertificateAuthority' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Certificatesmanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_65_38.ps1
sample_65_38.ps1
# # Module manifest for module 'OCI.PSModules.Apmcontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmcontrolplane.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2656b809-7098-428e-b605-696525730fec' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmcontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmcontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmcontrolplaneApmDomain', 'Get-OCIApmcontrolplaneApmDomainsList', 'Get-OCIApmcontrolplaneApmDomainWorkRequestsList', 'Get-OCIApmcontrolplaneDataKeysList', 'Get-OCIApmcontrolplaneWorkRequest', 'Get-OCIApmcontrolplaneWorkRequestErrorsList', 'Get-OCIApmcontrolplaneWorkRequestLogsList', 'Get-OCIApmcontrolplaneWorkRequestsList', 'Move-OCIApmcontrolplaneApmDomainCompartment', 'New-OCIApmcontrolplaneApmDomain', 'New-OCIApmcontrolplaneDataKeys', 'Remove-OCIApmcontrolplaneApmDomain', 'Remove-OCIApmcontrolplaneDataKeys', 'Update-OCIApmcontrolplaneApmDomain' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmcontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_60_93.ps1
sample_60_93.ps1
# # Module manifest for module 'OCI.PSModules.Vnmonitoring' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vnmonitoring.dll' # Version number of this module. ModuleVersion = '89.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ca53b640-70c1-4d8a-a7c2-5fbd89718e19' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vnmonitoring Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '89.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vnmonitoring.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVnmonitoringPathAnalysis', 'Get-OCIVnmonitoringPathAnalyzerTest', 'Get-OCIVnmonitoringPathAnalyzerTestsList', 'Get-OCIVnmonitoringWorkRequest', 'Get-OCIVnmonitoringWorkRequestErrorsList', 'Get-OCIVnmonitoringWorkRequestLogsList', 'Get-OCIVnmonitoringWorkRequestResultsList', 'Get-OCIVnmonitoringWorkRequestsList', 'Move-OCIVnmonitoringPathAnalyzerTestCompartment', 'New-OCIVnmonitoringPathAnalyzerTest', 'Remove-OCIVnmonitoringPathAnalyzerTest', 'Update-OCIVnmonitoringPathAnalyzerTest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vnmonitoring' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_41_90.ps1
sample_41_90.ps1
/////////////////////////////////////////////////////////////////////////////// // Helper to set a designer prop /////////////////////////////////////////////////////////////////////////////// function setDesignerProp(tname, ttype, tvalue) { var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0); trait.value = tvalue; } /////////////////////////////////////////////////////////////////////////////// // Toggle button and gobal state /////////////////////////////////////////////////////////////////////////////// var ct = command.getTrait("state"); if (ct.value == 0) { ct.value = 2; setDesignerProp("showPivot", "bool", true); } else { ct.value = 0; setDesignerProp("showPivot", "bool", false); } // SIG // Begin signature block // SIG // MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // ZFSP4yc5tVMjuO4eo+b4ivxyD7xHSp6mX9gm4IpI7D2g // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmfMIIZmwIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCAsaO2uNjqq4Q+PuLNhV3dERZliZVdDaRZC // SIG // DOhuNFKwlzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAHdfX9ee // SIG // 8kW8bBJArIpLag64upcYavoH8unDFbBQ9sSRLv4F3cJL // SIG // QekGNRmri2VZ0TgJqzO+xPJu/QmJwBUcXGeI6tSnZeD/ // SIG // 4TE5i56U61QuJgC7lNXYFSmJMcPLH9Z6dRmFWCebAIeL // SIG // KMsAaB6uwkOiUA6RBTgcUVHR5Cguv7PTTW8tDviYdmXD // SIG // w1CDsj906No9iHUW46lO4KOpmAYH7xrfzjgCzLyh/04F // SIG // wPwHFbdAgqe3tm2Q7ZuAqqHjzBqs66Xlw8z4mqk4KG0X // SIG // TWSFb0+dnU+FzXBsPp6sEDfRKrit9DL5WMCO+dbxHFuO // SIG // zNh4zmMKdAtXVwG3RxFzxrBeqcihghcpMIIXJQYKKwYB // SIG // BAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW // SIG // /gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgTmOq8NFMlkFZcR4kfitr // SIG // 6nH+37/6Pp3oN2ekN1PBv2ACBmYfuQGTwRgTMjAyNDA0 // SIG // MjcxODE4MDkuODQzWjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5 // SIG // QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB2o7V // SIG // yVoA0RGxAAEAAAHaMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDY1OVoXDTI1MDExMDE5MDY1OVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046MDg0Mi00QkU2LUMyOUExJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQCTkAYIdrVRUdY/I0AODQ3/G3Fa10jdPNAjSj0kKO0u // SIG // e7Apz1NBSheO8Ni+qh7cJuBJwpRdnK7lxaf5ez6TEINu // SIG // RO1/MQ5r8a/AQROogEgDwn603m7rwLGVnCWIcu6a4Arg // SIG // X+zonV6YLFtcvKelbO7A9mrqf9Lr3mMXl5SrbD4zAqZR // SIG // 5JNG2vh4C4aNCevCnY4twzNiufcB8vca7bGCvl/Xq2wx // SIG // mdppl9++uWkuUO/7oA8TFYM8o/NMiZ+lC55Jw/YuJFEM // SIG // VYaldXXPwxelAXrs37pJDHne7a81BGTEcpWu6ob8FHkJ // SIG // YMwkIaWY8/s7EIKV5T3M7xndIqq+5QAsH1RqIOaZSM3R // SIG // Mb7dUwPCZnn/NfWkysB9SFRCMGCwOrr0vJEXQOkcbzHG // SIG // //7pTYyLhnHsspDAFxMp1ayxvVbyuK36wrBi9499C5on // SIG // boPqMK3Ao0GoGJqxpNYQcpF4paPWAfEMsuUNSoRrh+uV // SIG // d8xcvGtJMGygUbPFUeB7aD2MPc9Q3XCX2QTtnYc198gD // SIG // IqQhpukpr5r2r0bF4cvNOY4gKQ8jfrNP2+6LNs/IkVhi // SIG // ZOjPbrk9uPd4BVf/SSxoOWCSQiVyPssZDvzl52SbLhrd // SIG // Ps1i3R0uFyFwRte6D7uSrBX0Ux0RJaEdnSOhsGmsSMg8 // SIG // kh2DrbyMnZWu7uJX53wo2P6ikwIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFKF8jclRPWYTlYsxFFcITYC/D19FMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQC5g1XU7biNIwBLeNTtjjPAlNt+ // SIG // 0xjMoaxq+xcyghBWl8baKpPyDm0K4qtXGh1Ydr8rkNuJ // SIG // 8903Tgb+63LP6pz4zsZ1xS8mT3mli7DbgEVZlFYslWF4 // SIG // 12AeQ8M2lmYEnGPBii+8ho8lq4e/FiVIIe6xNfuVQ+Yd // SIG // P+q7PXQUagMyPX4Wc+7KbI7fL58edFhMWwUkh+632mx3 // SIG // p3aXqm05lv0X3Gk/hhSLE/oNno+8ESiKv0IZ7KBfJqRT // SIG // Tx1dav1iv6xfwoaL5ISTA75arRE1ovexqJTkimpmQvW2 // SIG // IHDyn89vHnduVictdFbUPT+fgv9nTnw2s9UZnjm9uym3 // SIG // oIWtEnz3K4k3zkVb6jw0mt5/Te3YU2O/uPSPHr6GnfYX // SIG // WfAnyDj37cLd8U19kYTGSQlaBZWmx3L32/OK2hTOnM+R // SIG // GJPsdWlRIl7YCukdMZ9cIzFx39AFpUo6kZM70p0SsxbG // SIG // cBJe+FWoZSlYSPgovUU/fuhnNMVsye80CFBRNyYosefu // SIG // yi/AKx3wWPVBS8+LJ26Ce0IqdyAA25FOGS9IkPI/CMa2 // SIG // u2kmH06FHn5nLd3TOvX3+BHodiofTbCooqYefPQKf8Ut // SIG // YxEpa34y/4P2W6GkuXfWtnwOffJrmw7yw+ceTz9++9NL // SIG // 5v2PjyIZqdn077ktrJ3XmQZsk6nFDR0TZgpPp41d5zCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIIC // SIG // PQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046MDg0Mi00QkU2LUMyOUExJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVAEKiHyGJYx1GzaGNP8I4V0Z/7EgN // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDp12WEMCIYDzIwMjQw // SIG // NDI3MTk1MjM2WhgPMjAyNDA0MjgxOTUyMzZaMHQwOgYK // SIG // KwYBBAGEWQoEATEsMCowCgIFAOnXZYQCAQAwBwIBAAIC // SIG // F0EwBwIBAAICE3AwCgIFAOnYtwQCAQAwNgYKKwYBBAGE // SIG // WQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh // SIG // IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAD // SIG // TnGHtQD7ZaMVME3jIBvq7VK7HketiaVtErBgZqT1WCnU // SIG // 7+ilolERsYGOMTh6uekdX4cq6fNo3J4lKYYVQ/9WXDUq // SIG // fTisqZXFT3HJUqoLjGrzcuCY6nnU0EXS85FtU6cYBpei // SIG // Snn0Wqcr674rL6+sa5ajGQTyDu6J/UZGJnYShzGCBA0w // SIG // ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMA0GCWCGSAFl // SIG // AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN // SIG // AQkQAQQwLwYJKoZIhvcNAQkEMSIEIIMajQWknMhKmGui // SIG // MZn3mpQfM1hUtL8AsMYBwp7w0i/cMIH6BgsqhkiG9w0B // SIG // CRACLzGB6jCB5zCB5DCBvQQgIqWjaWLA756k3veQ49Qt // SIG // PdNtCOZY4m61v53SAjsYPcYwgZgwgYCkfjB8MQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg // SIG // VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANER // SIG // sQABAAAB2jAiBCAmEb6AvyO3T/hhO52YDrMRna2W5Ig6 // SIG // M4ZBWFtwHbmDuzANBgkqhkiG9w0BAQsFAASCAgAYIw25 // SIG // VZdX8pf4bq1EuU4gyYGCu2BcTHDrxAyGlpV3kKEZ6DQ9 // SIG // RwGrqJ1Ja7R6CRRLOXyOvlW0EHeB9FdR4sP228hGS0Oo // SIG // kQEjyMLCWicsN1BMzww0SZiL4rBY6SYpamN7Zig94903 // SIG // oGxQoL2h1fpoAcDPmxaAhrcqQYeOwrB+1QXuTHt71Lm/ // SIG // sw5qnSlAL5OdPw91rUqIfwSSdsThdU/Hg7K0shiNwgJ4 // SIG // mrLV2iRj7cP/SXwPuxLl365TF2as+FTMaNxjr1Zvd0jG // SIG // n2zFRgqdDEpi/foQ7VLbtpfevaotWdbfz4DVs9sLX1m6 // SIG // EX2taPDrMQXMGlDZAVmlaJKOv6dld8UfPO1dDOiWISgp // SIG // cJU0qKHyYmO8r/S+4A9ncU2xb8faeltDwwnA3zxrBmKy // SIG // RTwVliiG9GlehJGw8VbKSEQLqPQsAmtn2WUhA9GqWebR // SIG // 8bXGW6w42qQzZsj+hdu5wvNF2IdZH5fk2+lnfYmb4KJC // SIG // 7Y3JWZC643XieBunhOgDAhSMd9zG5+sBlXJJU+F9FW2m // SIG // fSqDEVG0fgQdRUc1e/dvZQ+5l+0LczALod887q8R1jAs // SIG // xJw51N99K+LKEsS/PkQzBhwdFt9hDK0tiJo/ALdmx21B // SIG // mn5C9Du3PAMvyZhu7I2dDHohnuc4Iod0ZXSW8sUk5imU // SIG // G3tNLfr/tzmPnW0yDg== // SIG // End signature block
combined_dataset/train/non-malicious/sample_50_3.ps1
sample_50_3.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIImBQYJKoZIhvcNAQcCoIIl9jCCJfICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa # CDCCGgQCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3 # RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq # tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7 # EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/ # 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt # SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC # F5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL # JZwfEO4YeUvzRyzBGzb6/QIGZVbIrMhnGBMyMDIzMTIxMzE5MTkwMS4yODlaMASA # AgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL # Ex5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAdGy # W0AobC7SRQABAAAB0TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEyMThaFw0yNDAyMDExOTEyMThaMIHLMQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNy # b3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBF # U046QTkzNS0wM0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCZTNo0OeGz # 2XFd2gLg5nTlBm8XOpuwJIiXsMU61rwq1ZKDpa443RrSG/pH8Gz6XNnFQKGnCqNC # tmvoKULApwrT/s7/e1X0lNFKmj7U7X4p00S0uQbW6LwSn/zWHaG2c54ZXsGY+BYf # hWDgbFpCTxRzTnRCG62bkWPp6ZHbZPg4Ht1CRCAMhhOGTR8wI4G7wwWZwdMc6UvU # Ulq0ql9AxAfzkYRpi2tRvDHMdmZ3vyXpqhFwvRG8cgCH/TTCjW5q6aNbdqKL3BFD # PzUtuCNsPXL3/E0dR2bDMqa0aNH+iIfhGC4/vcwuteOMCPUIDVSqDCNfIaPDEwYc # i1fd9gu1zVw+HEhDZM7Ea3nxIUrzt+Rfp5ToMMj4QAmJ6Uadm+TPbDbo8kFIK70S # hmW8wn8fJk9ReQQEpTtIN43eRv9QmXy3Ued80osOBE+WkdMvSCFh+qgCsKdzQxQJ # G62cTeoU2eqNhH3oppXmyfVUwbsefQzMPtbinCZd0FUlmlM/dH+4OniqQyaHvrtY # y3wqIafY3zeFITlVAoP9q9vF4W7KHR/uF0mvTpAL5NaTDN1plQS0MdjMkgzZK5gt # wqOe/3rTlqBzxwa7YYp3urP5yWkTzISGnhNWIZOxOyQIOxZfbiIbAHbm3M8hj73K # QWcCR5JavgkwUmncFHESaQf4Drqs+/1L1QIDAQABo4IBSTCCAUUwHQYDVR0OBBYE # FAuO8UzF7DcH0mmsF4XQxxHQvS2jMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw # KDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww # CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCb # u9rTAHV24mY0qoG5eEnImz5akGXTviBwKp2Y51s26w8oDrWor+m00R4/3BcDmYlU # K8Nrx/auYFYidZddcUjw42QxSStmv/qWnCQi/2OnH32KVHQ+kMOZPABQTG1XkcnY # PUOOEEor6f/3Js1uj4wjHzE4V4aumYXBAsr4L5KR8vKes5tFxhMkWND/O7W/RaHY # wJMjMkxVosBok7V21sJAlxScEXxfJa+/qkqUr7CZgw3R4jCHRkPqQhMWibXPMYar # /iF0ZuLB9O89DMJNhjK9BSf6iqgZoMuzIVt+EBoTzpv/9p4wQ6xoBCs29mkj/EIW # Fdc+5a30kuCQOSEOj07+WI29A4k6QIRB5w+eMmZ0Jec0sSyeQB5KjxE51iYMhtlM # rUKcr06nBqCsSKPYsSAITAzgssJD+Z/cTS7Cu35fJrWhM9NYX24uAxYLAW0ipNtW # ptIeV6akuZEeEV6BNtM3VTk+mAlV5/eC/0Y17aVSjK5/gyDoLNmrgVwv5TAaBmq/ # wgRRFHmW9UJ3zv8Lmk6mIoAyTpqBbuUjMLyrtajuSsA/m2DnKMO0Qiz1v+FSVbqM # 38J/PTlhCTUbFOx0kLT7Y/7+ZyrilVCzyAYfFIinDIjWlM85tDeU8ZfJCjFKwq3D # sRxV4JY18xww8TTmod3lkr9NqGQ54LmyPVc+5ibNrjCCB3EwggVZoAMCAQICEzMA # AAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 # IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMw # MDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0G # CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3u # nAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1 # jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT # fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+ # jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c # +gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+ # cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C6 # 26p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV # 2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoS # CtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxS # UV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJp # xq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkr # BgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A # XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI # KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9S # ZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIE # DB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNV # HSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVo # dHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29D # ZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAC # hj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1 # dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwEx # JFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts # 0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I # dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS # EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMu # LGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT9 # 9kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2z # AVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6Ile # T53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6l # MVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbh # IurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3u # gm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z # b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBHJY2Fv+GhLQtRDR2vIzBaSv/7LKCBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA # AgUA6SQ0gzAiGA8yMDIzMTIxMzEzNDc0N1oYDzIwMjMxMjE0MTM0NzQ3WjB3MD0G # CisGAQQBhFkKBAExLzAtMAoCBQDpJDSDAgEAMAoCAQACAhHTAgH/MAcCAQACAhLk # MAoCBQDpJYYDAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAI # AgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAMg8K09QsP3x # gW8GrH19oUi5qOexxFEjcr028Y1OPUlkcdNhOsWTPtfLBQZ0VpoAL5s/JaEVIrtp # wDe1UElEgBrG/YELtybUc/1dOWbXgXPYtstblEuWToHpdSTejZAirwRtreBC0lR9 # lg8i57GDiRwcGUnfyYhovWl+WN8c9Ic95fWtdXDz1b1hXZGikWl2OqT4IgcaApEL # rghLnZLvnbngcuP7f5+YLlaF5uu0nhpEUhHo2KlTGbSYAIEI1j9BxCvx1kCmqI92 # Rl/trpsWmkBx9VtmYEOkW1qG7MRMH5IBMED+7HD6zN00zPrdiQtFLEMaf4xrGu/k # +1BKNMJnI/wxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAdGyW0AobC7SRQABAAAB0TANBglghkgBZQMEAgEFAKCCAUowGgYJ # KoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDo0TcIrstY # xSMINIy0RV80FvLu73bLR/07ZbfA67zkXzCB+gYLKoZIhvcNAQkQAi8xgeowgecw # geQwgb0EIMy8YXkCALv57c5sRhrPTub1q4TwJ6oVA36k8IiI/AcMMIGYMIGApH4w # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHRsltAKGwu0kUAAQAA # AdEwIgQgPElkmOopXiv/cYctiYdiIr6f8EZhbdGSEtq3HR1NFQowDQYJKoZIhvcN # AQELBQAEggIAElaQvgcamGyNwRw5iYdbV0lO/Kp7q7f63LG7xtJOKKlSXUqCrPC5 # tC3aL0ooGOCJQ8p4QbXvQXyXV3PTqJQm7eAU9zgMi15WftQYLPVc0GKvZLVETwyG # g0q9zmtTXRZfXmvYMan/dr3kHHhOHZcYTTFTUTMoq82SN5AKBmsVi91/X/rPd+wN # BN4qwq12GodLjaFPBQNCI5g6xWjP21xTn/vY093FXfJla9EMfR+kKG8L3kZu0Mlc # JSjmrGOtQPsbXx7e1g8jVkGqWsWxgh9oLO0VQsEg5tBJBDb8PKonGd92FVzWxsuF # 03WMfDrncS7Jh69roTrOThfiANLS1tUIMi86P9VvAUTeND7k0mTwv3TLc17lH0JS # y68e54nMEHVP4/UwiMVhr/nIckETXEclzVUmre2WrCxZPjntBTqxp7iuwnySQS8P # mmV7cswImLjQZD3XKdMB9/N51jukU+Bp+uQ4rOCFigV7iUpjDhVuN0C/5kQ2fAbW # 2VmvvwD5Y0qMOoUVvL8Pjv7F2Xby2q8n8Tg9KY1Jc+1K+BNwz/2/6uJpbIVkdy8Z # XTYt+vsN1fEQ52c1xbyT1hh8chtw+6+iiOSpK/WXGF41pnApsyr0rwiL2GP6Ni59 # Rtqjkn6P9fc2ezsGoW0w48ZNdIsUHiM0rOggqiZ8fHgJGUiJxCAMvHs= # SIG # End signature block
combined_dataset/train/non-malicious/sample_9_30.ps1
sample_9_30.ps1
# Localized 10/16/2024 05:34 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=예(&Y) PromptNoString=아니요(&N) BundleFound=찾은 번들: {0} PackageFound=찾은 패키지: {0} EncryptedBundleFound=암호화된 번들 찾음: {0} EncryptedPackageFound=암호화된 패키지 찾음: {0} CertificateFound=찾은 인증서: {0} DependenciesFound=찾은 종속성 패키지: GettingDeveloperLicense=개발자 라이선스를 취득하는 중... InstallingCertificate=인증서를 설치하는 중... InstallingPackage=\n앱을 설치하는 중... AcquireLicenseSuccessful=개발자 라이선스를 취득했습니다. InstallCertificateSuccessful=인증서가 설치되었습니다. Success=\n성공: 앱이 설치되었습니다. WarningInstallCert=\n컴퓨터의 신뢰된 사용자 인증서 저장소에 디지털 인증서를 설치하려고 합니다. 이렇게 하면 보안상 심각하게 위험해지므로 이 디지털 인증서를 만든 사람을 신뢰하는 경우에만 해당 인증서를 설치해야 합니다.\n\n이 앱을 다 사용한 후에는 연결된 디지털 인증서를 수동으로 제거해야 합니다. 이 작업을 수행하는 방법에 대한 지침은 다음에서 확인할 수 있습니다. http://go.microsoft.com/fwlink/?LinkId=243053\n\n계속하시겠습니까?\n\n ElevateActions=\n이 앱을 설치하기 전에 다음을 수행해야 합니다. ElevateActionDevLicense=\t- 개발자 라이선스 취득 ElevateActionCertificate=\t- 서명 인증서 설치 ElevateActionsContinue=계속하려면 관리자 자격 증명이 필요합니다. UAC 프롬프트를 확인하고 메시지가 표시되는 경우 관리자 암호를 제공하십시오. ErrorForceElevate=계속하려면 관리자 자격 증명을 제공해야 합니다. 이 스크립트를 -Force 매개 변수 없이 실행하거나 권한이 높은 PowerShell 창에서 실행하십시오. ErrorForceDeveloperLicense=개발자 라이선스를 취득하려면 사용자 상호 작용이 필요합니다. 스크립트를 -Force 매개 변수 없이 다시 실행하십시오. ErrorLaunchAdminFailed=오류: 관리자로 새 프로세스를 시작할 수 없습니다. ErrorNoScriptPath=오류: 이 스크립트를 파일에서 시작해야 합니다. ErrorNoPackageFound=오류: 스크립트 디렉터리에서 패키지 또는 번들을 찾을 수 없습니다. 설치하려는 패키지 또는 번들이 이 스크립트와 같은 디렉터리에 있는지 확인하십시오. ErrorManyPackagesFound=오류: 스크립트 디렉터리에 둘 이상의 패키지 또는 번들이 있습니다. 설치하려는 패키지 또는 번들만 이 스크립트와 같은 디렉터리에 있는지 확인하십시오. ErrorPackageUnsigned=오류: 패키지 또는 번들이 디지털 서명되지 않았거나 해당 서명이 손상되었습니다. ErrorNoCertificateFound=오류: 스크립트 디렉터리에서 인증서를 찾을 수 없습니다. 설치하려는 패키지 또는 번들을 서명하는 데 사용된 인증서가 이 스크립트와 같은 디렉터리에 있는지 확인하십시오. ErrorManyCertificatesFound=오류: 스크립트 디렉터리에 둘 이상의 인증서가 있습니다. 설치하려는 패키지 또는 번들을 서명하는 데 사용된 인증서만 이 스크립트와 같은 디렉터리에 있는지 확인하세요. ErrorBadCertificate=오류: "{0}" 파일이 올바른 디지털 인증서가 아닙니다. CertUtil에서 오류 코드 {1}이(가) 반환되었습니다. ErrorExpiredCertificate=오류: 개발자 인증서 "{0}"이(가) 만료되었습니다. 시스템 클록이 올바른 날짜 및 시간으로 설정되지 않은 것 같습니다. 시스템 설정이 올바른 경우 앱 소유자에게 유효한 인증서로 패키지 또는 번들을 다시 만들도록 요청하십시오. ErrorCertificateMismatch=오류: 인증서가 패키지 또는 번들을 서명하는 데 사용된 인증서와 일치하지 않습니다. ErrorCertIsCA=오류: 인증서는 인증 기관일 수 없습니다. ErrorBannedKeyUsage=오류: 인증서의 키 사용은 {0}일 수 없습니다. 키 사용을 지정하지 않거나 키 사용이 "DigitalSignature"와 같아야 합니다. ErrorBannedEKU=오류: 인증서의 확장 키 사용은 {0}일 수 없습니다. 코드 서명 및 영구 서명 EKU만 사용할 수 있습니다. ErrorNoBasicConstraints=오류: 인증서에 기본 제약 조건 확장이 없습니다. ErrorNoCodeSigningEku=오류: 인증서에 코드 서명용 확장 키 사용이 없습니다. ErrorInstallCertificateCancelled=오류: 인증서 설치가 취소되었습니다. ErrorCertUtilInstallFailed=오류: 인증서를 설치할 수 없습니다. CertUtil에서 오류 코드 {0}이(가) 반환되었습니다. ErrorGetDeveloperLicenseFailed=오류: 개발자 라이선스를 취득할 수 없습니다. 자세한 내용은 http://go.microsoft.com/fwlink/?LinkID=252740을 참조하십시오. ErrorInstallCertificateFailed=오류: 인증서를 설치할 수 없습니다. 상태: {0}. 자세한 내용은 http://go.microsoft.com/fwlink/?LinkID=252740을 참조하십시오. ErrorAddPackageFailed=오류: 앱을 설치할 수 없습니다. ErrorAddPackageFailedWithCert=오류: 앱을 설치할 수 없습니다. 보안을 위해 앱을 설치할 수 있을 때까지 서명 인증서를 제거해 보십시오. 이 작업을 수행하는 방법에 대한 지침은 다음에서 확인할 수 있습니다.\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@
combined_dataset/train/non-malicious/Set-SolarizedHostColor.ps1
Set-SolarizedHostColor.ps1
# function Set-HostColor { param( [Switch]$Light = $( ## Based on whether we're elevated or not, switch between DARK and LIGHT versions of Solarized: $([System.Environment]::OSVersion.Version.Major -gt 5) -and ( # Vista or higher and ... new-object Security.Principal.WindowsPrincipal ( # current user is an administrator (Note: ROLE, not GROUP) [Security.Principal.WindowsIdentity]::GetCurrent()) ).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) ) ) # SOLARIZED HEX 16/8 TERMCOL XTERM/HEX L*A*B RGB HSB # --------- ------- ---- ------- ----------- ---------- ----------- ----------- $base03 = "#002b36" # 8/4 brblack 234 #1c1c1c 15 -12 -12 0 43 54 193 100 21 $base02 = "#073642" # 0/4 black 235 #262626 20 -12 -12 7 54 66 192 90 26 $base01 = "#586e75" # 10/7 brgreen 240 #585858 45 -07 -07 88 110 117 194 25 46 $base00 = "#657b83" # 11/7 bryellow 241 #626262 50 -07 -07 101 123 131 195 23 51 $base0 = "#839496" # 12/6 brblue 244 #808080 60 -06 -03 131 148 150 186 13 59 $base1 = "#93a1a1" # 14/4 brcyan 245 #8a8a8a 65 -05 -02 147 161 161 180 9 63 $base2 = "#eee8d5" # 7/7 white 254 #e4e4e4 92 -00 10 238 232 213 44 11 93 $base3 = "#fdf6e3" # 15/7 brwhite 230 #ffffd7 97 00 10 253 246 227 44 10 99 $yellow = "#b58900" # 3/3 yellow 136 #af8700 60 10 65 181 137 0 45 100 71 $orange = "#cb4b16" # 9/3 brred 166 #d75f00 50 50 55 203 75 22 18 89 80 $red = "#dc322f" # 1/1 red 160 #d70000 50 65 45 220 50 47 1 79 86 $magenta = "#d33682" # 5/5 magenta 125 #af005f 50 65 -05 211 54 130 331 74 83 $violet = "#6c71c4" # 13/5 brmagenta 61 #5f5faf 50 15 -45 108 113 196 237 45 77 $blue = "#268bd2" # 4/4 blue 33 #0087ff 55 -10 -45 38 139 210 205 82 82 $cyan = "#2aa198" # 6/6 cyan 37 #00afaf 60 -35 -05 42 161 152 175 74 63 $green = "#859900" # 2/2 green 64 #5f8700 60 -20 65 133 153 0 68 100 60 ## BEGIN SOLARIZING ---------------------------------------------- if($Host.Name -eq "Windows PowerShell ISE Host" -and $psISE) { $psISE.Options.FontName = 'Consolas' $psISE.Options.TokenColors['Command'] = $yellow $psISE.Options.TokenColors['Position'] = $red $psISE.Options.TokenColors['GroupEnd'] = $red $psISE.Options.TokenColors['GroupStart'] = $red $psISE.Options.TokenColors['NewLine'] = '#FFFFFFFF' # not a printable token $psISE.Options.TokenColors['String'] = $cyan $psISE.Options.TokenColors['Type'] = $orange $psISE.Options.TokenColors['Variable'] = $blue $psISE.Options.TokenColors['CommandParameter'] = $green $psISE.Options.TokenColors['CommandArgument'] = $violet $psISE.Options.TokenColors['Number'] = $red if ($Light) { $psISE.Options.OutputPaneBackgroundColor = $base3 $psISE.Options.OutputPaneTextBackgroundColor = $base3 $psISE.Options.OutputPaneForegroundColor = $base00 $psISE.Options.CommandPaneBackgroundColor = $base3 $psISE.Options.ScriptPaneBackgroundColor = $base3 $psISE.Options.TokenColors['Unknown'] = $base00 $psISE.Options.TokenColors['Member'] = $base00 $psISE.Options.TokenColors['LineContinuation'] = $base01 $psISE.Options.TokenColors['StatementSeparator'] = $base01 $psISE.Options.TokenColors['Comment'] = $base1 $psISE.Options.TokenColors['Keyword'] = $base01 $psISE.Options.TokenColors['Attribute'] = $base00 } else { $psISE.Options.OutputPaneBackgroundColor = $base03 $psISE.Options.OutputPaneTextBackgroundColor = $base03 $psISE.Options.OutputPaneForegroundColor = $base0 $psISE.Options.CommandPaneBackgroundColor = $base03 $psISE.Options.ScriptPaneBackgroundColor = $base03 $psISE.Options.TokenColors['Unknown'] = $base0 $psISE.Options.TokenColors['Member'] = $base0 $psISE.Options.TokenColors['LineContinuation'] = $base1 $psISE.Options.TokenColors['StatementSeparator'] = $base1 $psISE.Options.TokenColors['Comment'] = $base01 $psISE.Options.TokenColors['Keyword'] = $base1 $psISE.Options.TokenColors['Attribute'] = $base0 } $Host.PrivateData.VerboseForegroundColor = $PSISE.Options.VerboseForegroundColor = $blue $Host.PrivateData.DebugForegroundColor = $PSISE.Options.DebugForegroundColor = $green $Host.PrivateData.WarningForegroundColor = $PSISE.Options.WarningForegroundColor = $orange $Host.PrivateData.ErrorForegroundColor = $PSISE.Options.ErrorForegroundColor = $red $PSISE.Options.OutputPaneForegroundColor = $base0 $PSISE.Options.ScriptPaneForegroundColor = $base0 } elseif($Host.Name -eq "ConsoleHost") { ## In the PowerShell Console, we can only use console colors, so we have to pick them by name. ## For it to look right, you have to have run PowerShell from a shortcut you've modified with Install-Solarized if($Light) { ## Set the WindowTitlePrefix for my prompt function, so it won't need to test for IsInRole Administrator again. # $Host.UI.RawUI.WindowTitle = $global:WindowTitlePrefix = "PoSh ${Env:UserName}@${Env:UserDomain} (ADMIN)" $Host.UI.RawUI.BackgroundColor = "White" $Host.PrivateData.ProgressBackgroundColor = "Black" $Host.UI.RawUI.ForegroundColor = "DarkCyan" } else { # $Host.UI.RawUI.WindowTitle = $global:WindowTitlePrefix = "PoSh ${Env:UserName}@${Env:UserDomain}" $Host.PrivateData.ProgressBackgroundColor = "White" $Host.UI.RawUI.BackgroundColor = "Black" $Host.UI.RawUI.ForegroundColor = "DarkRed" } $Host.PrivateData.ErrorForegroundColor = "Red" $Host.PrivateData.WarningForegroundColor = "DarkYellow" $Host.PrivateData.DebugForegroundColor = "Green" $Host.PrivateData.VerboseForegroundColor = "Blue" $Host.PrivateData.ProgressForegroundColor = "Magenta" $Host.PrivateData.ErrorBackgroundColor = $Host.PrivateData.WarningBackgroundColor = $Host.PrivateData.DebugBackgroundColor = $Host.PrivateData.VerboseBackgroundColor = $Host.UI.RawUI.BackgroundColor } # } # Set-HostColor
combined_dataset/train/non-malicious/sample_8_79.ps1
sample_8_79.ps1
ConvertFrom-StringData @' id_ctsdnsclient=DNS Client id_ctsdnsclientdescription=Collects information about DNS Client. id_ctstcpip=TCPIP '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBCgdIJHsKUSQ+h # +DzdRihglkF+lHegrSZ5ZO9w/GUSzqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDBN # f9WU/dY9X9odq6qRBgqXTUhFPiL4fRbhk12j6ZS5MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAQJ4xgy5NzG4DrTIlHy3ZnVOzNJJnAVvbCS0u # ug552S0X56YgxBgR19o/3IGjXq1TVBCwZvNYTTutTroI8KYZb3a9whhhqVLHjbjA # JyCMuVw+U97ivSH0DhDFl+47F4vazcFVY+gBcU0ARknbHU6gz5Yl1arpa4VdKMHY # DsXvdNnB5hIkMx0x8Q9otTdFiN8eRJyuoX+6BPssLS2Rp0ij7Pl8KTRM0b4oI4Az # bcA8H/8pBV9bk6VUm1DuJZANNoxtYR0h2O7pa+y9TePP9QTaTKqlU5WqICYp5B9Y # xj8AzQv8vq1P0b4cxfma3ZkzB+ZtBfWZxJSoJWwxTUbqqwwY76GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBxAHswhk+XmzejSBe8aHZCsfLuZyjfvLa4 # Pawghkm7KgIGZv8ZfhH3GBMyMDI0MTAyODExNDA0My42MTZaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv # JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja # Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V # ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm # kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK # /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm # bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL # 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w # GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc # EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25 # gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2 # HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY # xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw # gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7 # 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT # EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h # OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk # C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi # CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP # cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ # m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB # tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0 # 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0 # MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA # AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX # evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ # uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI # GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx # w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j # vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg1B11BXl5zmH0muV98aGiwYfS0F4Mr5GmbMfVidLthwYwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll # QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI # wwAlMA0GCSqGSIb3DQEBCwUABIICADB/44q1N5LzxG1NT3jvInO7h/GJM9Skt8zv # sCzzR/k2C+YDgvf7l8LWwO1zQhOxlPjnzVaxBOC5jaEnaWtAbpClrAv7KrdaOORT # UUbbXrG30LQHZDjW9O939uchXikDga1eDrKKmkUjalTptZX8enF3jDpnD1U5NQGu # cESIuoctc+6yQdDQlv2S/quvJfLd2iUgK4ls+fdj8MTwkS4g4KH5AmGhNqJogpn5 # dgW5UaNrVJ70jjFF0SJsDZq1/wHrtlsxJOmQ9JIWv3FsRTIFFcu7k+OEktXoO0Zc # /DIma8F8RKtrNgK5Z9GjRsDnUsiBHTz0RnhaICpb6T8QyaUpDu0CQks3OzFBC1vt # /j+pHh6xwpHNPDd4S9tWOXJLcPYyMORby9QWru3hGFRY4z29KmFfamsxlhgCyfLV # h9BvTB+pkabIqLg7czOreb+WR7wrjOtHB7BxRrwRlmuFXzRYy9cKRTM2Gw+m0/vd # Eli4atkYs4gQodH6Rp5jk7CpoBGRlJONtM6W1fnhPbRmgVfhtRvmStt122P5NSlE # wb1XDcYfXXlaZopI8Y0AXxpn+YJWUelJGSAdy9PIjk8jblKcbR7pWIfHT08wrysg # wjXqNXYaR+koXLNH28sZo0rVqDxfQFvSciX5rNanjCTAvuqkt7cHXlqjkbXDxlAb # KhPGfnBG # SIG # End signature block
combined_dataset/train/non-malicious/a39ded79-9953-4554-99ac-98c97462bfb8.ps1
a39ded79-9953-4554-99ac-98c97462bfb8.ps1
function Get-Help { <# .ForwardHelpTargetName Get-Help .ForwardHelpCategory Cmdlet #> [CmdletBinding(DefaultParameterSetName='AllUsersView')] param( [Parameter(Position=0, ValueFromPipelineByPropertyName=$true)] [System.String] ${Name}, [System.String] ${Path}, [System.String[]] ${Category}, [System.String[]] ${Component}, [System.String[]] ${Functionality}, [System.String[]] ${Role}, [Parameter(ParameterSetName='DetailedView')] [Switch] ${Detailed}, [Parameter(ParameterSetName='AllUsersView')] [Switch] ${Full}, [Parameter(ParameterSetName='Examples')] [Switch] ${Examples}, [Parameter(ParameterSetName='Parameters')] [System.String] ${Parameter}, [Switch] ${Online} ) begin { try { $OnlineBaseHelpUrl = 'http://go.microsoft.com/fwlink/?LinkID=' $about = New-Object PSObject -Property @{ 'about_Aliases' = 113207 'about_Arithmetic_Operators' = 113208 'about_Arrays' = 113209 'about_Assignment_Operators' = 113210 'about_Automatic_Variables' = 113212 'about_Break' = 113213 'about_Command_Precedence' = 113214 'about_Command_Syntax' = 113215 'about_Comment_Based_Help' = 144309 'about_CommonParameters' = 113216 'about_Comparison_Operators' = 113217 'about_Continue' = 113218 'about_Core_Commands' = 113219 'about_Data_Sections' = 113220 'about_Debuggers' = 113221 'about_Do' = 135169 'about_Environment_Variables' = 113222 'about_Escape_Characters' = 113223 'about_EventLogs' = 113224 'about_Execution_Policies' = 135170 'about_For' = 113228 'about_Foreach' = 113229 'about_Format.ps1xml' = 113230 'about_Functions' = 113231 'about_Functions_Advanced' = 144511 'about_Functions_Advanced_Methods' = 135172 'about_Functions_Advanced_Parameters' = 135173 'about_Functions_CmdletBindingAttribute' = 135174 'about_Hash_Tables' = 135175 'about_History' = 113233 'about_If' = 113234 'about_Job_Details' = 135176 'about_jobs' = 113251 'about_Join' = 113235 'about_Language_Keywords' = 136588 'about_Line_Editing' = 113236 'about_Locations' = 113237 'about_Logical_Operators' = 113238 'about_Methods' = 113239 'about_Modules' = 144311 'about_Objects' = 113241 'about_Operators' = 113242 'about_Parameters' = 113243 'about_Parsing' = 113244 'about_Path_Syntax' = 113245 'about_Pipelines' = 113246 'about_Preference_Variables' = 113248 'about_Profiles' = 113729 'about_Prompts' = 135179 'about_Properties' = 113249 'about_Providers' = 113250 'about_PSSession_Details' = 135180 'about_PSSessions' = 135181 'about_PSsnapins' = 113252 'about_Quoting_Rules' = 113253 'about_Redirection' = 113254 'about_Ref' = 113255 'about_Regular_Expressions' = 113256 'about_Remote' = 135182 'about_Remote_FAQ' = 135183 'about_Remote_Jobs' = 135184 'about_Remote_Output' = 135185 'about_Remote_Requirements' = 135187 'about_Remote_Troubleshooting' = 135188 'about_Requires' = 135190 'about_Reserved_Words' = 113258 'about_Return' = 136587 'about_Scopes' = 113260 'about_Script_Blocks' = 113261 'about_Script_Internationalization' = 113262 'about_Scripts' = 144310 'about_Session_Configurations' = 145152 'about_Signing' = 113268 'about_Special_Characters' = 113269 'about_Split' = 113270 'about_Switch' = 113271 'about_Throw' = 145153 'about_Transactions' = 135192 'about_Trap' = 136586 'about_Try_Catch_Finally' = 113444 'about_Type_Operators' = 113273 'about_Types.ps1xml' = 113274 'about_Variables' = 157591 'about_While' = 113275 'about_Wildcards' = 113276 'about_Windows_Powershell_2.0' = 113247 'about_Windows_PowerShell_ISE' = 135178 'about_WMI_Cmdlets' = 145766 'about_WS-Management_Cmdlets' = 145774 } $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Get-Help', [System.Management.Automation.CommandTypes]::Cmdlet) if($Name -like 'about_*' -AND $about."$name" -AND $Online) { Start-Process ("$OnlineBaseHelpUrl" + $about."$name") continue } $scriptCmd = {& $wrappedCmd @PSBoundParameters } $steppablePipeline = $scriptCmd.GetSteppablePipeline($myInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } }
combined_dataset/train/non-malicious/3319.ps1
3319.ps1
function Approve-PendingCommand { [PoshBot.BotCommand( Aliases = ('ack', 'approve', 'approvecommand') )] [cmdletbinding()] param( [parameter(Mandatory)] $Bot, [parameter(Mandatory, Position = 0)] [string]$Id ) $context = $Bot.DeferredCommandExecutionContexts[$Id] if ($context) { $callingUserId = $global:PoshBotContext.From if (-not $global:PoshBotContext.FromName) { $callingUserName = $Bot.RoleManager.ResolveUserIdToUserName($callingUserId) } else { $callingUserName = $global:PoshBotContext.FromName } $originalCommandCallingUser = $context.ParsedCommand.From if ($callingUserId -ne $originalCommandCallingUser) { $approvalGroups = $Bot.Executor.GetApprovalGroups($context) $callingUserGroups = $Bot.RoleManager.GetUserGroups($callingUserId).Name if ($null -eq $callingUserGroups) { $callingUserGroups = @() } $compareParams = @{ ReferenceObject = $approvalGroups DifferenceObject = $callingUserGroups PassThru = $true IncludeEqual = $true ExcludeDifferent = $true } $inApprovalGroup = (Compare-Object @compareParams).Count -gt 0 if ($inApprovalGroup) { $context.ApprovalState = 2 $context.Approver.Id = $callingUserId $context.Approver.Name = $callingUserName $Bot.ProcessedDeferredContextQueue.Enqueue($context) New-PoshBotCardResponse -Type Normal -Text "Command [$Id] - [$($context.ParsedCommand.CommandString)] approved by [$callingUserName]" } else { New-PoshBotCardResponse -Type Warning -Text "Sorry. Only someone in approval group(s) [$($approvalGroups -join ', ')] can approve this command." } } else { New-PoshBotCardResponse -Type Warning -Text 'Nice try. Self-approving is not allowed.' } } else { New-PoshBotCardResponse -Type Warning -Text "Unknown approval ID [$Id]" } }
combined_dataset/train/non-malicious/sample_9_9.ps1
sample_9_9.ps1
#************************************************ # DC_DfsrInfo.ps1 # Version 1.2.0 # Date: 4/19/2010 # By Craig Landis (clandis@microsoft.com) #************************************************ # 2019-03-17 WalterE added Trap #_# nneds check for DFSrDiag.exe / OSversion? # 2023-02-08 fix 'CHOICE /T 20 /C 123q' # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } function MenuDiagInput-CollectDFSR{ Write-Host -ForegroundColor Yellow "============AD Collect DFSR Information ==============" Write-Host "1: Collect All (=default)" Write-Host "2: Collect All But Health-Reports" Write-Host "3: Collect Minimal" Write-Host "q: Press Q to skip" } If ((Get-CimInstance -query "Select ProductType from Win32_OperatingSystem").ProductType -ne 1) { $DFSRkey = "HKLM:\SYSTEM\CurrentControlSet\Services\DFSR" If (Test-Path $DFSRkey){ Import-LocalizedData -BindingVariable DfsrInfoStrings -FileName DC_DfsrInfo -UICulture en-us Write-DiagProgress -Activity $DfsrInfoStrings.ID_DfsrInfo -Status $DfsrInfoStrings.ID_DfsrInfoObtaining $sectionDescription = "DFSR Miscellaneous" $OutputFile = "DFSR__Progress.txt" #_#$CollectDFSRInformation_Answer = get-diaginput -id "CollectDFSRInformation" MenuDiagInput-CollectDFSR #$Selection = Read-Host "Choose the DFSR Information level" #$Selection = CHOICE /T 20 /C 123q /D 1 /M "Choose the DFSR Information level: Press 1,2,3,q=quit [Timeout=20sec]" #WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): DFSR Selection: $Selection" -shortformat WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): DFSR Selection: $LASTEXITCODE" -shortformat switch ($LASTEXITCODE) { 1 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"} 2 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports"} 3 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports /nodbguids /nodebuglogs"} 4 {} default {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"} } <# switch ($CollectDFSRInformation_Answer) { "CollectAll" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"} "CollectAllButHealthReports" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports"} "CollectMinimal" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports /nodbguids /nodebuglogs"} } #> RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "Progress Log" CollectFiles -filesToCollect "Dfsr*.log" -fileDescription "DFSR Current Log File" -sectionDescription "DFSR Debug Log Files" -renameOutput $false CollectFiles -filesToCollect "Dfsr*.gz" -fileDescription "DFSR Previous Log file" -sectionDescription "DFSR Debug Log Files" -renameOutput $false CollectFiles -filesToCollect ($ComputerName + "_DFSR_ConflictAndDeleted.xls") -fileDescription "DFSR Conflicts and Deletes" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Events_Last_72_Hours.xls") -fileDescription "DFSR Events Last 3 Days" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_File_Versions.txt") -fileDescription "DFSR File Versions" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Hotfixes.txt") -fileDescription "DFSR Hotfixes" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Info.txt") -fileDescription "DFSR Configuration Information" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Performance_Data.txt") -fileDescription "DFSR Performance Data" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_DBGUIDs.txt") -fileDescription "DFSR Database GUIDs" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_DfsrMachineConfig.XML") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_RegKey_DFSR.txt") -fileDescription "DFSR Registry Key" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_RegKey_TCPIP.txt") -fileDescription "TCPIP Registry Key" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Replica*.xml") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Volume*.xml") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Dfsmgmt*.log") -fileDescription "DFS Management Trace Log" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_FSRM_File_Screens.txt") -fileDescription "FSRM File Screens" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_FSRM_Quotas.txt") -fileDescription "FSRM Quotas" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect "*HealthReport*" -fileDescription "Health Report" -sectionDescription "DFSR Health Reports" } } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3XQppCIcPWskT # F5FaHmfo0K67pJpbAnun/w4/3VC+naCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDVYJ3DS+UK1PHeyFdg/GMR9 # uTZdLEal0GiV0kMQLW7OMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkot0NVKSbeuB/n5L33NSg2xciai5trTZXBxEYfhbHRHyPIxTfp2PNxWr # a7Oc6D0M5GVUPsbOx1TkO6DsngmdnvLGeDOWXJcY2l0tU/99wlpDGKBtT0Atv3b0 # KRW454UZT9OibbTY6i2jgdBI8usmoHBLklOmCFam4+p3DDKrjmSWkGZZXBRfXllD # ceASnnWfk5qOS1+fEMnuQQKCfNSShvu/ayZkzFGBez16WCCpam7JkY9dJy5Ll96F # tyjAvfMbVDK7fD4cgE/LZbHWiufwuzCPOb28B/vTZ8arDZvsczDj1uH5W7AxZO7R # zDPOIFIWGPR0T38MnH81vMPeKrUzgaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDGr0fT4Q8HD1sZ2Ba8V/62uX9OHtUDt9dXC/RtxflOzwIGZutwxmYr # GBMyMDI0MTAyODExNDA0NS4xNjVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe # CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq # U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf # Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp # ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw # UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF # acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi # vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8 # /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I # vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM # SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92 # BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo # PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT # FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A # Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW # /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy # tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h # 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ # lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr # 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU # PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t # iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ # 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx # f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK # AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz # tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0 # teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey # h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ # N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI # Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl # FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgi31DZ7r24F8L # TCGjTX6qKoAySMDRtqfL9s0P+3yDOVAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB # MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB # CwUABIICAB+dColSLEOJcJ/4gYtlcwDbpawNhquzmiY8A1/BUCSfaYCCn4JC7zD+ # 8wevnKZIxQz+/3EAL4jq3+rAko0pcHWDG3RuSdKvsKLIhP31aqAVRE76AbWpjgzH # z+D8mvE5PN4h4okzJJuwmRrbrniA6BHHVfG3N3EBiZPSBbyVWMgfS5RfDNQJP/Sc # Xnv+79H5H0t9j1Lv/67+uMSzBfEZx1+D3m1CVbBVXr8y16IJiiTW7xckBn+YOsjF # LRj6nssKS+XBkMaq+qxRmNqu7KvP3x7eeow+C0fjjuuAovSmtvEjqSsbVUQTxoXU # OGL5vmqbyKUXpq8ZvI/fh8Vk2V09l39sGrw475JAGV7dl3UZQa4rqPB9TAAa6y4G # gbqeKV1LRa9oWsotlxXFEdbUOFuh6DNx2RKd9IDDIQfZYGOxBUwlFV7ld0NPZ7qU # rDWVh79JysPwer7dWIxhMED5QzVpy1obLXUxzjNrPPw4wDYTyuBQnoiM5pMr9p+B # yCg9m7/c1Konl5/UKhEuaqx0nEtwSJQJESFdk8CXJBwddmLT0ipOW/w0NFi0SxhG # JK7iPjiKJLFyUShmV/HIyPK51j0YYjlQu2CvO072yFVU7DqREwQVOgZ/rMDEe5fO # yVfD/it1vz1e/IFbwBJZusgsbrXDNtp6z7BjWdu5JiYWCPOBr9za # SIG # End signature block
combined_dataset/train/non-malicious/Get-ParameterAlias.ps1
Get-ParameterAlias.ps1
##############################################################################\n##\n## Get-ParameterAlias\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nLooks in the session history, and returns any aliases that apply to\nparameters of commands that were used.\n\n.EXAMPLE\n\nPS >dir -ErrorAction SilentlyContinue\nPS >Get-ParameterAlias\nAn alias for the 'ErrorAction' parameter of 'dir' is ea\n\n#>\n\nSet-StrictMode -Version Latest\n\n## Get the last item from their session history\n$history = Get-History -Count 1\nif(-not $history)\n{\n return\n}\n\n## And extract the actual command line they typed\n$lastCommand = $history.CommandLine\n\n## Use the Tokenizer API to determine which portions represent\n## commands and parameters to those commands\n$tokens = [System.Management.Automation.PsParser]::Tokenize(\n $lastCommand, [ref] $null)\n$currentCommand = $null\n\n## Now go through each resulting token\nforeach($token in $tokens)\n{\n ## If we've found a new command, store that.\n if($token.Type -eq "Command")\n {\n $currentCommand = $token.Content\n }\n\n ## If we've found a command parameter, start looking for aliases\n if(($token.Type -eq "CommandParameter") -and ($currentCommand))\n {\n ## Remove the leading "-" from the parameter\n $currentParameter = $token.Content.TrimStart("-")\n\n ## Determine all of the parameters for the current command.\n (Get-Command $currentCommand).Parameters.GetEnumerator() |\n\n ## For parameters that start with the current parameter name,\n Where-Object { $_.Key -like "$currentParameter*" } |\n\n ## return all of the aliases that apply. We use "starts with"\n ## because the user might have typed a shortened form of\n ## the parameter name.\n Foreach-Object {\n $_.Value.Aliases | Foreach-Object {\n "Suggestion: An alias for the '$currentParameter' " +\n "parameter of '$currentCommand' is '$_'"\n }\n }\n }\n}
combined_dataset/train/non-malicious/3929.ps1
3929.ps1
function Test-AzureIotDpsCertificateLifeCycle { $Location = Get-Location "Microsoft.Devices" "Device Provisioning Service" $IotDpsName = getAssetName $ResourceGroupName = getAssetName $TestOutputRoot = [System.AppDomain]::CurrentDomain.BaseDirectory; $certificatePath = "$TestOutputRoot\rootCertificate.cer" $verifyCertificatePath = "$TestOutputRoot\verifyCertificate.cer" $certificateSubject = "CN=TestCertificate" $certificateType = "Microsoft.Devices/provisioningServices/Certificates" $certificateName = "TestCertificate" $resourceGroup = New-AzResourceGroup -Name $ResourceGroupName -Location $Location $iotDps = New-AzIoTDps -ResourceGroupName $ResourceGroupName -Name $IotDpsName -Location $Location Assert-True { $iotDps.Name -eq $IotDpsName } New-CARootCert $certificateSubject $certificatePath $newCertificate = Add-AzIoTDpsCertificate -ResourceGroupName $ResourceGroupName -Name $IotDpsName -CertificateName $certificateName -Path $certificatePath Assert-True { $newCertificate.Properties.Subject -eq $certificateSubject } Assert-False { $newCertificate.Properties.IsVerified } Assert-True { $newCertificate.Type -eq $certificateType } Assert-True { $newCertificate.CertificateName -eq $certificateName } $certificates = Get-AzIoTDpsCertificate -ResourceGroupName $ResourceGroupName -Name $IotDpsName Assert-True { $certificates.Count -gt 0} $certificate = Get-AzIoTDpsCertificate -ResourceGroupName $ResourceGroupName -Name $IotDpsName -CertificateName $certificateName Assert-True { $certificate.Properties.Subject -eq $certificateSubject } Assert-False { $certificate.Properties.IsVerified } Assert-True { $certificate.Type -eq $certificateType } Assert-True { $certificate.CertificateName -eq $certificateName } $certificateWithVerificationCode = Get-AzIoTDpsCertificate -ResourceGroupName $ResourceGroupName -Name $IotDpsName -CertificateName $certificateName | New-AzIotDpsCVC Assert-True { $certificateWithVerificationCode.Properties.Subject -eq $certificateSubject } Assert-NotNull { $certificateWithVerificationCode.Properties.VerificationCode } New-CAVerificationCert $certificateWithVerificationCode.Properties.VerificationCode $certificateSubject $verifyCertificatePath $verifiedCertificate = Get-AzIoTDpsCertificate -ResourceGroupName $ResourceGroupName -Name $IotDpsName -CertificateName $certificateName | Set-AzIotDpsCertificate -Path $verifyCertificatePath Assert-True { $verifiedCertificate.Properties.Subject -eq $certificateSubject } Assert-True { $verifiedCertificate.Properties.IsVerified } Assert-True { $verifiedCertificate.Type -eq $certificateType } Assert-True { $verifiedCertificate.CertificateName -eq $certificateName } $result = Get-AzIoTDpsCertificate -ResourceGroupName $ResourceGroupName -Name $IotDpsName -CertificateName $certificateName | Remove-AzIotDpsCertificate -PassThru Assert-True { $result } Remove-AzResourceGroup -Name $ResourceGroupName -force } function Get-CACertBySubjectName([string]$subjectName) { $certificates = gci -Recurse Cert:\LocalMachine\ |? { $_.gettype().name -eq "X509Certificate2" } $cert = $certificates |? { $_.subject -eq $subjectName -and $_.PSParentPath -eq "Microsoft.PowerShell.Security\Certificate::LocalMachine\My" } if ($NULL -eq $cert) { throw ("Unable to find certificate with subjectName {0}" -f $subjectName) } write $cert[0] } function New-CASelfsignedCertificate([string]$subjectName, [object]$signingCert, [bool]$isASigner=$true) { $selfSignedArgs = @{"-DnsName"=$subjectName; "-CertStoreLocation"="cert:\LocalMachine\My"; "-NotAfter"=(get-date).AddDays(30); } if ($isASigner -eq $true) { $selfSignedArgs += @{"-KeyUsage"="CertSign"; } $selfSignedArgs += @{"-TextExtension"= @(("2.5.29.19={text}ca=TRUE&pathlength=12")); } } else { $selfSignedArgs += @{"-TextExtension"= @("2.5.29.37={text}1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.1", "2.5.29.19={text}ca=FALSE&pathlength=0") } } if ($signingCert -ne $null) { $selfSignedArgs += @{"-Signer"=$signingCert } } if ($useEcc -eq $true) { $selfSignedArgs += @{"-KeyAlgorithm"="ECDSA_nistP256"; "-CurveExport"="CurveName" } } write (New-SelfSignedCertificate @selfSignedArgs) } function New-CARootCert([string]$subjectName, [string]$requestedFileName) { $certificate = New-CASelfsignedCertificate $subjectName Export-Certificate -cert $certificate -filePath $requestedFileName -Type Cert if (-not (Test-Path $requestedFileName)) { throw ("Error: CERT file {0} doesn't exist" -f $requestedFileName) } } function New-CAVerificationCert([string]$requestedSubjectName, [string]$_rootCertSubject, [string]$verifyRequestedFileName) { $cnRequestedSubjectName = ("CN={0}" -f $requestedSubjectName) $rootCACert = Get-CACertBySubjectName $_rootCertSubject $verifyCert = New-CASelfsignedCertificate $cnRequestedSubjectName $rootCACert $false Export-Certificate -cert $verifyCert -filePath $verifyRequestedFileName -Type Cert if (-not (Test-Path $verifyRequestedFileName)) { throw ("Error: CERT file {0} doesn't exist" -f $verifyRequestedFileName) } Get-ChildItem ("Cert:\LocalMachine\My\{0}" -f $rootCACert.Thumbprint) | Remove-Item Get-ChildItem ("Cert:\LocalMachine\My\{0}" -f $verifyCert.Thumbprint) | Remove-Item }
