full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/71.ps1
71.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-IntuneApplication(){ [cmdletbinding()] $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileApps" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value | ? { (!($_.'@odata.type').Contains("managed")) } } catch { $ex = $_.Exception Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-ApplicationAssignment(){ [cmdletbinding()] param ( $ApplicationId ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileApps/$ApplicationId/?`$expand=categories,assignments" try { if(!$ApplicationId){ write-host "No Application Id specified, specify a valid Application Id" -f Red break } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get) } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Add-ApplicationAssignment(){ [cmdletbinding()] param ( $ApplicationId, $TargetGroupId, [ValidateSet("available", "required")] $InstallIntent ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileApps/$ApplicationId/assign" try { if(!$ApplicationId){ write-host "No Application Id specified, specify a valid Application Id" -f Red break } if(!$TargetGroupId){ write-host "No Target Group Id specified, specify a valid Target Group Id" -f Red break } if(!$InstallIntent){ write-host "No Install Intent specified, specify a valid Install Intent - available, notApplicable, required, uninstall, availableWithoutEnrollment" -f Red break } $AssignedGroups = (Get-ApplicationAssignment -ApplicationId $ApplicationId).assignments if($AssignedGroups){ $App_Count = @($AssignedGroups).count $i = 1 if($AssignedGroups.target.GroupId -contains $TargetGroupId){ Write-Host "'$AADGroup' is already targetted to this application, can't add an AAD Group already assigned..." -f Red } else { $JSON = @" { "mobileAppAssignments": [ { "@odata.type": " "target": { "@odata.type": " "groupId": "$TargetGroupId" }, "intent": "$InstallIntent" }, "@ foreach($Assignment in $AssignedGroups){ $ExistingTargetGroupId = $Assignment.target.GroupId $ExistingInstallIntent = $Assignment.intent $JSON += @" { "@odata.type": " "target": { "@odata.type": " "groupId": "$ExistingTargetGroupId" }, "intent": "$ExistingInstallIntent" "@ if($i -ne $App_Count){ $JSON += @" }, "@ } else { $JSON += @" } "@ } $i++ } $JSON += @" ] } "@ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json" } } else { $JSON = @" { "mobileAppAssignments": [ { "@odata.type": " "target": { "@odata.type": " "groupId": "$TargetGroupId" }, "intent": "$InstallIntent" } ] } "@ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json" } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-AADGroup(){ [cmdletbinding()] param ( $GroupName, $id, [switch]$Members ) $graphApiVersion = "v1.0" $Group_resource = "groups" try { if($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value } elseif($GroupName -eq "" -or $GroupName -eq $null){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value } else { if(!$Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value } elseif($Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" $Group = (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value if($Group){ $GID = $Group.id $Group.displayName write-host $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value } } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $AADGroup = Read-Host -Prompt "Enter the Azure AD Group name where application will be assigned" $TargetGroupId = (get-AADGroup -GroupName "$AADGroup").id if($TargetGroupId -eq $null -or $TargetGroupId -eq ""){ Write-Host "AAD Group - '$AADGroup' doesn't exist, please specify a valid AAD Group..." -ForegroundColor Red Write-Host exit } Write-Host $ApplicationName = "IntuneApplication" $Application = Get-IntuneApplication | ? { $_.displayName -eq "$ApplicationName" } if(@($Application).count -eq 1){ $Application Add-ApplicationAssignment -ApplicationId $Application.id -TargetGroupId "$TargetGroupId" -InstallIntent required } else { Write-Host "There are" @($Application).count "applications with display Name '$ApplicationName'..." -ForegroundColor Red Write-Host }
combined_dataset/train/non-malicious/sample_24_37.ps1
sample_24_37.ps1
# Compiling Piglit $ProgressPreference = "SilentlyContinue" $MyPath = $MyInvocation.MyCommand.Path | Split-Path -Parent . "$MyPath\mesa_init_msvc.ps1" $source_dir = Join-Path -Path "$PWD" -ChildPath "src" $waffle_source = Join-Path -Path "$source_dir" -ChildPath "waffle" $waffle_install = Join-Path -Path "$PWD" -ChildPath "waffle" $piglit_source = Join-Path -Path "$PWD" -ChildPath "Piglit" Write-Host "Cloning Waffle at:" Get-Date New-Item -ItemType Directory -Path "$waffle_source" | Out-Null Push-Location -Path $waffle_source git init git remote add origin https://gitlab.freedesktop.org/mesa/waffle.git git fetch --depth 1 origin 950a1f35a718bc2a8e1dda75845e52651bb331a7 # of branch master if (!$?) { Write-Host "Failed to fetch Waffle repository" Pop-Location Exit 1 } git checkout FETCH_HEAD Pop-Location Write-Host "Compiling Waffle at:" Get-Date $waffle_build = Join-Path -Path "$source_dir" -ChildPath "waffle\build" New-Item -ItemType Directory -Path "$waffle_build" | Out-Null Push-Location -Path $waffle_build meson setup ` --buildtype=release ` --default-library=static ` --prefix="$waffle_install" && ` ninja -j32 install if (!$?) { Write-Host "Failed to compile or install Waffle" Pop-Location Exit 1 } Pop-Location Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$waffle_build" | Out-Null Write-Host "Downloading glext.h at:" Get-Date New-Item -ItemType Directory -Path "$source_dir\glext\GL" | Out-Null Invoke-WebRequest -Uri 'https://github.com/KhronosGroup/OpenGL-Registry/raw/main/api/GL/glext.h' -OutFile "$source_dir\glext\GL\glext.h" | Out-Null Write-Host "Cloning Piglit at:" Get-Date New-Item -ItemType Directory -Path "$piglit_source" | Out-Null Push-Location -Path $piglit_source git init git remote add origin https://gitlab.freedesktop.org/mesa/piglit.git git fetch --depth 1 origin b41accc83689966f91217fc5b57dbe06202b8c8c # of branch main if (!$?) { Write-Host "Failed to fetch Piglit repository" Pop-Location Exit 1 } git checkout FETCH_HEAD Write-Host "Compiling Piglit at:" Get-Date cmake -S . -B . ` -GNinja ` -DCMAKE_BUILD_TYPE=Release ` -DPIGLIT_USE_WAFFLE=ON ` -DWaffle_INCLUDE_DIRS="$waffle_install\include\waffle-1" ` -DWaffle_LDFLAGS="$waffle_install\lib\libwaffle-1.a" ` -DGLEXT_INCLUDE_DIR="$source_dir\glext" && ` ninja -j32 if (!$?) { Write-Host "Failed to compile Piglit" Pop-Location Exit 1 } Pop-Location $depsInstallPath="C:\mesa-deps" $piglit_bin = "$piglit_source\bin" # Hard link Agility SDK into subfolder of piglit $agility_dest = New-Item -ItemType Directory -Path $piglit_bin -Name 'D3D12' New-Item -ItemType HardLink -path $agility_dest\D3D12Core.dll -Value $depsInstallPath\bin\D3D12\D3D12Core.dll New-Item -ItemType HardLink -path $agility_dest\d3d12SDKLayers.dll -Value $depsInstallPath\bin\D3D12\d3d12SDKLayers.dll # Hard link WARP next to piglit New-Item -ItemType HardLink -path $piglit_bin\d3d10warp.dll -Value $depsInstallPath\bin\d3d10warp.dll Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$source_dir" | Out-Null Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$waffle_install" | Out-Null # Cleanup piglit intermediate files Get-ChildItem -Force -ErrorAction SilentlyContinue -Recurse "$piglit_source" | Where-Object { if($_.FullName -match "CMake|.git|.lib"){ Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $_.FullName | Out-Null } } Write-Host "Compiling Piglit finished at:" Get-Date
combined_dataset/train/non-malicious/sample_18_43.ps1
sample_18_43.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the \"License\"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an \"AS IS\" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Create a in-memory object for LoadBalancerFrontendIPConfiguration .Description Create a in-memory object for LoadBalancerFrontendIPConfiguration #> function New-AzCloudServiceLoadBalancerFrontendIPConfigurationObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.CloudService.Models.Api20220904.LoadBalancerFrontendIPConfiguration')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="Name of FrontendIpConfigration.")] [string] $Name, [Parameter(ParameterSetName="DefaultParameterSet", HelpMessage="Resource Id.")] [string] $PublicIPAddressId, [Parameter(ParameterSetName="PrivateIP", HelpMessage="Private IP Address")] [string] $PrivateIPAddress, [Parameter(ParameterSetName="PrivateIP", HelpMessage="Subnet ID")] [string] $SubnetId ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.CloudService.Models.Api20220904.LoadBalancerFrontendIPConfiguration]::New() $Object.Name = $Name if ($PSBoundParameters.ContainsKey("PublicIPAddressId")) { $Object.PublicIPAddressId = $PublicIPAddressId } if ($PSBoundParameters.ContainsKey("PrivateIPAddress")) { $Object.privateIPAddress = $PrivateIPAddress $Object.SubnetId = $SubnetId } return $Object } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBfBTV8G3uFKuQt # RlJs+fo610LnUHbRHFYDNRntC3Br96CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDvDMsCAImKedY9WX4quQqG9 # +kv5xUi2l5RINsmxkQnbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAoliMVPoh++mFmm5uFeJgCflSt6lHKJgivyq8mJ4mqGUdvOn664hZtYEv # a1zau7jJovZUyLnh6PoBzkdKmxkGrJalnxNQGXE0LAM/CVmplVZPHpwyRIPfuk33 # LJqIAPjiD+z8T9BQ3Iym40JE5t4plezlndnss8xn3TY+NIHPMgzZ5G0Bijlj5pAL # VBEbRe2rAR4lbqXr81Z672fU/xV1ASH8i9C9oJUWgLbRJZs01He/8ZHhSr9kJ1Yr # CcZdPvgXenFs6OPlpCTJ2iADbRpaq0vuHmiE00GbrPIzhoBXfQo9TF770BjQ9rzC # KVSkbQbBLZC8zr7KnvihVK3bCZFueKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBhs1sS+xgmDVRqxXKbzBTklgFzRRXTz1e8nfQoT/8VFAIGZiAsyEFB # GBMyMDI0MDQyMzEzMTUyNC40NDFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA # 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031 # XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP # CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa # SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgXS7H1bjVCEVQZQgbg3DhrBonavxzemhoKLe4qGEUTCwwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z # MA0GCSqGSIb3DQEBCwUABIICAD4kuiUiNwLKP9WI4qGapMu15PZA5hGeKaA4BFdz # AIRg47ehwn1pdzAcSuqa2YWb7EhFW1JFJjfKRvXutxZk3w+8T34sVVhlu45bO/Dj # sJO5jwGjooxT12GyZZd6yOBT/SDDgceDwXjwO8XLWmrQ05iX1bmfFRCn6KvkYl+8 # O9YDB/JfBrgXlA5JwtBSklZl6MzzlQ8m6sUCH4WOmoZiPN6xi8uvbMZOShHyc4dG # k5OngXKafYmpLD6J3HSWBRXDXyiueBvuszhr/VAmqP2loax/rRHbgZkoczDKrGxC # TohYKBiFkLlkDOV/c5UmYBgW3veaSovpTouTg/dBQc6z3rGNa6U0LY3kL/iTXPDd # J+MymMCUNUdXo1TMIfyVU4R99NypWVlsKOE7KP5x1cpzA3CtA3/yR+4YuT8eIl5F # pHdpKA6sAPZp704rF3rHfGtnHQadaEoSne//j4/RokRgpeSE2y//sf99HD+A623w # jnZ03J+noAUuQ/AZGoI6oF6aki2U0WZwpsNKLw4Zy2gU8zgCsvKtv2FNEuUio/qM # OlFJG3hdYjlMvNJXxcHPjNdYPUwa5f5t1lfZBoQk7EANlMLROOFj6+PovezkfNU6 # 288I/7PYukLU5whhtRPFnFx3+GvcX/5iVwpytGQxTW6x5mX8q/RnfIX6yNCanumn # BVGC # SIG # End signature block
combined_dataset/train/non-malicious/sample_30_97.ps1
sample_30_97.ps1
Add-AppxPackage exit cd C:\Users\sampler-win_10_x64\Desktop\ Get-AppxPackage >apps.tx cd C:\Users\sampler-win_10_x64\Desktop\ Get-AppxPackage -allusers | Select Name, PackageFullName > apps_v2.txt Get-AppxPackage | Select Name, PackageFullName > apps_v2.txt Get-AppxPackage Get-AppxPackage -Online Get-AppxPackage -h Get-AppxPackage help Get-help -Name Get-AppxPackage Get-help -Name Add-AppxPackage Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize > C:\Users\sampler-win_10_x64\Desktop\InstalledPrograms-PS.txt Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize cd .. ls /l ls cd .\sampler-win_10_x64\ ls cd .\Downloads\ ls sha1sum .\shockwave-12.3.5.205-installer.exe sha1sum shockwave-12.3.5.205-installer.exe shasum shockwave-12.3.5.205-installer.exe Get-FileHash shockwave-12.3.5.205-installer.exe sha1 Get-FileHash shockwave-12.3.5.205-installer.exe SHA1 Get-FileHash shockwave-12.3.5.205-installer.exe Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA! Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA1 Get-FileHash Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads - Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Alhorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Algorithm SHA1 clear Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SlackSetup.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\ZoomInstallerFull.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\PBIDesktopSetup_x64.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\atlassian-jira-software-9.13.0-x64.exe -Algorithm SHA1 cd ‪C:\Program Files\WindowsApps cd C:\Program Files\WindowsApps ls cd .. ll ls cd .. ls cd '.\Program Files\' ls dir -Force Get-ACL -Path .\WindowsApps\ ls pwd
combined_dataset/train/non-malicious/2303.ps1
2303.ps1
[CmdletBinding()] param ( [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateScript({ Test-Connection $_ -Quiet -Count 1 })] [string[]]$Computername = 'localhost', [Parameter()] [ValidateRange(20, 120)] [int]$PasswordLength = 50, [Parameter(Mandatory)] [string]$PasswordFilePath, [Parameter()] [string]$EncryptionKey, [Parameter()] [switch]$EnableAccount ) begin { function Create-RandomPassword { Param ( [Parameter(Mandatory = $true)] [ValidateRange(20, 120)] [Int]$PasswordLength ) $Password = [System.Web.Security.Membership]::GeneratePassword($PasswordLength, $PasswordLength / 4) if ($Password.Length -ne $PasswordLength) { throw new Exception("Password returned by GeneratePassword is not the same length as required. Required length: $($PasswordLength). Generated length: $($Password.Length)") } return $Password } function Set-Encryption ($UnencryptedPassword, $EncryptionKey) { try { $PasswordSecureString = ConvertTo-SecureString -AsPlainText -Force -String $UnencryptedPassword $Sha256 = new-object System.Security.Cryptography.SHA256CryptoServiceProvider $SecureString = $Sha256.ComputeHash([System.Text.UnicodeEncoding]::Unicode.GetBytes($EncryptionKey)) ConvertFrom-SecureString -Key $SecureString -SecureString $PasswordSecureString } catch { Write-Error "Error creating encryption key" -ErrorAction Stop $_.Exception.Message } } function ConvertTo-CleartextPassword { Param ( [Parameter(Mandatory)] [String]$EncryptedPassword, [Parameter(Mandatory)] [String]$EncryptionKey ) $Sha256 = new-object System.Security.Cryptography.SHA256CryptoServiceProvider $SecureStringKey = $Sha256.ComputeHash([System.Text.UnicodeEncoding]::Unicode.GetBytes($EncryptionKey)) [SecureString]$SecureStringPassword = ConvertTo-SecureString -String $EncryptedPassword -Key $SecureStringKey Write-Output ([System.Runtime.InteropServices.Marshal]::PtrToStringAuto([System.Runtime.InteropServices.Marshal]::SecureStringToCoTaskMemUnicode($SecureStringPassword))) } Add-Type -AssemblyName "System.Web" -ErrorAction Stop } process { foreach ($Computer in $Computername) { try { $Properties = @{ ComputerName = $Computer Username = '' Password = '' PasswordType = '' Result = '' EnabledAccount = '' } if (!(Test-Connection -ComputerName $Computer -Quiet -Count 1)) { Write-Warning "Computer '$Computer' is not online" $Properties.Result = 'Offline' [pscustomobject]$Properties | Export-Csv -Path $PasswordFilePath -Delimiter "`t" -Append -NoTypeInformation } else { $LocalUsers = Get-WmiObject -ComputerName $Computer -Class Win32_UserAccount -Filter "LocalAccount=true" Write-Verbose "Found $($LocalUsers.Count) local users on $Computer" foreach ($LocalUser in $LocalUsers) { Write-Verbose "--Checking username $($LocalUser.Name) for administrator account" $oUser = [ADSI]"WinNT://$Computer/$($LocalUser.Name), user" $Sid = $oUser.objectSid.ToString().Replace(' ', '') if ($Sid.StartsWith('1500000521') -and $Sid.EndsWith('4100')) { Write-Verbose "--Username $($LocalUser.Name)|SID '$Sid' is the local administrator account" $LocalAdministrator = $LocalUser break } } $Properties.UserName = $LocalAdministrator.Name Write-Verbose "Creating random password for $($LocalAdministrator.Name)" $Password = Create-RandomPassword -PasswordLength $PasswordLength if ($EncryptionKey) { $Properties.PasswordType = 'Encrypted' $Properties.Password = (Set-Encryption $Password $EncryptionKey) } else { $Properties.Password = $Password $Properties.PasswordType = 'Unencrypted' } $oUser.psbase.Invoke("SetPassword", $Password) $Properties.Result = 'Success' Write-Verbose "Checking to ensure local administrator '$($LocalAdministrator.Name)' is enabled" if ($LocalAdministrator.Disabled) { Write-Verbose "Local administrator '$($LocalAdministrator.Name)' is disabled. Enabling..." $Properties.EnabledAccount = 'True' $LocalAdministrator.Disabled = $false $LocalAdministrator.Put() | Out-Null } else { $Properties.EnabledAccount = 'False' Write-Verbose "Local administrator '$($LocalAdministrator.Name)' is already enabled." } [pscustomobject]$Properties | Export-Csv -Path $PasswordFilePath -Delimiter "`t" -Append -NoTypeInformation } } catch { Write-Error $_.Exception.Message } } }
combined_dataset/train/non-malicious/sample_62_56.ps1
sample_62_56.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$true)] [ValidateSet('install','uninstall')] [string] $Operation ) function Ensure-ServiceState($targetState) { Write-Host "Waiting for the service state to become $targetState" $svc = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'" while (($svc -eq $null) -or ($svc -ne $null -and $svc.State -ne $targetState)) { Start-Sleep -Seconds 3 $svc = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'" } Write-Host "The service state is $targetState as expected" } function Remove-Data($svcDirPath) { $dataDirPath = Join-Path $svcDirPath -ChildPath "Data" if (Test-Path $dataDirPath) { Write-Host "Cleaning up service data" Remove-Item -Path $dataDirPath -Recurse -Force } } $lastExitCode = 0 $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } $service = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'" if ($Operation -eq 'install' -and $service -ne $null) { Write-host "The service is already installed." -ForegroundColor "Red" exit 1 } elseif ($Operation -eq 'uninstall' -and $service -eq $null) { Write-host "The service has not been installed." -ForegroundColor "Red" exit 1 } $svcDirPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $svcExePath = Join-Path $svcDirPath -ChildPath "ServiceFabricUpdateService.exe" if(!(Test-Path $svcExePath)) { Write-host "Please keep the script right beside ServiceFabricUpdateService.exe." -ForegroundColor "Red" exit 1 } Write-host "Operation starts: $Operation" if ($Operation -eq 'install') { Remove-Data($svcDirPath) Start-Process -FilePath $svcExePath -ArgumentList "-install" -Wait Ensure-ServiceState('Stopped') Start-Service -Name "ServiceFabricUpdateService" Ensure-ServiceState('Running') } else { if ($service.State -ne 'Stopped') { $service.StopService() > $null Ensure-ServiceState('Stopped') } $service.Delete() > $null Remove-Data($svcDirPath) } if($lastExitCode -ne 0) { Write-host "The operation fails. Error code: $lastExitCode." -ForegroundColor "Red" exit 1 } else { Write-host "The operation succeeds." exit 0 } # SIG # Begin signature block # MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBFkMpvnyMXs0A0 # dvTm02jkBo6GMKArX/RU4krX8iGqGKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5G17QsCTlJ95/MXa+iek97 # F3aNaICF6lDtaeAYGBvcMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEACX3LmzpaTMAYPT8GDlmw24hrnrPXbwvLjRz2jgtNUi3ZqMGpTPcRQOHG # 2wRpT4RpV2lJbR/6f7sTU9ZTEkqOfnDByvu9WEKIFKMOAwJUVdoxELaGYLYumPO3 # 7zrJH1yX9ZYc5Xz/7FMsJJ0cPhKblEXRK1w6GSN2bN1lVG5U3ySpva7u+9C06PDv # yL0m6urrkrtKQs3Bl7d6hzhcIdIZvNwScknbK2ZaBzMyR53aTlGbUbAw/upRjNZV # /E6EStecJgnLKLUDRSph/+qtUe3CeHuynCmI7CnuyAPMJJKuZWLt5RMHtPrpyfRe # dWRSJam+UP2iz2XnrrgYsBX9Z75bo6GCFygwghckBgorBgEEAYI3AwMBMYIXFDCC # FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDzt27OIWCFTcXIg9c1FJw8EBCKtcOUEnWaDRIFbZ6UEAIGZk3X7Xei # GBMyMDI0MDUyMjIzMDgxMy41NThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOn4VmIwIhgPMjAyNDA1MjIxOTMyNTBaGA8yMDI0MDUyMzE5MzI1MFowczA5Bgor # BgEEAYRZCgQBMSswKTAKAgUA6fhWYgIBADAGAgEAAgEAMAcCAQACAhFUMAoCBQDp # +afiAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAa1mcHX8/RnSnxr7z9kuu # yntZuGaxIOAc8t/c7FQTc8KBD3Qd34IAUr2Px63Jb9L5jJQ+cVhAVFGuTbQqbdXU # WAkHL18ibFxBap/gdizrttFDc0QtuV9hMZzMQBhkg5sfrmZLrs/kMQTRRjTEOh0T # TZ7YJ0IE/GwoJdB3ZUAYhhIxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T # dGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANERsQABAAAB2jANBglghkgBZQMEAgEF # AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi # BCAbzUk8ZZQ+65XnHgziwLsJxoixI9G80CBFq5Qmf9WMezCB+gYLKoZIhvcNAQkQ # Ai8xgeowgecwgeQwgb0EICKlo2liwO+epN73kOPULT3TbQjmWOJutb+d0gI7GD3G # MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJ # WgDREbEAAQAAAdowIgQg6k3irm7+G7qolzinr8Y1qgdaeiBjSlGIxGsIV2NT6KYw # DQYJKoZIhvcNAQELBQAEggIACrrPMN/Soq2L4RE/FCkMaG04ckUwt/DWTK1CPzKo # Etn2a2Y2gQ8IaSp2hkZ2tMCb2cyRi17nwX+TvLLDPGGaOx0oRSCOQiKlATcm4lnx # 6OibT6c3B69WRpLVN+fU9LEa2p7ie10dAkOzCX2K9hSk3+0z9e/XJbtcpMLPO+zb # MKmiHHvuRoAJOLslsieSwBpWPONa26ErqnTXCXCPCpDKfryJA4imtVETlxuU0xLS # CtOUEM1UsQRt7e+Yby8iXnTqD8dQY+ybpBGeGcga9FfNJ4FsfgTn8E4TSmSg21Mv # 1ismtD9o0BnJxrHf8O32MGbzObalcxj0BeCKVi25nTYVsXZ+L847sjb9FL40PyKU # 0jenG9Ch9L+t3dPz0AGawlQyHarJEyZVR+xGDupfSUP3kHOoo8vNmbPzOuRgmBYv # DLCF8ayGY/vHfOzf92f712WK2WEC/b/jp0/1/t+wwUw5MYCy7BNSixvq6ileTJwl # 4hSS6PEDjClr6WIELCmMrn3s7I13zFBI5f4bwfWVV84IdbnQ8DYBrOCspVya3m3w # 1UrVacLVdei0aDNYfGm5iTO5979l+Kqx80WJukXxLozpqnax2yDU7IHSUiQBL4bB # OwM4KMo5O0fs7h95PzSN8qBlx/B+ioEr6Crrk8BDrKzws08+nJXWkMHlrbJlBQ5d # I18= # SIG # End signature block
combined_dataset/train/non-malicious/sample_24_64.ps1
sample_24_64.ps1
# # Module manifest for module 'OCI.PSModules.Datascience' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datascience.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e310e88b-80a4-4419-8054-2984936bf580' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datascience Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datascience.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIDatascienceModel', 'Enable-OCIDatascienceModelDeployment', 'Enable-OCIDatascienceNotebookSession', 'Export-OCIDatascienceModelArtifact', 'Get-OCIDatascienceFastLaunchJobConfigsList', 'Get-OCIDatascienceJob', 'Get-OCIDatascienceJobArtifactContent', 'Get-OCIDatascienceJobRun', 'Get-OCIDatascienceJobRunsList', 'Get-OCIDatascienceJobShapesList', 'Get-OCIDatascienceJobsList', 'Get-OCIDatascienceModel', 'Get-OCIDatascienceModelArtifactContent', 'Get-OCIDatascienceModelDeployment', 'Get-OCIDatascienceModelDeploymentShapesList', 'Get-OCIDatascienceModelDeploymentsList', 'Get-OCIDatascienceModelProvenance', 'Get-OCIDatascienceModelsList', 'Get-OCIDatascienceModelVersionSet', 'Get-OCIDatascienceModelVersionSetsList', 'Get-OCIDatascienceNotebookSession', 'Get-OCIDatascienceNotebookSessionShapesList', 'Get-OCIDatascienceNotebookSessionsList', 'Get-OCIDatasciencePipeline', 'Get-OCIDatasciencePipelineRun', 'Get-OCIDatasciencePipelineRunsList', 'Get-OCIDatasciencePipelinesList', 'Get-OCIDatasciencePrivateEndpoint', 'Get-OCIDatasciencePrivateEndpointsList', 'Get-OCIDatascienceProject', 'Get-OCIDatascienceProjectsList', 'Get-OCIDatascienceStepArtifactContent', 'Get-OCIDatascienceWorkRequest', 'Get-OCIDatascienceWorkRequestErrorsList', 'Get-OCIDatascienceWorkRequestLogsList', 'Get-OCIDatascienceWorkRequestsList', 'Import-OCIDatascienceModelArtifact', 'Invoke-OCIDatascienceDeactivateModel', 'Invoke-OCIDatascienceDeactivateModelDeployment', 'Invoke-OCIDatascienceDeactivateNotebookSession', 'Invoke-OCIDatascienceHeadJobArtifact', 'Invoke-OCIDatascienceHeadModelArtifact', 'Invoke-OCIDatascienceHeadStepArtifact', 'Move-OCIDatascienceJobCompartment', 'Move-OCIDatascienceJobRunCompartment', 'Move-OCIDatascienceModelCompartment', 'Move-OCIDatascienceModelDeploymentCompartment', 'Move-OCIDatascienceModelVersionSetCompartment', 'Move-OCIDatascienceNotebookSessionCompartment', 'Move-OCIDatasciencePipelineCompartment', 'Move-OCIDatasciencePipelineRunCompartment', 'Move-OCIDatasciencePrivateEndpointCompartment', 'Move-OCIDatascienceProjectCompartment', 'New-OCIDatascienceJob', 'New-OCIDatascienceJobArtifact', 'New-OCIDatascienceJobRun', 'New-OCIDatascienceModel', 'New-OCIDatascienceModelArtifact', 'New-OCIDatascienceModelDeployment', 'New-OCIDatascienceModelProvenance', 'New-OCIDatascienceModelVersionSet', 'New-OCIDatascienceNotebookSession', 'New-OCIDatasciencePipeline', 'New-OCIDatasciencePipelineRun', 'New-OCIDatasciencePrivateEndpoint', 'New-OCIDatascienceProject', 'New-OCIDatascienceStepArtifact', 'Remove-OCIDatascienceJob', 'Remove-OCIDatascienceJobRun', 'Remove-OCIDatascienceModel', 'Remove-OCIDatascienceModelDeployment', 'Remove-OCIDatascienceModelVersionSet', 'Remove-OCIDatascienceNotebookSession', 'Remove-OCIDatasciencePipeline', 'Remove-OCIDatasciencePipelineRun', 'Remove-OCIDatasciencePrivateEndpoint', 'Remove-OCIDatascienceProject', 'Stop-OCIDatascienceJobRun', 'Stop-OCIDatasciencePipelineRun', 'Stop-OCIDatascienceWorkRequest', 'Update-OCIDatascienceJob', 'Update-OCIDatascienceJobRun', 'Update-OCIDatascienceModel', 'Update-OCIDatascienceModelDeployment', 'Update-OCIDatascienceModelProvenance', 'Update-OCIDatascienceModelVersionSet', 'Update-OCIDatascienceNotebookSession', 'Update-OCIDatasciencePipeline', 'Update-OCIDatasciencePipelineRun', 'Update-OCIDatasciencePrivateEndpoint', 'Update-OCIDatascienceProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datascience' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/759.ps1
759.ps1
param([int]$Count=50, [int]$DelayMilliseconds=200) function Write-Item($itemCount) { $i = 1 while ($i -le $itemCount) { $str = "Output $i" Write-Output $str $i = $i + 1 Start-Sleep -Milliseconds $DelayMilliseconds } } function Do-Work($workCount) { Write-Output "Doing work..." Write-Item $workcount Write-Host "Done!" } Do-Work $Count
combined_dataset/train/non-malicious/sample_30_95.ps1
sample_30_95.ps1
# # Module manifest for module 'OCI.PSModules.Events' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Events.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5e1c10f7-8832-4248-b692-89297c84ea32' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Events Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Events.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEventsRule', 'Get-OCIEventsRulesList', 'Move-OCIEventsRuleCompartment', 'New-OCIEventsRule', 'Remove-OCIEventsRule', 'Update-OCIEventsRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Events' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2666.ps1
2666.ps1
Set-PSReadlineOption -Color @{ "Command" = [ConsoleColor]::Green "Parameter" = [ConsoleColor]::Gray "Operator" = [ConsoleColor]::Magenta "Variable" = [ConsoleColor]::White "String" = [ConsoleColor]::Yellow "Number" = [ConsoleColor]::Blue "Type" = [ConsoleColor]::Cyan "Comment" = [ConsoleColor]::DarkCyan } Import-Module posh-git $GitPromptSettings.DefaultPromptPrefix.Text = "$([char]0x2192) " $GitPromptSettings.DefaultPromptPrefix.ForegroundColor = [ConsoleColor]::Green $GitPromptSettings.DefaultPromptPath.ForegroundColor =[ConsoleColor]::Cyan $GitPromptSettings.DefaultPromptSuffix.Text = "$([char]0x203A) " $GitPromptSettings.DefaultPromptSuffix.ForegroundColor = [ConsoleColor]::Magenta $GitPromptSettings.BeforeStatus.ForegroundColor = [ConsoleColor]::Blue $GitPromptSettings.BranchColor.ForegroundColor = [ConsoleColor]::Blue $GitPromptSettings.AfterStatus.ForegroundColor = [ConsoleColor]::Blue
combined_dataset/train/non-malicious/sample_29_37.ps1
sample_29_37.ps1
# # Module manifest for module 'OCI.PSModules.Certificatesmanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Certificatesmanagement.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c420014c-ae2b-4d3a-a11e-e78a626f134b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Certificatesmanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Certificatesmanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICertificatesmanagementAssociation', 'Get-OCICertificatesmanagementAssociationsList', 'Get-OCICertificatesmanagementCaBundle', 'Get-OCICertificatesmanagementCaBundlesList', 'Get-OCICertificatesmanagementCertificate', 'Get-OCICertificatesmanagementCertificateAuthoritiesList', 'Get-OCICertificatesmanagementCertificateAuthority', 'Get-OCICertificatesmanagementCertificateAuthorityVersion', 'Get-OCICertificatesmanagementCertificateAuthorityVersionsList', 'Get-OCICertificatesmanagementCertificatesList', 'Get-OCICertificatesmanagementCertificateVersion', 'Get-OCICertificatesmanagementCertificateVersionsList', 'Invoke-OCICertificatesmanagementRevokeCertificateAuthorityVersion', 'Invoke-OCICertificatesmanagementRevokeCertificateVersion', 'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityVersionDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateVersionDeletion', 'Move-OCICertificatesmanagementCaBundleCompartment', 'Move-OCICertificatesmanagementCertificateAuthorityCompartment', 'Move-OCICertificatesmanagementCertificateCompartment', 'New-OCICertificatesmanagementCaBundle', 'New-OCICertificatesmanagementCertificate', 'New-OCICertificatesmanagementCertificateAuthority', 'Remove-OCICertificatesmanagementCaBundle', 'Stop-OCICertificatesmanagementCertificateAuthorityDeletion', 'Stop-OCICertificatesmanagementCertificateAuthorityVersionDeletion', 'Stop-OCICertificatesmanagementCertificateDeletion', 'Stop-OCICertificatesmanagementCertificateVersionDeletion', 'Update-OCICertificatesmanagementCaBundle', 'Update-OCICertificatesmanagementCertificate', 'Update-OCICertificatesmanagementCertificateAuthority' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Certificatesmanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1095.ps1
1095.ps1
if( (Get-WmiObject -Class 'Win32_ComputerSystem').Domain -eq 'WORKGROUP' ) { Write-Warning -Message ('Get-ADDomainController tests can''t run because this computer is not part of a domain.') } else { function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldFindDomainController { $domainController = Get-ADDomainController Assert-NotNull $domainController Assert-CanFindCurrentUser $domainController } function Test-ShouldFindDomainControllerForSpecificDomain { $domainController = Get-ADDomainController -Domain $env:USERDOMAIN Assert-NotNull $domainController Assert-CanFindCurrentUser $domainController } function Test-ShouldNotFindNonExistentDomain { $error.Clear() $domainController = Get-ADDomainController -Domain 'FJDSKLJDSKLFJSDA' -ErrorAction SilentlyContinue Assert-Null $domainController Assert-equal 2 $error.Count } function Assert-CanFindCurrentUser($domainController) { $domain = [adsi] "LDAP://$domainController" $searcher = [adsisearcher] $domain $searcher.Filter = "(&(objectClass=User) (sAMAccountName=$($env:Username)))" $result = $searcher.FindOne() Assert-NotNull $result } }
combined_dataset/train/non-malicious/GUI process explorer.ps1
GUI process explorer.ps1
function BuildProcessesList { $arr = New-Object Collections.ArrayList $script:col = ps | select Name, Id, BasePriority, Description, Company | sort Name $arr.AddRange($col) $dtgGrid.DataSource = $arr $frmMain.Refresh() } function SelectedItemModules { $ErrorActionPreference = "SilentlyContinue" $lstView.Items.Clear() $sbRules.Text = "" $row = $dtgGrid.CurrentRowIndex if ($itm = $script:col[$row].Id) { trap { $sbRules.Text = $_.Exception.Message } (ps | ? {$_.Id -eq $itm}).Modules | % { $sel = $lstView.Items.Add($_.Size) [void]$sel.Subitems.Add($_.ModuleName) [void]$sel.Subitems.Add($_.FileName) } } } function AutoUpdate { if (!($mnuAuto.Checked)) { $mnuAuto.Checked = $true $trTimer.Start() $sbRules.Text = "Auto update has been enabled." } else { $mnuAuto.Checked = $false $trTimer.Stop() $sbRules.Text = "Auto update has been disabled." } } $frmMain_OnLoad= { BuildProcessesList } function ShowMainWindow { [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][Reflection.Assembly]::LoadWithPartialName("System.Drawing") [Windows.Forms.Application]::EnableVisualStyles() $frmMain = New-Object Windows.Forms.Form $mnuMain = New-Object Windows.Forms.MainMenu $mnuFile = New-Object Windows.Forms.MenuItem $mnuAuto = New-Object Windows.Forms.MenuItem $mnuRfrs = New-Object Windows.Forms.MenuItem $mnuNull = New-Object Windows.Forms.MenuItem $mnuExit = New-Object Windows.Forms.MenuItem $mnuHelp = New-Object Windows.Forms.MenuItem $mnuInfo = New-Object Windows.Forms.MenuItem $scSplit = New-Object Windows.Forms.SplitContainer $dtgGrid = New-Object Windows.Forms.DataGrid $lstView = New-Object Windows.Forms.ListView $chSizeK = New-Object Windows.Forms.ColumnHeader $chFileM = New-Object Windows.Forms.ColumnHeader $chFileP = New-Object Windows.Forms.ColumnHeader $trTimer = New-Object Windows.Forms.Timer $sbRules = New-Object Windows.Forms.StatusBar #mnuMain $mnuMain.MenuItems.AddRange(@($mnuFile, $mnuHelp)) #mnuFile $mnuFile.MenuItems.AddRange(@($mnuAuto, $mnuRfrs, $mnuNull, $mnuExit)) $mnuFile.Text = "&File" #mnuAuto $mnuAuto.Shortcut = "CtrlA" $mnuAuto.Text = "Auto &Update" $mnuAuto.Add_Click( { AutoUpdate } ) #mnuRfrs $mnuRfrs.Shortcut = "F5" $mnuRfrs.Text = "&Refresh" $mnuRfrs.Add_Click( { $sbRules.Text = ""; BuildProcessesList } ) #mnuNull $mnuNull.text = "-" #mnuExit $mnuExit.Shortcut = "CtrlX" $mnuExit.Text = "E&xit" $mnuExit.Add_Click( { $frmMain.Close() }) #mnuHelp [void]$mnuHelp.MenuItems.Add($mnuInfo) $mnuHelp.Text = "&Help" #mnuInfo $mnuInfo.Text = "About..." $mnuInfo.Add_Click( { ShowAboutWindow } ) #scSplit $scSplit.Dock = "Fill" $scSplit.Orientation = "Horizontal" $scSplit.Panel1.Controls.Add($dtgGrid) $scSplit.Panel2.Controls.Add($lstView) $scSplit.SplitterWidth = 1 #dtgGrid $dtgGrid.CaptionVisible = $false $dtgGrid.Dock = "Fill" $dtgGrid.PreferredColumnWidth = 109 $dtgGrid.Add_Click( { SelectedItemModules } ) #lstView $lstView.Columns.AddRange(@($chSizeK, $chFileM, $chFileP)) $lstView.Dock = "Fill" $lstView.FullRowSelect = $true $lstView.GridLines = $true $lstView.Sorting = "Ascending" $lstView.View = "Details" #chSizeK $chSizeK.Text = "Size (K)" $chSizeK.Width = 70 #chFileM $chFileM.Text = "Module Name" $chFileM.Width = 130 #chFileP $chFileP.Text = "Path" $chFileP.Width = 380 #trTimer $trTimer.Interval = 1000 $trTimer.Add_Tick( { BuildProcessesList } ) #sbRules $sbRules.SizingGrip = $false #frmMain $frmMain.ClientSize = New-Object Drawing.Size(601, 480) $frmMain.Controls.AddRange(@($scSplit, $sbRules)) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.Menu = $mnuMain $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "PExplore" $frmMain.Add_Load($frmMain_OnLoad) [void]$frmMain.ShowDialog() } function ShowAboutWindow { $frmMain = New-Object Windows.Forms.Form $lblThis = New-Object Windows.Forms.Label $btnExit = New-Object Windows.Forms.Button #lblThis $lblThis.Location = New-Object Drawing.Point(5, 29) $lblThis.Size = New-Object Drawing.Size(330, 50) $lblThis.Text = "(C) 2008 Grigori Zakharov `n This is just an example that you can make better." $lblThis.TextAlign = "MiddleCenter" #btnExit $btnExit.Location = New-Object Drawing.Point(132, 97) $btnExit.Text = "Close" $btnExit.Add_Click( { $frmMain.Close() } ) #frmMain $frmMain.ClientSize = New-Object Drawing.Size(350, 137) $frmMain.ControlBox = $false $frmMain.Controls.AddRange(@($lblThis, $btnExit)) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.ShowInTaskbar = $false $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "About..." [void]$frmMain.ShowDialog() } ShowMainWindow