combined_dataset/train/non-malicious/3405.ps1
3405.ps1
function Test-Disk { $rgname = Get-ComputeTestResourceName; $diskname = 'disk' + $rgname; try { $loc = Get-ComputeVMLocation; New-AzureRmResourceGroup -Name $rgname -Location $loc -Force; $subId = Get-SubscriptionIdFromResourceGroup $rgname; $mockkey = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $mocksourcevault = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.KeyVault/vaults/TestVault123'; $access = 'Read'; $diskconfig = New-AzureRmDiskConfig -Location $loc -DiskSizeGB 5 -AccountType StandardLRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; $diskconfig = Set-AzureRmDiskDiskEncryptionKey -Disk $diskconfig -SecretUrl $mockkey -SourceVaultId $mocksourcevault; $diskconfig = Set-AzureRmDiskKeyEncryptionKey -Disk $diskconfig -KeyUrl $mockkey -SourceVaultId $mocksourcevault; Assert-AreEqual $mockkey $diskconfig.EncryptionSettings.DiskEncryptionKey.SecretUrl; Assert-AreEqual $mocksourcevault $diskconfig.EncryptionSettings.DiskEncryptionKey.SourceVault.Id; Assert-AreEqual $mockkey $diskconfig.EncryptionSettings.KeyEncryptionKey.KeyUrl; Assert-AreEqual $mocksourcevault $diskconfig.EncryptionSettings.KeyEncryptionKey.SourceVault.Id; $mockimage = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.Compute/images/TestImage123'; $diskconfig = Set-AzureRmDiskImageReference -Disk $diskconfig -Id $mockimage -Lun 0; Assert-AreEqual $mockimage $diskconfig.CreationData.ImageReference.Id; Assert-AreEqual 0 $diskconfig.CreationData.ImageReference.Lun; $diskconfig.EncryptionSettings.Enabled = $false; $diskconfig.EncryptionSettings.DiskEncryptionKey = $null; $diskconfig.EncryptionSettings.KeyEncryptionKey = $null; $diskconfig.CreationData.ImageReference = $null; New-AzureRmDisk -ResourceGroupName $rgname -DiskName $diskname -Disk $diskconfig; $disk = Get-AzureRmDisk -ResourceGroupName $rgname -DiskName $diskname; Assert-AreEqual 5 $disk.DiskSizeGB; Assert-AreEqual StandardLRS $disk.AccountType; Assert-AreEqual Windows $disk.OsType; Assert-AreEqual Empty $disk.CreationData.CreateOption; Assert-AreEqual $false $disk.EncryptionSettings.Enabled; Grant-AzureRmDiskAccess -ResourceGroupName $rgname -DiskName $diskname -Access $access -DurationInSecond 5; Revoke-AzureRmDiskAccess -ResourceGroupName $rgname -DiskName $diskname; $updateconfig = New-AzureRmDiskUpdateConfig -DiskSizeGB 10 -AccountType PremiumLRS -OsType Windows -CreateOption Empty; Update-AzureRmDisk -ResourceGroupName $rgname -DiskName $diskname -DiskUpdate $updateconfig; Remove-AzureRmDisk -ResourceGroupName $rgname -DiskName $diskname -Force; } finally { Clean-ResourceGroup $rgname } } function Test-Snapshot { $rgname = Get-ComputeTestResourceName; $snapshotname = 'snapshot' + $rgname; try { $loc = Get-ComputeVMLocation; New-AzureRmResourceGroup -Name $rgname -Location $loc -Force; $subId = Get-SubscriptionIdFromResourceGroup $rgname; $mockkey = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $mocksourcevault = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.KeyVault/vaults/TestVault123'; $access = 'Read'; $snapshotconfig = New-AzureRmSnapshotConfig -Location $loc -DiskSizeGB 5 -AccountType StandardLRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; $snapshotconfig = Set-AzureRmSnapshotDiskEncryptionKey -Snapshot $snapshotconfig -SecretUrl $mockkey -SourceVaultId $mocksourcevault; $snapshotconfig = Set-AzureRmSnapshotKeyEncryptionKey -Snapshot $snapshotconfig -KeyUrl $mockkey -SourceVaultId $mocksourcevault; Assert-AreEqual $mockkey $snapshotconfig.EncryptionSettings.DiskEncryptionKey.SecretUrl; Assert-AreEqual $mocksourcevault $snapshotconfig.EncryptionSettings.DiskEncryptionKey.SourceVault.Id; Assert-AreEqual $mockkey $snapshotconfig.EncryptionSettings.KeyEncryptionKey.KeyUrl; Assert-AreEqual $mocksourcevault $snapshotconfig.EncryptionSettings.KeyEncryptionKey.SourceVault.Id; $mockimage = '/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.Compute/images/TestImage123'; $snapshotconfig = Set-AzureRmSnapshotImageReference -Snapshot $snapshotconfig -Id $mockimage -Lun 0; Assert-AreEqual $mockimage $snapshotconfig.CreationData.ImageReference.Id; Assert-AreEqual 0 $snapshotconfig.CreationData.ImageReference.Lun; $snapshotconfig.EncryptionSettings.Enabled = $false; $snapshotconfig.EncryptionSettings.DiskEncryptionKey = $null; $snapshotconfig.EncryptionSettings.KeyEncryptionKey = $null; $snapshotconfig.CreationData.ImageReference = $null; New-AzureRmSnapshot -ResourceGroupName $rgname -SnapshotName $snapshotname -Snapshot $snapshotconfig; $snapshot = Get-AzureRmSnapshot -ResourceGroupName $rgname -SnapshotName $snapshotname; Assert-AreEqual 5 $snapshot.DiskSizeGB; Assert-AreEqual StandardLRS $snapshot.AccountType; Assert-AreEqual Windows $snapshot.OsType; Assert-AreEqual Empty $snapshot.CreationData.CreateOption; Assert-AreEqual $false $snapshot.EncryptionSettings.Enabled; Grant-AzureRmSnapshotAccess -ResourceGroupName $rgname -SnapshotName $snapshotname -Access $access -DurationInSecond 5; Revoke-AzureRmSnapshotAccess -ResourceGroupName $rgname -SnapshotName $snapshotname; $updateconfig = New-AzureRmSnapshotUpdateConfig -DiskSizeGB 10 -AccountType PremiumLRS -OsType Windows -CreateOption Empty; Update-AzureRmSnapshot -ResourceGroupName $rgname -SnapshotName $snapshotname -SnapshotUpdate $updateconfig; Remove-AzureRmSnapshot -ResourceGroupName $rgname -SnapshotName $snapshotname -Force; } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/2903.ps1
2903.ps1
Framework '3.5' task default -depends AspNetCompiler task AspNetCompiler { if ( $IsMacOS -OR $IsLinux ) {} else { aspnet_compiler if ($LastExitCode -ne 1) { throw 'Error: Could not execute aspnet_compiler' } $global:LastExitCode = 0 } }
combined_dataset/train/non-malicious/sample_58_93.ps1
sample_58_93.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> <# .DESCRIPTION Ensure XML is signed by Microsoft. .PARAMETER XmlPath Path to XML File .EXAMPLE .\BuildEndpointTargets.ps1 -TargetDirectory . Build XML from all json services under current directory (.) #> [CmdletBinding()] param ( [Parameter()] [System.String] $XmlPath ) function Test-XMLSignatureByMicrosoft { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.String] $XmlPath ) # Read the xml file so we can test the signature. try { $XmlDocument = New-Object -TypeName System.Xml.XmlDocument $XmlDocument.PreserveWhitespace = $true $xmlTextReader = New-Object -TypeName System.Xml.XmlTextReader -ArgumentList $XmlPath $XmlDocument.Load($xmlTextReader) $xmlTextReader.Dispose() } catch { throw ($LocalizedStrings.OEMMetadataInvalid -f $XmlPath) } $validSignature = $false $isSignedByMicrosoft = $false Write-Verbose "Testing $XmlPath" $signatures = $XmlDocument.GetElementsByTagName('Signature') if (-not [System.String]::IsNullOrEmpty($signatures)) { foreach($signature in $signatures) { # Get the signed XML to validate the signature. Add-Type -AssemblyName System.Security $signedXml = New-Object System.Security.Cryptography.Xml.SignedXml -ArgumentList $XmlDocument $signedXml.LoadXml([System.Xml.XmlElement]$signature) $x509certificates = $signature.KeyInfo.x509Data if (-not [System.String]::IsNullOrEmpty($x509certificates)) { # Find the signing certificate, and add intermediate certificate to enable disconnected validation foreach($x509certificate in $x509certificates.X509Certificate) { $certBytes = [System.Convert]::FromBase64String($x509certificate) $certificate = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2 -ArgumentList $certBytes,$null Write-Verbose $certificate.Thumbprint if ($signedXml.CheckSignature($certificate,$true)) { # This is the signing certificate Write-Verbose "This is the signing certificate $($certificate.Thumbprint)" Write-Verbose "$XmlPath,$($certificate.Thumbprint)" $signingCertificate = $certificate } elseif (Get-ChildItem -Path Cert:\LocalMachine\Root | Where-Object {$_.Thumbprint -eq $certificate.Thumbprint}) { # This is an existing trusted root Write-Verbose "This is an existing trusted root $($certificate.Thumbprint)" } else { # This is not the signing certificate or an existing trusted root, add it to Intermediate CAs... # ...this allows IsMicrosoftCertificate and x509Chain.Build to function, even when disconnected. Write-Verbose "$($certificate.Thumbprint)" if (Get-ChildItem -Path Cert:\LocalMachine\CA | Where-Object {$_.Thumbprint -eq $certificate.Thumbprint}) { Write-Verbose "existing $($certificate.Thumbprint)" } else { Write-Verbose "Add $($certificate.Thumbprint)" $x509Store = New-Object System.Security.Cryptography.X509Certificates.X509Store('CA','LocalMachine') $x509Store.Open('ReadWrite') $x509Store.Add($certificate) $x509Store.Dispose() } } } # Test that the signing certificate is a trusted certificate. if ($signingCertificate) { if (Test-MicrosoftCertificate -Certificate $signingCertificate) { Write-Verbose "Valid and msft $XmlPath,$($signingCertificate.Thumbprint)" $validSignature = $true $isSignedByMicrosoft = $true } elseif (Test-AlternateRoot -Certificate $signingCertificate) { Write-Verbose "Alt $XmlPath,$($signingCertificate.Thumbprint)" $validSignature = $true $isSignedByMicrosoft = $true } else { Write-Warning "Untrusted $XmlPath,$($signingCertificate.Thumbprint)" } } else { # We did not find a signing certificate, so the signature is not valid. Write-Verbose "Invalid $XmlPath" } } } } else { Write-Warning ($LocalizedStrings.OEMPackageUnsigned -f $XmlPath) } # Fail if the package is unsigned or the signature is invalid or untrusted. if (-not $validSignature) { throw ("OEMPackageInvalid -f $XmlPath") } return $isSignedByMicrosoft } # this function is based on code from PowerShellGet function Test-MicrosoftCertificate { [CmdletBinding()] [OutputType([System.Boolean])] param ( [Parameter(Mandatory = $true)] [System.Security.Cryptography.X509Certificates.X509Certificate2] $Certificate ) try { $requiredAssembly = @( [System.Management.Automation.PSCmdlet].Assembly.FullName, [System.Net.IWebProxy].Assembly.FullName, [System.Uri].Assembly.FullName ) $source = @" using System; using System.Net; using System.Management.Automation; using Microsoft.Win32.SafeHandles; using System.Security.Cryptography; using System.Runtime.InteropServices; namespace Microsoft.PowerShell.CodeSigning { [StructLayout(LayoutKind.Sequential, CharSet=CharSet.Unicode)] public struct CERT_CHAIN_POLICY_PARA { public CERT_CHAIN_POLICY_PARA(int size) { cbSize = (uint) size; dwFlags = 0; pvExtraPolicyPara = IntPtr.Zero; } public uint cbSize; public uint dwFlags; public IntPtr pvExtraPolicyPara; } [StructLayout(LayoutKind.Sequential, CharSet=CharSet.Unicode)] public struct CERT_CHAIN_POLICY_STATUS { public CERT_CHAIN_POLICY_STATUS(int size) { cbSize = (uint) size; dwError = 0; lChainIndex = IntPtr.Zero; lElementIndex = IntPtr.Zero; pvExtraPolicyStatus = IntPtr.Zero; } public uint cbSize; public uint dwError; public IntPtr lChainIndex; public IntPtr lElementIndex; public IntPtr pvExtraPolicyStatus; } public class Helper { [DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)] public extern static bool CertVerifyCertificateChainPolicy( [In] IntPtr pszPolicyOID, [In] SafeX509ChainHandle pChainContext, [In] ref CERT_CHAIN_POLICY_PARA pPolicyPara, [In,Out] ref CERT_CHAIN_POLICY_STATUS pPolicyStatus); [DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern SafeX509ChainHandle CertDuplicateCertificateChain( [In] IntPtr pChainContext); public static bool IsMicrosoftCertificate([In] SafeX509ChainHandle pChainContext) { const uint MICROSOFT_ROOT_CERT_CHAIN_POLICY_ENABLE_TEST_ROOT_FLAG = 0x00010000; CERT_CHAIN_POLICY_PARA PolicyPara = new CERT_CHAIN_POLICY_PARA(Marshal.SizeOf(typeof(CERT_CHAIN_POLICY_PARA))); CERT_CHAIN_POLICY_STATUS PolicyStatus = new CERT_CHAIN_POLICY_STATUS(Marshal.SizeOf(typeof(CERT_CHAIN_POLICY_STATUS))); int CERT_CHAIN_POLICY_MICROSOFT_ROOT = 7; PolicyPara.dwFlags = (uint) MICROSOFT_ROOT_CERT_CHAIN_POLICY_ENABLE_TEST_ROOT_FLAG; if(!CertVerifyCertificateChainPolicy(new IntPtr(CERT_CHAIN_POLICY_MICROSOFT_ROOT), pChainContext, ref PolicyPara, ref PolicyStatus)) { return false; } return (PolicyStatus.dwError == 0); } } } "@ Add-Type -ReferencedAssemblies $requiredAssembly -TypeDefinition $source -Language CSharp -ErrorAction Stop } catch { Write-Verbose "Error $($_.ToString())" return $false } try { $X509Chain = New-Object System.Security.Cryptography.X509Certificates.X509Chain $null = $X509Chain.Build($Certificate) } catch { Write-Verbose "eror $($_.ToString())" return $false } $SafeX509ChainHandle = [Microsoft.PowerShell.CodeSigning.Helper]::CertDuplicateCertificateChain($X509Chain.ChainContext) return [Microsoft.PowerShell.CodeSigning.Helper]::IsMicrosoftCertificate($SafeX509ChainHandle) } function Test-AlternateRoot { [CmdletBinding()] [OutputType([System.Boolean])] Param ( [Parameter(Mandatory = $true)] [System.Security.Cryptography.X509Certificates.X509Certificate2] $Certificate, # Alternate roots are select Microsoft roots published here --> https://www.microsoft.com/pkiops/docs/repository.htm [System.String[]] $AlternateRoots = @( '8F43288AD272F3103B6FB1428485EA3014C0BCFE' '3B1EFD3A66EA28B16697394703A72CA340A05BD5' ) ) $result = $false $x509Chain = New-Object -TypeName System.Security.Cryptography.X509Certificates.X509Chain $null = $x509Chain.Build($Certificate) foreach ($alternateRoot in $AlternateRoots) { if ($x509Chain.ChainElements.Certificate[-1].Thumbprint -eq $alternateRoot) { $result = $true } } return $result } Test-XMLSignatureByMicrosoft -XmlPath $XmlPath # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBfHGnPgodyxRpv # G/St++7Y0eIwAbuTLv/kEWu2O2T3TKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGTxnPG/fsuRxOYg6xZ73ZLV # MXq7b9tGjBLalt7Ymi81MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAtMpcsUYtQFVyeff1JOpHMmrUSJP6Gkyooxl4qCn86KA7yx7v3EFZSYWO # 9YcQVKeYgT/ObxnxJ2Bi3PYGSxHK/9fjK6BafwZmgOjrZYQyecmCYfvOhMXuyaMc # jypK5kr9An7x/2UFzmRznLOB4TOukOh4MithNog6BdcdLySzDLUEI6fJYsSxfWSE # U2sW8NPWvtry2P6UlwpJYpev9PdBp2+0SMt31BC59HA7NueQqZkxiklsxFhCmDPT # RLbfZ/J74bSf8J5z0+xN2RRA+rPXqSIqbX6uongHJcNnT3EgFQAbKH9dL1hJ7xjQ # INQ7xM+zpNoj/RAg3aVEw34mN3KtuKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDYSKcHr29/JGEoMKwFwxiS6fLzcZfHlXcIl3yGML4BIAIGZjOrHlSA # GBMyMDI0MDUxNjE4NDQyNS40MjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnwnUMwIhgPMjAyNDA1MTYyMjU3MDdaGA8yMDI0MDUxNzIyNTcwN1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fCdQwIBADAHAgEAAgID3zAHAgEAAgIRrTAKAgUA # 6fHuwwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGRlJmD4Pm0a2ZXNrC7c # hWy5hXLsafZMqicwyWFUOagBv008UJXV934PwR/AYu6JEfRQNBQKDOYskFLAOnvO # jXU9VhvPALsmy8+mZD2thf4r2HFkYffZGvyfS7G61QPbGd/6gez0O4p8pdFeQq8o # jY4M2biKfSLGPGc+lo2XncRfMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgBsKLaunc9dST74GmPBGCzpLWhbBUGCeerurZ6ZIWiwUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIKTJslI+Gq3aHsWJ9P5eKg7d9P5UfEDHlHAwLXSd1TWf # MA0GCSqGSIb3DQEBCwUABIICABJ9/XKL22c0Rs8O0tISEcDOr2L6Kno5l+izYKp7 # +hvM9S6DprLRV/aYgamPpM70hXXoSz8ud7Qsqxp2Kf3oqd/+f2Znpic9znwFC0qz # +wG4h61iCRWIapBmD8j2wVIsoP97V0Sx0r7doRga8zUqJLnXKnJJHNRamU+TZQ9l # VZOBezGVo9CZ72H4YsSD3iysaPB33clZklCaeGQMR2jlMDX6IAPxk8/0OzVtAB9n # 1IR+kQZApckHlmmTRUQgGCSi8cS3YNnmrF0LBDC0XuEiF0+337lrTuytOFqZ3Xkx # 4C4MlLfEQP2eozX2Iq/6u6EQRN8Seh89pzFurEYDIYr2ec0kNdoNVlO9gwNyLGSO # HmW4XzjeT1av11dlqry2eRDp7sYGWu/ixDzp5Ks31iNippsAcW+105qkFVPEWcoR # LPhSsJIzRfNBemBJYcvGhspAk2ZihFgkJrn8oN6rmo42GsFs1jeHA+dv28HJ/6vy # A42pyxGqWtYxn/Pf/XXhHNSR/xmKF/JNp9XrpBGttaeT5z8FcSrdiNZyz6Wwpb5E # Xd4eZHrp1M+dMPEV9NhrK4m473U36neKHKkLTZ2JHf38/kIvoOADtEdEOxJWxF1g # wY0k7yFvLd5JkV1IPj/Ug9Bn+3EyIbvWkKAhJEnK2OgFXrkCdvyFDziADgbMmo3v # TYWO # SIG # End signature block
combined_dataset/train/non-malicious/sample_22_44.ps1
sample_22_44.ps1
# # Module manifest for module 'OCI.PSModules.Marketplacepublisher' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Marketplacepublisher.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '16f2e498-6e6b-4e22-8c36-b6c2677410c6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Marketplacepublisher Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplacepublisher.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIMarketplacepublisherAndPublishArtifact', 'Enable-OCIMarketplacepublisherTermVersion', 'Get-OCIMarketplacepublisherArtifact', 'Get-OCIMarketplacepublisherArtifactsList', 'Get-OCIMarketplacepublisherCategoriesList', 'Get-OCIMarketplacepublisherCategory', 'Get-OCIMarketplacepublisherListing', 'Get-OCIMarketplacepublisherListingRevision', 'Get-OCIMarketplacepublisherListingRevisionAttachment', 'Get-OCIMarketplacepublisherListingRevisionAttachmentsList', 'Get-OCIMarketplacepublisherListingRevisionNote', 'Get-OCIMarketplacepublisherListingRevisionNotesList', 'Get-OCIMarketplacepublisherListingRevisionPackage', 'Get-OCIMarketplacepublisherListingRevisionPackagesList', 'Get-OCIMarketplacepublisherListingRevisionsList', 'Get-OCIMarketplacepublisherListingsList', 'Get-OCIMarketplacepublisherMarket', 'Get-OCIMarketplacepublisherMarketsList', 'Get-OCIMarketplacepublisherProduct', 'Get-OCIMarketplacepublisherProductsList', 'Get-OCIMarketplacepublisherPublisher', 'Get-OCIMarketplacepublisherPublishersList', 'Get-OCIMarketplacepublisherTerm', 'Get-OCIMarketplacepublisherTermsList', 'Get-OCIMarketplacepublisherTermVersion', 'Get-OCIMarketplacepublisherTermVersionsList', 'Get-OCIMarketplacepublisherWorkRequest', 'Get-OCIMarketplacepublisherWorkRequestErrorsList', 'Get-OCIMarketplacepublisherWorkRequestLogsList', 'Get-OCIMarketplacepublisherWorkRequestsList', 'Invoke-OCIMarketplacepublisherCascadingDeleteListing', 'Invoke-OCIMarketplacepublisherCascadingDeleteListingRevision', 'Invoke-OCIMarketplacepublisherCloneListingRevision', 'Invoke-OCIMarketplacepublisherMarkListingRevisionPackageAsDefault', 'Invoke-OCIMarketplacepublisherPublishListingRevision', 'Invoke-OCIMarketplacepublisherPublishListingRevisionAsPrivate', 'Invoke-OCIMarketplacepublisherPublishListingRevisionPackage', 'Invoke-OCIMarketplacepublisherSubmitListingRevisionForReview', 'Invoke-OCIMarketplacepublisherUnPublishListingRevisionPackage', 'Invoke-OCIMarketplacepublisherWithdrawListingRevision', 'Move-OCIMarketplacepublisherArtifactCompartment', 'Move-OCIMarketplacepublisherListingCompartment', 'Move-OCIMarketplacepublisherListingRevisionToNewStatus', 'Move-OCIMarketplacepublisherTermCompartment', 'New-OCIMarketplacepublisherArtifact', 'New-OCIMarketplacepublisherListing', 'New-OCIMarketplacepublisherListingRevision', 'New-OCIMarketplacepublisherListingRevisionAttachment', 'New-OCIMarketplacepublisherListingRevisionNote', 'New-OCIMarketplacepublisherListingRevisionPackage', 'New-OCIMarketplacepublisherTerm', 'New-OCIMarketplacepublisherTermVersion', 'Remove-OCIMarketplacepublisherArtifact', 'Remove-OCIMarketplacepublisherListing', 'Remove-OCIMarketplacepublisherListingRevision', 'Remove-OCIMarketplacepublisherListingRevisionAttachment', 'Remove-OCIMarketplacepublisherListingRevisionNote', 'Remove-OCIMarketplacepublisherListingRevisionPackage', 'Remove-OCIMarketplacepublisherTerm', 'Remove-OCIMarketplacepublisherTermVersion', 'Stop-OCIMarketplacepublisherWorkRequest', 'Update-OCIMarketplacepublisherArtifact', 'Update-OCIMarketplacepublisherListing', 'Update-OCIMarketplacepublisherListingRevision', 'Update-OCIMarketplacepublisherListingRevisionAttachment', 'Update-OCIMarketplacepublisherListingRevisionAttachmentContent', 'Update-OCIMarketplacepublisherListingRevisionIconContent', 'Update-OCIMarketplacepublisherListingRevisionPackage', 'Update-OCIMarketplacepublisherTerm', 'Update-OCIMarketplacepublisherTermVersion', 'Update-OCIMarketplacepublisherTermVersionContent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplacepublisher' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-ADGroupMembers.ps1
Get-ADGroupMembers.ps1
Function Get-ADGroupMembers { <# .SYNOPSIS Return a collection of users in an ActiveDirectory group. .DESCRIPTION This function returns an object that contains all the properties of a user object. This function works for small groups as well as groups in excess of 1000. .PARAMETER UserGroup The name of the group to get membership from. .PARAMETER UserDomain The LDAP URL of the domain that the group resides in. .EXAMPLE Get-ADGroupMembers -UserGroup Managers |Format-Table -Property name, distinguishedName, cn name distinguishedName cn ---- ----------------- -- {Steve Roberts} {CN=Steve Roberts,CN=Users,DC... {Steve Roberts} {S-1-5-21-57989841-1078081533... {CN=S-1-5-21-57989841-1078081... {S-1-5-21-57989841-1078081533... {S-1-5-21-57989841-1078081533... {CN=S-1-5-21-57989841-1078081... {S-1-5-21-57989841-1078081533... {Matt Temple} {CN=Matt Temple,CN=Users,DC=c... {Matt Temple} ... Description ----------- This example shows passing in a group name, but leaving the default domain name in place. .NOTES The context under which this script is run must have rights to pull infromation from ActiveDirectory. .LINK http://scripts.patton-tech.com/wiki/PowerShell/ActiveDirectoryManagement#Get-ADGroupMembers #> Param ( $UserGroup = "Domain Users", $UserDomain = ([ADSI]"LDAP://DC=company,DC=com") ) Begin { $DirectoryEntry = New-Object System.DirectoryServices.DirectoryEntry($UserDomain.Path) $DirectorySearcher = New-Object System.DirectoryServices.DirectorySearcher $LDAPFilter = "(&(objectCategory=Group)(name=$($UserGroup)))" $DirectorySearcher.SearchRoot = $DirectoryEntry $DirectorySearcher.PageSize = 1000 $DirectorySearcher.Filter = $LDAPFilter $DirectorySearcher.SearchScope = "Subtree" $SearchResult = $DirectorySearcher.FindAll() $UserAccounts = @() } Process { foreach ($Item in $SearchResult) { $Group = $Item.GetDirectoryEntry() $Members = $Group.member If ($Members -ne $Null) { foreach ($User in $Members) { $UserObject = New-Object System.DirectoryServices.DirectoryEntry("LDAP://$($User)") If ($UserObject.objectCategory.Value.Contains("Group")) { } Else { $ThisUser = New-Object -TypeName PSObject -Property @{ cn = $UserObject.cn distinguishedName = $UserObject.distinguishedName name = $UserObject.name nTSecurityDescriptor = $UserObject.nTSecurityDescriptor objectCategory = $UserObject.objectCategory objectClass = $UserObject.objectClass objectGUID = $UserObject.objectGUID objectSID = $UserObject.objectSID showInAdvancedViewOnly = $UserObject.showInAdvancedViewOnly } } $UserAccounts += $ThisUser } } } } End { Return $UserAccounts } }
combined_dataset/train/non-malicious/2000.ps1
2000.ps1
Describe "Configuration file locations" -tags "CI","Slow" { BeforeAll { $powershell = Join-Path -Path $PsHome -ChildPath "pwsh" $profileName = "Microsoft.PowerShell_profile.ps1" } Context "Default configuration file locations" { BeforeAll { if ($IsWindows) { $ProductName = "WindowsPowerShell" if ($IsCoreCLR -and ($PSHOME -notlike "*Windows\System32\WindowsPowerShell\v1.0")) { $ProductName = "PowerShell" } $expectedCache = [IO.Path]::Combine($env:LOCALAPPDATA, "Microsoft", "Windows", "PowerShell", "StartupProfileData-NonInteractive") $expectedModule = [IO.Path]::Combine($env:USERPROFILE, "Documents", $ProductName, "Modules") $expectedProfile = [io.path]::Combine($env:USERPROFILE, "Documents", $ProductName, $profileName) $expectedReadline = [IO.Path]::Combine($env:AppData, "Microsoft", "Windows", "PowerShell", "PSReadline", "ConsoleHost_history.txt") } else { $expectedCache = [IO.Path]::Combine($env:HOME, ".cache", "powershell", "StartupProfileData-NonInteractive") $expectedModule = [IO.Path]::Combine($env:HOME, ".local", "share", "powershell", "Modules") $expectedProfile = [io.path]::Combine($env:HOME,".config","powershell",$profileName) $expectedReadline = [IO.Path]::Combine($env:HOME, ".local", "share", "powershell", "PSReadLine", "ConsoleHost_history.txt") } $ItArgs = @{} } BeforeEach { $original_PSModulePath = $env:PSModulePath } AfterEach { $env:PSModulePath = $original_PSModulePath } It @ItArgs "Profile location should be correct" { & $powershell -noprofile -c `$PROFILE | Should -Be $expectedProfile } It @ItArgs "PSModulePath should contain the correct path" { $env:PSModulePath = "" $actual = & $powershell -noprofile -c `$env:PSModulePath $actual | Should -Match ([regex]::Escape($expectedModule)) } It @ItArgs "PSReadLine history save location should be correct" { & $powershell -noprofile { (Get-PSReadlineOption).HistorySavePath } | Should -Be $expectedReadline } It "JIT cache should be created correctly" -Skip { Remove-Item -ErrorAction SilentlyContinue $expectedCache & $powershell -noprofile { exit } $expectedCache | Should -Exist } } Context "XDG Base Directory Specification is supported on Linux" { BeforeAll { if ($IsWindows) { $ItArgs = @{ skip = $true } } else { $ItArgs = @{} } } BeforeEach { $original_PSModulePath = $env:PSModulePath $original_XDG_CONFIG_HOME = $env:XDG_CONFIG_HOME $original_XDG_CACHE_HOME = $env:XDG_CACHE_HOME $original_XDG_DATA_HOME = $env:XDG_DATA_HOME } AfterEach { $env:PSModulePath = $original_PSModulePath $env:XDG_CONFIG_HOME = $original_XDG_CONFIG_HOME $env:XDG_CACHE_HOME = $original_XDG_CACHE_HOME $env:XDG_DATA_HOME = $original_XDG_DATA_HOME } It @ItArgs "Profile should respect XDG_CONFIG_HOME" { $env:XDG_CONFIG_HOME = $TestDrive $expected = [IO.Path]::Combine($TestDrive, "powershell", $profileName) & $powershell -noprofile -c `$PROFILE | Should -Be $expected } It @ItArgs "PSModulePath should respect XDG_DATA_HOME" { $env:PSModulePath = "" $env:XDG_DATA_HOME = $TestDrive $expected = [IO.Path]::Combine($TestDrive, "powershell", "Modules") $actual = & $powershell -noprofile -c `$env:PSModulePath $actual | Should -Match $expected } It @ItArgs "PSReadLine history should respect XDG_DATA_HOME" { $env:XDG_DATA_HOME = $TestDrive $expected = [IO.Path]::Combine($TestDrive, "powershell", "PSReadLine", "ConsoleHost_history.txt") & $powershell -noprofile { (Get-PSReadlineOption).HistorySavePath } | Should -Be $expected } It -Skip "JIT cache should respect XDG_CACHE_HOME" { $env:XDG_CACHE_HOME = $TestDrive $expected = [IO.Path]::Combine($TestDrive, "powershell", "StartupProfileData-NonInteractive") Remove-Item -ErrorAction SilentlyContinue $expected & $powershell -noprofile { exit } $expected | Should -Exist } } } Describe "Working directory on startup" -Tag "CI" { BeforeAll { $powershell = Join-Path -Path $PSHOME -ChildPath "pwsh" $testPath = New-Item -ItemType Directory -Path "$TestDrive\test[dir]" $currentDirectory = Get-Location } AfterAll { Set-Location $currentDirectory } It "Can start in directory where name contains wildcard characters" -Pending { Set-Location -LiteralPath $testPath.FullName if ($IsMacOS) { $expectedPath = "/private" + $testPath.FullName } else { $expectedPath = $testPath.FullName } & $powershell -noprofile -c { $PWD.Path } | Should -BeExactly $expectedPath } }
combined_dataset/train/non-malicious/POC csharp expressions_1.ps1
POC csharp expressions_1.ps1
function run-csharpexpression([string] $expression ) { $local:name = [system.guid]::NewGuid().tostring().replace('-','_').insert(0,"csharpexpr") $local:template = @" using System; using System.IO; using System.Collections.Generic; using System.Linq; namespace ShellTools.DynamicCSharpExpression.N[[COUNTER]] { public class [[CLASSNAME]] { public static object RunExpression() { return [[EXPRESSION]]; } } } "@ $global:ccounter = [int]$ccounter + 1 $local:source = $local:template.replace("[[CLASSNAME]]",$local:name).replace("[[EXPRESSION]]",$expression).replace("[[COUNTER]]", $ccounter) add-Type $local:source -Language CsharpVersion3 | out-Null invoke-Expression $('[ShellTools.DynamicCsharpExpression.' + $local:name + ']::RunExpression()' ) } set-alias c run-csharpexpression c DateTime.Now c "new{a=1,b=2,c=3}" c 'from x in Directory.GetFiles(@"c:\\downloads") where x.Contains("win") select x'
combined_dataset/train/non-malicious/sample_47_38.ps1
sample_47_38.ps1
"use strict"; // Copyright (c) Microsoft Corporation. // Licensed under the MIT License. Object.defineProperty(exports, "__esModule", { value: true }); exports.Force = void 0; const switch_1 = require("../switch"); class Force extends switch_1.Switch { switch = 'force'; } exports.Force = Force; //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZm9yY2UuanMiLCJzb3VyY2VSb290IjoiaHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL21pY3Jvc29mdC92Y3BrZy10b29sL21haW4vdmNwa2ctYXJ0aWZhY3RzLyIsInNvdXJjZXMiOlsiY2xpL3N3aXRjaGVzL2ZvcmNlLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQSx1Q0FBdUM7QUFDdkMsa0NBQWtDOzs7QUFFbEMsc0NBQW1DO0FBRW5DLE1BQWEsS0FBTSxTQUFRLGVBQU07SUFDL0IsTUFBTSxHQUFHLE9BQU8sQ0FBQztDQUNsQjtBQUZELHNCQUVDIn0= // SIG // Begin signature block // SIG // MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // QnTr+bqNHTcyFYzX03L9AxGENnybKAo0Tzn/fyfiNaCg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghoKMIIaBgIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCAqdkWwJ9XJD9+7vkcPSGs62r20hw/9Oeax // SIG // Xa/wkoUlwTBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAHP9kKnX // SIG // Dq3MDKhs6v98MgTK/6bI6ipBiCfSLG5HezdK4MSWeJdW // SIG // PMmHf285kri1DP4Up5Qg/OYiA8PRtoiMeEHTNeToIMvE // SIG // TkvuL+XI1uiCawfNttngPFm25zRyB7MaU0y+IxUrmY3s // SIG // w94mtrc5Pr4BYgjNDfQewytwqIZ2jTZ0cb4myhaV3eQA // SIG // RBoxZMNZ8nxYhn6Z5ZKgvNxNfyiBDodiOyjey2iEe9Ff // SIG // NVvPCy37szLa5SBfgYbyMg/kbyoGVoLbHDKOfc/6Td6P // SIG // lhlT1n80ERhlyuIr9cr4Vfkpgkytls8w1FXYEcMIidYz // SIG // zwnuokMzvUCpnwa05ry3RDWageuhgheUMIIXkAYKKwYB // SIG // BAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdtMIIX // SIG // aQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN // SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgdT5Yulgdf6Nbc0Gzd2wl // SIG // wYwr64t9XgtK7Lh9k4bPXKMCBmV7IfUCbBgTMjAyNDAx // SIG // MTEwMjU5MTAuNzcxWjAEgAIB9KCB0aSBzjCByzELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0 // SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo // SIG // aWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYD // SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl // SIG // oIIR6jCCByAwggUIoAMCAQICEzMAAAHZnFwFkrCDaz4A // SIG // AQAAAdkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMwNjAxMTgzMjU4WhcN // SIG // MjQwMjAxMTgzMjU4WjCByzELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl // SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO // SIG // OkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG // SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEA1ekgzda4GNt9Oci3 // SIG // QnVDbxwhBOGdLnA+giry+ZQOxzPNUjJFt+kVO+1GgS/T // SIG // 0nL4qn1cxNq9qUW0TLQwTMBMdYmos1dhGbDRhrs3kd1z // SIG // WDm0LyVS2gogZLQGXau+QTRSIpfkn3aV4Cs1UGYgwSQz // SIG // edFggAza62+PGeGe/yr8s2g+Bm/mmXgoqAdhoNZud3fu // SIG // qVEwXN1jucR2Yv66yP13Z4YhOv27KY6VOWrnwpSA8dEA // SIG // 6tUEcNOGnayoXA1shi90mgaf4YzfuCSVOys77ClmVXU7 // SIG // lz6I52k8FnB3RBn88Ymhd9M3fEmOGEVHDBjzkDkR9SD8 // SIG // JMMJakJHNBwZCQkM4ml2PyKYDEcP1z+FL/iQSfEWRimT // SIG // dc0T1k/XebxxlEpl95u+0SqAn5IEiYnyIkIuhXNDmCku // SIG // oGTgO53eLfpYgK6/Z4qngv1HDTrla3FQuAm5MHydnh5G // SIG // lodfLFLd1A/EB2C0MJ/eT/h5vD2SYoK9UkS3LJvKTj3n // SIG // uzwW53SP1XiibJkHY3pNmhTvVRp1LcwwwaMJYV7IbMGT // SIG // DJCyf+I1M0JlAX5viQB9edehPhtNsEuzYMzMJqR1gpgG // SIG // hXXew8iSKhmum3Ga0e0AC3ZMCIVUA4M2QLjcasL4eCGu // SIG // GSOVaMo+G+81gIZrq6cKTKYo8/onnlsH+mXZsrEY0f8m // SIG // elF5hmsCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBQcOsEp // SIG // U2eoBV5dOcP7NxmtX+dcJzAfBgNVHSMEGDAWgBSfpxVd // SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ // SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz // SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB // SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG // SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j // SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt // SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB // SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G // SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // KjbVWCzutUzLiGpwu3JbdIvl0UWx8J8DaNOUN7OKaRbX // SIG // eJwpgf0yTwyerrxK8sbNL8OWPo0MFIip4ZdlRhsCKtKV // SIG // gyLmluKaTFdaWEHyenbQRpEYkz9XilbwEWGTEWiE3vWY // SIG // cCSZ2D/N6TMRwsWhLGQuIpWN/+eXaneGV0ws/3KRuWp5 // SIG // g2q7Z1poMrMoDbLU8G1iSUY/OYGEZI8Yv58SgIhBcZeh // SIG // n5HJ11cvA0RUI9XdwIqrHj6HiM8btYrgCUcA633uDZyh // SIG // 6qE4FrL+3gliZ1o1lkbe0URq6b8y0KPwcVG/IuPVMEYP // SIG // RuW8aXeUrtW9tuBr+htR0VPqiRwdc6HuNQ9q/4nNgT6L // SIG // rFfZ3mCuaiOTxy7IQJ+mE0JZW1faQmzlL2TtHbXcKeRx // SIG // 9n8OqHyTcCnDxJWqpBHMb64YUVqsDYGhFU8iFeIzHPIz // SIG // 28djYfcwM7Z2/TX5wxThPv4BfHGak2v0+uUxjT97jIj9 // SIG // 4K/JyF0NiEcDFVKC5hrtqn5oQ6HsLN3XL5OrNWgOplx8 // SIG // PjADRCAyio8N4thuibWZBHprtTl7bJIP7Rp38sGjIKuQ // SIG // mrlPW+np07QPlBPhip5okFumFBz4QSNC9kBu+k0Qa3uT // SIG // 6TVR4snP9NW41BDKXmgfiJwB+Jw8WF8dfMGyRPnvyGzL // SIG // 9NeOxBS+/dnRCxdF8KqnFNEwggdxMIIFWaADAgECAhMz // SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA // SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN // SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp // SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx // SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX // SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD // SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV // SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw // SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA // SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 // SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF // SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc // SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus // SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130 // SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI // SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes // SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp // SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+ // SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz // SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO // SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi // SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5 // SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q // SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H // SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG // SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE // SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf // SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG // SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw // SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv // SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH // SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f // SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK // SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu // SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w // SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq // SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 // SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT // SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL // SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l // SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ // SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz // SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7 // SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY // SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX // SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU // SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz // SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/ // SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1 // SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328 // SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG // SIG // ahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGkgc4w // SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n // SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p // SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV // SIG // BAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1RTAtRDk0 // SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA4hxFugmt5+QY // SIG // GVf7UP3wkdPU3/eggYMwgYCkfjB8MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T // SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOlJ // SIG // OHowIhgPMjAyNDAxMTAxNTM4MzRaGA8yMDI0MDExMTE1 // SIG // MzgzNFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6Uk4 // SIG // egIBADAHAgEAAgIFijAHAgEAAgITdDAKAgUA6UqJ+gIB // SIG // ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMC // SIG // oAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 // SIG // DQEBCwUAA4IBAQBk+B3tnxGYlsIFnL0dyYHdT0l9IhLU // SIG // 26W7/EzrgMzEpHhdSRuIwn/Uzvv4p+nVp0qdYDDVbVDq // SIG // A3nEaPmSDAoXD2vY3PhXg6u8V17U7vl0BhAmXpILX9EK // SIG // c6vbeTrcN0tkRYiAX4hdhQXdEjY1AbmvvPrK1UIs5tjB // SIG // 59RLiYzAIf6oBRBqc6o8VMzTs6i1zBwKRGIv5S+FY92h // SIG // c1I828Nvm/9N9lE+0v9e6AGlZFarbhoZ9yCWGSFWo6O9 // SIG // HqnBbQWeuSSS3zIDQ2WgniGULkE8vZJs779raXZ1L0Lv // SIG // R8zFpDJIeTGwXxC8Bz/77VcpMsyKKF/IiMONymXPwgoI // SIG // nGSOMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx // SIG // EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl // SIG // ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh // SIG // dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh // SIG // bXAgUENBIDIwMTACEzMAAAHZnFwFkrCDaz4AAQAAAdkw // SIG // DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzEN // SIG // BgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgi7Gh // SIG // jINC5DnhMcSjrpIFdnOMxGN4rnohdHQ1hOpn8AIwgfoG // SIG // CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCfoBWyLTpv // SIG // 1DAwJxE82yXtLtA1ndjIKYG9EnG0IAd58zCBmDCBgKR+ // SIG // MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n // SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p // SIG // Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB // SIG // 2ZxcBZKwg2s+AAEAAAHZMCIEILyWz27k6e3GVuexOvPS // SIG // Ho+UlWjyPG8s3ZR38qTZXeU4MA0GCSqGSIb3DQEBCwUA // SIG // BIICALw/btSGr6LxvjTSklZg3RjaqhWLa7z5CoqaEzFU // SIG // oXKAGjsGIq1rcta/CnJAeilYLsP2VTsTV+u5D413Qbzu // SIG // lQpXHh2pdTLOfNH/di6mefOFYIB4fBao6PyIbt542QyY // SIG // sVOqYoxoJa2UQSmeSeA/D+9IbR02s6VGpKRSdsvWwRNz // SIG // 2D4PxXmWAvtJT3NhfI33/4hQE+Z032bUDp01egp+ZblC // SIG // NS/AkfEL0oKkazOMTA73rtn+5bdYLGmnC3H4WoCACEnk // SIG // iEWLf85zKEyntbnAt0VBqhsKqHQuHolJZR6QM38Md67b // SIG // /MY0kwK5X67MJnvDQ0HcApHO2t9hrujJJ7h5IUf+D8ZE // SIG // XCNiyyxXXPbnvAMSJs9sHg5D7zC1CWt6rMysbvqM0AVE // SIG // cA/wBet22MXaQR97fw+rFvtlp6r5rqWwbpWo91bDUMnn // SIG // pbVF4n2/grjKVqvGDIiuhjHYcJHpg3tQpKMQs8lQzx2t // SIG // VcNOuqn7URbodw992f5DmuHdBSmkytx7DcECVFCtUS85 // SIG // ObnhjwvxkoV4Gm27nWr21fgGLT+S9pv9oKb6wY/OO2p0 // SIG // vyhHhGFSbWB/cFgQd5FdunTU4LcA+HLZZxnNUNEHZhL7 // SIG // A/TZKY3XJg/hFe6Cjw5VoxAeoTtLmtQlwZVsPXMiiZg2 // SIG // GXLF8xxUoKesgyK3RM0uwFVRe3Rq // SIG // End signature block
combined_dataset/train/non-malicious/2997.ps1
2997.ps1
Set-StrictMode -Version Latest InModuleScope Pester { Describe 'It - Implementation' { $testState = New-PesterState -Path $TestDrive It 'Throws an error if you fail to pass in a test block' { $scriptBlock = { ItImpl -Pester $testState 'Some Name' } $scriptBlock | Should -Throw 'No test script block is provided. (Have you put the open curly brace on the next line?)' } It 'Throws an error if your name looks like a test block' { $scriptBlock = { ItImpl -Pester $testState { "A test script block" } } $scriptBlock | Should -Throw 'Name parameter has multiple lines and no script block is provided. (Have you provided a name for the test group?)' } It 'Does not throw an error if It is passed a script block, and adds a successful test result.' { $scriptBlock = { ItImpl -Pester $testState 'Enters an It block inside a Describe' { } } $scriptBlock | Should -Not -Throw $testState.TestResult[-1].Passed | Should -Be $true $testState.TestResult[-1].ParameterizedSuiteName | Should -BeNullOrEmpty } It 'Does not throw an error if the -Pending switch is used, and no script block is passed' { $scriptBlock = { ItImpl -Pester $testState 'Some Name' -Pending } $scriptBlock | Should -Not -Throw } It 'Does not throw an error if the -Skip switch is used, and no script block is passed' { $scriptBlock = { ItImpl -Pester $testState 'Some Name' -Skip } $scriptBlock | Should -Not -Throw } It 'Does not throw an error if the -Ignore switch is used, and no script block is passed' { $scriptBlock = { ItImpl -Pester $testState 'Some Name' -Ignore } $scriptBlock | Should -Not -Throw } It 'Creates a pending test for an empty (whitespace and comments only) script block' { $scriptBlock = { } { ItImpl -Pester $testState 'Some Name' $scriptBlock } | Should -Not -Throw $testState.TestResult[-1].Result | Should -Be 'Pending' } It 'Adds a failed test if the script block throws an exception' { $scriptBlock = { ItImpl -Pester $testState 'Enters an It block inside a Describe' { throw 'I am a failed test' } } $scriptBlock | Should -Not -Throw $testState.TestResult[-1].Passed | Should -Be $false $testState.TestResult[-1].ParameterizedSuiteName | Should -BeNullOrEmpty $testState.TestResult[-1].FailureMessage | Should -Be 'I am a failed test' } $script:counterNameThatIsReallyUnlikelyToConflictWithAnything = 0 It 'Calls the output script block for each test' { $outputBlock = { $script:counterNameThatIsReallyUnlikelyToConflictWithAnything++ } ItImpl -Pester $testState 'Does something' -OutputScriptBlock $outputBlock { } ItImpl -Pester $testState 'Does something' -OutputScriptBlock $outputBlock { } ItImpl -Pester $testState 'Does something' -OutputScriptBlock $outputBlock { } $script:counterNameThatIsReallyUnlikelyToConflictWithAnything | Should -Be 3 } Remove-Variable -Scope Script -Name counterNameThatIsReallyUnlikelyToConflictWithAnything Context 'Parameterized Tests' { $cases = @( @{ a = 1; b = 1; expectedResult = 2} @{ a = 1; b = 2; expectedResult = 3} @{ a = 5; b = 4; expectedResult = 9} ) $suiteName = 'Adds <a> and <b> to get <expectedResult>. <Bogus> is not a parameter.' ItImpl -Pester $testState -Name $suiteName -TestCases $cases { param ($a, $b, $expectedResult) ($a + $b) | Should -Be $expectedResult } It 'Creates test result records with the ParameterizedSuiteName property set' { for ($i = -1; $i -ge -3; $i--) { $testState.TestResult[$i].ParameterizedSuiteName | Should -Be $suiteName } } It 'Expands parameters in parameterized test suite names' { for ($i = -1; $i -ge -3; $i--) { $expectedName = "Adds $($cases[$i]['a']) and $($cases[$i]['b']) to get $($cases[$i]['expectedResult']). <Bogus> is not a parameter." $testState.TestResult[$i].Name | Should -Be $expectedName } } } } Describe 'Get-OrderedParameterDictionary' { $_testScriptBlock = { param ( $1, $c, $0, $z, $a, ${Something.Really/Weird } ) } $hashtable = @{ '1' = 'One' '0' = 'Zero' z = 'Z' a = 'A' c = 'C' 'Something.Really/Weird ' = 'Weird' } $dictionary = Get-OrderedParameterDictionary -ScriptBlock $_testScriptBlock -Dictionary $hashtable It 'Reports keys and values in the same order as the param block' { ($dictionary.Keys -join ',') | Should -Be '1,c,0,z,a,Something.Really/Weird ' ($dictionary.Values -join ',') | Should -Be 'One,C,Zero,Z,A,Weird' } } Describe 'Remove-Comments' { It 'Removes single line comments' { Remove-Comments -Text 'code } It 'Removes multi line comments' { Remove-Comments -Text 'code code' | Should -Be 'code code' } } }
combined_dataset/train/non-malicious/sample_63_78.ps1
sample_63_78.ps1
# # Module manifest for module 'OCI.PSModules.Waf' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waf.dll' # Version number of this module. ModuleVersion = '88.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e0acce48-3280-4a26-9a26-931bf7028140' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waf Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waf.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWafNetworkAddressList', 'Get-OCIWafNetworkAddressListsList', 'Get-OCIWafProtectionCapabilitiesList', 'Get-OCIWafProtectionCapabilityGroupTagsList', 'Get-OCIWafWebAppFirewall', 'Get-OCIWafWebAppFirewallPoliciesList', 'Get-OCIWafWebAppFirewallPolicy', 'Get-OCIWafWebAppFirewallsList', 'Get-OCIWafWorkRequest', 'Get-OCIWafWorkRequestErrorsList', 'Get-OCIWafWorkRequestLogsList', 'Get-OCIWafWorkRequestsList', 'Move-OCIWafNetworkAddressListCompartment', 'Move-OCIWafWebAppFirewallCompartment', 'Move-OCIWafWebAppFirewallPolicyCompartment', 'New-OCIWafNetworkAddressList', 'New-OCIWafWebAppFirewall', 'New-OCIWafWebAppFirewallPolicy', 'Remove-OCIWafNetworkAddressList', 'Remove-OCIWafWebAppFirewall', 'Remove-OCIWafWebAppFirewallPolicy', 'Update-OCIWafNetworkAddressList', 'Update-OCIWafWebAppFirewall', 'Update-OCIWafWebAppFirewallPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waf' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_48_51.ps1
sample_48_51.ps1
=캐시를 실제로 업데이트하지 못하도록 캐시 유지 관리 작업을 사용하지 않도록 설정합니다. 대신 즉시 반환됩니다.빠른 검사 중에 제외된 파일 및 디렉터리를 검사합니다.ScanRtpExclusions스캔 스레드 수에 대한 상한값을 제거합니다.¤이 옵션을 사용하도록 설정하면 핵심 서비스에서 ECS(실험 및 구성 서비스) 사용을 중지하여 Microsoft Defender 바이러스 백신 및 기타 Defender 소프트웨어에 대한 중요한 조직별 수정 사항을 신속하게 제공합니다. 수정 사항은 보안 인텔리전스 업데이트를 통해 계속 제공됩니다.¿사용하도록 설정하면 핵심 서비스가 OneDsCollector 프레임워크 사용을 중지하여 Microsoft Defender 바이러스 백신 및 기타 Defender 소프트웨어에서 원격 분석을 수집합니다. 이 설정을 사용하도록 설정하면 성능 저하 및 가양성 등의 문제를 빠르게 인식하고 해결하는 Microsoft의 기능에 영향을 미칠 수 있습니다.네트워크 보호에 UDP 구분 오프로드 사용네트워크 보호에 UDP 수신 오프로드 사용ð보안 인텔리전스 업데이트를 다운로드할 원본의 순서를 정의합니다. 이 설정을 사용하면 다른 보안 인텔리전스 업데이트 원본에 연결할 순서를 정의할 수 있습니다. 이 설정의 값은 보안 인텔리전스 업데이트 원본을 순서대로 열거하는, 파이프로 구분된 문자열로 입력해야 합니다. 가능한 값은 'InternalDefinitionUpdateServer' 'MicrosoftUpdateServer' 'MMPC' 'FileShares'입니다.@보안 인텔리전스 업데이트가 수행되는 요일을 나타냅니다. 0으로 설정하면 보안 인텔리전스 업데이트가 매일 수행됩니다.f보완 서명이 보증될 때까지 남은 기간(일수)을 정의합니다. SignatureUpdateLastChecked와 함께 작동합니다. 0 = 보완 없음, 1 = 1일, 2 = 2일 등입니다.개인 정보 보호 모드를 사용하지 않도록 설정합니다.침입 방지 시스템을 사용하지 않도록 설정합니다.F이 cmdlet을 통해 사용자 확인이 기본적으로 요청됩니다. -Force를 지정하면 사용자에게 기본 확인이 요청되지 않습니다.1보고 동적 서명 삭제 이벤트를 지정하십시오. 기본적으로 해당 이벤트를 보고하지 않습니다. 공격 노출 영역 축소 규칙에 대한 제외 사항을 지정합니다.
combined_dataset/train/non-malicious/sample_64_7.ps1
sample_64_7.ps1
Get-Module | ForEach-Object { Remove-Module -Name $_.Name -Force } $PSModuleAutoloadingPreference = 'none' Import-Module Microsoft.PowerShell.Utility #Enforcing default PSModulePath to avoid getting unexpected modules to run instead of built-in modules $env:PSModulePath = "C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules" $resultOutputDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult" function CheckAuthenticodeSignature($pathToCheck) { if (test-path $resultOutputDir -ErrorAction SilentlyContinue) { $issuerInfo = "$resultOutputDir\issuerInfo.txt" } else { $issuerInfo = "$PSScriptRoot\issuerInfo.txt" } if ($pathToCheck) { if (Test-Path -path $pathToCheck -ErrorAction SilentlyContinue) { $AuthenticodeSig = (Get-AuthenticodeSignature -FilePath $pathToCheck) $cert = $AuthenticodeSig.SignerCertificate $FileInfo = (get-command $pathToCheck).FileVersionInfo $issuer = $cert.Issuer #OS is older than 2016 and some built-in processes will not be signed if (($OSBuild -lt 14393) -and (!$AuthenticodeSig.SignerCertificate)) { if (($FileInfo.CompanyName -eq "Microsoft Corporation")) { return } else { Write-Error "Script execution terminated because a process or script that does not have any signature was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } } #check if valid if ($AuthenticodeSig.Status -ne "Valid") { Write-Error "Script execution terminated because a process or script that does not have a valid Signature was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } #check issuer if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) { Write-Error "Script execution terminated because a process or script that is not Microsoft signed was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } if ($AuthenticodeSig.IsOSBinary -ne "True") { #If revocation is offline then test below will fail if (!$LegacyOS) { $IsOnline = (Get-NetConnectionProfile).IPv4Connectivity -like "*Internet*" } $EKUArray = @('1.3.6.1.5.5.7.3.3', '1.3.6.1.4.1.311.76.47.1') if ($IsOnline) { $IsWindowsSystemComponent = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.10.3.6" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable OsCertWarnVar -ErrorVariable OsCertErrVar) $IsMicrosoftPublisher = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.76.8.1" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable MsPublisherWarnVar -ErrorVariable MsPublisherErrVar) $TrustedEKU = (Test-Certificate -Cert $cert -EKU $EKUArray -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable EKUWarnVar -ErrorVariable EKUErrVar) if (($IsWindowsSystemComponent -eq $False) -and ($IsMicrosoftPublisher -eq $False) -and ($TrustedEKU -eq $False)) { #Defender AV and some OS processes will have an old signature if older version is installed #Ignore if cert is OK and only signature is old if (($OsCertWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($MsPublisherWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($OsCertWarnVar -like "*CERT_TRUST_IS_OFFLINE_REVOCATION*") -or ($MsPublisherWarnVar -like "CERT_TRUST_IS_OFFLINE_REVOCATION")) { return } Write-Error "Script execution terminated because the process or script certificate failed trust check" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } } } } else { Write-Error ("Path " + $pathToCheck + " was not found") | Out-File $issuerInfo -append } } } function Download-WebFile($ClientAnalyzer) { Write-host -ForegroundColor Green "Downloading MDEClientAnalyzer from: " $ClientAnalyzer Import-Module BitsTransfer $BitsJob = Start-BitsTransfer -source $ClientAnalyzer -Destination "$DlZipFile" -Description "Downloading additional files" -RetryTimeout 60 -RetryInterval 60 -ErrorAction SilentlyContinue } [int]$OSBuild = [system.environment]::OSVersion.Version.Build if ($OSBuild -le "7601") { $LegacyOS = "True" } $DownloadDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads" $DlZipFile = Join-Path $DownloadDir "MDEClientAnalyzerPreview.zip" $MDECADir = Join-Path $DownloadDir "MDECA" CheckAuthenticodeSignature $MyInvocation.MyCommand.Path if (!(test-path -path "$DlZipFile")) { Download-WebFile "https://aka.ms/betamdeanalyzer" } if (test-path -path "$DlZipFile") { if (Test-Path -LiteralPath $MDECADir -PathType Container) { Remove-Item -LiteralPath $MDECADir -Recurse -Force -ErrorAction SilentlyContinue } [System.Reflection.Assembly]::LoadWithPartialName("system.IO.Compression.FileSystem") | Out-Null [System.IO.Compression.ZipFile]::ExtractToDirectory($DlZipFile, $MDECADir) | Out-Null CheckAuthenticodeSignature "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1" &powershell -ExecutionPolicy Bypass "& 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1' -outputDir 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA' -r -t -m 5" } # SIG # Begin signature block # MIIn3wYJKoZIhvcNAQcCoIIn0DCCJ8wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCVfxMgmVOmimsX # xh1cSq6Th2n/2DEbnWVIC2U6pCeAIqCCDZcwggYVMIID/aADAgECAhMzAAADz7d0 # vUQxddCTAAAAAAPPMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwMjIyMTkwNzUzWhcNMjUwMjE5MTkwNzUzWjCBlDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWlj # cm9zb2Z0IFdpbmRvd3MgRGVmZW5kZXIgQWR2YW5jZWQgVGhyZWF0IFByb3RlY3Rp # b24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDwAPmxMmR9a92NX/Lv # 2PmaySDZqZUANxu28n+GqAuhMRrC8/v5HrKeebKt+6wqnp28fO1jvJ5OlBIrirN7 # KUiSUH86mvByCFnIwIkKcusZbgEF+v15S0jRExa5C9lC+kDVYtlSCnPEdx/tkKLN # QQMmSroC3baj7y0WIvBfZ1l4x2qyDhFC/5plmMfD8TSfl3sN4twBiXAcpJ/SES50 # QbLahl/MTsVA2UEo7ygPJIrmci8wvD0Kt1pfkwbB3eiK4Vatr0VoJujRucjGT322 # m/9vH6p4Y5suUJMo9196/ze8hA8bqH+5NdU+DeRLrV/UzVat1Xs/Wm6kPK8GgTPL # H+M9AgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBggrBgEFBQcDAwYKKwYBBAGCN0wv # ATAdBgNVHQ4EFgQU10vjUl0bvgJvpCFtGT8ECb23+CAwRQYDVR0RBD4wPKQ6MDgx # HjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMNNDUxODk0 # KzUwMjA2OTAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8E # TTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9N # aWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBR # BggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAw # DQYJKoZIhvcNAQELBQADggIBAHcmfqgz/boPmZhEOAtYI5wj3mRicbSQwDQcGZfK # 8I1WdILE80dhNGqgtVvxO5v5/PyjBJY5HV9HxxCzdVVj60PYAwzoyfTIZF+0hPrh # l6JkjfckCiy9qsONVkL6SDJH6a+Xf4penA2ge9WM3XLR5BUQH538wx4w+VswV1QX # hKsAMGAvxBG8EzIFTMRXMoKy/RYZ1FSig96mdJRb9Zh4o37XcyAgSxlbiv50vu3X # MGNXRZJY0/PdB6Du55mI0WfJDaKBJuDShBMLOjDRX8UEWjy3rqGTjVVLYhK4mWq6 # I/1bIZlgkKBFnUMFbVvtSWDP13FgyGIVDk5YB5s2XmSC6hTfXAHakSpLfFeZ1VK5 # /pRMdhxEenleDdsgksd9idt+U7YxgjZ6gfdGuWgj9ZNi8Ef4ILoA5fkUGIIP14a7 # j2SUsaYvJKw/5aiVHRza+Q9gbDpNcsR5WbhhcSAnkFmi7ZkmJKHVlkUqAUDbP8WB # yz/bq6m/HCHELfFfsG4HMvOfLSTVhKfXPptRzN4N5m2AZX423KM2zhqzPjCWNWce # /jqhUKtbyMuPPqqo+eaoYi+ZzaEqirxAmPF6Nz3VIncZppzm451L2Uu05NwN1T5m # ZbiGW2WW1Iz50ofUKACCqThHMtSh4fOdq0OiKaqQz3S5BGdoXdPPOKgXxOtfaMpr # C3SrMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj # cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4 # MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBD # QSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3Y # bqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUB # FDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnbo # MlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT # +OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuy # e4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEh # NSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2 # z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3 # s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78Ic # V9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E # 11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5P # M4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcV # AQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBL # hklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggr # BgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsG # AQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwA # ZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0G # CSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDB # ZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc # 8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYq # wooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu # 5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWI # UUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXh # j38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yH # PgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtI # EJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4Guzq # N5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgR # MiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQ # zTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEC # EzMAAAPPt3S9RDF10JMAAAAAA88wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcN # AQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUw # LwYJKoZIhvcNAQkEMSIEIIvAt3VhPIBw0rXOrYciuW7orc1/JkHEvW+ESHDTg9xN # MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAD564eHFM24Vt # +69w8hxpeLAiFmh+BtUPT2U1hsPXwlqojKnoCgH3xWICSzmj3969q1QTZIgRDwar # 460mHtFONOq/xRq9SypxKB1/sC892JAJ+/eyOkC+RDTZDwqpB8B1i9ttBefVq0SX # J8Q6dBKAqTJTy5he2UlSaBC1TfM1beSPPZSLqgSMm4UmRKcmyFbTjKmG3G9d+taA # ciMJvJKBKO0u7kq2AhKRfk/Vco3pJqi0Lhl8XtofrkQHRT1zhow1bdL4Qh8lWJJW # uUQoQjYxJTQlAiKC7z37/dCVKVwl38O8jRCWShJhYorYUuQy9I3bETUGOGm464SR # oRSzjpnQRaGCFygwghckBgorBgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCC # FwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgE # ggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCD39THKzWw7 # iIM2CEo+QjmpaboASfI8G8jzD/of5jQjwAIGZpfHEu2CGBMyMDI0MDcxOTEwMDQ1 # Ny4yMzlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z # IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMz # MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRdzCCBycw # ggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUw # MTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVk # MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGN # OJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzX # MN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOt # jZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/ # 7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5c # lQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSj # e5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj/ # /dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeC # ie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0 # Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+ac # bENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPdd # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4H # gBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4 # XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9 # OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/ps # fW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmt # ts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE # 7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0 # BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBru # DGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1 # jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbY # q6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2 # JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtMw # ggI8AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM # aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO # AwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOpEP4gwIhgPMjAyNDA3 # MTkwOTI3MzZaGA8yMDI0MDcyMDA5MjczNlowczA5BgorBgEEAYRZCgQBMSswKTAK # AgUA6kQ/iAIBADAGAgEAAgE/MAcCAQACAhE3MAoCBQDqRZEIAgEAMDYGCisGAQQB # hFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAw # DQYJKoZIhvcNAQEFBQADgYEAIxtGe5OrO/q/3NH+lWa4c84bEBY52MkcZ8+RUSGD # LaTSnD2IzWS23oOsgpCUNDkYIWB3IEKUT3esQnyzSY3wuqPej1HmieRswLVA5i09 # EGssJa+XW1a/oOEW3j3Vu8I/cIg4YPchU5Fsq/OQtGs3SPrRgT+2jdxxI8zHwbjb # jMQxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAIT # MwAAAeWPasDzPbQLowABAAAB5TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcN # AQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBzE6H/9HYLbLMZPJXy # UPG9CSezqJj83VeMvJVWErDAoTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0E # IBWp0//+qPEYWF7ZhugRd5vwj+kCh/TULCFvFQf1Tr3tMIGYMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwIgQg # 92nzWvnVCGJeFtX3BVnCo505HP/8G1XQzDdlgXMo88AwDQYJKoZIhvcNAQELBQAE # ggIAVhVCVTo0uA4Ju35u8mVOAhbTTKgAK+AjjQRWDa0HA7ZzLe4qSQZCNLBU56eD # U36du6apF1KoMMUZMyEze00qM9NHZ+xhTwkRG6BsPF0DjpLGqFf3DDQV+GG7WF8D # ng/nFXi9Ktr2a9JGVEelR4NTOU2w+aHedNY8vuNx/2uhhfYGs5ZoHc/W0OnIQ3K2 # PJw8VFR9t6iuEquOtLl4aoHdXjKSGkAz6rKYtdYoyI4TLMEOTU3wTJxH1xWEmRIF # svHdkj+7HYvpMZvTsh+HBqsb7KckalFjKZxQJ8kkJuoLz43w27FWR7++BmMFy+DE # 9noov90hQMGXiKFkzvIKnIluh2wPjCT24ZjTw/5CFIZs3I56Vo6mv8MXfAhHdiGB # cpWnEdWunsvXU8vASEIuwYCS8sRjR0o8a4cqCJlPxotY1R+N5HI5bBKO92KNH3pU # XcO3SdclT9DosLzddVrDsnmW1XHkBZJjsc8SU771ekESq1cF9KermS/Y0ab5If86 # RYR6eJCkTwtKhflrn478CAZaGTaJz3r7Fi66gtU2bQwfBoNTJAztftS5+wmuVC/5 # ajB+cCXTDvr2AUBDrXe4+DBlhLGSIVp2+83R6RTcW88V0VkCnFrosl60pfLNPsY9 # A6agMaIuNypNtu0U1zFL1uZGFvIfTkzIFI7k+SnxZ6cuEwk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_4_34.ps1
sample_4_34.ps1
<# .SYNOPSIS MSRD-Collect 'data collection' specific functions .DESCRIPTION Module for the MSRD-Collect local 'data collection' functions .NOTES Author : Robert Klemencz Requires : At least PowerShell 5.1 (This module is not for stand-alone use. It is used automatically from within the main MSRD-Collect.ps1 script) Version : See MSRD-Collect.ps1 version Feedback : Send an e-mail to MSRDCollectTalk@microsoft.com #> Function msrdGetRegKeys { [CmdletBinding()] Param( [ValidateNotNullOrEmpty()][string]$LogPrefix, [ValidateNotNullOrEmpty()]$RegHashtable ) $RegHashtable.GetEnumerator() | ForEach-Object -Process { $RegPath = $_.Key $RegFile = $_.Value $RegExport = $RegPath.Replace(":", "") if (Test-Path $RegPath) { $RegRoot = (Split-Path -Path $RegPath -Qualifier).Replace(":", "") $RegOut = "$msrdRegLogFolder$global:msrdLogFilePrefix$RegRoot-$RegFile.txt" $Commands =@( "reg export '$RegExport' '$RegOut' /y 2>&1 | Out-Null" ) msrdRunCommands -LogPrefix $LogPrefix -CmdletArray $Commands -ThrowException:$False -ShowMessage:$True -ShowError:$True } else { msrdLogMessage $LogLevel.WarnLogFileOnly "[$LogPrefix] Reg key '$RegExport' not found." } } } Function msrdGetEventLogs { Param( [ValidateNotNullOrEmpty()]$LogPrefix, [ValidateNotNullOrEmpty()]$EventHashtable ) $EventHashtable.GetEnumerator() | ForEach-Object -Process { $EventSource = $_.Key $EventFile = $_.Value if (Get-WinEvent -ListLog $EventSource -ErrorAction Ignore) { $EventOut = Join-Path $global:msrdEventLogFolder "$global:msrdLogFilePrefix$EventFile.evtx" $Commands =@( "wevtutil epl '$EventSource' '$EventOut' 2>&1 | Out-Null" "wevtutil al '$EventOut' /l:en-us 2>&1 | Out-Null" ) msrdRunCommands -LogPrefix $LogPrefix -CmdletArray $Commands -ThrowException:$False -ShowMessage:$True -ShowError:$True } else { msrdLogMessage $LogLevel.WarnLogFileOnly "[$LogPrefix] Event log '$EventSource' not found." } } } Function msrdGetLogFiles { Param( [ValidateNotNullOrEmpty()][string]$LogPrefix, [ValidateNotNullOrEmpty()][string]$LogFilePath, [ValidateNotNullOrEmpty()][string]$LogFileID, [ValidateNotNullOrEmpty()][ValidateSet("Files","Packages")][string]$Type, [ValidateNotNullOrEmpty()][string]$OutputFolder ) msrdLogMessage $LogLevel.Normal -LogPrefix $LogPrefix -Message "Copy-Item '$LogFilePath'" if (-not (Test-Path -Path $LogFilePath)) { msrdLogMessage $LogLevel.WarnLogFileOnly -LogPrefix $LogPrefix -Message "'$LogFilePath' not found." return } else { switch ($Type) { "Files" { $LogFile = Join-Path $OutputFolder "$env:computername`_$LogFileID" Try { Copy-Item -Path $LogFilePath -Destination $LogFile -ErrorAction Continue -Force 2>&1 | Out-Null } Catch { $failedCommand = $_.InvocationInfo.Line.TrimStart() $errorMessage = $_.Exception.Message.TrimStart() msrdLogException ("$(msrdGetLocalizedText "errormsg") $failedCommand") -ErrObj $_ -fErrorLogFileOnly if ($global:msrdGUI) { msrdAdd-OutputBoxLine ("Error in $failedCommand $errorMessage") "Magenta" } else { msrdLogMessage $LogLevel.Warning ("Error in $failedCommand $errorMessage") } } } "Packages" { # to be redesigned (msrdGetCoreRDSAVDInfo) } } } } function msrdGetRDRoleInfo { param ($Class, $Namespace, $ComputerName = "localhost") Get-CimInstance -Class $Class -Namespace $Namespace -ComputerName $ComputerName -ErrorAction Continue 2>>$global:msrdErrorLogFile } function msrdCloseMSRDC { $msrdc = Get-Process msrdc -ErrorAction SilentlyContinue # Get the MSRDC process if it is running if ($msrdc) { $rdcnotice = @" The AVD Windows Desktop client (MSRDC) is currently running on this machine. To collect the most recent Windows Desktop client specific ETL traces, MSRDC.exe must be closed first. Do you want to close MSRDC.exe now? This will disconnect all currently active AVD connections on this machine, which were initiated through this client! "@ $msrdcMsgClosed = "MSRDC.exe has been closed. Waiting 20 seconds for the latest trace file(s) to get saved before continuing.`n" $msrdcMsgNotClosed = "MSRDC.exe has not been closed. The most recent ETL traces will NOT be available for troubleshooting! Continuing data collection.`n" if (-not $global:msrdTSSinUse) { $msrdcResult = [System.Windows.Forms.MessageBox]::Show($rdcnotice, "Are you sure you want to continue?", [System.Windows.Forms.MessageBoxButtons]::YesNo, [System.Windows.Forms.MessageBoxIcon]::Warning) if ($msrdcResult -eq [System.Windows.Forms.DialogResult]::Yes) { msrdLogMessage $LogLevel.Info "Closing MSRDC.exe ..." # Try to close the MSRDC window gracefully $msrdc.CloseMainWindow() | Out-Null Start-Sleep -Seconds 5 # If the process is still running, kill it forcefully if (!$msrdc.HasExited) { $msrdc | Stop-Process -Force } msrdLogMessage $LogLevel.Info $msrdcMsgClosed Start-Sleep -Seconds 20 } else { msrdLogMessage $LogLevel.Info $msrdcMsgNotClosed } } else { $UserConsent = Read-Host -Prompt ($rdcnotice + '`nAre you sure you want to continue? [Y/N]') if ($UserConsent.ToLower() -ne "y") { Write-Output "Closing MSRDC.exe ..." # Try to close the MSRDC window gracefully $msrdc.CloseMainWindow() | Out-Null Start-Sleep -Seconds 5 # If the process is still running, kill it forcefully if (!$msrdc.HasExited) { $msrdc | Stop-Process -Force } Write-Output $msrdcMsgClosed Start-Sleep -Seconds 20 } else { Write-Warning $msrdcMsgNotClosed } } } } Export-ModuleMember -Function *
combined_dataset/train/non-malicious/sample_48_65.ps1
sample_48_65.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Creates or updates a data connection. .Description Creates or updates a data connection. .Example $dataConnectionProperties = New-Object -Type Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.EventHubDataConnection -Property @{Location="East US"; Kind="EventHub"; EventHubResourceId="/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub"; DataFormat="JSON"; ConsumerGroup='Default'; Compression= "None"; TableName = "Events"; MappingRuleName = "EventsMapping"} New-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "mykustodataconnection" -Parameter $dataConnectionProperties Kind Location Name Type ---- -------- ---- ---- EventHub East US testnewkustocluster/mykustodatabase/mykustodataconnection Microsoft.Kusto/Clusters/Databases/DataConnections .Link https://learn.microsoft.com/powershell/module/az.kusto/new-azkustodataconnection #> function New-AzKustoDataConnection { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection])] [CmdletBinding(DefaultParameterSetName = 'CreateExpandedEventHub', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the Kusto cluster. ${ClusterName}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the database in the Kusto cluster. ${DatabaseName}, [Parameter(Mandatory)] [Alias('DataConnectionName')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the data connection. ${Name}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the resource group containing the Kusto cluster. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] [System.String] # Gets subscription credentials which uniquely identify Microsoft Azure subscription. # The subscription ID forms part of the URI for every service call. ${SubscriptionId}, [Parameter(Mandatory)] [ArgumentCompleter( { param ( $CommandName, $ParameterName, $WordToComplete, $CommandAst, $FakeBoundParameters ) return @('EventHub', 'EventGrid', 'IotHub', 'CosmosDb') })] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.Kind] # Kind of the endpoint for the data connection ${Kind}, [Parameter(ParameterSetName = 'CreateExpandedEventHub', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedEventGrid', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The resource ID of the event hub to be used to create a data connection / event grid is configured to send events. ${EventHubResourceId}, [Parameter(ParameterSetName = 'CreateExpandedEventHub', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedEventGrid', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedIotHub', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The event/iot hub consumer group. ${ConsumerGroup}, [Parameter(ParameterSetName = 'CreateExpandedEventGrid')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.BlobStorageEventType] # The name of blob storage event type to process. ${BlobStorageEventType}, [Parameter(ParameterSetName = 'CreateExpandedEventGrid')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.Management.Automation.SwitchParameter] # If set to true, indicates that ingestion should ignore the first record of every file. ${IgnoreFirstRecord}, [Parameter(ParameterSetName = 'CreateExpandedEventHub')] [Parameter(ParameterSetName = 'CreateExpandedEventGrid')] [Parameter(ParameterSetName = 'CreateExpandedIotHub')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] [ValidateSet( "MULTIJSON", "JSON", "CSV", "TSV", "SCSV", "SOHSV", "PSV", "TXT", "RAW", "SINGLEJSON", "AVRO", "TSVE", "PARQUET", "ORC", "APACHEAVRO", "W3CLOGFILE")] # The data format of the message. Optionally the data format can be added to each message. ${DataFormat}, [Parameter(ParameterSetName = 'CreateExpandedEventHub')] [Parameter(ParameterSetName = 'CreateExpandedIotHub')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String[]] # System properties of the event/iot hub. ${EventSystemProperty}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The mapping rule to be used to ingest the data. Optionally the mapping information can be added to each message. ${MappingRuleName}, [Parameter(ParameterSetName = 'CreateExpandedEventHub')] [Parameter(ParameterSetName = 'CreateExpandedEventGrid')] [Parameter(ParameterSetName = 'CreateExpandedIotHub')] [Parameter(ParameterSetName = 'CreateExpandedCosmosDb', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The table where the data should be ingested. Optionally the table information can be added to each message. ${TableName}, [Parameter(ParameterSetName = 'CreateExpandedEventHub')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.Compression] # The event hub messages compression type. ${Compression}, [Parameter(ParameterSetName = 'CreateExpandedEventGrid', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The resource ID of the storage account where the data resides. ${StorageAccountResourceId}, [Parameter(ParameterSetName = 'CreateExpandedIotHub', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The resource ID of the Iot hub to be used to create a data connection. ${IotHubResourceId}, [Parameter(ParameterSetName = 'CreateExpandedIotHub', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The name of the share access policy. ${SharedAccessPolicyName}, [Parameter(ParameterSetName = 'CreateExpandedEventHub')] [Parameter(ParameterSetName = 'CreateExpandedEventGrid')] [Parameter(ParameterSetName = 'CreateExpandedCosmosDb', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The resource ID of a managed identity (system or user assigned) to be used to authenticate with external resources. ${ManagedIdentityResourceId}, [Parameter(ParameterSetName = 'CreateExpandedEventHub')] [Parameter(ParameterSetName = 'CreateExpandedEventGrid')] [Parameter(ParameterSetName = 'CreateExpandedIotHub')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.DatabaseRouting] # Indication for database routing information from the data connection, by default only database routing information is allowed. ${DatabaseRouting}, [Parameter(ParameterSetName = 'CreateExpandedEventHub')] [Parameter(ParameterSetName = 'CreateExpandedIotHub')] [Parameter(ParameterSetName = 'CreateExpandedCosmosDb')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.DateTime] # When defined, the data connection retrieves existing Event hub events created since the Retrieval start date. It can only retrieve events retained by the Event hub, based on its retention period. ${RetrievalStartDate}, [Parameter(ParameterSetName = 'CreateExpandedEventGrid')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The resource ID of the event grid that is subscribed to the storage account events. ${EventGridResourceId}, [Parameter(ParameterSetName = 'CreateExpandedCosmosDb', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The resource ID of the Cosmos DB account used to create the data connection. ${CosmosDbAccountResourceId}, [Parameter(ParameterSetName = 'CreateExpandedCosmosDb', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The name of an existing database in the Cosmos DB account. ${CosmosDbDatabase}, [Parameter(ParameterSetName = 'CreateExpandedCosmosDb', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The name of an existing container in the Cosmos DB database. ${CosmosDbContainer}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # Resource location. ${Location}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { if ($PSBoundParameters['Kind'] -eq 'EventHub') { $Parameter = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.EventHubDataConnection]::new() $Parameter.EventHubResourceId = $PSBoundParameters['EventHubResourceId'] $null = $PSBoundParameters.Remove('EventHubResourceId') if ($PSBoundParameters.ContainsKey('DataFormat')) { $Parameter.DataFormat = $PSBoundParameters['DataFormat'] $null = $PSBoundParameters.Remove('DataFormat') } if ($PSBoundParameters.ContainsKey('ConsumerGroup')) { $Parameter.ConsumerGroup = $PSBoundParameters['ConsumerGroup'] $null = $PSBoundParameters.Remove('ConsumerGroup') } if ($PSBoundParameters.ContainsKey('EventSystemProperty')) { $Parameter.EventSystemProperty = $PSBoundParameters['EventSystemProperty'] $null = $PSBoundParameters.Remove('EventSystemProperty') } if ($PSBoundParameters.ContainsKey('Compression')) { $Parameter.Compression = $PSBoundParameters['Compression'] $null = $PSBoundParameters.Remove('Compression') } if ($PSBoundParameters.ContainsKey('ManagedIdentityResourceId')) { $Parameter.ManagedIdentityResourceId = $PSBoundParameters['ManagedIdentityResourceId'] $null = $PSBoundParameters.Remove('ManagedIdentityResourceId') } if ($PSBoundParameters.ContainsKey('DatabaseRouting')) { $Parameter.DatabaseRouting = $PSBoundParameters['DatabaseRouting'] $null = $PSBoundParameters.Remove('DatabaseRouting') } if ($PSBoundParameters.ContainsKey('RetrievalStartDate')) { $Parameter.RetrievalStartDate = $PSBoundParameters['RetrievalStartDate'] $null = $PSBoundParameters.Remove('RetrievalStartDate') } } elseif ($PSBoundParameters['Kind'] -eq 'EventGrid') { $Parameter = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.EventGridDataConnection]::new() $Parameter.EventHubResourceId = $PSBoundParameters['EventHubResourceId'] $null = $PSBoundParameters.Remove('EventHubResourceId') $Parameter.StorageAccountResourceId = $PSBoundParameters['StorageAccountResourceId'] $null = $PSBoundParameters.Remove('StorageAccountResourceId') if ($PSBoundParameters.ContainsKey('DataFormat')) { $Parameter.DataFormat = $PSBoundParameters['DataFormat'] $null = $PSBoundParameters.Remove('DataFormat') } if ($PSBoundParameters.ContainsKey('ConsumerGroup')) { $Parameter.ConsumerGroup = $PSBoundParameters['ConsumerGroup'] $null = $PSBoundParameters.Remove('ConsumerGroup') } if ($PSBoundParameters.ContainsKey('BlobStorageEventType')) { $Parameter.BlobStorageEventType = $PSBoundParameters['BlobStorageEventType'] $null = $PSBoundParameters.Remove('BlobStorageEventType') } if ($PSBoundParameters.ContainsKey('IgnoreFirstRecord')) { $Parameter.IgnoreFirstRecord = $PSBoundParameters['IgnoreFirstRecord'] $null = $PSBoundParameters.Remove('IgnoreFirstRecord') } if ($PSBoundParameters.ContainsKey('EventGridResourceId')) { $Parameter.EventGridResourceId = $PSBoundParameters['EventGridResourceId'] $null = $PSBoundParameters.Remove('EventGridResourceId') } if ($PSBoundParameters.ContainsKey('ManagedIdentityResourceId')) { $Parameter.ManagedIdentityResourceId = $PSBoundParameters['ManagedIdentityResourceId'] $null = $PSBoundParameters.Remove('ManagedIdentityResourceId') } if ($PSBoundParameters.ContainsKey('DatabaseRouting')) { $Parameter.DatabaseRouting = $PSBoundParameters['DatabaseRouting'] $null = $PSBoundParameters.Remove('DatabaseRouting') } } elseif ($PSBoundParameters['Kind'] -eq 'IotHub') { $Parameter = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IotHubDataConnection]::new() $Parameter.IotHubResourceId = $PSBoundParameters['IotHubResourceId'] $null = $PSBoundParameters.Remove('IotHubResourceId') $Parameter.SharedAccessPolicyName = $PSBoundParameters['SharedAccessPolicyName'] $null = $PSBoundParameters.Remove('SharedAccessPolicyName') if ($PSBoundParameters.ContainsKey('DataFormat')) { $Parameter.DataFormat = $PSBoundParameters['DataFormat'] $null = $PSBoundParameters.Remove('DataFormat') } if ($PSBoundParameters.ContainsKey('ConsumerGroup')) { $Parameter.ConsumerGroup = $PSBoundParameters['ConsumerGroup'] $null = $PSBoundParameters.Remove('ConsumerGroup') } if ($PSBoundParameters.ContainsKey('EventSystemProperty')) { $Parameter.EventSystemProperty = $PSBoundParameters['EventSystemProperty'] $null = $PSBoundParameters.Remove('EventSystemProperty') } if ($PSBoundParameters.ContainsKey('DatabaseRouting')) { $Parameter.DatabaseRouting = $PSBoundParameters['DatabaseRouting'] $null = $PSBoundParameters.Remove('DatabaseRouting') } if ($PSBoundParameters.ContainsKey('RetrievalStartDate')) { $Parameter.RetrievalStartDate = $PSBoundParameters['RetrievalStartDate'] $null = $PSBoundParameters.Remove('RetrievalStartDate') } } elseif ($PSBoundParameters['Kind'] -eq 'CosmosDb') { $Parameter = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.CosmosDbDataConnection]::new() $Parameter.TableName = $PSBoundParameters['TableName'] $null = $PSBoundParameters.Remove('TableName') $Parameter.ManagedIdentityResourceId = $PSBoundParameters['ManagedIdentityResourceId'] $null = $PSBoundParameters.Remove('ManagedIdentityResourceId') $Parameter.CosmosDbAccountResourceId = $PSBoundParameters['CosmosDbAccountResourceId'] $null = $PSBoundParameters.Remove('CosmosDbAccountResourceId') $Parameter.CosmosDbDatabase = $PSBoundParameters['CosmosDbDatabase'] $null = $PSBoundParameters.Remove('CosmosDbDatabase') $Parameter.CosmosDbContainer = $PSBoundParameters['CosmosDbContainer'] $null = $PSBoundParameters.Remove('CosmosDbContainer') if ($PSBoundParameters.ContainsKey('RetrievalStartDate')) { $Parameter.RetrievalStartDate = $PSBoundParameters['RetrievalStartDate'] $null = $PSBoundParameters.Remove('RetrievalStartDate') } } $Parameter.Kind = $PSBoundParameters['Kind'] $null = $PSBoundParameters.Remove('Kind') $Parameter.Location = $PSBoundParameters['Location'] $null = $PSBoundParameters.Remove('Location') if ($PSBoundParameters.ContainsKey('MappingRuleName')) { $Parameter.MappingRuleName = $PSBoundParameters['MappingRuleName'] $null = $PSBoundParameters.Remove('MappingRuleName') } if ($PSBoundParameters.ContainsKey('TableName')) { $Parameter.TableName = $PSBoundParameters['TableName'] $null = $PSBoundParameters.Remove('TableName') } $null = $PSBoundParameters.Add('Parameter', $Parameter) Az.Kusto.internal\New-AzKustoDataConnection @PSBoundParameters } catch { throw } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCtYPFr4YPA3ria # x6ZqWgfx/iO6yKkYI+Ioktyi6wNJxaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDG64Lcj0r/GAUSlVyQ3gP74 # /mdi8tK7fp/yQlNj64REMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAoVY3gOMoALwDo+ANjmhXL9W6kvRkyeeAf8AMWWKTiRDyjc6UBB8frZEf # AoAlh4C6g7nKXpszC1WG9oKlYnhQdnQyUgX7sBftfHC3PVBDUik2R740TYusHBjN # uermmaA3Irf+kjfbzt9xjtOp0r8jhoX5t9V4T+4Jb3SrgfsfQN0WfxORk8s5aef5 # KkrRI3L86jooDHhWZEcKYvkrDE+kQTS7ozjwVydLbtDgq1sv0iqX8DZJf05BOefh # bQp5Yy/K7kTol1iH6ZNQGC39drTSSCCMSRik23+xiYtUd4k6rF40EKYWQdUnKG8W # bC6HS2jlSNi5YanHl+Afin/4cU8VZqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDA581lV7chlFriSSecmulkU7semctaF6/Av6VWuaQBLQIGZh/eWJ5z # GBMyMDI0MDQyMzEzMTYwOS4xNzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRnJUwIhgPMjAyNDA0MjMxMDMzNTdaGA8yMDI0MDQyNDEwMzM1N1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dGclQIBADAHAgEAAgIXWjAHAgEAAgISjTAKAgUA # 6dLuFQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPeMyGf3Ydy+jqQvs63 # XCZaWY7a56BswHctd6Tk8AklWwZQVK9M+hXCpDyBP05hd5gdWVf56HOP8SwAs89F # 83kET0f+Ametk+Om8umz2PI4okluGuXg7eRsJ0iiNMPg7WgQ8Qi7VMXppToEvdFw # yYwBmtcBpN/Gkc78aAYomHiTMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgu3luA9i+4Rn6qUUYBAa5yYRca0jnhwM/BOG/dvHUpqkwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEII54AP2h7Vh7o+D/3jGv808eKZ8LrGHgQ+q5KtqbazFB # MA0GCSqGSIb3DQEBCwUABIICACvOAN3g06fCZew4p1Ie0gRf5MO3Cm90xW3nZuG5 # dgx2onTZYt5TF9Ahl0YNCOG+sMNFsHFcZ/xmXMhSfyBQy6QUkyNnr2yxg1EwZjQ6 # es2cjmgITFLG4KDVtD8gNcgUwEZx7yZaof3AHIHrVOv1kaGYS4fgYiVMhy/J0/8t # VIBlyw+CHZj82+X0Mqq2D9kjLRWNpGtvVJW9+0FYyXo0jJciy5TiPudTTKbHsVZx # Sp840e1z0K/q7lBhXNN2LlUJgCLIs/iP5oRHKwUCZB1L/k/A61tIwQY6ip9N6v1J # Ee3X1suFOSCYbm99uRcSIwj6ZuGAqPGyyNlhdm69dYHJZkobw4Q2GQxWI2URRT0l # NMExu/AS2VaP+RyPLY/rm4Hm9JxpwqfrcoLR2c88Pg23RKwj8ccUFRCAecwAHelp # 1FSlHn7w9Zpq6lfcZ8yMhXBdaKp07TkrD2kTHHGVa3UXXOP714v9QlHtEfV3zfle # asPtYjYMXOd+3XaB511n5yEge9ZlhFhtjVrJiVM8Lc7PdVeYT64Xxeio4pJNp1lq # pL4amrtpYd+Fnl6LgKDllbpZbbOq3iBLo/z81CwVpTxJhn5JUKET2sEmMSywnqlW # JoOZDegWcUR9dI1dsdBur40U1kvt7kBEqgxnFwK2dZwBu3BTmlX1PyRhh/wDnm3p # RV7r # SIG # End signature block
combined_dataset/train/non-malicious/sample_54_21.ps1
sample_54_21.ps1
param( [Parameter(Mandatory=$true)] [string]$ZipFilePath, [string]$DestinationFolder ) Add-Type -AssemblyName System.IO.Compression.FileSystem function Unzip { param([string]$zipfile, [string]$outpath) Write-Output ">>>>Unzipping file '$zipfile' to folder '$outpath'" [System.IO.Compression.ZipFile]::ExtractToDirectory($zipfile, $outpath) } Function Start-ProcessAndPipeOutput ($commandPath, $commandArguments) { Write-Output ">>>>Executing commmand '$commandPath' with arguments '$commandArguments'" $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = $commandPath $pinfo.RedirectStandardError = $true $pinfo.RedirectStandardOutput = $true $pinfo.UseShellExecute = $false $pinfo.Arguments = $commandArguments $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null $p.WaitForExit() Write-Output ">>>>Command completed with exit code '$($p.ExitCode)'" Write-Output ">>>>Output stream: " Write-Output "$($p.StandardOutput.ReadToEnd())" Write-Output ">>>>Error stream: " Write-Output "$($p.StandardError.ReadToEnd())" } # # Start Main # $Error.Clear() $timestamp = get-date -uformat %Y%m%d-%k%M%S $transcriptPath = "$($env:temp)\StorageSyncAgent-UnzipAndCopyMDS-$($timestamp).log" Start-Transcript -Path $transcriptPath try { Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentLauncher.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentHost.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentManager.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentCore.exe /T' } catch { Write-Output "Ignoring failure while killing processes of monagent." } $Error.Clear() # regardless, we clear the errors. $cnt = 0 $Maximum = 5 do { $cnt++ if($cnt -gt 1) { Start-Sleep -Seconds 1 } try { Unzip $ZipFilePath $DestinationFolder $Error.Clear() break; } catch { Write-Error $_.Exception.InnerException.Message -ErrorAction Continue } } while ($cnt -le $Maximum) # SIG # Begin signature block # MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDmBDa41l2lnI8/ # PyNjo01L545SV+0RkGP+odxV0aqvP6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHZ5un2ZsnLfXpEWoQGOAzv1 # SSf/SAsBtZI1nRZpG/h/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjOoryFoLlQDAxqnjucIrNc/SYB9LcUFKzAoCQgUf5SUXRMEm0ZMdcp6B # TxZX0WAIkvI59QLotBGaBzC0ighEPWv+MDVrkJxLiH58ycbKkMUZo5dl1t862DEW # pZlKO9Unk+JYGA1x8HkLhJxHWKnYG4nawWN7EC4deK0nyB9PHekSdMJIIYpRBKAn # 6WHnMCm4xD8TnHVI5gyS23Fg6P8FzZeHLGIjby3FEeRttPxNn4sDwsVQVwY9NmKE # /ailxv0Z+tFtM9LbL9T6bB/eqsYl6Jv+0Ug3FH+CsVGuWOl3ttCldPX+gYIMmXt6 # YwSqYS+hfyc7+vooLtTFlOac5NzGCKGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC # F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAMh6T/MvyotyXgTnbGGyqRCvZS6WVdOekcQbXH9GfTowIGZkYBoamw # GBIyMDI0MDUzMDIwMzAzMC4xN1owBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EeowggcgMIIFCKADAgECAhMzAAAB6+AYbLW27zjtAAEAAAHrMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUz # NFoXDTI1MDMwNTE4NDUzNFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAMEVaCHaVuBXd4mnTWiqJoUG5hs1zuFIqaS28nXk2sH8 # MFuhSjDxY85M/FufuByYg4abAmR35PIXHso6fOvGegHeG6+/3V9m5S6AiwpOcC+D # YFT+d83tnOf0qTWam4nbtLrFQMfih0WJfnUgJwqXoQbhzEqBwMCKeKFPzGuglZUB # Mvunxtt+fCxzWmKFmZy8i5gadvVNj22el0KFav0QBG4KjdOJEaMzYunimJPaUPmG # d3dVoZN6k2rJqSmQIZXT5wrxW78eQhl2/L7PkQveiNN0Usvm8n0gCiBZ/dcC7d3t # KkVpqh6LHR7WrnkAP3hnAM/6LOotp2wFHe3OOrZF+sI0v5OaL+NqVG2j8npuHh8+ # EcROcMLvxPXJ9dRB0a2Yn+60j8A3GLsdXyAA/OJ31NiMw9tiobzLnHP6Aj9IXKP5 # oq0cdaYrMRc+21fMBx7EnUQfvBu6JWTewSs8r0wuDVdvqEzkchYDSMQBmEoTJ3mE # fZcyJvNqRunazYQlBZqxBzgMxoXUSxDULOAKUNghgbqtSG518juTwv0ooIS59Fsr # mV1Fg0Cp12v/JIl+5m/c9Lf6+0PpfqrUfhQ6aMMp2OhbeqzslExmYf1+QWQzNvph # LOvp5fUuhibc+s7Ul5rjdJjOUHdPPzg6+5VJXs1yJ1W02qJl5ZalWN9q9H4mP8k5 # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUdJ4FrNZVzG7ipP07mNPYH6oB6uEwHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAIN03y+g93wL5VZk/f5bztz9Bt1tYrSw631n # iQQ5aeDsqaH5YPYuc8lMkogRrGeI5y33AyAnzJDLBHxYeAM69vCp2qwtRozg2t6u # 0joUj2uGOF5orE02cFnMdksPCWQv28IQN71FzR0ZJV3kGDcJaSdXe69Vq7XgXnkR # JNYgE1pBL0KmjY6nPdxGABhV9osUZsCs1xG9Ja9JRt4jYgOpHELjEFtGI1D7Wodc # MI+fSEaxd8v7KcNmdwJ+zM2uWBlPbheCG9PNgwdxeKgtVij/YeTKjDp0ju5Qslsr # EtfzAeGyLCuJcgMKeMtWwbQTltHzZCByx4SHFtTZ3VFUdxC2RQTtb3PFmpnr+M+Z # qiNmBdA7fdePE4dhhVr8Fdwi67xIzM+OMABu6PBNrClrMsG/33stEHRk5s1yQljJ # BCkRNJ+U3fqNb7PtH+cbImpFnce1nWVdbV/rMQIB4/713LqeZwKtVw6ptAdftmvx # Y9yCEckAAOWbkTE+HnGLW01GT6LoXZr1KlN5Cdlc/nTD4mhPEhJCru8GKPaeK0Cx # ItpV4yqg+L41eVNQ1nY121sWvoiKv1kr259rPcXF+8Nmjfrm8s6jOZA579n6m7i9 # jnM+a02JUhxCcXLslk6JlUMjlsh3BBFqLaq4conqW1R2yLceM2eJ64TvZ9Ph5aHG # 2ac3kdgIMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00w # ggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIAG # iXW7XDDBiBS1SjAyepi9u6XeoIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqAvQhMCIYDzIwMjQwNTMwMTI0ODMz # WhgPMjAyNDA1MzExMjQ4MzNaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOoC9CEC # AQAwBwIBAAICF/owBwIBAAICE0MwCgIFAOoERaECAQAwNgYKKwYBBAGEWQoEAjEo # MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG # 9w0BAQsFAAOCAQEALlp1hZ9t2gKJoC3Vw6V1pozSohy+EbpBxyk11etLB1i2Qxvs # tcMihMHrijePnwjL1dx+M+66T4ya3nz/3umrInHsS2vkah8Mysh2mpoY0C2eRzfJ # gdSSxIe5SmQeiAUlJ5ZqERCjQ6IwDGaw9+JYPu062KWN/FWJ2bPAyOkWn8n8FiTe # 2Qp5XZur5KxaZrXFvk6vPp4pitDIAjn5xiA5cgTmEN63yLL7iYyOniy5bFxd5kEG # u3XQxbkn8Pcrp64VrVtdr9+VCPQgIXRXKx8zUb7bjfcCfVOMrHCcfgcQ3s2wQgBK # u/Sh6PjU77zBNPPUuu4OrgK3k/uLDJocfBqPsTGCBA0wggQJAgEBMIGTMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHrMA0G # CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ # KoZIhvcNAQkEMSIEIK080hzAcXRQQrm6aKFLpDjamI36OtvOtV7YZ/0C/T2BMIH6 # BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgzrdrvl9pA+F/xIENO2TYNJSAht2L # NezPvqHUl2EsLPgwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAevgGGy1tu847QABAAAB6zAiBCAaEYhCXEXteV2U7QiHluiEItOrEg7R # pK714Hu+ItboqTANBgkqhkiG9w0BAQsFAASCAgBG+sQ9jdy5LtLrM5+k7aijWuMb # AmvsmikGE8+mkNd3Cx7Nfu/tpRxFsRawmTyUfn9bhPKiYtZg2JAdiClbpDFZTogJ # yC82blZlV1IGrPQwCz3LWJYRwkUXFu6RlnTr7T7fAK/oAmXFdT1N9YiVlq37sASI # MCDYkkIuTBiSaeZQVA0hOfs52MZcNIAOrWHHucDLrX+jXSGUuR1DkJrGKVcuJaT9 # 5PUpFl1631UDs6eCOzsFGNR5b5kdaoL7I94fijmrtCLGkiMvOAs7M76FO4fo/5/j # N/1GdBrD5P2hjUa4z8gPCfsXlglk0Gqrg/AGRux+PtiDooi2jNA3d4gvl7NrLO9H # HV+h1gxqp1UafPSAlae8Dy1POz6MtETaF2SvHUK8NyQdMf4dEP9Snxizu0YX0mpd # SCKXC8bGjlMt09sh0YlTjx9stWw4RRu9VqFrmwNDRhHF42Jw855BnBVvyh533w6L # VCvslLlyEp5EEA1Rjn4Nhs3MG2UtuzQq24ImYcaJevcqF3QME+Xc5be/UnPUrAVm # yBa/PSlGHl47E6ONJznNCeL6p/tOTxe066ExPDAybJuMbff/4W99wUmtTNJhprMO # 2hPOgEce2OzU0EIUWnMdgtsbD8aMvjNR5a+jnuDT+Vb7C2ChbgOJaKg5OcREveji # n+tWt8tZ+pAJMtdGoQ== # SIG # End signature block
combined_dataset/train/non-malicious/2101.ps1
2101.ps1
Describe 'Testing of script internationalization' -Tags "CI" { BeforeAll { $dir=$PSScriptRoot $defaultParamValues = $PSDefaultParameterValues.Clone() if ($PSUICulture -ne 'en-US' -and $PSUICulture -ne 'fr-FR') { $PSDefaultParameterValues["It:Skip"] = $true } } AfterAll { $global:PSDefaultParameterValues = $defaultParamValues } It 'convertFromString-Data should work with data statement.' { data mydata { ConvertFrom-StringData @' string1=string1 string2=string2 '@ } $mydata.string1 | Should -BeExactly 'string1' $mydata.string2 | Should -BeExactly 'string2' } It 'Import default culture is done correctly' { import-localizedData mydata; $mydata.string1 | Should -BeExactly 'string1 for en-US' $mydata.string2 | Should -BeExactly 'string2 for en-US' } It 'Import specific culture(en-US)' { import-localizedData mydata -uiculture en-US $mydata.string1 | Should -BeExactly 'string1 for en-US' $mydata.string2 | Should -BeExactly 'string2 for en-US' import-localizedData mydata -uiculture fr-FR $mydata.string1 | Should -BeExactly 'string1 for fr-FR' $mydata.string2 | Should -BeExactly 'string2 for fr-FR' } It 'Import non existing culture is done correctly' { import-localizedData mydata -uiculture nl-NL -ErrorAction SilentlyContinue -ErrorVariable ev $ev | Should -Not -BeNullOrEmpty $ev[0].Exception | Should -BeOfType "System.Management.Automation.PSInvalidOperationException" } It 'Import different file name is done correctly' { import-localizedData mydata -filename foo $mydata.string1 | Should -BeExactly 'string1 from foo in en-US' $mydata.string2 | Should -BeExactly 'string2 from foo in en-US' import-localizedData mydata -filename foo -uiculture fr-FR $mydata.string1 | Should -BeExactly 'string1 from foo in fr-FR' $mydata.string2 | Should -BeExactly 'string2 from foo in fr-FR' } It 'Import different file base is done correctly' { import-localizedData mydata -basedirectory "${dir}\newbase" $mydata.string1 | Should -BeExactly 'string1 for en-US under newbase' $mydata.string2 | Should -BeExactly 'string2 for en-US under newbase' import-localizedData mydata -basedirectory "${dir}\newbase" -uiculture fr-FR $mydata.string1 | Should -BeExactly 'string1 for fr-FR under newbase' $mydata.string2 | Should -BeExactly 'string2 for fr-FR under newbase' } It 'Import different file base and file name' { import-localizedData mydata -basedirectory "${dir}\newbase" -filename foo $mydata.string1 | Should -BeExactly 'string1 for en-US from foo under newbase' $mydata.string2 | Should -BeExactly 'string2 for en-US from foo under newbase' import-localizedData mydata -basedirectory "${dir}\newbase" -filename foo -uiculture fr-FR $mydata.string1 | Should -BeExactly 'string1 for fr-FR from foo under newbase' $mydata.string2 | Should -BeExactly 'string2 for fr-FR from foo under newbase' } It "Import variable that doesn't exist" { import-localizedData mydata2 $mydata2.string1 | Should -BeExactly 'string1 for en-US' $mydata2.string2 | Should -BeExactly 'string2 for en-US' } It 'Import bad psd1 file - tests the use of disallowed variables' { $script:exception = $null & { trap {$script:exception = $_ ; continue } import-localizedData mydata -filename bad } $script:exception.exception | Should -Not -BeNullOrEmpty $script:exception.exception | Should -BeOfType System.management.automation.psinvalidoperationexception } It 'Import if psd1 file is done correctly' { import-localizedData mydata -filename if if ($psculture -eq 'en-US') { $mydata.string1 | Should -BeExactly 'string1 for en-US in if' $mydata.string2 | Should -BeExactly 'string2 for en-US in if' } else { $mydata | Should -BeNullOrEmpty } } $testData = @( @{cmd = 'data d { @{ x=$(get-command)} }';Expected='get-command'}, @{cmd = 'data d { if ($(get-command)) {} }';Expected='get-command'}, @{cmd = 'data d { @(get-command) }';Expected='get-command'} ) It 'Allowed cmdlets checked properly' -TestCase:$testData { param ($cmd, $Expected) $script:exception = $null & { trap {$script:exception = $_.Exception ; continue } invoke-expression $cmd } $exception | Should -Match $Expected } it 'Check alternate syntax that also supports complex variable names' { & { $script:mydata = data { 123 } } $mydata | Should -Be 123 $mydata = data { 456 } & { import-localizedData mydata -uiculture en-US } $mydata | Should -Be 456 & { import-localizedData script:mydata -uiculture en-US } $script:mydata.string1 | Should -BeExactly 'string1 for en-US' } It 'Check fallback to current directory plus -SupportedCommand parameter is done correctly' { new-alias MyConvertFrom-StringData ConvertFrom-StringData import-localizeddata local:mydata -uiculture fr-ca -filename I18n.Tests_fallback.psd1 -SupportedCommand MyConvertFrom-StringData $mydata[0].string1 | Should -BeExactly 'fallback string1 for en-US' $mydata[1] | Should -Be 42 } }
combined_dataset/train/non-malicious/sample_60_35.ps1
sample_60_35.ps1
# --------------------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for license information. # --------------------------------------------------------------------------------------------- # Prevent installing more than once per session if (Test-Path variable:global:__VSCodeOriginalPrompt) { return; } # Disable shell integration when the language mode is restricted if ($ExecutionContext.SessionState.LanguageMode -ne "FullLanguage") { return; } $Global:__VSCodeOriginalPrompt = $function:Prompt $Global:__LastHistoryId = -1 # Store the nonce in script scope and unset the global $Nonce = $env:VSCODE_NONCE $env:VSCODE_NONCE = $null $isStable = $env:VSCODE_STABLE $env:VSCODE_STABLE = $null $osVersion = [System.Environment]::OSVersion.Version $isWindows10 = $IsWindows -and $osVersion.Major -eq 10 -and $osVersion.Minor -eq 0 -and $osVersion.Build -lt 22000 if ($env:VSCODE_ENV_REPLACE) { $Split = $env:VSCODE_ENV_REPLACE.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':')) } $env:VSCODE_ENV_REPLACE = $null } if ($env:VSCODE_ENV_PREPEND) { $Split = $env:VSCODE_ENV_PREPEND.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':') + [Environment]::GetEnvironmentVariable($Inner[0])) } $env:VSCODE_ENV_PREPEND = $null } if ($env:VSCODE_ENV_APPEND) { $Split = $env:VSCODE_ENV_APPEND.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], [Environment]::GetEnvironmentVariable($Inner[0]) + $Inner[1].Replace('\x3a', ':')) } $env:VSCODE_ENV_APPEND = $null } function Global:__VSCode-Escape-Value([string]$value) { # NOTE: In PowerShell v6.1+, this can be written `$value -replace '…', { … }` instead of `[regex]::Replace`. # Replace any non-alphanumeric characters. [regex]::Replace($value, "[$([char]0x00)-$([char]0x1f)\\\n;]", { param($match) # Encode the (ascii) matches as `\x<hex>` -Join ( [System.Text.Encoding]::UTF8.GetBytes($match.Value) | ForEach-Object { '\x{0:x2}' -f $_ } ) }) } function Global:Prompt() { $FakeCode = [int]!$global:? # NOTE: We disable strict mode for the scope of this function because it unhelpfully throws an # error when $LastHistoryEntry is null, and is not otherwise useful. Set-StrictMode -Off $LastHistoryEntry = Get-History -Count 1 $Result = "" # Skip finishing the command if the first command has not yet started if ($Global:__LastHistoryId -ne -1) { if ($LastHistoryEntry.Id -eq $Global:__LastHistoryId) { # Don't provide a command line or exit code if there was no history entry (eg. ctrl+c, enter on no command) $Result += "$([char]0x1b)]633;D`a" } else { # Command finished exit code # OSC 633 ; D [; <ExitCode>] ST $Result += "$([char]0x1b)]633;D;$FakeCode`a" } } # Prompt started # OSC 633 ; A ST $Result += "$([char]0x1b)]633;A`a" # Current working directory # OSC 633 ; <Property>=<Value> ST $Result += if ($pwd.Provider.Name -eq 'FileSystem') { "$([char]0x1b)]633;P;Cwd=$(__VSCode-Escape-Value $pwd.ProviderPath)`a" } # Before running the original prompt, put $? back to what it was: if ($FakeCode -ne 0) { Write-Error "failure" -ea ignore } # Run the original prompt $OriginalPrompt += $Global:__VSCodeOriginalPrompt.Invoke() $Result += $OriginalPrompt # Prompt # OSC 633 ; <Property>=<Value> ST if ($isStable -eq "0") { $Result += "$([char]0x1b)]633;P;Prompt=$(__VSCode-Escape-Value $OriginalPrompt)`a" } # Write command started $Result += "$([char]0x1b)]633;B`a" $Global:__LastHistoryId = $LastHistoryEntry.Id return $Result } # Only send the command executed sequence when PSReadLine is loaded, if not shell integration should # still work thanks to the command line sequence if (Get-Module -Name PSReadLine) { $__VSCodeOriginalPSConsoleHostReadLine = $function:PSConsoleHostReadLine function Global:PSConsoleHostReadLine { $CommandLine = $__VSCodeOriginalPSConsoleHostReadLine.Invoke() # Command line # OSC 633 ; E ; <CommandLine?> ; <Nonce?> ST $Result = "$([char]0x1b)]633;E;" $Result += $(__VSCode-Escape-Value $CommandLine) # Only send the nonce if the OS is not Windows 10 as it seems to echo to the terminal # sometimes if ($IsWindows10 -eq $false) { $Result += ";$Nonce" } $Result += "`a" # Command executed # OSC 633 ; C ST $Result += "$([char]0x1b)]633;C`a" # Write command executed sequence directly to Console to avoid the new line from Write-Host [Console]::Write($Result) $CommandLine } } # Set IsWindows property if ($PSVersionTable.PSVersion -lt "6.0") { # Windows PowerShell is only available on Windows [Console]::Write("$([char]0x1b)]633;P;IsWindows=$true`a") } else { [Console]::Write("$([char]0x1b)]633;P;IsWindows=$IsWindows`a") } # Set ContinuationPrompt property if ($isStable -eq "0") { $ContinuationPrompt = (Get-PSReadLineOption).ContinuationPrompt if ($ContinuationPrompt) { [Console]::Write("$([char]0x1b)]633;P;ContinuationPrompt=$(__VSCode-Escape-Value $ContinuationPrompt)`a") } } # Set always on key handlers which map to default VS Code keybindings function Set-MappedKeyHandler { param ([string[]] $Chord, [string[]]$Sequence) try { $Handler = Get-PSReadLineKeyHandler -Chord $Chord | Select-Object -First 1 } catch [System.Management.Automation.ParameterBindingException] { # PowerShell 5.1 ships with PSReadLine 2.0.0 which does not have -Chord, # so we check what's bound and filter it. $Handler = Get-PSReadLineKeyHandler -Bound | Where-Object -FilterScript { $_.Key -eq $Chord } | Select-Object -First 1 } if ($Handler) { Set-PSReadLineKeyHandler -Chord $Sequence -Function $Handler.Function } } function Get-KeywordCompletionResult( $Keyword, $Description = $null ) { [System.Management.Automation.CompletionResult]::new($Keyword, $Keyword, [System.Management.Automation.CompletionResultType]::Keyword, $null -ne $Description ? $Description : $Keyword) } function Set-MappedKeyHandlers { Set-MappedKeyHandler -Chord Ctrl+Spacebar -Sequence 'F12,a' Set-MappedKeyHandler -Chord Alt+Spacebar -Sequence 'F12,b' Set-MappedKeyHandler -Chord Shift+Enter -Sequence 'F12,c' Set-MappedKeyHandler -Chord Shift+End -Sequence 'F12,d' # Enable suggestions if the environment variable is set and Windows PowerShell is not being used # as APIs are not available to support this feature if ($env:VSCODE_SUGGEST -eq '1' -and $PSVersionTable.PSVersion -ge "7.0") { Remove-Item Env:VSCODE_SUGGEST # VS Code send completions request (may override Ctrl+Spacebar) Set-PSReadLineKeyHandler -Chord 'F12,e' -ScriptBlock { Send-Completions } # VS Code send global completions request Set-PSReadLineKeyHandler -Chord 'F12,f' -ScriptBlock { # Get commands, convert to string array to reduce the payload size and send as JSON $commands = @( [System.Management.Automation.CompletionCompleters]::CompleteCommand('') Get-KeywordCompletionResult -Keyword 'begin' Get-KeywordCompletionResult -Keyword 'break' Get-KeywordCompletionResult -Keyword 'catch' -Description "catch [[<error type>][',' <error type>]*] {<statement list>}" Get-KeywordCompletionResult -Keyword 'class' -Description @" class <class-name> [: [<base-class>][,<interface-list>]] { [[<attribute>] [hidden] [static] <property-definition> ...] [<class-name>([<constructor-argument-list>]) {<constructor-statement-list>} ...] [[<attribute>] [hidden] [static] <method-definition> ...] } "@ Get-KeywordCompletionResult -Keyword 'clean' Get-KeywordCompletionResult -Keyword 'continue' Get-KeywordCompletionResult -Keyword 'data' -Description @" data [<variable-name>] [-supportedCommand <cmdlet-name>] { <Permitted content> } "@ Get-KeywordCompletionResult -Keyword 'do' -Description @" do {<statement list>} while (<condition>) do {<statement list>} until (<condition>) "@ Get-KeywordCompletionResult -Keyword 'dynamicparam' -Description "dynamicparam {<statement-list>}" Get-KeywordCompletionResult -Keyword 'else' -Description @" if (<test1>) {<statement list 1>} [elseif (<test2>) {<statement list 2>}] [else {<statement list 3>}] "@ Get-KeywordCompletionResult -Keyword 'elseif' -Description @" if (<test1>) {<statement list 1>} [elseif (<test2>) {<statement list 2>}] [else {<statement list 3>}] "@ Get-KeywordCompletionResult -Keyword 'end' Get-KeywordCompletionResult -Keyword 'enum' -Description @" [[<attribute>]...] [Flag()] enum <enum-name>[ : <underlying-type-name>] { <label 0> [= 1] <label 1> [= 2] <label 2> [= 4] <label 3> [= 8] ... } "@ Get-KeywordCompletionResult -Keyword 'exit' -Description "exit [<exitcode>]" Get-KeywordCompletionResult -Keyword 'filter' -Description "filter [<scope:>]<name> {<statement list>}" Get-KeywordCompletionResult -Keyword 'finally' -Description "finally {<statement list>}" Get-KeywordCompletionResult -Keyword 'for' -Description @" for (<Init>; <Condition>; <Repeat>) { <Statement list> } "@ Get-KeywordCompletionResult -Keyword 'foreach' -Description "foreach ($<item> in $<collection>){<statement list>}" Get-KeywordCompletionResult -Keyword 'function' -Description @" function [<scope:>]<name> [([type]`$parameter1[,[type]`$parameter2])] { begin {<statement list>} process {<statement list>} end {<statement list>} clean {<statement list>} } "@ Get-KeywordCompletionResult -Keyword 'hidden' Get-KeywordCompletionResult -Keyword 'if' -Description @" if (<test1>) {<statement list 1>} [elseif (<test2>) {<statement list 2>}] [else {<statement list 3>}] "@ Get-KeywordCompletionResult -Keyword 'in' -Description "foreach (`$<item> in `$<collection>){<statement list>}" Get-KeywordCompletionResult -Keyword 'param' -Description "param (`$Parameter1)" Get-KeywordCompletionResult -Keyword 'process' Get-KeywordCompletionResult -Keyword 'return' -Description "return [<expression>]" Get-KeywordCompletionResult -Keyword 'static' -Description @" class <class-name> [: [<base-class>][,<interface-list>]] { [[<attribute>] [hidden] [static] <property-definition> ...] [<class-name>([<constructor-argument-list>]) {<constructor-statement-list>} ...] [[<attribute>] [hidden] [static] <method-definition> ...] } "@ Get-KeywordCompletionResult -Keyword 'switch' -Description @" Switch (<test-expression>) { <result1-to-be-matched> {<action>} <result2-to-be-matched> {<action>} } "@ Get-KeywordCompletionResult -Keyword 'throw' -Description "throw [<expression>]" Get-KeywordCompletionResult -Keyword 'trap' -Description "trap [[<error type>]] {<statement list>}" Get-KeywordCompletionResult -Keyword 'try' -Description "try {<statement list>}" Get-KeywordCompletionResult -Keyword 'until' -Description "do {<statement list>} until (<condition>)" Get-KeywordCompletionResult -Keyword 'using' -Description @" using module <module-name> using assembly <.NET-assembly-path> "@ Get-KeywordCompletionResult -Keyword 'while' -Description "while (<condition>){<statement list>}" ) $mappedCommands = Compress-Completions($commands) $result = "$([char]0x1b)]633;CompletionsPwshCommands;commands;" $result += $mappedCommands | ConvertTo-Json -Compress $result += "`a" Write-Host -NoNewLine $result } Set-PSReadLineKeyHandler -Chord 'F12,g' -ScriptBlock { Import-Module "$PSScriptRoot\GitTabExpansion.psm1" Remove-PSReadLineKeyHandler -Chord 'F12,g' } Set-PSReadLineKeyHandler -Chord 'F12,h' -ScriptBlock { Import-Module "$PSScriptRoot\CodeTabExpansion.psm1" Remove-PSReadLineKeyHandler -Chord 'F12,h' } } } function Send-Completions { $commandLine = "" $cursorIndex = 0 $prefixCursorDelta = 0 [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$commandLine, [ref]$cursorIndex) $completionPrefix = $commandLine # Start completions sequence $result = "$([char]0x1b)]633;Completions" # If there is a space in the input, defer to TabExpansion2 as it's more complicated to # determine what type of completions to use. # `[` is included here as namespace commands are not included in CompleteCommand(''), # additionally for some reason CompleteVariable('[') causes the prompt to clear and reprint # multiple times if ($completionPrefix.Contains(' ') -or $completionPrefix.Contains('[') -or $PSVersionTable.PSVersion -lt "6.0") { # Adjust the completion prefix and cursor index such that tab expansion will be requested # immediately after the last whitespace. This allows the client to perform fuzzy filtering # such that requesting completions in the middle of a word should show the same completions # as at the start. This only happens when the last word does not include special characters: # - `/` and `\`: Completions change when navigating directories. # - `$`: Completions change when variables. $lastWhitespaceIndex = $completionPrefix.LastIndexOf(' ') $lastWord = $completionPrefix.Substring($lastWhitespaceIndex + 1) if ($lastWord -notmatch '[/\\$]') { if ($lastWhitespaceIndex -ne -1 -and $lastWhitespaceIndex -lt $cursorIndex) { $newCursorIndex = $lastWhitespaceIndex + 1 $completionPrefix = $completionPrefix.Substring(0, $newCursorIndex) $prefixCursorDelta = $cursorIndex - $newCursorIndex $cursorIndex = $newCursorIndex } } # If it contains `/` or `\`, get completions from the nearest `/` or `\` such that file # completions are consistent regardless of where it was requested elseif ($lastWord -match '[/\\]') { $lastSlashIndex = $completionPrefix.LastIndexOfAny(@('/', '\')) if ($lastSlashIndex -ne -1 && $lastSlashIndex -lt $cursorIndex) { $newCursorIndex = $lastSlashIndex + 1 $completionPrefix = $completionPrefix.Substring(0, $newCursorIndex) $prefixCursorDelta = $cursorIndex - $newCursorIndex $cursorIndex = $newCursorIndex } } # Get completions using TabExpansion2 $completions = TabExpansion2 -inputScript $completionPrefix -cursorColumn $cursorIndex if ($null -ne $completions.CompletionMatches) { $result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength + $prefixCursorDelta);$($cursorIndex - $prefixCursorDelta);" $json = [System.Collections.ArrayList]@($completions.CompletionMatches) # Relative directory completions if ($completions.CompletionMatches.Count -gt 0 -and $completions.CompletionMatches.Where({ $_.ResultType -eq 3 -or $_.ResultType -eq 4 })) { # Add `../ relative to the top completion $firstCompletion = $completions.CompletionMatches[0] if ($firstCompletion.CompletionText.StartsWith('../')) { if ($completionPrefix -match '(\.\.\/)+') { $parentDir = "$($matches[0])../" $currentPath = Split-Path -Parent $firstCompletion.ToolTip try { $parentDirPath = Split-Path -Parent $currentPath $json.Add([System.Management.Automation.CompletionResult]::new( $parentDir, $parentDir, [System.Management.Automation.CompletionResultType]::ProviderContainer, $parentDirPath) ) } catch { } } } # Add `.` and `..` to the completions list for results that only contain files and dirs else { $json.Add([System.Management.Automation.CompletionResult]::new( '.', '.', [System.Management.Automation.CompletionResultType]::ProviderContainer, (Get-Location).Path) ) $json.Add([System.Management.Automation.CompletionResult]::new( '..', '..', [System.Management.Automation.CompletionResultType]::ProviderContainer, (Split-Path (Get-Location) -Parent)) ) } } # Add `-` and `+` as a completion for move backwards in location history. Unfortunately # we don't set the path it will navigate to since the Set-Location stack is not public # API https://github.com/PowerShell/PowerShell/issues/23860 if ($completionPrefix -eq "cd -") { $json.Add([System.Management.Automation.CompletionResult]::new('-', '-', [System.Management.Automation.CompletionResultType]::ProviderContainer, "Navigate backwards in location history")) } if ($completionPrefix -eq "cd +") { $json.Add([System.Management.Automation.CompletionResult]::new('+', '+', [System.Management.Automation.CompletionResultType]::ProviderContainer, "Navigate forwards in location history")) } $mappedCommands = Compress-Completions($json) $result += $mappedCommands | ConvertTo-Json -Compress } } # If there is no space, get completions using CompletionCompleters as it gives us more # control and works on the empty string else { # If it contains `/` or `\`, get completions from the nearest `/` or `\` such that file # completions are consistent regardless of where it was requested if ($completionPrefix -match '[/\\]') { $lastSlashIndex = $completionPrefix.LastIndexOfAny(@('/', '\')) if ($lastSlashIndex -ne -1 && $lastSlashIndex -lt $cursorIndex) { $newCursorIndex = $lastSlashIndex + 1 $completionPrefix = $completionPrefix.Substring(0, $newCursorIndex) $prefixCursorDelta = $cursorIndex - $newCursorIndex $cursorIndex = $newCursorIndex } } # Note that CompleteCommand isn't included here as it's expensive $completions = $( # Add trailing \ for directories so behavior aligns with TabExpansion2 [System.Management.Automation.CompletionCompleters]::CompleteFilename($completionPrefix) | ForEach-Object { if ($_.ResultType -eq [System.Management.Automation.CompletionResultType]::ProviderContainer) { [System.Management.Automation.CompletionResult]::new("$($_.CompletionText)$([System.IO.Path]::DirectorySeparatorChar)", "$($_.CompletionText)$([System.IO.Path]::DirectorySeparatorChar)", $_.ResultType, $_.ToolTip) } else { $_ } } ([System.Management.Automation.CompletionCompleters]::CompleteVariable('')) ) if ($null -ne $completions) { $result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength + $prefixCursorDelta);$($cursorIndex - $prefixCursorDelta);" $mappedCommands = Compress-Completions($completions) $result += $mappedCommands | ConvertTo-Json -Compress } else { $result += ";0;$($completionPrefix.Length);$($completionPrefix.Length);[]" } } # End completions sequence $result += "`a" Write-Host -NoNewLine $result } function Compress-Completions($completions) { $completions | ForEach-Object { if ($_.CustomIcon) { ,@($_.CompletionText, $_.ResultType, $_.ToolTip, $_.CustomIcon) } elseif ($_.CompletionText -eq $_.ToolTip) { ,@($_.CompletionText, $_.ResultType) } else { ,@($_.CompletionText, $_.ResultType, $_.ToolTip) } } } # Register key handlers if PSReadLine is available if (Get-Module -Name PSReadLine) { Set-MappedKeyHandlers }
combined_dataset/train/non-malicious/Add SSL Cert to IIS.ps1