combined_dataset/train/non-malicious/sample_6_31.ps1
sample_6_31.ps1
# 2023-02-24 WalterE mod Trap #we# $startTime_AutoAdd = Get-Date trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Common ---" # version of the psSDP Diagnostic Run-DiagExpression .\DC_NetworkingDiagnostic.ps1 # MSInfo Run-DiagExpression .\DC_MSInfo.ps1 # Obtain pstat output Run-DiagExpression .\DC_PStat.ps1 # CheckSym Run-DiagExpression .\DC_ChkSym.ps1 # PoolMon Run-DiagExpression .\DC_PoolMon.ps1 # Collects registry entries for KIR (for 2019) and RBC (for 2016) Run-DiagExpression .\DC_KIR-RBC-RegEntries.ps1 #_# Collect summary report Run-DiagExpression .\DC_SummaryReliability.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: DC_WinStore ---" # Windows Store Inbox Applications Interactive [AutoAdded] #_# Run-DiagExpression .\DC_WinStoreMain.ps1 Run-DiagExpression .\DC_WinStoreCollect.ps1 Run-DiagExpression .\DC_WinUpdateCollect.ps1 Run-DiagExpression .\DC_AppxCollect.ps1 Run-DiagExpression .\DC_UEXCollect.ps1 Run-DiagExpression .\DC_NgenCollect.ps1 Run-DiagExpression .\DC_COMCollect.ps1 Run-DiagExpression .\DC_SystemCollect.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Update ---" # Update History #Run-DiagExpression .\DC_UpdateHistory.ps1 # Collect WindowsUpdate.Log Run-DiagExpression .\DC_WindowsUpdateLog.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: ModernApps ---" # [Idea ID 7524] [Windows] WinStore -Modern applications fail to start if 'Audit the access of global system object' is enabled [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForAuditOptionCheck.ps1 # [Idea ID 7723] [Windows] WinStore - Modern applications fail to start if incompatible security - av software installed [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForWindDefenderCheck.ps1 # [Idea ID 7727] [Windows] WinStore - Cannot install Windows Store Apps [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForTrustedPathCredentialsCheck.ps1 # [Idea ID 7712] [Windows] WinStore - Modern Apps fail to run if the UAC File Virtualization driver is not running [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForUACFileVirtualizationCheck.ps1 # [Idea ID 7508] [Windows] WinStore - This app cannot open while the User Account Control is turned off [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForUACDisabledCheck.ps1 # [Idea ID 6253] [Windows] Win8:APP - Store Apps do not launch due to video resolution [AutoAdded] Run-DiagExpression .\TS_StoreAppsFailureForVideoResolutionCheck.ps1 # [Idea ID 7499] [Windows] Win8:APP - Skype fails to start [AutoAdded] Run-DiagExpression .\TS_SkypeFailureForMissingKB2703761Check.ps1 # [Idea ID 7544] [Windows] WinStore - Apps do not launch, because 'ALL APPLICATIONS PACKAGES' removed from DCOM ACL [AutoAdded] Run-DiagExpression .\TS_StoreAppsFailureForDCOMErrorCheck.ps1 # [Idea ID 7510] [Windows] WinStore - Apps fail to start if default registry permissions modified [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForRegistryPermissionCheck.ps1 # [Idea ID 7546] [Windows] WinStore - Modern Apps Fail to Start if the User Profile directory is Moved from default [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForUserProfileDirCheck.ps1 # [Idea ID 7547] [Windows] WinStore - Modern Apps Fail to Start if the ProgramData directory is Moved from default [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForProgramDataDirCheck.ps1 # [Idea ID 7512] [Windows] WinStore - Apps fail to start if default file permissions modified [AutoAdded] Run-DiagExpression .\TS_ModernAppsFailureForFolderPermissionCheck.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Net ---" # FirewallCheck [AutoAdded] Run-DiagExpression .\RC_FirewallCheck.ps1 # List basic network configuration to results report [AutoAdded] Run-DiagExpression .\TS_BasicNetworkInfo.ps1 # Hotfix Rollups Run-DiagExpression .\DC_HotfixRollups.ps1 $stopTime_AutoAdd = Get-Date $duration = $(New-TimeSpan -Start $startTime_AutoAdd -End $stopTime_AutoAdd) Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "*** $(Get-Date -UFormat "%R:%S") DONE (Dur: $duration) TS_AutoAddCommands_APPS.ps1 `n" # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3iYGOLWeC4RWc # uTpwT44hSnXbPTGtJ7IyXN14PevJg6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC13X1PXnM04/DjDMpVXUE5w # +SLBqMSvafsOMbHjQRP2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEARC8TYDDeQW0YvPbJWTzR/bNgLVhvMLzJ2jmhVu1oW5lwrRTXhS/xr1RY # xq/LZU0mYiFCq6vNWkOe9VRht5tbDl5crJhOoXFllwSwtrRxeDcNyxxEh//Z4SX+ # JeTKjtjddmDlb209XEr+m6G8Cbk9TFp/Nz/0uMEStC69PAI9HRq58oS9exRZJ+q2 # HHZMRgwvGPSN48iFNjcmKJ2soHcaG4P4SddVw91lZXEotH+KvUjUAtKv4baToJMK # cl4ycQ+MaZBIVYUYRxhpdgzzygAjRBXivJRxVa0ZzquLjm7kTtKILKSjK3Afi/OG # 8hcpfO1M1rn6rV7Hw5BGJgayn0j5cKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD4OcoWa6y/Lro5MtEfGYxxCytb7EaSATfvcN/dvo/4fwIGZusiCs6F # GBMyMDI0MTAyODExNDA0MC4yMzlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91ggdQTK+8L0AAEAAAH3MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM2MDUt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0OdHTBNom6/uXKaEKP9r # PITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3k6EQlwqy6ROz42e0R5eD # W+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW2NcWUJW3Qo2AuJ0HOtbl # SpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8U6DRccQm1FdhmPKgDzgc # fDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFHTDkGLdpnDV5FXjVObAgb # SM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn1uA8hRhj09Hs33HRevt4 # oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE4feEkuz7TAwgkRBcUzLg # Q4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPXD9It2ez+mqEzgFRRsJGL # tcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pIvA5irlal7qFhkAeeeZqm # op8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJQAQkllKsI+UJqGq9rmRA # BJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9GqtDx3/aU+yqNRcB8w0tS # XUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTfRqQzP3m9 # PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAN0ajafILeL6S # QIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAbQxTrqnXvVWWeNst5YQD8 # saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXLzJXKhZM09ouPwNsrn8YO # LIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0G5lcQknAXqHa9nQdWp1Z # xXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWtqyLMl65TW6wRM7XlF7Y+ # PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9ba43UU6TgzVZaBm8VaA0w # SwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjBVXm8KVDn2cML9IvRK02s # 941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aMH5xa1Zjb/K8u9f9M05U0 # /bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2NiOcYTGV/DcLrLCBK2zG5 # 03FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG85anlhhGxxBQ5mFsJGkB # n0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5VVN36CO1kDU4ABkSYTXOM # 8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNBjmM7/nqw3bgrEOaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0MTAyOTA2NDM1MFowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEAAgIPIDAHAgEAAgIT5zAK # AgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBaN24RfbEDYuiZ # zqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yduik5ad6IJA7n3eXZZvkf # ovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0GfRa6QSb/KpHS+RGIAeR # p0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578OFTecSrudpM+HrP9rwux # bsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI/x2UnsP+/eCeuyNqOYe6 # VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRNky50Lo7MnEMgN3LQB6Hb # 4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgbYd+N8JEBrUA # kz4my+Nuc0tP2Q7wvQM7KSQcC2wz+KowgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5SoIH5Z4jCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB91ggdQTK+8L0AAEAAAH3 # MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/bgvEVMA0GCSqGSIb3DQEB # CwUABIICAILuZYDzHxy/SrcWK8Ajqqlqtt2gdfrIXmUuunrQhy5dSydTdr3CFpEg # AlBmapDtb37d6KHI/9KRyBXz32RyZN7rUEs8RoryWM+nV83NhvdtfYUhNsEDzdyD # Z2Oxtf+fKSzbqLN13/9vV+XUbX7nlR2g4VYoyJ/uxL5yvnlixbp7jO+KDs6Ec15o # ncAu5h821Av0IBwfpvWrl7apJxdPylzpRIODOeaxZugkO0q+NpTI1w5pjnBhDjTj # YpwBRAtzy1ht5u1Sp7GcRsnlnBeMG39/d6TptHadXAKU662k2teQsNKwj+2f75jH # ahdsdxwU62ypLDMJ4mlJor69FvRTXFdzY9OwNJ9k4LVub5DZph8ZWauhmtXXYwUD # eQf+1UrH7fr9izlXx+rdJ4AQnYi3OIahbsW+ezKn7BtCyQHr+DdwEFxUh+kbUq92 # Pn082fgYaHtS87+JttGUVQnb/GDuF09+z/0xUM8HAajJaeJphES2JZId8+WIRHae # NIJDcqgGMuk6WWuJgOC2aF7H63fYkpsGbJktsveiXFmDzL0xWna+gEmWBvqaMgZf # sEjDzs+zO98X4TIv0Yzmi7mTUWzodlzHGqILYLpr8NeqQVlOoYqTdSK7SHHPFc6G # DZu9XOKTCCyFYqmMimaO40AnKEYeZ8zpeNrq+pdFmn8qdIXJHgir # SIG # End signature block
combined_dataset/train/non-malicious/381.ps1
381.ps1
Describe "Unregister-PSFConfig Unit Tests" -Tag "CI", "Pipeline", "Unit" { BeforeAll { Get-PSFConfig -Module Unregister-PSFConfig -Force | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } } AfterAll { Get-PSFConfig -Module Unregister-PSFConfig -Force | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } } It "Should have the designed for parameters & sets" { (Get-Command Unregister-PSFConfig).ParameterSets.Name | Should -Be 'Pipeline', 'Module' $properties = 'ConfigurationItem', 'FullName', 'Module', 'Name', 'Scope', 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable' Compare-Object $properties ((Get-Command Unregister-PSFConfig).Parameters.Keys | Remove-PSFNull -Enumerate) | Should -BeNullOrEmpty } function New-Location { [CmdletBinding()] param ( [PSFramework.Configuration.ConfigScope] $Scope, [string] $Path, [ValidateSet('Registry', 'File')] [string] $Type, [switch] $Elevated ) if ($Type -eq 'File') { $configPath = Join-Path $Path 'psf_config.json' } else { $configPath = $Path } [pscustomobject]@{ Scope = $Scope Path = $Path Type = $Type Elevated = $Elevated.ToBool() ConfigPath = $configPath } } $module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1 $pathRegistryUserDefault = & $module { $path_RegistryUserDefault } $pathRegistryUserEnforced = & $module { $path_RegistryUserEnforced } $pathRegistryMachineDefault = & $module { $path_RegistryMachineDefault } $pathRegistryMachineEnforced = & $module { $path_RegistryMachineEnforced } $pathFileUserLocal = & $module { $path_FileUserLocal } $pathFileUserShared = & $module { $path_FileUserShared } $pathFileSystem = & $module { $path_FileSystem } $locations = @() $locations += New-Location -Path $pathRegistryUserDefault -Type 'Registry' -Scope UserDefault $locations += New-Location -Path $pathRegistryUserEnforced -Type 'Registry' -Scope UserMandatory $locations += New-Location -Path $pathRegistryMachineDefault -Type 'Registry' -Elevated -Scope SystemDefault $locations += New-Location -Path $pathRegistryMachineEnforced -Type 'Registry' -Elevated -Scope SystemMandatory $locations += New-Location -Path $pathFileUserLocal -Type File -Scope FileUserLocal $locations += New-Location -Path $pathFileUserShared -Type File -Scope FileUserShared $locations += New-Location -Path $pathFileSystem -Type File -Elevated -Scope FileSystem $settingName1 = 'Unregister-PSFConfig.Phase1.Setting1' $settingName2 = 'Unregister-PSFConfig.Phase1.Setting2' $settingName3 = 'Unregister-PSFConfig.Phase1.Setting3' $config = @() $config += Set-PSFConfig -FullName $settingName1 -Value 23 -PassThru $config += Set-PSFConfig -FullName $settingName2 -Value 17 -PassThru $config += Set-PSFConfig -FullName $settingName3 -Value 42 -PassThru foreach ($location in $locations) { if ($location.Elevated -and (-not (Test-PSFPowerShell -Elevated))) { continue } Describe "Testing unregistration from scope $($location.Scope)" { switch ($location.Type) { 'Registry' { It "Should properly set up configuration settings in registry" { if (Test-Path $location.Path) { (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty } Register-PSFConfig -Config $config -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty } It "Should properly remove a single setting by fullname" { Unregister-PSFConfig -FullName $settingName1 -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty } It "Should properly remove multiple settings by fullname" { Unregister-PSFConfig -FullName $settingName2, $settingName3 -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty } It "Should properly remove all settings by fullname when piped to" { Register-PSFConfig -Config $config -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty $settingName1, $settingName2, $settingName3 | Unregister-PSFConfig -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty } Register-PSFConfig -Config $config -Scope $location.Scope It "Should properly remove a single setting by config-item" { (Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty Unregister-PSFConfig -ConfigurationItem $config[0] -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty } It "Should properly remove multiple settings by config-item" { Unregister-PSFConfig -ConfigurationItem $config[1..2] -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty } It "Should properly remove all settings by config-item when piped to" { Register-PSFConfig -Config $config -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty $config | Unregister-PSFConfig -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty } Register-PSFConfig -Config $config -Scope $location.Scope It "Should properly remove a single setting by module and name" { (Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty Unregister-PSFConfig -Module 'Unregister-PSFConfig' -Name 'Phase1.Setting1' -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty } It "Should properly remove multiple settings by module and name" { Unregister-PSFConfig -Module 'Unregister-PSFConfig' -Scope $location.Scope (Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty (Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty } } 'File' { It "Should properly set up configuration settings in registry" { if (Test-Path $location.ConfigPath) { Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty } Register-PSFConfig -Config $config -Scope $location.Scope (Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 3 } It "Should properly remove a single setting by fullname" { Unregister-PSFConfig -FullName $settingName1 -Scope $location.Scope Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)" | Should -BeNullOrEmpty (Get-Content -Path $location.ConfigPath | Select-String "$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 2 } It "Should properly remove multiple settings by fullname" { Unregister-PSFConfig -FullName $settingName2, $settingName3 -Scope $location.Scope if (Test-Path $location.ConfigPath) { Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty } } It "Should properly remove all settings by fullname when piped to" { Register-PSFConfig -Config $config -Scope $location.Scope (Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 3 $settingName1, $settingName2, $settingName3 | Unregister-PSFConfig -Scope $location.Scope if (Test-Path $location.ConfigPath) { Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty } } Register-PSFConfig -Config $config -Scope $location.Scope It "Should properly remove a single setting by config-item" { Unregister-PSFConfig -ConfigurationItem $config[0] -Scope $location.Scope Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)" | Should -BeNullOrEmpty (Get-Content -Path $location.ConfigPath | Select-String "$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 2 } It "Should properly remove multiple settings by config-item" { Unregister-PSFConfig -ConfigurationItem $config[1..2] -Scope $location.Scope if (Test-Path $location.ConfigPath) { Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty } } It "Should properly remove all settings by config-item when piped to" { Register-PSFConfig -Config $config -Scope $location.Scope (Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 3 $config | Unregister-PSFConfig -Scope $location.Scope if (Test-Path $location.ConfigPath) { Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty } } Register-PSFConfig -Config $config -Scope $location.Scope It "Should properly remove a single setting by module and name" { Unregister-PSFConfig -Module 'Unregister-PSFConfig' -Name 'Phase1.Setting1' -Scope $location.Scope Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)" | Should -BeNullOrEmpty (Get-Content -Path $location.ConfigPath | Select-String "$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 2 } It "Should properly remove multiple settings by module and name" { Unregister-PSFConfig -Module 'Unregister-PSFConfig' -Scope $location.Scope if (Test-Path $location.ConfigPath) { Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty } } } } } } }
combined_dataset/train/non-malicious/4369.ps1
4369.ps1
function Get-First { param ( [Parameter(Mandatory=$true)] $IEnumerator ) foreach($item in $IEnumerator) { return $item } return $null }
combined_dataset/train/non-malicious/4481.ps1
4481.ps1
configuration PSModule_InstallModuleConfig { param ( [Parameter()] [System.String[]] $NodeName = 'localhost', [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ModuleName ) Import-DscResource -ModuleName 'PowerShellGet' Node $nodeName { PSModule 'InstallModule' { Name = $ModuleName } } }
combined_dataset/train/non-malicious/New-HyperVVM.ps1
New-HyperVVM.ps1
function New-HyperVVM { param ( [string]$Hypervhost = "localhost", [string]$Vm = "VM Courtesy of PowerShell", [string]$location = "C:\\MyVirtualMachines\\$vm" ) $wmiClassString = "\\\\" + $Hypervhost + "\\root\\virtualization:Msvm_VirtualSystemGlobalSettingData" $wmiclass = [WMIClass]$wmiClassString $newVSGlobalSettingData = $wmiClass.CreateInstance() $newVSGlobalSettingData.psbase.Properties.Item("ExternalDataRoot").value = $location $newVSGlobalSettingData.psbase.Properties.Item("ElementName").value = $Vm $VSManagementService = gwmi MSVM_VirtualSystemManagementService -namespace "root\\virtualization" -ComputerName $Hypervhost $GlobalSettings = $newVSGlobalSettingData.psbase.GetText(1) $VSManagementService.DefineVirtualSystem($GlobalSettings, $ResourceSettings) }
combined_dataset/train/non-malicious/1235.ps1
1235.ps1
if( $IsWindows -and [Environment]::Is64BitOperatingSystem -and [Environment]::Is64BitProcess ) { Write-Timing ('Dot-sourcing Initialize-Lcm.ps1') . (Join-Path -Path $functionRoot -ChildPath 'Initialize-Lcm.ps1') }
combined_dataset/train/non-malicious/sample_4_2.ps1
sample_4_2.ps1
ConvertFrom-StringData @' id_dpm_information=DPM Information id_dpm_errorlogs_files=DPM Errorlog Files '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAzv0zcGsytBt1m # b5LLS93vr+OZbm4II9cEyAaK5Pn2r6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJHL # tWvqG8S6qXnf/E5hzlPaqGaxGcNdIJMni5Z4oj08MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAIP1EppZ+x+FGf9xKmF11pAk6SicsiZ2xLDDz # T9bPRHpVmfaNQ9ZjAzbEu2SCH1haYd6Fi3AnO2OM/THOntT9c66oFTMJFyYpHe/p # OHHxhx0Tc7ivOKHejrz51B6F2UUvwQuHdZObqp6BxhtYpdMyIePBO5QHB78fbhUF # KvSVX3Ql4hWoJb36fV1FcIEeOjI6sNndd+lYnFTzg+EitEuMCAvXBCuBQYmFs8VI # b4RoxjQ+riJL4HbeETlpzwFgJRAJbW0/su/MTUUXjfXOdNC1MLZI8NP1g2+Q8wwC # 9uV+U6DXW1qkg8dyusxHtFPsV/x8+eu1HvhFLXpAxpxSrZj0tqGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAc76iComfeqbi6Wj675pNXEjdXeRO8Xc1t # bZMhShJ7LwIGZutwxmWbGBMyMDI0MTAyODExNDAzOS45MDNaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF # WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP # AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF # s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX # ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL # Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN # gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m # r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB # BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp # vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr # OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI # +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP # Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri # LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi # mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV # liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ # dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L # tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u # EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US # LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq # 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu # 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100 # DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0 # MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA # AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b # zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC # K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga # wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46 # vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW # YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgwQAi/a3/q0JlmF3jFrKsDzLn5mPDuqJTgG4BuhKu8/QwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq # Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC # AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf # HyoaMA0GCSqGSIb3DQEBCwUABIICAJu3VRvXJmODtTBy7b9Cf6Os7s0MezCUOi4O # B7nGmdM0z+wNaVpV4KXG63tgV1Ro1/c0pqzqH7mGUiTQ1DbXx9zNjUdNtg41wOn0 # f/2L0PgBCEHOGV5KpORWOwyeDl2HDKlO8QDKWL1vq+uUpMnxi/WAapKxWvsS3uVk # ZhWfmbtL46J4z78te+MMfb9waKA+q/EqX4sylfYUlMxnskQ5JJa5/OJ4/fiPcKI3 # 5U1U0dFZMS5FlYyv5N4TsUO/h45ya4tkDEAICjE01Wgl77QwKT2Rg/1B7YTU3+B+ # KYi6tKm7L2riYwwE0zcybH3zXpJUXVnTwAgOLj1PIRYWglw2h+fNwdHMuh60NAFO # +9rH1hmCoVko4R1clYA+UWnE4lShcBsz0UERw4lFehAMVsGCpsE37LN7PZytTfFH # 1T0ZPfgglfl35JkWAlABvS2gRv8TJ9dkXjUpfn0DAbifMiPCKG69UYsYTJWqiVfA # F5lvBGhwTjUwQeEj0QNwmnq0BtU9eB8/2eMyjc8opafQZoIMmq8lbmtWquEC5etc # OVdWBHkmbtgIEdzIt797c1o4RhB+lM2fBc3W0AfXzrMTYNF8/fNDhdrLswv+ISou # eGZ6aTNZMhn7ypvN6vZk+/X1QcYgum24C1la0OVe79iRZoI9XdRGn5VnZZ2YGAiD # 0GZAKSwU # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_52.ps1
sample_49_52.ps1
BeforeAll { $ModuleManifestName = 'SampleModule.psd1' Import-Module $PSScriptRoot\..\$ModuleManifestName } Describe 'Module Manifest Tests' { It 'Passes Test-ModuleManifest' { Test-ModuleManifest -Path $PSScriptRoot\..\$ModuleManifestName $? | Should -Be $true } } # SIG # Begin signature block # MIIr5wYJKoZIhvcNAQcCoIIr2DCCK9QCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCArakFqhC1Ei7Bw # aQ0xL8H6DyvVYRxckrLFvpB1x553Z6CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzzCCGcsCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICU1ULSb2aDLD0qWvAnhRaGsLTrVR46/ # rtANSyhqnTGTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # BE1bfVJM2B3BI5k5+7vSDulZaxlrn1kt3WxFDRPtu910OGxwGvmHe9FkAN4ZGxQ9 # IWwoh1fklYZQnfMaSTpq8cdsQvvNrwwh00/yQV/LYeAGX63uBMK69yoSHwJYJJDZ # DTsXeZprn7hJFr6o4UCPJ3pyhWSKr0JfeJRIU406WGNwRT7ZncwC8qUbcg5JoPPq # t5p2QxN/yuqGHn1CqwZmt3c1KBpEPP4Blkg2G4NJfJNZCWQsQYBaABxP9NQLyufb # NaxuJw2DnmJvVxTJR8iXZxCshxEdggv0YOzYe1HSGN9/QxVj428DKkfmo8BjOOet # tPtuYRVknB0QOXethWzMJqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqG # SIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCCpwJZVZC2qn9ZZUhjubMVSgRUPo4HDrmqbwwzLIWZblgIGZfL28GlUGBMyMDI0 # MDQwOTAwNDE1Mi42MDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIH # IDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2MDJaFw0y # NTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfXhlLYmGns # UtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjHtivWGgGj # 4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQSmE9jQRo # BogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56xYPQikitQ # jjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhbw+z3VetR # wuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvniP7sfE1ut # fi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+syO1udZOe # KM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E41j3s7MlT # F4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA7E5vytak # 0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj8Ipg3uQv # cug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+XxwIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w61FxRxPxC # XRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4Go9AML4l # hA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEBPJQUxxuC # iS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRABTUICNNrS # 19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxewCpD4lZL # 6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1rgReGd2uq # QxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3ye1Z3pne # r0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QTSTtDvU7+ # zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRiKsDF370S # wIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8nfDjzJa8 # CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCALt0rQPJYn # OzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu+gYs2LRh # a5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6b5o+TAiGA8yMDI0MDQwODEzMDA0MVoYDzIw # MjQwNDA5MTMwMDQxWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpvmj5AgEAMAoC # AQACAgJYAgH/MAcCAQACAhNVMAoCBQDpv7p5AgEAMDYGCisGAQQBhFkKBAIxKDAm # MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN # AQELBQADggEBAKb0kIZWyRw2YUV2Xc201ekLaxNd4cexe9uOJinfmtCzP+Mg3agw # /T1YGqFEGXcdemsfMwN4nwBYeo/s7y0f/23S975C+ludQRBL7l0jMtZJgLt5PvqP # Q1EGv6KaLi6vW7tNYIruORMY7OgrO+S+HhRs6Axal1INuCDW+m0FtE8uXK/f6XSz # a4zFAps1AH5wJ3g+Twtc8DUg9XPeXYMqTLnBbHdzHk546HK1EpJ1Cspl0XSQaM3i # fEQD5+1hmtvUWpZ4jIhuGUkV+e5W2J3LkjA9P18OQ+ToeXs/jW1YgimX2ud3uPgL # 0WgAk57luV3NXyfAvE0iop2HQSZT+yHZL9sxggQNMIIECQIBATCBkzB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zANBglg # hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqG # SIb3DQEJBDEiBCDTk4HL6KdVr7HLFQRGDV32Q970AIdeza9HMHK84taCDjCB+gYL # KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh841sG # /aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC # EzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgMc3Cd+F0GNhRxX2aXWt/iEz9ltl6PfJr # Ynl/NHABW6wwDQYJKoZIhvcNAQELBQAEggIAtEIXkN0IjG3im5zVahwsSDVRdt4R # WmstCRCDlGjfP4MD6KIs1/6OEi1Td+9M9aTtKBzd3rymAupFX8aRoHCOutKRUD6o # flGedf8TKgg6aUgAA1A6lecMzoa8qAAzvqKlxhUnNdxflzRUH3fzmSjCBZ11Qpwv # qgfOoOfBeek29aGH+cJ5UPKsGtOkeZk2VoCG8cuy8lUSeNwAIbXPQPjTzV+APixH # 3n62/Ao4f6WM1Mr1rG/CKaH0zcbL99CdroEX82SvPT9uc2AFULleTqb1NZ/ZmR1i # o4F9R8B9hdPE+Glyc3McGmluVV/D8WPfvzw2dadMzT+KXvCMg/4Z/D7w4Z/etPv0 # nNaR/TKMWEc0AwDyN/pCwcx/Idctty1dgQRzznH2k4Xezf32QM4k6pSgeXrYqM5i # J+jC/efEn8XZy1Fd7MevZyfQt+W0C47jIwSfanA3z32u/LXhg3V1lnCXvAIKNhel # veLY17ok2FuPjxs/Am4P4RJ7WWzffTYo1Q/DbPG3qtLsVCsNrZAiSRlnvuPyZhDa # ktZS7G34RJz+GIu/kDoblYvUqX8yBpRFCpfFbVJ+wtWXGuLCai4u3IMAgXTkj6oH # vE88kOeufz4U+L5OHsu1EXzhpL4j4WXh0r8QBqs4TOLnXq+QzV8jrueBv18kHwcR # QpjhMHyK51X67jw= # SIG # End signature block
combined_dataset/train/non-malicious/1767.ps1
1767.ps1
try { $defaultParamValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:Skip"] = !$IsWindows Describe "AMSI scan should detect suspicious content" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { [System.Management.Automation.Internal.InternalTestHooks]::SetTestHook("UseDebugAmsiImplementation", $true) } AfterAll { [System.Management.Automation.Internal.InternalTestHooks]::SetTestHook("UseDebugAmsiImplementation", $false) } It "Verifies AMSI scan detects debug suspicious content" { $EICAR_STRING_B64 = "awZ8EmMWc3JjaAdvY2lrBgcbY20aBHBwGgROF3Z6cHJhHmBncn13cmF3HnJ9Z3plemFmYB5ndmBnHnV6f3YSF3sYexk= " $bytes = [System.Convert]::FromBase64String($EICAR_STRING_B64) $EICAR_STRING = -join ($bytes | ForEach-Object { [char]($_ -bxor 0x33) }) { Invoke-Expression -Command "echo '$EICAR_STRING'" } | Should -Throw -ErrorId "ScriptContainedMaliciousContent,Microsoft.PowerShell.Commands.InvokeExpressionCommand" } } } finally { if ($defaultParamValues -ne $null) { $Global:PSDefaultParameterValues = $defaultParamValues } }
combined_dataset/train/non-malicious/4127.ps1
4127.ps1
$LastInfection = get-winevent -filterhashtable @{ logname = 'system'; ID = 1116 } -maxevents 1 -ErrorAction SilentlyContinue $LastFullScan = get-winevent -filterhashtable @{ logname = 'system'; ID = 1118 } -maxevents 1 -ErrorAction SilentlyContinue If (($LastFullScan.TimeCreated -lt $LastInfection.TimeCreated) -or ($LastInfection -eq $null)) { Start-Sleep -Seconds 5 exit 0 } else { Write-Host "No Infection" Start-Sleep -Seconds 5 exit 0 }
combined_dataset/train/non-malicious/sample_56_62.ps1
sample_56_62.ps1
$timestamp = get-date -uformat %Y%m%d-%k%M%S $transcriptPath = "$($env:temp)\StorageSyncAgent-SetRegPIIAclSettings-$($timestamp).log" Start-Transcript -Path $transcriptPath # The following script removes read permissions from registry key locations which may contain PII information. $regPaths = 'HKLM:\Software\Microsoft\Azure\StorageSync\SyncShare','HKLM:\Software\Microsoft\Azure\StorageSync\SyncFolder','HKLM:\Software\Microsoft\Azure\StorageSync\ProxySettings','HKLM:\Software\Microsoft\Azure\StorageSync\ServerRegistration','HKLM:\Software\Microsoft\Azure\StorageSync\ServerSetting' # The SDDL Below sets full access for Admins, Creator/Owners, and Local System. Permissions will be inherited by subkeys # The effect is of this is to effectively remove read permissions from regular users $sddl = 'O:BAG:SYD:P(A;CI;KA;;;CO)(A;CI;KA;;;SY)(A;CI;KA;;;BA)' try { foreach ($path in $regPaths) { Write-Output "Setting SDDL for registry entry $path" $acl = Get-Acl $path if($acl.Sddl -ieq $sddl) { Write-Output "Skipping as SDDL already configured for registry entry $path" } else { Write-Output "Configuring SDDL for registry entry $path" $acl.SetSecurityDescriptorSddlForm($sddl) $acl | Set-Acl } } } catch { Write-Output "Exception encountered while setting up ACLs: $_.Exception.Message" #add the error detail $registryPath="HKLM:\SOFTWARE\Microsoft\Azure\StorageSync\AutoUpdate" $registryName="UpdateError" $registryValue="-2134359807" #ECS_E_INSTALLER_UNABLE_TO_SETUP_ACLS (hResult=80c84101) if(Test-Path $registryPath) #path exist for agent with auto-update configured { New-ItemProperty -Path $registryPath -Name $registryName -Value $registryValue ` -PropertyType String -Force | Out-Null } throw } #Write transcript out to console. Stop-Transcript # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCChmIxCG5rJ1awC # JcJipaJYLEPkaLaxTm0j5MCf1IKPc6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMiwoSZFFHkQly6AE2bvY9I4 # cavW2zJvdxuArJGHkArmMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAEzu0yVcV8yu+7vmlFQiMcxg+b0gIIhYuBqG5c15OopjDh2jarRj3XpCl # 4z6CGDehwD90IdQDWzVbMK3fU3yyBTOIYQIdze5ykP6w40Py2lRvXyeSVDqb9GKp # i1kZKjWdudIgBshGZFAjsTQsEvKFFxVC6CkATIi7ONi+eIkfGiReg3Vapp15RrhT # aY0IHOEAvhc4KBOPiNVk78yuIn9XcXJoQ5FytgDPaH0XXbT+f256CE8ZLA77Zb1x # THbEEFSK+eho8dbCT6VdluZ9dSBEiSVbBdF4aaUfdKaWQCVXrTFu/SvZpqFMqjkt # MlKGdidkl8dT2wUa5f5mzO3vRv8rRKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAMbNJGiKR68vK5I2TGW8tafVq0TsdhhoQwNVhB6P9/1QIGZnMRA+Oi # GBMyMDI0MDYyMTIxMjYxNC4wNjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOogMkUwIhgPMjAyNDA2MjIwMTA5MjVaGA8yMDI0MDYyMzAxMDkyNVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6iAyRQIBADAHAgEAAgIVQzAHAgEAAgIUJzAKAgUA # 6iGDxQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAG/ocl7Gk1uW3xKo45Ff # k14IggzsFHA335ud2SvVveEgljFYORT5IV+X8e2S4hYaqOHpaPMfTHb125/uApCj # D2gyG6eTGetEJpCjdwWhs/dPTF9y+hM1u+aBKsgtIX1szAIkfpA/lUetuemQnKAw # pBqfjJHqEpbJEVg+SMfB5y3tMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg8MWtwWhTckHoF6gXofvQ7+5YRtqdru7Ls1h6wInNZDwwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIAjrfoY3/1fWcU+rluJAz54nu6SiaZBCKXgOifxp8ACV # MA0GCSqGSIb3DQEBCwUABIICAAo+BdNO8PJm78nxfVAG/k1oVmY/Vt6X0bX8Mp08 # pouojW29dRV7lTlZHbjo5+7LyJEavbbtkH7ZKK63J5eeyZdYVPD8qqGtMHzFErrq # 4pXHnl5DTS9r4Jps+ylMogEhEOvxQNT6EZPjLPSUZXpNrihzvw6Pgtl7LUzK14gk # 3Gzo1r4XrXF0b5Xd0pNnaSEvOVlq/FW3UWCX9oEukPAHS1jBXlK/Sxjw+tA3cK/c # GJ9ynbQzJqaGq+ky1fobs+iXt9mr7Ie+dgHX4FtPcQRzqNExio5qQXanGLFiAnGP # YpE40K8Mb30JgNCCJ7TRr28oDmek7Uuq935GtrdCT3glTNXhEIgY+HABsWuicDSE # k9OuyrILa3PyjYfnVLxLjoTnsI0q1CjwXQLxMp5Eyp+DnxMZldnzzashYFgYm+em # H6dne2GEX62ddOSGfu6DM6A3e3xBLsvhQ1H0YbS7xwp8L8EwopoaWVBF45giR64q # cYXpKWbTNl8hYALeUNtibP07fBZJ8r/G6/7N07BLQWLYGcnM0nstSOv4RsKtfYW+ # sW07DZqtTdvVuPxQDCxjjv7yp4DpiDsS6RR1ugIRj932kepvXB4ZM2ueRCd59NnL # unzkm5IeZDAeYXwbhL0QwZFUOHPlcBIEooJM5/IsLw56eb7Lz8CF+Myvh9BYoS5D # UaH4 # SIG # End signature block
combined_dataset/train/non-malicious/Get-FileEncoding_4.ps1
Get-FileEncoding_4.ps1
<# .SYNOPSIS Gets file encoding. .DESCRIPTION The Get-FileEncoding function determines encoding by looking at Byte Order Mark (BOM). Based on port of C# code from http://www.west-wind.com/Weblog/posts/197245.aspx .EXAMPLE Get-ChildItem *.ps1 | select FullName, @{n='Encoding';e={Get-FileEncoding $_.FullName}} | where {$_.Encoding -ne 'ASCII'} This command gets ps1 files in current directory where encoding is not ASCII .EXAMPLE Get-ChildItem *.ps1 | select FullName, @{n='Encoding';e={Get-FileEncoding $_.FullName}} | where {$_.Encoding -ne 'ASCII'} | foreach {(get-content $_.FullName) | set-content $_.FullName -Encoding ASCII} Same as previous example but fixes encoding using set-content #> function Get-FileEncoding { [CmdletBinding()] Param ( [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [string]$Path ) [byte[]]$byte = get-content -Encoding byte -ReadCount 4 -TotalCount 4 -Path $Path if ($byte.count -ge 0) { if ( $byte[0] -eq 0xef -and $byte[1] -eq 0xbb -and $byte[2] -eq 0xbf ) { $encoding = 'UTF8' } elseif ($byte[0] -eq 0xfe -and $byte[1] -eq 0xff) { $encoding = 'BigEndianUnicode' } elseif ($byte[0] -eq 0xff -and $byte[1] -eq 0xfe) { $encoding = 'Unicode' } elseif ($byte[0] -eq 0 -and $byte[1] -eq 0 -and $byte[2] -eq 0xfe -and $byte[3] -eq 0xff) { $encoding = 'UTF32' } elseif ($byte[0] -eq 0x2b -and $byte[1] -eq 0x2f -and $byte[2] -eq 0x76) { $encoding = 'UTF7'} else { $encoding = 'ASCII' } return $encoding } }
combined_dataset/train/non-malicious/sample_50_77.ps1
sample_50_77.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Get-AMTUserConsent { <# .Synopsis Gets the Intel Active Management Technology user consent state .Description This CmdLet gets the Intel Active Management Technology (AMT) user consent state from clients that have Intel AMT firmware version 6.0 and higher. .Notes Supported AMT Firmware Versions: 6.0 or higher. AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Get-AMTUserConsent -computer:vproclient.vprodemo.com ComputerName Port Status UserConsent ------------ ---- ------ ----------- vproclient.vprodemo.com 16992 Successful Not Required .Example Get-AMTUserConsent vproclient.vprodemo.com -Username:vprodemo\ITHelpDesk Will prompt for Kerberos username password. ComputerName Port Status UserConsent ------------ ---- ------ ----------- vproclient.vprodemo.com 16992 Successful Requested .Example Get-AMTUserConsent -ComputerName:vproclient.vprodemo.com -credential $AMTCredential -TLS -CertificateName "myCertificate" ComputerName Port Status UserConsent ------------ ---- ------ ----------- vproclient.vprodemo.com 16993 Successful Displayed .Example Get-AMTUserConsent -ComputerName computer1.vprodemo.com,doesnotexist.vprodemo.com | Where {$_.Status -eq "Failed"} Will get the power state of every AMT client in the list, but only display the ones that failed. ComputerName Port Status UserConsent ------------ ---- ------ ----------- doesnotexist.vprodemo.com 16992 Failed Unknown .Example Get-Content computers.txt | Get-AMTUserConsent -TLS -CertificateName "myCertificate" Will pull the list of AMT clients from a text file and pipe them in the Get-AMTUserConsent Cmdlet ComputerName Port Status UserConsent ------------ ---- ------ ----------- computer1.vprodemo.com 16993 Successful Received computer2.vprodemo.com 16993 Successful Not Required computer3.vprodemo.com 16993 Successful Not Required .Example Get-Content computers.txt | Get-AMTUserConsent | Where {$_.UserConsent -eq "Not Started"} Will pull the list of AMTclients from a text file pipe them into the Get-AMTUserConsent Cmdlet and display the ones that required user consent ComputerName Port Status UserConsent ------------ ---- ------ ----------- computer2.vprodemo.com 16992 Successful Not Started computer3.vprodemo.com 16992 Successful Not Started #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=1, HelpMessage="Validate Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest or Kerberos User")] [string] $Username, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest or Kerberos Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=3, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential ) Process{ $Results = @() $Obj = new-object psobject try { #create a connection object $Connection = New-Object Intel.Management.Wsman.WsmanConnection if ($Credential.username.Length -gt 0) { $Connection.SetCredentials($Credential.Username, $Credential.Password) } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $Connection.SetCredentials($Username, $Password) } else { $Cred = Get-Credential $Username $Connection.SetCredentials($Cred.Username, $Cred.Password) } } if ($Port.Length -lt 1) { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } if($CertificateName.Length -gt 0) { $Connection.Options.SetClientCertificateByCertificateName($CertificateName) } ForEach ($Comp in $ComputerName) { #Add Member to Object. Include Computer Name and Port $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value $Port try { #Attempt Connection with Client $Connection.SetHost($Comp, $Port) #Get opt-in service state $ObjRef = $Connection.NewReference("http://intel.com/wbem/wscim/1/ips-schema/1/IPS_OptInService") $IPSObj = $ObjRef.Get() #Check user consent is required $OptInRequired = $IPSObj.GetProperty("OptInRequired").ToString() $optInState = $IPSObj.GetProperty("OptInState").ToString() #Add Member to Object. Include Status $Obj | Add-Member -MemberType noteproperty -Name Status -value "Successful" if ($OptInRequired -eq 0) { $Obj | Add-Member -MemberType noteproperty -Name UserConsent -value "NotRequired" } else { switch ($optInState) { 0 {$UserConsent = "Not Started"} 1 {$UserConsent = "Requested"} 2 {$UserConsent = "Displayed"} 3 {$UserConsent = "Received"} 4 {$UserConsent = "In Session"} default {$UserConsent = "Unknown"} } $Obj | Add-Member -MemberType noteproperty -Name UserConsent -value $UserConsent } } catch [System.Exception] { if ($_.Exception.GetType().ToString() -eq "Intel.Management.Wsman.WsmanUnreachableException") { # AMT will not have this object when Host Based Configuration is not available $Obj | Add-Member -MemberType noteproperty -Name Status -value "Successful" $Obj | Add-Member -MemberType noteproperty -Name UserConsent -value "Not Required" } else { if($_.ToString().Contains("Unauthorized")) { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Unauthorized" } else { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message } } } #Append to Result $Results += $Obj } } catch { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message #Append to Result $Results += $Obj } Write-Output $Results } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCNdNMpSdEQvRj1 # hqxxdvWjWAGZgCy3KYYJxVx3emhUv6CCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQguOstkbBxhLseLi8a # othEML26qBa2l3WlfEbUI3YAtyswDQYJKoZIhvcNAQEBBQAEggGAPjywauOqWk2X # dy9oQEni56Q+UEy+YgCn6j6OP1Qfi5nEWSGe85RVADe+H5yfFfz805eNnvpkN8KI # fqSGksj1Ukvhp4tKrP6DTGP8v6y0IAeuT6tcKVwNRXsMalBiAiP6BB7Qi+stf9Ao # bhxNI7EE5XzgvNIiWsjOi87sh9KxLz0Fi0QFGNxR4TQKjmeDwWb2sIQCpl/3vxDX # A0j8D3rcwyROdqd54+5Dv/iZG7bWqO4zNRiJbJFQg59lEyStpjU2+rxxZQB9OgE2 # FRmpybtn1lKDTnyqghE0X+6acXXcF2ZZzOhi2c3fFx86DVUgl234Ipvz4WQTJiPl # y4NHw6xegpVtBCpqbfNIh/bIjgRKxiIXUh2PXagqOu7qDyZwhk5HMvNo1r01zT1N # IcTQ03nYZHwAipNyQ8CWwrwHRk9L5kLQ4MtD0fsxru7l5eBh4DS8a5RpA23IaZgE # xZBf8qHRkcZpgIaN3FQDCROfC4VsaK20pQHAcgDSfFHgKtNKD5YpoYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIKxtjFPOjFOzi/mBGsp35+vuCrJbmZUf0xHm # zTXXEJhLAhQZEx8/BoxAtUchl+8Nd+7BqVAVHRgPMjAyMTA3MTkxNjI5NTVaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjEwNzE5MTYyOTU1WjA/BgkqhkiG9w0BCQQxMgQwjJAGwbzb6KLw # CMNrABa0/WEqFBdO4xtppIKDpN+7IrMPTG1dwe9S/i0sdKhQqGCAMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICAFkXIfcfZMgS3YvkvIN5dGUVNElT3BScNn0MYTRUpfHRQg/Y1E6b # bAmnvPmkU7LjJvE0LwXtYN2s1oHSoI6PSqmryf/HrjVi1vBYyX3eE/UJNm8/Tp31 # oSYfGDxZeay1xVnEVRgZ7H28jAz0OF7pUfXxwmGfjnThD4hgbWdiVRq33qT+h4GN # j3UX7u2jgItbFnZq9FmJzbvsvo9TSLJBZBh23tkCd+DBUg2UatfTcGAFl9ZJfHVm # RTM2l/W8pzzU1HwXU5nDdZkhEBTubAG/bmAzOO++J8x85rtDtIV0YVjc0LSlK5hJ # QAl6DcMYYh3toAnHw9t+K7tcTVtBFc4FAmuU64fOp1kXiffX7Jjbpn8GbqybFp3X # F3vtddLGjXAe8LxUyQPIZy62eJy8+6hJ5XeJuPIbzhuMZdIbLvgCF88LSMof1xPj # s5RB7bz9MOXF3EJ4kxVQSuPWTaKJT7y6rr8STVAq8AzjnwVys/U2A2AsprzjV/9Z # C9JRRILk6BWNr1jWuBj7bJ1dxMzGcvMiKqodpH5xA3zSR4vBfAIQvpAcko+0wS1G # SqMAgCEl035G4oJgEq/TY3GMU3VKBXqkqOscmaX+mnQeqrK++CNuRlZnFOzRZXiZ # Bv+dbNWRFI4AU+I/H+dLHWf5JFvbRy/sc2TVYkZwa9J1Dg4+9k0ruOlQ # SIG # End signature block
combined_dataset/train/non-malicious/2498.ps1
2498.ps1
function invoke-sql { param( [Parameter(Mandatory = $True)] [string]$Query, [Parameter(Mandatory = $True)] [string]$DBName, [Parameter(Mandatory = $True)] [string]$DBServerName ) $QueryTimeout = 36000 $ConnectionTimeout = 36000 $conn = New-Object System.Data.SqlClient.SQLConnection $ConnectionString = "Server={0};Database={1};Integrated Security=True;Connect Timeout={2}" -f $DBServerName,$DBName,$ConnectionTimeout $conn.ConnectionString = $ConnectionString $conn.Open() $cmd = New-Object system.Data.SqlClient.SqlCommand ($Query,$conn) $cmd.CommandTimeout = $QueryTimeout $ds = New-Object system.Data.DataSet $da = New-Object system.Data.SqlClient.SqlDataAdapter ($cmd) [void]$da.fill($ds) $conn.Close() $results = $ds.Tables[0] $results } function SQL-Query { param([string]$Query, [string]$SqlServer = $DEFAULT_SQL_SERVER, [string]$DB = $DEFAULT_SQL_DB, [string]$RecordSeparator = "`t") $conn_options = ("Data Source=$SqlServer; Initial Catalog=$DB;" + "Integrated Security=SSPI") $conn = New-Object System.Data.SqlClient.SqlConnection ($conn_options) $conn.Open() $sqlCmd = New-Object System.Data.SqlClient.SqlCommand $sqlCmd.CommandTimeout = "300" $sqlCmd.CommandText = $Query $sqlCmd.Connection = $conn $reader = $sqlCmd.ExecuteReader() if (-not $?) { $lineno = Get-CurrentLineNumber ./logerror.ps1 $Output $date $lineno $title } [array]$serverArray $arrayCount = 0 while ($reader.Read()) { $serverArray +=,($reader.GetValue(0)) $arrayCount++ } $serverArray } [string]$SMCIndexesScript = "\\xfs3\DataManagement\Scripts\Move_DB\PowershellScripts\SQL\SMCIndexes.sql"; [string]$SMCTriggersScript = "\\xfs3\Release\Prime Alliance\SMC\LatestVersion\DatabaseScripts\Other\Triggers.sql"; [string]$SMCViewsScript = "\\xfs3\Release\Prime Alliance\SMC\LatestVersion\DatabaseScripts\Other\Views.sql"; [string]$SMCImportLoansScript = "\\xfs3\Release\Prime Alliance\SMC\LatestVersion\DatabaseScripts\Other\ImportLoans.sql"; function Apply-SMCScripts { param( [Parameter(Mandatory = $True)] [string]$DBServerName, [Parameter(Mandatory = $True)] [string]$DBName ) Invoke-SQLCMD -ServerInstance $DBServerName -database $DBName -InputFile $SMCIndexesScript -QueryTimeout 120 Invoke-SQLCMD -ServerInstance $DBServerName -database $DBName -InputFile $SMCTriggersScript -QueryTimeout 120 Invoke-SQLCMD -ServerInstance $DBServerName -database $DBName -InputFile $SMCViewsScript -QueryTimeout 120 Invoke-SQLCMD -ServerInstance $DBServerName -database $DBName -InputFile $SMCImportLoansScript -QueryTimeout 120 } function DO-Replication { param ( [string][Parameter(Mandatory = $true,Position = 0)] $subscriber, [string][Parameter(Mandatory = $true,Position = 1)] $publisher, [string][Parameter(Mandatory = $true,Position = 2)] $publication, [string][Parameter(Mandatory = $true,Position = 3)] $subscriptionDatabase, [string][Parameter(Mandatory = $true,Position = 4)] $publicationDatabase, [boolean][Parameter(Mandatory = $true,Position = 5)] $forceReInit, [int32][Parameter(Mandatory = $true,Position = 6)] $verboseLevel, [int32][Parameter(Mandatory = $true,Position = 7)] $retries ) "Subscriber: $subscriber"; "Publisher: $publisher"; "Publication: $publication"; "Publication Database: $publicationDatabase"; "Subscription Database: $subscriptionDatabase"; "ForceReInit: $forceReinit"; "VerboseLevel: $verboseLevel"; "Retries: $retries"; for ($counter = 1; $counter -le $retries; $counter++) { $serverConnection = New-Object Microsoft.SqlServer.Management.Common.ServerConnection $publisher; try { $transSubscription = New-Object Microsoft.SqlServer.Replication.TransSubscription $transSubscription.ConnectionContext = $serverConnection; $transSubscription.DatabaseName = $publicationDatabase; $transSubscription.PublicationName = $publication; $transSubscription.SubscriptionDBName = $subscriptionDatabase; $transSubscription.SubscriberName = $subscriber; if ($true -ne $transSubscription.LoadProperties()) { throw New-Object System.ApplicationException "A subscription to [$publication] does not exist on [$subscriber]" } else { $ReplJob = SQL-Query -Query "select name from sysjobs where category_id = 15 and name like '%$($publicationDatabase)%' " -sqlserver $Publisher -DB "msdb" SQL-Query -Query "exec sp_start_job '$($ReplJob)'" -sqlserver $publisher -DB "msdb" } if ($null -eq $transSubscription.SubscriberSecurity) { throw New-Object System.ApplicationException "There is insufficent metadata to synchronize the subscription. Recreate the subscription with the agent job or supply the required agent properties at run time."; } if ($forceReInit -eq $true) { $transSubscription.Reinitialize(); } $transSubscription.SynchronizationAgent.CommitPropertyChanges; $transSubscription.SynchronizationAgent.Synchronize; "Sync Complete"; return; } catch [exception] { if ($counter -lt $retries) { $_.Exception.Message + ": " + $_.Exception.InnerException "Retry $counter"; continue; } else { $Error[0] | Out-String return $_.Exception.Message + ": " + $_.Exception.InnerException } } } } cls Apply-SMCScripts -DBServerName "STGSQLLFC6" -dbname "RLCSMC"
combined_dataset/train/non-malicious/sample_63_38.ps1
sample_63_38.ps1
param( [string]$rootDirectory ) # Validate root directory parameter if ([string]::IsNullOrWhiteSpace($rootDirectory)) { Write-Host "Error: Root directory path is required." exit 1 } # Print the paths to confirm they are being set correctly Write-Host "Root Directory Path: $rootDirectory" # Define subdirectory paths based on the root directory # $featureDirectoryPath = Join-Path -Path $rootDirectory -ChildPath "features" # $pagesPath = Join-Path -Path $rootDirectory -ChildPath "Pages" # $modulesPath = Join-Path -Path $rootDirectory -ChildPath "modules" # $stepDefPath = Join-Path -Path $rootDirectory -ChildPath "step_definitions" # ---- new code added ------------------------------------------------------------------ $featureDirectoryPath = Join-Path -Path $rootDirectory -ChildPath "src/test/resources/features" $pagesPath = Join-Path -Path $rootDirectory -ChildPath "src/test/java/Pages" $modulesPath = Join-Path -Path $rootDirectory -ChildPath "src/test/java/modules" $stepDefPath = Join-Path -Path $rootDirectory -ChildPath "src/test/java/step_definitions" # -------------------------------------------------------------------------------------- # Print the paths to confirm they are being set correctly Write-Host "Feature Directory Path: $featureDirectoryPath" Write-Host "Pages Path: $pagesPath" Write-Host "Modules Path: $modulesPath" Write-Host "Step Definitions Path: $stepDefPath" # Check if the feature directory exists if (-Not (Test-Path -Path $featureDirectoryPath)) { Write-Host "Feature directory path does not exist: $featureDirectoryPath" exit 1 } # Get all feature files in the directory $featureFiles = Get-ChildItem -Path $featureDirectoryPath -Filter *.feature # Check if there are any feature files if ($featureFiles.Count -eq 0) { Write-Host "No feature files found in the directory: $featureDirectoryPath" exit 1 } # Ensure the output directories exist if (-Not (Test-Path -Path $pagesPath)) { New-Item -ItemType Directory -Path $pagesPath } if (-Not (Test-Path -Path $modulesPath)) { New-Item -ItemType Directory -Path $modulesPath } if (-Not (Test-Path -Path $stepDefPath)) { New-Item -ItemType Directory -Path $stepDefPath } # Set API endpoint $endpoint = "https://api.openai.com/v1/chat/completions" # Header for API key $headers = @{ "Content-Type" = "application/json" "Accept" = "application/json" "Authorization" = "Bearer sk-proj-xGJkIkdCA5FYgpNPHviAT3BlbkFJSMHy8yPY7T2kXPQKRWSI" "Cookie" = "__cf_bm=EJBUBMe_o31PeVThk.9ywwWLRkamx9A9pT4jAxjXW4M-1715917815-1.0.1.1-PW2WyDdtyUqHDv6oflUkIFj.NgOhFHKPgiuigJjn1UdDAacluuoYn0tzF5qa9ephpjGn.N0.UJUAOV4Sho91xQ; _cfuvid=pP3rRUKdN0MvEt9GlNi3j9OMPaEw_RwlPKEXxn5PfE0-1715914702942-0.0.1.1-604800000" } foreach ($featureFile in $featureFiles) { $featureFilePath = $featureFile.FullName $featureContent = Get-Content -Path $featureFilePath -Raw # Extract the feature file name without extension $featureFileName = [System.IO.Path]::GetFileNameWithoutExtension($featureFilePath) Write-Output "Processing feature file: $featureFileName" # Construct the content message $contentMessage = @" You are given a .feature file written in Cucumber. Your task is to generate three Java files based on the given feature file content, which implement the step definitions using Java:\n" + "1. A file containing all the locators (xpaths) named according to the feature file.\n" + "2. A file with function definitions for each step in the feature file, named according to the feature file.\n" + "3. A main file that calls the functions from the second file, named according to the feature file.\n\n" + "Please ensure the following:\n" + "1. The generated Java code should be syntactically correct and free of errors.\n" + "2. Do not add any extra Java keywords at the beginning of the file (e.g., 'java').\n" + "3. Import the necessary Cucumber libraries and any other libraries required for the steps.\n" + "4. Ensure proper naming conventions and code formatting are used.\n" + "5. Use meaningful comments within the methods to indicate what each step should perform.\n" + "6. We are using Selenium version 4.0.0 and above, so do not include ChromeDriver or WebDriver. Import only the required libraries.\n\n" + "Name the generated files according to the feature file name. For example, if the feature file is named 'Reports.feature', the generated files will be:\n" + " - ReportsPage.java: Contains locators (xpaths)\n" + " - Reports.java: Contains functions related to the feature file\n" + " - ReportsStepDef.java: Contains step definitions of the feature file\n\n" + "File name should be changed according to the name of feature file\n" + "Add necessary libraries in locators file depending on the feature file and Use 'By' locator for storing locators in variables\n\n" + "Add necessary functions with its content in function definitions for each step in feature file. Strictly ensure that all functions are included according to locators and properly defined.\n\n" + "We have KeywordUtil class which contains two function 'click' and 'inputText' , so use these functions in file which contains function definition related to feature file, use 'inputText for entering credentials as email, password and otp as 'KeywordUtil.inputText()' and import utilities.KeywordUtil;\n\n" + "use KeywordUtil functionality as KeywordUtil.inputText(InvoicePage.email_input, email, \"Entering email id \"); where it is required\n\n" + "use KeywordUtil.navigateToUrl for hitting to url and it takes only 1 argument \n\n" + "import package 'package Pages' in Locators files, package 'package modules' in function definition of files and package 'package step_definitions' in step definition file.\n\n" + "instead of using package 'com.example.utilities.KeywordUtil' , import package 'utilities.KeywordUtil'\n\n" + "instead of using 'isElementVisible', use 'waitForVisible' and 'waitForVisible' will take only 1 argument and when 'waitForVisible' function is used, it must be wrap under void type function.\n\n" + "access functions by creating an object of class \n\n" + "import io.cucumber.java.en.* in all stepDef files\n\n" + "Include a `Thread.sleep(15000)` for the step where 'the User is able to log in to the merchant account'\n\n" + "Include a `Thread.sleep(1500)` for the step where 'the User clicks on the profile icon', 'click on logout', 'click on yes' in the step definition file, no need to do changes in function definitions\n\n" + "Include a `Thread.sleep(1500)` for the step where 'the User click on Invoice option', 'The User click on In-Store order','the user click on Online order','The User click on Reports', 'The User is able to see the full Settlement Report with the selected date range'\n\n" + "Please ensure you use only the provided locators (xpaths) strictly according to the feature file content and do not generate any new xpaths and they must follow order according to feature file." + "\n\n\n Feature File name is: " + $featureFilePath + Feature file content: + $featureContent "@ # Set data $data = @{ "model" = "gpt-4-turbo" "messages" = @( @{ "role" = "user" "content" = $contentMessage } ) "temperature" = 0 "top_p" = 1 "n" = 1 "stream" = $false "max_tokens" = 4096 "presence_penalty" = 0 "frequency_penalty" = 0 } # Convert data to JSON $jsonData = $data | ConvertTo-Json -Depth 10 # Send request try { $response = Invoke-RestMethod -Uri $endpoint -Method Post -Headers $headers -Body $jsonData # Check if response is empty if (-not $response) { Write-Output "Error: Empty response received for $featureFileName." continue } # Log the full response for debugging # Write-Output "API Response for ${featureFileName}: $($response | ConvertTo-Json -Depth 10)" # Extract Java code from the response $fullResponse = $response.choices[0].message.content # Log the full response content # Write-Output "Full Response Content for ${featureFileName}: $fullResponse" # Replace '```java' with '```' $fullResponse = $fullResponse -replace '```java', '```' # Split the response into Java code segments $javaCodes = $fullResponse -split '```' # Output the length of $javaCodes # Write-Output "Number of extracted Java code segments for ${featureFileName}: $($javaCodes.Length)" # Log the extracted segments for ($i = 0; $i -lt $javaCodes.Length; $i++) { Write-Output "Segment $i for ${featureFileName}: $($javaCodes[$i])" } if ($javaCodes.Length -lt 6) { Write-Output "Error: Response format is incorrect for ${featureFileName}." continue } # Save files to their respective directories $locatorsFilePath = Join-Path -Path $pagesPath -ChildPath ($featureFileName + "Page.java") $mainFilePath = Join-Path -Path $modulesPath -ChildPath ($featureFileName + ".java") $stepDefinitionsFilePath = Join-Path -Path $stepDefPath -ChildPath ($featureFileName + "StepDef.java") Set-Content -Path $locatorsFilePath -Value $javaCodes[1] Set-Content -Path $mainFilePath -Value $javaCodes[3] Set-Content -Path $stepDefinitionsFilePath -Value $javaCodes[5] Write-Output "Java files for ${featureFileName} have been generated and saved in their respective folders." } catch { Write-Error "Error processing feature file $featureFileName" } }
combined_dataset/train/non-malicious/Autoload Module_1.ps1
Autoload Module_1.ps1
#Requires -Version 2.0 ## Automatically load functions from scripts on-demand, instead of having to dot-source them ahead of time, or reparse them from the script every time. ## Provides significant memory benefits over pre-loading all your functions, and significant performance benefits over using plain scripts. Can also *inject* functions into Modules so they inherit the module scope instead of the current local scope. ## Please see the use example in the script below ## Version History ## v 1.1 - 2011.02.09 ## Added support for autoloading scripts (files that don't have a "function" in them) ## v 1.0 - 2010.10.20 ## Officially out of beta -- this is working for me without problems on a daily basis. ## Renamed functions to respect the Verb-Noun expectations, and added Export-ModuleMember ## beta 8 - 2010.09.20 ## Finally fixed the problem with aliases that point at Invoke-Autoloaded functions! ## beta 7 - 2010.06.03 ## Added some help, and a function to force loading "now" ## Added a function to load AND show the help... ## beta 6 - 2010.05.18 ## Fixed a bug in output when multiple outputs happen in the END block ## beta 5 - 2010.05.10 ## Fixed non-pipeline use using $MyInvocation.ExpectingInput ## beta 4 - 2010.05.10 ## I made a few tweaks and bug fixes while testing it's use with PowerBoots. ## beta 3 - 2010.05.10 ## fix for signed scripts (strip signature) ## beta 2 - 2010.05.09 ## implement module support ## beta 1 - 2010.04.14 ## Initial Release ## To use: ## 1) Create a function. To be 100% compatible, it should specify pipeline arguments ## For example: <# function Skip-Object { param( [int]$First = 0, [int]$Last = 0, [int]$Every = 0, [int]$UpTo = 0, [Parameter(Mandatory=$true,ValueFromPipeline=$true)] $InputObject ) begin { if($Last) { $Queue = new-object System.Collections.Queue $Last } $e = $every; $UpTo++; $u = 0 } process { $InputObject | where { --$First -lt 0 } | foreach { if($Last) { $Queue.EnQueue($_) if($Queue.Count -gt $Last) { $Queue.DeQueue() } } else { $_ } } | foreach { if(!$UpTo) { $_ } elseif( --$u -le 0) { $_; $U = $UpTo } } | foreach { if($every -and (--$e -le 0)) { $e = $every } else { $_ } } } } #> ## 2) Put the function into a script (for our example: C:\\Users\\${Env:UserName}\\Documents\\WindowsPowerShell\\Scripts\\SkipObject.ps1 ) ## 3) Import the Autoload Module ## 5) Run this command (or add it to your profile): <# New-Autoload C:\\Users\\${Env:UserName}\\Documents\\WindowsPowerShell\\Scripts\\SkipObject.ps1 Skip-Object #> ## This tells us that you want to have that function loaded for you out of the script file if you ever try to use it. ## Now, you can just use the function: ## 1..10 | Skip-Object -first 2 -upto 2 function Invoke-Autoloaded { #.Synopsis # This function was autoloaded, but it has not been parsed yet. # Use Get-AutoloadHelp to force parsing and get the correct help (or just invoke the function once). #.Description # You are seeing this help because the command you typed was imported via the New-Autoload command from the Autoload module. The script file containing the function has not been loaded nor parsed yet. In order to see the correct help for your function we will need to parse the full script file, to force that at this time you may use the Get-AutoloadHelp function. # # For example, if your command was Get-PerformanceHistory, you can force loading the help for it by running the command: Get-AutoloadHelp Get-PerformanceHistory [CmdletBinding()]Param() DYNAMICPARAM { $CommandName = $MyInvocation.InvocationName return LoadNow $CommandName }#DynamicParam begin { Write-Verbose "Command: $CommandName" if(!$Script:AutoloadHash[$CommandName]) { do { $Alias = $CommandName $CommandName = Get-Alias $CommandName -ErrorAction SilentlyContinue | Select -Expand Definition Write-Verbose "Invoke-Autoloaded Begin: $Alias -> $CommandName" } while(!$Script:AutoloadHash[$CommandName] -and (Get-Alias $CommandName -ErrorAction SilentlyContinue)) } else { Write-Verbose "CommandHash: $($Script:AutoloadHash[$CommandName])" } if(!$Script:AutoloadHash[$CommandName]) { throw "Unable to determine command!" } $ScriptName, $ModuleName, $FunctionName = $Script:AutoloadHash[$CommandName] Write-Verbose "Invoke-Autoloaded Begin: $Alias -> $CommandName -> $FunctionName" #Write-Host "Parameters: $($PSBoundParameters | ft | out-string)" -Fore Magenta $global:command = $ExecutionContext.InvokeCommand.GetCommand( $FunctionName, [System.Management.Automation.CommandTypes]::Function ) Write-Verbose "Autoloaded Command: $($Command|Out-String)" $scriptCmd = {& $command @PSBoundParameters | Write-Output } $steppablePipeline = $scriptCmd.GetSteppablePipeline($myInvocation.CommandOrigin) $steppablePipeline.Begin($myInvocation.ExpectingInput) } process { Write-Verbose "Invoke-Autoloaded Process: $CommandName ($_)" try { if($_) { $steppablePipeline.Process($_) } else { $steppablePipeline.Process() } } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } Write-Verbose "Invoke-Autoloaded End: $CommandName" } }#Invoke-Autoloaded function Get-AutoloadHelp { [CmdletBinding()] Param([Parameter(Mandatory=$true)][String]$CommandName) $null = LoadNow $CommandName Get-Help $CommandName } function LoadNow { [CmdletBinding()] Param([Parameter(Mandatory=$true)][String]$CommandName) Write-Verbose "Command: $CommandName" if(!$Script:AutoloadHash[$CommandName]) { do { $Alias = $CommandName $CommandName = Get-Alias $CommandName -ErrorAction SilentlyContinue | Select -Expand Definition Write-Verbose "LoadNow Begin: $Alias -> $CommandName" } while(!$Script:AutoloadHash[$CommandName] -and (Get-Alias $CommandName -ErrorAction SilentlyContinue)) } else { Write-Verbose "CommandHash: $($Script:AutoloadHash[$CommandName])" } if(!$Script:AutoloadHash[$CommandName]) { throw "Unable to determine command!" } Write-Verbose "LoadNow DynamicParam: $CommandName from $($Script:AutoloadHash[$CommandName])" $ScriptName, $ModuleName, $FunctionName = $Script:AutoloadHash[$CommandName] Write-Verbose "Autoloading:`nScriptName: $ScriptName `nModuleName: $ModuleName `nFunctionName: $FunctionName" if(!$ScriptName){ $ScriptName = $CommandName } if(!$FunctionName){ $FunctionName = $CommandName } if($ModuleName) { $Module = Get-Module $ModuleName } else { $Module = $null } ## Determine the command name based on the alias used to invoke us ## Store the parameter set for use in the function later... $paramDictionary = new-object System.Management.Automation.RuntimeDefinedParameterDictionary #$externalScript = $ExecutionContext.InvokeCommand.GetCommand( $CommandName, [System.Management.Automation.CommandTypes]::ExternalScript ) $externalScript = Get-Command $ScriptName -Type ExternalScript | Select -First 1 Write-Verbose "Processing Script: $($externalScript |Out-String)" $parserrors = $null $prev = $null $script = $externalScript.ScriptContents [System.Management.Automation.PSToken[]]$tokens = [PSParser]::Tokenize( $script, [ref]$parserrors ) [Array]::Reverse($tokens) $function = $false ForEach($token in $tokens) { if($prev -and $token.Content -eq "# SIG # Begin signature block") { $script = $script.SubString(0, $token.Start ) } if($prev -and $token.Type -eq "Keyword" -and $token.Content -ieq "function" -and $prev.Content -ieq $FunctionName ) { $script = $script.Insert( $prev.Start, "global:" ) $function = $true Write-Verbose "Globalized: $($script[(($prev.Start+7)..($prev.Start + 7 +$prev.Content.Length))] -join '')" } $prev = $token } if(!$function) { $script = "function global:$Functionname { $script }" } if($Module) { $script = Invoke-Expression "{ $Script }" Write-Verbose "Importing Function into $($Module) module." &$Module $Script | Out-Null $command = Get-Command $FunctionName -Type Function Write-Verbose "Loaded Module Function: $($command | ft CommandType, Name, ModuleName, Visibility|Out-String)" } else { Write-Verbose "Importing Function without module." Invoke-Expression $script | out-null $command = Get-Command $FunctionName -Type Function Write-Verbose "Loaded Local Function: $($command | ft CommandType, Name, ModuleName, Visibility|Out-String)" } if(!$command) { throw "Something went wrong autoloading the $($FunctionName) function. Function definition doesn't exist in script: $($externalScript.Path)" } if($CommandName -eq $FunctionName) { Remove-Item Alias::$($CommandName) Write-Verbose "Defined the function $($FunctionName) and removed the alias $($CommandName)" } else { Set-Alias $CommandName $FunctionName -Scope Global Write-Verbose "Defined the function $($FunctionName) and redefined the alias $($CommandName)" } foreach( $pkv in $command.Parameters.GetEnumerator() ){ $parameter = $pkv.Value if( $parameter.Aliases -match "vb|db|ea|wa|ev|wv|ov|ob" ) { continue } $param = new-object System.Management.Automation.RuntimeDefinedParameter( $parameter.Name, $parameter.ParameterType, $parameter.Attributes) $paramdictionary.Add($pkv.Key, $param) } return $paramdictionary } function New-Autoload { [CmdletBinding()] param( [Parameter(Position=0,Mandatory=$True,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [string[]]$Name , [Parameter(Position=1,Mandatory=$False,ValueFromPipelineByPropertyName=$true)] [Alias("BaseName")] $Alias = $Name , [Parameter(Position=2,Mandatory=$False,ValueFromPipelineByPropertyName=$true)] $Function = $Alias , [Parameter(Position=3,Mandatory=$false)] [String]$Module , [Parameter(Mandatory=$false)] [String]$Scope = '2' ) begin { $xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators") if(!$xlr8r::Get["PSParser"]) { $xlr8r::Add( "PSParser", "System.Management.Automation.PSParser, System.Management.Automation, Version=1.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" ) } } process { for($i=0;$i -lt $Name.Count;$i++){ if($Alias -is [Scriptblock]) { $a = $Name[$i] | &$Alias } elseif($Alias -is [Array]) { $a = $Alias[$i] } else { $a = $Alias } if($Function -is [Scriptblock]) { $f = $Name[$i] | &$Function } elseif($Function -is [Array]) { $f = $Function[$i] } else { $f = $Function } Write-Verbose "Set-Alias $Module\\$a Invoke-Autoloaded -Scope $Scope" Set-Alias $a Invoke-Autoloaded -Scope $Scope $Script:AutoloadHash[$a] = $Name[$i],$Module,$f Write-Verbose "`$AutoloadHash[$a] = $($Script:AutoloadHash[$a])" } } } Set-Alias Autoload New-Autoload $Script:AutoloadHash = @{} Export-ModuleMember -Function New-Autoload, Invoke-Autoloaded, Get-AutoloadHelp -Alias * # SIG # Begin signature block # MIIIDQYJKoZIhvcNAQcCoIIH/jCCB/oCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUssOSqKkXdzRkKCA3J7jqfwad # YC+gggUrMIIFJzCCBA+gAwIBAgIQKQm90jYWUDdv7EgFkuELajANBgkqhkiG9w0B # AQUFADCBlTELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0 # IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYD # VQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xHTAbBgNVBAMTFFVUTi1VU0VS # Rmlyc3QtT2JqZWN0MB4XDTEwMDUxNDAwMDAwMFoXDTExMDUxNDIzNTk1OVowgZUx # CzAJBgNVBAYTAlVTMQ4wDAYDVQQRDAUwNjg1MDEUMBIGA1UECAwLQ29ubmVjdGlj # dXQxEDAOBgNVBAcMB05vcndhbGsxFjAUBgNVBAkMDTQ1IEdsb3ZlciBBdmUxGjAY # BgNVBAoMEVhlcm94IENvcnBvcmF0aW9uMRowGAYDVQQDDBFYZXJveCBDb3Jwb3Jh # dGlvbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMfUdxwiuWDb8zId # KuMg/jw0HndEcIsP5Mebw56t3+Rb5g4QGMBoa8a/N8EKbj3BnBQDJiY5Z2DGjf1P # n27g2shrDaNT1MygjYfLDntYzNKMJk4EjbBOlR5QBXPM0ODJDROg53yHcvVaXSMl # 498SBhXVSzPmgprBJ8FDL00o1IIAAhYUN3vNCKPBXsPETsKtnezfzBg7lOjzmljC # mEOoBGT1g2NrYTq3XqNo8UbbDR8KYq5G101Vl0jZEnLGdQFyh8EWpeEeksv7V+YD # /i/iXMSG8HiHY7vl+x8mtBCf0MYxd8u1IWif0kGgkaJeTCVwh1isMrjiUnpWX2NX # +3PeTmsCAwEAAaOCAW8wggFrMB8GA1UdIwQYMBaAFNrtZHQUnBQ8q92Zqb1bKE2L # PMnYMB0GA1UdDgQWBBTK0OAaUIi5wvnE8JonXlTXKWENvTAOBgNVHQ8BAf8EBAMC # B4AwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhC # AQEEBAMCBBAwRgYDVR0gBD8wPTA7BgwrBgEEAbIxAQIBAwIwKzApBggrBgEFBQcC # ARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwQgYDVR0fBDswOTA3oDWg # M4YxaHR0cDovL2NybC51c2VydHJ1c3QuY29tL1VUTi1VU0VSRmlyc3QtT2JqZWN0 # LmNybDA0BggrBgEFBQcBAQQoMCYwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNv # bW9kb2NhLmNvbTAhBgNVHREEGjAYgRZKb2VsLkJlbm5ldHRAWGVyb3guY29tMA0G # CSqGSIb3DQEBBQUAA4IBAQAEss8yuj+rZvx2UFAgkz/DueB8gwqUTzFbw2prxqee # zdCEbnrsGQMNdPMJ6v9g36MRdvAOXqAYnf1RdjNp5L4NlUvEZkcvQUTF90Gh7OA4 # rC4+BjH8BA++qTfg8fgNx0T+MnQuWrMcoLR5ttJaWOGpcppcptdWwMNJ0X6R2WY7 # bBPwa/CdV0CIGRRjtASbGQEadlWoc1wOfR+d3rENDg5FPTAIdeRVIeA6a1ZYDCYb # 32UxoNGArb70TCpV/mTWeJhZmrPFoJvT+Lx8ttp1bH2/nq6BDAIvu0VGgKGxN4bA # T3WE6MuMS2fTc1F8PCGO3DAeA9Onks3Ufuy16RhHqeNcMYICTDCCAkgCAQEwgaow # gZUxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtl # IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMY # aHR0cDovL3d3dy51c2VydHJ1c3QuY29tMR0wGwYDVQQDExRVVE4tVVNFUkZpcnN0 # LU9iamVjdAIQKQm90jYWUDdv7EgFkuELajAJBgUrDgMCGgUAoHgwGAYKKwYBBAGC # NwIBDDEKMAigAoAAoQKAADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor # BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQUoLiD3TXY # htHM+1GkrG8rScPT4vEwDQYJKoZIhvcNAQEBBQAEggEAMLJBsTm5V6/9jyX1RrTz # TgDFLvTTriT0ma6/2/nEEih4tjEDLM/4DO3HQR1f2r2DpuNwYeoKVLYCiohPm993 # VOqwzmxXgNBi3KC8hJ9/rq0prVCnlcQ9M5OveuAJITcR8KWxQpR9MRiYsvmjh3gv # GwEuoPeAywdecbQFUNK1v0ZPl/U8DA0ekAXRHrmD1bvUK+Osa9tnXvYYMZ2QsPmJ # XnetDsRFjEz968O30Ufrd5IlrGfvuUww5MtQPzSR9jW5RWSJa137ExNn1MifC6if # kJMBhBBafbJmiSJARB3fIff8NVl0dlvOi2jHZ8zxQcpumzVtYBf4h5mvTnlB8Uef # NA== # SIG # End signature block