Add SSL Cert to IIS.ps1
function Add-SSLCertificate{ param([string]$pfxPath,[string]$pfxPassword,[string]$hostHeader,[string]$siteName) $certMgr = New-Object -ComObject IIS.CertObj -ErrorAction SilentlyContinue $certMgr.ImportToCertStore($pfxPath,$pfxPassword,$true,$true) Import-Module WebAdministration; New-WebBinding -Name $siteName -Port 443 -Protocol https -HostHeader $hostHeader }
combined_dataset/train/non-malicious/sample_37_51.ps1
sample_37_51.ps1
# # Module manifest for module 'OCI.PSModules.Servicemesh' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Servicemesh.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '16189a7b-c9fe-4714-98b6-983f1fa28ccd' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Servicemesh Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicemesh.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIServicemeshAccessPoliciesList', 'Get-OCIServicemeshAccessPolicy', 'Get-OCIServicemeshIngressGateway', 'Get-OCIServicemeshIngressGatewayRouteTable', 'Get-OCIServicemeshIngressGatewayRouteTablesList', 'Get-OCIServicemeshIngressGatewaysList', 'Get-OCIServicemeshMesh', 'Get-OCIServicemeshMeshesList', 'Get-OCIServicemeshProxyDetails', 'Get-OCIServicemeshVirtualDeployment', 'Get-OCIServicemeshVirtualDeploymentsList', 'Get-OCIServicemeshVirtualService', 'Get-OCIServicemeshVirtualServiceRouteTable', 'Get-OCIServicemeshVirtualServiceRouteTablesList', 'Get-OCIServicemeshVirtualServicesList', 'Get-OCIServicemeshWorkRequest', 'Get-OCIServicemeshWorkRequestErrorsList', 'Get-OCIServicemeshWorkRequestLogsList', 'Get-OCIServicemeshWorkRequestsList', 'Move-OCIServicemeshAccessPolicyCompartment', 'Move-OCIServicemeshIngressGatewayCompartment', 'Move-OCIServicemeshIngressGatewayRouteTableCompartment', 'Move-OCIServicemeshMeshCompartment', 'Move-OCIServicemeshVirtualDeploymentCompartment', 'Move-OCIServicemeshVirtualServiceCompartment', 'Move-OCIServicemeshVirtualServiceRouteTableCompartment', 'New-OCIServicemeshAccessPolicy', 'New-OCIServicemeshIngressGateway', 'New-OCIServicemeshIngressGatewayRouteTable', 'New-OCIServicemeshMesh', 'New-OCIServicemeshVirtualDeployment', 'New-OCIServicemeshVirtualService', 'New-OCIServicemeshVirtualServiceRouteTable', 'Remove-OCIServicemeshAccessPolicy', 'Remove-OCIServicemeshIngressGateway', 'Remove-OCIServicemeshIngressGatewayRouteTable', 'Remove-OCIServicemeshMesh', 'Remove-OCIServicemeshVirtualDeployment', 'Remove-OCIServicemeshVirtualService', 'Remove-OCIServicemeshVirtualServiceRouteTable', 'Stop-OCIServicemeshWorkRequest', 'Update-OCIServicemeshAccessPolicy', 'Update-OCIServicemeshIngressGateway', 'Update-OCIServicemeshIngressGatewayRouteTable', 'Update-OCIServicemeshMesh', 'Update-OCIServicemeshVirtualDeployment', 'Update-OCIServicemeshVirtualService', 'Update-OCIServicemeshVirtualServiceRouteTable' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicemesh' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/DriveUtilization.ps1
DriveUtilization.ps1
Function Get-Utilization { Param([string]$computername=$env:computername, [string]$ID="C:" ) #suppress errors messages $errorActionPreference="silentlycontinue" $drive=Get-WmiObject Win32_Logicaldisk -filter "DeviceID='$ID'" ` -computername $computername -errorAction "silentlycontinue" if ($drive.size) { #divide size and freespace by 1MB because they are UInt64 #and I can't do anything with them in there native type $size=$drive.size/1MB $free=$drive.freespace/1MB $utilization=($size-$free)/$size write $utilization } else { #there as an error so return a value that can't be mistaken #for drive utilization write -1 } } #Sample usage $computer="PUCK" $drive="C:" $u=Get-Utilization $computer $drive #format $u as a percentage to 2 decimal points $percent="{0:P2}" -f $u if ($u -eq -1) { $msg="WARNING: Failed to get drive {0} on {1}" -f $drive,$computer $color="RED" } elseif ($u -ge .75) { $msg="WARNING: Drive {0} on {1} is at {2} utilization." -f $drive,$computer,$percent $color="RED" } else { $msg="WARNING: Drive {0} on {1} is at {2} utilization." -f $drive,$computer,$percent $color="GREEN" } Write-Host $msg -foregroundcolor $color
combined_dataset/train/non-malicious/test_2.ps1
test_2.ps1
[CmdletBinding()] param() "This file is in the $PSScriptRoot folder." # SIG # Begin signature block # MIIPGwYJKoZIhvcNAQcCoIIPDDCCDwgCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUtq5NTq7Q77yPgrtRePzRWHVn # THugggzzMIIEBzCCAu+gAwIBAgILAQAAAAABHkZAnTYwDQYJKoZIhvcNAQEFBQAw # YzELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExFjAUBgNV # BAsTDU9iamVjdFNpZ24gQ0ExITAfBgNVBAMTGEdsb2JhbFNpZ24gT2JqZWN0U2ln # biBDQTAeFw0wODEyMTcxNzQ4MDJaFw0xMTEyMTcxNzQ4MDJaMGExCzAJBgNVBAYT # AlVTMRcwFQYDVQQKEw5RdWVzdCBTb2Z0d2FyZTEXMBUGA1UEAxMOUXVlc3QgU29m # dHdhcmUxIDAeBgkqhkiG9w0BCQEWEXN1cHBvcnRAcXVlc3QuY29tMIGfMA0GCSqG # SIb3DQEBAQUAA4GNADCBiQKBgQDWbNraEqKKpmdoXWweG4VFLswQar21iEXsAVsl # G9O+EJmT2zEr3a2EoEXINI7Mlq4Htm2P7UfBDOmpttT3gSxHT0k5/y8H7FAosLFo # E/liPCGMnNXL7V3p+tVZg3WhXE9dEEwbsGcWB9GQ522yD9CfVSqfUQ1KjPKNO6Hm # J25TLQIDAQABo4IBQDCCATwwHwYDVR0jBBgwFoAU0lvzSyZLpbDnXf1Wf/bxLjhO # U6AwTgYIKwYBBQUHAQEEQjBAMD4GCCsGAQUFBzAChjJodHRwOi8vc2VjdXJlLmds # b2JhbHNpZ24ubmV0L2NhY2VydC9PYmplY3RTaWduLmNydDA5BgNVHR8EMjAwMC6g # LKAqhihodHRwOi8vY3JsLmdsb2JhbHNpZ24ubmV0L09iamVjdFNpZ24uY3JsMAkG # A1UdEwQCMAAwDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMDMEsG # A1UdIAREMEIwQAYJKwYBBAGgMgEyMDMwMQYIKwYBBQUHAgEWJWh0dHA6Ly93d3cu # Z2xvYmFsc2lnbi5uZXQvcmVwb3NpdG9yeS8wEQYJYIZIAYb4QgEBBAQDAgQQMA0G # CSqGSIb3DQEBBQUAA4IBAQAb2FS5B6R10Mn+nN+qj2niHMoGR4pxWy6cR5NQw2D3 # RfOB05hEUk8IPtP6BdetOzpjbEWYsk0b/aVCyND/fZwEE33Nl1tf4TGEV8RX3/DS # BvDcf899iQJG+n1VmVNp8i3gwkK39mmC49CCCClZp1JyDuNA3J4cSDofpzdYc7w8 # yIpwomn0u4zU8pf0GPLoXaTytt0QDIm7SYiIBycQBz8rCgoFlVPWCdPeuTCBOA2V # fDaGpP9lx/wnLggPNsrMv6BiYMI1qO7ADOHNoDTmhlMvCEVXWx1zkxIlUmcwlUuk # 07WOuGLmDo6joSZ7Mz+QTyfOhduZOU8mM4Cm4BO9R0WXMIIEDTCCAvWgAwIBAgIL # BAAAAAABI54PrLMwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUxGTAXBgNV # BAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jvb3QgQ0ExGzAZBgNVBAMT # Ekdsb2JhbFNpZ24gUm9vdCBDQTAeFw05OTAxMjgxMzAwMDBaFw0xNzAxMjcxMjAw # MDBaMIGBMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEl # MCMGA1UECxMcUHJpbWFyeSBPYmplY3QgUHVibGlzaGluZyBDQTEwMC4GA1UEAxMn # R2xvYmFsU2lnbiBQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENBMIIBIjANBgkq # hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAopt1KqcTuglxJBjfoQZiKRKe3J51c+jf # VldplhNWT/LIvAFY7SaGcgtg9RnFVQNXm7kQyaHUdED/bADo5lM3/rfaeT64Ujjp # gSyfDjNSps1wzkpdYvTRZ168l0oHyrzdjUexzfFlW4UBsEtr3s2OLvVQ6KOcnSaY # azZjQQNwRPBf4iV1eVB9X6EGokYMVZVHFNORRoZomecn9JTsmkFR95bUeozhRJdo # cQPYWG+9tBBC7g1mdUaLRJbSMAASB2P3RJsBcMpWb5xYlyonF4sucVJtRqunKw9/ # FkhkyFL6BhcAB3TXRbMM9XiVc+gK7sTgcoweEaoeu17O+bQA7nO9zQIDAQABo4Gu # MIGrMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBQV # UXkafAxZ+drN2MQ6E5rJeC1/TTAzBgNVHR8ELDAqMCigJqAkhiJodHRwOi8vY3Js # Lmdsb2JhbHNpZ24ubmV0L1Jvb3QuY3JsMBMGA1UdJQQMMAoGCCsGAQUFBwMDMB8G # A1UdIwQYMBaAFGB7ZhpFDZfKiVAvfQTNNKj//P1LMA0GCSqGSIb3DQEBBQUAA4IB # AQC1eKaifAS3f8l/fWq8cfopMGDC9GIe/n9DHptu4rIfcwuFdlt99U5JBi/U+reR # QO/tb42OE4NUxSoCPQqk3JkLer13L8xAwY/zxIxOcroQfOb/ZCvHzmyn/NeafI5G # jQGDTUI725w/nzJhV9cXsLM2ZvCz/URvgTexlE6nViWJ9YrWbRFiYnlcQpACGNOc # I/wI6GRFuS1+gFtOr8OKKZKDeB+RQTSvhcX9B5lOLFz+x/0XuyUlMU1ytbUpS0ia # N28TxxFOSkUefi8xnKvoUq/WZ5c0iF8OJ2pmUtFax6wwLCA43Sv/OuvOEEWConsb # oSBzVpsqk+YEUQZsG9wviZSTMIIE0zCCA7ugAwIBAgILBAAAAAABI54PryQwDQYJ # KoZIhvcNAQEFBQAwgYExCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWdu # IG52LXNhMSUwIwYDVQQLExxQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENBMTAw # LgYDVQQDEydHbG9iYWxTaWduIFByaW1hcnkgT2JqZWN0IFB1Ymxpc2hpbmcgQ0Ew # HhcNMDQwMTIyMTAwMDAwWhcNMTcwMTI3MTAwMDAwWjBjMQswCQYDVQQGEwJCRTEZ # MBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEWMBQGA1UECxMNT2JqZWN0U2lnbiBD # QTEhMB8GA1UEAxMYR2xvYmFsU2lnbiBPYmplY3RTaWduIENBMIIBIjANBgkqhkiG # 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsLHygABwzuzDjLSX7cYJjCZvid9nWYHP3hQT # TMKxReJTdUH6BzZvuhFwKJR8bXK9BxUlZToJ/4Xc+nteN4c45MdLCICYnorNWAkC # wMMBSZZYiIkmWfVtxrnB+xgl7dhiTsoKbF1w787TmykLCcb27rYW1DxUjsxd4K/b # 3SMJMnsygRZiCgbLes80IbZvNraxzsuaKTVAPp1YfP+tgpj6uNWJyjXdy81XBsub # 5L+UqICYX3eW8Lbnq3R5QCGmY+nQB5G9hTi0rpasof8Uc9qlRbhNhs4qPO/U3ygO # damoiBPC5Hxgk/IlzAOEl+ZOtp8t1rWLNDyr1Tg6yD3EsfmUzQIDAQABo4IBZzCC # AWMwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYE # FNJb80smS6Ww5139Vn/28S44TlOgMEoGA1UdIARDMEEwPwYJKwYBBAGgMgEyMDIw # MAYIKwYBBQUHAgEWJGh0dHA6Ly93d3cuZ2xvYmFsc2lnbi5uZXQvcmVwb3NpdG9y # eTA5BgNVHR8EMjAwMC6gLKAqhihodHRwOi8vY3JsLmdsb2JhbHNpZ24ubmV0L3By # aW1vYmplY3QuY3JsME4GCCsGAQUFBwEBBEIwQDA+BggrBgEFBQcwAoYyaHR0cDov # L3NlY3VyZS5nbG9iYWxzaWduLm5ldC9jYWNlcnQvUHJpbU9iamVjdC5jcnQwEQYJ # YIZIAYb4QgEBBAQDAgABMBMGA1UdJQQMMAoGCCsGAQUFBwMDMB8GA1UdIwQYMBaA # FBVReRp8DFn52s3YxDoTmsl4LX9NMA0GCSqGSIb3DQEBBQUAA4IBAQAeavNt9I6p # Iv5wCGUuoV2rMzDdbHj6S+qtxY3sEHpqxViXOWuS85HiDKcoHNFddo6LB3wTb63E # NkOzwbwxWc8YONijO87/ymdYv+DxrGE+ojsevAJbQaxEa/Um8+1eqGX2ymWmP8r1 # d+ulhipYKVb4vhYQQOnS/FcsY2E3ZiU5IC4HA6A2AyWUvXzrftOjwsV2FnUwkrn/ # dkE1IWjRDl5cjsMDYOaAQPzAXaJUbm6SZ6eBEoeioyvbt03/5NXH5QXm1fGu/M1m # GCHzPkfJ5ZVCYSydJoCyD6g9DsmneN9udIwsRvZy6TxkayhVxEtkM8t4VBM48NVx # BtQ+DQo1DuCzMYIBkjCCAY4CAQEwcjBjMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQ # R2xvYmFsU2lnbiBudi1zYTEWMBQGA1UECxMNT2JqZWN0U2lnbiBDQTEhMB8GA1UE # AxMYR2xvYmFsU2lnbiBPYmplY3RTaWduIENBAgsBAAAAAAEeRkCdNjAJBgUrDgMC # GgUAoHgwGAYKKwYBBAGCNwIBDDEKMAigAoAAoQKAADAZBgkqhkiG9w0BCQMxDAYK # KwYBBAGCNwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAjBgkqhkiG # 9w0BCQQxFgQUoCdkwMl0ES8CZsg17ivyqxTyq3AwDQYJKoZIhvcNAQEBBQAEgYDD # fnDc8c/yFATC3FIr+g5NtOSXGZt8VNpRxdg6dQQlPnWxqZKs4mxzZpwwP1Q/dcEA # 5A2arDbXk+gT4FTtq0hbWF1QxzCC9ThiMyE7pkcge8/v/5eHlGetUij08qyrYne+ # KQ0yFUr4uCM+FDZzLX7L6bfuDpF2mYa8+eGpwjm19w== # SIG # End signature block
combined_dataset/train/non-malicious/sample_53_11.ps1
sample_53_11.ps1
param ( [Parameter(Mandatory)][string]$projectContext, [Parameter(Mandatory)][string]$projectModels, [Parameter(Mandatory)][string]$provider, [Parameter(Mandatory)][string]$projectWeb, [Parameter(Mandatory)][string]$nameContext, [Parameter(Mandatory)][string]$connection, [Parameter(Mandatory)][string]$ProjectCRA ) cls Write-host "starting " try{ # dotnet tool update --global dotnet-ef --version 8.0.0 #dotnet tool restore } catch{ } dotnet tool list -g #Remove-Item -LiteralPath $projectModels -Force -Recurse -ErrorAction SilentlyContinue #Remove-Item -LiteralPath $projectContext -Force -Recurse -ErrorAction SilentlyContinue Write-Host "search for CRA in $ProjectCRA" $projectsFull = gci -Path $ProjectCRA -File -Filter *.csproj | Select-Object Fullname | Select-Object -First 1 Write-Host "found project data" $project = $projectsFull.Fullname $pathToModels = "../$ext_safeprojectname$.crats/src/Admin/Generated/Models/"+$nameContext $pathToContext= "../$ext_safeprojectname$.crats/src/Admin/Generated/DB/"+$nameContext Write-Host "pathToModels" $pathToModels function Generate{ param ( [Parameter(Mandatory)] [string]$nameWhatToGenerate, [Parameter(Mandatory)] [string]$paramPathToGenerated, [Parameter(Mandatory)] [string]$paramProjectToCompile ) Write-Output "Generate compile " $paramProjectToCompile "and output to " $paramPathToGenerated $pathFolder = [System.IO.Path]::GetDirectoryName($paramProjectToCompile) Write-Output "start copying folder templates to " $pathFolder $pathTemplates = [System.IO.Path]::Combine($pathFolder,"CodeTemplates") Write-Host "verify " $pathTemplates if (Test-Path -Path $pathTemplates) { Write-Host "delete " $pathTemplates Remove-Item -LiteralPath $pathTemplates -Force -Recurse } #New-item �itemtype directory $pathTemplates $pathTemplatesToCopy = [System.IO.Path]::Combine($pathFolder,"GeneratorTemplates",$nameWhatToGenerate,"CodeTemplates") Write-Host "copy from " $pathTemplatesToCopy Copy-Item -Path $pathTemplatesToCopy -Destination $pathFolder -Recurse $pathToModels = $paramPathToGenerated + "Models/"+$nameContext $pathToContext= $paramPathToGenerated + "DB/"+$nameContext Write-Host $connection # https://docs.microsoft.com/ro-ro/ef/core/managing-schemas/scaffolding?tabs=dotnet-core-cli dotnet ef dbcontext scaffold $connection --data-annotations -p $project -s $project $provider -v -f --no-pluralize --no-onconfiguring --use-database-names --context $nameContext --context-namespace Generated --namespace Generated --context-dir $pathToContext --output-dir $pathToModels --prefix-output --force --json #--no-build if (Test-Path -Path $pathTemplates) { Write-Host "delete " $pathTemplates Remove-Item -LiteralPath $pathTemplates -Force -Recurse } } Generate "Models" "../$ext_safeprojectname$.Models/Generated/" $project Generate "Context" "../$ext_safeprojectname$.Context/Generated/" $project Generate "Controllers" "../$ext_safeprojectname$.Controllers/Generated/" $project # Generate "crats" "../$ext_safeprojectname$.crats/src/Admin/Generated/" $project # Generate "angular" "../ExampleAngular/src/app/Admin/Generated/" $project Generate "blazorList" "../$ext_safeprojectname$.Blazor/Pages/Generated/" $project Generate "blazorRow" "../$ext_safeprojectname$.Blazor/Pages/Generated/" $project #blazor do not admit lowercase razor files $TextInfo = (Get-Culture).TextInfo get-childitem -Recurse ../$ext_safeprojectname$.Blazor/Pages/Generated/ -Filter *.razor | foreach { $NewName = $TextInfo.ToTitleCase($_); ren $_.FullName $NewName } return #Write-Host "search for csproj model in $projectModels" # #$projectsFull = gci -Path $projectModels -File -Filter *.csproj | Select-Object Fullname | Select-Object -First 1 # # #$project = $projectsFull.Fullname #Write-Host "found project $project " #$pathToModels = "Generated/Models/"+$nameContext #$pathToContext= "Generated/Context/"+$nameContext #Write-Host "pathToModels" $pathToModels # # # ## https://docs.microsoft.com/ro-ro/ef/core/managing-schemas/scaffolding?tabs=dotnet-core-cli # dotnet ef dbcontext scaffold $connection --data-annotations -p $project -s $project $provider -v -f --no-pluralize --no-onconfiguring --use-database-names --context $nameContext --context-namespace Generated --namespace Generated --context-dir $pathToContext --output-dir $pathToModels --prefix-output --force --json #--no-build # #Write-Host "search for csproj context in $projectContext" # #$projectsFull = gci -Path $projectContext -File -Filter *.csproj | Select-Object Fullname | Select-Object -First 1 # # #$project = $projectsFull.Fullname #Write-Host "found project context $project " #$pathToModels = "Generated/Models/"+$nameContext #$pathToContext= "Generated/Context/"+$nameContext # dotnet ef dbcontext scaffold $connection --data-annotations -p $project -s $project $provider -v -f --no-pluralize --no-onconfiguring --use-database-names --context $nameContext --context-namespace Generated --namespace Generated --context-dir $pathToContext --output-dir $pathToModels --prefix-output --force --json # # # #Write-Host "search for csproj webapi in $projectWeb" # #$projectsFull = gci -Path $projectWeb -File -Filter *.csproj | Select-Object Fullname | Select-Object -First 1 # # #$project = $projectsFull.Fullname #Write-Host "found project $project " #$pathToModels = "Generated/"+$nameContext #$pathToContext= "Generated/Context/"+$nameContext # #dotnet ef dbcontext scaffold $connection --data-annotations -p $project -s $project $provider -v -f --no-pluralize --no-onconfiguring --use-database-names --context $nameContext --context-namespace Generated --namespace Generated --context-dir $pathToContext --output-dir $pathToModels --prefix-output --force --json #--no-build #
combined_dataset/train/non-malicious/USB Script backup_2.ps1
USB Script backup_2.ps1
<# .SYNOPSIS Backup-ToUSB.ps1 (Version 2.2, 9 Jan 2012) .DESCRIPTION This script will backup recently changed *.ps1,*.psm1,*.psd1 files from any selected folder (default is $pwd) to any number of inserted USB devices, on which an archive folder 'PSarchive' will be created if it does not already exist. As a USB hard disk is a Type 3 device (similar to the system disk), use the -Unit D switch (drive letter 'D' for example) to distinguish such a unit and add it to the list of selected devices. .EXAMPLE Invoke-Expression ".\\Backup-ToUsb.ps1 -Unit D $args" Add this line in 'function Backup' in $profile and it will add the USB Hard Disk 'D' as the standard backup device. .EXAMPLE .\\Backup-ToUSB.ps1 -type ps1 -v Select *.ps1 files to be archived. 'Verbose' will display the name of each file processed. Using the '-Debug' switch shows the time difference that has tagged any file for archive. .NOTES The author may be contacted via www.SeaStarDevelopment.Bravehost.com #> param ([String]$types = 'ps1', [String]$folder = $pwd, [String]$unit = $null, [Switch]$debug, [Switch]$verbose) if ($verbose) { $verbosePreference = 'Continue' } if ($debug) { $debugPreference = 'Continue' } $drive = '-<BLANK>-' if ($types -notmatch '^ps1|psd1|psm1|ps\\*$') { #Adjust to suit. Write-Warning "Invalid filetype ($types): ps1, psm1, psd1 only." exit 1 } if (!(Test-path $folder -pathType Container )) { [System.Media.SystemSounds]::Hand.Play() Write-Warning "$folder is not a directory - resubmit." exit 3 } $filter = 'DriveType = 2' if ($unit -match '^[d-z]$') { #Allow any single letter drive unit here. $filter = "DriveType = 2 OR (DriveType = 3 AND DeviceID = '" + "$unit" + ":')" } function copyFile ([string]$value) { Copy-Item -Path $value -Destination $newFolder -Force Write-Verbose "--> Archiving file: $value" $SCRIPT:files++ } Get-WMIObject Win32_LogicalDisk -filter $filter | Select-Object VolumeName, DriveType, FreeSpace, DeviceID | Where-Object {$_.VolumeName -ne $null} | foreach { $vol = $_.VolumeName $drive = $_.DeviceID + '\\' $type = $_.DriveType [int]$free = $_.FreeSpace / 1MB Write-Verbose "Scanning USB devices - Drive = [$drive] Name = $vol, Free = $free Mb" if (!(Test-Path $drive)) { Write-Warning "Error on drive $drive - restart." [System.Media.SystemSounds]::Hand.Play() exit 4 } [int]$SCRIPT:files = 0 #Reset counter for each new drive. $newFolder = $drive + "PSarchive" #Check if folder exists. if (!(Test-Path $newFolder)) { New-Item -path ($drive) -name PSarchive -type directory | Out-Null } (Get-ChildItem $folder -filter "*.$types") | foreach { $checkFile = Join-Path ($drive + 'PSArchive') $_ if (Test-path $checkFile) { $lwtHdd = $_.LastWriteTime #HDD time last written. $lwtUsb = (Get-Item $checkFile).LastWriteTime if ($lwtHdd -gt $lwtUsb) { Write-Debug "(HDD) $lwtHdd (USB) $LwtUsb $_" copyFile $_ } } else { #New file, so archive it anyway. Write-Debug "(HDD) $($_.LastWriteTime) (USB Archiving new file) $_" copyFile $_ } } $print = "Backup to USB drive [{0}] (Volume = {2}) completed; {1} files copied." -f $drive, $SCRIPT:files, $vol Write-Host "--> $print" } if ($drive -eq '-<BLANK>-') { [System.Media.SystemSounds]::Asterisk.Play() Write-Warning "No USB drive detected - Insert a device and resubmit." }
combined_dataset/train/non-malicious/sample_42_70.ps1
sample_42_70.ps1
ConvertFrom-StringData @' FailoverClustersModuleRequired=De vereiste PowerShell-module (FailoverClusters) is niet gevonden. Gebruik het hulpprogramma Functies en onderdelen om het volgende te installeren: Remote Server Administration Tools | Beheerprogramma's voor onderdelen | Hulpprogramma's voor failoverclustering | Failovercluster-module voor Windows PowerShell. '@ # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC/eLhpQOjd6B4G # vGnLyz06470id5R1LDs4Y2i5OMskL6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPkYYcnMtogX66LrvAMPMfR9 # ZWEgOyqFS6DlerNsjpHJMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEADexZkZ7dColGfHU8PIAHrpTgT9/KQR4zhHycYwmJXL2/jLavhBSOZBX0 # OJCbkh9ApjP0PE15/UZBsLlCvfnOXnWSMxOi90ND1/COiqjbHXd3Ic4dHmOu+O0f # L67kRb6fuhqk/qSLsmSxli2DSwoucT867eyrPNTSHYBN1onC0YDnvlreEqPm1LOf # X348xgSeQ1DoqDixXRoXP05ikYqQkMEgF5mrk7VWM31ulAAyVTosuXc/cR+8lHwI # F1yK5RZHYJl51UL3J2Hcxx6FpXGtRbhGLxi39SctYH2w1Baf885uAz7B1o4wCEWC # DkmeICuKeOE3zOMOjVxypIQ0G8lHjKGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAbltmfW1fna4Y9cO1lbFlmcyZ/V2ayRaurzUosVbPwmAIGZa6C/0pe # GBMyMDI0MDEyMjIxMzE1OS4zODNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOlZAXgwIhgPMjAyNDAxMjIyMzAwMDhaGA8yMDI0MDEyMzIzMDAwOFowdjA8Bgor # BgEEAYRZCgQBMS4wLDAKAgUA6VkBeAIBADAJAgEAAgEGAgH/MAcCAQACAhFNMAoC # BQDpWlL4AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEASXzy0QumYD5FJty8 # CaDX5T5aA/+aFNaT3pHiTpwJtjl3YisVMK9spV4xRtiMCt1N1iNFLsvmBdcl3UwJ # jbK/5DWZZjPyUEph8Qon/GfrdC35ZDhTI8L93HwuxbYgD+VwNrsDmZGT2gewGnLg # K5pYatQM1AWj+dtBluuU+3gqzVUxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd6eSJ6WnyhEPQABAAAB3jANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCAutDiOwO3acDYjsKHbuy1gXkTf6H/HO7q3NDBqx90WIjCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EII4+I58NwV4QEEkCf+YLcyCtPnD9TbPzUtgPjgdz # fh17MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHe # nkielp8oRD0AAQAAAd4wIgQgYj8w3kfC0Jvs9rCNyXm8xM06hS2hsBx8v5ACk2bu # InAwDQYJKoZIhvcNAQELBQAEggIAHfqgsekmMdemZkKLrnJtXacWNrQw592xOZ18 # 0wwoFW2mvB31sBNQT85CWaFEheHcm1uGiWR9U8c4nl/siQSpfV5wSg9zF6eHC1zH # 8wH9TsYM8y8i2kPYDDU3W46JLc0xW7JUkOGh2MYTJ2THyIpf28jRshFzi9HW2Bxf # slCVqUTM/nCJ/CSQuvzxX5V7eXUhVun+jBV0DWosJe3292i9Wyra/qtoWmTsrbNH # NC4If7Lo4XKIUVg9ePGoVsgd+MdrFoxSGQlGM8rZGXMLlIVAyqtRm0gkzPfZ5VBb # +mBdrClAC7FZFZjrus/yjvPx1+IdWygth6aKJH369Z+5jnC5cCX5lmnaFZY3cwCH # cyqewlf8JCFh6jM8adI9HmG7Cf6atIS5Q12hbemH3BQUs6imzMF/8ujxL4zWNne8 # +Bie4+X8bKdACf3Ydtqwk/ZvxoBn39uGBnSYkZC1jhN251F/GValz0SHHCZDLPnP # nPrZlLhI2luOz8gGikOaNPJHfZDbWsB53AuXWPg61KBwAma7ZZopOaDwLQktkp1L # egru0rLMYRr4yHyGe8bH6QTfah1hsACBscA3VUuBiVR24vi4m8rFAC7/UrCSh9zc # CYiN6lsSFbVF+YsUuli2oMLq2//2+g/1y25+eAiUxZwhJiLu0DPyxpXgn0/QvcCm # 1AVmdt8= # SIG # End signature block
combined_dataset/train/non-malicious/270.ps1
270.ps1
function Get-Uptime { [CmdletBinding()] PARAM ( [Parameter( ParameterSetName = "Main", ValueFromPipeline = $True, ValueFromPipelineByPropertyName = $True)] [Alias("CN", "__SERVER", "PSComputerName")] [String[]]$ComputerName=$env:COMPUTERNAME, [Parameter(ParameterSetName = "Main")] [Alias("RunAs")] [System.Management.Automation.Credential()] $Credential = [System.Management.Automation.PSCredential]::Empty, [Parameter(ParameterSetName = "CimSession")] [Microsoft.Management.Infrastructure.CimSession[]]$CimSession ) BEGIN { function Get-DefaultMessage { PARAM ($Message) $DateFormat = Get-Date -Format 'yyyy/MM/dd-HH:mm:ss:ff' $FunctionName = (Get-Variable -Scope 1 -Name MyInvocation -ValueOnly).MyCommand.Name Write-Output "[$DateFormat][$FunctionName] $Message" } } PROCESS { IF ($PSBoundParameters['CimSession']) { FOREACH ($Cim in $CimSession) { $CIMComputer = $($Cim.ComputerName).ToUpper() TRY { $CIMSplatting = @{ Class = "Win32_OperatingSystem" CimSession = $Cim ErrorAction = 'Stop' ErrorVariable = "ErrorProcessGetCimInstance" } Write-Verbose -Message (Get-DefaultMessage -Message "$CIMComputer - Get-Uptime") $CimResult = Get-CimInstance @CIMSplatting $Uptime = New-TimeSpan -Start $($CimResult.lastbootuptime) -End (get-date) $Properties = @{ ComputerName = $CIMComputer Days = $Uptime.days Hours = $Uptime.hours Minutes = $Uptime.minutes Seconds = $Uptime.seconds LastBootUpTime = $CimResult.lastbootuptime } New-Object -TypeName PSObject -Property $Properties } CATCH { Write-Warning -Message (Get-DefaultMessage -Message "$CIMComputer - Something wrong happened") IF ($ErrorProcessGetCimInstance) { Write-Warning -Message (Get-DefaultMessage -Message "$CIMComputer - Issue with Get-CimInstance") } Write-Warning -Message $Error[0].Exception.Message } FINALLY { $CIMSplatting.Clear() | Out-Null } } } ELSE { FOREACH ($Computer in $ComputerName) { $Computer = $Computer.ToUpper() TRY { Write-Verbose -Message (Get-DefaultMessage -Message "$Computer - Test-Connection") IF (Test-Connection -Computer $Computer -count 1 -quiet) { $Splatting = @{ Class = "Win32_OperatingSystem" ComputerName = $Computer ErrorAction = 'Stop' ErrorVariable = 'ErrorProcessGetWmi' } IF ($PSBoundParameters['Credential']) { $Splatting.credential = $Credential } Write-Verbose -Message (Get-DefaultMessage -Message "$Computer - Getting Uptime") $result = Get-WmiObject @Splatting $HumanTimeFormat = $Result.ConvertToDateTime($Result.Lastbootuptime) $Uptime = New-TimeSpan -Start $HumanTimeFormat -End $(get-date) $Properties = @{ ComputerName = $Computer Days = $Uptime.days Hours = $Uptime.hours Minutes = $Uptime.minutes Seconds = $Uptime.seconds LastBootUpTime = $CimResult.lastbootuptime } New-Object -TypeName PSObject -Property $Properties } } CATCH { Write-Warning -Message (Get-DefaultMessage -Message "$$Computer - Something wrong happened") IF ($ErrorProcessGetWmi) { Write-Warning -Message (Get-DefaultMessage -Message "$Computer - Issue with Get-WmiObject") } Write-Warning -MEssage $Error[0].Exception.Message } FINALLY { $Splatting.Clear() } } } } }
combined_dataset/train/non-malicious/sample_64_41.ps1
sample_64_41.ps1
<ResourceDictionary xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" xmlns:layoutToolkit="clr-namespace:System.Windows.Controls;assembly=System.Windows.Controls.Layout.Toolkit" xmlns:layoutPrimitivesToolkit="clr-namespace:System.Windows.Controls.Primitives;assembly=System.Windows.Controls.Layout.Toolkit"> <!-- Resource dictionary entries should be defined here. --> <Style x:Key="AccordionItemStyle" TargetType="layoutToolkit:AccordionItem"> <Setter Property="BorderThickness" Value="1"/> <Setter Property="BorderBrush" Value="{x:Null}"/> <Setter Property="Margin" Value="0"/> <Setter Property="Padding" Value="0"/> <Setter Property="HorizontalAlignment" Value="Stretch"/> <Setter Property="VerticalAlignment" Value="Stretch"/> <Setter Property="HorizontalContentAlignment" Value="Left"/> <Setter Property="VerticalContentAlignment" Value="Top"/> <Setter Property="IsTabStop" Value="False"/> <Setter Property="FontWeight" Value="Bold"/> <Setter Property="Template"> <Setter.Value> <ControlTemplate TargetType="layoutToolkit:AccordionItem"> <Grid HorizontalAlignment="{TemplateBinding HorizontalAlignment}" VerticalAlignment="{TemplateBinding VerticalAlignment}" Background="{TemplateBinding Background}"> <VisualStateManager.VisualStateGroups> <VisualStateGroup x:Name="CommonStates"> <VisualStateGroup.Transitions> <VisualTransition GeneratedDuration="0"/> </VisualStateGroup.Transitions> <VisualState x:Name="Normal"/> <VisualState x:Name="Pressed"/> <VisualState x:Name="MouseOver"/> <VisualState x:Name="Disabled"/> </VisualStateGroup> <VisualStateGroup x:Name="FocusStates"> <VisualState x:Name="Focused"/> <VisualState x:Name="Unfocused"/> </VisualStateGroup> <VisualStateGroup x:Name="ExpansionStates"> <VisualStateGroup.Transitions> <VisualTransition GeneratedDuration="0"/> </VisualStateGroup.Transitions> <VisualState x:Name="Collapsed"> <Storyboard> <DoubleAnimationUsingKeyFrames BeginTime="00:00:00" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(ExpandableContentControl.Percentage)"> <SplineDoubleKeyFrame KeyTime="00:00:00.3" Value="0" KeySpline="0.2,0,0,1"/> </DoubleAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames BeginTime="00:00:00.3" Duration="00:00:00" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(UIElement.Visibility)"> <DiscreteObjectKeyFrame KeyTime="00:00:00"> <DiscreteObjectKeyFrame.Value> <Visibility>Collapsed</Visibility> </DiscreteObjectKeyFrame.Value> </DiscreteObjectKeyFrame> </ObjectAnimationUsingKeyFrames> </Storyboard> </VisualState> <VisualState x:Name="Expanded"> <Storyboard> <DoubleAnimationUsingKeyFrames BeginTime="00:00:00" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(ExpandableContentControl.Percentage)"> <SplineDoubleKeyFrame KeyTime="00:00:00.3" Value="1" KeySpline="0.2,0,0,1"/> </DoubleAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames BeginTime="00:00:00" Duration="00:00:00.0010000" Storyboard.TargetName="border" Storyboard.TargetProperty="(UIElement.Visibility)"> <DiscreteObjectKeyFrame KeyTime="00:00:00"> <DiscreteObjectKeyFrame.Value> <Visibility>Visible</Visibility> </DiscreteObjectKeyFrame.Value> </DiscreteObjectKeyFrame> </ObjectAnimationUsingKeyFrames> </Storyboard> </VisualState> </VisualStateGroup> <VisualStateGroup x:Name="LockedStates"> <VisualStateGroup.Transitions> <VisualTransition GeneratedDuration="0"/> </VisualStateGroup.Transitions> <VisualState x:Name="Locked"> <Storyboard> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpanderButton" Storyboard.TargetProperty="IsEnabled"> <DiscreteObjectKeyFrame KeyTime="0" Value="False"/> </ObjectAnimationUsingKeyFrames> </Storyboard> </VisualState> <VisualState x:Name="Unlocked"> <Storyboard> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpanderButton" Storyboard.TargetProperty="IsEnabled"> <DiscreteObjectKeyFrame KeyTime="0" Value="True"/> </ObjectAnimationUsingKeyFrames> </Storyboard> </VisualState> </VisualStateGroup> <VisualStateGroup x:Name="ExpandDirectionStates"> <VisualStateGroup.Transitions> <VisualTransition GeneratedDuration="0"/> </VisualStateGroup.Transitions> <VisualState x:Name="ExpandDown"> <Storyboard> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="rd1" Storyboard.TargetProperty="Height"> <DiscreteObjectKeyFrame KeyTime="0" Value="*"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="cd0" Storyboard.TargetProperty="Width"> <DiscreteObjectKeyFrame KeyTime="0" Value="*"/> </ObjectAnimationUsingKeyFrames> </Storyboard> </VisualState> <VisualState x:Name="ExpandUp"> <Storyboard> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpanderButton" Storyboard.TargetProperty="(Grid.Row)"> <DiscreteObjectKeyFrame KeyTime="0" Value="1"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(Grid.Row)"> <DiscreteObjectKeyFrame KeyTime="0" Value="0"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="rd0" Storyboard.TargetProperty="Height"> <DiscreteObjectKeyFrame KeyTime="0" Value="*"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="cd0" Storyboard.TargetProperty="Width"> <DiscreteObjectKeyFrame KeyTime="0" Value="*"/> </ObjectAnimationUsingKeyFrames> </Storyboard> </VisualState> <VisualState x:Name="ExpandLeft"> <Storyboard> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpanderButton" Storyboard.TargetProperty="(Grid.ColumnSpan)"> <DiscreteObjectKeyFrame KeyTime="0" Value="1"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(Grid.ColumnSpan)"> <DiscreteObjectKeyFrame KeyTime="0" Value="1"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpanderButton" Storyboard.TargetProperty="(Grid.RowSpan)"> <DiscreteObjectKeyFrame KeyTime="0" Value="2"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(Grid.RowSpan)"> <DiscreteObjectKeyFrame KeyTime="0" Value="2"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpanderButton" Storyboard.TargetProperty="(Grid.Column)"> <DiscreteObjectKeyFrame KeyTime="0" Value="1"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(Grid.Row)"> <DiscreteObjectKeyFrame KeyTime="0" Value="0"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="rd0" Storyboard.TargetProperty="Height"> <DiscreteObjectKeyFrame KeyTime="0" Value="*"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="cd0" Storyboard.TargetProperty="Width"> <DiscreteObjectKeyFrame KeyTime="0" Value="*"/> </ObjectAnimationUsingKeyFrames> </Storyboard> </VisualState> <VisualState x:Name="ExpandRight"> <Storyboard> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpanderButton" Storyboard.TargetProperty="(Grid.ColumnSpan)"> <DiscreteObjectKeyFrame KeyTime="0" Value="1"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(Grid.ColumnSpan)"> <DiscreteObjectKeyFrame KeyTime="0" Value="1"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpanderButton" Storyboard.TargetProperty="(Grid.RowSpan)"> <DiscreteObjectKeyFrame KeyTime="0" Value="2"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(Grid.RowSpan)"> <DiscreteObjectKeyFrame KeyTime="0" Value="2"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(Grid.Row)"> <DiscreteObjectKeyFrame KeyTime="0" Value="0"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="ExpandSite" Storyboard.TargetProperty="(Grid.Column)"> <DiscreteObjectKeyFrame KeyTime="0" Value="1"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="rd0" Storyboard.TargetProperty="Height"> <DiscreteObjectKeyFrame KeyTime="0" Value="*"/> </ObjectAnimationUsingKeyFrames> <ObjectAnimationUsingKeyFrames Duration="0" Storyboard.TargetName="cd1" Storyboard.TargetProperty="Width"> <DiscreteObjectKeyFrame KeyTime="0" Value="*"/> </ObjectAnimationUsingKeyFrames> </Storyboard> </VisualState> </VisualStateGroup> </VisualStateManager.VisualStateGroups> <Border x:Name="Background" CornerRadius="1,0,0,1" Padding="{TemplateBinding Padding}"> <Grid> <Grid.RowDefinitions> <RowDefinition x:Name="rd0" Height="Auto"/> <RowDefinition x:Name="rd1" Height="Auto"/> </Grid.RowDefinitions> <Grid.ColumnDefinitions> <ColumnDefinition x:Name="cd0"/> <ColumnDefinition x:Name="cd1" Width="Auto"/> </Grid.ColumnDefinitions> <layoutPrimitivesToolkit:AccordionButton x:Name="ExpanderButton" Background="{TemplateBinding Background}" FontFamily="{TemplateBinding FontFamily}" FontSize="{TemplateBinding FontSize}" FontStretch="{TemplateBinding FontStretch}" FontStyle="{TemplateBinding FontStyle}" FontWeight="{TemplateBinding FontWeight}" Foreground="{TemplateBinding Foreground}" HorizontalContentAlignment="{TemplateBinding HorizontalContentAlignment}" IsTabStop="True" Padding="0,0,0,0" VerticalContentAlignment="{TemplateBinding VerticalContentAlignment}" HorizontalAlignment="{TemplateBinding HorizontalAlignment}" Margin="0,0,0,0" Style="{TemplateBinding AccordionButtonStyle}" VerticalAlignment="{TemplateBinding VerticalAlignment}" Content="{TemplateBinding Header}" ContentTemplate="{TemplateBinding HeaderTemplate}" Grid.Row="0" IsChecked="{TemplateBinding IsSelected}"/> <Grid x:Name="border" HorizontalAlignment="{TemplateBinding HorizontalAlignment}" Margin="0,0,0,0" VerticalAlignment="{TemplateBinding VerticalAlignment}" Grid.Row="1" Visibility="Collapsed"> <Rectangle Fill="#FF333940" StrokeThickness="0"/> <layoutPrimitivesToolkit:ExpandableContentControl x:Name="ExpandSite" FontFamily="{TemplateBinding FontFamily}" FontSize="{TemplateBinding FontSize}" FontStretch="{TemplateBinding FontStretch}" FontStyle="{TemplateBinding FontStyle}" FontWeight="{TemplateBinding FontWeight}" Foreground="{TemplateBinding Foreground}" IsTabStop="False" Margin="0" Style="{TemplateBinding ExpandableContentControlStyle}" VerticalAlignment="Top" Content="{TemplateBinding Content}" ContentTemplate="{TemplateBinding ContentTemplate}" Percentage="0" RevealMode="{TemplateBinding ExpandDirection}" HorizontalContentAlignment="Stretch" VerticalContentAlignment="Stretch"/> </Grid> </Grid> </Border> </Grid> </ControlTemplate> </Setter.Value> </Setter> <Setter Property="Background" Value="#FFFFFF"/> </Style> </ResourceDictionary>
combined_dataset/train/non-malicious/sample_42_7.ps1
sample_42_7.ps1
# Downloading specified vulkan sdk and vulkan runtime # Touch this file needs update both WINDOWS_X64_BUILD_TAG WINDOWS_X64_TEST_TAG # This file needs run in administrator mode $env:VULKAN_SDK_VERSION="1.3.275.0" $ProgressPreference = "SilentlyContinue" # Save environment VULKAN_SDK_VERSION to system [System.Environment]::SetEnvironmentVariable('VULKAN_SDK_VERSION', "$env:VULKAN_SDK_VERSION", [System.EnvironmentVariableTarget]::Machine) $VULKAN_SDK_URL="https://sdk.lunarg.com/sdk/download/$env:VULKAN_SDK_VERSION/windows/VulkanSDK-$env:VULKAN_SDK_VERSION-Installer.exe" Write-Host "Downloading Vulkan-SDK $VULKAN_SDK_URL at:" Get-Date Invoke-WebRequest -Uri "$VULKAN_SDK_URL" -OutFile "${env:TMP}\vulkan_sdk.exe" | Out-Null Write-Host "Installing Vulkan-SDK at:" Get-Date Start-Process -NoNewWindow -Wait "${env:TMP}\vulkan_sdk.exe" -ArgumentList "--am --al -c in" if (!$?) { Write-Host "Failed to install Vulkan SDK" Exit 1 } Remove-Item "${env:TMP}\vulkan_sdk.exe" -Force $VULKAN_RUNTIME_URL="https://sdk.lunarg.com/sdk/download/$env:VULKAN_SDK_VERSION/windows/VulkanRT-$env:VULKAN_SDK_VERSION-Installer.exe" Write-Host "Downloading Vulkan-Runtime $VULKAN_RUNTIME_URL at:" Get-Date Invoke-WebRequest -Uri "$VULKAN_RUNTIME_URL" -OutFile "${env:TMP}\vulkan-runtime.exe" | Out-Null Write-Host "Installing Vulkan-Runtime at:" Get-Date Start-Process -NoNewWindow -Wait "${env:TMP}\vulkan-runtime.exe" -ArgumentList '/S' if (!$?) { Write-Host "Failed to install Vulkan-Runtime" Exit 1 } Remove-Item "${env:TMP}\vulkan-runtime.exe" -Force Write-Host "Installing Vulkan-Runtime finished at:" Get-Date
combined_dataset/train/non-malicious/3842.ps1
3842.ps1
function Get-RandomRegistryName { return 'reg' + (getAssetName) } function Get-RandomResourceGroupName { return 'rg' + (getAssetName) } function Get-RandomReplicationName { return 'rep' + (getAssetName) } function Get-RandomWebhookName { return 'wh' + (getAssetName) } function Get-ProviderLocation($provider) { if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) { $namespace = $provider.Split("/")[0] if($provider.Contains("/")) { $type = $provider.Substring($namespace.Length + 1) $location = Get-AzResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type} if ($location -eq $null) { return "West US" } else { return $location.Locations[0].ToLower() -replace '\s','' } } return "West US" } return "West US" } function Assert-Error { param([ScriptBlock] $script, [string] $message) $originalErrorCount = $error.Count $originalErrorActionPreference = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" try { &$script } finally { $ErrorActionPreference = $originalErrorActionPreference } $result = $Error[0] -like "*$($message)*" If(!$result) { Write-Output "expected error $($message), actual error $($Error[0])" } Assert-True {$result} $Error.Clear() }
combined_dataset/train/non-malicious/sample_11_36.ps1
sample_11_36.ps1
ConvertFrom-StringData @' id_dcdiag=Directory Server Diagnosis (DCDiag) id_dcdiagobtaining=Running DCDIAG.EXE tool to gather domain controller status information. id_dcdiagdnsobtaining=Running DCDIAG.EXE tool to gather domain controller DNS health information. id_dcdiagtopologyobtaining=Running DCDIAG.EXE tool to gather domain controller topology test. '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDD6IiFbUxE7DkG # RFkig4OyprCGUGrfv4UIYNYdoojPh6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKU3 # pu1/upQZlLlp31mBJY/kEjwXN/U+vC2Tf3Rsw9IZMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAN+fBBQXahA/vYzDTtQY01sCVD0Bk4ceqWD/n # Fvf79TBTOGy5OtUAA/E7Vv06uriynPM2dMpGTzcesQyAyuSBoVwe+cngyrnz8h8M # BCKWjOr6yI6hi8oZyagyOmPku2lSw2P4vPwtf1Tl1x4gsbOJMMii9RqVGrq8jdtZ # jtkfDJ2iAwKgxcGDBaLC9HhRjALCxjZrQidfELbcbzSlxfov/5IWeF+ZKCfvLtUm # RWkBRaxvy4UaBJsqLpn75t/rhq2mnlUG7JvbPZPEKe1o9p/pFe2vda2LRJxxS1ED # ctg+B9L25gozEuh2X9hGcVkUuRsHZKF/9hfO262hyZyWcfSbk6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBdpAltF+wu/J64Agq7Z770q2uopUxABmD9 # ojvih6KAxwIGZutwxmWyGBMyMDI0MTAyODExNDA0MC42NDNaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF # WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP # AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF # s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX # ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL # Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN # gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m # r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB # BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp # vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr # OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI # +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP # Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri # LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi # mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV # liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ # dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L # tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u # EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US # LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq # 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu # 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100 # DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0 # MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA # AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b # zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC # K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga # wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46 # vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW # YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQguWc6OVc6uZztmcTrrSVN1C6BBsu5bDwsP7pnirS2Ke8wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq # Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC # AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf # HyoaMA0GCSqGSIb3DQEBCwUABIICAIGYWsQc74QI+tyHGDRVSr0TKa9v+WzYrtsn # laCs0AiwPuARyIzrdDrJb5ZUtX6euG4Lqh+VqDdMeKjzl0OYvG5BVGo5P5SCP3RF # vQDaHB0kHD3glbOnwXfPaJILW+NzF+xGXGr98oDVcBt3g2Sd74ArSrdUf3zFsH+v # 8l3A8bANd684ipg1TFWZGtZZlfBLZpTe+ttLoZumOEcKAPQ4LhI4Y8zpwKz9KbYH # EX6YUM2b5smUsK+NN00vmAkjzpeFQuczi6RIGGFuAM287DqBsSqdsKTGlEJ53WV1 # u4pwwGygKn22BP6ZrcKBKXlX+a/HukIdffAuJeCjuCmbzdDll6P/+XojJtsH1WWP # uxcP9491NnL/bdxEJZcp98UQXUNNEKgPL9kmpyoaDVxlfqr47x6FqSVtoWSqTzEr # H/CdmsjYPFFa+Aj/YiIEYzV/v+edr1WFCjug+mEoarCoEpv7pS2Gy2MRMBI1k5Wm # nZ9LBfJ2uv2ZvrXePRthjQHvBYTPJ3FRvg9ue3woykYneEH5GU+zVv4ZtuvYHdjK # rAEuAxdrMfH1EpaApEgaGCI3AJ/NrugBBK/U4jbGddlWYTt8WtNLq/5oLaVqxHmk # uR+PSPL1GfPbXq+I3779nVftfoLrTN7hUdEJ5K06x4q4w1s0vr5AqJ4vIRXWJ5+5 # GKCx21NQ # SIG # End signature block
combined_dataset/train/non-malicious/3603.ps1
3603.ps1
function Get-AzureRmSecurityWorkspaceSetting-SubscriptionScope { Set-AzureRmSecurityWorkspaceSetting-SubscriptionLevelResource $workspaceSettings = Get-AzSecurityWorkspaceSetting Validate-WorkspaceSettings $workspaceSettings } function Get-AzureRmSecurityWorkspaceSetting-SubscriptionLevelResource { Set-AzureRmSecurityWorkspaceSetting-SubscriptionLevelResource $workspaceSettings = Get-AzSecurityWorkspaceSetting -Name "default" Validate-WorkspaceSettings $workspaceSettings } function Get-AzureRmSecurityWorkspaceSetting-ResourceId { $workspaceSetting = Set-AzureRmSecurityWorkspaceSetting-SubscriptionLevelResource $fetchedWorkspaceSettings = Get-AzSecurityWorkspaceSetting -ResourceId $workspaceSetting.Id Validate-WorkspaceSetting $fetchedWorkspaceSettings } function Set-AzureRmSecurityWorkspaceSetting-SubscriptionLevelResource { $rgName = Get-TestResourceGroupName $wsName = "securityuserws" return Set-AzSecurityWorkspaceSetting -Name "default" -Scope "/subscriptions/487bb485-b5b0-471e-9c0d-10717612f869" -WorkspaceId "/subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/mainws/providers/microsoft.operationalinsights/workspaces/securityuserws" } function Remove-AzureRmSecurityWorkspaceSetting-SubscriptionLevelResource { Set-AzureRmSecurityWorkspaceSetting-SubscriptionLevelResource Remove-AzSecurityWorkspaceSetting -Name "default" } function Validate-WorkspaceSettings { param($workspaceSettings) Assert-True { $workspaceSettings.Count -gt 0 } Foreach($workspaceSetting in $workspaceSettings) { Validate-WorkspaceSetting $workspaceSetting } } function Validate-WorkspaceSetting { param($workspaceSetting) Assert-NotNull $workspaceSetting }
combined_dataset/train/non-malicious/sample_65_95.ps1
sample_65_95.ps1
# # Module manifest for module 'OCI.PSModules.Databasemigration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Databasemigration.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '75c40824-63ca-4f44-8abc-b6d5cb895ad8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Databasemigration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemigration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabasemigrationMigrationObjects', 'Connect-OCIDatabasemigrationionDiagnostics', 'Get-OCIDatabasemigrationAdvisorReport', 'Get-OCIDatabasemigrationAgent', 'Get-OCIDatabasemigrationAgentImagesList', 'Get-OCIDatabasemigrationAgentsList', 'Get-OCIDatabasemigrationConnection', 'Get-OCIDatabasemigrationConnectionsList', 'Get-OCIDatabasemigrationExcludedObjectsList', 'Get-OCIDatabasemigrationJob', 'Get-OCIDatabasemigrationJobOutputContent', 'Get-OCIDatabasemigrationJobOutputsList', 'Get-OCIDatabasemigrationJobsList', 'Get-OCIDatabasemigrationMigration', 'Get-OCIDatabasemigrationMigrationObjectsList', 'Get-OCIDatabasemigrationMigrationObjectTypesList', 'Get-OCIDatabasemigrationMigrationsList', 'Get-OCIDatabasemigrationWorkRequest', 'Get-OCIDatabasemigrationWorkRequestErrorsList', 'Get-OCIDatabasemigrationWorkRequestLogsList', 'Get-OCIDatabasemigrationWorkRequestsList', 'Invoke-OCIDatabasemigrationCloneMigration', 'Invoke-OCIDatabasemigrationEvaluateMigration', 'Invoke-OCIDatabasemigrationResumeJob', 'Invoke-OCIDatabasemigrationRetrieveSupportedPhases', 'Move-OCIDatabasemigrationAgentCompartment', 'Move-OCIDatabasemigrationConnectionCompartment', 'Move-OCIDatabasemigrationMigrationCompartment', 'New-OCIDatabasemigrationConnection', 'New-OCIDatabasemigrationMigration', 'Remove-OCIDatabasemigrationAgent', 'Remove-OCIDatabasemigrationConnection', 'Remove-OCIDatabasemigrationJob', 'Remove-OCIDatabasemigrationMigration', 'Remove-OCIDatabasemigrationMigrationObjects', 'Start-OCIDatabasemigrationMigration', 'Stop-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationAgent', 'Update-OCIDatabasemigrationConnection', 'Update-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationMigration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemigration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1466.ps1
1466.ps1
function Set-ReleaseNotesReleaseDate { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $ManifestPath, [Parameter(Mandatory=$true)] [string] $ReleaseNotesPath ) Set-StrictMode -Version 'Latest' $manifest = Test-ModuleManifest -Path $ManifestPath if( -not $manifest ) { return } $setHeader = $false $releaseNotes = Get-Content -Path $ReleaseNotesPath | ForEach-Object { if( $_ -match '^ { $setHeader = $true return " } return $_ } if( $setHeader ) { $releaseNotes | Set-Content -Path $releaseNotesPath } }
combined_dataset/train/non-malicious/sample_20_71.ps1
sample_20_71.ps1
# # Module manifest for module 'OCI.PSModules.Opensearch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opensearch.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b54b41d9-dd21-465f-ac14-72727ada540b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opensearch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opensearch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Backup-OCIOpensearchCluster', 'Get-OCIOpensearchCluster', 'Get-OCIOpensearchClusterBackup', 'Get-OCIOpensearchClusterBackupsList', 'Get-OCIOpensearchClustersList', 'Get-OCIOpensearchVersionsList', 'Get-OCIOpensearchWorkRequest', 'Get-OCIOpensearchWorkRequestErrorsList', 'Get-OCIOpensearchWorkRequestLogsList', 'Get-OCIOpensearchWorkRequestsList', 'Invoke-OCIOpensearchOpensearchClusterRestore', 'Invoke-OCIOpensearchResizeOpensearchClusterHorizontal', 'Invoke-OCIOpensearchResizeOpensearchClusterVertical', 'New-OCIOpensearchCluster', 'Remove-OCIOpensearchCluster', 'Remove-OCIOpensearchClusterBackup', 'Update-OCIOpensearchCluster', 'Update-OCIOpensearchClusterBackup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opensearch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3505.ps1
3505.ps1