combined_dataset/train/non-malicious/3583.ps1
3583.ps1
function Test-CreateAndGetService { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName Assert-AreEqual 1 $all.Count $all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name Assert-AreEqual $service.Name $all[0].Name Assert-AreEqual $rg.Location $all[0].Location Assert-AreEqual $service.Service.VirtualSubnetId $all[0].Service.VirtualSubnetId Assert-ThrowsContains { $all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -Name Get-ServiceName;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-StopStartDataMigrationService { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) Stop-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name $all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name Assert-AreEqual 1 $all.Count Assert-AreEqual "Stopped" $all[0].Service.ProvisioningState Start-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name $all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name Assert-AreEqual 1 $all.Count Assert-AreEqual "Succeeded" $all[0].Service.ProvisioningState } finally { Remove-ResourceGroupForTest $rg } } function Test-CreateAndGetProjectSqlSqlDb { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $all = Get-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name Write-Host $all Assert-AreEqual $all.Count 1 $all = Get-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name Assert-AreEqual $project.Name $all[0].Name Assert-AreEqual SQL $all[0].Project.SourcePlatform Assert-AreEqual SQLDB $all[0].Project.TargetPlatform Assert-ThrowsContains { $all = Get-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName Get-ProjectName;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-RemoveService { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) Remove-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -Force Assert-ThrowsContains { $all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-RemoveProject { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service Remove-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -Force Assert-ThrowsContains { $all = Get-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ConnectToSourceSqlServer { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $connectionInfo = New-SourceSqlConnectionInfo $userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME") $password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $cred = Get-Creds $userName $password $task = New-AzDataMigrationTask -TaskType ConnectToSourceSqlServer -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -SourceCred $cred $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ConnectToTargetSqlDb { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $connectionInfo = New-TargetSqlConnectionInfo $userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_USERNAME") $password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD") $cred = Get-Creds $userName $password $task = New-AzDataMigrationTask -TaskType ConnectToTargetSqlDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -TargetConnection $connectioninfo -TargetCred $cred $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-GetUserTableTask { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $connectionInfo = New-SourceSqlConnectionInfo $userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME") $password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $cred = Get-Creds $userName $password $selectedDbs = @("JasmineTest") $task = New-AzDataMigrationTask -TaskType GetUserTablesSql -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -SourceCred $cred -SelectedDatabase $selectedDbs $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-MigrateSqlSqlDB { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME") $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlConnectionInfo $targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_USERNAME") $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $tableMap = New-Object 'system.collections.generic.dictionary[string,string]' $tableMap.Add("dbo.TestTable1", "dbo.TestTable1") $tableMap.Add("dbo.TestTable2","dbo.TestTable2") $sourceDbName = "MigrateOneTime" $targetDbName = "JasmineTest" $selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDb -Name $sourceDbName -TargetDatabaseName $targetDbName -TableMap $tableMap Assert-AreEqual $sourceDbName $selectedDbs[0].Name Assert-AreEqual $targetDbName $selectedDbs[0].TargetDatabaseName Assert-AreEqual 2 $selectedDbs[0].TableMap.Count Assert-AreEqual true $selectedDbs[0].TableMap.ContainsKey("dbo.TestTable1") Assert-AreEqual "dbo.TestTable1" $selectedDbs[0].TableMap["dbo.TestTable1"] $migTask = New-AzDmsTask -TaskType MigrateSqlServerSqlDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $sourceConnectionInfo -SourceCred $sourceCred -TargetConnection $targetConnectionInfo -TargetCred $targetCred -SelectedDatabase $selectedDbs $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count Assert-AreEqual $sourceDbName $task.ProjectTask.Properties.Input.SelectedDatabases[0].Name Assert-AreEqual $targetDbName $task.ProjectTask.Properties.Input.SelectedDatabases[0].TargetDatabaseName while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ConnectToTargetSqlDbMi { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDbMi $rg $service $taskName = Get-TaskName $connectionInfo = New-TargetSqlMiConnectionInfo $userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME") $password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD") $cred = Get-Creds $userName $password $task = New-AzDataMigrationTask -TaskType ConnectToTargetSqlDbMi -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -TargetConnection $connectioninfo -TargetCred $cred $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-MigrateSqlSqlDBMi { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDbMi $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME") $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlMiConnectionInfo $targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME") $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $blobSasUri = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("BLOB_SAS_URI") $fileSharePath = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PATH") $fileShareUsername = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_USERNAME") $fileSharePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PASSWORD") $fileShareCred = Get-Creds $fileShareUsername $fileSharePassword $backupFileShare = New-AzDmsFileShare -Path $fileSharePath -Credential $fileShareCred $sourceDbName = "TestMI" $targetDbName = "TestMI6" $backupMode = "CreateBackup" $selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDbMi -Name $sourceDbName -TargetDatabaseName $targetDbName -BackupFileShare $backupFileShare Assert-AreEqual $sourceDbName $selectedDbs[0].Name Assert-AreEqual $targetDbName $selectedDbs[0].RestoreDatabaseName $migTask = New-AzDataMigrationTask -TaskType MigrateSqlServerSqlDbMi ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -TargetConnection $targetConnectionInfo ` -TargetCred $targetCred ` -SourceConnection $sourceConnectionInfo ` -SourceCred $sourceCred ` -BackupBlobSasUri $blobSasUri ` -BackupFileShare $backupFileShare ` -SelectedDatabase $selectedDbs ` -BackupMode $backupMode $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual $sourceDbName $task.ProjectTask.Properties.Input.SelectedDatabases[0].Name Assert-AreEqual $targetDbName $task.ProjectTask.Properties.Input.SelectedDatabases[0].RestoreDatabaseName Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ValidateMigrationInputSqlSqlDbMi { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDbMi $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME") $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlMiConnectionInfo $targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME") $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $blobSasUri = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("BLOB_SAS_URI") $fileSharePath = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PATH") $fileShareUsername = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_USERNAME") $fileSharePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PASSWORD") $fileShareCred = Get-Creds $fileShareUsername $fileSharePassword $backupFileShare = New-AzDmsFileShare -Path $fileSharePath -Credential $fileShareCred $sourceDbName = "TestMI" $targetDbName = "TestTarget" $backupMode = "CreateBackup" $selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDbMi -Name $sourceDbName -TargetDatabaseName $targetDbName -BackupFileShare $backupFileShare $migTask = New-AzDataMigrationTask -TaskType ValidateSqlServerSqlDbMi ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -SourceConnection $sourceConnectionInfo ` -SourceCred $sourceCred ` -TargetConnection $targetConnectionInfo ` -TargetCred $targetCred ` -BackupBlobSasUri $blobSasUri ` -BackupFileShare $backupFileShare ` -SelectedDatabase $selectedDbs ` -BackupMode $backupMode $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ConnectToSourceSqlServerSync { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $connectionInfo = New-SourceSqlConnectionInfo $userName = "testuser" $password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $cred = Get-Creds $userName $password $task = New-AzDataMigrationTask -TaskType ConnectToSourceSqlServerSync -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -SourceCred $cred $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ConnectToTargetSqlDbSync { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = "testuser" $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlConnectionInfo $targetUserName = "testuser" $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $task = New-AzDataMigrationTask -TaskType ConnectToTargetSqlSync -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $sourceConnectionInfo -SourceCred $sourceCred -TargetConnection $targetConnectionInfo -TargetCred $targetCred $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-GetUserTableSyncTask { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = "testuser" $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlConnectionInfo $targetUserName = "testuser" $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $selectedSourceDb = @("MigrateOneTime") $selectedTargetDb = @("JasmineTest") $task = New-AzDataMigrationTask -TaskType GetUserTablesSqlSync ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -SourceConnection $sourceConnectionInfo ` -SourceCred $sourceCred ` -TargetConnection $targetConnectionInfo ` -TargetCred $targetCred ` -SelectedSourceDatabases $selectedSourceDb ` -SelectedTargetDatabases $selectedTargetDb $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ValidateMigrationInputSqlSqlDbSync { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = "testuser" $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlConnectionInfo $targetUserName = "testuser" $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $tableMap = New-Object 'system.collections.generic.dictionary[string,string]' $tableMap.Add("dbo.TestTable1", "dbo.TestTable1") $tableMap.Add("dbo.TestTable2","dbo.TestTable2") $sourceDb = "MigrateOneTime" $targetDb = "JasmineTest" $selectedDbs = New-AzDmsSyncSelectedDB -TargetDatabaseName $targetDb ` -SchemaName dbo ` -TableMap $tableMap ` -Name $sourceDb $migTask = New-AzDataMigrationTask -TaskType ValidateSqlServerSqlDbSync ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -SourceConnection $sourceConnectionInfo ` -SourceCred $sourceCred ` -TargetConnection $targetConnectionInfo ` -TargetCred $targetCred ` -SelectedDatabase $selectedDbs $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-MigrateSqlSqlDBSync { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDb $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = "testuser" $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlConnectionInfo $targetUserName = "testuser" $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $tableMap = New-Object 'system.collections.hashtable' $tableMap.Add("dbo.TestTable1", "dbo.TestTable1") $tableMap.Add("dbo.TestTable2","dbo.TestTable2") $sourceDb = "MigrateOneTime" $targetDb = "JasmineTest" $selectedDbs = New-AzDmsSyncSelectedDB -TargetDatabaseName $targetDb ` -SchemaName dbo ` -TableMap $tableMap ` -SourceDatabaseName $sourceDb $migTask = New-AzDmsTask -TaskType MigrateSqlServerSqlDbSync ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -SourceConnection $sourceConnectionInfo ` -SourceCred $sourceCred ` -TargetConnection $targetConnectionInfo ` -TargetCred $targetCred ` -SelectedDatabase $selectedDbs $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { Foreach($output in $task.ProjectTask.Properties.Output) { if ($output.Id -clike 'db|*') { Write-Host ($output | Format-List | Out-String) if ($output.MigrationState -eq "READY_TO_COMPLETE") { $command = Invoke-AzDmsCommand -CommandType CompleteSqlDBSync ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -DatabaseName $output.DatabaseName } } } SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ConnectToSourceMongoDb { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectMongoDbMongoDb $rg $service $taskName = Get-TaskName $connectionInfo = New-SourceMongoDbConnectionInfo $task = New-AzDataMigrationTask -TaskType ConnectToSourceMongoDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -Wait Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ConnectToTargetCosmosDb { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectMongoDbMongoDb $rg $service $taskName = Get-TaskName $connectionInfo = New-TargetMongoDbConnectionInfo $task = New-AzDataMigrationTask -TaskType ConnectToSourceMongoDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -Wait Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-MigrateMongoDb { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectMongoDbMongoDb $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceMongoDbConnectionInfo $targetConnectionInfo = New-TargetMongoDbConnectionInfo $testColSettingA = New-AzDataMigrationMongoDbCollectionSetting -Name large -RU 1000 -CanDelete -ShardKey "_id" $testColSettingB = New-AzDataMigrationMongoDbCollectionSetting -Name many -RU 1000 -CanDelete -ShardKey "_id" $testDbSetting = New-AzDataMigrationMongoDbDatabaseSetting -Name test -CollectionSetting @($testColSettingA, $testColSettingB) $validationTask = New-AzDmsTask -TaskType ValidateMongoDbMigration -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $sourceConnectionInfo -TargetConnection $targetConnectionInfo -SelectedDatabase @($testDbSetting) -Wait $taskName = Get-TaskName $migTask = New-AzDmsTask -TaskType MigrateMongoDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $sourceConnectionInfo -TargetConnection $targetConnectionInfo -SelectedDatabase @($testDbSetting) -MigrationValidation $validationTask -Replication Disabled $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand if($task.ProjectTask.Properties.State -eq "Running") { $res = Invoke-AzDataMigrationCommand -CommandType CancelMongoDB -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -ObjectName "test.many" Assert-AreEqual "Accepted" $res.State } } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State } finally { Remove-ResourceGroupForTest $rg } } function Test-ConnectToTargetSqlDbMiSync { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDbMi $rg $service $taskName = Get-TaskName $connectionInfo = New-TargetSqlMiSyncConnectionInfo $userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME") $password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD") $cred = Get-Creds $userName $password $app = New-AzureActiveDirectoryApp $task = New-AzDataMigrationTask -TaskType ConnectToTargetSqlDbMiSync -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -TargetConnection $connectioninfo -TargetCred $cred -AzureActiveDirectoryApp $app $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-ValidateMigrationInputSqlSqlDbMiSync { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDbMi $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME") $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlMiSyncConnectionInfo $targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME") $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $app = New-AzureActiveDirectoryApp $fileSharePath = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PATH") $fileShareUsername = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_USERNAME") $fileSharePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PASSWORD") $fileShareCred = Get-Creds $fileShareUsername $fileSharePassword $backupFileShare = New-AzDmsFileShare -Path $fileSharePath -Credential $fileShareCred $storageResourceId = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("STORAGE_RESOURCE_ID") $sourceDbName = "AdventureWorks" $targetDbName = getDmsAssetName AdventureWorks $selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDbMi -Name $sourceDbName -TargetDatabaseName $targetDbName -BackupFileShare $backupFileShare $migTask = New-AzDataMigrationTask -TaskType ValidateSqlServerSqlDbMiSync ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -SourceConnection $sourceConnectionInfo ` -SourceCred $sourceCred ` -TargetConnection $targetConnectionInfo ` -TargetCred $targetCred ` -BackupFileShare $backupFileShare ` -SelectedDatabase $selectedDbs ` -AzureActiveDirectoryApp $app ` -StorageResourceId $storageResourceId $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } } function Test-MigrateSqlSqlDbMiSync { $rg = Create-ResourceGroupForTest try { $service = Create-DataMigrationService($rg) $project = Create-ProjectSqlSqlDbMi $rg $service $taskName = Get-TaskName $sourceConnectionInfo = New-SourceSqlConnectionInfo $sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME") $sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD") $sourceCred = Get-Creds $sourceUserName $sourcePassword $targetConnectionInfo = New-TargetSqlMiSyncConnectionInfo $targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME") $targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD") $targetCred = Get-Creds $targetUserName $targetPassword $app = New-AzureActiveDirectoryApp $fileSharePath = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PATH") $fileShareUsername = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_USERNAME") $fileSharePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PASSWORD") $fileShareCred = Get-Creds $fileShareUsername $fileSharePassword $backupFileShare = New-AzDmsFileShare -Path $fileSharePath -Credential $fileShareCred $storageResourceId = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("STORAGE_RESOURCE_ID") $sourceDbName = "AdventureWorks" $dbId = "db|"+$sourceDbName $targetDbName = getDmsAssetName AdventureWorks $selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDbMi -Name $sourceDbName -TargetDatabaseName $targetDbName -BackupFileShare $backupFileShare $migTask = New-AzDataMigrationTask -TaskType MigrateSqlServerSqlDbMiSync ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -SourceConnection $sourceConnectionInfo ` -SourceCred $sourceCred ` -TargetConnection $targetConnectionInfo ` -TargetCred $targetCred ` -BackupFileShare $backupFileShare ` -SelectedDatabase $selectedDbs ` -AzureActiveDirectoryApp $app ` -StorageResourceId $storageResourceId $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand Assert-AreEqual $taskName $task[0].Name Assert-AreEqual 1 $task.Count while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued")) { Foreach($output in $task.ProjectTask.Properties.Output) { if ($output.Id -eq $dbId) { if ($output.MigrationState -eq "LOG_FILES_UPLOADING") { if ($output.FullBackupSetInfo.BackupType -eq "Database") { if($output.FullBackupSetInfo.IsBackupRestored) { $command = Invoke-AzDmsCommand -CommandType CompleteSqlMiSync ` -ResourceGroupName $rg.ResourceGroupName ` -ServiceName $service.Name ` -ProjectName $project.Name ` -TaskName $taskName ` -DatabaseName $output.SourceDatabaseName } } } } } SleepTask 15 $task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand } Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound" } finally { Remove-ResourceGroupForTest $rg } }
combined_dataset/train/non-malicious/Get-RemoteRegistry_3.ps1
Get-RemoteRegistry_3.ps1
#.SYNOPSIS # Query the registry on a remote machine #.NOTE # You have to have access, and the remote registry service has to be running # # Version History: # 3.0 # + updated to PowerShell 2 # + support pipeline parameter for path # 2.1 # + Fixed a pasting bug # + I added the "Properties" parameter so you can select specific redgistry values # ###################################################################################### #.EXAMPLE # (Get-RemoteRegistry ${Env:ComputerName} HKLM:\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\).Subkeys | # Get-RemoteRegistry ${Env:ComputerName} ` # -Path { "HKLM:\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\$_" } ` # -Properties DisplayName, DisplayVersion, Publisher, InstallDate, HelpLink, UninstallString #.EXAMPLE # Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP" # * Returns a list of subkeys (because this key has no properties) #.EXAMPLE # Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v2.0.50727" # * Returns a list of subkeys and all the other "properties" of the key #.EXAMPLE # Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v2.0.50727\\Version" # * Returns JUST the full version of the .Net SP2 as a STRING (to preserve prior behavior) #.EXAMPLE # Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v2.0.50727" Version # * Returns a custom object with the property "Version" = "2.0.50727.3053" (your version) #.EXAMPLE # Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v2.0.50727" Version,SP # * Returns a custom object with "Version" and "SP" (Service Pack) properties # # For fun, get all .Net Framework versions (2.0 and greater) # and return version + service pack with this one command line: # # Get-RemoteRegistry $RemotePC "HKLM:\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP" | # Select -Expand Subkeys | ForEach-Object { # Get-RemoteRegistry $RemotePC "HKLM:\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\$_" Version,SP # } param( [Parameter(Position=0, Mandatory=$true)] [string]$computer = $(Read-Host "Remote Computer Name") , [Parameter(Position=1, ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, Mandatory=$true)] [string]$Path = $(Read-Host "Remote Registry Path (must start with HKLM,HKCU,etc)") , [Parameter(Position=2)] [string[]]$Properties ) process { $root, $last = $Path.Split("\\") $last = $last[-1] $Path = $Path.Substring($root.Length + 1,$Path.Length - ( $last.Length + $root.Length + 2)) $root = $root.TrimEnd(":") #split the path to get a list of subkeys that we will need to access # ClassesRoot, CurrentUser, LocalMachine, Users, PerformanceData, CurrentConfig, DynData switch($root) { "HKCR" { $root = "ClassesRoot"} "HKCU" { $root = "CurrentUser" } "HKLM" { $root = "LocalMachine" } "HKU" { $root = "Users" } "HKPD" { $root = "PerformanceData"} "HKCC" { $root = "CurrentConfig"} "HKDD" { $root = "DynData"} default { return "Path argument is not valid" } } #Access Remote Registry Key using the static OpenRemoteBaseKey method. Write-Verbose "Accessing $root from $computer" $rootkey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($root,$computer) if(-not $rootkey) { Write-Error "Can't open the remote $root registry hive" } Write-Verbose "Opening $Path" $key = $rootkey.OpenSubKey( $Path ) if(-not $key) { Write-Error "Can't open $($root + '\\' + $Path) on $computer" } $subkey = $key.OpenSubKey( $last ) $output = new-object object if($subkey -and $Properties -and $Properties.Count) { foreach($property in $Properties) { Add-Member -InputObject $output -Type NoteProperty -Name $property -Value $subkey.GetValue($property) } Write-Output $output } elseif($subkey) { Add-Member -InputObject $output -Type NoteProperty -Name "Subkeys" -Value @($subkey.GetSubKeyNames()) foreach($property in $subkey.GetValueNames()) { Add-Member -InputObject $output -Type NoteProperty -Name $property -Value $subkey.GetValue($property) } Write-Output $output } else { $key.GetValue($last) } }
combined_dataset/train/non-malicious/sample_50_28.ps1
sample_50_28.ps1
# # Module manifest for module 'OCI.PSModules.Waas' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waas.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e0ab649a-b33b-4925-a05c-7520554bdad9' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waas Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waas.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWaasAccessRulesList', 'Get-OCIWaasAddressList', 'Get-OCIWaasAddressListsList', 'Get-OCIWaasCachingRulesList', 'Get-OCIWaasCaptchasList', 'Get-OCIWaasCertificate', 'Get-OCIWaasCertificatesList', 'Get-OCIWaasCustomProtectionRule', 'Get-OCIWaasCustomProtectionRulesList', 'Get-OCIWaasDeviceFingerprintChallenge', 'Get-OCIWaasEdgeSubnetsList', 'Get-OCIWaasGoodBotsList', 'Get-OCIWaasHttpRedirect', 'Get-OCIWaasHttpRedirectsList', 'Get-OCIWaasHumanInteractionChallenge', 'Get-OCIWaasJsChallenge', 'Get-OCIWaasPoliciesList', 'Get-OCIWaasPolicy', 'Get-OCIWaasPolicyConfig', 'Get-OCIWaasPolicyCustomProtectionRulesList', 'Get-OCIWaasProtectionRule', 'Get-OCIWaasProtectionRulesList', 'Get-OCIWaasProtectionSettings', 'Get-OCIWaasRecommendationsList', 'Get-OCIWaasThreatFeedsList', 'Get-OCIWaasWafAddressRateLimiting', 'Get-OCIWaasWafBlockedRequestsList', 'Get-OCIWaasWafConfig', 'Get-OCIWaasWafLogsList', 'Get-OCIWaasWafRequestsList', 'Get-OCIWaasWafTrafficList', 'Get-OCIWaasWhitelistsList', 'Get-OCIWaasWorkRequest', 'Get-OCIWaasWorkRequestsList', 'Invoke-OCIWaasPurgeCache', 'Move-OCIWaasAddressListCompartment', 'Move-OCIWaasCertificateCompartment', 'Move-OCIWaasCustomProtectionRuleCompartment', 'Move-OCIWaasHttpRedirectCompartment', 'Move-OCIWaasPolicyCompartment', 'New-OCIWaasAddressList', 'New-OCIWaasCertificate', 'New-OCIWaasCustomProtectionRule', 'New-OCIWaasHttpRedirect', 'New-OCIWaasPolicy', 'Receive-OCIWaasRecommendations', 'Remove-OCIWaasAddressList', 'Remove-OCIWaasCertificate', 'Remove-OCIWaasCustomProtectionRule', 'Remove-OCIWaasHttpRedirect', 'Remove-OCIWaasPolicy', 'Stop-OCIWaasWorkRequest', 'Update-OCIWaasAccessRules', 'Update-OCIWaasAddressList', 'Update-OCIWaasCachingRules', 'Update-OCIWaasCaptchas', 'Update-OCIWaasCertificate', 'Update-OCIWaasCustomProtectionRule', 'Update-OCIWaasDeviceFingerprintChallenge', 'Update-OCIWaasGoodBots', 'Update-OCIWaasHttpRedirect', 'Update-OCIWaasHumanInteractionChallenge', 'Update-OCIWaasJsChallenge', 'Update-OCIWaasPolicy', 'Update-OCIWaasPolicyConfig', 'Update-OCIWaasPolicyCustomProtectionRules', 'Update-OCIWaasProtectionRules', 'Update-OCIWaasProtectionSettings', 'Update-OCIWaasThreatFeeds', 'Update-OCIWaasWafAddressRateLimiting', 'Update-OCIWaasWafConfig', 'Update-OCIWaasWhitelists' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waas' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_26_63.ps1
sample_26_63.ps1
# # Module manifest for module 'OCI.PSModules' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. # RootModule = '' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '5ee167f1-0abc-4d85-b9b3-6d354fcaaa35' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'Oracle Cloud Infrastructure (OCI) PowerShell Modules - Cmdlets to manage resources in OCI. For more information, please visit: https://docs.oracle.com/en-us/iaas/Content/API/SDKDocs/powershell.htm' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Accessgovernancecp'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Adm'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Aianomalydetection'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Aidocument'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Ailanguage'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Aispeech'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Aivision'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Analytics'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Announcementsservice'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Apigateway'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmconfig'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmcontrolplane'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmsynthetics'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmtraces'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Applicationmigration'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Appmgmtcontrol'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Artifacts'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Audit'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Autoscaling'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Bastion'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Bds'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Blockchain'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Budget'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Capacitymanagement'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Certificates'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Certificatesmanagement'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Cims'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudbridge'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudguard'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudmigrations'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Computecloudatcustomer'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Computeinstanceagent'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Containerengine'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Containerinstances'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Core'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Dashboardservice'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Database'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasemanagement'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasemigration'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasetools'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Datacatalog'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Dataflow'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Dataintegration'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Datalabelingservice'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Datalabelingservicedataplane'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Datasafe'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Datascience'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Desktops'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Devops'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Disasterrecovery'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Dns'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Dts'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Email'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Emwarehouse'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Events'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Filestorage'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Fleetsoftwareupdate'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Functions'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Fusionapps'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Generativeai'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Generativeaiinference'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Genericartifactscontent'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Globallydistributeddatabase'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Goldengate'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Governancerulescontrolplane'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Healthchecks'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Identity'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Identitydataplane'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Identitydomains'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Integration'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Jms'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Jmsjavadownloads'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Keymanagement'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Licensemanager'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Limits'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Loadbalancer'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Lockbox'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Loganalytics'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Logging'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Loggingingestion'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Loggingsearch'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Managementagent'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Managementdashboard'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Marketplace'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Marketplacepublisher'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Mediaservices'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Monitoring'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Mysql'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Networkfirewall'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Networkloadbalancer'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Nosql'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Objectstorage'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Oce'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Ocicontrolcenter'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Ocvp'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Oda'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Onesubscription'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Ons'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Opa'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Opensearch'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Operatoraccesscontrol'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Opsi'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Optimizer'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Osmanagement'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Osmanagementhub'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Ospgateway'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubbillingschedule'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Osuborganizationsubscription'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubsubscription'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubusage'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Psql'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Queue'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Recovery'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Redis'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Resourcemanager'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Resourcesearch'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Rover'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Sch'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Secrets'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicecatalog'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicemanagerproxy'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicemesh'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Stackmonitoring'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Streaming'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Tenantmanagercontrolplane'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Threatintelligence'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Usage'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Usageapi'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Vault'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Vbsinst'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Visualbuilder'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Vnmonitoring'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Vulnerabilityscanning'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Waa'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Waas'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Waf'; RequiredVersion = '79.0.0'; }, @{ModuleName = 'OCI.PSModules.Workrequests'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1324.ps1
1324.ps1
function Disable-CFirewallStatefulFtp { [CmdletBinding(SupportsShouldProcess=$true)] param( ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not (Assert-CFirewallConfigurable) ) { return } Invoke-ConsoleCommand -Target 'firewall' ` -Action 'disabling stateful FTP' ` -ScriptBlock { netsh advfirewall set global StatefulFtp disable } }
combined_dataset/train/non-malicious/2141.ps1
2141.ps1
set-strictmode -v 2 Describe 'for statement parsing' -Tags "CI" { ShouldBeParseError 'for' MissingOpenParenthesisAfterKeyword 4 -CheckColumnNumber ShouldBeParseError 'for(' MissingEndParenthesisAfterStatement 5 -CheckColumnNumber ShouldBeParseError 'for(;' MissingEndParenthesisAfterStatement 6 -CheckColumnNumber ShouldBeParseError 'for(;;' MissingEndParenthesisAfterStatement 7 -CheckColumnNumber ShouldBeParseError 'for($a' MissingEndParenthesisAfterStatement 7 -CheckColumnNumber ShouldBeParseError 'for($a;' MissingEndParenthesisAfterStatement 8 -CheckColumnNumber ShouldBeParseError 'for($a;$b' MissingEndParenthesisAfterStatement 10 -CheckColumnNumber ShouldBeParseError 'for($a;$b;' MissingEndParenthesisAfterStatement 11 -CheckColumnNumber ShouldBeParseError 'for($a;$b;$c' MissingEndParenthesisAfterStatement 13 -CheckColumnNumber ShouldBeParseError 'for($a;$b;$c)' MissingLoopStatement 14 -CheckColumnNumber ShouldBeParseError ':lab for' MissingOpenParenthesisAfterKeyword 9 -CheckColumnNumber ShouldBeParseError ':lab for(' MissingEndParenthesisAfterStatement 9 ShouldBeParseError ':lab for(;' MissingEndParenthesisAfterStatement 11 -CheckColumnNumber ShouldBeParseError ':lab for(;;' MissingEndParenthesisAfterStatement 12 -CheckColumnNumber ShouldBeParseError ':lab for($a' MissingEndParenthesisAfterStatement 12 -CheckColumnNumber ShouldBeParseError ':lab for($a;' MissingEndParenthesisAfterStatement 12 ShouldBeParseError ':lab for($a;$b' MissingEndParenthesisAfterStatement 14 ShouldBeParseError ':lab for($a;$b;' MissingEndParenthesisAfterStatement 15 ShouldBeParseError ':lab for($a;$b;$c' MissingEndParenthesisAfterStatement 17 ShouldBeParseError ':lab for($a;$b;$c)' MissingLoopStatement 18 Test-ErrorStmt 'for z' 'for' Test-ErrorStmt 'for {}' 'for' Test-ErrorStmt 'for ()' 'for ()' Test-ErrorStmt 'for(' 'for(' Test-ErrorStmt 'for(;' 'for(;' Test-ErrorStmt 'for(;;' 'for(;;' Test-ErrorStmt 'for($a' 'for($a' '$a' '$a' '$a' Test-ErrorStmt 'for($a;$b' 'for($a;$b' '$a' '$a' '$a' '$b' '$b' '$b' Test-ErrorStmt 'for($a;$b;$c' 'for($a;$b;$c' '$a' '$a' '$a' '$b' '$b' '$b' '$c' '$c' '$c' Test-ErrorStmt 'for($a;$b;$c)' 'for($a;$b;$c)' '$a' '$a' '$a' '$b' '$b' '$b' '$c' '$c' '$c' Test-ErrorStmt 'for()zzzz' 'for()' Test-ErrorStmt ':lab for z' ':lab for' Test-ErrorStmt ':lab for {}' ':lab for' Test-ErrorStmt ':lab for ()' ':lab for ()' Test-ErrorStmt ':lab for(' ':lab for(' Test-ErrorStmt ':lab for(;' ':lab for(;' Test-ErrorStmt ':lab for(;;' ':lab for(;;' Test-ErrorStmt ':lab for($a' ':lab for($a' '$a' '$a' '$a' Test-ErrorStmt ':lab for($a;$b' ':lab for($a;$b' '$a' '$a' '$a' '$b' '$b' '$b' Test-ErrorStmt ':lab for($a;$b;$c' ':lab for($a;$b;$c' '$a' '$a' '$a' '$b' '$b' '$b' '$c' '$c' '$c' Test-ErrorStmt ':lab for($a;$b;$c)' ':lab for($a;$b;$c)' '$a' '$a' '$a' '$b' '$b' '$b' '$c' '$c' '$c' Test-ErrorStmt ':lab for()zzzz' ':lab for()' } Describe 'foreach statement parsing' -Tags "CI" { ShouldBeParseError 'foreach' MissingOpenParenthesisAfterKeyword 7 ShouldBeParseError 'foreach (' MissingVariableNameAfterForeach 9 ShouldBeParseError 'foreach ($a' MissingInInForeach 11 ShouldBeParseError 'foreach ($a into' MissingInInForeach 11 ShouldBeParseError 'foreach ($a in' MissingForeachExpression 14 ShouldBeParseError 'foreach ($a in $x' MissingEndParenthesisAfterForeach 17 ShouldBeParseError 'foreach ($a in $x)' MissingForeachStatement 18 ShouldBeParseError ':lab foreach' MissingOpenParenthesisAfterKeyword 12 ShouldBeParseError ':lab foreach (' MissingVariableNameAfterForeach 14 ShouldBeParseError ':lab foreach ($a' MissingInInForeach 16 ShouldBeParseError ':lab foreach ($a into' MissingInInForeach 17 -CheckColumnNumber ShouldBeParseError ':lab foreach ($a in' MissingForeachExpression 20 -CheckColumnNumber ShouldBeParseError ':lab foreach ($a in $x' MissingEndParenthesisAfterForeach 23 -CheckColumnNumber ShouldBeParseError ':lab foreach ($a in $x)' MissingForeachStatement 24 -CheckColumnNumber Test-ErrorStmt 'foreach' 'foreach' Test-ErrorStmt 'foreach z' 'foreach' Test-ErrorStmt 'foreach (' 'foreach (' Test-ErrorStmt 'foreach ($a' 'foreach ($a' '$a' Test-ErrorStmt 'foreach ($a zz' 'foreach ($a' '$a' Test-ErrorStmt 'foreach ($a Test-ErrorStmt 'foreach ($a $zz' 'foreach ($a' '$a' Test-ErrorStmt 'foreach ($a in' 'foreach ($a in' '$a' Test-ErrorStmt 'foreach ($a in $b' 'foreach ($a in $b' '$a' '$b' '$b' '$b' Test-ErrorStmt 'foreach ($a in $b )' 'foreach ($a in $b )' '$a' '$b' '$b' '$b' Test-ErrorStmt ':lab foreach' ':lab foreach' Test-ErrorStmt ':lab foreach z' ':lab foreach' Test-ErrorStmt ':lab foreach (' ':lab foreach (' Test-ErrorStmt ':lab foreach ($a' ':lab foreach ($a' '$a' Test-ErrorStmt ':lab foreach ($a zz' ':lab foreach ($a' '$a' Test-ErrorStmt ':lab foreach ($a Test-ErrorStmt ':lab foreach ($a $zz' ':lab foreach ($a' '$a' Test-ErrorStmt ':lab foreach ($a in' ':lab foreach ($a in' '$a' Test-ErrorStmt ':lab foreach ($a in $b' ':lab foreach ($a in $b' '$a' '$b' '$b' '$b' Test-ErrorStmt ':lab foreach ($a in $b )' ':lab foreach ($a in $b )' '$a' '$b' '$b' '$b' } Describe 'do/while statement statement parsing' -Tags "CI" { ShouldBeParseError 'do' MissingLoopStatement 2 ShouldBeParseError 'do {}' MissingWhileOrUntilInDoWhile 5 ShouldBeParseError 'do {} while' MissingOpenParenthesisAfterKeyword 11 ShouldBeParseError 'do {} while (' MissingExpressionAfterKeyword 13 ShouldBeParseError 'do {} while (1' MissingEndParenthesisAfterStatement 14 ShouldBeParseError ':lab do' MissingLoopStatement 8 -CheckColumnNumber ShouldBeParseError ':lab do {}' MissingWhileOrUntilInDoWhile 11 -CheckColumnNumber ShouldBeParseError ':lab do {} while' MissingOpenParenthesisAfterKeyword 17 -CheckColumnNumber ShouldBeParseError ':lab do {} while (' MissingExpressionAfterKeyword 19 -CheckColumnNumber ShouldBeParseError ':lab do {} while (1' MissingEndParenthesisAfterStatement 20 -CheckColumnNumber Test-ErrorStmt 'do' 'do' Test-ErrorStmt 'do {1}' 'do {1}' '{1}' '1' '1' '1' Test-ErrorStmt 'do {1} while' 'do {1} while' '{1}' '1' '1' '1' Test-ErrorStmt 'do {1} while(' 'do {1} while(' '{1}' '1' '1' '1' Test-ErrorStmt 'do {1} while($false' 'do {1} while($false' '{1}' '1' '1' '1' '$false' '$false' '$false' Test-ErrorStmt ':lab do' ':lab do' Test-ErrorStmt ':lab do {1}' ':lab do {1}' '{1}' '1' '1' '1' Test-ErrorStmt ':lab do {1} while' ':lab do {1} while' '{1}' '1' '1' '1' Test-ErrorStmt ':lab do {1} while(' ':lab do {1} while(' '{1}' '1' '1' '1' Test-ErrorStmt ':lab do {1} while($false' ':lab do {1} while($false' '{1}' '1' '1' '1' '$false' '$false' '$false' } Describe 'do/while statement statement parsing' -Tags "CI" { ShouldBeParseError 'do' MissingLoopStatement 3 -CheckColumnNumber ShouldBeParseError 'do {}' MissingWhileOrUntilInDoWhile 6 -CheckColumnNumber ShouldBeParseError 'do {} until' MissingOpenParenthesisAfterKeyword 12 -CheckColumnNumber ShouldBeParseError 'do {} until (' MissingExpressionAfterKeyword 14 -CheckColumnNumber ShouldBeParseError 'do {} until (1' MissingEndParenthesisAfterStatement 15 -CheckColumnNumber ShouldBeParseError ':lab do' MissingLoopStatement 8 -CheckColumnNumber ShouldBeParseError ':lab do {}' MissingWhileOrUntilInDoWhile 10 ShouldBeParseError ':lab do {} until' MissingOpenParenthesisAfterKeyword 16 ShouldBeParseError ':lab do {} until (' MissingExpressionAfterKeyword 18 ShouldBeParseError ':lab do {} until (1' MissingEndParenthesisAfterStatement 19 Test-ErrorStmt 'do' 'do' Test-ErrorStmt 'do {1}' 'do {1}' '{1}' '1' '1' '1' Test-ErrorStmt 'do {1} until' 'do {1} until' '{1}' '1' '1' '1' Test-ErrorStmt 'do {1} until(' 'do {1} until(' '{1}' '1' '1' '1' Test-ErrorStmt 'do {1} until($false' 'do {1} until($false' '{1}' '1' '1' '1' '$false' '$false' '$false' Test-ErrorStmt ':lab do' ':lab do' Test-ErrorStmt ':lab do {1}' ':lab do {1}' '{1}' '1' '1' '1' Test-ErrorStmt ':lab do {1} until' ':lab do {1} until' '{1}' '1' '1' '1' Test-ErrorStmt ':lab do {1} until(' ':lab do {1} until(' '{1}' '1' '1' '1' Test-ErrorStmt ':lab do {1} until($false' ':lab do {1} until($false' '{1}' '1' '1' '1' '$false' '$false' '$false' } Describe 'trap statement parsing' -Tags "CI" { ShouldBeParseError 'trap' MissingTrapStatement 4 ShouldBeParseError 'trap [int]' MissingTrapStatement 11 -CheckColumnNumber Test-ErrorStmt 'trap' 'trap' Test-ErrorStmt 'trap [int]' 'trap [int]' '[int]' } Describe 'named blocks parsing' -Tags "CI" { ShouldBeParseError 'begin' MissingNamedStatementBlock 5 ShouldBeParseError 'process' MissingNamedStatementBlock 7 ShouldBeParseError 'end' MissingNamedStatementBlock 3 ShouldBeParseError 'dynamicparam' MissingNamedStatementBlock 12 ShouldBeParseError 'begin process {}' MissingNamedStatementBlock 6 -CheckColumnNumber ShouldBeParseError 'end process {}' MissingNamedStatementBlock 4 -CheckColumnNumber ShouldBeParseError 'dynamicparam process {}' MissingNamedStatementBlock 13 -CheckColumnNumber ShouldBeParseError 'process begin {}' MissingNamedStatementBlock 8 -CheckColumnNumber ShouldBeParseError 'begin process end' MissingNamedStatementBlock,MissingNamedStatementBlock,MissingNamedStatementBlock 6,14,18 -CheckColumnNumber Test-Ast 'begin' 'begin' 'begin' Test-Ast 'begin end' 'begin end' 'begin' 'end' Test-Ast 'begin end process' 'begin end process' 'begin' 'end' 'process' Test-Ast 'begin {} end' 'begin {} end' 'begin {}' 'end' } Describe 'data statement parsing' -Tags "CI" { ShouldBeParseError 'data' MissingStatementBlockForDataSection 5 -CheckColumnNumber ShouldBeParseError 'data foo' MissingStatementBlockForDataSection 9 -CheckColumnNumber ShouldBeParseError 'data -abc' InvalidParameterForDataSectionStatement 6 -CheckColumnNumber ShouldBeParseError 'data -abc foo {}' InvalidParameterForDataSectionStatement 6 -CheckColumnNumber ShouldBeParseError 'data -abc & {}' InvalidParameterForDataSectionStatement 5 ShouldBeParseError 'data -s & {}' MissingValueForSupportedCommandInDataSectionStatement 7 ShouldBeParseError 'data -s ) {}' MissingValueForSupportedCommandInDataSectionStatement,UnexpectedToken 8,9 -CheckColumnNumber ShouldBeParseError 'data -s } {}' MissingValueForSupportedCommandInDataSectionStatement,UnexpectedToken 7,8 ShouldBeParseError 'data -s ; {}' MissingValueForSupportedCommandInDataSectionStatement 7 ShouldBeParseError 'data -sup a,' MissingValueForSupportedCommandInDataSectionStatement 13 -CheckColumnNumber ShouldBeParseError 'data -sup a,b' MissingStatementBlockForDataSection 14 -CheckColumnNumber Test-ErrorStmt 'data' 'data' Test-ErrorStmt 'data -s & {}' 'data -s' Test-ErrorStmt 'data -s ) {}' 'data -s' Test-ErrorStmt 'data -s abc' 'data -s abc' 'abc' Test-ErrorStmt 'data -s abc,' 'data -s abc,' 'abc' Test-ErrorStmt 'data -s a,b' 'data -s a,b' 'a' 'b' } Describe 'try/catch/finally statement parsing' -Tags "CI" { ShouldBeParseError 'try' MissingTryStatementBlock 3 ShouldBeParseError 'try {}' MissingCatchOrFinally 6 ShouldBeParseError 'try {} catch' MissingCatchHandlerBlock 12 ShouldBeParseError 'try {} finally' MissingFinallyStatementBlock 15 -CheckColumnNumber ShouldBeParseError 'try {} catch [int]' MissingCatchHandlerBlock 19 -CheckColumnNumber ShouldBeParseError 'try {} catch {} finally' MissingFinallyStatementBlock 23 ShouldBeParseError 'try {} catch {} catch' MissingCatchHandlerBlock 21 ShouldBeParseError 'try {} catch [int],' MissingTypeLiteralToken 19 ShouldBeParseError 'try {} finally { return }' ControlLeavingFinally 17 ShouldBeParseError 'try {} finally { break }' ControlLeavingFinally 17 ShouldBeParseError 'try {} finally { continue }' ControlLeavingFinally 17 Test-ErrorStmt 'try' 'try' Test-ErrorStmt 'try {1}' 'try {1}' '{1}' '1' '1' '1' Test-ErrorStmt 'try {1} catch' 'try {1} catch' '{1}' '1' '1' '1' Test-ErrorStmt 'try {1} finally' 'try {1} finally' '{1}' '1' '1' '1' Test-ErrorStmt 'try {1} catch [int]' 'try {1} catch [int]' '{1}' '1' '1' '1' '[int]' Test-ErrorStmt 'try {1} catch {2} finally' 'try {1} catch {2} finally' '{1}' '1' '1' '1' 'catch {2}' '{2}' '2' '2' '2' Test-ErrorStmt 'try {1} catch {2} catch' 'try {1} catch {2} catch' '{1}' '1' '1' '1' 'catch {2}' '{2}' '2' '2' '2' Test-ErrorStmt 'try {1} catch [int],[char] {2} catch' 'try {1} catch [int],[char] {2} catch' '{1}' '1' '1' '1' 'catch [int],[char] {2}' '{2}' '2' '2' '2' '[int]' '[char]' Test-ErrorStmt 'try {1} catch [int],' 'try {1} catch [int],' '{1}' '1' '1' '1' '[int]' } Describe 'switch statement parsing' -Tags "CI" { ShouldBeParseError 'switch' PipelineValueRequired 6 ShouldBeParseError 'switch -abc' InvalidSwitchFlag,PipelineValueRequired 7,11 ShouldBeParseError 'switch -file' MissingFilenameOption 12 ShouldBeParseError 'switch -file a (1)' PipelineValueRequired,MissingCurlyBraceInSwitchStatement 15,18 ShouldBeParseError 'switch (' PipelineValueRequired 8 ShouldBeParseError 'switch ()' PipelineValueRequired,MissingCurlyBraceInSwitchStatement 8,9 ShouldBeParseError 'switch ("abc") ' MissingCurlyBraceInSwitchStatement 14 ShouldBeParseError 'switch ("abc") {' MissingSwitchConditionExpression 17 ShouldBeParseError 'switch ("abc") { 1' MissingSwitchStatementClause 19 ShouldBeParseError 'switch ("abc") { 1 }' MissingSwitchStatementClause 19 ShouldBeParseError 'switch (1) {default {} default {}}' MultipleSwitchDefaultClauses 23 Test-ErrorStmt 'switch' 'switch' Test-ErrorStmt 'switch -abc' 'switch -abc' Test-ErrorStmt 'switch (' 'switch (' Test-ErrorStmt 'switch ()' 'switch ()' Test-ErrorStmt 'switch -file' 'switch -file' Test-ErrorStmt 'switch -file a' 'switch -file a' Test-ErrorStmtForSwitchFlag 'switch -file a' 'file' 'a' 'a' 'a' Test-ErrorStmt 'switch -file a (1)' 'switch -file a (1)' '1' '1' '1' Test-ErrorStmtForSwitchFlag 'switch -file a (1)' 'file' 'a' 'a' 'a' Test-ErrorStmt 'switch (1) {foo' 'switch (1) {foo' 'foo' '1' '1' '1' Test-ErrorStmt 'switch (1) {foo}' 'switch (1) {foo' 'foo' '1' '1' '1' Test-ErrorStmt 'switch (1) {foo {bar}' 'switch (1) {foo {bar}' 'foo' '{bar}' 'bar' 'bar' 'bar' '1' '1' '1' Test-ErrorStmt 'switch (1) {default {9} default{2}' 'switch (1) {default {9} default{2}' 'default' '{9}' '9' '9' '9' 'default' '{2}' '2' '2' '2' '1' '1' '1' } Describe 'function statement parsing' -Tags "CI" { ShouldBeParseError 'function' MissingNameAfterKeyword 8 ShouldBeParseError 'function foo' MissingFunctionBody 12 ShouldBeParseError 'function foo(' MissingEndParenthesisInFunctionParameterList 13 ShouldBeParseError 'function foo {' MissingEndCurlyBrace 13 ShouldBeParseError 'function foo { function bar { if (1) {} }' MissingEndCurlyBrace 13 ShouldBeParseError 'function f { param($a,[int]$a) }' DuplicateFormalParameter 27 ShouldBeParseError 'function f($a,[int]$a){}' DuplicateFormalParameter 19 ShouldBeParseError 'function foo {param(}' MissingEndParenthesisInFunctionParameterList 20 Test-ErrorStmt 'function foo()' 'function foo()' Test-ErrorStmt 'function foo($a)' 'function foo($a)' '$a' '$a' Test-ErrorStmt 'function foo($a = 1)' 'function foo($a = 1)' '$a = 1' '1' '$a' Test-ErrorStmt 'function foo($a' 'function foo($a' '$a' '$a' Test-ErrorStmt 'function foo($a 1' 'function foo($a' '$a' '$a' Test-ErrorStmt 'function foo($a = 1' 'function foo($a = 1' '$a = 1' '1' '$a' } Describe 'assignment statement parsing' -Tags "CI" { ShouldBeParseError '$a,$b += 1,2' InvalidLeftHandSide 0 } Describe 'null coalescing assignment statement parsing' -Tag 'CI' { BeforeAll { $skipTest = -not $EnabledExperimentalFeatures.Contains('PSCoalescingOperators') if ($skipTest) { Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSCoalescingOperators' to be enabled." -Verbose $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = $true } } AfterAll { if ($skipTest) { $global:PSDefaultParameterValues = $originalDefaultParameterValues } } ShouldBeParseError '1 ??= 1' InvalidLeftHandSide 0 ShouldBeParseError '@() ??= 1' InvalidLeftHandSide 0 ShouldBeParseError '@{} ??= 1' InvalidLeftHandSide 0 ShouldBeParseError '1..2 ??= 1' InvalidLeftHandSide 0 ShouldBeParseError '[int] ??= 1' InvalidLeftHandSide 0 ShouldBeParseError '$cricket ?= $soccer' ExpectedValueExpression,InvalidLeftHandSide 10,0 } Describe 'null coalescing statement parsing' -Tag "CI" { BeforeAll { $skipTest = -not $EnabledExperimentalFeatures.Contains('PSCoalescingOperators') if ($skipTest) { Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSCoalescingOperators' to be enabled." -Verbose $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = $true } } AfterAll { if ($skipTest) { $global:PSDefaultParameterValues = $originalDefaultParameterValues } } ShouldBeParseError '$x??=' ExpectedValueExpression 5 ShouldBeParseError '$x ??Get-Thing' ExpectedValueExpression,UnexpectedToken 5,5 ShouldBeParseError '$??=$false' ExpectedValueExpression,InvalidLeftHandSide 3,0 ShouldBeParseError '$hello ??? $what' ExpectedValueExpression,MissingColonInTernaryExpression 9,17 } Describe 'splatting parsing' -Tags "CI" { ShouldBeParseError '@a' SplattingNotPermitted 0 ShouldBeParseError 'foreach (@a in $b) {}' SplattingNotPermitted 9 ShouldBeParseError 'param(@a)' SplattingNotPermitted 6 ShouldBeParseError 'function foo (@a) {}' SplattingNotPermitted 14 } Describe 'Pipes parsing' -Tags "CI" { ShouldBeParseError '|gps' EmptyPipeElement 0 ShouldBeParseError 'gps|' EmptyPipeElement 4 ShouldBeParseError 'gps| |foreach name' EmptyPipeElement 4 ShouldBeParseError '1|1' ExpressionsMustBeFirstInPipeline 2 ShouldBeParseError '$a=' ExpectedValueExpression 3 } Describe 'commands parsing' -Tags "CI" { ShouldBeParseError 'gcm -a:' ParameterRequiresArgument 7 ShouldBeParseError 'gcm -a: 1,' MissingExpression 11 -CheckColumnNumber ShouldBeParseError 'gcm ,' MissingArgument 4 } Describe 'tokens parsing' -Tags "CI" { ShouldBeParseError ' )' UnexpectedToken 3 ShouldBeParseError ' }' UnexpectedToken 4 -CheckColumnNumber } Describe 'expressions parsing' -Tags "CI" { ShouldBeParseError '1+' ExpectedValueExpression 2 ShouldBeParseError '[a()][b]' UnexpectedAttribute 0 ShouldBeParseError '[a()][b]2' UnexpectedAttribute 0 ShouldBeParseError '[ref][ref]$x' ReferenceNeedsToBeByItselfInTypeSequence 5 ShouldBeParseError '[int][ref]$x' ReferenceNeedsToBeLastTypeInTypeConversion 5 ShouldBeParseError '[int][ref]$x = 42' ReferenceNeedsToBeByItselfInTypeConstraint 5 } Describe 'Hash Expression parsing' -Tags "CI" { ShouldBeParseError '@{ a=1;b=2;c=3;' MissingEndCurlyBrace 2 } Describe 'Unicode escape sequence parsing' -Tag "CI" { ShouldBeParseError '"`u{}"' InvalidUnicodeEscapeSequence 1 ShouldBeParseError '"`u{219z}"' InvalidUnicodeEscapeSequence 7 ShouldBeParseError '"`u{12345z}"' InvalidUnicodeEscapeSequence 9 ShouldBeParseError '"`u{1234567}"' TooManyDigitsInUnicodeEscapeSequence 10 ShouldBeParseError '"`u{110000}"' InvalidUnicodeEscapeSequenceValue 4 ShouldBeParseError '"`u2195}"' InvalidUnicodeEscapeSequence 1 ShouldBeParseError '"`u{' InvalidUnicodeEscapeSequence,TerminatorExpectedAtEndOfString 4,0 ShouldBeParseError '"`u{1' InvalidUnicodeEscapeSequence,TerminatorExpectedAtEndOfString 5,0 ShouldBeParseError '"`u{123456' MissingUnicodeEscapeSequenceTerminator,TerminatorExpectedAtEndOfString 10,0 ShouldBeParseError '"`u{1234567' TooManyDigitsInUnicodeEscapeSequence,TerminatorExpectedAtEndOfString 10,0 } Describe "Ternary Operator parsing" -Tags CI { BeforeAll { $skipTest = -not $EnabledExperimentalFeatures.Contains('PSTernaryOperator') if ($skipTest) { Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSTernaryOperator' to be enabled." -Verbose $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = $true } else { $testCases_basic = @( @{ Script = '$true?2:3'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; } @{ Script = '$false?'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; } @{ Script = '$:abc'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; } @{ Script = '$env:abc'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; } @{ Script = '$env:123'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; } @{ Script = 'a?2:2'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; } @{ Script = '1?2:3'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; } @{ Script = 'a?'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; } @{ Script = 'a?b'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; } @{ Script = '1?'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; } @{ Script = '?2:3'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; } ) $testCases_incomplete = @( @{ Script = '$true ?'; ErrorId = "ExpectedValueExpression"; AstType = [System.Management.Automation.Language.ErrorExpressionAst] } @{ Script = '$true ? 3'; ErrorId = "MissingColonInTernaryExpression"; AstType = [System.Management.Automation.Language.ErrorExpressionAst] } @{ Script = '$true ? 3 :'; ErrorId = "ExpectedValueExpression"; AstType = [System.Management.Automation.Language.TernaryExpressionAst] } @{ Script = "`$true`t?"; ErrorId = "ExpectedValueExpression"; AstType = [System.Management.Automation.Language.ErrorExpressionAst] } @{ Script = "`$true`t?`t3"; ErrorId = "MissingColonInTernaryExpression"; AstType = [System.Management.Automation.Language.ErrorExpressionAst] } @{ Script = "`$true`t?`t3`t:"; ErrorId = "ExpectedValueExpression"; AstType = [System.Management.Automation.Language.TernaryExpressionAst] } ) } } AfterAll { if ($skipTest) { $global:PSDefaultParameterValues = $originalDefaultParameterValues } } It "Question-mark and colon parsed correctly in <Script> when not in ternary expression context" -TestCases $testCases_basic { param($Script, $TokenKind) $tks = $null $ers = $null $result = [System.Management.Automation.Language.Parser]::ParseInput($Script, [ref]$tks, [ref]$ers) $tks[0].Kind | Should -BeExactly $TokenKind $tks[0].Text | Should -BeExactly $Script if ($TokenKind -eq "Variable") { $result.EndBlock.Statements[0].PipelineElements[0].Expression | Should -BeOfType 'System.Management.Automation.Language.VariableExpressionAst' $result.EndBlock.Statements[0].PipelineElements[0].Expression.Extent.Text | Should -BeExactly $Script } else { $result.EndBlock.Statements[0].PipelineElements[0].CommandElements[0] | Should -BeOfType 'System.Management.Automation.Language.StringConstantExpressionAst' $result.EndBlock.Statements[0].PipelineElements[0].CommandElements[0].Extent.Text | Should -BeExactly $Script } } It "Question-mark and colon can be used as command names" { function a?b:c { 'a?b:c' } function 2?3:4 { '2?3:4' } a?b:c | Should -BeExactly 'a?b:c' 2?3:4 | Should -BeExactly '2?3:4' } It "Incomplete ternary expression <Script> should generate correct error" -TestCases $testCases_incomplete { param($Script, $ErrorId, $AstType) $ers = $null $result = [System.Management.Automation.Language.Parser]::ParseInput($Script, [ref]$null, [ref]$ers) $ers.Count | Should -Be 1 $ers.IncompleteInput | Should -BeTrue $ers.ErrorId | Should -BeExactly $ErrorId $result.EndBlock.Statements[0].PipelineElements[0].Expression | Should -BeOfType $AstType } It "Generate ternary AST when operands are missing - '`$true ? :'" { $ers = $null $result = [System.Management.Automation.Language.Parser]::ParseInput('$true ? :', [ref]$null, [ref]$ers) $ers.Count | Should -Be 2 $ers[0].IncompleteInput | Should -BeFalse $ers[0].ErrorId | Should -BeExactly 'ExpectedValueExpression' $ers[1].IncompleteInput | Should -BeTrue $ers[1].ErrorId | Should -BeExactly 'ExpectedValueExpression' $expr = $result.EndBlock.Statements[0].PipelineElements[0].Expression $expr | Should -BeOfType 'System.Management.Automation.Language.TernaryExpressionAst' $expr.IfTrue | Should -BeOfType 'System.Management.Automation.Language.ErrorExpressionAst' $expr.IfFalse | Should -BeOfType 'System.Management.Automation.Language.ErrorExpressionAst' } It "Generate ternary AST when operands are missing - '`$true ? : 3'" { $ers = $null $result = [System.Management.Automation.Language.Parser]::ParseInput('$true ? : 3', [ref]$null, [ref]$ers) $ers.Count | Should -Be 1 $ers.IncompleteInput | Should -BeFalse $ers.ErrorId | Should -BeExactly "ExpectedValueExpression" $expr = $result.EndBlock.Statements[0].PipelineElements[0].Expression $expr | Should -BeOfType 'System.Management.Automation.Language.TernaryExpressionAst' $expr.IfTrue | Should -BeOfType 'System.Management.Automation.Language.ErrorExpressionAst' $expr.IfFalse | Should -BeOfType 'System.Management.Automation.Language.ConstantExpressionAst' } }
combined_dataset/train/non-malicious/sample_43_90.ps1
sample_43_90.ps1