function Test-GetApplicationInsightsContinuousExport { $rgname = Get-ApplicationInsightsTestResourceName; try { $appName = "app" + $rgname; $loc = Get-ProviderLocation ResourceManagement; $kind = "web"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzApplicationInsights -ResourceGroupName $rgname -Name $appName -Location $loc -Kind $kind; $dummySubId = "50359d91-7b9d-4823-85af-eb298a61ba97"; $dummyStorageAccount = "dummysa"; $dummyContainer = "dummycontianer"; $destinatinStorageAccountId = "/subscriptions/" + $dummySubId + "/resourceGroups/" + $rgname + "/providers/Microsoft.Storage/storageAccounts/"+ $dummyStorageAccount; $destinationStorageAccountSASToken = "https://"+ $dummyStorageAccount + ".blob.core.windows.net/"+$dummyContainer + "?sv=2015-04-05&sr=c&sig=xxxxxxxxx"; $documentTypes = @("Request", "Custom Event"); $continuousExport = New-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -DocumentType $documentTypes -StorageAccountId $destinatinStorageAccountId -StorageLocation $loc -StorageSASUri $destinationStorageAccountSASToken; $continuousExport2 = Get-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -ExportId $continuousExport.ExportId; Assert-NotNull $continuousExport2 Assert-AreEqual "Request, Custom Event" $continuousExport2.DocumentTypes Assert-AreEqual $dummySubId $continuousExport2.DestinationStorageSubscriptionId Assert-AreEqual $loc $continuousExport2.DestinationStorageLocationId Assert-AreEqual $dummyContainer $continuousExport2.ContainerName $continuousExports = Get-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName; Assert-AreEqual 1 $continuousExports.count Assert-AreEqual "Request, Custom Event" $continuousExports[0].DocumentTypes Assert-AreEqual $dummySubId $continuousExports[0].DestinationStorageSubscriptionId Assert-AreEqual $loc $continuousExports[0].DestinationStorageLocationId Assert-AreEqual $dummyContainer $continuousExports[0].ContainerName Remove-AzApplicationInsights -ResourceGroupName $rgname -Name $appName; } finally { Clean-ResourceGroup $rgname } } function Test-NewApplicationInsightsContinuousExport { $rgname = Get-ApplicationInsightsTestResourceName; try { $appName = "app" + $rgname; $loc = Get-ProviderLocation ResourceManagement; $kind = "web"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzApplicationInsights -ResourceGroupName $rgname -Name $appName -Location $loc -Kind $kind; $dummySubId = "50359d91-7b9d-4823-85af-eb298a61ba97"; $dummyStorageAccount = "dummysa"; $dummyContainer = "dummycontianer"; $destinatinStorageAccountId = "/subscriptions/" + $dummySubId + "/resourceGroups/" + $rgname + "/providers/Microsoft.Storage/storageAccounts/"+ $dummyStorageAccount; $destinationStorageAccountSASToken = "https://"+ $dummyStorageAccount + ".blob.core.windows.net/"+$dummyContainer + "?sv=2015-04-05&sr=c&sig=xxxxxxxxx"; $documentTypes = @("Request", "Custom Event"); $continuousExport = New-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -DocumentType $documentTypes -StorageAccountId $destinatinStorageAccountId -StorageLocation $loc -StorageSASUri $destinationStorageAccountSASToken; Assert-NotNull $continuousExport Assert-AreEqual "Request, Custom Event" $continuousExport.DocumentTypes Assert-AreEqual $dummySubId $continuousExport.DestinationStorageSubscriptionId Assert-AreEqual $loc $continuousExport.DestinationStorageLocationId Assert-AreEqual $dummyContainer $continuousExport.ContainerName $continuousExport2 = Get-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -ExportId $continuousExport.ExportId; Assert-NotNull $continuousExport2 Assert-AreEqual "Request, Custom Event" $continuousExport2.DocumentTypes Assert-AreEqual $dummySubId $continuousExport2.DestinationStorageSubscriptionId Assert-AreEqual $loc $continuousExport2.DestinationStorageLocationId Assert-AreEqual $dummyContainer $continuousExport2.ContainerName Remove-AzApplicationInsights -ResourceGroupName $rgname -Name $appName; } finally { Clean-ResourceGroup $rgname } } function Test-RemoveApplicationInsightsContinuousExport { $rgname = Get-ApplicationInsightsTestResourceName; try { $appName = "app" + $rgname; $loc = Get-ProviderLocation ResourceManagement; $kind = "web"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzApplicationInsights -ResourceGroupName $rgname -Name $appName -Location $loc -Kind $kind; $dummySubId = "50359d91-7b9d-4823-85af-eb298a61ba97"; $dummyStorageAccount = "dummysa"; $dummyContainer = "dummycontianer"; $destinatinStorageAccountId = "/subscriptions/" + $dummySubId + "/resourceGroups/" + $rgname + "/providers/Microsoft.Storage/storageAccounts/"+ $dummyStorageAccount; $destinationStorageAccountSASToken = "https://"+ $dummyStorageAccount + ".blob.core.windows.net/"+$dummyContainer + "?sv=2015-04-05&sr=c&sig=xxxxxxxxx"; $documentTypes = @("Request", "Custom Event"); $continuousExport = New-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -DocumentType $documentTypes -StorageAccountId $destinatinStorageAccountId -StorageLocation $loc -StorageSASUri $destinationStorageAccountSASToken; $continuousExport2 = Get-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -ExportId $continuousExport.ExportId; Assert-NotNull $continuousExport2 Assert-AreEqual "Request, Custom Event" $continuousExport2.DocumentTypes Assert-AreEqual $dummySubId $continuousExport2.DestinationStorageSubscriptionId Assert-AreEqual $loc $continuousExport2.DestinationStorageLocationId Assert-AreEqual $dummyContainer $continuousExport2.ContainerName Remove-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -ExportId $continuousExport.ExportId; $continuousExports = Get-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName; Assert-AreEqual 0 $continuousExports.count; Remove-AzApplicationInsights -ResourceGroupName $rgname -Name $appName; } finally { Clean-ResourceGroup $rgname } } function Test-SetApplicationInsightsContinuousExport { $rgname = Get-ApplicationInsightsTestResourceName; try { $appName = "app" + $rgname; $loc = Get-ProviderLocation ResourceManagement; $kind = "web"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzApplicationInsights -ResourceGroupName $rgname -Name $appName -Location $loc -Kind $kind; $dummySubId = "50359d91-7b9d-4823-85af-eb298a61ba97"; $dummyStorageAccount = "dummysa"; $dummyContainer = "dummycontianer"; $destinatinStorageAccountId = "/subscriptions/" + $dummySubId + "/resourceGroups/" + $rgname + "/providers/Microsoft.Storage/storageAccounts/"+ $dummyStorageAccount; $destinationStorageAccountSASToken = "https://"+ $dummyStorageAccount + ".blob.core.windows.net/"+$dummyContainer + "?sv=2015-04-05&sr=c&sig=xxxxxxxxx"; $documentTypes = @("Request", "Custom Event"); $continuousExport = New-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -DocumentType $documentTypes -StorageAccountId $destinatinStorageAccountId -StorageLocation $loc -StorageSASUri $destinationStorageAccountSASToken; $continuousExport2 = Get-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -ExportId $continuousExport.ExportId; Assert-NotNull $continuousExport2 Assert-AreEqual "Request, Custom Event" $continuousExport2.DocumentTypes Assert-AreEqual $dummySubId $continuousExport2.DestinationStorageSubscriptionId Assert-AreEqual $loc $continuousExport2.DestinationStorageLocationId Assert-AreEqual $dummyContainer $continuousExport2.ContainerName $documentTypes = @("Request", "Custom Event", "Exception"); $continuousExport3 = Set-AzApplicationInsightsContinuousExport -ResourceGroupName $rgname -Name $appName -ExportId $continuousExport.ExportId -DocumentType $documentTypes -StorageAccountId $destinatinStorageAccountId -StorageLocation $loc -StorageSASUri $destinationStorageAccountSASToken; Assert-NotNull $continuousExport3 Assert-AreEqual "Request, Custom Event, Exception" $continuousExport3.DocumentTypes Assert-AreEqual $dummySubId $continuousExport3.DestinationStorageSubscriptionId Assert-AreEqual $loc $continuousExport3.DestinationStorageLocationId Assert-AreEqual $dummyContainer $continuousExport3.ContainerName Remove-AzApplicationInsights -ResourceGroupName $rgname -Name $appName; } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/1900.ps1
1900.ps1
if(-not ("netDumbster.smtp.SimpleSmtpServer" -as [type])) { Register-PackageSource -Name nuget.org -Location https://api.nuget.org/v3/index.json -ProviderName NuGet -ErrorAction SilentlyContinue $nugetPackage = "netDumbster" Install-Package -Name $nugetPackage -ProviderName NuGet -Scope CurrentUser -Force -Source 'nuget.org' -RequiredVersion 2.0.0.4 $dll = "$(Split-Path (Get-Package $nugetPackage).Source)\lib\netstandard2.0\netDumbster.dll" Add-Type -Path $dll } $DefaultInputObject = @{ From = "user01@example.com" To = "user02@example.com" Subject = "Subject $(Get-Date)" Body = "Body $(Get-Date)" SmtpServer = "127.0.0.1" } Describe "Send-MailMessage DRT Unit Tests" -Tags CI, RequireSudoOnUnix { BeforeAll { $server = [netDumbster.smtp.SimpleSmtpServer]::Start(25) function Read-Mail { param() if($server) { return $server.ReceivedEmail[0] } return $null } } BeforeEach { if($server) { $server.ClearReceivedEmail() } } AfterAll { if($server) { $server.Stop() } } $testCases = @( @{ Name = "with mandatory parameters" InputObject = $DefaultInputObject } @{ Name = "with ReplyTo" InputObject = @{ From = "user01@example.com" To = "user02@example.com" ReplyTo = "noreply@example.com" Subject = "Subject $(Get-Date)" Body = "Body $(Get-Date)" SmtpServer = "127.0.0.1" } } @{ Name = "with multiple To" InputObject = @{ From = "user01@example.com" To = "user02@example.com","user03@example.com","user04@example.com" Subject = "Subject $(Get-Date)" Body = "Body $(Get-Date)" SmtpServer = "127.0.0.1" } } @{ Name = "with multiple Cc" InputObject = @{ From = "user01@example.com" To = "user02@example.com" Cc = "user03@example.com","user04@example.com" Subject = "Subject $(Get-Date)" Body = "Body $(Get-Date)" SmtpServer = "127.0.0.1" } } @{ Name = "with multiple Bcc" InputObject = @{ From = "user01@example.com" To = "user02@example.com" Bcc = "user03@example.com","user04@example.com" Subject = "Subject $(Get-Date)" Body = "Body $(Get-Date)" SmtpServer = "127.0.0.1" } } @{ Name = "with No Subject" InputObject = @{ From = "user01@example.com" To = "user02@example.com" Body = "Body $(Get-Date)" SmtpServer = "127.0.0.1" } } ) It "Shows obsolete message for cmdlet" { $server | Should -Not -Be $null $powershell = [PowerShell]::Create() $null = $powershell.AddCommand("Send-MailMessage").AddParameters($testCases[0].InputObject).AddParameter("ErrorAction","SilentlyContinue") $powershell.Invoke() $warnings = $powershell.Streams.Warning $warnings.count | Should -BeGreaterThan 0 $warnings[0].ToString() | Should -BeLike "The command 'Send-MailMessage' is obsolete. *" } It "Can send mail message using named parameters <Name>" -TestCases $testCases { param($InputObject) $server | Should -Not -Be $null Send-MailMessage @InputObject -ErrorAction SilentlyContinue $mail = Read-Mail $mail.FromAddress | Should -BeExactly $InputObject.From $mail.ToAddresses.Count | Should -BeExactly ($InputObject.To.Count + $InputObject.Cc.Count + $InputObject.Bcc.Count) $mail.ToAddresses | Should -BeIn ([array]$InputObject.To + $InputObject.Cc + $InputObject.Bcc) $mail.Headers["From"] | Should -BeExactly $InputObject.From $mail.Headers["To"] | Should -Not -BeNullOrEmpty $mail.Headers["To"].Split(", ") | Should -BeExactly $InputObject.To If($InputObject.Cc) { $mail.Headers["Cc"] | Should -Not -BeNullOrEmpty $mail.Headers["Cc"].Split(", ") | Should -BeExactly $InputObject.Cc } If($InputObject.ReplyTo) { $mail.Headers["Reply-To"] | Should -BeExactly $InputObject.ReplyTo } $mail.Headers["Subject"] | Should -BeExactly $InputObject.Subject $mail.MessageParts.Count | Should -BeExactly 1 $mail.MessageParts[0].BodyData | Should -BeExactly $InputObject.Body } It "Can send mail message using pipline named parameters <Name>" -TestCases $testCases -Pending { param($InputObject) Set-TestInconclusive "As of right now the Send-MailMessage cmdlet does not support piping named parameters (see issue 7591)" $server | Should -Not -Be $null [PsCustomObject]$InputObject | Send-MailMessage -ErrorAction SilentlyContinue $mail = Read-Mail $mail.FromAddress | Should -BeExactly $InputObject.From $mail.ToAddresses.Count | Should -BeExactly ($InputObject.To.Count + $InputObject.Cc.Count + $InputObject.Bcc.Count) $mail.ToAddresses | Should -BeIn ([array]$InputObject.To + $InputObject.Cc + $InputObject.Bcc) $mail.Headers["From"] | Should -BeExactly $InputObject.From $mail.Headers["To"] | Should -Not -BeNullOrEmpty $mail.Headers["To"].Split(", ") | Should -BeExactly $InputObject.To If($InputObject.Cc) { $mail.Headers["Cc"] | Should -Not -BeNullOrEmpty $mail.Headers["Cc"].Split(", ") | Should -BeExactly $InputObject.Cc } If($InputObject.ReplyTo) { $mail.Headers["Reply-To"] | Should -BeExactly $InputObject.ReplyTo } $mail.Headers["Subject"] | Should -BeExactly $InputObject.Subject $mail.MessageParts.Count | Should -BeExactly 1 $mail.MessageParts[0].BodyData | Should -BeExactly $InputObject.Body } } Describe "Send-MailMessage Feature Tests" -Tags Feature, RequireSudoOnUnix { BeforeAll { function Read-Mail { param() if($server) { return $server.ReceivedEmail[0] } return $null } } BeforeEach { if($server) { $server.ClearReceivedEmail() } } Context "Default Port 25" { BeforeAll { $server = [netDumbster.smtp.SimpleSmtpServer]::Start(25) } AfterAll { if($server) { $server.Stop() } } It "Can throw on wrong mail addresses" { $server | Should -Not -Be $null $obj = $DefaultInputObject.Clone() $obj.To = "not_a_valid_mail.address" { Send-MailMessage @obj -ErrorAction Stop } | Should -Throw -ErrorId "FormatException,Microsoft.PowerShell.Commands.SendMailMessage" } It "Can send mail with free-form email address" { $server | Should -Not -Be $null $obj = $DefaultInputObject.Clone() $obj.From = "User01 <user01@example.com>" $obj.To = "User02 <user02@example.com>" Send-MailMessage @obj -ErrorAction SilentlyContinue $mail = Read-Mail $mail.FromAddress | Should -BeExactly "user01@example.com" $mail.ToAddresses | Should -BeExactly "user02@example.com" } It "Can send mail with high priority" { $server | Should -Not -Be $null Send-MailMessage @DefaultInputObject -Priority High -ErrorAction SilentlyContinue $mail = Read-Mail $mail.Priority | Should -BeExactly "urgent" } It "Can send mail with HTML content as body" { $server | Should -Not -Be $null $obj = $DefaultInputObject.Clone() $obj.Body = "<html><body><h1>PowerShell</h1></body></html>" Send-MailMessage @obj -BodyAsHtml -Encoding utf8 -ErrorAction SilentlyContinue $mail = Read-Mail $mail.Headers["content-type"] | Should -BeLike "text/html*" $mail.MessageParts.Count | Should -BeExactly 1 $mail.MessageParts[0].BodyData | Should -Be $obj.Body } It "Can send mail with UTF8 encoding" { $server | Should -Not -Be $null $obj = $DefaultInputObject.Clone() $obj.Body = "We ❤ PowerShell" Send-MailMessage @obj -Encoding utf8Bom -ErrorAction SilentlyContinue $mail = Read-Mail $mail.MessageParts.Count | Should -BeExactly 1 $mail.Headers["content-transfer-encoding"] | Should -BeExactly "base64" $utf8Text = [System.Text.Encoding]::UTF8.GetString([Convert]::FromBase64String($mail.MessageParts[0].BodyData)) $utf8Text | Should -Be $obj.Body } It "Can send mail with attachments" { $attachment1 = "TestDrive:\attachment1.txt" $attachment2 = "TestDrive:\attachment2.txt" $pngBase64 = "iVBORw0KGgoAAAANSUhEUgAAAGQAAABkCAYAAABw4pVUAAAAnElEQVR42u3RAQ0AAAgDoL9/aK3hHFSgyUw4o0KEIEQIQoQgRAhChAgRghAhCBGCECEIEYIQhAhBiBCECEGIEIQgRAhChCBECEKEIAQhQhAiBCFCECIEIQgRghAhCBGCECEIQYgQhAhBiBCECEEIQoQgRAhChCBECEIQIgQhQhAiBCFCEIIQIQgRghAhCBGCECFChCBECEKEIOS7BU5Hx50BmcQaAAAAAElFTkSuQmCC" Set-Content $attachment1 -Value "First attachment" Set-Content $attachment2 -AsByteStream -Value ([Convert]::FromBase64String($pngBase64)) $server | Should -Not -Be $null Send-MailMessage @DefaultInputObject -Attachments $attachment1,$attachment2 -ErrorAction SilentlyContinue $mail = Read-Mail $mail.MessageParts.Count | Should -BeExactly 3 $txt = [System.Text.Encoding]::UTF8.GetString([Convert]::FromBase64String($mail.MessageParts[1].BodyData)) -replace "`n|`r" $txt | Should -BeExactly "First attachment" ($mail.MessageParts[2].BodyData -replace "`n|`r") | Should -BeExactly $pngBase64 } } Context "Custom Port 2525" { BeforeAll { $server = [netDumbster.smtp.SimpleSmtpServer]::Start(2525) } AfterAll { if($server) { $server.Stop() } } It "Can send mail message using custom port 2525" { $server | Should -Not -Be $null $server.ReceivedEmailCount | Should -BeExactly 0 Send-MailMessage @DefaultInputObject -Port 2525 -ErrorAction SilentlyContinue $server.ReceivedEmailCount | Should -BeExactly 1 } } }
combined_dataset/train/non-malicious/Receive-Stream_1.ps1
Receive-Stream_1.ps1
function Receive-Stream { #.Synopsis # Read a stream to the end and close it #.Description # Will read from a byte stream and output a string or a file #.Param reader # The stream to read from #.Param fileName # A file to write to. If this parameter is provided, the function will output to file #.Param encoding # The text encoding, if you want to override the default. param( [System.IO.Stream]$reader, $fileName, $encoding = [System.Text.Encoding]::GetEncoding( $null ) ) if($fileName) { try { $writer = new-object System.IO.FileStream $fileName, ([System.IO.FileMode]::Create) } catch { Write-Error "Failed to create output stream. The error was: '$_'" return $false } } else { [string]$output = "" } [byte[]]$buffer = new-object byte[] 4096 [int]$total = [int]$count = 0 try { $count = $reader.Read($buffer, 0, $buffer.Length) while ($count -gt 0) { if($fileName) { $writer.Write($buffer, 0, $count) } else { $output += $encoding.GetString($buffer, 0, $count) } $count = $reader.Read($buffer, 0, $buffer.Length) } } catch { Write-Error "Failed to write stream. The error was: '$_'" return $false } $reader.Close() $writer.Close() if(!$fileName) { return $output } else { return $true } }
combined_dataset/train/non-malicious/ONTAPI Module.ps1
ONTAPI Module.ps1
# Requires Version 2.0 # Requires ManageOntap.Dll # Plenty of room left for documentation # Andy Schneider - http://get-powershell.com # 3/10/2009 $OnTapDll = (resolve-path $PSScriptRoot\\ManageOntap.dll).Path [System.Reflection.Assembly]::LoadFile($onTapDll) function New-NTAPServer { param ( [Parameter( Mandatory=$true, Position=0, ValueFromPipeline = $true)] [string] $filer, [Parameter( Mandatory=$true, Position=1)] [System.Management.Automation.PSCredential] $credential ) $username = $credential.GetNetworkCredential().UserName $password = $credential.GetNetworkCredential().Password $domain = $credential.GetNetworkCredential().Domain if ($domain) {$username = "$domain\\$username"} $NtapServer = New-Object NetApp.Manage.NaServer($filer,1,0) $NtapServer.SetAdminUser($username,$password) $NaElement = New-Object Netapp.Manage.NaElement("system-get-info") [xml]$sysinfo = $NtapServer.InvokeElem($NaElement) $sysinfo.results."system-info" | out-host return $NtapServer } Function Get-NTAPLun { param ( [Parameter( Mandatory = $true, Position = 0)] [NetApp.Manage.NaServer] $server, [Parameter( Mandatory=$false, Position=1, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [Alias("Path")] [String] $name = "*" ) $NaElement = New-Object Netapp.Manage.NaElement("lun-list-info") [xml]$result = $server.InvokeElem($NaElement) return $result.results.luns."lun-info" | where {$_.path -like $name} } Function Set-NTAPLun { param ( [Parameter( Mandatory = $true, Position = 0)] [NetApp.Manage.NaServer] $server, [Parameter( Mandatory=$false, Position=1, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [Alias("Path")] [String] $name , [Parameter( Mandatory=$false, Position=2, ValueFromPipeline = $false)] [int64] $size, [Parameter( Mandatory=$false, Position=3)] [Alias("description")] [string] $comment ) if($comment) { $NaElement = New-Object Netapp.Manage.NaElement("lun-set-comment") $NaElement.AddNewChild('path',$name) $NaElement.AddNewChild('comment',$comment) [xml]$result = $server.InvokeElem($NaElement) $result.results.status } if ($size) { $NaElement = New-Object Netapp.Manage.NaElement("lun-resize") $NaElement.AddNewChild('path',$name) $NaElement.AddNewChild('size',$size) [xml]$result = $server.InvokeElem($NaElement) $result.results.status } } Function New-NTAPLun { param ( [Parameter( Mandatory = $true, Position = 0)] [NetApp.Manage.NaServer] $server, [Parameter( Mandatory=$false, Position=1, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [Alias("Path")] [String] $name , [Parameter( Mandatory=$false, Position=2, ValueFromPipeline = $false)] [int64] $size, [Parameter( Mandatory=$false, Position=3, ValueFromPipeline = $false)] [Alias("description")] [string] $comment ) $NaElement = New-Object Netapp.Manage.NaElement("lun-create-by-size") $NaElement.AddNewChild('path',$name) $NaElement.AddNewChild('size',$size) [xml]$result = $Server.InvokeElem($NaElement) $result.results.status $NaElement = New-Object Netapp.Manage.NaElement("lun-set-comment") $NaElement.AddNewChild('path',$name) $NaElement.AddNewChild('comment',$size) [xml]$result = $Server.InvokeElem($NaElement) $result.results.status } Function Get-NTAPInitiator { param ( [Parameter( Mandatory = $true, Position = 0)] [NetApp.Manage.NaServer] $server, [Parameter( Mandatory=$false, Position=1, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [Alias("Initiator")] [String] $name = "*" ) $NaElement = New-Object Netapp.Manage.NaElement("iscsi-initiator-list-info") [xml]$result = $Server.InvokeElem($NaElement) return $result.results."iscsi-initiator-list-entries"."iscsi-initiator-list-entry-info" | where {$_."initiator-nodename" -like $name} } Function Get-NTAPVolume { param ( [Parameter( Mandatory = $true, Position = 0)] [NetApp.Manage.NaServer] $server, [Parameter( Mandatory=$false, Position=1, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [Alias("Path")] [String] $name = "*" ) $NaElement = New-Object Netapp.Manage.NaElement("volume-list-info") [xml]$r = $server.InvokeElem($NaElement) return $r.results.volumes."volume-info" | where {$_.name -like $name} } Function Set-NTAPVolume { param ( [Parameter( Mandatory=$true, Position=0)] [NetApp.Manage.NaServer] $server, [Parameter( Mandatory=$true, Position=1, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [String] $name, [Parameter( Mandatory=$false, Position=2, ValueFromPipelineByPropertyName = $true)] [int64] $size, [Parameter( Mandatory=$false, Position=3)] [ValidateSet("none", "file", "volume")] [String] $spaceReserveType = "none", [Parameter( Mandatory=$true, Position=4, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [String] $newName ) if ($newname) { $NaElement = New-Object Netapp.Manage.NaElement("volume-rename") $NaElement.AddNewChild('volume',$name) $NaElement.AddNewChild('new-volume-name',$newname) [xml]$result = $Server.InvokeElem($NaElement) $result.results.status } if ($size) { $NaElement = New-Object Netapp.Manage.NaElement("volume-size") $NaElement.AddNewChild('volume',$name) $NaElement.AddNewChild('new-size',$size) [xml]$result = $Server.InvokeElem($NaElement) $result.results.status } if ($spaceReserveType) { $NaElement = New-Object Netapp.Manage.NaElement("volume-set-option") $NaElement.AddNewChild('option-name','guarantee') $NaElement.AddNewChild('option-value',$spaceReserveType) [xml]$result = $Server.InvokeElem($NaElement) $result.results.status } } Function New-NTAPVolume { param ( [Parameter( Mandatory = $true, Position = 0)] [NetApp.Manage.NaServer] $server, [Parameter( Mandatory=$false, Position=1, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [String] $name = "*", [Parameter( Mandatory=$false, Position=2, ValueFromPipelineByPropertyName = $true)] [int64] $size, [Parameter( Mandatory=$false, Position=3, ValueFromPipeline = $true)] [Alias("Path")] [String] $containingAggregate, [Parameter( Mandatory=$false, Position=4)] [ValidateSet("none", "file", "volume")] [String] $spaceReserveType = "none" ) $NaElement = New-Object Netapp.Manage.NaElement("volume-create") $NaElement.AddNewChild('volume',$name) $NaElement.AddNewChild('size',$size) $NaElement.AddNewChild('containing-aggr-name',$containingaggregate) $NaElement.AddNewChild('space-reserve',$spaceReserveType) [xml]$result = $Server.InvokeElem($NaElement) $result.results.status } Function Get-NTAPAggregate { param ( [Parameter( Mandatory = $true, Position = 0)] [NetApp.Manage.NaServer] $server, [Parameter( Mandatory=$false, Position=1, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [Alias("Path")] [String] $name = "*" ) $NaElement = New-Object Netapp.Manage.NaElement("aggr-list-info") [xml]$r = $server.InvokeElem($NaElement) return $r.results.aggregates."aggr-info" | where {$_.name -like $name} }
combined_dataset/train/non-malicious/sample_11_92.ps1
sample_11_92.ps1
# Load Common Library # Load Reporting Utilities #_#$debug = $false . ./utils_cts.ps1 #_#. ./TS_RemoteSetup.ps1 $FirstTimeExecution = FirstTimeExecution trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } if ($FirstTimeExecution) { Run-DiagExpression .\TS_PrintInfo.ps1 -DetectRootCauses # Auto Added Commands [AutoAdded] .\TS_AutoAddCommands_PRINT.ps1 EndDataCollection } else { #2nd execution. Delete the temporary flag file then exit EndDataCollection -DeleteFlagFile $True } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA5mSuwmixdtdW5 # s1Q+T3R965+f5VOpvap0OBwtiTcgLqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIN2 # rKXaeR/H3XW0Qm5kttaY1qAofUtYV+6kCXH9H2EpMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAZmWwbk1Um2E3uKGwLlGnD0feJG+4VB2wYs8G # TlbsceaoEeQBh3fK03VewKMe/CPW9mzV0Ph+hnmVoPn0zOrExPnJ0KmuKJ1YQ4uh # zftQiPplGiVvGEni2Oibv9tOvohcPPhGVqzD8Gqyba+rWJd4fnVY4c65i8D8hF7Q # BXkoyQOXbu88u35Qu9sCBLYTkMmsb4YfwEHglq3wNUsCiVdkIQln3X8EV3TGPRq4 # 8tAtz3ORRoefCdH6A26yvPVegSENCiwFY/gMWf/s8Llzkfm46Yb9PF7pORDKpZAu # /jWpxqFleCNUw/syNqKQHI8AqBMnXElPIiUfmEKs5lYFqXemDKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAfdHyF4wLuhkIl/CfMYz2EHLr6yRGyHlZx # ScaIQjDumAIGZxqItyNGGBMyMDI0MTAyODExNDA0My4zNThaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAi # GA8yMDI0MTAyODA1NDg0MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyaQ5AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEg # Ea636VH1IhLDsW3Fa0ADcc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeq # PPb9X5bmbVFXObHp67WigFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/n # qvDz8msZXcAtE96/FvXd43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6 # hMlUIcog3CD8TCcit1MWEuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/ # jpNVEuQ5uey+mvVyZ/KaPkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa # JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAMHUCA1oYLn7E3x6LQW2ahn6ot # 1fwSSbCMNqLSXYXr/zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj # ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlH # i0Od4rfyi3FO/mCmLpu/ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIAr+f3 # HssFFBmFQbYnlp9sZVnAGQ3Sb3Uut4EGLNMkPR9oP2FK0KzPZAIvyTlye2DnvsHP # wuOzbzFByuN4ebzOr4s5/rPrkC4sUSo91sLU4o4yxMSRQvNDkl9aCyXKn6YHljsr # TYlYYrOBKIEvr1O4ZzC90TWKdCS8c9IVBPhhBtIG4i246wxKT8CQWBXxPrhsKyML # qHMW2DG4JqjEcknP4OPhOfoiNA9XqaV6esU5wI+5WK4tN9apXevKUgY0nFErACQz # upqPeVvzsIaclO0ri4eTF+X+62K8SvL+tqzE/4hbaoUevBlPuvwrzab0lmO6T+8X # ep+LvRdx7FzYlvoqCgUyz6SBYmsmE5wtBv3/ZwqA5x4eHBri4tSA7Y+UupAG3Xde # U7hZa/wsvRf8Thjr7POnr5ml0Mk4h/JMQVNa+tYRg5pR3ncALLmVkXFlTNnRsZKm # BKEALAk3TX34LhO/cRyYSnO6rjslke5heLLWtwSBRXI/3tAVR1ovS6zajUTLxRkJ # 9HUcM9hUyAN+Qtr/vO1hfm60UcKrSJ0k25vo29qyQiqqaQR8SI5wtNYR9CXI4jKe # VjxZrLnPIA9eca22DvmAm4f2ZdHg0HGqAIFkkRRjpcPmmtSpSFLxrynODXwPBnBc # n84mt1dYyN6h3mzMtrtzfUjHRlhlRbZeMqUnp0c= # SIG # End signature block
combined_dataset/train/non-malicious/New-LinkedClone.ps1
New-LinkedClone.ps1
#Requires -version 2 # TITLE: New-LinkedClone.ps1 # AUTHOR: Hal Rottenberg # Adapted from a technique published originally by Keshav Attrey http://www.vmdev.info/?p=40 # Also see William Lam's Perl script: http://engineering.ucsb.edu/~duonglt/vmware/vGhettoLinkedClone.html # And Leo's manual version for ESX 3.5: http://blog.core-it.com.au/?p=333 param ( [parameter(Mandatory=$true)][string]$SourceName, [parameter(Mandatory=$true)][string]$CloneName ) $vm = Get-VM $SourceName # Create new snapshot for clone $cloneSnap = $vm | New-Snapshot -Name "Clone Snapshot" # Get managed object view $vmView = $vm | Get-View # Get folder managed object reference $cloneFolder = $vmView.parent # Build clone specification $cloneSpec = new-object Vmware.Vim.VirtualMachineCloneSpec $cloneSpec.Snapshot = $vmView.Snapshot.CurrentSnapshot # Make linked disk specification $cloneSpec.Location = new-object Vmware.Vim.VirtualMachineRelocateSpec $cloneSpec.Location.DiskMoveType = [Vmware.Vim.VirtualMachineRelocateDiskMoveOptions]::createNewChildDiskBacking # Create clone $vmView.CloneVM( $cloneFolder, $cloneName, $cloneSpec ) # Write newly created VM to stdout as confirmation Get-VM $cloneName
combined_dataset/train/non-malicious/sample_9_91.ps1
sample_9_91.ps1
#************************************************ # TS_DellPowerEdgeBiosCheck.ps1 # Version 1.0.1 # Date: 5/9/2012 # Author: v-alyao # Description: [Idea ID 2842] [Windows] Alert Engineers if they are working on a Dell machine models R910, R810 and M910 # Rule number: 2842 # Rule URL: //sharepoint/sites/rules/Rule%20Submissions/Forms/DispForm.aspx?ID=2842 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 2842 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_DellPowerEdgeBiosCheck" $PublicContent = "" $InternalContent = "https://sharepoint.partners.extranet.microsoft.com/sites/Onestop/CTSSQL/Pages/sql%20corruption%20dell%20machines%20scribble%20pattern%207f87312b.aspx" $Verbosity = "Error" $Visibility = "3" $SupportTopicsID = "8121" $InformationCollected = new-object PSObject # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if((($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2)) -or #Server 2003 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or # Server 2008 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1))) #Win 7/Server 2008 R2 { $manufacturer="Dell Inc." $systemModelList=@("PowerEdge R910","PowerEdge R810","PowerEdge M910") $computerInfo=Get-CimInstance -Namespace root\CIMV2 -Class Win32_ComputerSystem if(($null -ne $computerInfo) -and (($null -ne $computerInfo.Manufacturer) -and ($computerInfo.Manufacturer -eq $manufacturer)) -and ($systemModelList -contains $computerInfo.Model)) { $RuleApplicable=$true } } #Check the Bios version, #If the BIOS Version is 2.2.3 return true #else return false Function CheckBIOSVersion() { $redBIOS='2.2.3' $biosInfo=Get-CimInstance -Namespace root\CIMV2 -Class Win32_BIOS if(($null -ne $biosInfo) -and ($null -ne $biosInfo.BIOSVersion) -and ($biosInfo.BIOSVersion.count -ge 1)) { $biosVersion=$biosInfo.BIOSVersion[0]; } if(($null -ne $biosInfo) -and ($null -eq $biosVersion)) { $biosVersion = $biosInfo.SMBIOSBIOSVersion } if(($null -ne $biosVersion) -and ($biosVersion.Contains($redBIOS))) { add-member -inputobject $InformationCollected -membertype noteproperty -name "System Manufacturer" -value $computerInfo.Manufacturer add-member -inputobject $InformationCollected -membertype noteproperty -name "System Model" -value $computerInfo.Model add-member -inputobject $InformationCollected -membertype noteproperty -name "BIOS Version" -value $biosVersion add-member -inputobject $InformationCollected -membertype noteproperty -name "SMBIOS Version" -value ($biosInfo.SMBIOSMajorVersion.ToString()+'.'+$biosInfo.SMBIOSMinorVersion.ToString()) return $true } return $false } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { $RootCauseDetected=CheckBIOSVersion if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -InternalContentURL $InternalContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -SolutionTitle $ScriptStrings.ID_DellPowerEdgeBiosCheck_SD } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB6D+fezdA2Qowl # yejXbzEDt9CRUAbX+wdMZMBgktwuM6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILtj # qBRvXRUR7pJPkmXMODTu8Ketfjp492RiIPmD8rZ3MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAWsY5q0groZZ+S8vYMJn+G4+gnvsg0tzjMxbR # 5Z2+ueqR8a4j6tl16I/8Tp5HkIa58Gb0mrhnTg0kMrMvnXZnRCkILmTfpSipn71B # ua3xO0QAquvAP38gZIK5rRsx8d3pIEFr4YjgSanfka+tkr9ubiJpYAgWvHRXkI3V # wCWH1LMraHGw1H9mBXjBzJ5YNhZYLvjzcl1r+F1ys1oY2d9xZxkLrV7ONb83I5Nw # DAkDvLGsfWaYvqYtCvez569k4PMxRuI9KcsxNoMqsO2wuEKsdEFRNXJaAt3uE6+Q # i9mfXCLcELma0NliB3yPaYJItn5dVPmuux6XNhgp/BFZT+bUmKGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDzvxTxtyn0nQ534N/BTKZCva815Heyjo1C # Cyd7QD4LwwIGZuto66IXGBMyMDI0MTAyODExNDA0MC4xNzJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgtwR1ETGjOEovSrxY97ejJuH/VTlyQ2zSmPUHONOTqVAwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAEM2zBu8xP4Z8szcIpQQR+So0kgslSE3 # RbEpf8wO9kiflzfyJnF+sNoW8JvZoUCKPE//ka0Cc4ykq9uxpGMPmrw3u7p3Hkqk # BJcSIesW2OBsuC393XFG71MC2nMHVoiVyMWEvOr+Y5F54BS0KJG5JCdgkFVDmuHW # VwPzA/n9mklsTeEyNFFWR6Y3wFqLRl4kWhDCK00MCw2b2LlLT5WfkRaBI61F6YN0 # m1xe+F6l2JR9YTRsgpgsoDqETLAH/0Vt1ntSTs62XTcxql3moNlv+iLcGA75h0Yo # foOrOXNZ3eZAxvud1t1botCIV2bghx2linLcyrPlxZFQWq/146xMWVzBYpIeNkkw # elwtLZVKmX9dkhuXrf/6ax7WxGJdV5kOf04KbORfKS3cOI+xB6412buNzLZZIS8A # /Hh3qnDYPZhkqXT7S1Tg6nJD6Xjs9wyc7owt934Ldld6zo179bolUQWPmsFLIUdU # TYWRlpEfOiyOooPH0a7YC1Fe68aRLBWBZyUvVcbsa3TW6mPz6TY8AMu7fwkAMLqW # zvVF3B/uXjDpV/Jryo3qFIP+87Dl3mF0uNVxeAJQDwAUgJ5KEXQ4/ssYGtQHjHNU # XSMYYc3hMz7ypxcM6yFt0YQ7B9KLNJpXOiAHNcRiA3OvJ0wnxhypN6iFxrUuPgsw # 8BejZmeEHVnz # SIG # End signature block
combined_dataset/train/non-malicious/sample_29_9.ps1
sample_29_9.ps1
@{ GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @( 'MSFT_MpComputerStatus.cdxml', 'MSFT_MpPreference.cdxml', 'MSFT_MpThreat.cdxml', 'MSFT_MpThreatCatalog.cdxml', 'MSFT_MpThreatDetection.cdxml', 'MSFT_MpScan.cdxml', 'MSFT_MpSignature.cdxml', 'MSFT_MpWDOScan.cdxml', 'MSFT_MpRollback.cdxml' ) FunctionsToExport = @( 'Get-MpPreference', 'Set-MpPreference', 'Add-MpPreference', 'Remove-MpPreference', 'Get-MpComputerStatus', 'Get-MpThreat', 'Get-MpThreatCatalog', 'Get-MpThreatDetection', 'Start-MpScan', 'Update-MpSignature', 'Remove-MpThreat', 'Start-MpWDOScan', 'Start-MpRollback' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '3.0' } # SIG # Begin signature block # MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7 # MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiqaVqK3TgLMEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAv1uJ+e+9OY2v17aC27EGCXji # Yw5Exspv4dTWfbUyJUuiR7jlnSg8vtn3v7sD1PgNDSqjb0cbgylmIEqg0XHMb2f2 # 10q53JJEKaUWzJORxlE2Ez/9TOCRrCJ75c1Qv2nl/rzNz3iWCRvjIAPZkVPHpn6s # NaCX+Jl1wTbJlbSf+/1CD7RoBHk1o0Fq+1pZkqCzVvioZu5BxwAaWHJQdKwyYaV9 # kujlcq9HjmNT1WBKHfBzqUxYwQehKrPZdinM5Hwbq5Ym2TixcLmxIoDX9bcF+a61 # /5jDbIjKnmYIO8kMDHq5ZryVbj6I5VKHSXjzNU5V0EB4EHT8RT186gBqVK0BGaGC # FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDSxVW9nlzb6PqreGdErw9x # 6jeF/KW0L7vYOjGQhAzBRAIGZbql/EmRGBMyMDI0MDIyMTA3MjkwNy40OTNaMASA # AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC # EzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1 # WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE # CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL # Ex1UaGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBALVjtZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM # 8KbQrMDol7DC7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl # 7brPQx7H99UJbsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8 # zwWr4r9xkMmUXs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1L # Fd96FNxAzwnetSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9gh # orp9qUKcBUfFcS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCq # QFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleO # UsOQbgvlRdthFCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQf # qKpivpyd7KCWACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+3 # 4IcFEhPogaKvNNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMK # qphEtpSm1z3ufASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJ # MIIBRTAdBgNVHQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw # AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv # ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI # hvcNAQELBQADggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVg # vSviCylr5ap3ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck3 # 7fggYK3+wEwLhP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OM # uADS5lg7okrXa2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOM # eJVmkk/O0ganhFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EG # eXxfF8bofLVlUE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3 # vu/a+BFf2uIoycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev # +iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAe # S/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc # 3saPmXhe6MhSgCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzOb # Zmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIH # cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw # OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh # C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx # WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc # UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc # nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo # veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi # YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9 # fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH # GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X # KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE # R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/ # eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3 # FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd # BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE # AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI # MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB # Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud # HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By # b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO # MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC # AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk # bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng # ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 # lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC # gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 # MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU # BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh # VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+ # fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp # NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI # qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB # AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt # MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw # JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZ # afp0bnpJdIhfiB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOl/gBcwIhgPMjAyNDAyMjEwMzQ2MzFa # GA8yMDI0MDIyMjAzNDYzMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6X+AFwIB # ADAHAgEAAgIecjAHAgEAAgIRZzAKAgUA6YDRlwIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBBQUAA4GBAMRnGQKBXl25tJUkHDfCIvoEBaPpTNrUTanTmJRRTT1O8SeC8PWO # u45trfVv/4iY+ivPIlkWpcf/AXGlj6O9vVoEy78eGH5iOsqbiLuKzj5RPmHQO4Z8 # /8NBBRgoslFjlh7x7GZI22rlNhrQQqfjeGxG9NfvY+aRkHkymiMiurIUMYIEDTCC # BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV # 8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgLyAmWRHfySwheJJPfJVMEycKkNy3 # B65QeQwzIXvdSecwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0m # uMbBUETODoL4d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIIqeR7iYNHcm # 5tgxrnHUgHRVKr7d5HTCiVkj3ZejbsHGMA0GCSqGSIb3DQEBCwUABIICAAgd7817 # tC0OhLYinxZMokdyI4HD9tfh8IsDduCGSQQqgvk7baOdOEL/MjO6GkcCjWig97yR # SXWu58HqafX+0Juuoc14tz9kePLLiGd60042ttd2Y8cGkQT/Gdix53Zb6GhEXbOY # v0i7tp6j+U1ExQkwQzZlrVBVzwPWCVZq/NZdOVCNXTlSvwcR2nVjZ5o3FZ3KmR9l # ruj+zaR0/+tkvMwV6CwxtJVn3OON/sr//2iB3IaScRL/+Yp8XLKc1K607u0HAFge # 9O0dkpmoJrKTdSI2OUpa64sYtPOSDHaZSIdEsm+q3aZM1jzL6m2OF+6R+WK/TrFo # pdBHEHsdFe98JRxsPRjTq6bYuiYNWUNTi0dzWClJo5ODNsUb3rm4YVDLMN3Wll2t # 9co3XqH8sDrz9mza8LgWBceyLCZug8sA9biOf1f7AQunyIInX7cy0R+erongtyHR # 1UoC0qNv9uJTYSLQHIcmlMA+pRw+qZ+OMe8GpcRK30gVflAM0AwVKKF5TuUfa/FT # lSnnWAB06Pn59F/QgN2Y1g2bC99WE+M/oSySLeSuxOLhYguod7rX+nzx1mOw43e3 # LkhzK2G32gqwcbxgeVHrqGCZqRU2APcsIMp6t+4Ju11fB0cuE8HNOUKKkKWkx3qC # Iio2cg7HrsIXbZqIyMrh3b6UAi+vkvo8O7+t # SIG # End signature block
combined_dataset/train/non-malicious/sample_64_50.ps1
sample_64_50.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.StackHCI.private.dll') # Load the internal module $internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.StackHCI.internal.psm1' if(Test-Path $internalModulePath) { $null = Import-Module -Name $internalModulePath } # Export nothing to clear implicit exports Export-ModuleMember # Export script cmdlets Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias) # endregion # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB2jwRcForQLb+R # i8w8VaesOSyNNKbtRItDaiIaEYKfRqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINA/ # w8pyLMbScsaMGDrKRI7QZI1XenM/9QBfm0YC8Eh8MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAyP8zWthwopMXl/UpfbRkv8y+waqlQVXHVUxu # HodQqavgGKvHdKz9r3tRJ8/tYaJlYGxptk5BugbwmP67ogmta/MtNEZ5zu5ABCdj # ZyMAytxznC/zFfE51rBsNB7wO8lCsAyUAkPNA38XIqHGRFmmwl0scUeqMuHiNb2O # VBZlx0uA0ag3WoSyHr7cmE+Z1mT/4QhlhuiqhQt6Ov+yp1rHGLrfoaFYfKFcK/P7 # 1L1ap9NqnsPcbzwBNUa2cl0llZZmc6DmdGegKy6iB7H+RTJSvP2pABCW+JXWpw9K # Joobm0vOzfZKD57Z+aLZNcpvwL6glfqOvg7TpqyjahMumyl95qGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDF/sflA3vRLx3AJrAIan3GkvHr7M2vQA+E # m/uVv1YvcgIGZpZ/jvnqGBMyMDI0MDczMTA3MDA0My4xNzRaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyH # nPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdK # s+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+ # yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/Y # cM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J # 9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+ # yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRb # cThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXd # YMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknK # XonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/ # obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLx # yyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64 # tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzK # nR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQ # RbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfa # VosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfC # PEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61 # rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsK # i2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRN # odq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJ # XxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35O # W3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx # 8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOpUGfUwIhgPMjAyNDA3MzExMDAzMzNaGA8yMDI0MDgw # MTEwMDMzM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6lQZ9QIBADAHAgEAAgIF # UDAHAgEAAgITvzAKAgUA6lVrdQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # ABbYPoq8BfjtdENVDCq3iyebjKw6bP0Yz/EWRGM3hQebR8pQ/4MFkHVgKP8TSfak # xyu0KFRV2aujewjoL+raCnfZc/F0vvLF6YzCUqjzrmRIhfW8NiSjMgE+eZ7yub9S # EVoDByv/7dG1BMDnAwBAy/I/zqSqRjB/hwPBFS1UxtvCMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAA # AeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQg4LPvE4inejQ/YKQVD1j7OLXfDlo9opj78DvW5Bj9 # W/YwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCS # b4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIK/9L7xf/z9ONhnnPJAIvwA8 # ESmSp5QeI2cSBzuV+kQRMA0GCSqGSIb3DQEBCwUABIICAFHx28UeT2UWuL3ooohB # 7mR1KOXcNU7elmTzofTwESXgLqZoYfDvIc7glScrsTN5Qo4SCtpCLIijn/meGn+j # K3aPkiD/+uNBWoV60ApO+McL9rCnUBIAtXpIp05VZumwJuPswSqeTr6zoswKWtso # +gSHRXUGl2r2CIjUe580u+/oN5ysFT0kdZCS21NbjUUXWJoMP3oQpEPmUNEhMPWe # MI+FES2jCDtib8YuBWYc/GKDY1ZeW7i/2uoKJjkq/5A4Lk2RLi9nYby8TyoRNsjp # qUzL2AY1hcwAm1JGMpmxYAEnCYlTHJHdChpYuvCDLl9sY1Xcnkuls0JduDujExHM # jntO0o+EQdqUXbDnNU8xKRSGYUwBVSrod7elG+jShFwxuSNdG6YJJ0svqy8tmCZv # qNqQ/3srm+MiYSF6GTpfO6hbRNH8ryfLvFrDFm1FhmKhG99tWJwfpZ/nfjJ0L2dX # QX6nI22IZhhVMa1D4b3ndnhnMkK4p3ImVbtL06dITCd+o05nZxbeZU0w2ahQdGzE # P4qqy3Jq82DeK97fk4/u1Il5CKYoh5NYR66JAOoxGdxik7eABTOCXgxygUdNK7gx # jR9ANbogda23AcW0s6I64naLnP/db91sb7m/0bmpMZM4yqLYiABeeoKoXqbNoPWS # qCNR6nyZ8bj0DiGr8cA/ypli # SIG # End signature block
combined_dataset/train/non-malicious/sample_29_62.ps1
sample_29_62.ps1
# # Module manifest for module 'OCI.PSModules.Datasafe' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datasafe.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'acae3050-5046-4f4b-812f-d87bfcb51ba7' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datasafe Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datasafe.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatasafeMaskingColumnsFromSdm', 'Edit-OCIDatasafeGlobalSettings', 'Enable-OCIDatasafeConfiguration', 'Enable-OCIDatasafeTargetDatabase', 'Get-OCIDatasafeAlert', 'Get-OCIDatasafeAlertAnalyticsList', 'Get-OCIDatasafeAlertPoliciesList', 'Get-OCIDatasafeAlertPolicy', 'Get-OCIDatasafeAlertPolicyRulesList', 'Get-OCIDatasafeAlertsList', 'Get-OCIDatasafeAuditArchiveRetrieval', 'Get-OCIDatasafeAuditArchiveRetrievalsList', 'Get-OCIDatasafeAuditEventAnalyticsList', 'Get-OCIDatasafeAuditEventsList', 'Get-OCIDatasafeAuditPoliciesList', 'Get-OCIDatasafeAuditPolicy', 'Get-OCIDatasafeAuditPolicyAnalyticsList', 'Get-OCIDatasafeAuditProfile', 'Get-OCIDatasafeAuditProfileAnalyticsList', 'Get-OCIDatasafeAuditProfilesList', 'Get-OCIDatasafeAuditTrail', 'Get-OCIDatasafeAuditTrailAnalyticsList', 'Get-OCIDatasafeAuditTrailsList', 'Get-OCIDatasafeAvailableAuditVolumesList', 'Get-OCIDatasafeCollectedAuditVolumesList', 'Get-OCIDatasafeColumnsList', 'Get-OCIDatasafeCompatibleFormatsForDataTypes', 'Get-OCIDatasafeCompatibleFormatsForSensitiveTypes', 'Get-OCIDatasafeConfiguration', 'Get-OCIDatasafeDatabaseSecurityConfig', 'Get-OCIDatasafeDatabaseSecurityConfigsList', 'Get-OCIDatasafeDatabaseTableAccessEntriesList', 'Get-OCIDatasafeDatabaseTableAccessEntry', 'Get-OCIDatasafeDatabaseViewAccessEntriesList', 'Get-OCIDatasafeDatabaseViewAccessEntry', 'Get-OCIDatasafeDifferenceColumn', 'Get-OCIDatasafeDifferenceColumnsList', 'Get-OCIDatasafeDiscoveryAnalyticsList', 'Get-OCIDatasafeDiscoveryJob', 'Get-OCIDatasafeDiscoveryJobResult', 'Get-OCIDatasafeDiscoveryJobResultsList', 'Get-OCIDatasafeDiscoveryJobsList', 'Get-OCIDatasafeFindingAnalyticsList', 'Get-OCIDatasafeFindingsChangeAuditLogsList', 'Get-OCIDatasafeFindingsList', 'Get-OCIDatasafeGrantsList', 'Get-OCIDatasafeLibraryMaskingFormat', 'Get-OCIDatasafeLibraryMaskingFormatsList', 'Get-OCIDatasafeMaskedColumnsList', 'Get-OCIDatasafeMaskingAnalyticsList', 'Get-OCIDatasafeMaskingColumn', 'Get-OCIDatasafeMaskingColumnsList', 'Get-OCIDatasafeMaskingObjectsList', 'Get-OCIDatasafeMaskingPoliciesList', 'Get-OCIDatasafeMaskingPolicy', 'Get-OCIDatasafeMaskingReport', 'Get-OCIDatasafeMaskingReportsList', 'Get-OCIDatasafeMaskingSchemasList', 'Get-OCIDatasafeOnPremConnector', 'Get-OCIDatasafeOnPremConnectorsList', 'Get-OCIDatasafePeerTargetDatabase', 'Get-OCIDatasafePeerTargetDatabasesList', 'Get-OCIDatasafePrivateEndpoint', 'Get-OCIDatasafePrivateEndpointsList', 'Get-OCIDatasafeProfile', 'Get-OCIDatasafeProfileAnalyticsList', 'Get-OCIDatasafeProfileSummariesList', 'Get-OCIDatasafeReport', 'Get-OCIDatasafeReportContent', 'Get-OCIDatasafeReportDefinition', 'Get-OCIDatasafeReportDefinitionsList', 'Get-OCIDatasafeReportsList', 'Get-OCIDatasafeRoleGrantPathsList', 'Get-OCIDatasafeRolesList', 'Get-OCIDatasafeSchemasList', 'Get-OCIDatasafeSdmMaskingPolicyDifference', 'Get-OCIDatasafeSdmMaskingPolicyDifferencesList', 'Get-OCIDatasafeSecurityAssessment', 'Get-OCIDatasafeSecurityAssessmentComparison', 'Get-OCIDatasafeSecurityAssessmentsList', 'Get-OCIDatasafeSecurityFeatureAnalyticsList', 'Get-OCIDatasafeSecurityFeaturesList', 'Get-OCIDatasafeSecurityPoliciesList', 'Get-OCIDatasafeSecurityPolicy', 'Get-OCIDatasafeSecurityPolicyDeployment', 'Get-OCIDatasafeSecurityPolicyDeploymentsList', 'Get-OCIDatasafeSecurityPolicyEntryState', 'Get-OCIDatasafeSecurityPolicyEntryStatesList', 'Get-OCIDatasafeSecurityPolicyReport', 'Get-OCIDatasafeSecurityPolicyReportsList', 'Get-OCIDatasafeSensitiveColumn', 'Get-OCIDatasafeSensitiveColumnsList', 'Get-OCIDatasafeSensitiveDataModel', 'Get-OCIDatasafeSensitiveDataModelsList', 'Get-OCIDatasafeSensitiveObjectsList', 'Get-OCIDatasafeSensitiveSchemasList', 'Get-OCIDatasafeSensitiveType', 'Get-OCIDatasafeSensitiveTypesList', 'Get-OCIDatasafeSqlCollection', 'Get-OCIDatasafeSqlCollectionAnalyticsList', 'Get-OCIDatasafeSqlCollectionLogInsightsList', 'Get-OCIDatasafeSqlCollectionsList', 'Get-OCIDatasafeSqlFirewallAllowedSqlAnalyticsList', 'Get-OCIDatasafeSqlFirewallAllowedSqlsList', 'Get-OCIDatasafeSqlFirewallPoliciesList', 'Get-OCIDatasafeSqlFirewallPolicy', 'Get-OCIDatasafeSqlFirewallPolicyAnalyticsList', 'Get-OCIDatasafeSqlFirewallViolationAnalyticsList', 'Get-OCIDatasafeSqlFirewallViolationsList', 'Get-OCIDatasafeTablesList', 'Get-OCIDatasafeTargetAlertPolicyAssociation', 'Get-OCIDatasafeTargetAlertPolicyAssociationsList', 'Get-OCIDatasafeTargetDatabase', 'Get-OCIDatasafeTargetDatabasesList', 'Get-OCIDatasafeUserAccessAnalyticsList', 'Get-OCIDatasafeUserAnalyticsList', 'Get-OCIDatasafeUserAssessment', 'Get-OCIDatasafeUserAssessmentComparison', 'Get-OCIDatasafeUserAssessmentsList', 'Get-OCIDatasafeUsersList', 'Get-OCIDatasafeWorkRequest', 'Get-OCIDatasafeWorkRequestErrorsList', 'Get-OCIDatasafeWorkRequestLogsList', 'Get-OCIDatasafeWorkRequestsList', 'Invoke-OCIDatasafeAlertsUpdate', 'Invoke-OCIDatasafeApplyDiscoveryJobResults', 'Invoke-OCIDatasafeApplySdmMaskingPolicyDifference', 'Invoke-OCIDatasafeCalculateAuditVolumeAvailable', 'Invoke-OCIDatasafeCalculateAuditVolumeCollected', 'Invoke-OCIDatasafeCompareSecurityAssessment', 'Invoke-OCIDatasafeCompareUserAssessment', 'Invoke-OCIDatasafeDeactivateTargetDatabase', 'Invoke-OCIDatasafeDiscoverAuditTrails', 'Invoke-OCIDatasafeDownloadDiscoveryReport', 'Invoke-OCIDatasafeDownloadMaskingLog', 'Invoke-OCIDatasafeDownloadMaskingPolicy', 'Invoke-OCIDatasafeDownloadMaskingReport', 'Invoke-OCIDatasafeDownloadPrivilegeScript', 'Invoke-OCIDatasafeDownloadSecurityAssessmentReport', 'Invoke-OCIDatasafeDownloadSensitiveDataModel', 'Invoke-OCIDatasafeDownloadUserAssessmentReport', 'Invoke-OCIDatasafeMaskData', 'Invoke-OCIDatasafePatchAlerts', 'Invoke-OCIDatasafePatchDiscoveryJobResults', 'Invoke-OCIDatasafePatchMaskingColumns', 'Invoke-OCIDatasafePatchSdmMaskingPolicyDifferenceColumns', 'Invoke-OCIDatasafePatchSensitiveColumns', 'Invoke-OCIDatasafePatchTargetAlertPolicyAssociation', 'Invoke-OCIDatasafeProvisionAuditPolicy', 'Invoke-OCIDatasafePurgeSqlCollectionLogs', 'Invoke-OCIDatasafeRefreshDatabaseSecurityConfiguration', 'Invoke-OCIDatasafeRefreshSecurityAssessment', 'Invoke-OCIDatasafeRefreshSqlCollectionLogInsights', 'Invoke-OCIDatasafeRefreshTargetDatabase', 'Invoke-OCIDatasafeRefreshUserAssessment', 'Invoke-OCIDatasafeResumeAuditTrail', 'Invoke-OCIDatasafeResumeWorkRequest', 'Invoke-OCIDatasafeRetrieveAuditPolicies', 'Invoke-OCIDatasafeScheduleReport', 'Invoke-OCIDatasafeSetSecurityAssessmentBaseline', 'Invoke-OCIDatasafeSetUserAssessmentBaseline', 'Invoke-OCIDatasafeSuspendWorkRequest', 'Invoke-OCIDatasafeUnsetSecurityAssessmentBaseline', 'Invoke-OCIDatasafeUnsetUserAssessmentBaseline', 'Move-OCIDatasafeAlertCompartment', 'Move-OCIDatasafeAuditArchiveRetrievalCompartment', 'Move-OCIDatasafeAuditPolicyCompartment', 'Move-OCIDatasafeAuditProfileCompartment', 'Move-OCIDatasafeDatabaseSecurityConfigCompartment', 'Move-OCIDatasafeDiscoveryJobCompartment', 'Move-OCIDatasafeLibraryMaskingFormatCompartment', 'Move-OCIDatasafeMaskingPolicyCompartment', 'Move-OCIDatasafeOnPremConnectorCompartment', 'Move-OCIDatasafePrivateEndpointCompartment', 'Move-OCIDatasafeReportCompartment', 'Move-OCIDatasafeReportDefinitionCompartment', 'Move-OCIDatasafeRetention', 'Move-OCIDatasafeSdmMaskingPolicyDifferenceCompartment', 'Move-OCIDatasafeSecurityAssessmentCompartment', 'Move-OCIDatasafeSecurityPolicyCompartment', 'Move-OCIDatasafeSecurityPolicyDeploymentCompartment', 'Move-OCIDatasafeSensitiveDataModelCompartment', 'Move-OCIDatasafeSensitiveTypeCompartment', 'Move-OCIDatasafeSqlCollectionCompartment', 'Move-OCIDatasafeSqlFirewallPolicyCompartment', 'Move-OCIDatasafeTargetAlertPolicyAssociationCompartment', 'Move-OCIDatasafeTargetDatabaseCompartment', 'Move-OCIDatasafeUserAssessmentCompartment', 'New-OCIDatasafeAuditArchiveRetrieval', 'New-OCIDatasafeDiscoveryJob', 'New-OCIDatasafeDiscoveryReportForDownload', 'New-OCIDatasafeLibraryMaskingFormat', 'New-OCIDatasafeMaskingColumn', 'New-OCIDatasafeMaskingPolicy', 'New-OCIDatasafeMaskingPolicyForDownload', 'New-OCIDatasafeMaskingReportForDownload', 'New-OCIDatasafeOnPremConnector', 'New-OCIDatasafeOnPremConnectorConfiguration', 'New-OCIDatasafePeerTargetDatabase', 'New-OCIDatasafePrivateEndpoint', 'New-OCIDatasafeReport', 'New-OCIDatasafeReportDefinition', 'New-OCIDatasafeSdmMaskingPolicyDifference', 'New-OCIDatasafeSecurityAssessment', 'New-OCIDatasafeSecurityAssessmentReport', 'New-OCIDatasafeSensitiveColumn', 'New-OCIDatasafeSensitiveDataModel', 'New-OCIDatasafeSensitiveDataModelForDownload', 'New-OCIDatasafeSensitiveType', 'New-OCIDatasafeSqlCollection', 'New-OCIDatasafeSqlFirewallPolicy', 'New-OCIDatasafeTargetAlertPolicyAssociation', 'New-OCIDatasafeTargetDatabase', 'New-OCIDatasafeUserAssessment', 'New-OCIDatasafeUserAssessmentReport', 'Remove-OCIDatasafeAuditArchiveRetrieval', 'Remove-OCIDatasafeAuditTrail', 'Remove-OCIDatasafeDiscoveryJob', 'Remove-OCIDatasafeDiscoveryJobResult', 'Remove-OCIDatasafeLibraryMaskingFormat', 'Remove-OCIDatasafeMaskingColumn', 'Remove-OCIDatasafeMaskingPolicy', 'Remove-OCIDatasafeOnPremConnector', 'Remove-OCIDatasafePeerTargetDatabase', 'Remove-OCIDatasafePrivateEndpoint', 'Remove-OCIDatasafeReportDefinition', 'Remove-OCIDatasafeScheduleReport', 'Remove-OCIDatasafeSdmMaskingPolicyDifference', 'Remove-OCIDatasafeSecurityAssessment', 'Remove-OCIDatasafeSensitiveColumn', 'Remove-OCIDatasafeSensitiveDataModel', 'Remove-OCIDatasafeSensitiveType', 'Remove-OCIDatasafeSqlCollection', 'Remove-OCIDatasafeSqlFirewallPolicy', 'Remove-OCIDatasafeTargetAlertPolicyAssociation', 'Remove-OCIDatasafeTargetDatabase', 'Remove-OCIDatasafeUserAssessment', 'Start-OCIDatasafeAuditTrail', 'Start-OCIDatasafeSqlCollection', 'Stop-OCIDatasafeAuditTrail', 'Stop-OCIDatasafeSqlCollection', 'Stop-OCIDatasafeWorkRequest', 'Update-OCIDatasafeAlert', 'Update-OCIDatasafeAuditArchiveRetrieval', 'Update-OCIDatasafeAuditPolicy', 'Update-OCIDatasafeAuditProfile', 'Update-OCIDatasafeAuditTrail', 'Update-OCIDatasafeDatabaseSecurityConfig', 'Update-OCIDatasafeFinding', 'Update-OCIDatasafeLibraryMaskingFormat', 'Update-OCIDatasafeMaskingColumn', 'Update-OCIDatasafeMaskingPolicy', 'Update-OCIDatasafeOnPremConnector', 'Update-OCIDatasafeOnPremConnectorWallet', 'Update-OCIDatasafePeerTargetDatabase', 'Update-OCIDatasafePrivateEndpoint', 'Update-OCIDatasafeReport', 'Update-OCIDatasafeReportDefinition', 'Update-OCIDatasafeSdmMaskingPolicyDifference', 'Update-OCIDatasafeSecurityAssessment', 'Update-OCIDatasafeSecurityPolicy', 'Update-OCIDatasafeSecurityPolicyDeployment', 'Update-OCIDatasafeSensitiveColumn', 'Update-OCIDatasafeSensitiveDataModel', 'Update-OCIDatasafeSensitiveType', 'Update-OCIDatasafeSqlCollection', 'Update-OCIDatasafeSqlFirewallPolicy', 'Update-OCIDatasafeTargetAlertPolicyAssociation', 'Update-OCIDatasafeTargetDatabase', 'Update-OCIDatasafeUserAssessment', 'Write-OCIDatasafeMaskingPolicy', 'Write-OCIDatasafeSensitiveDataModel' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datasafe' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_22_31.ps1
sample_22_31.ps1
function trySetDesignerProp(tname, ttype, val) { var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0); trait.value = val; } if (command.getTrait("state").value == 0) { command.getTrait("state").value = 2; trySetDesignerProp("embedMedia", "bool", true); } else { command.getTrait("state").value = 0; trySetDesignerProp("embedMedia", "bool", false); } // SIG // Begin signature block // SIG // MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // Zvc/2/PDQrz4dsHSLA8yUjZq70hV9jCC73dpH82vmISg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmfMIIZmwIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCDJCDiUg0lrXyRztCztoWxU040IR+MBVR8X // SIG // vNaHHkH/SzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBABS2o4/f // SIG // 5Gdi4TvFPpqMJnOioI3/bvpiPz8LtSVgngVy/l3/XyMo // SIG // 1PySJIPlkTDZd903u2+CfMEiwv4/vYrLWvi0GWRkae1n // SIG // e4lmYTHU3HW1jjtbgmg6wRtGW1g/A7Uc8QdSamd7vcTo // SIG // S+sc2FsOufJeaTN/5/19PvkO5RNrIv9cvAAj5vTsY6NA // SIG // 1NtaHyndW6K5Di66GVvmlHDHv5iGnL8sGuzzHiMAtxj8 // SIG // p5/hWne+QJuo6PizaWTRhu0vX9w73SmUMvHDbjh2MYDZ // SIG // 6Vb8o2pbETGTGBtWXwzp3JfZ7ZSoOEczd+pEuyjUfvwp // SIG // WBe1Alr2tdkjEU0w4RGCMz7hD3ahghcpMIIXJQYKKwYB // SIG // BAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW // SIG // /gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgrjW+nSXH4lYZqC/SsgxK // SIG // VriaAGPqoSb6nggSTs7YsSkCBmXWB8G+SxgTMjAyNDAy // SIG // MjkyMjMwMjMuOTU5WjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0 // SIG // NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB4NT8 // SIG // HxMVH35dAAEAAAHgMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDcxOVoXDTI1MDExMDE5MDcxOVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046MTc5RS00QkIwLTgyNDYxJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQCsh5zzocW70QE5xo2/+n7gYYd2S86LQMQIHS2mf85E // SIG // RVHXkis8jbd7aqKzCuxg73F3SrPqiDFG73p5R/sOd7LD // SIG // 2uq2D++tGbhawAa37Hq39JBWsjV1c8E+42qyThI5xTAa // SIG // fsovrsENk5ybsXM3HhuRQx6yCOrBehfO/ZT+snWNAQWZ // SIG // Gfbd/Xv7LzUYngOYFJ7/2HDP2yDGP0GJnfRdAfnmxWIv // SIG // jx+AJF2oTZBYCvOTiGkawxr4Z8Tmv+cxi+zooou/iff0 // SIG // B5HSRpX50X20N0FzP+f7pgTihuCaBWNZ4meUVR+T09Pr // SIG // go8HKoU2571LXyvjfsgdm/axGb6dk7+GcGMxHfQPVbGD // SIG // LmYgkm2hTJO+y8FW5JaZ8OGh1iVyZBGJib8UW3E4RPBU // SIG // MjqFZErinOTlmdvljP4+dKG5QNLQlOdwGrr1DmUaEAYf // SIG // PZxyvpuaTlyl3WDCfnHri2BfIecv3Fy0DDpqiyc+ZezC // SIG // 6hsFNMx1fjBDvC9RaNsxBEOIi+AV/GJJyl6JxxkGnEgm // SIG // i2aLdpMiVUbBUsZ9D5T7x1adGHbAjM3XosPYwGeyvbNV // SIG // sbGRhAayv6G4qV+rsYxKclAPZm1T5Y5W90eDFiNBNsSP // SIG // zTOheAHPAnmsd2Fi0/mlgmXqoiDC8cslmYPotSmPGRMz // SIG // HjUyghCOcBdcMaq+k9fzEKPvLQIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFHBeFz9unVfvErrKANV10Nkw0pnSMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQDAE84OkfwNJXTuzKhsQ9VSY4uc // SIG // lQNYR29B3NGI7b+1pMUPIsH35bpV+VLOuLQ9/tzU9SZK // SIG // YVs2gFn9sCnQMN+UcbUBtYjjdxxGdF9t53XuCoP1n28e // SIG // axB5GfW8yp0f9jeQNevsP9aW8Cc3X0XJyU93C8msK/5G // SIG // IzFnetzj9Bpau9LmuFlBPz6OaVO60EW1hKEKM2NuIQKj // SIG // nMLkXJugm9CQXkzgnkQZ7RCoIynqeKUWkLe2/b7rE/e1 // SIG // niXH2laLJpj7bGbGsIJ6SI2wWuebR37pNLw5GbWyF41O // SIG // Jq+XZ7PXZ2pwXQUtj2Nzd4SHwjxDrM6rsBy5H5BWf/W8 // SIG // cPP3kSZXbaLpB6NemnxPwKj/7JphiYeWUdKZoFukHF/u // SIG // ta3YuZAyU8whWqDMmM1EtEhG8qw2f6dijrigGDZ4JY4j // SIG // pZZXLdLiVc9moH3Mxo47CotgEtVml7zoYGTZhsONkhQd // SIG // ampaGvCmrsfUNhxyxPIHnv+a4Dp8fc0m31VHOyHETaHa // SIG // uke7/kc/j+lyrToMgqlv/q4T5qf5+xatgRk0ZHMv/4Zk // SIG // t9qeqsoJa9iuDqCQyV8RbOpcHPA/OqpVHho1MqO4VcuV // SIG // b8gPstJhpxALgPObbDnFD5c8FhebL/geX89+Tlt1+EqZ // SIG // OUojbpZyxUTzOVwrEh6r3GwvEd6sI9sNXrz4WcQ7jTCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIIC // SIG // PQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046MTc5RS00QkIwLTgyNDYxJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVAG3z0dXwV+h8WH8j8fM2MyVOXyEM // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpimfaMCIYDzIwMjQw // SIG // MjI5MTAxODAyWhgPMjAyNDAzMDExMDE4MDJaMHQwOgYK // SIG // KwYBBAGEWQoEATEsMCowCgIFAOmKZ9oCAQAwBwIBAAIC // SIG // BJwwBwIBAAICE5gwCgIFAOmLuVoCAQAwNgYKKwYBBAGE // SIG // WQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh // SIG // IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQCQ // SIG // gHSenTut32jSbiod8OYyqtGBvblK13L5DlhDrb0ptT15 // SIG // CBiGjBZ6Bpl63CNC4rYNxg8TAKRcHuA8bJeKiBdOQ/Sp // SIG // HhiH/z4eV0jwEtmcCERbYXLRH5Yy6wAzazLYyLyYjJco // SIG // MfPE5RyevXFFPUTt3aLoe0hR9EZKd+jkOPnIoDGCBA0w // SIG // ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMA0GCWCGSAFl // SIG // AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN // SIG // AQkQAQQwLwYJKoZIhvcNAQkEMSIEIJgPF5Nk5w2fCi5f // SIG // XZvHfHSKjAyT2TuLZ1nOex3IvdvtMIH6BgsqhkiG9w0B // SIG // CRACLzGB6jCB5zCB5DCBvQQg4+5Sv/I55W04z73O+wwg // SIG // km+E2QKWPZyZucIbCv9pCsEwgZgwgYCkfjB8MQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg // SIG // VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeDU/B8TFR9+ // SIG // XQABAAAB4DAiBCClp02fd7pEXGfszJszVjngjfErxxZn // SIG // RP3oLvYqmVXMejANBgkqhkiG9w0BAQsFAASCAgA438NU // SIG // fvxMEFBUGRp6dZH3CGa71uHcKVkNDgxsh+xC3KgN2XFG // SIG // n6jSz2BA/Ln/LeXvZwV0u683ArYyMx6IZppQa1x4ol1Y // SIG // g+WabtbYp2EvZdWRrVI7jjbrlsXh+w50Qq64SRsFvU68 // SIG // jKxMcj706MXpScnMLuOYvipG6dyjgdqreDq7Z7/VyvRJ // SIG // iLBdZ0h2Unw30EWaKu196mgonMA296KYIq7vGzXpg7mn // SIG // QSLeXVShw/2G9tUCm2zko9NXsDdjBw3hZUnVTqq9TCUk // SIG // iHqIOUyuaYyUxhr2SrHmIu2rChzlcK95Uls28lsf4c+g // SIG // qrEiyK2YFv0T6ureiQY0bE8xeJgmZZTF7t55bgVW3L5m // SIG // z3UV0SoAbyT+8tKRYifR1KlKgRvUwR7vNrQGArtpMb/X // SIG // Wh6LWsWOH7nSGfOy7nn6mmE10KGUk8OuTVmDoKloxXff // SIG // p+SwuZ3BPbH1UEnuWIOR/uzJGDCmEFXN3grGQb9iObjw // SIG // UXLJKo81YGQ6BPB6PgaCuSv1xmOxDOngXKHpx5BWicKp // SIG // TDZb622YP/dcGARp2uiBseJqwIF47p+4+IKg5TILHOpz // SIG // /zAovutnPqe/zYAHSkVSEinOrheuGvGSnstafqlRY55N // SIG // 4q9nXjOkqtyrK7SFYTidXg9VLtBTHuoTg/f483quxSMz // SIG // k1ksF3BqWmBC3Iek5w== // SIG // End signature block
combined_dataset/train/non-malicious/sample_13_94.ps1
sample_13_94.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Start-AMTUserConsent { <# .Synopsis Starts the Intel Active Management Technology user consent process .Description This CmdLet starts the user consent process on clients that have Intel Active Management Technology (AMT) firmware version 6.0 and higher. The user consent screen is displayed on the remote client and the code must be passed into this Cmdlet. .Notes Supported AMT Firmware Versions: 6.0 or higher. AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Start-AMTUserConsent vproclient.vprodemo.com -credential $AMTCredential User consent process started for vproclient.vprodemo.com, please wait... Enter user consent code for vproclient.vprodemo.com #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=1, HelpMessage="Validate Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest or Kerberos User")] [string] $Username, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest or Kerberos Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=3, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential ) Process{ $Results = @() $Obj = new-object psobject try { #create a connection object $Connection = New-Object Intel.Management.Wsman.WsmanConnection if ($Credential.username.Length -gt 0) { $Connection.SetCredentials($Credential.Username, $Credential.Password) } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $Connection.SetCredentials($Username, $Password) } else { $Cred = Get-Credential $Username $Connection.SetCredentials($Cred.Username, $Cred.Password) } } if ($Port.Length -lt 1) { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } if($CertificateName.Length -gt 0) { $Connection.Options.SetClientCertificateByCertificateName($CertificateName) } ForEach ($Comp in $ComputerName) { try { #Attempt Connection with Client $Connection.SetHost($Comp, $Port) #Get opt-in service state $ObjRef = $Connection.NewReference("http://intel.com/wbem/wscim/1/ips-schema/1/IPS_OptInService") $IPSObj = $ObjRef.Get() #Check user consent is required if ($IPSObj.GetProperty("OptInRequired").ToString() -ne 0) { #Check user consent not started if ($IPSObj.GetProperty("OptInState").ToString() -eq 0) { #Get a reference to the ManagedSystem (User of the Service) $UserRef = $Connection.NewReference("SELECT * from CIM_ComputerSystem WHERE Name='ManagedSystem'") #Get the Instance of CIM_AssociatedPowerManagmentService for the ManagedSystem $ObjRef = $Connection.NewReference("CIM_AssociatedPowerManagementService"); $ObjRef.AddSelector("UserOfService",$userRef); $AssociatedObj = $ObjRef.Get() #Get current power state $PowerState = $AssociatedObj.GetProperty("PowerState").ToString() #If client not in S0 then perform poweron operation if ($PowerState -ne 2) { write-host "Powering up $Comp to display consent code to user, please wait..." $PowerInt = 2 #Now associate to the Provider of the Service (CIM_PowerManagementService) $ServiceRef = $AssociatedObj.GetProperty("ServiceProvided").Ref #Now invoke the RequestPowerStateChange $InputObj = $ServiceRef.CreateMethodInput("RequestPowerStateChange") $InputObj.SetProperty("PowerState", "$PowerInt") $InputObj.SetProperty("ManagedElement", $UserRef) $OutObj = $ServiceRef.InvokeMethod($InputObj); #Note Return Status $ReturnValue = $OutObj.GetProperty("ReturnValue").ToString() $StabilizeTime = 15000 } else { #Skip the poweron operation $ReturnValue = 0 $StabilizeTime = 2000 } #Start user consent process $ObjRef = $Connection.NewReference("IPS_OptInService"); $InputObj = $ObjRef.CreateMethodInput("StartOptIn") $OutObj = $ObjRef.InvokeMethod($InputObj); write-host "User consent process started for $Comp, please wait..." #Check opt-in state changed and determine if client reboot reqd do { #Wait for platform to stabilize [System.Threading.Thread]::Sleep($StabilizeTime) #Get opt-in service state $ObjRef = $Connection.NewReference("IPS_OptInService"); $IPSObj = $ObjRef.Get() #Reboot client if consent code must be displayed by BIOS if ($IPSObj.GetProperty("OptInState").ToString() -eq 1) { write-host "Rebooting $Comp to display consent code to user, please wait..." $PowerInt = 5 #Now associate to the Provider of the Service (CIM_PowerManagementService) $ServiceRef = $AssociatedObj.GetProperty("ServiceProvided").Ref #Now invoke the RequestPowerStateChange $InputObj = $ServiceRef.CreateMethodInput("RequestPowerStateChange") $InputObj.SetProperty("PowerState", "$PowerInt") $InputObj.SetProperty("ManagedElement", $UserRef) $OutObj = $ServiceRef.InvokeMethod($InputObj); #Note Return Status $ReturnValue = $OutObj.GetProperty("ReturnValue").ToString() } } while ($IPSObj.GetProperty("OptInState").ToString() -ne 2) #Read user consent code $OptInCode = read-host "Enter user consent code for $Comp" #Send user consent code $ObjRef = $Connection.NewReference("IPS_OptInService"); $InputObj = $ObjRef.CreateMethodInput("SendOptInCode") $InputObj.SetProperty("OptInCode", "$OptInCode") $OutObj = $ObjRef.InvokeMethod($InputObj); #Note Return Status $ReturnValue = $OutObj.GetProperty("ReturnValue").ToString() #Check opt-in state changed do { #Get opt-in service state $IPSObj = $ObjRef.Get() } while ($IPSObj.GetProperty("OptInState").ToString() -ne 3) } elseif ($IPSObj.GetProperty("OptInState").ToString() -eq 3) { $ReturnValue = 0 } else { $ReturnValue = 1 } } else { #Skip start user consent operation $ReturnValue = 0 } #Add Member to Object. Include Computer Name, Port and Operation success $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value $Port if ($ReturnValue -eq 0) { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Successful" } else { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Failed" } } catch [System.Exception] { if ($_.Exception.GetType().ToString() -eq "Intel.Management.Wsman.WsmanUnreachableException") { # AMT will not have this object when Host Based Configuration is not available $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name UserConsent -value "Not Required" } elseif($_.ToString().Contains("Unauthorized")) { $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Status -value "Unauthorized" } else { $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message } } #Append to Result $Results += $Obj } } catch { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message #Append to Result $Results += $Obj } #Write out Results Write-Output $Results } } # SIG # Begin signature block # MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC/HdzO2ef6i3Ly # RlrjwjUS3N06KXjbQrerxKyiiBkjHKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg9e09nB+XTpI0fPY/ # PfFqOCs8RWNDUmuxPzOK3cF+XAAwDQYJKoZIhvcNAQEBBQAEggGAHLgXJBuTewbP # gDLOWUCHH95vNX38Y7IsTwPpAw+jKY7cqBay+FdU9u3CD9FN3dsSptL1PDgSJY9l # +63cBg9Zg4tBAd9MPblffyRWlg+LsMwwGtRSQCCw75hfH/j7ZxjhfgXgMrbHu0TO # FolYOblU1ic0aO0Jy6tD4VfW8fHiFoS4wiVSB58hXCZ2iP1jy4l1a4V2rJd9BXuZ # 2xzaUcjMNq9dJStlBGKdlVIWYB8V1L4lybPmcgGmaS2/TQJyiJ/EIqFUh0j5mZ4z # PtYk4kxyW8UcrtjYaIX0YbWfK3UWv3wm/GmPCTyTxJPuH1MZPjk4sTuDhl9jMDQA # 1uliVNweNlMbTJrlUtwzjERQD586//o2VwU/XdxjSZJbZxaVt+Zc9wcsMXBT5YbR # 08Eo0NyphvlbmAc+2CrmazpAiS7r5klB8DWz9hnBhPX4pH9Q91M/5qOZnB0hdyfw # 3wQkXIMf8/LFk3PsapkWueUaQ6gzvuBElXa8aUVweSsPIpw9cfsyoYITgDCCE3wG # CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg # hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIL14BmjM3zkRqVSR6/QgTmU/mcJLMtrqPFxs # C2LRdVLIAhUA2Rnu8rHtoTWR+64zNath1bAP8FQYDzIwMjEwNzE5MTYzMTM5WqCB # iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl # cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww # KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw # ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN # MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg # TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM # aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l # ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T # B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi # Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL # GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q # BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8 # 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG # 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy # 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK # 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K # ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb # LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U # Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa # ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu # 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC # ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0 # cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js # MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv # LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo # dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz # 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX # VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu # k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA # 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g # XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA # iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f # XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC # A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg # no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q # uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p # sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY # dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo # ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5 # NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx # EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG # A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na # wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV # cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc # 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh # e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI # jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w # ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5 # VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT # IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo # RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr # t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB # eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm # yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG # MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g # BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy # dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 # BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 # LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 # cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd # FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A # w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh # RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4 # OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv # WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH # HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL # nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf # tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p # oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq # /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi # Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD # VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT # YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp # Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG # SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI # hvcNAQkFMQ8XDTIxMDcxOTE2MzEzOVowPwYJKoZIhvcNAQkEMTIEMNKwSrj121nM # brHY3wyQp0xno407jS4gnuxIMZdPw2AvWHKpN6StICl8ja4LpwlppzCB7QYLKoZI # hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW # W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT # FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD # ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG # 9w0BAQEFAASCAgCN7Amf10rnRlO+LDJtEWh2X24S68W89Dfl+WFKzIQ/u+L5+OHP # 5XQpU06pLA0xYIGtnm6kWQLuZzE6TwAICqiFf15F4BuBRP2RKmkZkQQGczcz/46P # tGZSs1xoLXYcsZeJznpQkSMFHkGII/H+7cTI7k3n5rSJvic4w7+R/dxdvcb8RYCZ # XsLNKPPEtTfJDKw+sxWBldJfwHUveF8LjF1uenAESgAbNS7AOx5AbUHpYfB5Qn3e # FOfyg2hAwLLzSD84ZyPOTwaob/DbLH4F8qgAazGAJThRBy+UYR8ktFaOujkA2uSl # VOFk1v6uMLLelEfq34icFA6+Scf//AQVMnavrMBCNHNIRxvdajYutQz9L57/UYJv # 2/BD1i1VOAtObHqlxKjmRC//K2Zrwgw+B5it0v8vJcq1OiSErfvbVgFzDtw4Zyi/ # I9h5KGAukbOHrd8lOMKnu2xVxMG10UHGYo7B+CjyCIJ/UJEDcNvk3Gdl10Z4Fp7T # 1BzvYMrOdrOtdneiybOhUD6jhVavojLK4l6C1cSdVFnI43EDs2tQFUffXYwxsA6z # /t6YkBlnpHS7DdXbsdpsUXChmshhrZlfu6WGs5L0T486X+LNnijcuI635tDj5k/i # Lw52jVDi1iC0k79CgZspiV+mEAxoE5MksAV+Q2sM+EQFvyNkSP4/dcc2Vw== # SIG # End signature block
combined_dataset/train/non-malicious/93.ps1
93.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-RBACScopeTag(){ [cmdletbinding()] param ( [Parameter(Mandatory=$false)] $DisplayName ) $graphApiVersion = "beta" $Resource = "deviceManagement/roleScopeTags" try { if($DisplayName){ $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=displayName eq '$DisplayName'" $Result = (Invoke-RestMethod -Uri $uri -Method Get -Headers $authToken).Value } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource" $Result = (Invoke-RestMethod -Uri $uri -Method Get -Headers $authToken).Value } return $Result } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host throw } } Function Get-IntuneApplication(){ [cmdletbinding()] param ( $displayName, $id ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileApps" try { if($displayName){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)?`$filter=displayName eq '$displayName'" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).value } elseif($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)/$id" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get) } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value | ? { (!($_.'@odata.type').Contains("managed")) } } } catch { $ex = $_.Exception Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Update-IntuneApplication(){ [cmdletbinding()] param ( $id, $Type, $ScopeTags ) $graphApiVersion = "beta" $Resource = "deviceAppManagement/mobileApps/$id" try { if(($Type -eq " Write-Warning "Scope Tags aren't available on '$Type' application Type..." } else { if($ScopeTags -eq "" -or $ScopeTags -eq $null){ $JSON = @" { "@odata.type": "$Type", "roleScopeTagIds": [] } "@ } else { $object = New-Object –TypeName PSObject $object | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value "$Type" $object | Add-Member -MemberType NoteProperty -Name 'roleScopeTagIds' -Value @($ScopeTags) $JSON = $object | ConvertTo-Json } $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $JSON -ContentType "application/json" Start-Sleep -Milliseconds 100 } } catch { Write-Host $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $Global:User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ Write-Host $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } Write-Host $ScopeTags = (Get-RBACScopeTag).displayName | Sort-Object if($ScopeTags){ Write-Host "Please specify Scope Tag you want to add to all users / devices in AAD Group:" -ForegroundColor Yellow $menu = @{} for ($i=1;$i -le $ScopeTags.count; $i++) { Write-Host "$i. $($ScopeTags[$i-1])" $menu.Add($i,($ScopeTags[$i-1]))} Write-Host $ans = Read-Host 'Enter Scope Tag id (Numerical value)' if($ans -eq "" -or $ans -eq $null){ Write-Host "Scope Tag can't be null, please specify a valid Scope Tag..." -ForegroundColor Red Write-Host break } elseif(($ans -match "^[\d\.]+$") -eq $true){ $selection = $menu.Item([int]$ans) if($selection){ $ScopeTagId = (Get-RBACScopeTag | Where-Object { $_.displayName -eq "$selection" }).id } else { Write-Host "Scope Tag selection invalid, please specify a valid Scope Tag..." -ForegroundColor Red Write-Host break } } else { Write-Host "Scope Tag not an integer, please specify a valid scope tag..." -ForegroundColor Red Write-Host break } Write-Host } else { Write-Host "No Scope Tags created, script can't continue..." -ForegroundColor Red Write-Host break } $displayName = "Bing Web App" $Application = Get-IntuneApplication -displayName "$displayName" if(@($Application).count -eq 1){ $IA = Get-IntuneApplication -id $Application.id $ADN = $Application.displayName $AT = $Application.'@odata.type' Write-Host "Intune Application '$ADN' with type '$AT' found..." if($IA.roleScopeTagIds){ if(!($IA.roleScopeTagIds).contains("$ScopeTagId")){ $ST = @($IA.roleScopeTagIds) + @("$ScopeTagId") $Result = Update-IntuneApplication -id $IA.id -Type $IA.'@odata.type' -ScopeTags $ST if($Result -eq ""){ Write-Host "Intune Application '$ADN' patched with ScopeTag '$selection'..." -ForegroundColor Green } } else { Write-Host "Scope Tag '$selection' already assigned to '$ADN'..." -ForegroundColor Magenta } } else { $ST = @("$ScopeTagId") $Result = Update-IntuneApplication -id $IA.id -Type $IA.'@odata.type' -ScopeTags $ST if($Result -eq ""){ Write-Host "Intune Application '$ADN' patched with ScopeTag '$selection'..." -ForegroundColor Green } } } elseif(@($Application).count -gt 1){ Write-Host "More than one Intune Application found with name '$displayName'..." -ForegroundColor Red } else { Write-Host "No Intune Application found with '$displayName'..." -ForegroundColor Red } Write-Host
combined_dataset/train/non-malicious/sample_30_48.ps1
sample_30_48.ps1
ConvertFrom-StringData @' EnvironmentErrorAlreadyExists=Переменная среды с этим именем и типом уже существует. EnvironmentErrorDoesNotExists=Переменной среды с этим именем и типом не существует. '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBGSALqvtYVWsMH # eAZYfwPkZ1OmAe7kOBt7pAmms/2+RaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMHrf1HNC9SGmbuvl2Gvupz+ # yPrnJH0rWS8dqFmkUNQgMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAcLnvIiO5Mu54sw9nbtC3VZgWS9HF97Bh0t5JmuhdqBk/9lR1cfT3o9Cg # iVUeVozP0y+hmZQuBJXBkJoOm73bdu5eTloPSeBj0EP/nJVjzcaxWIttIs6JpP5H # lBS1oFD3zApj8VMZrKoC8L/8IebQfBkGlVCZj2IKiGbfH9tX7IJoyQuF2ZG+PAPA # DeIamc09raaI1xdhSWcQ1Ol1JEnveY0aXfw0bPXBuAy5WQ2jpPzgAf7oofiSrd6G # TJj+lt29DFSDrvhPyBAeKVmNmHWMomRr5PlCg4UN8TOStTF5nfnDCFomTTFdWHdW # PB11tYTnBJGI4RZHsN/vyKSD2OVI36GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCQ09tZg6TsdRPzcGv6bjzc+Mo9yD/p51mRi77WQZlTnQIGZhgNVo3N # GBMyMDI0MDQxNzE3MDQzOC43OTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6cp0lDAiGA8yMDI0MDQxNzE2MTcy # NFoYDzIwMjQwNDE4MTYxNzI0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpynSU # AgEAMAcCAQACAhrfMAcCAQACAhOGMAoCBQDpy8YUAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBADnNNHILSWJiNkJlwwTpT+AsSEpgC4I8RXcccosYEVN+7a8L # DOVu9yboqObKYGH0HesatOaW2oic2FXcvkHKzxQryOtEtOTYiqwKexjFHbxY1VCq # u+s3/CewuuaaF1B5tbeJq75RMofDgel8XFeo2QsTcTEs34X+0zh/YXCgLFwuezqT # sZmoXTN5RGZvc6vB5lGUhY/wOlINnw14qVJkqxNRXUSkc/GPw3DyJahePuHY4VUH # f5TV4Z4mx1RZjUMiA1XKvmQnei7pLfpSiVoi51BQYeEMwF766/uofRMwljakSEqE # HzlAJDAu9CSaF+CK0rlX4QfEaAlkH0zja5dhZ4gxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCtj6Peq3H+k4Dv6OHx8+2SaguIwejAgCjhnR45ZhbU0TCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u # KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgcIpYp2EIrCDe0pxGlxfCGOfwW4Mh # Mcg6eUVsJr6xQSowDQYJKoZIhvcNAQELBQAEggIAaRoFZvIjTXoixqAAekI1J+Tg # TJFTwEPnvioH6NHbRhi46AW53tdt8TaPcPLDYUALSSXF59d5qriSCqrWmKMsxTn3 # DSjC99rIwWTYKkVd06I9linUtvNsUONWUXKUebxCTzP+I717ICPL1muzOgXXHPuh # wvHFjl28nB4g6L1rWb3S51/jAhZExIQI6sEsv8YcV6aC6/x/qlta0sCeRGvLsvhB # iM1MAOJyAn+ItzzDkGqltZL4Dve4DmJIrX3hN6KvOVN13i6R9YoZld5eyaAo1595 # xEi8CNF0IMgr0OBo9btHGrnGZkq3nPRtgSx7NkksVvU5gQY7Lop1H5EMcCLT/vcI # M+sGbK83sjlMRs13Cdbrpq6Ni/ZQmeBBJi61fCGyUx6Tvjpcka1I3CCz5WIVfsvI # t0VFkFZ+ctzgseYv7FS6eBA2BHsrpn0hWYSf6lYqWgmbBorzdmM3OpQWzjvMz2Kb # Wp7uolnJEVZzLlEvWLzTbx7tBQb8ulyDNvomH/IiVqc2DeyLRxrS7HFiMklSCBAU # Wg1bv+To+MhiInN8O6RBpNQV5+3858tdOsrNOdNkoebBms3yQkBUKZD9ZxE20MV6 # EN4+Y6jv0ZJdKd+VVo/QexanpDgX8LmOa7cLhsbD1pftHHor0c5D5B6NVnAwe6Lo # pHRYB9xHsjXGDgt+lX8= # SIG # End signature block
combined_dataset/train/non-malicious/4364.ps1
4364.ps1
function ValidateAndGet-ScriptDependencies { param( [Parameter(Mandatory=$true)] [string] $Repository, [Parameter(Mandatory=$true)] [PSCustomObject] $DependentScriptInfo, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.Management.Automation.PSCmdlet] $CallerPSCmdlet, [Parameter()] [PSCredential] $Credential ) $DependenciesDetails = @() $RequiredModuleSpecification = $DependentScriptInfo.RequiredModules if($RequiredModuleSpecification) { ForEach($moduleSpecification in $RequiredModuleSpecification) { $ModuleName = $moduleSpecification.Name $FindModuleArguments = @{ Repository = $Repository Verbose = $VerbosePreference ErrorAction = 'SilentlyContinue' WarningAction = 'SilentlyContinue' Debug = $DebugPreference } if ($PSBoundParameters.ContainsKey('Credential')) { $FindModuleArguments.Add('Credential',$Credential) } if($DependentScriptInfo.ExternalModuleDependencies -contains $ModuleName) { Write-Verbose -Message ($LocalizedData.SkippedModuleDependency -f $ModuleName) continue } $FindModuleArguments['Name'] = $ModuleName $ReqModuleInfo = @{} $ReqModuleInfo['Name'] = $ModuleName if($moduleSpecification.Version) { $FindModuleArguments['MinimumVersion'] = $moduleSpecification.Version $ReqModuleInfo['MinimumVersion'] = $moduleSpecification.Version } elseif((Get-Member -InputObject $moduleSpecification -Name RequiredVersion) -and $moduleSpecification.RequiredVersion) { $FindModuleArguments['RequiredVersion'] = $moduleSpecification.RequiredVersion $ReqModuleInfo['RequiredVersion'] = $moduleSpecification.RequiredVersion } if((Get-Member -InputObject $moduleSpecification -Name MaximumVersion) -and $moduleSpecification.MaximumVersion) { $maximumVersion = $moduleSpecification.MaximumVersion -replace '\*','99999999' $FindModuleArguments['MaximumVersion'] = $maximumVersion $ReqModuleInfo['MaximumVersion'] = $maximumVersion } $psgetItemInfo = Find-Module @FindModuleArguments | Microsoft.PowerShell.Core\Where-Object {$_.Name -eq $ModuleName} | Microsoft.PowerShell.Utility\Select-Object -Last 1 -ErrorAction Ignore if(-not $psgetItemInfo) { $message = $LocalizedData.UnableToResolveScriptDependency -f ('module', $ModuleName, $DependentScriptInfo.Name, $Repository, 'ExternalModuleDependencies') ThrowError -ExceptionName "System.InvalidOperationException" ` -ExceptionMessage $message ` -ErrorId "UnableToResolveScriptDependency" ` -CallerPSCmdlet $CallerPSCmdlet ` -ErrorCategory InvalidOperation } $DependenciesDetails += $ReqModuleInfo } } $RequiredScripts = $DependentScriptInfo.RequiredScripts if($RequiredScripts) { ForEach($requiredScript in $RequiredScripts) { $FindScriptArguments = @{ Repository = $Repository Verbose = $VerbosePreference ErrorAction = 'SilentlyContinue' WarningAction = 'SilentlyContinue' Debug = $DebugPreference } $ReqScriptInfo = @{} if ($PSBoundParameters.ContainsKey('Credential')) { $FindScriptArguments.Add('Credential',$Credential) } if (-not ($requiredScript -match '^(?<ScriptName>[^:]+)(:(?<Version>[^:\s]+))?$')) { $message = $LocalizedData.FailedToParseRequiredScripts -f ($requiredScript) ThrowError ` -ExceptionName "System.ArgumentException" ` -ExceptionMessage $message ` -ErrorId "FailedToParseRequiredScripts" ` -CallerPSCmdlet $CallerPSCmdlet ` -ErrorCategory InvalidOperation } $scriptName = $Matches['ScriptName'] if ($DependentScriptInfo.ExternalScriptDependencies -contains $scriptName) { Write-Verbose -Message ($LocalizedData.SkippedScriptDependency -f $scriptName) continue } if ($Matches.Keys -Contains 'Version') { $ReqScriptInfo = ValidateAndGet-NuspecVersionString -Version $Matches['Version'] if($ReqScriptInfo.Keys -Contains 'RequiredVersion') { $FindScriptArguments['RequiredVersion'] = $ReqScriptInfo['RequiredVersion'] } elseif($ReqScriptInfo.Keys -Contains 'MinimumVersion') { $FindScriptArguments['MinimumVersion'] = $ReqScriptInfo['MinimumVersion'] } if($ReqScriptInfo.Keys -Contains 'MaximumVersion') { $FindScriptArguments['MaximumVersion'] = $ReqScriptInfo['MaximumVersion'] } } $ReqScriptInfo['Name'] = $scriptName $FindScriptArguments['Name'] = $scriptName $psgetItemInfo = Find-Script @FindScriptArguments | Microsoft.PowerShell.Core\Where-Object {$_.Name -eq $scriptName} | Microsoft.PowerShell.Utility\Select-Object -Last 1 -ErrorAction Ignore if(-not $psgetItemInfo) { $message = $LocalizedData.UnableToResolveScriptDependency -f ('script', $scriptName, $DependentScriptInfo.Name, $Repository, 'ExternalScriptDependencies') ThrowError -ExceptionName "System.InvalidOperationException" ` -ExceptionMessage $message ` -ErrorId "UnableToResolveScriptDependency" ` -CallerPSCmdlet $CallerPSCmdlet ` -ErrorCategory InvalidOperation } $DependenciesDetails += $ReqScriptInfo } } return $DependenciesDetails }
combined_dataset/train/non-malicious/sample_52_72.ps1
sample_52_72.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function Test-ScriptExtent { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [OutputType([bool], ParameterSetName='__AllParameterSets')] [OutputType([System.Management.Automation.Language.IScriptExtent], ParameterSetName='PassThru')] [CmdletBinding()] param( [Parameter(Position=0, ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Extent, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Inside, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $After, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Before, [Parameter(ParameterSetName='PassThru')] [switch] $PassThru ) process { if (-not $Extent) { return $false } $passes = (-not $After -or $Extent.StartOffset -gt $After.EndOffset) -and (-not $Before -or $Extent.EndOffset -lt $Before.StartOffset) -and (-not $Inside -or ($Extent.StartOffset -ge $Inside.StartOffset -and $Extent.EndOffset -le $Inside.EndOffset)) if (-not $PassThru.IsPresent) { return $passes } if ($passes) { $Extent # yield } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDh3KaxT3eCSr09 # 0zGLQhhCZ8P7A0AsbPcbsnG6DpAmJqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGAQN+mOQZxzZyVbmfEFx8Kc # zzZKcpC3M4HV8vsum11uMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAL3G/8IMxToLXrWr8JvhT7ompx/JgW4bP4qPdTW5OceGvz5uU2CUs1PeB # rjwczdhpqEFCauddg6yzSWZmaUX6bFpiZPm+NxWuLTpr4hWhcXpQD0A5fcNH5oXh # KrmGRhEZ7CsILbnUm6h4WC5BuGwKQcMVITI3OBiy/aYa8Jy3GmJ5Hrdw3aypqxGD # oIXqzbceaC4vCbQIaiFw0ArQhiOKkabKGD4F84u/DYifYqLut7PhXXTn3gyu85KA # WzKutDpAxAq6PQjg8H7bg9h53BOiCenEScm5B8XhROEAf7bQ9TzpVF6ZRhKnl4fj # n1elEflqhl+LdWpmkqcr69TOOtEmTqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDVFkY/MuQw/o3yrSaHRo6GAzm9mQgQrB52UHyMHeH+mgIGZfxxjXmh # GBMyMDI0MDQxNjIxMDgzMy44NjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnJNB0wIhgPMjAyNDA0MTcwMTMwMDVaGA8yMDI0MDQxODAxMzAwNVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6ck0HQIBADAHAgEAAgISgDAHAgEAAgIR8DAKAgUA # 6cqFnQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADS0/2L1EZCUBSaT5rCv # O+DlU+9mT2bD50uZ926RpiOdIJGjSXcOggha5ObHnpm9bDrOI0NdCGCEzt5xkqSc # 0qrLEl328Bbn6j1lz/TMMxBdqPhSGmR43S7Lny2aqhb6rNDrpgOjs+LgVtJBf4Xy # ta7cuif2eVwayVlInh+hNctIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg2cjxbXcZbwmfs7uqUDa9c6M+mnTOR6t/HCv6H87NmUYwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIFqXD4e+iSPo6h5ICpO+eJ5lCZHrrrOcjkpThBUthmUM # MA0GCSqGSIb3DQEBCwUABIICAIQouXBYL9cCwit0vrTfwu417Mbk2/qxJfZsbHV1 # idEMtjcuFLRBtNBbehT6+WL/jiqnCh3wUuHh/waRc5JClS6rGX+OID/2ip1KigE6 # GMelgzsEzyPyH93TPQTrqMi2zcF7THsuSgKb+7NeBJCNDqwAw+zw93OWZwWd1Z84 # 4g5K9VHU8Z7JUlmgtg4tH6OzEydt0Lvn0YxmPXEUqbLvsha6qrqts4cOVjkj3Pab # 9AFRMbw0ElDso91myFkMAoT4Xj3YOh9JE61aFdEJ2txMotFSMRTn3iIoDTlzOrXY # U/WxftFvxN/jQlwnDA7SVi+bDXj3BzjGcmfZjs4tjYrdk6kHgwRjrhVjWkfriupg # qTcVCzMQXtAw2n4NfsMwcdsRZjrOG7DvB4BBCPq0yYLIe/xv0dieM0/SRLfvqZJc # rfh0GOSn4JONVax0ijlrWeMnTEC1DOebBJ4U8dG+KiUV52ydoNDEm+IVI+4FWi5O # G3FMWpI2psZXcpiulWn74jWB7ujGJB4o+K6+zNQK3/mCT3yiwYHoQSrAoYoRsRcE # JYwKgZwJ3mkzY2SGzu/NcHKOIPwMjDAAeux5ZMW83CZYwG2rJ3TBFxqQzSaDBdOz # glvJanP7Nj5nZVVbmsp3dWsy2ChHbFXmSr+ctBY2pNqgEY+rw3aRq5BzBL4nM368 # vagQ # SIG # End signature block
combined_dataset/train/non-malicious/1394.ps1
1394.ps1
function Get-CFileShare { [CmdletBinding()] param( [string] $Name ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $filter = '(Type = 0 or Type = 2147483648)' $wildcardSearch = [Management.Automation.WildcardPattern]::ContainsWildcardCharacters($Name) if( $Name -and -not $wildcardSearch) { $filter = '{0} and Name = ''{1}''' -f $filter,$Name } $shares = Get-WmiObject -Class 'Win32_Share' -Filter $filter | Where-Object { if( -not $wildcardSearch ) { return $true } return $_.Name -like $Name } if( $Name -and -not $shares -and -not $wildcardSearch ) { Write-Error ('Share ''{0}'' not found.' -f $Name) -ErrorAction $ErrorActionPreference } $shares }
combined_dataset/train/non-malicious/Console Function Run_1.ps1
Console Function Run_1.ps1
function Run ([String]$scriptName = '-BLANK-') { <# The next function records any running scripts started in the console session (from $pwd) in the Scripts Event Log. It should be placed in the Console $profile. Scripts should be started by typing 'Run example' to capture example.ps1, for example. The default logfile is that used by the Windows Script Monitor Service, available from www.SeaStarDevelopment.Bravehost.com #> if ($host.Name -ne 'ConsoleHost') { return } $logfile = "$env:programfiles\\Sea Star Development\\" + "Script Monitor Service\\ScriptMon.txt" $parms = $myInvocation.Line -replace "run(\\s+)$scriptName(\\s*)" $script = $scriptName -replace "\\.ps1\\b" #Replace from word end only. $script = $script + ".ps1" if (Test-Path $pwd\\$script) { if(!(Test-Path Variable:\\Session.Script.Job)) { Set-Variable Session.Script.Job -value 1 -scope global ` -description "Script counter" } $Job = Get-Variable -name Session.Script.Job $number = $job.Value.ToString().PadLeft(4,'0') $startTime = Get-Date -Format "dd/MM/yyyy HH:mm:ss" $tag = "$startTime [$script] start. --> $($myInvocation.Line)" if (Test-Path $logfile) { $tag | Out-File $logfile -encoding 'Default' -Append } Write-EventLog -Logname Scripts -Source Monitor -EntryType Information -EventID 2 -Category 002 -Message "Script Job: $script (PS$number) started." Invoke-Expression -command "$pwd\\$script $parms" $endTime = Get-Date -Format "dd/MM/yyyy HH:mm:ss" $tag = "$endTime [$script] ended. --> $($myInvocation.Line)" if (Test-Path $logfile) { $tag | Out-File $logfile -encoding 'Default' -Append } Write-Eventlog -Logname Scripts -Source Monitor -EntryType Information -EventID 1 -Category 001 -Message "Script Job: $script (PS$number) ended." $job.Value += 1 } else { Write-Error "$pwd\\$script does not exist." } }
combined_dataset/train/non-malicious/sample_14_39.ps1
sample_14_39.ps1
@{ GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiHmazz1gQ06K # unvXv+rGMEHONdPsUaRwD11+c7rHFaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBNd88v60ME/cMf1rqdBP4T3 # 9yMm5kc3mIDQApOzrnFZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASIcmXCBALoNe/avgvwl2HpthBc/SiY8m/rzqXEwEKwAzl54H99ciSlHc # +uwBQSFy9SbgdkckDCehiupMXdREIZemJkQ2pACuJGAlU37QYrEbxFYkl/a+OCR0 # w+zy3LwLziDvB+C7MbA2TwMW1e2YwezpUK3GlZbAgiASaXMhrNsc3OHnY67poo5j # 6eR3/j1PewX7gvoOxEqYJ1UZr7OUCuxkUNYYD0GbXuzusSvAEQ0/fQ7b9tBqygbb # 5zQSDL8hMo1fvHgXwesVgHUKo8RYUbl/oGAP63rjmnXrx+gyjxOkqjI7lkMuFBVg # gxWyVOItt744aIaR1aZQ+TvyPhT6eKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBnNvz1I03TtFMida7uuSAHili1HQ3ZndrM6c6/HpjUFgIGZwgPwXMg # GBMyMDI0MTAxNjE4MzM1MS42ODdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV # lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz # zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf # dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld # 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW # EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC # tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK # Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG # 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs # WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH # SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU # 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F # 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS # ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU # XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w # iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ # gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u # er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni # a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si # rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf # 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa # WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho # Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI # o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rp2vDAiGA8yMDI0MTAxNjE3MzAz # NloYDzIwMjQxMDE3MTczMDM2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDquna8 # AgEAMAcCAQACAicWMAcCAQACAhMGMAoCBQDqu8g8AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAAVODDMIZ6W2LPrkcEVt4Fzx/uEMxixhKMk+TzR4DmevZU9P # qJmx+ZYxe5PxCHixXZz+MMehuI7GtC70yIzMD12oSxDBG7KJdCOFcJYGAuTXJxSP # Un7kqbPd4d6UFV8+W+jCmtv+vsUsv9XMVmGwllGAYnb0S9nM5vWLpSaBX5Avtx0H # KUz0dtY5Ll6HLhHcWm9B/KdrQZ/Fq5qGmCTbNC3Z2/Y1oqiwes2O9GYmv1tA5Mh3 # K4Oe6JBDefJ/al+vhwvpe5O5NMZpEQnK7QTG2th6QAcIhLddE0F+SvwhNuU5h82A # u4x5reHvL1x605CMOLv25rTmOe1fPYn7YHPQbF8xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCdoCRYEPp2fukg5NU8eZe+aIqJZsAGM7iLu1RZw3ktdTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o # CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgypNBqG7fU7A7VCn6X/tdhEQ2o++X # iJP/DubAOv0bKlowDQYJKoZIhvcNAQELBQAEggIAC2cfokrNap01jfg16dACmrgJ # +YR0/0NxlMndAQE3o0ZN4p60dRgy0ya52UYXBNL44oggBocaL+dXpCJCve5pbFOb # 4jlaZJObfXX5WWGavKZNT2Ph9j7Wk8YEClsdgVYo6M9nhpRS2FOlaqAn+uecgIrH # IUIUnPBitDm1lyAG/hI5oPOlvJDx6yiUBCWojnxUMTgP6iiDdXFuRwQt54pAp0lI # 3NxW22bS/ghe9gHPLg6uiQAgXzs0JtS1z8WRD7Uj7WxZcC6z/g9wOXrflz1en0cO # XRn4gSwF1NgF4SvzuQl+klk0Bc1TT3qZJRsO4Z767Rb8p0JuVdcFOkj6wqJSS2nf # zge88MnvFVvs0YVGmenp8TzBRLFycwK1gEWoEkjqVZVsnYqNITj2nadvKq7Hizs8 # rLU4V4B3a3hJKBDbJKrDnlewt2SduUW3Brep//glC6Jp3exqruVynLgg71OgQqmk # t1ZgCXUl/PVtDUP7v5CLhMAYWXypht3ohd1krB+MFUF70ZQtVgo1xevLrDplx8i3 # ag/7pEOjf7v/terHpuYAkztjFWQorW2rV9LQIXGUiGX93+P5dJTzc7BvYCdWuUum # er6F2QxhGAsnF3agi15K2dvLJMBuGVByQ1d8DZm1oz5D45zDxYhyTt/TO611L6ji # Q0rEbJRw9qT6QrSYxcg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_55_31.ps1
sample_55_31.ps1
@{ GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @( 'MSFT_MpComputerStatus.cdxml', 'MSFT_MpPreference.cdxml', 'MSFT_MpThreat.cdxml', 'MSFT_MpThreatCatalog.cdxml', 'MSFT_MpThreatDetection.cdxml', 'MSFT_MpScan.cdxml', 'MSFT_MpSignature.cdxml', 'MSFT_MpWDOScan.cdxml', 'MSFT_MpRollback.cdxml' ) FunctionsToExport = @( 'Get-MpPreference', 'Set-MpPreference', 'Add-MpPreference', 'Remove-MpPreference', 'Get-MpComputerStatus', 'Get-MpThreat', 'Get-MpThreatCatalog', 'Get-MpThreatDetection', 'Start-MpScan', 'Update-MpSignature', 'Remove-MpThreat', 'Start-MpWDOScan', 'Start-MpRollback' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '3.0' } # SIG # Begin signature block # MIImAQYJKoZIhvcNAQcCoIIl8jCCJe4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7 # MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa # BDCCGgACAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiqaVqK3TgLMEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAv1uJ+e+9OY2v17aC27EGCXji # Yw5Exspv4dTWfbUyJUuiR7jlnSg8vtn3v7sD1PgNDSqjb0cbgylmIEqg0XHMb2f2 # 10q53JJEKaUWzJORxlE2Ez/9TOCRrCJ75c1Qv2nl/rzNz3iWCRvjIAPZkVPHpn6s # NaCX+Jl1wTbJlbSf+/1CD7RoBHk1o0Fq+1pZkqCzVvioZu5BxwAaWHJQdKwyYaV9 # kujlcq9HjmNT1WBKHfBzqUxYwQehKrPZdinM5Hwbq5Ym2TixcLmxIoDX9bcF+a61 # /5jDbIjKnmYIO8kMDHq5ZryVbj6I5VKHSXjzNU5V0EB4EHT8RT186gBqVK0BGaGC # F5MwghePBgorBgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDSxVW9nlzb6PqreGdErw9x # 6jeF/KW0L7vYOjGQhAzBRAIGZohGXkMVGBMyMDI0MDcwNTIzNTQ1My4zMjJaMASA # AgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL # Ex5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHpMIIHIDCCBQigAwIBAgITMwAAAfI+ # MtdkrHCRlAABAAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNy # b3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBF # U046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwpp # YgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0Rno # Ro5F89Ad29edzGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCu # YqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXW # K6wx172NRJRYcINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMr # p9TsUgmwsycTEOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJ # XuoL5wGDu/bZUzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFw # Nzrahu4DrYb7b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2 # PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEa # VDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8 # hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW # 0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYE # FJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw # KDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww # CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9 # S6eO4HsfB00XpOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSCl # hJEz5Oo3Um/taPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2Q # M33z1p+GCP5tuvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYX # qn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUa # rGXy4LRtwzmwpsCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux # 66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4 # I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3L # stDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jd # WTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvA # frvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY3 # 6et2Sm4pvspEK8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMA # AAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 # IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMw # MDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0G # CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3u # nAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1 # jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT # fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+ # jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c # +gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+ # cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C6 # 26p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV # 2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoS # CtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxS # UV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJp # xq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkr # BgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A # XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI # KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9S # ZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIE # DB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNV # HSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVo # dHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29D # ZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAC # hj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1 # dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwEx # JFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts # 0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I # dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS # EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMu # LGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT9 # 9kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2z # AVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6Ile # T53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6l # MVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbh # IurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3u # gm2lBRDBcQZqELQdVTNYs6FwZvKhggNMMIICNAIBATCB+aGB0aSBzjCByzELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z # b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA # AgUA6jLE3jAiGA8yMDI0MDcwNTE5MTU0MloYDzIwMjQwNzA2MTkxNTQyWjBzMDkG # CisGAQQBhFkKBAExKzApMAoCBQDqMsTeAgEAMAYCAQACAQMwBwIBAAICExgwCgIF # AOo0Fl4CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC # AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAkwRcBmgvUgBUzVVQ # SuREe23WXNqRNUoJ/I1JKKwapielM0NmXpN+/2YnvPC81VdPk3TnHzEnW20BcaNZ # 6E1Da1URKq4p2m402hwHa4K56nPhGBxlYx602RWoSrHeKcYkpZr0gwt6nhf9W8pj # oZWo4Pc7MvUTQm+OLxMkBdUEVKzcdKz+VS//DjJ+5ZgrqyZucLFA7a1Fk1RnHkpA # zlR2IF472UpsuCiJjEBr68jQC3aehfLR89kFBBwQ0Y17aTZGSVWDRlIJ6Tbs4n76 # p1pBoCPAY4hOE95yOGOZTP50QNrQGfRd+n97xykp01SSfkQ0FWINBv8DJbDEKakU # cIFh+jGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # AhMzAAAB8j4y12SscJGUAAEAAAHyMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG # 9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIO5LHdKpQEu0KVCy # lT1UUXUF07anK8g9AVM4r0dlSojmMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCB # vQQg+No+HS4xUlzTj5jhG7kFRRscTiy5nqdEdJS7RddKQ0QwgZgwgYCkfjB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAi # BCC30QPaKK/H2e8+e6lyccsyGPyvzBe2dKOVnsoX7iHORjANBgkqhkiG9w0BAQsF # AASCAgCDqjYy1+SG0DX4LTOvEE4nase63X52Bk25tKeaPV4bNjSKl70MfsLnwoLZ # /DwyLGV4ryaCV/l6LNKxjyPf9j6SHtkpM3u0uRxvHr+IQzQ0UdSqeuE3f4f2dX8A # Pwx32xRpd8zXS50JQJ6FoR16R1tpf3SjxwcT/PH1nfHbYQZ//1/AY/RIpL2dGz3T # 1n7P8X3pIz0UtglnescezM/4d1BKwzbX6dEBC7V1a4Wok/jYAofahBcsKc2LbHEn # etQ2MX58OkCFIhbavEYdzFef1w4mBgqi0NwDTGQ/EabEvMdxLiLGAH7k6WI4el9z # DhW8GQHLcw/9e0nrrjm+mpG/pfREJ34NWTMsjn3ybF3YYhVqhxueXvuUSSoYLpRc # MnsIU+0kCm+cjDwLBCIfoNBDVxeigzVCyGQFGOMrKTWqnER5G3K0cbb42OOFtKHQ # 6rZqiA6olA8rhLGhMt1HWMb6ti/R4bDfNV/RnfPFxrjcRnHSrz/39J21fdiqdtrm # ax9MahRk1ObFklVrh6s9S7t4+7anCsM7oivRiPvll09CVxg58ck16ZxRHY5ug8gi # ZT9R4vZiomTV/5mpZn1sckbctRrYsUCj/7Si04jGYsefMExAxzbrxtuKMe4cLP1y # p2TrM73gJjrh4QCKsM5W9R9Khg8Zaq2SS8OkH0/nnz/u0Ztkwg== # SIG # End signature block
combined_dataset/train/non-malicious/sample_59_65.ps1
sample_59_65.ps1
########################################################################## # DELL PROPRIETARY INFORMATION # # This software is confidential. Dell Inc., or one of its subsidiaries, has supplied this # software to you under the terms of a license agreement,nondisclosure agreement or both. # You may not copy, disclose, or use this software except in accordance with those terms. # # Copyright 2020 Dell Inc. or its subsidiaries. All Rights Reserved. # # DELL INC. MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE SOFTWARE, # EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. # DELL SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, # MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. # # # ########################################################################## #$pwwd=Get-Content "c:\temp\userpwd.txt" Configuration MultipleCatConfiguration { param ( [string]$ComputerName ) Import-DscResource -ModuleName DellBIOSProvider Node $ComputerName { POSTBehavior POSTBehaviorSettings #resource name { Category = "POSTBehavior" Keypad = "EnabledByNumlock" PowerWarn = "Disabled" Numlock = "Disabled" #Password = "" #SecurePassword=$pwwd.ToString() } PowerManagement PowerManagementSettings #resource name { Category = "PowerManagement" BlockDefinition="1" AutoOnHr=15 AutoOnMn=42 AdvancedBatteryChargeConfiguration = "Tuesday" BeginningOfDay = "10:30" WorkPeriod = "15:45" PeakShiftDayConfiguration = "Saturday" StartTime = "10:30" EndTime = "12:30" ChargeStartTime = "13:30" #Password = "" #SecurePassword=$pwwd.ToString() #PathToKey="" } PowerManagement PowerManagementSettings_next #resource name { Category = "PowerManagement" BlockDefinition="2" PeakShiftDayConfiguration = "Sunday" StartTime = "10:30" EndTime = "12:30" ChargeStartTime = "21:45" #Password = "" #SecurePassword=$pwwd.ToString() } } } # Call the configuration. # It will create a folder with the same name as configuration name (\POSTBehaviorConfiguration)and will contain mof output file. MultipleCatConfiguration -ComputerName localhost MultipleCatConfiguration -ComputerName 10.194.23.66 #Push Mof Start-DscConfiguration -Path .\MultipleCatConfiguration\ -wait -verbose -debug -force # SIG # Begin signature block # MIIutQYJKoZIhvcNAQcCoIIupjCCLqICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDhG4Rh1n980OX5 # RrULrYTvF6jZ2UxrU2wydH1CvYOm5KCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50 # cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My # MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT # MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB # gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW # RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6 # YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n # aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW # xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j # R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk # j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW # FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg # tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr # 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3 # i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm # Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC # ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn # +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB # BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB # BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG # A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js # MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX # MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1 # YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3 # diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc # VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw # Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX # 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY # KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V # HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL # eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA # S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM # ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw # HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500 # H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE # CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg # Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5 # MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv # biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP # RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG # 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7 # 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv # 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs # 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29 # p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu # 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH # yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2 # +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7 # AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj # ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi # yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr # BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0 # MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu # Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE # PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l # dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT # ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh # 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj # xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu # AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c # QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb # fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq # 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS # zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ # 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm # DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF # A3d/YNjCvHTJlZFot7d+YRl1MYIbIzCCGx8CAQEwdzBjMQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl # ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm # hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIGaMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3 # AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC4GCisGAQQBgjcCAQwx # IDAeoByAGgBEAGUAbABsACAAUwBvAGwAdQB0AGkAbwBuMC8GCSqGSIb3DQEJBDEi # BCBhevFMhXEMz8So+hg9+m3z6pmViN5P5+MwIXyMqEj/VDANBgkqhkiG9w0BAQEF # AASCAYCfiQiNlgERkzbbk94Q1MwfT74A05U3rTf95s7MCn7/R6vkkDGFmz1dboUG # UT8MVSKb5pE2jpCDMRzmj9mvupo5adrr22YNZZ13wbK3J26Q1NbCt8ekC8vX/A48 # NME5dwxx9fmSrPIuA67psKsQu2L3EbSL4KMPFsSiy4SWFPVEWNImTgoqP/1DZFlh # rofIyJ+htQFdixJ9SxGfesiesKH1mLXS4shGyT/YdITxR1OryVinumw49Rclk2lV # jlzo8wKQYrIRKujkYQYLyKc0jPC6wVV6wkdGrDwoFvUoGLrFLHmctdp8pkJtDDK1 # 2Gi1HoGNBjG7ARRJ4mIi9TczHDTVkYfWVPDfrJZErnbrgcdNlbVGQ6vZvJCusEPJ # JUiVwXMIFeqRBN+ZGx6S8DjXyc9OU7oMrFm7f4aYp6+nlFxLG/At+sIz4jGfe4HL # UPcxGNg4Hp4X9K8Ehn/KF3dV34pjeia3ktAOATN3ZZICLQB9i5TBBBCN1a29/T1C # 6Crm/ZuhghhgMIIYXAYKKwYBBAGCNwMDATGCGEwwghhIBgkqhkiG9w0BBwKgghg5 # MIIYNQIBAzENMAsGCWCGSAFlAwQCAzCB9AYLKoZIhvcNAQkQAQSggeQEgeEwgd4C # AQEGCmCGSAGG+mwKAwUwMTANBglghkgBZQMEAgEFAAQgfR2rSibQGc6x3sfkMHqr # nT2/YOU3tafgGkkB3TdvMsgCCQDxnhK9+BEWbxgPMjAyNDA0MTgwNzMyNTBaMAMC # AQGgeaR3MHUxCzAJBgNVBAYTAkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQH # EwZPdHRhd2ExFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1 # c3QgVGltZXN0YW1wIEF1dGhvcml0eSAtIFRTQTKgghMOMIIF3zCCBMegAwIBAgIQ # TkDkN1Tt5owAAAAAUdOUfzANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMCVVMx # FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVz # dC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIElu # Yy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBS # b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMjEwNTA3MTU0MzQ1 # WhcNMzAxMTA3MTYxMzQ1WjBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVz # dCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMIICIjANBgkqhkiG9w0BAQEFAAOC # Ag8AMIICCgKCAgEAp4GP9xRFtmJD8tiu0yVeSE9Rv8V9n1AcNdHWfmEqlBltJ0ak # phpd91RRaoAixqhmdU1Ug8leaBur9ltksK2tIL1U70ZrbQLnRa519o6KuTIui7h3 # HFJNeYhfpToYyVAslyctv9oAfWN/7zLsRodj25qfw1ohNnv5m9XKoG5yLPzh8Z5w # TQhWFW+Qq/tIurnXwYJ4hWUuf7XJwOIUtzcRQQbiiuCo9uV+tngFAcNg7U8HQS4K # E0njkJt/3b36rL9kUdFcm7T1XOdc/zubpaAa130JssK3/24cvMh95ukr/HKzFOlK # VRKEnEQldR32KvBPpSA9aCXrYZd8D+W2PfOuw8ERvBuOzOBHMF5CAIZx41isBspl # H3uUpktXZwx+Xq14Z1tV417rx9jsTG6Gy/Pc+J+HqnJYEg99pvj4Qjk7PCzkMk1J # jODhAMI4oJz6hD5B3G5WrsYaW/RnaAUBzRu/roe8nVP2Lui2a+SZ3sVPh1io0mUe # yB/Vcm7uWRxXOwlyndfKt5DGzXtFkpFCA0x9P8ryqrjCDobzEJ9GLqRmhmhaaBhw # KTgRgGBrikOjc2zjs2s3/+adZwGSht8vSNH7UGDVXP4h0wFCY/7vcLQXwI+o7tPB # S18S6v39Lg6HRGDjqfTCGKPj/c4MhCIN86d42pPz2zjPuS8zxv8HPF6+RdMCAwEA # AaOCASswggEnMA4GA1UdDwEB/wQEAwIBhjASBgNVHRMBAf8ECDAGAQH/AgEBMB0G # A1UdJQQWMBQGCCsGAQUFBwMDBggrBgEFBQcDCDA7BgNVHSAENDAyMDAGBFUdIAAw # KDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5ldC9ycGEwMwYIKwYB # BQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAw # BgNVHR8EKTAnMCWgI6Ahhh9odHRwOi8vY3JsLmVudHJ1c3QubmV0L2cyY2EuY3Js # MB0GA1UdDgQWBBSCutY9l86fz3Hokjev/bO1aTVXzzAfBgNVHSMEGDAWgBRqciZ6 # 0B7vfec7aVHUbI2fkBJmqzANBgkqhkiG9w0BAQsFAAOCAQEAH15BBLaDcCRTLFVz # HWU6wOy0ewSYXlk4EwmkWZRCXlC/T2xuJSCQk1hADfUZtGLuJF7CAVgVAh0QCW+o # 1PuSfjc4Pi8UfY8dQzZks2YTXxTMpXH3WyFLxpe+3JX8cH0RHNMh3dAkOSnF/goa # pc97ee46b97cv+kR3RaDCNMsjX9NqBR5LwVhUjjrYPMUaH3LsoqtwJRc5CYOLIrd # RsPO5FZRxVbjhbhNm0VyiwfxivtJuF/R8paBXWlSJPEII9LWIw/ri9d+i8GTa/rx # YntY6VCbl24XiA3hxkOY14FhtoWdR+yxnq4/IDtDndiiHODUfAjCr3YG+GJmerb3 # +sivNTCCBm8wggRXoAMCAQICECW8K/MpyhB/Hqm6iIXUnTswDQYJKoZIhvcNAQEN # BQAwaTELMAkGA1UEBhMCVVMxFjAUBgNVBAoMDUVudHJ1c3QsIEluYy4xQjBABgNV # BAMMOUVudHJ1c3QgQ29kZSBTaWduaW5nIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo # b3JpdHkgLSBDU0JSMTAeFw0yMTA1MDcxOTIyMTRaFw00MDEyMjkyMzU5MDBaME4x # CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5F # bnRydXN0IFRpbWUgU3RhbXBpbmcgQ0EgLSBUUzIwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQC1AyoGtoRPNMyeMb7qjsZ7biAkDwPXvYE2M+Zv0j67xJ6q # oMxmXUJgNFHiLWGDujyeaLhLw2aOpd4rupstQaXe0MtXBS2I2cBGiG08NQ0ZkKy4 # DBnwTMXbRVvcO8K8jUQA4Dj//13IzwiaPdSy63uVw8SlAOBiAWRZX4zje4up+UW3 # xrCiCjdDuEaBq4Z+fy/e8F/rzSDMpS0x46gumZvgeN30212CY30wOYh+JAbmfGCE # eMhcKeWVy/V7T89Y3JDPp6J7FFTE4DeYMMGbtq6cKfZrJUPnEmo+GYu+wOeB10ow # CH58jd8880iTId6Bg2qdAD7XYLrRs2IIlum2SQA49Fx2Ddp3aj2gld4eocxZel6f # z+l2XUDytRW1YGgs81rJI4PY9RpraSikttSuYgbeJkW93ulWd6rcZLBBzcwT8V1x # dLKUCEtPMm5+cLh36dUyN8J63kIS6HEc4thiv6prQYYGW+ZpviYJ9JfC/kz0gHKE # btvexQepjhWibeEb4AkP9aAHoLvEd3MJPAeTjQG1EmctTRm1uMXJEKtwz0L/pScd # 1hLW5BhEYPs5XYS7ZrVTEp0DFIJlKbTsSXL9s0PlwwIpJLof+Li+XaO3Lqn8z2LZ # +pfEE3jjVblaeoTr/7vPaYjAtvmLYIVBEFDHBRDSXnadPjXs9k+K+RJ7P68LNwID # AQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUJg/wxEgI # G83dkfVUVLazs/yZ8QgwHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2ztWk1V88w # MwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5lbnRydXN0 # Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2Nz # YnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUHAwgwRQYD # VR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cuZW50cnVz # dC5uZXQvcnBhMAgGBmeBDAEEAjANBgkqhkiG9w0BAQ0FAAOCAgEAdj1GaIVfCcDO # yfjHuNd+p1w7C0ZzziJTizj2Ebp3xMKHIY8n2QyV6+hL5VzXkBVvqCosimrgIhE0 # efq9lnnIdhbNsUTqcVEPm1XJGHzVgnmc86a3k6kFOHICBpehqLJ5fl4I4m5seZqo # h5TOf49VNkAPnz9R1Wa+e6uG5m6Huk5jXbHYjh/LZ8MNcNp665OyFITSPn2TPxYM # NqBceQCfC27lhCrYiMFtBLc385KacOA7A/3NuyeCzi/8jeSyyr74JYXG7XTIPTVf # OAk9eU/rG+BBXqV0gT9RFcD4SYiPursF1K1FgjN5wSWNX1Q9keS4nxeYAF2tKOVP # Xxv7+FS1pcQk/PB2O/gNXsxHsMqqu25R31O1SRrxYIe3+f1pBnVfc9YRkPKAWI7l # ww8DmIwEU7Mph98/97DpTFeBJER5aP4bNgfWZT3sb9bCtaphfGYG7NLlaYD4cZIu # XOIRRhhFS9b6BWTvu94GykMlvd+NyQF0YYjb8MemPeMMcbx/S+fI4G7g2oD5AJ7A # ayXVo7pcK/7EYCAUSgcjMeUay5FEspp7Q/FbmLUhS7gxOyJU7nlh95qUG2YnKsbf # 4WVd73E55lAl/Yc0ua5dfCc752WT+CiEsW+GkyyTk7Zwr6HuyKRhqYQ7+wq3+Lht # Ju5HTvVeBfqcDxF918uRrkMg9xVZY7wwgga0MIIEnKADAgECAhBbcCbMlvZ4GruF # 9hH1bbtuMA0GCSqGSIb3DQEBDQUAME4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1F # bnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBpbmcgQ0Eg # LSBUUzIwHhcNMjQwMTE5MTY0NzQ3WhcNMzUwNDE4MDAwMDAwWjB1MQswCQYDVQQG # EwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRYwFAYDVQQK # Ew1FbnRydXN0LCBJbmMuMSswKQYDVQQDEyJFbnRydXN0IFRpbWVzdGFtcCBBdXRo # b3JpdHkgLSBUU0EyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqoYE # OF6PaL+D9Vr9VJvFfTp1ncSnLU9t6dAFH1HjM7svXzqxllSK6Qh8NK2Jg1WknwLM # IwvYG3pApMyfQuoTf3y44LdKAgXig0kEbwaGzXNBqYPUmGf69FIZeuNKWSiHVhdd # SPGGkQu4ImTbQfldVLU1pG443AgNGlYYQMN+mDxCM4QNxaVhUc4gbU8Ay0LwqHUb # 20b+Kdwbntf4GAVRdjCbdL2VHxlTZRVHLFZja+m6SKwKOLbBcv0gCqN0GmsHf9Hd # rBfOtRzHeokM7G0cMI0F8K89l8w1tLUFA2a6nnb8OdrImtYSEuRBwoUiQPDLuojp # 0ofCq8Y0O+WrDQAGDga1i3vRCyLaPKjJVnvwNQSW6llGjI/UoLWpg7DOhPtLROVB # qBbzr9rRoCdw3wfvN/Oukc7UIX+GmNxe7o/A2kfbacoQuZGVgBVj8SsawpahH8L3 # PNT2fSQHJahUlG8KVdvbJENuLjuie0m7tdYYj9kEs77qx7VkmkvOUmEeKwUeYzdG # nbHJ1V6HpOrXNLIhQhe4Oig6XqXtPv03F39jIPJ71l/K8xQ/4c7/ineUZm2JweDs # fwRwOGQn9acXfU3KDIEbxeXxNsV6rn0ppEc1OPoN9FMDKQX8b6GLyc3xuIhA09Lb # niUxrdfmWtgEtIS7BEZhZv9dMt780z58Thjvft8CAwEAAaOCAWUwggFhMAwGA1Ud # EwEB/wQCMAAwHQYDVR0OBBYEFPV2GvgQmJKhG3epACzxlWICC3knMB8GA1UdIwQY # MBaAFCYP8MRICBvN3ZH1VFS2s7P8mfEIMGgGCCsGAQUFBwEBBFwwWjAjBggrBgEF # BQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMwYIKwYBBQUHMAKGJ2h0dHA6 # Ly9haWEuZW50cnVzdC5uZXQvdHMyLWNoYWluMjU2LnA3YzAxBgNVHR8EKjAoMCag # JKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L3RzMmNhLmNybDAOBgNVHQ8BAf8E # BAMCB4AwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwTAYDVR0gBEUwQzA3BgpghkgB # hvpsCgEHMCkwJwYIKwYBBQUHAgEWG2h0dHBzOi8vd3d3LmVudHJ1c3QubmV0L3Jw # YTAIBgZngQwBBAIwDQYJKoZIhvcNAQENBQADggIBAKmrfb8aAIVb3O1xJl6Ugq9c # gkv6HDnFU7XDBt0DYH75YZpBIMKuQRcupUIIkQlelzCYgUXWsrWEPYvphwfaAT/g # CFhnESCUHsAWjmN3vZtsBY09tcuaMalKXGIyohPOkJwNx5BPZ8PgqH+HhEvX8sEh # DxDnF7n7vQnMvoqmAf5Ngk9pIJp1a+QN91AmU/wz9/4brqdqwKjrHq8i0z1gFZ+6 # 5NUppLVXn7Fl9rFMYdXSyNq3rKoYHyAYiqb49Qf5civ2Y9glnBb++5TfhnSiILTy # CN8W7zmAdjqSsdCWg2rafFOJWRsNXPG7KfIhT2EsJIn4dgl/2WiQjlcMZNV2AHFZ # 89SEyDyhiH+ob/O9bn+wqI7mk2zpFMV1HAwrzvIH+7Wu1EExv8HMaZgYrlsIj6tc # ZLmEar1cOKHfT0K3S1tS0973O8ufb8JZQiJOCxi3Isgv/GoJhe1QKVF6xJRLtnFl # ikqGmkt4S1aKod4vi5NbMsyhue+ptgzYBgsXML8Nb4+TrMsR9fHHAJ7QGdecX45U # fGupQztj3MFEq72MOkPwcj8klc2EkV0hAA14aw1cIySfTK80yxRa3rHkRVD9r2+n # BYKnc8/P6ZLqcyqx4d2iA+YgvB1nGlbCLvasX8pOgbDmWh1zz9IU81B4KAVOFW6F # JPgzqIivdG30Us6MqISeMYIEFjCCBBICAQEwYjBOMQswCQYDVQQGEwJVUzEWMBQG # A1UEChMNRW50cnVzdCwgSW5jLjEnMCUGA1UEAxMeRW50cnVzdCBUaW1lIFN0YW1w # aW5nIENBIC0gVFMyAhBbcCbMlvZ4GruF9hH1bbtuMAsGCWCGSAFlAwQCA6CCAYkw # GgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMBwGCSqGSIb3DQEJBTEPFw0yNDA0 # MTgwNzMyNTBaMCkGCSqGSIb3DQEJNDEcMBowCwYJYIZIAWUDBAIDoQsGCSqGSIb3 # DQEBDTBPBgkqhkiG9w0BCQQxQgRAcr9ZepT1U/8dYPFrvrHTQG/jl6O4g1iyNZm8 # tCZRh67W9gkENNGRtM52KQg7PxNzkCIELmsy8l++KqR0m24TmTCB0AYLKoZIhvcN # AQkQAi8xgcAwgb0wgbowgbcwCwYJYIZIAWUDBAIDBEA5EUIuFwI+qpkkmXQODsjo # 0nLTVfxc9mz5EVavl1U05ICv07x8TFtX79H/vNt1FGXg1AVahU6bETnZ9+xV1f4k # MGYwUqRQME4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMScw # JQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBpbmcgQ0EgLSBUUzICEFtwJsyW9nga # u4X2EfVtu24wCwYJKoZIhvcNAQENBIICAG2VJFGGFJiMJTtGaRft8oPwfsB98MDL # qKrT8imW2r7X7MaW17wefvjyayOANSY/TQjDdrSslvdFAtyQW+XejNqqCOxGwHHP # bacWHkR7QbMOFgYzH1CoT1RwMJ9fmA18mEhQK3GBJbnFlR7St64/Tt/TpWLiGUu7 # pLi5EowbU1q577+ACdd8/MnW+rb9D5SMg6dLSUkkHWLy2gjPikjbQKLvdKhU1ab5 # Qg7hRv8i/uSe0wA4rEPQNNn1rq0gSjA3RRwwcK20zaI+F411VfQ3S6hO9KIb83U/ # 2z2Z8J3w/M2TgsMCwN08cKiQJvKuTMaz0JEGGTDZR+7z+TxhG869152tpsuMko1h # Ze6StTX0dsFQvvqtUHDjryDVDP/erwlVJqMj9PbeSudTfLIXI7mZIHRaO0kekg90 # 2UC9hlo9MOI5TMBcewIMRthcGZYo1oxPd5aizCE3plRZ3Qr92rHJCaNNn7xQ/9aC # By7Jakg3H8t3S3iiUMmgoAu4emvjLEg0XCUSk0LECg9em7vPwil5JyATLRJoepZi # 0O2aTpXw1MawIgqKr/EgAQopQD26IaZ+VOLGnFAthaMXlohcT79WJTXGxJSQGTwu # Hdgf7oa3KkmNJz3O15i2UotjSzxuTc6Xwo7B6sci0pP5ALgMIfBZn2w+al4/2KWA # MCo4cNXjS8Df # SIG # End signature block