ConvertFrom-StringData @' FailoverClustersModuleRequired=O módulo PowerShell (FailoverClusters) necessário não foi encontrado. Utilize a Ferramenta de Funções e Funcionalidades para instalar: Ferramentas de Administração Remota do Servidor | Ferramentas de Administração de Funcionalidades | Ferramentas de Clustering de Ativação Pós-falha | Módulo Cluster de Ativação Pós-falha para o Windows PowerShell. '@ # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAxS6ND5K84yw0p # zhhoGnfMJPgqJ5rIC09S1G+7FrI8PqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ4fb4+UfwFQAY+RL675k46n # 0+jvhqfxNXzwAGjoVlSOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAg6mRLwD0GyVkNuPp5YlYpoTigkXfdXxVD4W5R2rsDFFXEljvc+AgAuf5 # x2JqH8Jm08fcIy8f2HUKmmR/Y20A9/RePtaJjy/TDVhD2TvT0mQfR5asRnmodKBA # z6QYM2mMqjilT9GJT+khTXVZI4AA9T2Uvsp2CVABXvv6EBeQptEKAvWSz/umRhsp # LsCy8T3drAZzvzdnNCtBRMGlC5icKYwJUjNP+m22u3upZU3a/28bZZYNKENs3MIO # P1af8bsJs/8+iQpz54juEjAvb/Xfp507J3Gzk+d/zOWe0HWvdF2N+hRlHBn2TzU1 # DTI5eqLx+Jafkt6dLDVdasGz10ZELqGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBIPpwHdwx/qVZD0M9ti8vNIHePZwGy5pUaPBoRyM19TQIGZa6C/0rG # GBMyMDI0MDEyMjIxMzIwMC43MDhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOlZAXgwIhgPMjAyNDAxMjIyMzAwMDhaGA8yMDI0MDEyMzIzMDAwOFowdjA8Bgor # BgEEAYRZCgQBMS4wLDAKAgUA6VkBeAIBADAJAgEAAgEGAgH/MAcCAQACAhFNMAoC # BQDpWlL4AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEASXzy0QumYD5FJty8 # CaDX5T5aA/+aFNaT3pHiTpwJtjl3YisVMK9spV4xRtiMCt1N1iNFLsvmBdcl3UwJ # jbK/5DWZZjPyUEph8Qon/GfrdC35ZDhTI8L93HwuxbYgD+VwNrsDmZGT2gewGnLg # K5pYatQM1AWj+dtBluuU+3gqzVUxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd6eSJ6WnyhEPQABAAAB3jANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCA1baYnCGR0nQe4SdmsOs73jbVEvHQbCpjzb5PogEoD8zCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EII4+I58NwV4QEEkCf+YLcyCtPnD9TbPzUtgPjgdz # fh17MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHe # nkielp8oRD0AAQAAAd4wIgQgYj8w3kfC0Jvs9rCNyXm8xM06hS2hsBx8v5ACk2bu # InAwDQYJKoZIhvcNAQELBQAEggIAFIInPTey/PxUhFoi29bvgT8JvtJ6JSVcsvEH # q2Vy8EuvtSLNG8KNAWHt+AGbCji3G5beK98dCz8VxaxNXQA741wqMNYMWexlnAMw # t7qBsrKbaGHmHx8/x52bnGzbBewA/QY/SHR1XEuEH0wHF43cN57BWO8tSGAKOICR # kWsuCBm4BKKWZZ9aln/DGBHtsVb85WSW+0cjOnruwMqkHEcxozN53AX6Jx3Dp4KT # OKBPC5g+nlaFxqWUtgRl34VQ+b3Yv6gfe3/bABY1ezmJYF1RS3p3fMeRhq0NEu0w # gJvumwSMoBEPC+uGqy5mjgIJZx4u4FHRYbk9PJHJuSIk/z6stHFtHwal45rVzUQk # 7IOiasPrxDO+N6BdpQiVy6DMnkf/cSghpoSBOjgJvg+fFiS0pK1jQ2ey54Aem7re # zaoyULvpkh+B8CTAHJvlNmXt4ZoorqD6cc3d1j2VWGjOq9GUTqalxXAzFkwz8Ot1 # 8VrhbOhfrk2O492OSjE54se66er93dmhUIpgF2YdHciTrl0yiqFKLC1hujK+P6Zq # H1hOnCsbKeeihZJQ6l4tYtPszbr2P1bEws/5/kHZqGRHlVfeVlhTEIxpDNAEjkuO # yFVZdzca8ZqmRJeWWrgX1TyQdmxvviHoDNSdBz1gUtKTjo1iMkznlsVXSq8s4/Is # cZ2HXa0= # SIG # End signature block
combined_dataset/train/non-malicious/sample_42_26.ps1
sample_42_26.ps1
# # Module manifest for module 'OCI.PSModules.Apmcontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmcontrolplane.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2656b809-7098-428e-b605-696525730fec' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmcontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmcontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmcontrolplaneApmDomain', 'Get-OCIApmcontrolplaneApmDomainsList', 'Get-OCIApmcontrolplaneApmDomainWorkRequestsList', 'Get-OCIApmcontrolplaneDataKeysList', 'Get-OCIApmcontrolplaneWorkRequest', 'Get-OCIApmcontrolplaneWorkRequestErrorsList', 'Get-OCIApmcontrolplaneWorkRequestLogsList', 'Get-OCIApmcontrolplaneWorkRequestsList', 'Move-OCIApmcontrolplaneApmDomainCompartment', 'New-OCIApmcontrolplaneApmDomain', 'New-OCIApmcontrolplaneDataKeys', 'Remove-OCIApmcontrolplaneApmDomain', 'Remove-OCIApmcontrolplaneDataKeys', 'Update-OCIApmcontrolplaneApmDomain' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmcontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_27_79.ps1
sample_27_79.ps1
# # Module manifest for module 'OCI.PSModules.Operatoraccesscontrol' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment', 'Get-OCIOperatoraccesscontrolAccessRequest', 'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList', 'Get-OCIOperatoraccesscontrolAccessRequestsList', 'Get-OCIOperatoraccesscontrolAssignmentValidationStatus', 'Get-OCIOperatoraccesscontrolAuditLogReport', 'Get-OCIOperatoraccesscontrolInteractionsList', 'Get-OCIOperatoraccesscontrolOperatorAction', 'Get-OCIOperatoraccesscontrolOperatorActionsList', 'Get-OCIOperatoraccesscontrolOperatorControl', 'Get-OCIOperatoraccesscontrolOperatorControlAssignment', 'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList', 'Get-OCIOperatoraccesscontrolOperatorControlsList', 'Invoke-OCIOperatoraccesscontrolApproveAccessRequest', 'Invoke-OCIOperatoraccesscontrolInteractionRequest', 'Invoke-OCIOperatoraccesscontrolRejectAccessRequest', 'Invoke-OCIOperatoraccesscontrolReviewAccessRequest', 'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest', 'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment', 'Move-OCIOperatoraccesscontrolOperatorControlCompartment', 'New-OCIOperatoraccesscontrolOperatorControl', 'New-OCIOperatoraccesscontrolOperatorControlAssignment', 'Remove-OCIOperatoraccesscontrolOperatorControl', 'Remove-OCIOperatoraccesscontrolOperatorControlAssignment', 'Update-OCIOperatoraccesscontrolOperatorControl', 'Update-OCIOperatoraccesscontrolOperatorControlAssignment' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-LastReboot.ps1
Get-LastReboot.ps1
Param ( [Parameter(Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$true)] [alias("Name","ComputerName")]$Computer=@($env:ComputerName), [switch] $Output ) process{ if (Test-Connection -ComputerName $Computer -Count 1 -Quiet){ write-host "Getting Uptime for $Computer" -foregroundcolor green $Result = GetUpTime $Computer $Global:objOut += $Result } else { Write-Output $("$($Computer) cannot be reached") } } begin{ $Global:objOut = @() Function GetUpTime ($HostName){ try{ $UpTime = [System.Management.ManagementDateTimeconverter]::ToDateTime((Get-WmiObject -Class Win32_OperatingSystem -Computer $HostName).LastBootUpTime) $UpTimeSpan = New-TimeSpan -start $UpTime -end $(Get-Date -Hour 8 -Minute 0 -second 0) $Filter = @{ProviderName= "USER32";LogName = "system"} $Reason = (Get-WinEvent -ComputerName $HostName -FilterHashtable $Filter | where {$_.Id -eq 1074} | Select -First 1) $Result = New-Object PSObject -Property @{ Date = $(Get-Date -Format d) ComputerName = [string]$HostName LastBoot = $UpTime Reason = $Reason.Message Days = $($UpTimeSpan.Days) Hours = $($UpTimeSpan.Hours) Minutes = $($UpTimeSpan.Minutes) Seconds = $($UpTimeSpan.Seconds) } return $Result } catch{ write-error $error[0] return $null } } } end{ if ($Output){ [string]$OutputLog = ([environment]::getfolderpath("mydocuments")) + "\\" + "Servers_Uptime.csv" $Global:objOut | ConvertTo-Csv -Delimiter ";" -NoTypeInformation | out-file $OutputLog } else{ $Global:objOut | Select Date, Servername, Lastboot, Reason, Days, Hours, Minutes, Seconds | fl } }
combined_dataset/train/non-malicious/1774.ps1
1774.ps1
Import-Module HelpersSecurity try { $defaultParamValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:Skip"] = !$IsWindows Describe "Help built-in function should not expose nested module private functions when run on locked down systems" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $restorePSModulePath = $env:PSModulePath $env:PSModulePath += ";$TestDrive" $trustedModuleName1 = "TrustedModule$(Get-Random -Max 999)_System32" $trustedModulePath1 = Join-Path $TestDrive $trustedModuleName1 New-Item -ItemType Directory $trustedModulePath1 $trustedModuleFilePath1 = Join-Path $trustedModulePath1 ($trustedModuleName1 + ".psm1") $trustedModuleManifestPath1 = Join-Path $trustedModulePath1 ($trustedModuleName1 + ".psd1") $trustedModuleName2 = "TrustedModule$(Get-Random -Max 999)_System32" $trustedModulePath2 = Join-Path $TestDrive $trustedModuleName2 New-Item -ItemType Directory $trustedModulePath2 $trustedModuleFilePath2 = Join-Path $trustedModulePath2 ($trustedModuleName2 + ".psm1") $trustedModuleScript1 = @' function PublicFn1 { NestedFn1 PrivateFn1 } function PrivateFn1 { "PrivateFn1" } '@ $trustedModuleScript1 | Out-File -FilePath $trustedModuleFilePath1 '@{{ FunctionsToExport = "PublicFn1"; ModuleVersion = "1.0"; RootModule = "{0}"; NestedModules = "{1}" }}' -f @($trustedModuleFilePath1,$trustedModuleName2) | Out-File -FilePath $trustedModuleManifestPath1 $trustedModuleScript2 = @' function NestedFn1 { "NestedFn1" "Language mode is $($ExecutionContext.SessionState.LanguageMode)" } '@ $trustedModuleScript2 | Out-File -FilePath $trustedModuleFilePath2 } AfterAll { $env:PSModulePath = $restorePSModulePath if ($trustedModuleName1 -ne $null) { Remove-Module -Name $trustedModuleName1 -Force -ErrorAction Ignore } if ($trustedModuleName2 -ne $null) { Remove-Module -Name $trustedModuleName2 -Force -ErrorAction Ignore } } It "Verifies that private functions in trusted nested modules are not globally accessible after running the help function" { $isCommandAccessible = "False" try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $command = @" Import-Module -Name $trustedModuleName1 -Force -ErrorAction Stop; "@ $command += @' $null = help -Name NestedFn1 -Category Function 2> $null; $result = Get-Command NestedFn1 2> $null; return ($result -ne $null) '@ $isCommandAccessible = powershell.exe -noprofile -nologo -c $command } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $isCommandAccessible | Should -BeExactly "False" } } Describe "NoLanguage runspace pool session should remain in NoLanguage mode when created on a system-locked down machine" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $configFileName = "RestrictedSessionConfig.pssc" $configFilePath = Join-Path $TestDrive $configFileName '@{ SchemaVersion = "2.0.0.0"; SessionType = "RestrictedRemoteServer"}' > $configFilePath $scriptModuleName = "ImportTrustedModuleForTest_System32" $moduleFilePath = Join-Path $TestDrive ($scriptModuleName + ".psm1") $template = @' function TestRestrictedSession {{ $iss = [initialsessionstate]::CreateFromSessionConfigurationFile("{0}") $rsp = [runspacefactory]::CreateRunspacePool($iss) $rsp.Open() $ps = [powershell]::Create() $ps.RunspacePool = $rsp $null = $ps.AddScript("Hello") try {{ $ps.Invoke() }} finally {{ $ps.Dispose() $rsp.Dispose() }} }} Export-ModuleMember -Function TestRestrictedSession '@ $template -f $configFilePath > $moduleFilePath } It "Verifies that a NoLanguage runspace pool throws the expected 'script not allowed' error" { try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $mod = Import-Module -Name $moduleFilePath -Force -PassThru try { & "$scriptModuleName\TestRestrictedSession" throw "No Exception!" } catch { $expectedError = $_ } } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $expectedError.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly "ScriptsNotAllowed" } } Describe "Built-ins work within constrained language" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $TestCasesBuiltIn = @( @{testName = "Verify built-in function"; scriptblock = { Get-Verb } } @{testName = "Verify built-in error variable"; scriptblock = { Write-Error SomeError -ErrorVariable ErrorOutput -ErrorAction SilentlyContinue; $ErrorOutput} } ) } It "<testName>" -TestCases $TestCasesBuiltIn { param ($scriptblock) try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $result = (& $scriptblock) } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $result.Count | Should -BeGreaterThan 0 } } Describe "Background jobs" -Tags 'Feature','RequireAdminOnWindows' { Context "Background jobs in system lock down mode" { It "Verifies that background jobs in system lockdown mode run in constrained language" { try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $job = Start-Job -ScriptBlock { [object]::Equals("A", "B") } | Wait-Job $expectedErrorId = $job.ChildJobs[0].Error.FullyQualifiedErrorId $job | Remove-Job } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $expectedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage" } } Context "Background jobs within inconsistent mode" { It "Verifies that background job is denied when mode is inconsistent" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Start-Job { [object]::Equals("A", "B") } throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotStartJobInconsistentLanguageMode,Microsoft.PowerShell.Commands.StartJobCommand" } } } Describe "Add-Type in constrained language" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies Add-Type fails in constrained language mode" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Add-Type -TypeDefinition 'public class ConstrainedLanguageTest { public static string Hello = "HelloConstrained"; }' throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotDefineNewType,Microsoft.PowerShell.Commands.AddTypeCommand" } It "Verifies Add-Type works back in full language mode again" { Add-Type -TypeDefinition 'public class AfterFullLanguageTest { public static string Hello = "HelloAfter"; }' [AfterFullLanguageTest]::Hello | Should -BeExactly "HelloAfter" } } Describe "New-Object in constrained language" -Tags 'Feature','RequireAdminOnWindows' { Context "New-Object with dotNet types" { It "Verifies New-Object works in constrained language of allowed string type" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $resultString = New-Object System.String "Hello" } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $resultString | Should -Be "Hello" } It "Verifies New-Object throws error in constrained language for disallowed IntPtr type" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" New-Object System.IntPtr 1234 throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotCreateTypeConstrainedLanguage,Microsoft.PowerShell.Commands.NewObjectCommand" } It "Verifies New-Object works for IntPtr type back in full language mode again" { New-Object System.IntPtr 1234 | Should -Be 1234 } } Context "New-Object with COM types" { It "Verifies New-Object with COM types is disallowed in system lock down" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode New-Object -Com ADODB.Parameter throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotCreateComTypeConstrainedLanguage,Microsoft.PowerShell.Commands.NewObjectCommand" } It "Verifies New-Object with COM types works back in full language mode again" { $result = New-Object -ComObject ADODB.Parameter $result.Direction | Should -Be 1 } } } Describe "New-Item command on function drive in constrained language" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies New-Item directory on function drive is not allowed in constrained language mode" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $null = New-Item -Path function:\SomeEvilFunction -ItemType Directory -Value SomeBadScriptBlock -ErrorAction Stop throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "NotSupported,Microsoft.PowerShell.Commands.NewItemCommand" } } Describe "Engine events in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies engine event in constrained language mode, its action runs as constrained" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $job = Register-EngineEvent LockdownEvent -Action { [object]::Equals("A", "B") } $null = New-Event LockdownEvent Wait-Job $job Unregister-Event LockdownEvent } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $job.Error.FullyQualifiedErrorId | Should -Match "MethodInvocationNotSupportedInConstrainedLanguage" } } Describe "Module scope scripts in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies that while in constrained language mode script run in a module scope also runs constrained" { Import-Module PSDiagnostics $module = Get-Module PSDiagnostics try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" & $module { [object]::Equals("A", "B") } } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "CantInvokeCallOperatorAcrossLanguageBoundaries" } } Describe "Switch -file in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies that switch -file will not work in constrained language without provider" { [initialsessionstate] $iss = [initialsessionstate]::Create() $iss.LanguageMode = "ConstrainedLanguage" [runspace] $rs = [runspacefactory]::CreateRunspace($iss) $rs.Open() $pl = $rs.CreatePipeline("switch -file $testDrive/foo.txt { 'A' { 'B' } }") $e = { $pl.Invoke() } | Should -Throw -ErrorId "DriveNotFoundException" $rs.Dispose() } } Describe "Get content syntax in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies that the get content syntax returns null value in constrained language without provider" { $iss = [initialsessionstate]::Create() $iss.LanguageMode = "ConstrainedLanguage" $rs = [runspacefactory]::CreateRunspace($iss) $rs.Open() $pl = $rs.CreatePipeline('${' + "$testDrive/foo.txt}") $result = $pl.Invoke() $rs.Dispose() $result[0] | Should -BeNullOrEmpty } } Describe "Stream redirection in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies that stream redirection doesn't work in constrained language mode without provider" { $iss = [initialsessionstate]::CreateDefault2() $iss.Providers.Clear() $iss.LanguageMode = "ConstrainedLanguage" $rs = [runspacefactory]::CreateRunspace($iss) $rs.Open() $pl = $rs.CreatePipeline('"Hello" > c:\temp\foo.txt') $e = { $pl.Invoke() } | Should -Throw -ErrorId "CmdletInvocationException" $rs.Dispose() } } Describe "Invoke-Expression in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { function VulnerableFunctionFromFullLanguage { Invoke-Expression $Args[0] } $TestCasesIEX = @( @{testName = "Verifies direct Invoke-Expression does not bypass constrained language mode"; scriptblock = { Invoke-Expression '[object]::Equals("A", "B")' } } @{testName = "Verifies indirect Invoke-Expression does not bypass constrained language mode"; scriptblock = { VulnerableFunctionFromFullLanguage '[object]::Equals("A", "B")' } } ) } It "<testName>" -TestCases $TestCasesIEX { param ($scriptblock) try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" & $scriptblock throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage,Microsoft.PowerShell.Commands.InvokeExpressionCommand" } } Describe "Dynamic method invocation in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies dynamic method invocation does not bypass constrained language mode" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" & { $type = [IO.Path] $method = "GetRandomFileName" $type::$method() } throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage" } It "Verifies dynamic methods invocation does not bypass constrained language mode" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" & { $type = [IO.Path] $methods = "GetRandomFileName","GetTempPath" $type::($methods[0])() } throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage" } } Describe "Tab expansion in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies that tab expansion cannot convert disallowed IntPtr type" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $result = @(TabExpansion2 '(1234 -as [IntPtr]).' 20 | ForEach-Object CompletionMatches | Where-Object CompletionText -Match Pointer) } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $result.Count | Should -Be 0 } } Describe "Variable AllScope in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies Set-Variable cannot create AllScope in constrained language" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Set-Variable -Name SetVariableAllScopeNotSupported -Value bar -Option AllScope throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "NotSupported,Microsoft.PowerShell.Commands.SetVariableCommand" } It "Verifies New-Variable cannot create AllScope in constrained language" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" New-Variable -Name NewVarialbeAllScopeNotSupported -Value bar -Option AllScope throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "NotSupported,Microsoft.PowerShell.Commands.NewVariableCommand" } } Describe "Data section additional commands in constrained language" -Tags 'Feature','RequireAdminOnWindows' { function InvokeDataSectionConstrained { try { Invoke-Expression 'data foo -SupportedCommand Add-Type { Add-Type }' throw "No Exception!" } catch { return $_ } } It "Verifies data section Add-Type additional command is disallowed in constrained language" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $exception1 = InvokeDataSectionConstrained $exception2 = InvokeDataSectionConstrained } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $exception1.FullyQualifiedErrorId | Should -Match "DataSectionAllowedCommandDisallowed" $exception2.FullyQualifiedErrorId | Should -Match "DataSectionAllowedCommandDisallowed" } It "Verifies data section with no-constant expression Add-Type additional command is disallowed in constrained language" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $addedCommand = "Add-Type" Invoke-Expression 'data foo -SupportedCommand $addedCommand { Add-Type }' throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "DataSectionAllowedCommandDisallowed,Microsoft.PowerShell.Commands.InvokeExpressionCommand" } } Describe "Import-LocalizedData additional commands in constrained language" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies Import-LocalizedData disallows Add-Type in constrained language" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" & { $localizedDataFileName = Join-Path $TestDrive ImportLocalizedDataAdditionalCommandsNotSupported.psd1 $null = New-Item -ItemType File -Path $localizedDataFileName -Force Import-LocalizedData -SupportedCommand Add-Type -BaseDirectory $TestDrive -FileName ImportLocalizedDataAdditionalCommandsNotSupported } } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotDefineSupportedCommand,Microsoft.PowerShell.Commands.ImportLocalizedData" } } Describe "Where and Foreach operators should not allow unapproved types in constrained language" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $script1 = @' $data = @( @{ Node = "first" Value1 = 1 Value2 = 2 first = $true } @{ Node = "second" Value1 = 3 Value2 = 4 Second = $true } @{ Node = "third" Value1 = 5 Value2 = 6 third = $true } ) $result = $data.where{$_.Node -eq "second"} Write-Output $result $data.where{[system.io.path]::GetRandomFileName() -eq "Hello"} '@ $script2 = @' $data = @( @{ Node = "first" Value1 = 1 Value2 = 2 first = $true } @{ Node = "second" Value1 = 3 Value2 = 4 Second = $true } @{ Node = "third" Value1 = 5 Value2 = 6 third = $true } ) $result = $data.ForEach('value1') Write-Output $result $data.ForEach{[system.io.path]::GetRandomFileName().Length} '@ $script3 = @' (Get-Process powershell*).ForEach('GetHashCode') '@ $script4 = @' (get-process powershell).where{$_.GetType().FullName -match "process"} '@ $TestCasesForeach = @( @{testName = "Verify where statement with invalid method call in constrained language is disallowed"; script = $script1 } @{testName = "Verify foreach statement with invalid method call in constrained language is disallowed"; script = $script2 } @{testName = "Verify foreach statement with embedded method call in constrained language is disallowed"; script = $script3 } @{testName = "Verify where statement with embedded method call in constrained language is disallowed"; script = $script4 } ) } It "<testName>" -TestCases $TestCasesForeach { param ( [string] $script ) try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" & { $sb = [scriptblock]::Create($script) & sb } throw "No Exception!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage" } } Describe "ThreadJob Constrained Language Tests" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $sb = { $ExecutionContext.SessionState.LanguageMode } } It "ThreadJob script must run in ConstrainedLanguage mode with system lock down" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $results = Start-ThreadJob -ScriptBlock { $ExecutionContext.SessionState.LanguageMode } | Wait-Job | Receive-Job } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $results | Should -BeExactly "ConstrainedLanguage" } It "ThreadJob script block using variable must run in ConstrainedLanguage mode with system lock down" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $results = Start-ThreadJob -ScriptBlock { & $using:sb } | Wait-Job | Receive-Job } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $results | Should -BeExactly "ConstrainedLanguage" } It "ThreadJob script block argument variable must run in ConstrainedLanguage mode with system lock down" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $results = Start-ThreadJob -ScriptBlock { param ($sb) & $sb } -ArgumentList $sb | Wait-Job | Receive-Job } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $results | Should -BeExactly "ConstrainedLanguage" } It "ThreadJob script block piped variable must run in ConstrainedLanguage mode with system lock down" { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $results = $sb | Start-ThreadJob -ScriptBlock { $input | ForEach-Object { & $_ } } | Wait-Job | Receive-Job } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $results | Should -BeExactly "ConstrainedLanguage" } } Describe "ForEach-Object -Parallel Constrained Language Tests" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $skipTest = -not $EnabledExperimentalFeatures.Contains('PSForEachObjectParallel') if ($skipTest) { Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSForEachObjectParallel' to be enabled." -Verbose $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = $true } } AfterAll { if ($skipTest) { $global:PSDefaultParameterValues = $originalDefaultParameterValues } } It 'Foreach-Object -Parallel must run in ConstrainedLanguage mode under system lock down' { try { $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $results = 1..1 | ForEach-Object -Parallel { $ExecutionContext.SessionState.LanguageMode } } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $results | Should -BeExactly "ConstrainedLanguage" } } Describe "Dot sourced script block functions from trusted script files should not run FullLanguage in ConstrainedLanguage context" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $scriptFileName = "TrustedScriptBlockTest_System32" $scriptFilePath = Join-Path $TestDrive ($scriptFileName + ".ps1") @' function TrustedFn { Write-Output $ExecutionContext.SessionState.LanguageMode } '@ | Out-File -FilePath $scriptFilePath $scriptModuleName = "UntrustedModuleScriptBlockTest" $scriptModulePath = Join-Path $TestDrive ($scriptModuleName + ".psm1") @' function RunScriptBlock {{ $sb = (Get-Command -Name {0}).ScriptBlock 1 | ForEach-Object $sb TrustedFn }} '@ -f $scriptFilePath | Out-File -FilePath $scriptModulePath } It "Verifies a scriptblock from a trusted script file does not run as trusted" { $result = $null try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Import-Module -Name $scriptModulePath -Force $result = RunScriptBlock } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $result | Should -BeExactly "ConstrainedLanguage" } } Describe "Dot sourcing trusted script in ConstrainedLanguage context is allowed when importing modules" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $importModuleName = "ToImportTrustedModuleTest_System32" $importModulePath = Join-Path $TestDrive ($importModuleName + ".psm1") $modScript = @' function ImportModuleFn { "ImportModuleFn: $($ExecutionContext.SessionState.LanguageMode)" } Export-ModuleMember -Function "ImportModuleFn" '@ | Out-File -FilePath $importModulePath $scriptModuleName = "ImportTrustedModuleTest_System32" $scriptModulePath = Join-Path $TestDrive ($scriptModuleName + ".psm1") @' Import-Module -Name {0} -Force function ModuleFn {{ "ModuleFn: $($ExecutionContext.SessionState.LanguageMode)" }} Export-ModuleMember -Function "ModuleFn","ImportModuleFn" '@ -f $importModulePath | Out-File -FilePath $scriptModulePath } It "Verifies that trusted module functions run in FullLanguage" { $result1 = $null $result2 = $null try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Import-Module -Name $scriptModulePath -Force $result1 = ModuleFn $result2 = ImportModuleFn } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $result1 | Should -BeExactly "ModuleFn: FullLanguage" $result2 | Should -BeExactly "ImportModuleFn: FullLanguage" } } Describe "PowerShell classes are not allowed in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $randomClassName = "class_$(Get-Random -Max 9999)" $script = @' class {0} {{ static Hello([string] $msg) {{ [System.Console]::WriteLine("Hello from: $msg") }} }} '@ -f $randomClassName $modulePathName = "modulePath_$(Get-Random -Max 9999)" $modulePath = Join-Path $testdrive $modulePathName New-Item -Path $modulePath -ItemType Directory -Force $untrustedScriptFile = Join-Path $modulePath "T1ScriptClass.ps1" $script | Out-File -FilePath $untrustedScriptFile $untrustedScriptModule = Join-Path $modulePath "T1ScriptClass.psm1" $script | Out-File -FilePath $untrustedScriptModule $trustedScriptFile = Join-Path $modulePath "T1ScriptClass_System32.ps1" $script | Out-File -FilePath $trustedScriptFile $trustedScriptModule = Join-Path $modulePath "T1ScriptClass_System32.psm1" $script | Out-File -FilePath $trustedScriptModule } AfterAll { Remove-Module -Name T1ScriptClass_System32 -Force -ErrorAction Ignore } It "Verifies that classes cannot be created in script running under constrained language" { try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Invoke-Expression -Command $script 2>$null -ErrorAction Stop throw "No Error!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "ClassesNotAllowedInConstrainedLanguage,Microsoft.PowerShell.Commands.InvokeExpressionCommand" } It "Verifies that classes cannot be created in script files running under constrained language" { try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" & ($untrustedScriptFile) throw "No Error!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "ClassesNotAllowedInConstrainedLanguage" } It "Verifies that classes cannot be created in untrusted script modules running under constrained language" { try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Import-Module -Name $untrustedScriptModule -ErrorAction Stop throw "No Error!" } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly "ClassesNotAllowedInConstrainedLanguage" } It "Verifies that classes can be created in trusted script files running under constrained language" { try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" { & ($trustedScriptFile) } | Should -Not -Throw } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode } } It "Verifies that classes can be created in trusted script modules running under constrained language" { try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" { Import-Module -Name $trustedScriptModule -ErrorAction Stop } | Should -Not -Throw } finally { Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode } } } Describe "Invoke-History should not run command lines in FullLanguage mode when system is locked down" -Tags 'Feature','RequireAdminOnWindows' { BeforeAll { $LanguageModeHistoryFilePath = Join-Path $TestDrive "LanguageModeHistory.XML" @' <Objs Version="1.1.0.1" xmlns="http://schemas.microsoft.com/powershell/2004/04"> <Obj RefId="0"> <TN RefId="0"> <T>Microsoft.PowerShell.Commands.HistoryInfo</T> <T>System.Object</T> </TN> <ToString>$ExecutionContext.SessionState.LanguageMode</ToString> <Props> <I64 N="Id">123</I64> <S N="CommandLine">$ExecutionContext.SessionState.LanguageMode</S> <Obj N="ExecutionStatus" RefId="1"> <TN RefId="1"> <T>System.Management.Automation.Runspaces.PipelineState</T> <T>System.Enum</T> <T>System.ValueType</T> <T>System.Object</T> </TN> <ToString>Completed</ToString> <I32>4</I32> </Obj> <DT N="StartExecutionTime">2018-07-26T14:36:33.923608-07:00</DT> <DT N="EndExecutionTime">2018-07-26T14:36:33.9266018-07:00</DT> </Props> </Obj> </Objs> '@ | Out-File -FilePath $LanguageModeHistoryFilePath $historyItem = Import-Clixml -Path $LanguageModeHistoryFilePath } It "Verifies that Invoke-History runs command lines in ConstrainedLanguage" { $result = $null try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" $historyItem | Add-History $retrievedItem = Get-History -Count 1 $result = $retrievedItem | Invoke-History } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $result | Should -BeExactly "ConstrainedLanguage" } } Describe "Enter-PSHostProcess cmdlet should be disabled on locked down systems" -Tags 'Feature','RequireAdminOnWindows' { It "Verifies that Enter-PSHostProcess is disabled with lock down policy" { $expectedError = $null try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode $ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage" Enter-PSHostProcess -Id 5555 -ErrorAction Stop } catch { $expectedError = $_ } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode } $expectedError.FullyQualifiedErrorId | Should -BeExactly 'EnterPSHostProcessCmdletDisabled,Microsoft.PowerShell.Commands.EnterPSHostProcessCommand' } } } finally { if ($defaultParamValues -ne $null) { $Global:PSDefaultParameterValues = $defaultParamValues } }
combined_dataset/train/non-malicious/Start-Encryption_2.ps1
Start-Encryption_2.ps1