combined_dataset/train/non-malicious/Get-Netstat _1.2.ps1
Get-Netstat _1.2.ps1
Function Get-Netstat { $null, $null, $null, $null, $netstat = netstat -a -n -o [regex]$regexTCP = '(?<Protocol>\\S+)\\s+((?<LAddress>(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?))|(?<LAddress>\\[?[0-9a-fA-f]{0,4}(\\:([0-9a-fA-f]{0,4})){1,7}\\%?\\d?\\]))\\:(?<Lport>\\d+)\\s+((?<Raddress>(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?))|(?<RAddress>\\[?[0-9a-fA-f]{0,4}(\\:([0-9a-fA-f]{0,4})){1,7}\\%?\\d?\\]))\\:(?<RPort>\\d+)\\s+(?<State>\\w+)\\s+(?<PID>\\d+$)' [regex]$regexUDP = '(?<Protocol>\\S+)\\s+((?<LAddress>(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?)\\.(2[0-4]\\d|25[0-5]|[01]?\\d\\d?))|(?<LAddress>\\[?[0-9a-fA-f]{0,4}(\\:([0-9a-fA-f]{0,4})){1,7}\\%?\\d?\\]))\\:(?<Lport>\\d+)\\s+(?<RAddress>\\*)\\:(?<RPort>\\*)\\s+(?<PID>\\d+)' [psobject]$process = "" | Select-Object Protocol, LocalAddress, Localport, RemoteAddress, Remoteport, State, PID, ProcessName, Services $Services = @{} get-wmiobject win32_service | ForEach-Object { [String]$SvcPID = $_.processid If ($Services.ContainsKey($SvcPID)) { $Services.Item($SvcPID) = $Services.Item($SvcPID) += $($_.Name) } Else { $Services.Add($SvcPID,@($_.Name)) } } foreach ($net in $netstat) { switch -regex ($net.Trim()) { $regexTCP { $process.Protocol = $matches.Protocol $process.LocalAddress = $matches.LAddress $process.Localport = $matches.LPort $process.RemoteAddress = $matches.RAddress $process.Remoteport = $matches.RPort $process.State = $matches.State $process.PID = $matches.PID $process.ProcessName = ( Get-Process -Id $matches.PID -ea 0).ProcessName $process.Services = $Services.Item($matches.PID) } $regexUDP { $process.Protocol = $matches.Protocol $process.LocalAddress = $matches.LAddress $process.Localport = $matches.LPort $process.RemoteAddress = $matches.RAddress $process.Remoteport = $matches.RPort $process.State = $matches.State $process.PID = $matches.PID $process.ProcessName = ( Get-Process -Id $matches.PID -ea 0).ProcessName $process.Services = $Services.Item($matches.PID) } } $process } }
combined_dataset/train/non-malicious/sample_48_49.ps1
sample_48_49.ps1
# # Module manifest for module 'OCI.PSModules.Dashboardservice' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dashboardservice.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'cd6937ca-f4c2-4263-82d8-c6bec6fbadc4' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dashboardservice Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dashboardservice.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDashboardserviceDashboard', 'Get-OCIDashboardserviceDashboardGroup', 'Get-OCIDashboardserviceDashboardGroupsList', 'Get-OCIDashboardserviceDashboardsList', 'Move-OCIDashboardserviceDashboardGroup', 'Move-OCIDashboardserviceDashboardGroupCompartment', 'New-OCIDashboardserviceDashboard', 'New-OCIDashboardserviceDashboardGroup', 'Remove-OCIDashboardserviceDashboard', 'Remove-OCIDashboardserviceDashboardGroup', 'Update-OCIDashboardserviceDashboard', 'Update-OCIDashboardserviceDashboardGroup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dashboardservice' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1075.ps1
1075.ps1
Import-Module -Name (Join-Path -Path $PSScriptRoot -ChildPath 'CarbonDscTest' -Resolve) -Force $UserName = 'CarbonDscTestUser' $Password = [Guid]::NewGuid().ToString() $tempDir = $null Install-User -Credential (New-Credential -UserName $UserName -Password $Password) function New-MockDir { $path = (Join-Path -Path (Get-Item -Path 'TestDrive:').FullName -ChildPath ([Guid]::NewGuid().ToString())) Install-Directory -Path $path return $path } Describe 'Carbon_Permission when non-existent permissions should be absent' { Start-CarbonDscTestFixture 'Permission' $tempDir = New-MockDir Context 'the user' { It 'should not have access to the directory' { Get-Permission -Path $tempDir -Identity $UserName -Inherited | Should BeNullOrEmpty } } Test-TargetResource -Identity $UserName -Path $tempDir -Ensure Absent -ErrorVariable 'errors' It 'should not throw any errors' { $errors | Should BeNullOrEmpty } } Describe 'Carbon_Permission when no permissions should be present' { Start-CarbonDscTestFixture 'Permission' $tempDir = New-MockDir Grant-Permission -Path $tempDir -Identity $UserName -Permission FullControl Context 'the user' { It 'should have access to the directory' { Get-Permission -Path $tempDir -Identity $UserName -Inherited | Should Not BeNullOrEmpty } } Test-TargetResource -Identity $UserName -Path $tempDir -Ensure Present -ErrorVariable 'errors' -ErrorAction SilentlyContinue It 'should throw an error' { $errors | Should Not BeNullOrEmpty $errors | Should Match 'is mandatory' } } Describe 'Carbon_Permission.when appending permissions' { Start-CarbonDscTestFixture 'Permission' $tempDir = New-MockDir $rule1 = @{ Identity = $UserName; Path = $tempDir; Permission = 'ReadAndExecute'; ApplyTo = 'ContainerAndSubContainersAndLeaves'; Append = $true; Ensure = 'Present'; } $rule2 = @{ Identity = $UserName; Path = $tempDir; Permission = 'Write'; ApplyTo = 'ContainerAndLeaves'; Append = $true; Ensure = 'Present'; } It ('should report correct resource state') { $result = Test-TargetResource @rule1 $result | Should -BeFalse $result = Test-TargetResource @rule2 $result | Should -BeFalse } Set-TargetResource @rule1 It ('should report correct resource state') { $result = Test-TargetResource @rule1 $result | Should -BeTrue $result = Test-TargetResource @rule2 $result | Should -BeFalse } Set-TargetResource @rule2 It ('should report correct resource state') { $result = Test-TargetResource @rule1 $result | Should -BeTrue $result = Test-TargetResource @rule2 $result | Should -BeTrue } It 'should add two rules to directory' { $perm = Get-Permission -Path $tempDir -Identity $UserName $perm | Should -HaveCount 2 } } Describe 'Carbon_Permission.when granting permissions on registry' { Start-CarbonDscTestFixture 'Permission' $tempDir = New-MockDir $Global:Error.Clear() It 'should grant permission on registry' { $keyPath = 'hkcu:\{0}' -f (Split-Path -Leaf -Path $tempDir) New-Item -Path $keyPath try { (Test-Permission -Identity $UserName -Path $keyPath -Permission ReadKey -ApplyTo Container -Exact) | Should Be $false (Test-TargetResource -Identity $UserName -Path $keyPath -Permission ReadKey -Ensure Present) | Should Be $false Set-TargetResource -Identity $UserName -Path $keyPath -Permission ReadKey -ApplyTo Container -Ensure Present $Global:Error.Count | Should Be 0 (Test-Permission -Identity $UserName -Path $keyPath -Permission ReadKey -ApplyTo Container -Exact) | Should Be $true (Test-TargetResource -Identity $UserName -Path $keyPath -Permission ReadKey -Ensure Present) | Should Be $true Set-TargetResource -Identity $UserName -Path $keyPath -Permission ReadKey -ApplyTo Container -Ensure Absent $Global:Error.Count | Should Be 0 (Test-Permission -Identity $UserName -Path $keyPath -Permission ReadKey -ApplyTo Container -Exact) | Should Be $false (Test-TargetResource -Identity $UserName -Path $keyPath -Permission ReadKey -Ensure Absent) | Should Be $true } finally { Remove-Item -Path $keyPath } } } Describe 'Carbon_Permission' { BeforeAll { Start-CarbonDscTestFixture 'Permission' } BeforeEach { $Global:Error.Clear() $tempDir = New-MockDir } AfterEach { if( (Test-Path -Path $tempDir -PathType Container) ) { Remove-Item -Path $tempDir -Recurse } } It 'should grant permission on file system' { Set-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -Ensure Present $Global:Error.Count | Should Be 0 (Test-Permission -Identity $UserName -Path $tempDir -Permission FullControl -ApplyTo ContainerAndSubContainersAndLeaves -Exact) | Should Be $true } It 'should grant permission with inheritence on file system' { Set-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -ApplyTo Container -Ensure Present $Global:Error.Count | Should Be 0 (Test-Permission -Identity $UserName -Path $tempDir -Permission FullControl -ApplyTo Container -Exact) | Should Be $true } It 'should grant permission on private key' { $cert = Install-Certificate -Path (Join-Path -Path $PSScriptRoot -ChildPath 'Cryptography\CarbonTestPrivateKey.pfx' -Resolve) -StoreLocation LocalMachine -StoreName My try { $certPath = Join-Path -Path 'cert:\LocalMachine\My' -ChildPath $cert.Thumbprint -Resolve (Get-Permission -Path $certPath -Identity $UserName) | Should BeNullOrEmpty (Test-TargetResource -Path $certPath -Identity $UserName -Permission 'GenericRead') | Should Be $false Set-TargetResource -Identity $UserName -Path $certPath -Permission GenericRead -Ensure Present (Get-Permission -Path $certPath -Identity $UserName) | Should Not BeNullOrEmpty (Test-TargetResource -Path $certPath -Identity $UserName -Permission 'GenericRead') | Should Be $true Set-TargetResource -Identity $UserName -Path $certPath -Permission GenericRead -Ensure Absent (Get-Permission -Path $certPath -Identity $UserName) | Should BeNullOrEmpty (Test-TargetResource -Path $certPath -Identity $UserName -Permission 'GenericRead' -Ensure Absent) | Should Be $true } finally { Uninstall-Certificate -Certificate $cert -StoreLocation LocalMachine -StoreName My } } It 'should change permission' { Set-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -Ensure Present Set-TargetResource -Identity $UserName -Path $tempDir -Permission Read -ApplyTo Container -Ensure Present (Test-Permission -Identity $UserName -Path $tempDir -Permission Read -ApplyTo Container -Exact) | Should Be $true } It 'should revoke permission' { Set-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -Ensure Present Set-TargetResource -Identity $UserName -Path $tempDir -Ensure Absent (Test-Permission -Identity $UserName -Path $tempDir -Permission FullControl -Exact) | Should Be $false } It 'should require permission when granting' { Set-TargetResource -Identity $UserName -Path $tempDir -Ensure Present -ErrorAction SilentlyContinue $Global:Error.Count | Should BeGreaterThan 0 $Global:Error[0] | Should Match 'mandatory' (Get-Permission -Path $tempDir -Identity $UserName) | Should BeNullOrEmpty } It 'should get no permission' { $resource = Get-TargetResource -Identity $UserName -Path $tempDir $resource | Should Not BeNullOrEmpty $resource.Identity | Should Be $UserName $resource.Path | Should Be $tempDir $resource.Permission | Should BeNullOrEmpty $resource.ApplyTo | Should BeNullOrEmpty Assert-DscResourceAbsent $resource } It 'should get current permission' { Set-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -Ensure Present $resource = Get-TargetResource -Identity $UserName -Path $tempDir $resource | Should Not BeNullOrEmpty $resource.Identity | Should Be $UserName $resource.Path | Should Be $tempDir $resource.Permission | Should Be 'FullControl' $resource.ApplyTo | Should Be 'ContainerAndSubContainersAndLeaves' Assert-DscResourcePresent $resource } It 'should get multiple permissions' { Set-TargetResource -Identity $UserName -Path $tempDir -Permission Read,Write -Ensure Present $resource = Get-TargetResource -Identity $UserName -Path $tempDir ,$resource.Permission | Should BeOfType 'string[]' ($resource.Permission -join ',') | Should Be 'Write,Read' } It 'should get current container inheritance flags' { Set-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -ApplyTo SubContainers -Ensure Present $resource = Get-TargetResource -Identity $UserName -Path $tempDir $resource | Should Not BeNullOrEmpty $resource.ApplyTo | Should Be 'SubContainers' } It 'should test no permission' { (Test-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -Ensure Present) | Should Be $false (Test-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -ApplyTo ContainerAndSubContainersAndLeaves -Ensure Present) | Should Be $false (Test-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -Ensure Absent) | Should Be $true (Test-TargetResource -Identity $UserName -Path $tempDir -Permission FullControl -ApplyTo ContainerAndSubContainersAndLeaves -Ensure Absent) | Should Be $true } It 'should test existing permission' { Set-TargetResource -Identity $UserName -Path $tempDir -Permission Read -ApplyTo Container -Ensure Present (Test-TargetResource -Identity $UserName -Path $tempDir -Permission Read -Ensure Present) | Should Be $true (Test-TargetResource -Identity $UserName -Path $tempDir -Permission Read -ApplyTo Container -Ensure Present) | Should Be $true (Test-TargetResource -Identity $UserName -Path $tempDir -Permission Read -Ensure Absent) | Should Be $false (Test-TargetResource -Identity $UserName -Path $tempDir -Permission Read -ApplyTo Container -Ensure Absent) | Should Be $false (Test-TargetResource -Identity $UserName -Path $tempDir -Permission Write -Ensure Present) | Should Be $false (Test-TargetResource -Identity $UserName -Path $tempDir -Permission Read -ApplyTo Leaves -Ensure Present) | Should Be $false (Test-TargetResource -Identity $UserName -Path $tempDir -Permission Write -Ensure Absent) | Should Be $false (Test-TargetResource -Identity $UserName -Path $tempDir -Permission Read -ApplyTo Leaves -Ensure Absent) | Should Be $false } configuration DscConfiguration { param( $Ensure ) Set-StrictMode -Off Import-DscResource -Name '*' -Module 'Carbon' node 'localhost' { Carbon_Permission set { Identity = $UserName; Path = $tempDir; Permission = 'Read','Write'; ApplyTo = 'Container'; Ensure = $Ensure; } } } It 'should run through dsc' { & DscConfiguration -Ensure 'Present' -OutputPath $CarbonDscOutputRoot Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $CarbonDscOutputRoot -Force $Global:Error.Count | Should Be 0 (Test-TargetResource -Identity $UserName -Path $tempDir -Permission 'Read','Write' -ApplyTo 'Container' -Ensure 'Present') | Should Be $true (Test-TargetResource -Identity $UserName -Path $tempDir -Permission 'Read','Write' -ApplyTo 'Container' -Ensure 'Absent') | Should Be $false & DscConfiguration -Ensure 'Absent' -OutputPath $CarbonDscOutputRoot Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $CarbonDscOutputRoot -Force $Global:Error.Count | Should Be 0 (Test-TargetResource -Identity $UserName -Path $tempDir -Permission 'Read','Write' -ApplyTo 'Container' -Ensure 'Present') | Should Be $false (Test-TargetResource -Identity $UserName -Path $tempDir -Permission 'Read','Write' -ApplyTo 'Container' -Ensure 'Absent') | Should Be $true $result = Get-DscConfiguration $Global:Error.Count | Should Be 0 $result | Should BeOfType ([Microsoft.Management.Infrastructure.CimInstance]) $result.PsTypeNames | Where-Object { $_ -like '*Carbon_Permission' } | Should Not BeNullOrEmpty } configuration DscConfiguration2 { param( $Ensure ) Set-StrictMode -Off Import-DscResource -Name '*' -Module 'Carbon' node 'localhost' { Carbon_Permission set { Identity = $UserName; Path = $tempDir; Ensure = 'Absent'; } } } It 'should not fail when user doesn''t have permission' { Revoke-Permission -Path $tempDir -Identity $UserName & DscConfiguration2 -Ensure 'Present' -OutputPath $CarbonDscOutputRoot Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $CarbonDscOutputRoot -Force $Global:Error.Count | Should Be 0 } configuration DscConfiguration3 { param( $Ensure ) Set-StrictMode -Off Import-DscResource -Name '*' -Module 'Carbon' node 'localhost' { Carbon_Permission SetRead { Identity = $UserName; Path = $tempDir; Permission = 'ReadAndExecute' ApplyTo = 'ContainerAndSubContainersAndLeaves'; Append = $true; Ensure = 'Present'; } Carbon_Permission SetWrite { Identity = ('.\{0}' -f $UserName); Path = $tempDir; Permission = 'Write' ApplyTo = 'ContainerAndLeaves'; Append = $true; Ensure = 'Present'; } } } It 'should apply multiple permissions' { Revoke-Permission -Path $tempDir -Identity $UserName & DscConfiguration3 -Ensure 'Present' -OutputPath $CarbonDscOutputRoot Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $CarbonDscOutputRoot -Force $Global:Error.Count | Should Be 0 Get-CPermission -Path $tempDir -Identity $UserName | Should -HaveCount 2 } } Stop-CarbonDscTestFixture
combined_dataset/train/non-malicious/2809.ps1
2809.ps1
if (Get-Command logparser.exe) { $lpquery = @" SELECT COUNT(ServiceName, CmdLine, FailAction1, FailAction2, FailAction3) as ct, ServiceName, CmdLine, FailAction1, FailAction2, FailAction3 FROM *SvcFail.tsv GROUP BY ServiceName, CmdLine, FailAction1, FailAction2, FailAction3 ORDER BY ct ASC "@ & logparser -stats:off -i:csv -fixedsep:on -dtlines:0 -rtp:-1 $lpquery } else { $ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName) "${ScriptName} requires logparser.exe in the path." }
combined_dataset/train/non-malicious/Kill Outlook + CopyPST.ps1
Kill Outlook + CopyPST.ps1
$rep_du_user = $env:userprofile $repertoire_pst = ($rep_du_user+"\\AppData\\Local\\Microsoft\\Outlook") $repertoire_sauvegarde = "directory" #Kill de outlook Get-Process | Where { $_.Name -Eq "outlook" } | Kill #wait and see :) sleep 10 #copy des pst xcopy $repertoire_pst $repertoire_sauvegarde /D /E /C /R /H /I /K /Y /G
combined_dataset/train/non-malicious/sample_24_21.ps1
sample_24_21.ps1
#!powershell # -*- coding: utf-8 -*- # (c) 2022, John McCall (@lowlydba) # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) #AnsibleRequires -CSharpUtil Ansible.Basic #AnsibleRequires -PowerShell ansible_collections.lowlydba.sqlserver.plugins.module_utils._SqlServerUtils #Requires -Modules @{ ModuleName="dbatools"; ModuleVersion="2.0.0" } $ErrorActionPreference = "Stop" $spec = @{ supports_check_mode = $true options = @{ login = @{type = 'str'; required = $true } password = @{type = 'str'; required = $false; no_log = $true } enabled = @{type = 'bool'; required = $false; default = $true } default_database = @{type = 'str'; required = $false } language = @{type = 'str'; required = $false } password_must_change = @{type = 'bool'; required = $false } password_policy_enforced = @{type = 'bool'; required = $false } password_expiration_enabled = @{type = 'bool'; required = $false } sid = @{type = 'str'; required = $false } skip_password_reset = @{type = 'bool'; required = $false; default = $false } state = @{type = 'str'; required = $false; default = 'present'; choices = @('present', 'absent') } } } $module = [Ansible.Basic.AnsibleModule]::Create($args, $spec, @(Get-LowlyDbaSqlServerAuthSpec)) $sqlInstance, $sqlCredential = Get-SqlCredential -Module $module $login = $module.Params.login if ($null -ne $module.Params.password) { $secPassword = ConvertTo-SecureString -String $module.Params.password -AsPlainText -Force } $enabled = $module.Params.enabled $defaultDatabase = $module.Params.default_database $language = $module.Params.language [nullable[bool]]$passwordMustChange = $module.Params.password_must_change [nullable[bool]]$passwordExpirationEnabled = $module.Params.password_expiration_enabled [nullable[bool]]$passwordPolicyEnforced = $module.Params.password_policy_enforced [nullable[bool]]$skip_password_reset = $module.Params.skip_password_reset $sid = $module.Params.sid $state = $module.Params.state $checkMode = $module.CheckMode $module.Result.changed = $false try { $getLoginSplat = @{ SqlInstance = $sqlInstance SqlCredential = $sqlCredential Login = $login ExcludeSystemLogin = $true EnableException = $true } $existingLogin = Get-DbaLogin @getLoginSplat if ($state -eq "absent") { if ($null -ne $existingLogin) { $output = $existingLogin | Remove-DbaLogin -WhatIf:$checkMode -EnableException -Force -Confirm:$false $module.Result.changed = $true } } elseif ($state -eq "present") { $setLoginSplat = @{ SqlInstance = $sqlInstance SqlCredential = $sqlCredential Login = $login WhatIf = $checkMode EnableException = $true Confirm = $false } if ($null -ne $defaultDatabase) { $setLoginSplat.add("DefaultDatabase", $defaultDatabase) } if ($null -ne $passwordExpirationEnabled) { if ($existingLogin.PasswordExpirationEnabled -ne $passwordExpirationEnabled) { $changed = $true } if ($passwordExpirationEnabled -eq $true) { $setLoginSplat.add("PasswordExpirationEnabled", $true) } } if ($null -ne $passwordPolicyEnforced) { if ($existingLogin.PasswordPolicyEnforced -ne $passwordPolicyEnforced) { $changed = $true } if ($passwordPolicyEnforced -eq $true) { $setLoginSplat.add("PasswordPolicyEnforced", $true) } } if ($true -eq $passwordMustChange) { if ($existingLogin.PasswordMustChange -ne $passwordMustChange) { $changed = $true } if ($passwordMustChange -eq $true) { $setLoginSplat.add("PasswordMustChange", $true) } } if (($null -ne $secPassword) -and ($skip_password_reset -eq $false)) { $setLoginSplat.add("SecurePassword", $secPassword) $changed = $true } # Login already exists if ($null -ne $existingLogin) { # Splat login status if ($enabled -eq $false) { $disabled = $true $setLoginSplat.add("Disable", $true) } else { $disabled = $false $setLoginSplat.add("Enable", $true) } # Login needs to be modified if (($changed -eq $true) -or ($disabled -ne $existingLogin.IsDisabled) -or ($setLoginSplat.ContainsKey("SecurePassword"))) { $output = Set-DbaLogin @setLoginSplat $module.result.changed = $true } } # New login else { if ($null -ne $language) { $setLoginSplat.add("Language", $language) } if ($enabled -eq $false) { $setLoginSplat.add("Disabled", $true) } if ($null -ne $sid) { $setLoginSplat.add("Sid", $sid) } $output = New-DbaLogin @setLoginSplat $module.result.changed = $true } # If not in check mode, add extra fields we can change to default display set if ($null -ne $output) { $output.PSStandardMembers.DefaultDisplayPropertySet.ReferencedPropertyNames.Add("DefaultDatabase") $output.PSStandardMembers.DefaultDisplayPropertySet.ReferencedPropertyNames.Add("Language") } } if ($null -ne $output) { $resultData = ConvertTo-SerializableObject -InputObject $output $module.Result.data = $resultData } $module.ExitJson() } catch { $module.FailJson("Configuring login failed: $($_.Exception.Message) ; $setLoginSplat", $_) }
combined_dataset/train/non-malicious/Out-Balloon_1.ps1
Out-Balloon_1.ps1
<# .Synopsis Makes a baloon tip in the notification area .Description With just a few arguments, it is easy to make some text appear in a little balloon. You can specify an icon file (*.ico) with the -icon argument, if you don't then the first icon of the host is used. out-balloon accepts pipeline input, strings only please. It blocks for the duration of the balloon display, 3 seconds by default. Simple fixes for this are welcome. timeout should be an integer value. INSTALLATION: um, save this text in a file named out-balloon.ps1 in your path .Example out-balloon "hey, your job is done." -icon "C:\\Program Files\\Microsoft Office\\Office12\\MYSL.ICO" "job done." | out-balloon #> param( [Parameter(ValueFromPipeline=$true,Position=0,Mandatory=$true)] [Alias('output')] [string]$text, [string]$icon, [int32]$timeout = 3 ) begin { [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Drawing") $not = new-object System.Windows.Forms.NotifyIcon if ($icon -eq $null) { if ($win32extraciconex -eq $null) { $script:ExtractIconEx = Add-Type ¢memberDefinition @" [DllImport("Shell32", CharSet=CharSet.Auto)] private static extern int ExtractIconEx (string lpszFile, int nIconIndex, IntPtr[] phIconLarge,IntPtr[] phIconSmall,int nIcons); [DllImport("user32.dll", EntryPoint="DestroyIcon", SetLastError=true)] private static extern int DestroyIcon(IntPtr hIcon); public static System.Drawing.Icon ExtractIconFromExe(string file, bool large) { int readIconCount = 0; IntPtr[] hDummy = new IntPtr[1] {IntPtr.Zero}; IntPtr[] hIconEx = new IntPtr[1] {IntPtr.Zero}; try { if(large) readIconCount = ExtractIconEx(file,0, hIconEx, hDummy, 1); else readIconCount = ExtractIconEx(file,0, hDummy, hIconEx, 1); if(readIconCount > 0 && hIconEx[0] != IntPtr.Zero) { System.Drawing.Icon extractedIcon = (System.Drawing.Icon)System.Drawing.Icon.FromHandle(hIconEx[0]).Clone(); return extractedIcon; } else // NO ICONS READ return null; } catch(Exception ex) { throw new ApplicationException("Failed extracting icon", ex); } finally { foreach(IntPtr ptr in hIconEx) if(ptr != IntPtr.Zero) DestroyIcon(ptr); foreach(IntPtr ptr in hDummy) if(ptr != IntPtr.Zero) DestroyIcon(ptr); } } "@ -name ōWin32ExtractIconExö -namespace win32api ¢passThru -ReferencedAssemblies "System.Drawing" } $not.Icon = $extractIconEx::ExtractIconFromExe((get-process -Id $pid).mainmodule.filename, $true) } else { $not.Icon = new-object System.Drawing.Icon($icon) } $not.visible = $true } process { $not.BalloonTipText = $text $not.ShowBalloonTip($timeout) sleep $timeout } end { $not.dispose() }
combined_dataset/train/non-malicious/sample_49_57.ps1
sample_49_57.ps1
# # Module manifest for module 'OCI.PSModules.Aispeech' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aispeech.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '101b9a53-66d0-4458-870f-5f2f3debb208' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aispeech Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aispeech.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAispeechTranscriptionJob', 'Get-OCIAispeechTranscriptionJobsList', 'Get-OCIAispeechTranscriptionTask', 'Get-OCIAispeechTranscriptionTasksList', 'Move-OCIAispeechTranscriptionJobCompartment', 'New-OCIAispeechTranscriptionJob', 'Stop-OCIAispeechTranscriptionJob', 'Stop-OCIAispeechTranscriptionTask', 'Update-OCIAispeechTranscriptionJob' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aispeech' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_3_42.ps1
sample_3_42.ps1
#************************************************ # TS_EventLogStoppedGPPCheck.ps1 # Version 1.0.1 # Date: 4/3/2013 # Author: v-blchen # Description: [Idea ID 7018] [Windows] Event Log Service won't start # Rule number: 7018 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=7018 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 7018 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_EventLogStoppedGPPCheck" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) #Windows Sever 2008 } Function IsGPPRegionalOptionsTurnedOn { $GroupPolicyHistoryPath = "$Env:APPDATA\..\Local\Microsoft\Group Policy\History" if(Test-Path $GroupPolicyHistoryPath) { $RegionalOptionsXmlList = Get-childitem $GroupPolicyHistoryPath -Name 'RegionalOptions.xml' -recurse if($null -ne $RegionalOptionsXmlList) { foreach($RegionalOptionsXmlPath in $RegionalOptionsXmlList) { [xml]$RegionalOptionsContent = get-content (join-Path $GroupPolicyHistoryPath $RegionalOptionsXmlPath) if($null -ne $RegionalOptionsContent.Regional) { return $true } } } } return $false } Function CheckHotFixKB951430Installed { $GpprefclDLLPath = join-path $env:windir "system32\Gpprefcl.dll" if(CheckMinimalFileVersion $GpprefclDLLPath 6 0 6001 22474) { return $true } else { "Microsoft KB 951430 is not installed" | WriteTo-StdOut return $false } } Function EventLogServiceStoppedGPPCheck { if(IsGPPRegionalOptionsTurnedOn) { if(!(CheckHotFixKB951430Installed)) { $EventLogService = Get-CimInstance win32_service -filter "name='eventlog'" if(($EventLogService.State -eq 'stopped') -and ($EventLogService.ExitCode -eq 87)) { "Event Log Service is stopped by invalid parameter" | WriteTo-StdOut $InformationCollected | add-member -membertype noteproperty -name "GPP Enabled" -value "True" $InformationCollected | add-member -membertype noteproperty -name "Event Log Service State" -value ($EventLogService.State) $InformationCollected | add-member -membertype noteproperty -name "Event Log Service Exit Code" -value ($EventLogService.ExitCode) return $true } } } else { "Group Policy Preferences is not turn on" | WriteTo-StdOut } return $false } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = EventLogServiceStoppedGPPCheck if ($RuleApplicable) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZZfHGZy1pAnfq # Rsgm4vu1YygtbCHTK2Pq8+Lt8fkNW6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEb6 # Dmyql//KTWUmNfSzluTedloMTurmUbg2TfpQklmdMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAfuPrgcK6BcdafuYE1PO5TzL7d+cLezzix28p # C9JwYNVFO0iGsBQ1Dm3TmMDB7rjWimko6NhVLegv4QJHIFVN1wvKHbABKS1kYpIm # q3LV3xWrQGXZeg8GgUIjCNrRvY3ukpFKeyoHe46CJolqpRxmru/aE6F4f/9p+XWs # D/xWkC6pCotGWAdx6RL1HjC2aJOReEmAYvkmor0/kBEGh97MimwEjFD/JejDU6o6 # cIql8Ogupj1iKG/+7qdCeSqTUCP4ZBPWWQ8SUmGMmEad0LbeHwXgJT88Oq1Bv5Iu # 4mPcojzk12Uj1SU8zAO8sa/1fEz9/0WUAgxcxx2NrQussMR4FaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBOXDVcZGEo7bGlvG/r1qcGe4KqOB7GfBs2 # HKuZ8U9DawIGZut4BYxlGBMyMDI0MTAyODExNDA0MC4zOTFaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ # lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38 # 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC # fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D # cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA # ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT # M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB # Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo # u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0 # PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88 # 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv # eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/ # 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4 # Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6 # I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa # QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV # 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS # s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5 # WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q # 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK # CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi # TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y # Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0 # MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA # AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3 # UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS # TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3 # FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO # RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB # NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg+2V3l6LKFPA6zuTcrBKRjuIrHq636HD1exWRmdDDPhAwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT # hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1 # KYILMA0GCSqGSIb3DQEBCwUABIICAKlZiimVU6rLk2n7c8nsfAIjJy7NBd1YbvM1 # Yb7ddJhI/7tJfpkrZX8k6DAnvDWnZkylq0B3PnLXRkrLWVnlU5eeX0KOtIjN96th # K/T7GxIS5BTL+Kz6j+OstHBJEfvo1kJw9V6COUMiVt6el+IKDPCcQDcDR+LZU0Sf # lbeUe4kOWbZgMfxxWPb7N/vRCtOWSyJsktm9stIr4Y9pzGbQ7bWskgw1tYoI55lz # HeMfomm4trh2Qc93JMBaPwnGQUkk7o1mQmkYCiBRfqsEPY8D9q+oKOfkNXEudJne # f582F7Kk8UxlVBDK+m9cofmIFQHy58pgRAT1V9JijqQ2Np1ioFP0ee+UiXrLK5dO # tJpt1rTMVf1NnmDTAGo3TIKhPAVpLq+0iw8MpNGRIfSRIejhKv0qDSOfK5+qWxFU # bKl2Qqv5lN0J8xsY4Jo6wjYxJo9T4mADuAXIX+BSVf0hNn5iNgqrmiSviBJvldCe # m5mHPxDWQ2NW8LpJYCIWMmMsE86rrEpOHwYaHcDnXKAzzjxjc6haKAS+dO0CAFdn # dfnzPzAgwwuslq5lG7R4Cwjsd9TsoiA4uQgfy0qUd2m8Y+ydC8U8D9l00idZ/RS6 # n0k6eJDsu/5VkNgmeExcJGx6ebxcDCQIEQKvF69L7TL/vKQ6KWgR65rX02J44D6x # BFaktMxC # SIG # End signature block
combined_dataset/train/non-malicious/sample_4_43.ps1
sample_4_43.ps1
<# .SYNOPSIS Simplify data collection and diagnostics for troubleshooting Microsoft Remote Desktop (RDP/RDS/AVD/W365) related issues and a convenient method for submitting and following quick & easy action plans. .DESCRIPTION This script is designed to gather information to assist Microsoft Customer Support Services (CSS) in troubleshooting issues you may be experiencing with Microsoft Remote Desktop solutions. The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names and user names. The script will save the collected data in a subfolder and compress the results into a ZIP file. Neither the folder nor the ZIP file are automatically sent to Microsoft. You can send the ZIP file to Microsoft CSS using a secure file transfer tool. Please discuss this with your support professional and address any concerns you may have. Find our privacy statement here: https://privacy.microsoft.com/en-US/privacystatement Run 'Get-Help .\MSRD-Collect.ps1 -Full' for more details. USAGE SUMMARY: Run the script on Windows source or target machines as required by the scenario you're investigating. The script has multiple module (.psm1) files located in a "Modules" folder. This folder, along with its underlying .psm1 files, must remain in the same folder as the main MSRD-Collect.ps1 file for the script to function correctly. Download the MSRD-Collect.zip package from the official public download location (https://aka.ms/MSRD-Collect) and extract all files from it, not just the MSRD-Collect.ps1. The script will import the necessary module(s) dynamically when specific data is being invoked. Manual import of the modules is not required. When launched without any command line parameters, the script will start in GUI mode where you can select one or more data collection or diagnostics scenarios. If you prefer to run the script without a GUI or to automate data collection/diagnostics, use command line parameters. Diagnostics will run regardless if other data collection scenarios have been selected. For more information see the MSRD-Collect-ReadMe.txt file. .NOTES Author : Robert Klemencz (Microsoft CSS) Requires : At least PowerShell version 5.1 and to be run elevated Version : See: $global:msrdVersion .LINK Download: https://aka.ms/MSRD-Collect Feedback: https://aka.ms/MSRD-Collect-Feedback .PARAMETER Machine Indicates the context/environment in which the machine is used. This is a mandatory parameter when not using the GUI. Based on the provided value, only data specific to that context/environment will be collected. Available values are: isAVD : Azure Virtual Desktop isRDS : Remote Desktop Services or direct (non-AVD/non-W365) RDP connection isW365 : Windows 365 Cloud PC .PARAMETER Role Indicates the role of the machine in the given context/environment. This is a mandatory parameter when not using the GUI. Based on the provided value, only data specific to that role will be collected. Available values are: isSource : Source machine from where you connect to other machines using a Remote Desktop client isTarget : Target machine to which you connect to or a server with any RDS role installed .PARAMETER Core Collect general data for troubleshooting AVD/RDS/W365 issues. Diagnostics will run at the end. .PARAMETER Profiles Collect Core + specific data for troubleshooting 'User Profiles' issues. Diagnostics will run at the end. .PARAMETER Activation Collect Core + specific data for troubleshooting 'OS Licensing/Activation' issues. Diagnostics will run at the end. .PARAMETER MSRA Collect Core + specific data for troubleshooting 'Remote Assistance/Quick Assist/Remote Help' issues. Diagnostics will run at the end. .PARAMETER SCard Collect Core + specific data for troubleshooting 'Smart Card' issues. Diagnostics will run at the end. .PARAMETER IME Collect Core + specific data for troubleshooting 'Input Method' issues. Diagnostics will run at the end. .PARAMETER Teams Collect Core + specific data for troubleshooting 'Teams Media Optimization' issues. Diagnostics will run at the end. (AVD/W365 only) .PARAMETER MSIXAA [Deprecated, use 'AppAttach' instead] Collect Core + specific data for troubleshooting 'App Attach' issues. Diagnostics will run at the end. (AVD ony) .PARAMETER AppAttach Collect Core + specific data for troubleshooting 'App Attach' issues. Diagnostics will run at the end. (AVD only) .PARAMETER HCI Collect Core + specific data for troubleshooting 'Azure Stack HCI' issues. Diagnostics will run at the end. (AVD only) .PARAMETER DumpPID Collect Core + a process dump based on the provided PID. Diagnostics will run at the end. .PARAMETER NetTrace Collect a network trace. .PARAMETER DiagOnly Skip collecting troubleshooting data (even if any other parameters are specificed) and only perform diagnostics. .PARAMETER AcceptEula Silently accept the Microsoft Diagnostic Tools End User License Agreement. .PARAMETER AcceptNotice Silently accept the Important Notice message displayed when the script is launched. .PARAMETER OutputDir ​​​​​​Specify an existing directory where to store the collected files. By default, the script will store the collected data under "C:\MS_DATA". .PARAMETER UserContext Specify the username in whose context some of the data (e.g. RDClientAutoTrace, Teams settings) will be collected. By default, the script will use the admin's username who launched it. .PARAMETER AzureEnv Override the value returned by the automatic Azure environment detection and use the specified Azure environment for performing Azure endpoint checks during data collection/diagnostics. Available values are: "All", "AzureChinaCloud", "AzureGermanCloud", "AzurePublicCloud", "AzureUSGovernmentCloud", "N/A". .PARAMETER SkipAutoUpdate Skip the automatic update check on launch for the current instance of the script (can be used for both GUI and command line mode). .PARAMETER LiteMode The script will open with a "Lite Mode" UI, regardless of the Config\MSRDC-Config.json settings. .PARAMETER AssistMode The script will read out loud some of the key information and steps performed during data collection/diagnostics. .PARAMETER SilentMode Verbose output (detailed steps or encountered errors) will not be displayed during data collection. .OUTPUTS By default, all collected data are stored in a subfolder under C:\MS_DATA. You can change this location by using the "-OutputDir" command line parameter or from the "Advanced Mode" UI. #> param ([ValidateSet('isAVD', 'isRDS', 'isW365')][string]$Machine, [ValidateSet('isSource', 'isTarget')][string]$Role, [switch]$Core, [switch]$Profiles, [switch]$Activation, [switch]$MSRA, [switch]$SCard, [switch]$IME, [switch]$Teams, [switch]$MSIXAA, [switch]$AppAttach, [switch]$HCI, [int]$DumpPID, [switch]$DiagOnly, [switch]$NetTrace, [switch]$AcceptEula, [switch]$AcceptNotice, [switch]$SkipAutoUpdate, [switch]$LiteMode, [switch]$AudioAssistMode, [switch]$SilentMode, [ValidateScript({ if (Test-Path $_ -PathType Container) { $true } else { throw "Invalid folder path. '$_' does not exist or is not a valid folder." } })][string]$OutputDir, [ValidateScript({ $profilePath = Join-Path (Split-Path $env:USERPROFILE) $_ if (Test-Path -Path $profilePath -PathType Container) { $true } else { throw "Invalid username. A local profile folder for user '$_' does not exist or could not be accessed." } })][string]$UserContext, [ValidateSet('All', 'AzureChinaCloud', 'AzureGermanCloud', 'AzurePublicCloud', 'AzureUSGovernmentCloud', 'N/A')][string]$AzureEnv) # Check if the current user is an administrator if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')) { Write-Warning "This script needs to be run as Administrator" Exit 1 } # Check if the script is running in PowerShell ISE if ($host.Name -eq "Windows PowerShell ISE Host") { Write-Warning "Running MSRD-Collect in PowerShell ISE is not supported. Please run it from a regular elevated PowerShell console." Exit 1 } # Check PS Version If($PSVersionTable.PSVersion.Major -le 4) { Write-Warning "MSRD-Collect requires at least PowerShell version 5.1, but you are currently using PowerShell version $($PSVersionTable.PSVersion.Major).$($PSVersionTable.PSVersion.Minor).`nPlease update your PowerShell version to version 5.1 or higher!`nSee: https://learn.microsoft.com/en-us/powershell/scripting/install/installing-powershell-on-windows?view=powershell-5.1`n`n" Exit 1 } # Limiting scenarios for command line if (($Role -eq "isSource") -and ($Profiles -or $Activation -or $IME -or $AppAttach -or $HCI)) { Write-Warning "Machine role 'isSource' only supports the following scenarios: -Core, -MSRA, -SCard, -Teams, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } if ($Role -eq "isTarget") { if (($Machine -eq "isRDS") -and ($Teams -or $AppAttach -or $HCI)) { Write-Warning "Machine type 'isRDS' with machine role 'isTarget' only supports the following scenarios: -Core, -Profiles, -Activation, -MSRA, -SCard, -IME, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } elseif (($Machine -eq "isW365") -and ($AppAttach -or $HCI)) { Write-Warning "Machine type 'isW365' with machine role 'isTarget' only supports the following scenarios: -Core, -Profiles, -Activation, -MSRA, -SCard, -IME, -Teams, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } } if ($DiagOnly) { if ($Core -or $Profiles -or $Activation -or $AppAttach -or $MSRA -or $IME -or $HCI -or $Teams -or $SCard -or $NetTrace -or $DumpPID) { Write-Warning "Scenario 'DiagOnly' has been specified together with other scenarios. All scenarios will be ignored and only Diagnostics will run." } } # Deprecated / will be removed in a future version if ($MSIXAA) { Write-Warning "The command line parameter '-MSIXAA' is deprecated and has been replaced by '-AppAttach'. Run the script again using the '-AppAttach' command line parameter." Exit 1 } # Check if the required subfolders exist in the script folder if (-not (Test-Path -Path "$PSScriptRoot\Modules" -PathType Container)) { Write-Warning "The 'Modules' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } if (-not (Test-Path -Path "$PSScriptRoot\Config" -PathType Container)) { Write-Warning "The 'Config' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } if (-not (Test-Path -Path "$PSScriptRoot\Config\Localization" -PathType Container)) { Write-Warning "The 'Config\Localization' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } ### Global variables $global:msrdCollecting = $False $global:msrdConsoleColor = $host.ui.RawUI.ForegroundColor $global:msrdDiagnosing = $False $global:msrdFQDN = [System.Net.Dns]::GetHostByName($env:computerName).HostName $global:msrdGUI = $false $global:msrdLiveDiag = $false $global:msrdOSVer = (Get-CimInstance Win32_OperatingSystem).Caption $global:msrdProgress = 0 $global:msrdScriptpath = $PSScriptRoot $global:msrdTSSinUse = $MyInvocation.PSCommandPath -like "*TSS_UEX.psm1" $global:msrdVersion = "240927.0" $global:msrdVersioncheck = $false if ($PSSenderInfo) { $global:msrdCmdLine = "n/a" } else { $global:msrdCmdLine = $MyInvocation.Line } #for selfupdate restart #warn if outdated version $msrdcVer = $global:msrdVersion.SubString(0,6) $dateMSRDCver = [datetime]::ParseExact($msrdcVer, "yyMMdd", $null) $DiffDate = ((Get-Date) - $dateMSRDCver) If($DiffDate.Days -gt 90){ Write-Warning "This version of MSRD-Collect is over 90 days old. A newer version may be available. Use the script's AutoUpdate functionality or manually download the latest version from: https://aka.ms/MSRD-Collect" } if (-not $global:msrdTSSinUse) { #Unlock module files if valid $fileNamesToUnblock = @( "MSRDC-Activation.psm1", "MSRDC-Core.psm1", "MSRDC-Diagnostics.psm1", "MSRDC-FwFunctions.psm1", "MSRDC-FwGUI.psm1", "MSRDC-FwGUILite.psm1", "MSRDC-FwHtml.psm1", "MSRDC-HCI.psm1", "MSRDC-IME.psm1", "MSRDC-AppAttach.psm1", "MSRDC-MSRA.psm1", "MSRDC-Profiles.psm1", "MSRDC-SCard.psm1", "MSRDC-Teams.psm1", "MSRDC-Tracing.psm1", "MSRDC-WU.psm1" ) if (Test-Path -Path "$global:msrdScriptpath\Modules") { Get-ChildItem -Path $global:msrdScriptpath\Modules\MSRDC*.psm1 -Recurse | ForEach-Object { if ($_.Name -in $fileNamesToUnblock) { Try { Unblock-File $_.FullName -Confirm:$false -ErrorAction Stop } Catch { Write-Warning "Failed to unblock file: $($_.FullName) - $($_.Exception.Message)" } } } } else { Write-Warning "The 'Modules' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } } if ($global:msrdTSSinUse) { # Check if the included tools are available and valid $global:msrdToolsFolder = "$global:ScriptFolder\BIN" if (Test-Path -Path "$global:msrdToolsFolder\avdnettest.exe") { $global:avdnettestpath = "$global:msrdToolsFolder\avdnettest.exe" } else { $global:avdnettestpath = "" } if (Test-Path -Path "$global:msrdToolsFolder\procdump.exe") { $global:msrdProcDumpExe = "$global:msrdToolsFolder\procdump.exe" } else { $global:msrdProcDumpExe = "" } if (Test-Path -Path "$global:msrdToolsFolder\psping.exe") { $global:msrdPsPingExe = "$global:msrdToolsFolder\psping.exe" } else { $global:msrdPsPingExe = "" } } else { $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\avdnettest.exe") { $global:avdnettestpath = "$global:msrdToolsFolder\avdnettest.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\avdnettest.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:avdnettestpath = "$tssToolsFolder\avdnettest.exe" } else { $global:avdnettestpath = "" } } $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\procdump.exe") { $global:msrdProcDumpExe = "$global:msrdToolsFolder\procdump.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\procdump.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:msrdProcDumpExe = "$tssToolsFolder\procdump.exe" } else { $global:msrdProcDumpExe = "" } } $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\psping.exe") { $global:msrdPsPingExe = "$global:msrdToolsFolder\psping.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\psping.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:msrdPsPingExe = "$tssToolsFolder\psping.exe" } else { $global:msrdPsPingExe = "" } } } # Azure Environment if ($AzureEnv) { $global:msrdAzureEnv = $AzureEnv } # Read config file $global:msrdConfigFile = "$global:msrdScriptpath\Config\MSRDC-Config.json" if (Test-Path -Path $global:msrdConfigFile) { try { $global:msrdConfig = Get-Content $global:msrdConfigFile | ConvertFrom-Json } catch { Write-Warning "Could not read the Config\MSRDC-Config.json file. Make sure that the file exists and that it is not corrupted. Exiting." Exit 1 } } else { Write-Warning "Could not find the Config\MSRDC-Config.json file. Make sure that the file exists and that it is not corrupted. Exiting." Exit 1 } if ($global:msrdProcDumpExe -eq "") { $global:msrdProcDumpVer = "1.0" } else { if ($global:msrdConfig.ProcDumpVersion -match "\d{2}\.\d{1}$") { $global:msrdProcDumpVer = $global:msrdConfig.ProcDumpVersion } else { Write-Warning "Unsupported value found for 'ProcDumpVersion' in Config\MSRDC-Config.json. The value has to be of format XY.Z, where X, Y and Z are numbers (e.g. 11.0). Exiting." Exit 1 } } if ($global:msrdPsPingExe -eq "") { $global:msrdPsPingVer = "1.0" } else { if ($global:msrdConfig.PsPingVersion -match "\d{1}\.\d{2}$") { $global:msrdPsPingVer = $global:msrdConfig.PsPingVersion } else { Write-Warning "Unsupported value found for 'PsPingVersion' in Config\MSRDC-Config.json. The value has to be of format X.YZ, where X, Y and Z are numbers (e.g. 2.12). Exiting." Exit 1 } } if (@(0, 1) -notcontains $global:msrdConfig.ShowConsoleWindow) { Write-Warning "Missing or unsupported value for 'ShowConsoleWindow' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.MaximizeWindow) { Write-Warning "Missing or unsupported value for 'MaximizeWindow' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@("Prod","Insider") -notcontains $global:msrdConfig.DevLevel) { Write-Warning "Missing or unsupported value for 'DevLevel' in Config\MSRDC-Config.json. Supported values are Prod or Insider. Exiting." Exit 1 } if (@("AR","CN","CS","DE","EN","ES","FR","HI","HU","NL","IT","JP","PT","RO","TR") -contains $global:msrdConfig.UILanguage) { $global:msrdLangID = $global:msrdConfig.UILanguage } else { Write-Warning "Unsupported value found for 'UILanguage' in Config\MSRDC-Config.json. Supported values are AR, CN, CS, DE, EN, ES, FR, HI, HU, NL, IT, JP, PT, RO or TR. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.PlaySounds) { Write-Warning "Missing or unsupported value for 'PlaySounds' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(10, 12, 14, 16) -contains $global:msrdConfig.PsBoxFont) { $global:msrdPsBoxFont = $global:msrdConfig.PsBoxFont } else { Write-Warning "Unsupported value found for 'PsBoxFont' in Config\MSRDC-Config.json. Supported values are 10, 12, 14 or 16. Exiting." Exit 1 } if (-not $global:msrdTSSinUse) { if ($LiteMode) { $msrdGUILite = 1 } else { if (@(0, 1) -contains $global:msrdConfig.UILiteMode) { $msrdGUILite = $global:msrdConfig.UILiteMode } else { Write-Warning "Unsupported value found for 'UILiteMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } if ($AudioAssistMode) { $global:msrdAudioAssistMode = 1 } else { if (@(0, 1) -contains $global:msrdConfig.AudioAssistMode) { $global:msrdAudioAssistMode = $global:msrdConfig.AudioAssistMode } else { Write-Warning "Unsupported value found for 'AudioAssistMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } } # Silent mode init if (-not $global:msrdTSSinUse) { if ($global:msrdAudioAssistMode -eq 1) { $global:msrdSilentMode = 0 } else { if ($SilentMode) { $global:msrdSilentMode = 1 } else { if (@(0, 1) -contains $global:msrdConfig.SilentMode) { $global:msrdSilentMode = $global:msrdConfig.SilentMode } else { Write-Warning "Unsupported value found for 'SilentMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } } } # Check if auto update check should be performed if ($SkipAutoUpdate) { $global:msrdConfig.AutomaticVersionCheck = 0 "SkipAutoUpdate switch specified, automatic update check on script launch will be skipped" } else { if (@(0, 1) -notcontains $global:msrdConfig.AutomaticVersionCheck) { Write-Warning "Missing or unsupported value for 'AutomaticVersionCheck' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.ScriptSelfUpdate) { Write-Warning "Missing or unsupported value for 'ScriptSelfUpdate' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } function msrdVerifyToolsSignature { Param ($filepath) try { $signature = Get-AuthenticodeSignature -FilePath $filepath -ErrorAction SilentlyContinue $cert = $signature.SignerCertificate $issuer = $cert.Issuer if ($signature.Status -ne "Valid") { Write-Warning "'$filepath' does not have a valid signature. Stopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) { Write-Warning "'$filepath' does not have a valid signature. Stopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } } catch { Write-Warning "Failed to verify the signature of '$filepath'. Reason: $($_.Exception.Message)`nStopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } } # Localization init $localizationFilePath = Join-Path $global:msrdScriptpath "Config\Localization\MSRDC-Fw$($global:msrdLangID).xml" if (Test-Path -Path $localizationFilePath) { try { [xml] $global:msrdLangText = Get-Content -Path $localizationFilePath -Encoding UTF8 -ErrorAction Stop # Create a hashtable to store the mappings $global:msrdTextHashtable = @{} # Populate the hashtable foreach ($langNode in $global:msrdLangText.LangV1.lang) { $textID = $langNode.id $message = $langNode."#text" if ($message -like "*&amp;*") { $message = $message.replace("&amp;", "&") } $global:msrdTextHashtable[$textID] = $message } } catch { Write-Warning "Could not read the Config\Localization\MSRDC-Fw$($global:msrdLangID).xml file: $_. Make sure that the file exists and that it is not corrupted." Exit 1 } } else { Write-Warning "Could not find the Config\Localization\MSRDC-Fw$($global:msrdLangID).xml file. Make sure that the file exists and that it is not corrupted." Exit 1 } # Output folder init If ($OutputDir) { $global:msrdLogRoot = $OutputDir } else { if ($global:msrdTSSinUse) { $global:msrdLogRoot = $global:LogFolder } else { $global:msrdLogRoot = "C:\MS_DATA" } } # User context init if ($UserContext) { $global:msrdUserprof = $UserContext } else { $global:msrdUserprof = $env:USERNAME } [void][System.Reflection.Assembly]::Load('System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a') [void][System.Reflection.Assembly]::Load('System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089') # Main functions init Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwFunctions" -DisableNameChecking -Force -Scope Global if (@(0, 1) -notcontains $global:msrdConfig.IsRestarting) { Write-Warning "Missing or unsupported value for 'IsRestarting' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if ($global:msrdConfig.IsRestarting -eq 1) { msrdUpdateConfigFile -configFile "Config\MSRDC-Config.json" -key "IsRestarting" -value 0 } else { if ($global:avdnettestpath -ne "") { msrdVerifyToolsSignature $global:avdnettestpath } if ($global:msrdProcDumpExe -ne "") { msrdVerifyToolsSignature $global:msrdProcDumpExe } if ($global:msrdPsPingExe -ne "") { msrdVerifyToolsSignature $global:msrdPsPingExe } } # Check if the current account is domain vs local account try { # Get the current user's SID $userSID = [System.Security.Principal.WindowsIdentity]::GetCurrent().User.Value # Get the list of local users' SIDs $localUserSIDs = Get-CimInstance -ClassName Win32_UserAccount -Filter "LocalAccount=True" | Select-Object -ExpandProperty SID # Check if the user's SID matches any of the local user SIDs $isLocalUser = $localUserSIDs -contains $userSID if ($isLocalUser) { $global:msrdAccountLevel = "Local Account" Write-Warning "$(msrdGetLocalizedText "localAdminStart")`n" } else { $global:msrdAccountLevel = "Domain Account" } } catch { $global:msrdAccountLevel = "Local Account" Write-Warning "Failed to determine account type: $($_.Exception.InnerException.Message)Defaulting to 'Local Account'. If you need to collect Domain related information, make sure that the user running the script is a Domain User with Admin rights." } # EULA function msrdShowEULAPopup($mode) { $EULA = New-Object -TypeName System.Windows.Forms.Form $richTextBox1 = New-Object System.Windows.Forms.RichTextBox $btnAcknowledge = New-Object System.Windows.Forms.Button $btnCancel = New-Object System.Windows.Forms.Button $EULA.SuspendLayout() $EULA.Name = "EULA" $EULA.Text = "Microsoft Diagnostic Tools End User License Agreement" $richTextBox1.Anchor = [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right $richTextBox1.Location = New-Object System.Drawing.Point(12,12) $richTextBox1.Name = "richTextBox1" $richTextBox1.ScrollBars = [System.Windows.Forms.RichTextBoxScrollBars]::Vertical $richTextBox1.Size = New-Object System.Drawing.Size(776, 397) $richTextBox1.TabIndex = 0 $richTextBox1.ReadOnly=$True $richTextBox1.Add_LinkClicked({Start-Process -FilePath $_.LinkText}) $richTextBox1.Rtf = @" {\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fswiss\fprq2\fcharset0 Segoe UI;}{\f1\fnil\fcharset0 Calibri;}{\f2\fnil\fcharset0 Microsoft Sans Serif;}} {\colortbl ;\red0\green0\blue255;} {\*\generator Riched20 10.0.19041}{\*\mmathPr\mdispDef1\mwrapIndent1440 }\viewkind4\uc1 \pard\widctlpar\f0\fs19\lang1033 MICROSOFT SOFTWARE LICENSE TERMS\par Microsoft Diagnostic Scripts and Utilities\par \par {\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15 0100090000035000000000002700000000000400000003010800050000000b0200000000050000 000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00 010001000000000001000100000000002800000001000000010000000100010000000000000000 000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300 00000000 }These license terms are an agreement between you and Microsoft Corporation (or one of its affiliates). IF YOU COMPLY WITH THESE LICENSE TERMS, YOU HAVE THE RIGHTS BELOW. BY USING THE SOFTWARE, YOU ACCEPT THESE TERMS.\par {\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15 0100090000035000000000002700000000000400000003010800050000000b0200000000050000 000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00 010001000000000001000100000000002800000001000000010000000100010000000000000000 000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300 00000000 }\par \pard {\pntext\f0 1.\tab}{\*\pn\pnlvlbody\pnf0\pnindent0\pnstart1\pndec{\pntxta.}} \fi-360\li360 INSTALLATION AND USE RIGHTS. Subject to the terms and restrictions set forth in this license, Microsoft Corporation (\ldblquote Microsoft\rdblquote ) grants you (\ldblquote Customer\rdblquote or \ldblquote you\rdblquote ) a non-exclusive, non-assignable, fully paid-up license to use and reproduce the script or utility provided under this license (the "Software"), solely for Customer\rquote s internal business purposes, to help Microsoft troubleshoot issues with one or more Microsoft products, provided that such license to the Software does not include any rights to other Microsoft technologies (such as products or services). \ldblquote Use\rdblquote means to copy, install, execute, access, display, run or otherwise interact with the Software. \par \pard\widctlpar\par \pard\widctlpar\li360 You may not sublicense the Software or any use of it through distribution, network access, or otherwise. Microsoft reserves all other rights not expressly granted herein, whether by implication, estoppel or otherwise. You may not reverse engineer, decompile or disassemble the Software, or otherwise attempt to derive the source code for the Software, except and to the extent required by third party licensing terms governing use of certain open source components that may be included in the Software, or remove, minimize, block, or modify any notices of Microsoft or its suppliers in the Software. Neither you nor your representatives may use the Software provided hereunder: (i) in a way prohibited by law, regulation, governmental order or decree; (ii) to violate the rights of others; (iii) to try to gain unauthorized access to or disrupt any service, device, data, account or network; (iv) to distribute spam or malware; (v) in a way that could harm Microsoft\rquote s IT systems or impair anyone else\rquote s use of them; (vi) in any application or situation where use of the Software could lead to the death or serious bodily injury of any person, or to physical or environmental damage; or (vii) to assist, encourage or enable anyone to do any of the above.\par \par \pard\widctlpar\fi-360\li360 2.\tab DATA. Customer owns all rights to data that it may elect to share with Microsoft through using the Software. You can learn more about data collection and use in the help documentation and the privacy statement at {{\field{\*\fldinst{HYPERLINK https://aka.ms/privacy }}{\fldrslt{https://aka.ms/privacy\ul0\cf0}}}}\f0\fs19 . Your use of the Software operates as your consent to these practices.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 3.\tab FEEDBACK. If you give feedback about the Software to Microsoft, you grant to Microsoft, without charge, the right to use, share and commercialize your feedback in any way and for any purpose.\~ You will not provide any feedback that is subject to a license that would require Microsoft to license its software or documentation to third parties due to Microsoft including your feedback in such software or documentation. \par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 4.\tab EXPORT RESTRICTIONS. Customer must comply with all domestic and international export laws and regulations that apply to the Software, which include restrictions on destinations, end users, and end use. For further information on export restrictions, visit {{\field{\*\fldinst{HYPERLINK https://aka.ms/exporting }}{\fldrslt{https://aka.ms/exporting\ul0\cf0}}}}\f0\fs19 .\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360\qj 5.\tab REPRESENTATIONS AND WARRANTIES. Customer will comply with all applicable laws under this agreement, including in the delivery and use of all data. Customer or a designee agreeing to these terms on behalf of an entity represents and warrants that it (i) has the full power and authority to enter into and perform its obligations under this agreement, (ii) has full power and authority to bind its affiliates or organization to the terms of this agreement, and (iii) will secure the permission of the other party prior to providing any source code in a manner that would subject the other party\rquote s intellectual property to any other license terms or require the other party to distribute source code to any of its technologies.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360\qj 6.\tab DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED \ldblquote AS IS,\rdblquote WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL MICROSOFT OR ITS LICENSORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\par \pard\widctlpar\qj\par \pard\widctlpar\fi-360\li360\qj 7.\tab LIMITATION ON AND EXCLUSION OF DAMAGES. IF YOU HAVE ANY BASIS FOR RECOVERING DAMAGES DESPITE THE PRECEDING DISCLAIMER OF WARRANTY, YOU CAN RECOVER FROM MICROSOFT AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO U.S. $5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT, OR INCIDENTAL DAMAGES. This limitation applies to (i) anything related to the Software, services, content (including code) on third party Internet sites, or third party applications; and (ii) claims for breach of contract, warranty, guarantee, or condition; strict liability, negligence, or other tort; or any other claim; in each case to the extent permitted by applicable law. It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your state, province, or country may not allow the exclusion or limitation of incidental, consequential, or other damages.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 8.\tab BINDING ARBITRATION AND CLASS ACTION WAIVER. This section applies if you live in (or, if a business, your principal place of business is in) the United States. If you and Microsoft have a dispute, you and Microsoft agree to try for 60 days to resolve it informally. If you and Microsoft can\rquote t, you and Microsoft agree to binding individual arbitration before the American Arbitration Association under the Federal Arbitration Act (\ldblquote FAA\rdblquote ), and not to sue in court in front of a judge or jury. Instead, a neutral arbitrator will decide. Class action lawsuits, class-wide arbitrations, private attorney-general actions, and any other proceeding where someone acts in a representative capacity are not allowed; nor is combining individual proceedings without the consent of all parties. The complete Arbitration Agreement contains more terms and is at {{\field{\*\fldinst{HYPERLINK https://aka.ms/arb-agreement-4 }}{\fldrslt{https://aka.ms/arb-agreement-4\ul0\cf0}}}}\f0\fs19 . You and Microsoft agree to these terms. \par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 9.\tab LAW AND VENUE. If U.S. federal jurisdiction exists, you and Microsoft consent to exclusive jurisdiction and venue in the federal court in King County, Washington for all disputes heard in court (excluding arbitration). If not, you and Microsoft consent to exclusive jurisdiction and venue in the Superior Court of King County, Washington for all disputes heard in court (excluding arbitration).\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 10.\tab ENTIRE AGREEMENT. This agreement, and any other terms Microsoft may provide for supplements, updates, or third-party applications, is the entire agreement for the software.\par \pard\sa200\sl276\slmult1\f1\fs22\lang9\par \pard\f2\fs17\lang2057\par } "@ $richTextBox1.BackColor = [System.Drawing.Color]::White $btnAcknowledge.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right $btnAcknowledge.Location = New-Object System.Drawing.Point(544, 415) $btnAcknowledge.Name = "btnAcknowledge"; $btnAcknowledge.Size = New-Object System.Drawing.Size(119, 23) $btnAcknowledge.TabIndex = 1 $btnAcknowledge.Text = "Accept" $btnAcknowledge.UseVisualStyleBackColor = $True $btnAcknowledge.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::Yes}) $btnCancel.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right $btnCancel.Location = New-Object System.Drawing.Point(669, 415) $btnCancel.Name = "btnCancel" $btnCancel.Size = New-Object System.Drawing.Size(119, 23) $btnCancel.TabIndex = 2 if($mode -ne 0) { $btnCancel.Text = "Close" } else { $btnCancel.Text = "Decline" } $btnCancel.UseVisualStyleBackColor = $True $btnCancel.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::No}) $EULA.AutoScaleDimensions = New-Object System.Drawing.SizeF(6.0, 13.0) $EULA.AutoScaleMode = [System.Windows.Forms.AutoScaleMode]::Font $EULA.ClientSize = New-Object System.Drawing.Size(800, 450) $EULA.Controls.Add($btnCancel) $EULA.Controls.Add($richTextBox1) if($mode -ne 0) { $EULA.AcceptButton=$btnCancel } else { $EULA.Controls.Add($btnAcknowledge) $EULA.AcceptButton=$btnAcknowledge $EULA.CancelButton=$btnCancel } $EULA.ResumeLayout($false) $EULA.Size = New-Object System.Drawing.Size(800, 650) Return ($EULA.ShowDialog()) } function msrdShowEULAIfNeeded($toolName, $mode) { $eulaRegPath = "HKCU:Software\Microsoft\CESDiagnosticTools" $eulaAccepted = "No" $eulaValue = $toolName + " EULA Accepted" if(Test-Path $eulaRegPath) { $eulaRegKey = Get-Item $eulaRegPath $eulaAccepted = $eulaRegKey.GetValue($eulaValue, "No") } else { $eulaRegKey = New-Item $eulaRegPath } if($mode -eq 2) # silent accept { $eulaAccepted = "Yes" $ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force } else { if($eulaAccepted -eq "No") { $eulaAccepted = msrdShowEULAPopup($mode) if($eulaAccepted -eq [System.Windows.Forms.DialogResult]::Yes) { $eulaAccepted = "Yes" $ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force } } } return $eulaAccepted } function msrdCleanUpandExit { if (($null -ne $global:msrdTempCommandErrorFile) -and (Test-Path -Path $global:msrdTempCommandErrorFile)) { Remove-Item -Path $global:msrdTempCommandErrorFile -Force -ErrorAction SilentlyContinue } if ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($false) | Out-Null } if ($global:msrdForm) { $global:msrdForm.Close() } Exit } # This function disable quick edit mode. If the mode is enabled, console output will hang when key input or strings are selected. # So disable the quick edit mode during running script and re-enable it after script is finished. $QuickEditCode=@" using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; using System.Runtime.InteropServices; public static class msrdDisableConsoleQuickEdit { const uint ENABLE_QUICK_EDIT = 0x0040; // STD_INPUT_HANDLE (DWORD): -10 is the standard input device. const int STD_INPUT_HANDLE = -10; [DllImport("kernel32.dll", SetLastError = true)] static extern IntPtr GetStdHandle(int nStdHandle); [DllImport("kernel32.dll")] static extern bool GetConsoleMode(IntPtr hConsoleHandle, out uint lpMode); [DllImport("kernel32.dll")] static extern bool SetConsoleMode(IntPtr hConsoleHandle, uint dwMode); public static bool SetQuickEdit(bool SetEnabled) { IntPtr consoleHandle = GetStdHandle(STD_INPUT_HANDLE); // get current console mode uint consoleMode; if (!GetConsoleMode(consoleHandle, out consoleMode)) { // ERROR: Unable to get console mode. return false; } // Clear the quick edit bit in the mode flags if (SetEnabled) { consoleMode &= ~ENABLE_QUICK_EDIT; } else { consoleMode |= ENABLE_QUICK_EDIT; } // set the new mode if (!SetConsoleMode(consoleHandle, consoleMode)) { // ERROR: Unable to set console mode return false; } return true; } } "@ Try { Add-Type -TypeDefinition $QuickEditCode -Language CSharp -ErrorAction Stop | Out-Null $global:fQuickEditCodeExist = $True } Catch { $global:fQuickEditCodeExist = $False } #region ##### MAIN ##### [System.Windows.Forms.Application]::EnableVisualStyles() # Disabling quick edit mode as somethimes this causes the script stop working until enter key is pressed. If ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($True) | Out-Null } $notice = "========= Microsoft CSS Diagnostics Script =========`n This Data Collection is for troubleshooting reported issues for the given scenarios. Once you have started this script please wait until all data has been collected.`n`n ============= IMPORTANT NOTICE =============`n This script is designed to collect information that will help Microsoft Customer Support Services (CSS) troubleshoot an issue you may be experiencing with Microsoft Remote Desktop solutions.`n The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses; PC names; and user names.`n The script will save the collected data in a folder (default C:\MS_DATA) and also compress the results into a ZIP file. This folder and its contents or the ZIP file are not automatically sent to Microsoft.`n You can send the ZIP file to Microsoft CSS using a secure file transfer tool - Please discuss this with your support professional and also any concerns you may have.`n Find our privacy statement at: https://privacy.microsoft.com/en-US/privacystatement`n " if (!($global:msrdTSSinUse)) { if ($AcceptEula) { "$(msrdGetLocalizedText "eulaSilentOK")" $eulaAccepted = msrdShowEULAIfNeeded "MSRD-Collect" 2 } else { $eulaAccepted = msrdShowEULAIfNeeded "MSRD-Collect" 0 if ($eulaAccepted -ne "Yes") { "$(msrdGetLocalizedText "eulaNotOK")" msrdCleanUpandExit } "$(msrdGetLocalizedText "eulaOK")" } if ($AcceptNotice) { "$(msrdGetLocalizedText "noticeSilentOK")`n" } else { $wshell = New-Object -ComObject Wscript.Shell $answer = $wshell.Popup("$notice",0,"Are you sure you want to continue?",4+32) if ($answer -eq 7) { Write-Warning "$(msrdGetLocalizedText "notApproved")`n" msrdCleanUpandExit } "$(msrdGetLocalizedText "noticeOK")`n" } } if ($Core -or $Profiles -or $Activation -or $AppAttach -or $MSRA -or $IME -or $HCI -or $Teams -or $SCard -or $DiagOnly -or $NetTrace -or $DumpPID) { if ($Machine) { if ($Role) { switch($Machine) { 'isRDS' { $global:msrdRDS = $true; $global:msrdAVD = $false; $global:msrdW365 = $false } 'isAVD' { $global:msrdRDS = $false; $global:msrdAVD = $true; $global:msrdW365 = $false } 'isW365' { $global:msrdRDS = $false; $global:msrdAVD = $false; $global:msrdW365 = $true } } switch($Role) { 'isSource' { $global:msrdSource = $true; $global:msrdTarget = $false } 'isTarget' { $global:msrdSource = $false; $global:msrdTarget = $true } } msrdInitFolders msrdCheckAzVM -azEnvCmdLineInputValue $AzureEnv # checking for Azure Environment and deployment details if applicable if ($global:avdnettestpath -eq "") { msrdLogMessage $LogLevel.Warning "$(msrdGetLocalizedText 'avdnettestNotFound')`n" } #if avdnettest.exe is missing if (-not $global:msrdTSSinUse) { if ($global:msrdConfig.DevLevel -eq "Insider") { msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "starting") - v$msrdVersion (INSIDER Build - For Testing Purposes Only !)`n" -Color "Cyan" } else { msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "starting") - v$msrdVersion`n" -Color "Cyan" } if ($global:msrdConfig.AutomaticVersionCheck -eq 1) { if ($global:msrdConfig.ScriptSelfUpdate -eq 1) { msrdCheckVersion ($msrdVersion) -selfUpdate } else { msrdCheckVersion ($msrdVersion) } } else { msrdLogMessage $LogLevel.Normal "INFO: Automatic update check on script launch is Disabled" } } if ($UserContext) { msrdLogMessage $LogLevel.Info "INFO: UserContext switch has been specified with value: $UserContext`n" } if ($PSSenderInfo) { msrdLogMessage $LogLevel.Info "INFO: The script is running in a remote PowerShell session" -Color "Yellow" msrdLogMessage $LogLevel.Info "INFO: ConnectedUser: $($PSSenderInfo.ConnectedUser)" -Color "Yellow" msrdLogMessage $LogLevel.Info "INFO: RunAsUser: $($PSSenderInfo.RunAsUser)" -Color "Yellow" } msrdInitScript $varsNO = @(,$false * 1) msrdInitScenarioVars $dumpProc = $false $pidProc = "" $global:onlyDiag = $false $vCore = @(,$true * 12) if ($Profiles) { $vProfiles = @(,$true * 5) } if ($Activation) { $vActivation = @(,$true * 3) } if ($MSRA) { $vMSRA = @(,$true * 7) } if ($SCard) { $vSCard = @(,$true * 3) } if ($IME) { $vIME = @(,$true * 3) } if ($Teams) { $vTeams = @(,$true * 4) } if ($AppAttach) { $vAppAttach = @(,$true * 1) } if ($HCI) { $vHCI = @(,$true * 1) } if ($DumpPID) { $pidProc = $DumpPID; $dumpProc = $true } if ($DiagOnly) { $vCore = $varsNO; $global:onlyDiag = $true } if (-not $DiagOnly) { #data collection $parameters = @{ varsCore = $vCore varsProfiles = $vProfiles varsActivation = $vActivation varsMSRA = $vMSRA varsSCard = $vSCard varsIME = $vIME varsTeams = $vTeams varsMSIXAA = $vAppAttach varsHCI = $vHCI traceNet = $NetTrace dumpProc = $dumpProc pidProc = $pidProc } msrdCollectData @parameters } $varsSystem = @(,$true * 13) $varsAVDRDS = @(,$true * 11) $varsInfra = @(,$true * 10) $varsAD = @(,$true * 2) $varsNET = @(,$true * 8) $varsLogSec = @(,$true * 3) $varsIssues = @(,$true * 2) $varsOther = @(,$true * 4) #diagnostics $parameters = @{ varsSystem = $varsSystem varsAVDRDS = $varsAVDRDS varsInfra = $varsInfra varsAD = $varsAD varsNET = $varsNET varsLogSec = $varsLogSec varsIssues = $varsIssues varsOther = $varsOther } msrdCollectDataDiag @parameters msrdArchiveData -varsCore $vCore } else { Write-Warning "Include the '-Role' parameter to indicate the role of the machine in the selected remote desktop solution, or run the script without any parameters (= GUI mode).`nSupported values for the '-Role' parameter: 'isSource', 'isTarget'.`nSee MSRD-Collect-ReadMe.txt for more details.`nExiting..." Exit } } else { Write-Warning "Include the '-Machine' parameter to indicate the type of environment from where data should be collected, or run the script without any parameters (= GUI mode).`nSupported values for the '-Machine' parameter: 'isAVD', 'isRDS', 'isW365'.`nSee MSRD-Collect-ReadMe.txt for more details.`nExiting..." Exit } } else { if (-not $global:msrdTSSinUse) { $code = @" using System; using System.Runtime.InteropServices; namespace System { public class IconExtractor { public static System.Drawing.Icon Extract(string file, int number, bool largeIcon) { IntPtr large; IntPtr small; ExtractIconEx(file, number, out large, out small, 1); try { // Create a copy of the icon to avoid handle ownership issues var extractedIcon = (System.Drawing.Icon)System.Drawing.Icon.FromHandle(largeIcon ? large : small).Clone(); // Release the handles obtained from ExtractIconEx DestroyIcon(large); DestroyIcon(small); return extractedIcon; } catch { return null; } } [DllImport("Shell32.dll", EntryPoint = "ExtractIconExW", CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)] private static extern int ExtractIconEx(string sFile, int iIndex, out IntPtr piLargeVersion, out IntPtr piSmallVersion, int amountIcons); [DllImport("user32.dll", CharSet = CharSet.Auto)] private static extern bool DestroyIcon(IntPtr handle); } } "@ if ($PSVersionTable.PSVersion.Major -eq 5) { Add-Type -TypeDefinition $code -ReferencedAssemblies System.Drawing } else { Add-Type -TypeDefinition $code -ReferencedAssemblies System.Drawing.Common,System.Drawing } Add-Type -AssemblyName System.Windows.Forms $global:msrdRDS = $false; $global:msrdAVD = $false; $global:msrdW365 = $false $global:msrdSource = $false; $global:msrdTarget = $false #Load dlls into context of the current console session Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport("Kernel32.dll")] public static extern IntPtr GetConsoleWindow(); [DllImport("user32.dll")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' if ($msrdGUILite -eq 1) { Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwGUILite" -DisableNameChecking -Force msrdAVDCollectGUILite } else { Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwGUI" -DisableNameChecking -Force msrdAVDCollectGUI } } } #endregion ##### MAIN ##### # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvqUVrqWvbD8+y # R67SmiOMgtmq14/fjT8TkOxO4kgwxKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIAINdxzMqdzRM+29jesbvOZ # VU4baugOPkqM0ZslvlF5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjFFSzsSbGnHmLTgh5HRhgNji91mbC30CzhJc8G6CwkFJ/ijKcpXNuiWl # VqZ6ld+yaaX0TFAgVoGudfapUNRW16yyLbZc5LwPGAwwJJeTkih395vXlyEjo2Bw # TmwPP8yMuxlFWslCF8YO5pRCtbzZWc+P9YYTYp9rtH3dr5aGCvVvvQpRD64re2xQ # mD+xkDykoKEiHKXIM6ZhlSTOJ59kHW1lgrCsiUIjDLaNB0Dn8B+DURKxXLPYY+lW # 2Ha9WK8ukEv0XijM7yE+GjcTfai+BKhGO0sWQ1OElpal5RJFJ/mG7vxfRJJCijJU # 0e+mwue8Oadho/X6rf3iSm3Cw4/PqqGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB2AGvOiRlCzXPPk13wbS+uJbdW8Awwl/I6WdMMqPw0pgIGZv8YrgeB # GBMyMDI0MTAxNzAwMjIwNC4yNDFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB9oMvJmpUXSLBAAEAAAH2MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZCMDUt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0UJeLMR/N9WPBZhuKVFF # +eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5AjaVh19ZVjDChHzimxsoaXx # Nu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7VONShujl1NCMkcgSrPdmd # /8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzmkWJD0N+60IiogFBzg3yI # SsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK/nV/aXjuo9LMrrRmn44o # YYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2VmbNWCjQWq5G4YkrcqbPMa # x7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL0hjxg44kpQn384V46o+z # dQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6wGOrPfzIm0FdOn+xFo48E # Rl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBcEFTOvS9E0diNu1eocw+Z # Ckz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25gD8tO9zJg6g6fRpaZc43 # 9mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2HWfMoqqd9uiQ0hTUEhG4 # 4FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRIwZsJuOcJ # fScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA13kBirH1cHu1 # WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTYxaPfp2IVFdgjaMaBi81w # B8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuwgdIdQvqE0h8VQ5QW5sDV # 4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB71a7dB9zgHOkW0hgUEeWO # 9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NTEU/4vlvsRIMWT0jsnNI7 # 1jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3hOLblC1vxM3+wMyOh97aF # Os7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDkC9AxXYB3yEtuwMs7pRWL # yxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWiCVslJbFIIB/4Alv+jQJS # KAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEPcEzG1dO9zIa1Mp32J+zz # W3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJm41ErdiTjAmdClen9yl6 # HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFBtQNEzcCdh1GYw/6nzzNN # t+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a06JFIuGFHIj/I+36ggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOq6ua8wIhgPMjAyNDEwMTYyMjE2MTVaGA8yMDI0MTAxNzIyMTYxNVowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6rq5rwIBADAKAgEAAgIv3QIB/zAHAgEAAgIT # VDAKAgUA6rwLLwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQDDDC0hN++V # Jy74g/q5rQ9Pq4oRWmvdFAVilyoqNG5FNeSpw7mxOv4UXThWTlBOl2bNqTGzkvjK # /1HY1ORzb/Aeu2J0uK/3H6AXHYixXfn1YzyJVxRJTLS0TPORNfJMSuDWHJT1Di6g # CoD+/CqZe1L7Xvt8jDQCnS0DRHeUAYF8c6VnemAEfA4IDKn4SaYT/k2NGG1y7JYl # ensCDr2vzC5au/b9e/LXrrbwWenTYXMBxOR8mmmJb1LWhpFiwljUmgBn1L8bD/2u # YlPAjx4fiLoqQtqQt6z78yPnyfhIQX3l/aSk9VWevwkIkMldtfba2O+JO8fGbbJZ # 8fjDh/X5N4c6MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgDf3zBagt # 1QjwOcPediLXd1/DSjF2WkdonYY00Ch0IxYwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+LlQjG2ojCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLBAAEA # AAH2MCIEIKX3ygN3+YD2LJQk149e63rYePQbrC7wWjdayxQSeuhRMA0GCSqGSIb3 # DQEBCwUABIICAKYILJwTS0nXJGaj24MPkAzWpw+/ny8fXttdkFiTNtS0BCUKExEv # cWDB+LHd0PbRa33NGwQkbl7uGS891Uz4oS2I8KZ4qaAiUiZ9NyyO0oWQTADUe5yL # LLA9StfEN+RBrgjKpXiM0NfFPTspNvX+UnuGUrOFdFPUzbtpT8i1QNHv4zaHPNUf # 3qnXhbWnNtysAS+w4/lq1YHNLiklfUUIniIBeJLp0qXT/nu1oSzZqreqbgzehe8n # C83uM6c+fPgqvPbS11TQK8KmiaTb++r/eixDMDebsknNShh6OzEg2HGOsvu3K8Jb # BachDIjTlESc1vVC/tH1hpX4oYErps27fZ3U0xcwsCa3wDMLC9VvjUqCinueEaMA # HKo5IzarHilkNPqS1tHrv61+qlJxD5dcosaaltE/1iRZWGGk0WMxKs3sNgnfj0w2 # 1n31yO6Vwk+lvC5OARHjEDiR4/FmYP1cmsU95KUDJl6e7bnpnvXwsdBhO1mjJdZA # tosXuFbG5iemAFvUAC7tGgPXVO6fLaq/exRhnLfBH6DYCkfE2Kvxc65IU3VUe4JI # PC5BUVkmYw2fJt11bfhNiHEaem3kZFyZWr0rG0v5VKqU7q4+mR2xmnznKgxqrVYS # 2e7zxgbLll5e14PMlPujW7YhOS/3nwYwXbOrsIpjdI4l72s3YP1/J+sn # SIG # End signature block
combined_dataset/train/non-malicious/sample_46_32.ps1
sample_46_32.ps1
ConvertFrom-StringData @' FailoverClustersModuleRequired=No se encontró el módulo de PowerShell (FailoverClusters) necesario. Usa la herramienta Roles y características para instalar: Herramientas de administración remota del servidor | Herramientas de administración de las características | Herramientas de clústeres de conmutación por error | Módulo de clúster de conmutación por error para Windows PowerShell. HyperVModuleRequired=No se encontró el módulo de PowerShell (Hyper-V) necesario. Usa la herramienta Roles y características para instalar: Herramientas de administración remota del servidor | Herramientas de administración de características | Módulo de Hyper-V para Windows PowerShell. CimCmdletsModuleRequired=No se encontró el módulo de PowerShell necesario (CimCmdlets). HypervisorSchedulerTypeNotSupported=No se puede establecer el tipo de programador del hipervisor en Windows Servers anteriores a Windows Server 2016. InvalidLoadBalancingAlgorithmType=Se proporcionó el parámetro de algoritmo de equilibrio de carga cuando no se admite la formación de equipos incrustados de conmutador (SET). DeviceIdNotFound=No se puede encontrar el dispositivo con Id. {0} en la máquina virtual {1} (vmId = {2}) PhysicalNetworkAdapterRequired=Debe proporcionarse un nombre de adaptador de red físico para un conmutador virtual externo. StartVirtualMachineStartingMessage=Iniciando máquina virtual {0}... StartVirtualMachineSuccessMessage=Se ha iniciado la máquina virtual {0} correctamente. StartVirtualMachineFailureMessage=Error al iniciar la máquina virtual {0}. Error: {1} StartVirtualMachineOperationMessage=Se han iniciado {0} máquinas virtuales. No se pudieron iniciar {1} máquinas virtuales. ShutdownVirtualMachineStartingMessage=Apagando máquina virtual {0}... ShutdownVirtualMachineSuccessMessage=Se ha apagado la máquina virtual {0} correctamente. ShutdownVirtualMachineFailureMessage=Error al apagar la máquina virtual {0}. Mensaje de error: {1} ShutdownVirtualMachineOperationMessage=Se han apagado {0} máquinas virtuales. No se pudieron apagar {1} máquinas virtuales. TurnoffVirtualMachineStartingMessage=Desconectando máquina virtual {0}... TurnoffVirtualMachineSuccessMessage=Se ha desconectado la máquina virtual {0} correctamente. TurnoffVirtualMachineFailureMessage=Error al desconectar la máquina virtual {0}. Mensaje de error: {1} TurnoffVirtualMachineOperationMessage=Se han desconectado {0} máquinas virtuales. No se pudieron desconectar {1} máquinas virtuales. DeleteSavedStateVirtualMachineStartingMessage=Eliminando el estado guardado de la máquina virtual {0}... DeleteSavedStateVirtualMachineSuccessMessage=El estado guardado de la máquina virtual {0} se ha eliminado correctamente. DeleteSavedStateVirtualMachineFailureMessage=Error al eliminar el estado guardado de la máquina virtual {0}. Mensaje de error: {1} DeleteSavedStateVirtualMachineOperationMessage=El estado guardado de {0} máquinas virtuales se ha eliminado correctamente. No se pudo eliminar el estado guardado de {1} máquinas virtuales. SaveVirtualMachineStartingMessage=Guardando máquina virtual {0}... SaveVirtualMachineSuccessMessage=Se ha guardado la máquina virtual {0} correctamente. SaveVirtualMachineFailureMessage=Error al guardar la máquina virtual {0}. Mensaje de error: {1} SaveVirtualMachineOperationMessage=Se han guardado {0} máquinas virtuales. No se pudieron guardar {1} máquinas virtuales. ResetVirtualMachineStartingMessage=Restableciendo máquina virtual {0}... ResetVirtualMachineSuccessMessage=Se ha restablecido la máquina virtual {0} correctamente. ResetVirtualMachineFailureMessage=Error al restablecer la máquina virtual {0}. Mensaje de error: {1} ResetVirtualMachineOperationMessage=Se han restablecido {0} máquinas virtuales. No se pudieron restablecer {1} máquinas virtuales. ResumeVirtualMachineStartingMessage=Reanudando máquina virtual {0}... ResumeVirtualMachineSuccessMessage=Se ha reanudado la máquina virtual {0} correctamente. ResumeVirtualMachineFailureMessage=Error al reanudar la máquina virtual {0}. Mensaje de error: {1} ResumeVirtualMachineOperationMessage=Se han reanudado {0} máquinas virtuales. No se pudieron reanudar {1} máquinas virtuales. SuspendVirtualMachineStartingMessage=Suspendiendo máquina virtual {0} SuspendVirtualMachineSuccessMessage=Se ha suspendido la máquina virtual {0} correctamente. SuspendVirtualMachineFailureMessage=Error al suspender la máquina virtual {0}. Mensaje de error: {1} SuspendVirtualMachineOperationMessage=Se han suspendido {0} máquinas virtuales. No se pudieron suspender {1} máquinas virtuales. VirtualMachineDiskDeleteDiskNotFound=El disco con id. {0} no puede quitarse de la máquina virtual {1} porque no se encontró. VirtualMachineDvdDeleteDiskNotFound=El DVD/CD-ROM con id. {0} no puede quitarse de la máquina virtual {1} porque no se encontró. VirtualMachineDiskEditDiskNotFound=El disco con id. {0} no puede cambiarse en la máquina virtual {1} porque no se encontró. VirtualMachineDvdEditDiskNotFound=El DVD/CD-ROM con id. {0} no puede editarse en la máquina virtual {1} porque no se encontró. VirtualMachineDiskPathNotFound=El disco con id. {0} no puede cambiarse en la máquina virtual {1} porque tiene una configuración de ruta de acceso vacía. VirtualMachineDvdPathNotFound=El DVD/CD-ROM con id. {0} no puede cambiarse en la máquina virtual {1} porque tiene una configuración de ruta de acceso vacía. VirtualMachineNetworkDeleteAdapterNotFound=El adaptador de red virtual con id. {0} no puede quitarse de la máquina virtual {1} porque no se encontró. VirtualMachineNetworkEditAdapterNotFound=El adaptador de red virtual con id. {0} no puede cambiarse en la máquina virtual {1} porque no se encontró. VirtualMachineNetworkEditAdapterVlanModeNotSupported=El adaptador de red virtual con id. {0} no puede cambiarse en la máquina virtual {1} porque el modo de VLAN {2} no es compatible. VirtualMachineNetworkEditAdapterIsolationModeNotSupported=El adaptador de red virtual con id. {0} no puede cambiarse en la máquina virtual {1} porque el modo de aislamiento {2} no es compatible. VirtualMachineSdnConfigurationFailed=Se creó la máquina virtual {0}, pero hubo un error en la configuración de redes virtuales. VirtualMachinesString=Máquinas virtuales VirtualMachinesSecuritySettingsNotSupported=La configuración de seguridad de la máquina virtual no se admite en versiones de Windows Server anteriores a Windows Server 2012 R2. MoveVirtualMachineStorageParametersInvalid=Los parámetros que controlan cómo se mueve el almacenamiento de la máquina virtual no son válidos. BritannicaNamespaceNotAvailable=No se encontró el espacio de nombres de CIM necesario para el Centro de datos definido por software (SDDC\Administración). MoveVirtualMachineInvalidParameters=Los parámetros proporcionados para mover la máquina virtual no son válidos. MoveVirtualMachineVMIncompatible=No se pudo mover la máquina virtual {0} al nuevo servidor host porque se detectaron incompatibilidades. Para más información sobre las incompatibilidades, consulte los registros de eventos (Applications and Services Logs\\Microsoft-ServerManagementExperience) en {1}. ImportVirtualMachineVMIncompatible=No se pudo importar la máquina virtual {0} a este servidor host porque se detectaron incompatibilidades. Para más información sobre las incompatibilidades, consulte los registros de eventos (Applications and Services Logs\\Microsoft-ServerManagementExperience) en {1}. NewVirtualMachineCreatedAddToClusterFailed=La máquina virtual {0} se creó correctamente en el servidor {1}. No se agregó al clúster de conmutación por error. Para obtener más información, consulte los registros de eventos (registros de aplicaciones y servicios\\Microsoft-ServerManagementExperience) en {1}. '@ # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA96t0CIwFNdysM # 9pR84dvK1HBBYPvqAL6BvPhdO7w1kKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBbt+Z7Ox9scKcq6tbNwvazJ # XvzEm+Jr2AQBZTmHFLdMMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAdAw4yI4dFqV1aS8jOgEI5CJS6osRW3swEt8akEXWtOKFhyhVXnIlB56O # lcJDnypXxiXN+0Xbxprv/vbnORMFZSBtyjXdi4rwrJJ6pUDj0yNeleO9/pBD/Irm # IOJnk5gAvWm60nCnb5HLwbGRT/oUgfJK/XonnHgbHcnm705Qad1wIeWB8V0YslJu # 3PENbvvsTW0DasgHztQru9+aIKcMPstr4vAG3146aQEToqK7nAQFEE/px36QCcH/ # F0l6oaKb5La84KLZygA21RMRGgKEAfTHvS7jWlAas5F/LMNVrAhO/y/oDOZw/EJN # VnrQFY0d6EIMQO6NgwuRnyaG2mBdm6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCC+AVYQPeS3DRS3j0LbuJRRCFALNUhNrr9vg95LGXeVNAIGZdYJATCt # GBMyMDI0MDMwNzIxMTkzMy4wNjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmUSxMwIhgPMjAyNDAzMDcyMjE3NTVaGA8yMDI0MDMwODIyMTc1NVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6ZRLEwIBADAHAgEAAgIy2TAHAgEAAgIUBTAKAgUA # 6ZWckwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFaazxlLFAIxJfTxGh9U # wtSl6JTFgkoetfKiDG5trZMIZ22qg/e9GV74LcWrEHEbxjwRC9NdaKWz7Ubxi/kG # zNA3XHZZ4EUi5r+0sRxRpx72Ps1nnZCQPexqQTqDhkFxjYu7Ts5NDOxt2otAqniq # 865/4ZwKeFuq1W1abmQozFLxMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgtWQEMmKSYmtb1UA68CAFG30WNt2DXLj+3P/TrqHaHHIwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIC58HBtly9ONbLEJxzPigfjEEyjBV161D7Wwhfi7T2gU # MA0GCSqGSIb3DQEBCwUABIICAIN7NFlx+hMmVG4JTlons67zjNI/KkxED5wtRkZl # tu6qzTgf8UNLHLn47elsR01lFDOZ9/8XaAhi6EC4I1xsicM8QViOuSFNrkOHxpEK # iDBGjQEo8e3zg3rSnjj81OxWhKGZd0MleIZ9i/IyHFm07lP0N7Y2F8Mu54fAQQ3C # 1lr/c0fbwOYFZKa7jSU/O6+CmcJgYyB6myNfXuWk8kBM8hnSDLi8OSNDEjSukscQ # /lI904ZM86sB4soLJfR1g6iNcxJBtWlPbpltZOlLRRQ8ggB0VspGs31wpSwsyNsV # ei4D3ystREZ0zC5SKmRx9HnhS6J8HszmfgMeZDKjQ7ezNijSr1w0//PM5MJRftRz # 3nTcuHq/Ttha43PVzzzqsYhNuATugf2tn3MZD/QsJn91BveaZVqSq0rkKMyxCJnU # 7kMxnjFZzLeNgsxDEOZFjqFaKLDjpQiy2g6v5oeGV79sRsRbU3Fzi0IcnB1iBMKR # bljlXZXpY7w5OOZr2rGdN1hZrxJjSw1DGFneH2BW2Fyda6HslTDF+ITjDdO3kAxc # eKMdMhOGIVhCJuPpl9oRdqhKapAKFVM5aU7kMJXSvPraAtAprz+x7xgNFcY/2DxX # bDj+4toCPWRwR6Y3asY3zft5/IpTPsZWrfapbln8zAz0NklouteLe+INrfOZ289I # qFpS # SIG # End signature block
combined_dataset/train/non-malicious/sample_35_96.ps1
sample_35_96.ps1
# # Module manifest for module 'OCI.PSModules.Appmgmtcontrol' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Appmgmtcontrol.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd2facbcf-7202-47af-96ae-07771dc74773' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Appmgmtcontrol Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Appmgmtcontrol.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIAppmgmtcontrolMonitoringPlugin', 'Get-OCIAppmgmtcontrolMonitoredInstance', 'Get-OCIAppmgmtcontrolMonitoredInstancesList', 'Get-OCIAppmgmtcontrolWorkRequest', 'Get-OCIAppmgmtcontrolWorkRequestErrorsList', 'Get-OCIAppmgmtcontrolWorkRequestLogsList', 'Get-OCIAppmgmtcontrolWorkRequestsList', 'Invoke-OCIAppmgmtcontrolPublishTopProcessesMetrics' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Appmgmtcontrol' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Join-Collections_1.ps1
Join-Collections_1.ps1
#requires -version 2.0 ## Version 1.0 First post http://poshcode.org/1459 ## Version 1.1 Fixed column uniqueness bug #.Note # Depends on ConvertFrom-HashTable http://poshcode.org/1118 #.Synopsis # Performs a inner join on two collections of objects based on a common key column. #.Description # Takes two sets of objects where there are multiple "rows" and where each set has a shared column where the values match, and generates new objects with all the values from each. #.Parameter GroupOnColumn # The name of the property to merge on. Items with the same value in this column will be combined. #.Parameter FirstCollection # The first set of data #.Parameter FirstJoinColumn # The name of the key id column in the first set #.Parameter SecondCollection # The second set of data #.Parameter SecondJoinColumn # The name of the matching key id column in the second set # OPTIONAL. Defaults to the same as FirstJoinColum #.Example # Import-CSV data.csv | Pivot-Objects SamAccountName Attribute Value # # Imports csv data containing multiple rows per-record such that a pair of columns named "Attribute" and "Value" are actually different in each row, and contain a name and value pair for attributes you want to add to the output objects. # #.Example # $FirstCollection = @" # FirstName, LastName, MailingAddress, EmployeeID # John, Doe, 123 First Ave, J8329029 # Susan Q., Public, 3025 South Street, K4367143 #"@.Split("`n") | ConvertFrom-Csv # # $SecondCollection = @" # ID, Week, HrsWorked, PayRate, EmployeeID # 12276, 12, 40, 55, J8329029 # 12277, 13, 40, 55, J8329029 # 12278, 14, 42, 55, J8329029 # 12279, 12, 35, 40, K4367143 # 12280, 13, 32, 40, K4367143 # 12281, 14, 48, 40, K4367143 #"@.Split("`n") | ConvertFrom-Csv # # Join-Collections $FirstCollection EmployeeID $SecondCollection | ft -auto # #.Notes # Author: Joel Bennett # function Join-Collections { PARAM( $FirstCollection , [string]$FirstJoinColumn , $SecondCollection , [string]$SecondJoinColumn=$FirstJoinColumn ) PROCESS { $properties1 = $FirstCollection[0] | gm -type Properties | Select -Expand Name $properties2 = $SecondCollection[0] | gm -type Properties | Where { $Properties1 -notcontains $_.Name } | Select -Expand Name foreach($first in $FirstCollection) { foreach($second in $SecondCollection | Where{ $_."$SecondJoinColumn" -eq $first."$FirstJoinColumn" } ) { [string]$join = $first | gm -type Properties | select -expand Definition | %{($_ -split " ",2)[1]} $join += "`n" $join += $second | gm -Name $Properties2 -type Properties | select -expand Definition | %{($_ -split " ",2)[1]} ConvertFrom-StringData $join | ConvertFrom-Hashtable } } } #}
combined_dataset/train/non-malicious/sample_12_95.ps1
sample_12_95.ps1
# # Module manifest for module 'OCI.PSModules.Keymanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Keymanagement.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4a9c2614-4d97-430e-b149-edbf0d70bf0b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Keymanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Keymanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Backup-OCIKeymanagementKey', 'Backup-OCIKeymanagementVault', 'Disable-OCIKeymanagementKey', 'Enable-OCIKeymanagementKey', 'Export-OCIKeymanagementKey', 'Get-OCIKeymanagementEkmsPrivateEndpoint', 'Get-OCIKeymanagementEkmsPrivateEndpointsList', 'Get-OCIKeymanagementKey', 'Get-OCIKeymanagementKeysList', 'Get-OCIKeymanagementKeyVersion', 'Get-OCIKeymanagementKeyVersionsList', 'Get-OCIKeymanagementReplicationStatus', 'Get-OCIKeymanagementVault', 'Get-OCIKeymanagementVaultReplicasList', 'Get-OCIKeymanagementVaultsList', 'Get-OCIKeymanagementVaultUsage', 'Get-OCIKeymanagementWrappingKey', 'Import-OCIKeymanagementKey', 'Import-OCIKeymanagementKeyVersion', 'Invoke-OCIKeymanagementDecrypt', 'Invoke-OCIKeymanagementEncrypt', 'Invoke-OCIKeymanagementScheduleKeyDeletion', 'Invoke-OCIKeymanagementScheduleKeyVersionDeletion', 'Invoke-OCIKeymanagementScheduleVaultDeletion', 'Invoke-OCIKeymanagementSign', 'Invoke-OCIKeymanagementVerify', 'Move-OCIKeymanagementKeyCompartment', 'Move-OCIKeymanagementVaultCompartment', 'New-OCIKeymanagementDataEncryptionKey', 'New-OCIKeymanagementEkmsPrivateEndpoint', 'New-OCIKeymanagementKey', 'New-OCIKeymanagementKeyVersion', 'New-OCIKeymanagementVault', 'New-OCIKeymanagementVaultReplica', 'Remove-OCIKeymanagementEkmsPrivateEndpoint', 'Remove-OCIKeymanagementVaultReplica', 'Restore-OCIKeymanagementKeyFromFile', 'Restore-OCIKeymanagementKeyFromObjectStore', 'Restore-OCIKeymanagementVaultFromFile', 'Restore-OCIKeymanagementVaultFromObjectStore', 'Stop-OCIKeymanagementKeyDeletion', 'Stop-OCIKeymanagementKeyVersionDeletion', 'Stop-OCIKeymanagementVaultDeletion', 'Update-OCIKeymanagementEkmsPrivateEndpoint', 'Update-OCIKeymanagementKey', 'Update-OCIKeymanagementVault' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Keymanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/145.ps1
145.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"   $redirectUri = "urn:ietf:wg:oauth:2.0:oob"   $resourceAppIdURI = "https://graph.microsoft.com"   $authority = "https://login.microsoftonline.com/$Tenant"   try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-ApplePushNotificationCertificate(){ [cmdletbinding()] $graphApiVersion = "v1.0" $Resource = "devicemanagement/applePushNotificationCertificate" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get) } catch { $ex = $_.Exception if(($ex.message).contains("404")){ Write-Host "Resource Not Configured" -ForegroundColor Red } else { $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host } } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $APNS = Get-ApplePushNotificationCertificate $APNS $DateTime = ([datetimeoffset]::Parse($APNS.expirationDateTime)).DateTime.DateTime Write-Host "Expiration Date Time:" $DateTime
combined_dataset/train/non-malicious/4216.ps1
4216.ps1
$scriptblock = { param ($Payload) $PipeName = "PoshMS" $p = [System.IO.Directory]::GetFiles("\\.\\pipe\\") $start = $true foreach ($i in $p) { if ($i -like "*PoshMS") { $start = $false } } while ($start) { add-Type -assembly "System.Core" $PipeSecurity = New-Object System.IO.Pipes.PipeSecurity $AccessRule = New-Object System.IO.Pipes.PipeAccessRule( "Everyone", "ReadWrite", "Allow" ) $PipeSecurity.AddAccessRule($AccessRule) $Pipe = New-Object System.IO.Pipes.NamedPipeServerStream($PipeName,"InOut",100, "Byte", "None", 1024, 1024, $PipeSecurity) $pipe.WaitForConnection(); $pipeReader = new-object System.IO.StreamReader($pipe) $pipeWriter = new-object System.IO.StreamWriter($pipe) $pipeWriter.AutoFlush = $true $pipeWriter.WriteLine($Payload); $pipeReader.Dispose(); $pipe.Dispose(); } exit } add-Type -assembly "System.Core" $MaxThreads = 5 $RunspacePool = [RunspaceFactory]::CreateRunspacePool(1, $MaxThreads) $RunspacePool.Open() $Jobs = @() $Job = [powershell]::Create().AddScript($ScriptBlock).AddArgument($payload) $Job.RunspacePool = $RunspacePool $Job.BeginInvoke() | Out-Null $pi = new-object System.IO.Pipes.NamedPipeClientStream(".", "PoshMS");
combined_dataset/train/non-malicious/1498.ps1
1498.ps1
function Export-RunResultXml { [CmdletBinding()] param( [Parameter(Mandatory=$true,ValueFromPipeline=$true)] [Blade.RunResult] $RunResult, [Parameter(Mandatory=$true)] [string] $FilePath ) begin { Set-StrictMode -Version 'Latest' $now = Get-Date $bladeVersion = (Get-Module -Name 'Blade').Version $cultureName = (Get-Culture).Name $uiCultureName = (Get-UICulture).Name $cwd = (Get-Location).Path $osVersion = [Environment]::OSVersion.VersionString $platform = [Environment]::OSVersion.Platform $clrVersion = $PSVersionTable.CLRVersion $psVersion = $PSVersionTable.PSVersion $resultXml = [xml](@' <?xml version="1.0" encoding="utf-8" standalone="no"?> <test-results name="" total="" errors="" failures="" not-run="0" inconclusive="0" ignored="" skipped="0" invalid="0" date="{0:yyyy-MM-dd}" time="{0:HH:mm:ss}"> <environment blade-version="{1}" clr-version="{2}" powershell-version="{3}" os-version="{4}" platform="{5}" cwd="{6}" machine-name="{7}" user="{8}" user-domain="{9}" /> <culture-info current-culture="{10}" current-uiculture="{11}" /> <test-suite name="" type="BladeFixture" executed="True" asserts="0" result="" success="" time=""> <results /> </test-suite> </test-results> '@ -f $now,$bladeVersion,$clrVersion,$psVersion,$osVersion,$platform,$cwd,$env:COMPUTERNAME,$env:USERNAME,$env:USERDOMAIN,$cultureName,$uiCultureName) } process { $testResults = $resultXml.'test-results' $testResults.SetAttribute( 'name', $RunResult.Name ) $testResults.SetAttribute( 'total', $RunResult.Count ) $testResults.SetAttribute( 'errors', $RunResult.Errors.Count ) $testResults.SetAttribute( 'failures', $RunResult.Failures.Count ) $testResults.SetAttribute( 'ignored', $RunResult.IgnoredCount ) $rootTestSuite = $testResults.'test-suite' $rootTestSuite.SetAttribute( 'name', $RunResult.Name ) $rootResults = $rootTestSuite.ChildNodes[0] $totalTime = [TimeSpan]::Zero $allResult = 'Success' $allSuccess = $true Invoke-Command -ScriptBlock { $RunResult.Failures $RunResult.Errors $RunResult.Passed } | Group-Object -Property 'FixtureName' | ForEach-Object { $testSuite = $resultXml.CreateElement('test-suite') [void]$rootResults.AppendChild( $testSuite ) $testSuite.SetAttribute( 'type', 'BladeFixture' ) $testSuite.SetAttribute( 'name', $_.Name ) $testSuite.SetAttribute( 'executed', $true ) $testSuite.SetAttribute( 'asserts', '0' ) $duration = [TimeSpan]::Zero $success = $true $result = 'Success' $results = $null foreach( $testResult in $_.Group ) { if( -not $results ) { $results = $resultXml.CreateElement( 'results' ) [void]$testSuite.AppendChild( $results ) } $testCase = $resultXml.CreateElement('test-case') [void]$results.AppendChild( $testCase ) $testCase.SetAttribute( 'name', $testResult.Name ) $testCase.SetAttribute( 'executed', 'True' ) $testCase.SetAttribute( 'time', $testResult.Duration.TotalSeconds ) $testCase.SetAttribute( 'asserts', '0' ) $duration += $testResult.Duration $totalTime += $testResult.Duration if( -not $testResult.Passed ) { $allSuccess = $success = $false $allResult = $result = 'Failure' $testCase.SetAttribute( 'result', 'Failure' ) $testCase.SetAttribute( 'success', 'False' ) $failure = $resultXml.CreateElement( 'failure' ) [void]$testCase.AppendChild( $failure ) $message = $resultXml.CreateElement( 'message' ) [void]$failure.AppendChild( $message ) $stackTrace = $resultXml.CreateElement( 'stack-trace' ) [void]$failure.AppendChild( $stackTrace ) if( $testResult.Error ) { $ex = $testResult.Error.Exception while( $ex.InnerException ) { $ex = $ex.InnerException } $message.InnerText = $ex.Message $stackTrace.InnerText = $testResult.Error.ScriptStackTrace } elseif( $testResult.Failure ) { $message.InnerText = $testResult.Failure.Message $stackTrace.InnerText = $testResult.Failure.PSStackTrace -join ("{0} " -f [Environment]::NewLine) } } else { $testCase.SetAttribute( 'result', 'Success' ) $testCase.SetAttribute( 'success', 'True' ) } } $testSuite.SetAttribute( 'result', $result ) $testSuite.SetAttribute( 'success', $success ) $testSuite.SetAttribute( 'time', $duration.TotalSeconds ) } $rootTestSuite.SetAttribute( 'result', $allResult ) $rootTestSuite.SetAttribute( 'success', $allSuccess ) $rootTestSuite.SetAttribute( 'time', $totalTime.TotalSeconds ) } end { $fileRoot = Split-Path -Parent -Path $FilePath if( -not (Test-Path -Path $fileRoot -PathType Container) ) { New-Item -Path $fileRoot -ItemType 'Directory' | Out-String | Write-Verbose } $resultXml.Save( $FilePath ) } }
combined_dataset/train/non-malicious/Set-UserCannotChangePass_1.ps1
Set-UserCannotChangePass_1.ps1
#########1#########2#########3#########4#########5#########6#########7#########8#########9#########1 #########0#########0#########0#########0#########0#########0#########0#########0#########0#########0 # # Author: Erik McCarty # # Description: Set the "user Cannot Change Password" property on an active # directory user object # # Remarks: There is poor documentation on the internet that would lead you # to believe the $user.userAccountControl property value bit 0x000040 can # be set to turn on the "user Cannot Change Password" account property. # However you cannot assign this permission by directly modifying the # userAccountControl attribute. # # History: # 20080107 EWM Initial Creation # # reference: # http://msdn2.microsoft.com/en-us/library/aa746398.aspx # http://mow001.blogspot.com/2006/08/powershell-and-active-directory-part-8.html # http://ewmccarty.spaces.live.com/blog/cns!CE2AE9EFF99E6598!132.entry # Example: # # Set-UserCannotChangePassword "BMcClellan" # #########1#########2#########3#########4#########5#########6#########7#########8#########9#########1 #########0#########0#########0#########0#########0#########0#########0#########0#########0#########0 # function set-UserCannotChangePassword( [string] $sAMAccountName ){ # set variables $everyOne = [System.Security.Principal.SecurityIdentifier]'S-1-1-0' $self = [System.Security.Principal.SecurityIdentifier]'S-1-5-10' $SelfDeny = new-object System.DirectoryServices.ActiveDirectoryAccessRule ( $self,'ExtendedRight','Deny','ab721a53-1e2f-11d0-9819-00aa0040529b') $SelfAllow = new-object System.DirectoryServices.ActiveDirectoryAccessRule ( $self,'ExtendedRight','Allow','ab721a53-1e2f-11d0-9819-00aa0040529b') $EveryoneDeny = new-object System.DirectoryServices.ActiveDirectoryAccessRule ( $Everyone,'ExtendedRight','Deny','ab721a53-1e2f-11d0-9819-00aa0040529b') $EveryOneAllow = new-object System.DirectoryServices.ActiveDirectoryAccessRule ( $Everyone,'ExtendedRight','Allow','ab721a53-1e2f-11d0-9819-00aa0040529b') # find the user object in the default domain $searcher = New-Object DirectoryServices.DirectorySearcher $searcher.filter = "(&(samaccountname=$sAMAccountName))" $results = $searcher.findone() $user = $results.getdirectoryentry() # set "user cannot change password" $user.psbase.get_ObjectSecurity().AddAccessRule($selfDeny) $user.psbase.get_ObjectSecurity().AddAccessRule($EveryoneDeny) $user.psbase.CommitChanges() }