## Start-Encryption ################################################################################################## ## Rijndael symmetric key encryption ... with no passes on the key. Very lazy. ## USAGE: ## $encrypted = Encrypt-String "Oisin Grehan is a genius" "P@ssw0rd" ## Decrypt-String $encrypted "P@ssw0rd" ## ## You can choose to return an array by passing -arrayOutput to Encrypt-String ## I chose to use Base64 encoded strings because they're easier to save ... [Reflection.Assembly]::LoadWithPartialName("System.Security") function Encrypt-String($String, $Passphrase, $salt="My Voice is my P455W0RD!", $init="Yet another key", [switch]$arrayOutput) { $r = new-Object System.Security.Cryptography.RijndaelManaged $pass = [Text.Encoding]::UTF8.GetBytes($Passphrase) $salt = [Text.Encoding]::UTF8.GetBytes($salt) $r.Key = (new-Object Security.Cryptography.PasswordDeriveBytes $pass, $salt, "SHA1", 5).GetBytes(32) #256/8 $r.IV = (new-Object Security.Cryptography.SHA1Managed).ComputeHash( [Text.Encoding]::UTF8.GetBytes($init) )[0..15] $c = $r.CreateEncryptor() $ms = new-Object IO.MemoryStream $cs = new-Object Security.Cryptography.CryptoStream $ms,$c,"Write" $sw = new-Object IO.StreamWriter $cs $sw.Write($String) $sw.Close() $cs.Close() $ms.Close() $r.Clear() [byte[]]$result = $ms.ToArray() if($arrayOutput) { return $result } else { return [Convert]::ToBase64String($result) } } function Decrypt-String($Encrypted, $Passphrase, $salt="My Voice is my P455W0RD!", $init="Yet another key") { if($Encrypted -is [string]){ $Encrypted = [Convert]::FromBase64String($Encrypted) } $r = new-Object System.Security.Cryptography.RijndaelManaged $pass = [System.Text.Encoding]::UTF8.GetBytes($Passphrase) $salt = [System.Text.Encoding]::UTF8.GetBytes($salt) $r.Key = (new-Object Security.Cryptography.PasswordDeriveBytes $pass, $salt, "SHA1", 5).GetBytes(32) #256/8 $r.IV = (new-Object Security.Cryptography.SHA1Managed).ComputeHash( [Text.Encoding]::UTF8.GetBytes($init) )[0..15] $d = $r.CreateDecryptor() $ms = new-Object IO.MemoryStream @(,$Encrypted) $cs = new-Object Security.Cryptography.CryptoStream $ms,$d,"Read" $sr = new-Object IO.StreamReader $cs Write-Output $sr.ReadToEnd() $sr.Close() $cs.Close() $ms.Close() $r.Clear() }
combined_dataset/train/non-malicious/Search-StartMenu.ps1
Search-StartMenu.ps1
##############################################################################\n##\n## Search-StartMenu\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/blog)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nSearch the Start Menu for items that match the provided text. This script\nsearches both the name (as displayed on the Start Menu itself,) and the\ndestination of the link.\n\n.Example\n\nSearch-StartMenu "Character Map" | Invoke-Item\nSearches for the "Character Map" appication, and then runs it\n\nSearch-StartMenu PowerShell | Select-FilteredObject | Invoke-Item\nSearches for anything with "PowerShell" in the application name, lets you\npick which one to launch, and then launches it.\n\n#>\n\nparam(\n ## The pattern to match\n [Parameter(Mandatory = $true)]\n $Pattern\n)\n\nSet-StrictMode -Version Latest\n\n## Get the locations of the start menu paths\n$myStartMenu = [Environment]::GetFolderPath("StartMenu")\n$shell = New-Object -Com WScript.Shell\n$allStartMenu = $shell.SpecialFolders.Item("AllUsersStartMenu")\n\n## Escape their search term, so that any regular expression\n## characters don't affect the search\n$escapedMatch = [Regex]::Escape($pattern)\n\n## Search for text in the link name\ndir $myStartMenu *.lnk -rec | ? { $_.Name -match "$escapedMatch" }\ndir $allStartMenu *.lnk -rec | ? { $_.Name -match "$escapedMatch" }\n\n## Search for text in the link destination\ndir $myStartMenu *.lnk -rec |\n Where-Object { $_ | Select-String "\\\\[^\\\\]*$escapedMatch\\." -Quiet }\ndir $allStartMenu *.lnk -rec |\n Where-Object { $_ | Select-String "\\\\[^\\\\]*$escapedMatch\\." -Quiet }
combined_dataset/train/non-malicious/Set-Computername_13.ps1
Set-Computername_13.ps1
function Set-ComputerName { param( [switch]$help, [string]$originalPCName=$(read-host "Please specify the current name of the computer"), [string]$computerName=$(read-host "Please specify the new name of the computer")) $usage = "set-ComputerName -originalPCname CurrentName -computername AnewName" if ($help) {Write-Host $usage;break} $computer = Get-WmiObject Win32_ComputerSystem -OriginalPCname OriginalName -computername $originalPCName $computer.Rename($computerName) }
combined_dataset/train/non-malicious/CLR4 module.ps1
CLR4 module.ps1
function Start-CLR4 { [CmdletBinding()] param ( [string] $cmd ) if ($PSVersionTable.CLRVersion.Major -eq 4) { write-debug 'already running clr 4' invoke-expression $cmd; return } $RunActivationConfigPath = resolve-path ~ | Join-Path -ChildPath .CLR4PowerShell; write-debug "clr4 config path: $runactivationconfigpath" if( -not( test-path $runactivationconfigpath )) { New-Item -Path $RunActivationConfigPath -ItemType Container | Out-Null; @" <?xml version="1.0" encoding="utf-8" ?> <configuration> <startup useLegacyV2RuntimeActivationPolicy="true"> <supportedRuntime version="v4.0"/> </startup> </configuration> "@ | Set-Content -Path $RunActivationConfigPath\\powershell.exe.activation_config -Encoding UTF8; } $EnvVarName = 'COMPLUS_ApplicationMigrationRuntimeActivationConfigPath'; [Environment]::SetEnvironmentVariable($EnvVarName, $RunActivationConfigPath); write-debug "current COMPLUS_ApplicationMigrationRuntimeActivationConfigPath: $env:COMPLUS_ApplicationMigrationRuntimeActivationConfigPath"; & powershell.exe -nologo -command "$cmd"; }
combined_dataset/train/non-malicious/399.ps1
399.ps1
$scriptBlock = { $script:___ScriptName = 'psframework.taskengine' try { while ($true) { if ([PSFramework.Runspace.RunspaceHost]::Runspaces[$___ScriptName.ToLower()].State -notlike "Running") { break } $task = $null $tasksDone = @() while ($task = [PSFramework.TaskEngine.TaskHost]::GetNextTask($tasksDone)) { $task.State = 'Running' try { [PSFramework.Utility.UtilityHost]::ImportScriptBlock($task.ScriptBlock) $task.ScriptBlock.Invoke() $task.State = 'Pending' } catch { $task.State = 'Error' $task.LastError = $_ Write-PSFMessage -EnableException $false -Level Warning -Message "[Maintenance] Task '$($task.Name)' failed to execute" -ErrorRecord $_ -FunctionName "task:TaskEngine" -Target $task -ModuleName PSFramework } $task.LastExecution = Get-Date if (-not $task.Pending -and ($task.Status -eq "Pending")) { $task.Status = 'Completed' } $tasksDone += $task.Name } if (-not ([PSFramework.TaskEngine.TaskHost]::HasPendingTasks)) { break } Start-Sleep -Seconds 5 } } catch { } finally { [PSFramework.Runspace.RunspaceHost]::Runspaces[$___ScriptName.ToLower()].SignalStopped() } } Register-PSFRunspace -ScriptBlock $scriptBlock -Name 'psframework.taskengine' -NoMessage
combined_dataset/train/non-malicious/sample_44_15.ps1
sample_44_15.ps1
# escape=` # This Dockerfile will only build on Docker for Windows. # # If you change dependencies etc here, please also check and update # the other Windows build resources: # # - DEVELOPER_GUIDE.md "Windows" section # - appveyor.yml # - .github/workflows/call-build-windows.yaml # - dockerfiles/Dockerfile.windows # ARG WINDOWS_VERSION=ltsc2019 # Builder Image - Windows Server Core FROM mcr.microsoft.com/windows/servercore:$WINDOWS_VERSION as builder RUN setx /M PATH "%PATH%;C:\BuildTools\Common7\IDE\CommonExtensions\Microsoft\CMake\CMake\bin;C:\WinFlexBison" SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"] WORKDIR /local # Install Visual Studio 2019 ADD https://aka.ms/vs/16/release/vs_buildtools.exe /local/vs_buildtools.exe ADD https://aka.ms/vs/16/release/channel /local/VisualStudio.chman RUN Start-Process /local/vs_buildtools.exe ` -ArgumentList '--quiet ', '--wait ', '--norestart ', '--nocache', ` '--installPath C:\BuildTools', ` '--channelUri C:\local\VisualStudio.chman', ` '--installChannelUri C:\local\VisualStudio.chman', ` '--add Microsoft.VisualStudio.Workload.VCTools', ` '--includeRecommended' -NoNewWindow -Wait; ADD https://github.com/lexxmark/winflexbison/releases/download/v2.5.22/win_flex_bison-2.5.22.zip /local/win_flex_bison.zip RUN Expand-Archive /local/win_flex_bison.zip -Destination /WinFlexBison; ` Copy-Item -Path /WinFlexBison/win_bison.exe /WinFlexBison/bison.exe; ` Copy-Item -Path /WinFlexBison/win_flex.exe /WinFlexBison/flex.exe; # Technique from https://github.com/StefanScherer/dockerfiles-windows/blob/master/mongo/3.6/Dockerfile WORKDIR /local ADD https://aka.ms/vs/15/release/vc_redist.x64.exe /local/vc_redist.x64.exe WORKDIR /fluent-bit/bin/ RUN Start-Process /local/vc_redist.x64.exe -ArgumentList '/install', '/quiet', '/norestart' -NoNewWindow -Wait; ` Copy-Item -Path /Windows/System32/msvcp140.dll -Destination /fluent-bit/bin/; ` Copy-Item -Path /Windows/System32/vccorlib140.dll -Destination /fluent-bit/bin/; ` Copy-Item -Path /Windows/System32/vcruntime140.dll -Destination /fluent-bit/bin/; # Install Chocolatey and OpenSSL: https://github.com/StefanScherer/dockerfiles-windows/blob/main/openssl/Dockerfile ENV chocolateyUseWindowsCompression false ENV chocolateyVersion '1.4.0' RUN iex ((new-object net.webclient).DownloadString('https://chocolatey.org/install.ps1')); ` choco feature disable --name showDownloadProgress ; ` choco install -y openssl; # Build Fluent Bit from source - context must be the root of the Git repo WORKDIR /src/build COPY . /src/ RUN cmake -G "'Visual Studio 16 2019'" -DOPENSSL_ROOT_DIR='C:\Program Files\OpenSSL-Win64\lib\VC\x64\MT' -DOPENSSL_INCLUDE_DIR='C:\Program Files\OpenSSL-Win64\include' -DCMAKE_BUILD_TYPE=Release ../;` cmake --build . --config Release; # Set up config files and binaries in single /fluent-bit hierarchy for easy copy in later stage RUN New-Item -Path /fluent-bit/etc/ -ItemType "directory"; ` Copy-Item -Path /src/conf/fluent-bit-win32.conf /fluent-bit/etc/fluent-bit.conf; ` Copy-Item -Path /src/conf/parsers.conf /fluent-bit/etc/; ` Copy-Item -Path /src/conf/parsers_ambassador.conf /fluent-bit/etc/; ` Copy-Item -Path /src/conf/parsers_java.conf /fluent-bit/etc/; ` Copy-Item -Path /src/conf/parsers_extra.conf /fluent-bit/etc/; ` Copy-Item -Path /src/conf/parsers_openstack.conf /fluent-bit/etc/; ` Copy-Item -Path /src/conf/parsers_cinder.conf /fluent-bit/etc/; ` Copy-Item -Path /src/conf/plugins.conf /fluent-bit/etc/; ` Copy-Item -Path /src/build/bin/Release/fluent-bit.exe /fluent-bit/bin/; ` Copy-Item -Path /src/build/bin/Release/fluent-bit.dll /fluent-bit/bin/; # # Runtime Image - Windows Server Core # FROM mcr.microsoft.com/windows/servercore:$WINDOWS_VERSION as runtime ARG FLUENTBIT_VERSION=master ARG IMAGE_CREATE_DATE ARG IMAGE_SOURCE_REVISION # Metadata as defined in OCI image spec annotations # https://github.com/opencontainers/image-spec/blob/master/annotations.md LABEL org.opencontainers.image.title="Fluent Bit" ` org.opencontainers.image.description="Fluent Bit is an open source and multi-platform Log Processor and Forwarder which allows you to collect data/logs from different sources, unify and send them to multiple destinations. It's fully compatible with Docker and Kubernetes environments." ` org.opencontainers.image.created=$IMAGE_CREATE_DATE ` org.opencontainers.image.version=$FLUENTBIT_VERSION ` org.opencontainers.image.authors="Eduardo Silva <eduardo@calyptia.com>" ` org.opencontainers.image.url="https://hub.docker.com/r/fluent/fluent-bit" ` org.opencontainers.image.documentation="https://docs.fluentbit.io/manual/" ` org.opencontainers.image.vendor="Fluent Organization" ` org.opencontainers.image.licenses="Apache-2.0" ` org.opencontainers.image.source="https://github.com/fluent/fluent-bit" ` org.opencontainers.image.revision=$IMAGE_SOURCE_REVISION COPY --from=builder /fluent-bit /fluent-bit RUN setx /M PATH "%PATH%;C:\fluent-bit\bin" ENTRYPOINT [ "fluent-bit.exe" ] # Hadolint gets confused by Windows it seems # hadolint ignore=DL3025 CMD [ "fluent-bit.exe", "-c", "/fluent-bit/etc/fluent-bit.conf" ]
combined_dataset/train/non-malicious/1321.ps1
1321.ps1
function Remove-CSslCertificateBinding { [CmdletBinding(SupportsShouldProcess=$true)] param( [IPAddress] $IPAddress = '0.0.0.0', [UInt16] $Port = 443 ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not (Test-CSslCertificateBinding -IPAddress $IPAddress -Port $Port) ) { return } if( $IPAddress.AddressFamily -eq [Net.Sockets.AddressFamily]::InterNetworkV6 ) { $ipPort = '[{0}]:{1}' -f $IPAddress,$Port } else { $ipPort = '{0}:{1}' -f $IPAddress,$Port } Invoke-ConsoleCommand -Target $ipPort ` -Action "removing SSL certificate binding" ` -ScriptBlock { netsh http delete sslcert ipPort=$ipPort } }
combined_dataset/train/non-malicious/Get-WebSite_2.ps1
Get-WebSite_2.ps1
function Get-WebPage { <# .SYNOPSIS Downloads web page from site. .DESCRIPTION Downloads web page from site and displays source code or displays total bytes of webpage downloaded .PARAMETER Url URL of the website to test access to. .PARAMETER UseDefaultCredentials Use the currently authenticated user's credentials .PARAMETER Proxy Used to connect via a proxy .PARAMETER Credential Provide alternate credentials .PARAMETER ShowSize Displays the size of the downloaded page in Kilobytes .NOTES Name: Get-WebPage Author: Boe Prox DateCreated: 08Feb2011 .EXAMPLE Get-WebPage -url "http://www.bing.com" Description ------------ Returns the source code from bing.com -showsize .EXAMPLE Get-WebPage -url "http://www.bing.com" -ShowSize Description ------------ Returns the size of the webpage bing.com in bytes. #> [cmdletbinding( DefaultParameterSetName = 'url', ConfirmImpact = 'low' )] Param( [Parameter( Mandatory = $True, Position = 0, ParameterSetName = '', ValueFromPipeline = $True)] [string][ValidatePattern("^(http|https)\\://*")]$Url, [Parameter( Position = 1, Mandatory = $False, ParameterSetName = 'defaultcred')] [switch]$UseDefaultCredentials, [Parameter( Mandatory = $False, ParameterSetName = '')] [string]$Proxy, [Parameter( Mandatory = $False, ParameterSetName = 'altcred')] [switch]$Credential, [Parameter( Mandatory = $False, ParameterSetName = '')] [switch]$ShowSize ) Begin { $psBoundParameters.GetEnumerator() | % { Write-Verbose "Parameter: $_" } #Create the initial WebClient object Write-Verbose "Creating web client object" $wc = New-Object Net.WebClient #Use Proxy address if specified If ($PSBoundParameters.ContainsKey('Proxy')) { #Create Proxy Address for Web Request Write-Verbose "Creating proxy address and adding into Web Request" $wc.Proxy = New-Object -TypeName Net.WebProxy($proxy,$True) } #Determine if using Default Credentials If ($PSBoundParameters.ContainsKey('UseDefaultCredentials')) { #Set to True, otherwise remains False Write-Verbose "Using Default Credentials" $webrequest.UseDefaultCredentials = $True } #Determine if using Alternate Credentials If ($PSBoundParameters.ContainsKey('Credentials')) { #Prompt for alternate credentals Write-Verbose "Prompt for alternate credentials" $wc.Credential = (Get-Credential).GetNetworkCredential() } } Process { Try { If ($ShowSize) { #Get the size of the webpage Write-Verbose "Downloading web page and determining size" "{0:N0}" -f ($wr.DownloadString($url) | Out-String).length -as [INT] } Else { #Get the contents of the webpage Write-Verbose "Downloading web page and displaying source code" $wc.DownloadString($url) } } Catch { Write-Warning "$($Error[0])" } } }
combined_dataset/train/non-malicious/sample_24_34.ps1
sample_24_34.ps1
Manifest-Version: 1.0 Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$SysEnum.class SHA-256-Digest: Dim/Do7LRwT7Wvac11np/+Ykp7+A1taXnG153xK7eVo= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPointConfigParameter s.class SHA-256-Digest: aZ9YC9A2Va3saVusmXFad4rUuNsBySK8or8eDH4QEhw= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$CpEnum.class SHA-256-Digest: Af4UqWhDuiBrN28d4CFG2hKpR8/jYwnLfAThTDvLgjo= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$Products.class SHA-256-Digest: YYAkLdZ1+/XS5wrGnn3u6OG7aAV8wsNfznoMshcZUL0= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$EndPointSecuri tyVPNEnum.class SHA-256-Digest: SSr7YHCrmrbPksbXtNMvoEoDaNBonGVIp/BDzfxeAgU= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$FieldMapping.c lass SHA-256-Digest: rldjhzTnKmdKdwBB22HE2EdwN4qHCIlTtvZ+1Aorax8= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$FailureReasonE num.class SHA-256-Digest: 8nv6jqkAFNz/USOt2aOD8L6+L8Df0XVZHpdh8uhOwQE= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$1.class SHA-256-Digest: CPeHmk85rc733kklLN5EEOwuHJfgdp5t9RHSFjODiWs= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPointConfigParameter s$CheckPointConfigParametersEnum.class SHA-256-Digest: QnNJ9C3zFsPOi/hfqDfAjBxXpn2CTG3KzlyKI68zVas= Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint.class SHA-256-Digest: ljlPooq6vDlY4P9KGK1kbl32bJOprsLOFdCX/s0qRM0=
combined_dataset/train/non-malicious/563.ps1
563.ps1
function Test-SPOField { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [Microsoft.SharePoint.Client.List] $list, [Parameter(Mandatory=$true, Position=2)] [Microsoft.SharePoint.Client.FieldCollection] $fields, [Parameter(Mandatory=$true, Position=3)] [string] $fieldName ) $fieldNames = $fields.GetEnumerator() | select -ExpandProperty Title $exists = ($fieldNames -contains $fieldName) return $exists }
combined_dataset/train/non-malicious/1830.ps1
1830.ps1
Import-Module HelpersCommon Describe "Test-Connection" -tags "CI" { BeforeAll { $oldInformationPreference = $InformationPreference $oldProgressPreference = $ProgressPreference $InformationPreference = "Ignore" $ProgressPreference = "SilentlyContinue" $hostName = [System.Net.Dns]::GetHostName() $targetName = "localhost" $targetAddress = "127.0.0.1" $targetAddressIPv6 = [System.Net.Dns]::GetHostEntry($targetName).AddressList[0].IPAddressToString $UnreachableAddress = "10.11.12.13" $realAddress = [System.Net.Dns]::GetHostEntry($hostName).AddressList | Where-Object {$_.AddressFamily -eq "InterNetwork"} | Select-Object -First 1 | Foreach-Object {$_.IPAddressToString} $jobContinues = Start-Job { Test-Connection $using:targetAddress -Continues } } AfterAll { $InformationPreference = $oldInformationPreference $ProgressPreference = $oldProgressPreference } Context "Ping" { It "Default parameter set is 'Ping'" { $result = Test-Connection $targetName $replies = $result.Replies $result.Count | Should -Be 1 $result[0] | Should -BeOfType "Microsoft.PowerShell.Commands.TestConnectionCommand+PingReport" $result[0].Source | Should -BeExactly $hostName $result[0].Destination | Should -BeExactly $targetName $replies.Count | Should -Be 4 $replies[0] | Should -BeOfType "System.Net.NetworkInformation.PingReply" $replies[0].Address | Should -BeExactly $targetAddressIPv6 $replies[0].Status | Should -BeExactly "Success" if ($isWindows) { $replies[0].Buffer.Count | Should -Be 32 } } It "Count parameter" { $result1 = Test-Connection -Ping $targetName -Count 1 $result2 = Test-Connection $targetName -Count 2 $result1.Replies.Count | Should -Be 1 $result2.Replies.Count | Should -Be 2 } It "Quiet works" { $result1 = Test-Connection $targetName -Count 1 -Quiet $result2 = Test-Connection $UnreachableAddress -Count 1 -Quiet $result1 | Should -BeTrue $result2 | Should -BeFalse } It "Ping fake host" { { $result = Test-Connection "fakeHost" -Count 1 -Quiet -ErrorAction Stop } | Should -Throw -ErrorId "TestConnectionException,Microsoft.PowerShell.Commands.TestConnectionCommand" if (!$isWindows) { $Error[0].Exception.InnerException.ErrorCode | Should -Be -131073 } else { $Error[0].Exception.InnerException.ErrorCode | Should -Be 11001 } } It "Force IPv4 with implicit PingOptions" { $result = Test-Connection $hostName -Count 1 -IPv4 $result.Replies[0].Address | Should -BeExactly $realAddress $result.Replies[0].Options.Ttl | Should -BeLessOrEqual 128 if ($isWindows) { $result.Replies[0].Options.DontFragment | Should -BeFalse } } It "Force IPv4 with explicit PingOptions" { $result1 = Test-Connection $hostName -Count 1 -IPv4 -MaxHops 10 -DontFragment $result2 = Test-Connection 8.8.8.8 -Count 1 -IPv4 -MaxHops 1 -DontFragment $result1.Replies[0].Address | Should -BeExactly $realAddress $result1.Replies[0].Options.Ttl | Should -BeLessOrEqual 128 if (!$isWindows) { if ( (Get-PlatformInfo) -eq "alpine" ) { $result1.Replies[0].Options.DontFragment | Should -Be $true } else { $result1.Replies[0].Options.DontFragment | Should -BeNullOrEmpty } $result2.Replies[0].Status | Should -BeIn "TtlExpired","TimedOut","Success" } else { $result1.Replies[0].Options.DontFragment | Should -BeFalse $result2.Replies[0].Status | Should -BeIn "TtlExpired","TimedOut",$null } } It "Force IPv6" -Pending { $result = Test-Connection $targetName -Count 1 -IPv6 $result.Replies[0].Address | Should -BeExactly $targetAddressIPv6 $result.Replies[0].Options | Should -Be $null } It "MaxHops Should -Be greater 0" { { Test-Connection $targetName -MaxHops 0 } | Should -Throw -ErrorId "System.ArgumentOutOfRangeException,Microsoft.PowerShell.Commands.TestConnectionCommand" { Test-Connection $targetName -MaxHops -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand" } It "Count Should -Be greater 0" { { Test-Connection $targetName -Count 0 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand" { Test-Connection $targetName -Count -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand" } It "Delay Should -Be greater 0" { { Test-Connection $targetName -Delay 0 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand" { Test-Connection $targetName -Delay -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand" } It "Delay works" { $result1 = measure-command {Test-Connection localhost -Count 2} $result2 = measure-command {Test-Connection localhost -Delay 4 -Count 2} $result1.TotalSeconds | Should -BeGreaterThan 1 $result1.TotalSeconds | Should -BeLessThan 3 $result2.TotalSeconds | Should -BeGreaterThan 4 } It "BufferSize Should -Be between 0 and 65500" { { Test-Connection $targetName -BufferSize 0 } | Should Not Throw { Test-Connection $targetName -BufferSize -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand" { Test-Connection $targetName -BufferSize 65501 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand" } It "BufferSize works" -Pending:(!$IsWindows) { $result = Test-Connection $targetName -Count 1 -BufferSize 2 if ($isWindows) { $result.Replies[0].Buffer.Count | Should -Be 2 } } It "ResolveDestination for address" { $result = Test-Connection $targetAddress -ResolveDestination -Count 1 $resolvedName = [System.Net.DNS]::GetHostEntry($targetAddress).HostName $result.Destination | Should -BeExactly $resolvedName $result.Replies[0].Address | Should -BeExactly $targetAddress } It "ResolveDestination for name" { $result = Test-Connection $targetName -ResolveDestination -Count 1 $resolvedName = [System.Net.DNS]::GetHostByName($targetName).HostName $resolvedAddress = ([System.Net.DNS]::GetHostAddresses($resolvedName)[0] -split "%")[0] $result.Destination | Should -BeExactly $resolvedName $result.Replies[0].Address | Should -BeExactly $resolvedAddress } It "TimeOut works" { (Measure-Command { Test-Connection $UnreachableAddress -Count 1 -TimeOut 1 }).TotalSeconds | Should -BeLessThan 3 (Measure-Command { Test-Connection $UnreachableAddress -Count 1 -TimeOut 4 }).TotalSeconds | Should -BeGreaterThan 3 } It "Continues works" { $result = Receive-Job $jobContinues Remove-Job $jobContinues -Force $result.Count | Should -BeGreaterThan 4 $result[0].Address | Should -BeExactly $targetAddress $result[0].Status | Should -BeExactly "Success" if ($isWindows) { $result[0].Buffer.Count | Should -Be 32 } } } Context "MTUSizeDetect" { It "MTUSizeDetect works" -pending:($IsMacOS) { $result = Test-Connection $hostName -MTUSizeDetect $result | Should -BeOfType "System.Net.NetworkInformation.PingReply" $result.Destination | Should -BeExactly $hostName $result.Status | Should -BeExactly "Success" $result.MTUSize | Should -BeGreaterThan 0 } It "Quiet works" -pending:($IsMacOS) { $result = Test-Connection $hostName -MTUSizeDetect -Quiet $result | Should -BeOfType "Int32" $result | Should -BeGreaterThan 0 } } Context "TraceRoute" { It "TraceRoute works" { $result = Test-Connection $hostName -TraceRoute -IPv4 $replies = $result.Replies $pingReplies = $replies[-1].PingReplies $result.Count | Should -Be 1 $result | Should -BeOfType "Microsoft.PowerShell.Commands.TestConnectionCommand+TraceRouteResult" $result.Source | Should -BeExactly $hostName $result.DestinationAddress | Should -BeExactly $realAddress $result.DestinationHost | Should -BeExactly $hostName $replies.Count | Should -BeGreaterThan 0 $replies[0] | Should -BeOfType "Microsoft.PowerShell.Commands.TestConnectionCommand+TraceRouteReply" $replies[0].Hop | Should -Be 1 $pingReplies.Count | Should -Be 3 $pingReplies[0].Address | Should -BeExactly $realAddress $pingReplies[0].Status | Should -BeExactly "Success" if (!$isWindows) { $pingReplies[0].Buffer.Count | Should -Match '^0$|^32$' } else { $pingReplies[0].Buffer.Count | Should -Be 32 } } It "Quiet works" { $result = Test-Connection $hostName -TraceRoute -Quiet 6> $null $result | Should -BeTrue } } } Describe "Connection" -Tag "CI", "RequireAdminOnWindows" { BeforeAll { $WebListener = Start-WebListener $UnreachableAddress = "10.11.12.13" } It "Test connection to local host port 80" { Test-Connection '127.0.0.1' -TCPPort $WebListener.HttpPort | Should -BeTrue } It "Test connection to unreachable host port 80" { Test-Connection $UnreachableAddress -TCPPort 80 -TimeOut 1 | Should -BeFalse } }
combined_dataset/train/non-malicious/sample_24_59.ps1
sample_24_59.ps1
# # Module manifest for module 'OCI.PSModules.Keymanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Keymanagement.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4a9c2614-4d97-430e-b149-edbf0d70bf0b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Keymanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Keymanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Backup-OCIKeymanagementKey', 'Backup-OCIKeymanagementVault', 'Disable-OCIKeymanagementKey', 'Enable-OCIKeymanagementKey', 'Export-OCIKeymanagementKey', 'Get-OCIKeymanagementEkmsPrivateEndpoint', 'Get-OCIKeymanagementEkmsPrivateEndpointsList', 'Get-OCIKeymanagementHsmCluster', 'Get-OCIKeymanagementHsmClustersList', 'Get-OCIKeymanagementHsmPartition', 'Get-OCIKeymanagementHsmPartitionsList', 'Get-OCIKeymanagementKey', 'Get-OCIKeymanagementKeysList', 'Get-OCIKeymanagementKeyVersion', 'Get-OCIKeymanagementKeyVersionsList', 'Get-OCIKeymanagementPreCoUserCredentials', 'Get-OCIKeymanagementReplicationStatus', 'Get-OCIKeymanagementVault', 'Get-OCIKeymanagementVaultReplicasList', 'Get-OCIKeymanagementVaultsList', 'Get-OCIKeymanagementVaultUsage', 'Get-OCIKeymanagementWrappingKey', 'Import-OCIKeymanagementKey', 'Import-OCIKeymanagementKeyVersion', 'Invoke-OCIKeymanagementDecrypt', 'Invoke-OCIKeymanagementDownloadCertificateSigningRequest', 'Invoke-OCIKeymanagementEncrypt', 'Invoke-OCIKeymanagementScheduleHsmClusterDeletion', 'Invoke-OCIKeymanagementScheduleKeyDeletion', 'Invoke-OCIKeymanagementScheduleKeyVersionDeletion', 'Invoke-OCIKeymanagementScheduleVaultDeletion', 'Invoke-OCIKeymanagementSign', 'Invoke-OCIKeymanagementVerify', 'Move-OCIKeymanagementHsmClusterCompartment', 'Move-OCIKeymanagementKeyCompartment', 'Move-OCIKeymanagementVaultCompartment', 'New-OCIKeymanagementDataEncryptionKey', 'New-OCIKeymanagementEkmsPrivateEndpoint', 'New-OCIKeymanagementHsmCluster', 'New-OCIKeymanagementKey', 'New-OCIKeymanagementKeyVersion', 'New-OCIKeymanagementVault', 'New-OCIKeymanagementVaultReplica', 'Remove-OCIKeymanagementEkmsPrivateEndpoint', 'Remove-OCIKeymanagementVaultReplica', 'Restore-OCIKeymanagementKeyFromFile', 'Restore-OCIKeymanagementKeyFromObjectStore', 'Restore-OCIKeymanagementVaultFromFile', 'Restore-OCIKeymanagementVaultFromObjectStore', 'Stop-OCIKeymanagementHsmClusterDeletion', 'Stop-OCIKeymanagementKeyDeletion', 'Stop-OCIKeymanagementKeyVersionDeletion', 'Stop-OCIKeymanagementVaultDeletion', 'Update-OCIKeymanagementEkmsPrivateEndpoint', 'Update-OCIKeymanagementHsmCluster', 'Update-OCIKeymanagementKey', 'Update-OCIKeymanagementVault', 'Write-OCIKeymanagementPartitionCertificates' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Keymanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/410.ps1
410.ps1
function Convert-PsfMessageException { [CmdletBinding()] Param ( [Parameter(Mandatory = $true)] $Exception, [Parameter(Mandatory = $true)] [string] $FunctionName, [Parameter(Mandatory = $true)] [string] $ModuleName ) if ($null -eq $Exception) { return } $typeName = $Exception.GetType().FullName.ToLower() if ([PSFramework.Message.MessageHost]::ExceptionTransforms.ContainsKey($typeName)) { $scriptBlock = [PSFramework.Message.MessageHost]::ExceptionTransforms[$typeName] try { $tempException = $ExecutionContext.InvokeCommand.InvokeScript($false, ([scriptblock]::Create($scriptBlock.ToString())), $null, $Exception) return $tempException } catch { [PSFramework.Message.MessageHost]::WriteTransformError($_, $FunctionName, $ModuleName, $Exception, "Exception", ([System.Management.Automation.Runspaces.Runspace]::DefaultRunspace.InstanceId)) return $Exception } } if ($transform = [PSFramework.Message.MessageHost]::ExceptionTransformList.Get($typeName, $ModuleName, $FunctionName)) { try { $tempException = $ExecutionContext.InvokeCommand.InvokeScript($false, ([scriptblock]::Create($transform.ScriptBlock.ToString())), $null, $Exception) return $tempException } catch { [PSFramework.Message.MessageHost]::WriteTransformError($_, $FunctionName, $ModuleName, $Exception, "Target", ([System.Management.Automation.Runspaces.Runspace]::DefaultRunspace.InstanceId)) return $Exception } } return $Exception }
combined_dataset/train/non-malicious/sample_15_54.ps1
sample_15_54.ps1
<# .Synopsis Activate a Python virtual environment for the current PowerShell session. .Description Pushes the python executable for a virtual environment to the front of the $Env:PATH environment variable and sets the prompt to signify that you are in a Python virtual environment. Makes use of the command line switches as well as the `pyvenv.cfg` file values present in the virtual environment. .Parameter VenvDir Path to the directory that contains the virtual environment to activate. The default value for this is the parent of the directory that the Activate.ps1 script is located within. .Parameter Prompt The prompt prefix to display when this virtual environment is activated. By default, this prompt is the name of the virtual environment folder (VenvDir) surrounded by parentheses and followed by a single space (ie. '(.venv) '). .Example Activate.ps1 Activates the Python virtual environment that contains the Activate.ps1 script. .Example Activate.ps1 -Verbose Activates the Python virtual environment that contains the Activate.ps1 script, and shows extra information about the activation as it executes. .Example Activate.ps1 -VenvDir C:\Users\MyUser\Common\.venv Activates the Python virtual environment located in the specified location. .Example Activate.ps1 -Prompt "MyPython" Activates the Python virtual environment that contains the Activate.ps1 script, and prefixes the current prompt with the specified string (surrounded in parentheses) while the virtual environment is active. .Notes On Windows, it may be required to enable this Activate.ps1 script by setting the execution policy for the user. You can do this by issuing the following PowerShell command: PS C:\> Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser For more information on Execution Policies: https://go.microsoft.com/fwlink/?LinkID=135170 #> Param( [Parameter(Mandatory = $false)] [String] $VenvDir, [Parameter(Mandatory = $false)] [String] $Prompt ) <# Function declarations --------------------------------------------------- #> <# .Synopsis Remove all shell session elements added by the Activate script, including the addition of the virtual environment's Python executable from the beginning of the PATH variable. .Parameter NonDestructive If present, do not remove this function from the global namespace for the session. #> function global:deactivate ([switch]$NonDestructive) { # Revert to original values # The prior prompt: if (Test-Path -Path Function:_OLD_VIRTUAL_PROMPT) { Copy-Item -Path Function:_OLD_VIRTUAL_PROMPT -Destination Function:prompt Remove-Item -Path Function:_OLD_VIRTUAL_PROMPT } # The prior PYTHONHOME: if (Test-Path -Path Env:_OLD_VIRTUAL_PYTHONHOME) { Copy-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME -Destination Env:PYTHONHOME Remove-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME } # The prior PATH: if (Test-Path -Path Env:_OLD_VIRTUAL_PATH) { Copy-Item -Path Env:_OLD_VIRTUAL_PATH -Destination Env:PATH Remove-Item -Path Env:_OLD_VIRTUAL_PATH } # Just remove the VIRTUAL_ENV altogether: if (Test-Path -Path Env:VIRTUAL_ENV) { Remove-Item -Path env:VIRTUAL_ENV } # Just remove VIRTUAL_ENV_PROMPT altogether. if (Test-Path -Path Env:VIRTUAL_ENV_PROMPT) { Remove-Item -Path env:VIRTUAL_ENV_PROMPT } # Just remove the _PYTHON_VENV_PROMPT_PREFIX altogether: if (Get-Variable -Name "_PYTHON_VENV_PROMPT_PREFIX" -ErrorAction SilentlyContinue) { Remove-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Scope Global -Force } # Leave deactivate function in the global namespace if requested: if (-not $NonDestructive) { Remove-Item -Path function:deactivate } } <# .Description Get-PyVenvConfig parses the values from the pyvenv.cfg file located in the given folder, and returns them in a map. For each line in the pyvenv.cfg file, if that line can be parsed into exactly two strings separated by `=` (with any amount of whitespace surrounding the =) then it is considered a `key = value` line. The left hand string is the key, the right hand is the value. If the value starts with a `'` or a `"` then the first and last character is stripped from the value before being captured. .Parameter ConfigDir Path to the directory that contains the `pyvenv.cfg` file. #> function Get-PyVenvConfig( [String] $ConfigDir ) { Write-Verbose "Given ConfigDir=$ConfigDir, obtain values in pyvenv.cfg" # Ensure the file exists, and issue a warning if it doesn't (but still allow the function to continue). $pyvenvConfigPath = Join-Path -Resolve -Path $ConfigDir -ChildPath 'pyvenv.cfg' -ErrorAction Continue # An empty map will be returned if no config file is found. $pyvenvConfig = @{ } if ($pyvenvConfigPath) { Write-Verbose "File exists, parse `key = value` lines" $pyvenvConfigContent = Get-Content -Path $pyvenvConfigPath $pyvenvConfigContent | ForEach-Object { $keyval = $PSItem -split "\s*=\s*", 2 if ($keyval[0] -and $keyval[1]) { $val = $keyval[1] # Remove extraneous quotations around a string value. if ("'""".Contains($val.Substring(0, 1))) { $val = $val.Substring(1, $val.Length - 2) } $pyvenvConfig[$keyval[0]] = $val Write-Verbose "Adding Key: '$($keyval[0])'='$val'" } } } return $pyvenvConfig } <# Begin Activate script --------------------------------------------------- #> # Determine the containing directory of this script $VenvExecPath = Split-Path -Parent $MyInvocation.MyCommand.Definition $VenvExecDir = Get-Item -Path $VenvExecPath Write-Verbose "Activation script is located in path: '$VenvExecPath'" Write-Verbose "VenvExecDir Fullname: '$($VenvExecDir.FullName)" Write-Verbose "VenvExecDir Name: '$($VenvExecDir.Name)" # Set values required in priority: CmdLine, ConfigFile, Default # First, get the location of the virtual environment, it might not be # VenvExecDir if specified on the command line. if ($VenvDir) { Write-Verbose "VenvDir given as parameter, using '$VenvDir' to determine values" } else { Write-Verbose "VenvDir not given as a parameter, using parent directory name as VenvDir." $VenvDir = $VenvExecDir.Parent.FullName.TrimEnd("\\/") Write-Verbose "VenvDir=$VenvDir" } # Next, read the `pyvenv.cfg` file to determine any required value such # as `prompt`. $pyvenvCfg = Get-PyVenvConfig -ConfigDir $VenvDir # Next, set the prompt from the command line, or the config file, or # just use the name of the virtual environment folder. if ($Prompt) { Write-Verbose "Prompt specified as argument, using '$Prompt'" } else { Write-Verbose "Prompt not specified as argument to script, checking pyvenv.cfg value" if ($pyvenvCfg -and $pyvenvCfg['prompt']) { Write-Verbose " Setting based on value in pyvenv.cfg='$($pyvenvCfg['prompt'])'" $Prompt = $pyvenvCfg['prompt']; } else { Write-Verbose " Setting prompt based on parent's directory's name. (Is the directory name passed to venv module when creating the virtual environment)" Write-Verbose " Got leaf-name of $VenvDir='$(Split-Path -Path $venvDir -Leaf)'" $Prompt = Split-Path -Path $venvDir -Leaf } } Write-Verbose "Prompt = '$Prompt'" Write-Verbose "VenvDir='$VenvDir'" # Deactivate any currently active virtual environment, but leave the # deactivate function in place. deactivate -nondestructive # Now set the environment variable VIRTUAL_ENV, used by many tools to determine # that there is an activated venv. $env:VIRTUAL_ENV = $VenvDir if (-not $Env:VIRTUAL_ENV_DISABLE_PROMPT) { Write-Verbose "Setting prompt to '$Prompt'" # Set the prompt to include the env name # Make sure _OLD_VIRTUAL_PROMPT is global function global:_OLD_VIRTUAL_PROMPT { "" } Copy-Item -Path function:prompt -Destination function:_OLD_VIRTUAL_PROMPT New-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Description "Python virtual environment prompt prefix" -Scope Global -Option ReadOnly -Visibility Public -Value $Prompt function global:prompt { Write-Host -NoNewline -ForegroundColor Green "($_PYTHON_VENV_PROMPT_PREFIX) " _OLD_VIRTUAL_PROMPT } $env:VIRTUAL_ENV_PROMPT = $Prompt } # Clear PYTHONHOME if (Test-Path -Path Env:PYTHONHOME) { Copy-Item -Path Env:PYTHONHOME -Destination Env:_OLD_VIRTUAL_PYTHONHOME Remove-Item -Path Env:PYTHONHOME } # Add the venv to the PATH Copy-Item -Path Env:PATH -Destination Env:_OLD_VIRTUAL_PATH $Env:PATH = "$VenvExecDir$([System.IO.Path]::PathSeparator)$Env:PATH" # SIG # Begin signature block # MIIvIwYJKoZIhvcNAQcCoIIvFDCCLxACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBnL745ElCYk8vk # dBtMuQhLeWJ3ZGfzKW4DHCYzAn+QB6CCE8MwggWQMIIDeKADAgECAhAFmxtXno4h # MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z # ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z # G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ # anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s # Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL # 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb # BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3 # JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c # AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx # YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0 # viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL # T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud # EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf # Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk # aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS # PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK # 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB # cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp # 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg # dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri # RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7 # 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5 # nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3 # i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H # EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G # CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C # 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce # 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da # E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T # SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA # FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh # D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM # 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z # 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05 # huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY # mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP # /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T # AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD # VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG # A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV # HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU # cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN # BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry # sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL # IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf # Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh # OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh # dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV # 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j # wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH # Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC # XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l # /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW # eE4wggd3MIIFX6ADAgECAhAHHxQbizANJfMU6yMM0NHdMA0GCSqGSIb3DQEBCwUA # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwHhcNMjIwMTE3MDAwMDAwWhcNMjUwMTE1MjM1OTU5WjB8MQsw # CQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29uMRIwEAYDVQQHEwlCZWF2ZXJ0b24x # IzAhBgNVBAoTGlB5dGhvbiBTb2Z0d2FyZSBGb3VuZGF0aW9uMSMwIQYDVQQDExpQ # eXRob24gU29mdHdhcmUgRm91bmRhdGlvbjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAKgc0BTT+iKbtK6f2mr9pNMUTcAJxKdsuOiSYgDFfwhjQy89koM7 # uP+QV/gwx8MzEt3c9tLJvDccVWQ8H7mVsk/K+X+IufBLCgUi0GGAZUegEAeRlSXx # xhYScr818ma8EvGIZdiSOhqjYc4KnfgfIS4RLtZSrDFG2tN16yS8skFa3IHyvWdb # D9PvZ4iYNAS4pjYDRjT/9uzPZ4Pan+53xZIcDgjiTwOh8VGuppxcia6a7xCyKoOA # GjvCyQsj5223v1/Ig7Dp9mGI+nh1E3IwmyTIIuVHyK6Lqu352diDY+iCMpk9Zanm # SjmB+GMVs+H/gOiofjjtf6oz0ki3rb7sQ8fTnonIL9dyGTJ0ZFYKeb6BLA66d2GA # LwxZhLe5WH4Np9HcyXHACkppsE6ynYjTOd7+jN1PRJahN1oERzTzEiV6nCO1M3U1 # HbPTGyq52IMFSBM2/07WTJSbOeXjvYR7aUxK9/ZkJiacl2iZI7IWe7JKhHohqKuc # eQNyOzxTakLcRkzynvIrk33R9YVqtB4L6wtFxhUjvDnQg16xot2KVPdfyPAWd81w # tZADmrUtsZ9qG79x1hBdyOl4vUtVPECuyhCxaw+faVjumapPUnwo8ygflJJ74J+B # Yxf6UuD7m8yzsfXWkdv52DjL74TxzuFTLHPyARWCSCAbzn3ZIly+qIqDAgMBAAGj # ggIGMIICAjAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4E # FgQUt/1Teh2XDuUj2WW3siYWJgkZHA8wDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQM # MAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0wgaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRp # Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNI # QTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRwOi8vY3JsNC5kaWdpY2VydC5jb20v # RGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0Ex # LmNybDA+BgNVHSAENzA1MDMGBmeBDAEEATApMCcGCCsGAQUFBwIBFhtodHRwOi8v # d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUF # BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu # aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZI # hvcNAQELBQADggIBABxv4AeV/5ltkELHSC63fXAFYS5tadcWTiNc2rskrNLrfH1N # s0vgSZFoQxYBFKI159E8oQQ1SKbTEubZ/B9kmHPhprHya08+VVzxC88pOEvz68nA # 82oEM09584aILqYmj8Pj7h/kmZNzuEL7WiwFa/U1hX+XiWfLIJQsAHBla0i7QRF2 # de8/VSF0XXFa2kBQ6aiTsiLyKPNbaNtbcucaUdn6vVUS5izWOXM95BSkFSKdE45O # q3FForNJXjBvSCpwcP36WklaHL+aHu1upIhCTUkzTHMh8b86WmjRUqbrnvdyR2yd # I5l1OqcMBjkpPpIV6wcc+KY/RH2xvVuuoHjlUjwq2bHiNoX+W1scCpnA8YTs2d50 # jDHUgwUo+ciwpffH0Riq132NFmrH3r67VaN3TuBxjI8SIZM58WEDkbeoriDk3hxU # 8ZWV7b8AW6oyVBGfM06UgkfMb58h+tJPrFx8VI/WLq1dTqMfZOm5cuclMnUHs2uq # rRNtnV8UfidPBL4ZHkTcClQbCoz0UbLhkiDvIS00Dn+BBcxw/TKqVL4Oaz3bkMSs # M46LciTeucHY9ExRVt3zy7i149sd+F4QozPqn7FrSVHXmem3r7bjyHTxOgqxRCVa # 18Vtx7P/8bYSBeS+WHCKcliFCecspusCDSlnRUjZwyPdP0VHxaZg2unjHY3rMYIa # tjCCGrICAQEwfTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu # Yy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJT # QTQwOTYgU0hBMzg0IDIwMjEgQ0ExAhAHHxQbizANJfMU6yMM0NHdMA0GCWCGSAFl # AwQCAQUAoIHIMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcC # AQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBnAZ6P7YvTwq0fbF62 # o7E75R0LxsW5OtyYiFESQckLhjBcBgorBgEEAYI3AgEMMU4wTKBGgEQAQgB1AGkA # bAB0ADoAIABSAGUAbABlAGEAcwBlAF8AdgAzAC4AMQAyAC4AMwBfADIAMAAyADQA # MAA0ADAAOQAuADAAMaECgAAwDQYJKoZIhvcNAQEBBQAEggIAhvmA8nPNyn7jYkuO # UobHjUZGgjE7xB8BnrDg5IErORsyIbCSQpdJ4oJ4cnEiVFElql5hVsEY6JWfguaj # zELkcgfK5etJxPtNSua/FiBbXqitnDNyHtReLTb+u/T5110GDiTMzpytPorKc21h # 6VRXrPmjSTp+Nuji0lulPR9KN6Lxua72t/LZYfT83iZD0eP7rnDoLHqoslb5llEV # CaKgLZ8ap8l5uDwHqMm4FYvU9BswEcTQ75wD7jFQd5yGpOzht0hWjAgq9C+nI4Uu # nygUpyj1XUAw9FaeRYiVtI0+hkmLNSkUELScNsyFSpZEOJWii3nKkRcupSp8YORJ # d24/DjkUuNQMzlHDoVX07E8MFnzzGtgftoRilePSS6qer/RC+SHb18ioY4F0l/EU # A8xb+ztHHdeR7OuThn4S/1TMCYJdmqUYpIkmAt1dG/eUlkp+R1DY1KdpT71L828L # XgWipnS0PJuHSrWb428U7uF439jB2HjI35a5QclApg2UTeDPQvE0GhLPfJyJCYZ8 # UYLtbOnd82M4pUJvU6NKmfxZuT2OhsXxQPDTwaqdKaVaBupPbsSTC0o58uarJSSi # G5pj4NQyyt1IvZmM2ESV/FufDG5/zSoJ+HO5Ah/AV5ikPlgGwzjdY8vG2CSYJ9os # kU9LigwvXmSH/4QYoWN7NtCTCAuhghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcn # BgkqhkiG9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3 # DQEJEAEEoGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgOm4M # dN4NqIa6dQy8bSjVKj542yV4A8OJPLti6aa7ZLUCEGqMmddBL+N1YSiZhxqcmY0Y # DzIwMjQwNDA5MTQ0MTE2WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f # 5WEWMA0GCSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdp # Q2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2 # IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEz # MjM1OTU5WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x # IDAeBgNVBAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6 # OyqcZ9xiFVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp # 52n+W8PWKyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF # 6g1hbJ3+cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G4 # 5lKVtUfXeCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7p # Be6q9iT1HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAs # NJvj3m5kGQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU # 6mIIE9NpHnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwK # WEwAPoVpdceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFx # smxxrz64b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbR # yV8IpHCj7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPL # QHsCAwEAAaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYG # A1UdJQEB/wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCG # SAGG/WwHATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4E # FgQUpbbvE+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov # L2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1 # NlRpbWVTdGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUH # MAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDov # L2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNI # QTI1NlRpbWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCp # tZgXvHCNT4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX # 4WCcK+3tPUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoF # eoQpmLZXeY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+nji # kxp2oml101DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBB # Jt3eWpdPM43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJ # A+rUkTfvTVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcs # QdCaM0qoNtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE # 5jreODsHXjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS # 2Dq4sUaGa7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3 # CtQC4Fxguyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUb # c7aZ+WssBkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR8 # 2Ees/ShmKl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0z # NzAzMjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 # NiBUaW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDGhjUGSbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI # 82j6ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9 # xBd/qxkrPkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ # 3HxqV3rwN3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5Emfv # DqVjbOSmxR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDET # qVcplicu9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHe # IhTZgirHkr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jo # n7ZGs506o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ # 9FHzNklNiyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/T # Xkt2ElGTyYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJg # o1gJASgADoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkw # EgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+e # yG8wHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQD # AgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEF # BQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRw # Oi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNy # dDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGln # aUNlcnRUcnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglg # hkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGw # GC4QTRPPMFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0 # MWfNthKWb8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1D # X+1gtqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw # 1YpxdmXazPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY # +/umnXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0I # SQ+UzTl63f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr # 5Dhzq6YBT70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7y # Rp11LB4nLCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDop # hrCYoCvtlUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/ # AAvkdgIm2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMO # Hds3OBqhK/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkq # hkiG9w0BAQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5j # MRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBB # c3N1cmVkIElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5 # WjBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQL # ExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJv # b3QgRzQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1K # PDAiMGkz7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2r # snnyyhHS5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C # 8weE5nQ7bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBf # sXpm7nfISKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGY # QJB5w3jHtrHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8 # rhsDdV14Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaY # dj1ZXUJ2h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+ # wJS00mFt6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw # ++hkpjPRiQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+N # P8m800ERElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7F # wI+isX4KJpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUw # AwEB/zAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAU # Reuir/SSy4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEB # BG0wazAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsG # AQUFBzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1 # cmVkSURSb290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRp # Z2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAow # CDAGBgRVHSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/ # Vwe9mqyhhyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLe # JLxSA8hO0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE # 1Od/6Fmo8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9Hda # XFSMb++hUD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbO # byMt9H5xaiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYID # djCCA3ICAQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu # Yy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYg # VGltZVN0YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUA # oIHRMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcN # MjQwNDA5MTQ0MTE2WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4Jd # zqqKycZPGZzPQDAvBgkqhkiG9w0BCQQxIgQgZm7KOZQwUzSPGy0QMkwOOcWaG+w5 # Nm03VWlT93Aec3QwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBX # aEE2b4KK2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIATk+R26sfZdRy # JMi4Ei4Xaj5TwNTbaUxG2P3ggvT5YpIxZobFK2OohvHFyr8g3ipihMeFc4LdruGS # y/8GNua9BnUIYHBXMaxEtxYtiIs32a1R73VSoL/RHVXt/kNI0818/wVOI1aCZdt5 # MJpjiopPNuneZqH5iym6URk1bvrKlWMFhgA8VggbqQwKiqEtVM7Fy744tuDQjqvE # 5TG0Ts298gWzsDnwknFei8RKrbCsr+TRIQ5mWvs9zIBo6d2Rs+JMclGjTwJ71o50 # Tcq7LgVDldWXARib9mQJmagw+y5LkG66W8I+i1mwQ/9Ur2Lrwnophg7F1HkODXI+ # 7i3qeNDmnZLXiQM2WTsZ8OlEygAbFtE+ue4ucwFAMbh+1DRCOuwQoN2JMFGNtcj5 # cbhBBb7am6mYGzg7sGvM7inLEKRV+pqJx1gV/SG+DIVQrHzdlvWTdRmJHIDBMqxr # fpnulV80FMuiBJXvKU0RYEgQHw9QDyUNhdQeXSjBd9myt0EW2WyJLY3cYzjmZE1A # AcQePJfMbMfYuIBtz7rIXZKNL7/wznLalKxS4aulS7chi5qRiaPJG3lFhlMx//cD # 91DxPlbbpCymSjO+3aMRAZyEXjmpHPbROZDSkqLXFf8OYcw4uUZLPLxjbmbZM1hH # dz3vPpscd6J1Tz93GwJu/8fZvMEYDjo= # SIG # End signature block
combined_dataset/train/non-malicious/sample_28_15.ps1
sample_28_15.ps1
@{ GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" NestedModules="Microsoft.PowerShell.Commands.Management.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' FunctionsToExport = @() AliasesToExport = @("gcb", "gin", "gtz", "scb", "stz") CmdletsToExport=@("Add-Content", "Clear-Content", "Get-Clipboard", "Set-Clipboard", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-ChildItem", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Test-Connection", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Remove-ItemProperty", "Rename-ItemProperty", "Resolve-Path", "Get-Service", "Stop-Service", "Start-Service", "Suspend-Service", "Resume-Service", "Restart-Service", "Set-Service", "New-Service", "Remove-Service", "Set-Content", "Set-ItemProperty", "Restart-Computer", "Stop-Computer", "Rename-Computer", "Get-ComputerInfo", "Get-TimeZone", "Set-TimeZone", "Get-HotFix", "Clear-RecycleBin") } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOkUHfBYP8n8JI # rFMR/Pi6BPlAC/b/pz0LBmd3yrLJC6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG8C # gBXFFJ/2vAtXu5Tg5CsnXsYj0AU0agFGmPJaSF8WMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAER8fpwwiL8Ker9uzLQTXchlVPS2mvxp6QtnD # 3t4uwBDUTK/QQSR/rUmCJfquVcq8dKLF/qXawg7BPP8WN8UNNLpoK/wkQB2xqyVK # c5ryQRrYi3OiR1AlQO8fbd/mTPdx0n5mUYkZ7A+Ci/pm4erKmLCoyNhMZg958mp9 # e9UtiPOE0gcMD/XSSjAXnzQe8s2lODmj651SAWp5g4c7irgCEl61I3TzazBSeMEU # aAZXwhfMaGgRdZd1k0nexj2CaF9C/rVZa3ZLx880kV7M+UCNXvNoE9pa73XZIKbP # 3B+ga0l9dsBBfKlDLhu1ZvTjT0lfmrTxMZmojA/q12k3OJtERaGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC35EcF8PBCyV/56ap+VaG58sKgcqnWaNxt # mrfgFR1eQwIGZfypflVoGBMyMDI0MDQxNzE0NDMyMS45NDZaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM # wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI # syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra # GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn # iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF # LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl # BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7 # rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg # 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db # USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f # dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV # PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph # jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g # 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT # MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz # /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d # h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW # zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1 # qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h # sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q # wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06 # 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0 # bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf # SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnKFXMwIhgPMjAyNDA0MTcxNzMxMzFaGA8yMDI0MDQx # ODE3MzEzMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6coVcwIBADAHAgEAAgIc # XjAHAgEAAgIRfDAKAgUA6ctm8wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AGHj8sVzfh0uupx47pHvZZjzq36biRHek7Y7t2YX9eJmkgbps2NAu8/BJb/d1PG6 # ESW5UZZV/5aUie1uYUP7UmPkqIyO78ZDNCiR98gnU0FLApnERB3oP7qxLe/O5IUk # bIHHaht67sWrhtsQ1g4Q0j6/6ePSfdteDb7+TpdEGDhiMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA # AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgu0a1ix6Lt96aVAy4enqfHyUwQBK2Ceu1Q5BqAXWy # JikwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0 # Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIO0GtXpb51D31Pe5k2EeH+UC # eNSHTxSqH63fPlmSQBsnMA0GCSqGSIb3DQEBCwUABIICACgsfNsT1d3aCjHyylIQ # YVKnZWrxmBAIyroKsjqr6Z8EZq78xKndYMVZN6wzVBQD7yODZtbgW3RuUqmHaNOM # gCNdFtMkcRWoX0UCx/THbpXhX0IdhRVcqIWlxdVkcO4OLlZMbof2V7Z4/FGirV8c # OVvSQYE6p8xx4n0DxNHsuqvN/Kk76bG16YyBIMzVIoQimIPPMSKFT6n/9QQ+oOt+ # XSk8E1Y3CNcHjL87EkkZLZEa36PB2KkXbE8WfkJIqzK061GqjRLagiJpkZ1o1vGR # U7bIJUU7yEwDfv/kX7m0CQ2Q+HP80xrgv9dLl8FdosEX78ydtYwiPwwt+ps/q7sX # GP+WQWbhule/HGpy6pCM50q1G5hJ9xMoMf1wn4Y7WXmcnJlzNUGeygWXt+y9EPX0 # iVbeOn8S6C8vD0yf8sHPs0ZezV2oZiapIDCdtnHy3h1aQTACrYJN+lB57ZgRZyTN # CJrNUavQ3sH2AMu1twDIUCX0/ZgA5xK1Wpi1KVwBwLFgp0If8qGL39JX33SkoMQx # a4WgwcmXzH2KdPhGILGyP0NTF9k1r11F9I+1isxzA7b55r15hDYOUTJ3sis0m0+Z # GjFej1ZuPC4JMa2+yc3C0qlFQAercyYgOcFbNuNl/CrgepsU4oEoqBvojlZC66vR # r/BjffluGaQ6kZCDe1evlUf4 # SIG # End signature block
combined_dataset/train/non-malicious/sample_44_90.ps1
sample_44_90.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Creates or updates an environment. .Description Creates or updates an environment. .Example {{ Add code here }} .Example {{ Add code here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.Api20231001Preview.IEnvironment .Inputs Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.IDevCenterdataIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. BODY <IEnvironment>: Properties of an environment. CatalogName <String>: Name of the catalog. DefinitionName <String>: Name of the environment definition. Type <String>: Environment type. [Parameter <IAny>]: Parameters object for the environment. [Code <String>]: An identifier for the error. Codes are invariant and are intended to be consumed programmatically. [Detail <ICloudErrorBody[]>]: A list of additional details about the error. Code <String>: An identifier for the error. Codes are invariant and are intended to be consumed programmatically. Message <String>: A message describing the error, intended to be suitable for display in a user interface. [Detail <ICloudErrorBody[]>]: A list of additional details about the error. [Target <String>]: The target of the particular error. For example, the name of the property in error. [Message <String>]: A message describing the error, intended to be suitable for display in a user interface. [OperationLocation <String>]: [Target <String>]: The target of the particular error. For example, the name of the property in error. INPUTOBJECT <IDevCenterdataIdentity>: Identity Parameter [Name <String>]: The name of an action that will take place on a Dev Box. [CatalogName <String>]: The name of the catalog [DefinitionName <String>]: The name of the environment definition [DevBoxName <String>]: The name of a Dev Box. [EnvironmentName <String>]: The name of the environment. [Id <String>]: Resource identity path [PoolName <String>]: The name of a pool of Dev Boxes. [ProjectName <String>]: The DevCenter Project upon which to execute operations. [ScheduleName <String>]: The name of a schedule. [UserId <String>]: The AAD object id of the user. If value is 'me', the identity is taken from the authentication context. .Link https://learn.microsoft.com/powershell/module/az.devcenter/new-azdevcenteruserenvironment #> function New-AzDevCenterUserEnvironment { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName = 'CreateExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(ParameterSetName = 'CreateExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Uri')] [System.String] # The DevCenter-specific URI to operate on. ${Endpoint}, [Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Uri')] [Alias('DevCenter')] [System.String] # The DevCenter upon which to execute operations. ${DevCenterName}, [Parameter(ParameterSetName = 'CreateExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)] [Alias('EnvironmentName')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')] [System.String] # The name of the environment. ${Name}, [Parameter(ParameterSetName = 'CreateExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')] [System.String] # The DevCenter Project upon which to execute operations. ${ProjectName}, [Parameter(ParameterSetName = 'CreateExpanded')] [Parameter(ParameterSetName = 'CreateExpandedByDevCenter')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.DefaultInfo(Script = '"me"')] [System.String] # The AAD object id of the user. # If value is 'me', the identity is taken from the authentication context. ${UserId}, [Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.IDevCenterdataIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName = 'CreateExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')] [System.String] # Name of the catalog. ${CatalogName}, [Parameter(ParameterSetName = 'CreateExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')] [System.String] # Name of the environment definition. ${EnvironmentDefinitionName}, [Parameter(ParameterSetName = 'CreateExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory)] [Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory)] [Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')] [System.String] # Environment type. ${EnvironmentType}, [Parameter(ParameterSetName = 'CreateExpanded')] [Parameter(ParameterSetName = 'CreateViaIdentityExpanded')] [Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter')] [Parameter(ParameterSetName = 'CreateExpandedByDevCenter')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.Api20231001Preview.IEnvironmentUpdatePropertiesParameters]))] [System.Collections.Hashtable] # Parameters object for the environment. ${Parameter}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')] [System.DateTime] # The time the expiration date will be triggered (UTC), after which the environment and associated resources will be deleted. ${ExpirationDate}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if (-not $PSBoundParameters.ContainsKey('Endpoint')) { $Endpoint = GetEndpointFromResourceGraph -DevCenterName $DevCenterName -Project $ProjectName $null = $PSBoundParameters.Add("Endpoint", $Endpoint) $null = $PSBoundParameters.Remove("DevCenterName") } else { $Endpoint = ValidateAndProcessEndpoint -Endpoint $Endpoint $PSBoundParameters["Endpoint"] = $Endpoint } Az.DevCenterdata.internal\New-AzDevCenterUserEnvironment @PSBoundParameters } } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDPhWsEYC6op7tD # Ox0jo47BRJrLWoyORDMBpxLnO+nykKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGi+ # APWTzbS7wuOaAyWoA+KqewZaLPz6l36tlda/vpqzMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAfyuhVf3pFtzhtRXNaOCGeOPA6aD9g9jcktuY # Z9DPJwTbfkS4H7D68nZEQXVDv0/KUlpkq6Le6kZGupLIy63PcO1ChAhgzTEGL9QG # h4MFIxj8guHTIUqYjft24QI7dITVZTNwgOclywugbUcNtO6a2V16MNdTZKSYNU7f # 7xojtBT+jpVw3pds8jJdLtrh0S9T53lt/NiNUGFyu93av+dDzeD5Mm/MElWDExca # Gz+xSfM3/fgweBD34+xqEKxQL8ZKGWZQtgpMiFaHGEa1W5yQQCc0OUO6kI6+t1AR # c4fxTBtX5emIJvpxy+gsAmZ0KzlGiOxuvwK8Vg5gJHAgXKV+qKGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAGdre21ue4+vjNbnVSmxbGJlEvp5Ns6xz0 # YxIjY2nkYAIGZh/+xT6TGBMyMDI0MDQyMzEzMTUxNy42MDZaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd # ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO # A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g # 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v # FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm # v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR # KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj # lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY # C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834 # bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu # YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w # pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I # l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy # vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS # mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx # vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q # Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k # VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm # i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp # upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY # h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW # InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU # hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi # DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnRvQQwIhgPMjAyNDA0MjMxMjUyMjBaGA8yMDI0MDQy # NDEyNTIyMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dG9BAIBADAHAgEAAgIH # /zAHAgEAAgISKDAKAgUA6dMOhAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AEtAJf9QQUkfnjakWpA/WTJ4s59d1ydd1YCu0doiQ7zKrtg+fPXaO+UnceDABE97 # pgPadQ3qu9K0ikm1c/cMWaf6FyR3t7zee3PwsEGTk2CPIUwLCYrMasurESYCykjm # cyo5aeimsVVRSCr36tnZYZLeD4pEzDs6hAxbbMfDl26nMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA # Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgKLrX/TrwloYEuW0hTcUcSNxSFJHSJyjOB9OGQcGX # d5cwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3 # 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIOmVHNIZrArpRiTxre+ot/Sc # GrSRpjA9BFR2kZJAoOaAMA0GCSqGSIb3DQEBCwUABIICAGljHPiVicsnWGoklKSC # cxh6O8KwnW6/NTwFqaIVU8+S4dHFEURhBSw8ZUZW9Jgqz/O2w5Vdz4zf/rPH7FP/ # af/LvnIc6m0hJkU1olsnKm6TJJHk/11ECNDQJwFYeQfnES8xPMoa536bd3Glc3Os # Rti3ac3IbyXLZqLiZSuIwGIA6T+g8Mu7UJUZgsvIVty1ABR7rAG+hnulClNbc5FX # +dbKKw6a9YTA3QtS8tam1LggKNZ6KT4upMwFxeCiwDoEjeTvNxbbhBHxAjIU89L9 # 7uHqQxd8/39Vle9M5J4ChF7aJ48UKwC1tKQd60ub9opJjYNZS2yUJ5lchtDmx9Wc # 4MF9+pUv0rrjchhRykEk+IMXiAwpJIuvA0mNm6bl0SjwZjN+N0RZ1MhBBV9HLIko # RmJ9S+l0l9Ds0/A4SUXbp9FyAbuIJcQABDcmEUQ3c1KbJsbGpEDBIH10ryWUIipi # aBTgp7Fy2mPrdm96+UxyfUv+E7/CU71neUgIkLwraDEK/1RbMfttn3VY0qWy/i6X # pWuem1YHVvKxNDugLAe61jAZk8+IfYsJdA9y0HlrepykAgroXWAxgbL5fFATBt4T # YXyNBQtaYr2TM+vI0MFSa1nhEl8fr8Lga5XNgVhNhE5I26XQBRXO+eiGhuVQ0o43 # SCwBqeV8/9nf/cMT7YnAlTen # SIG # End signature block
combined_dataset/train/non-malicious/sample_15_0.ps1
sample_15_0.ps1
#************************************************ # DC_ExchangeServerEventLogs.ps1 # Version 1.2.0 # Date: 2013-05-21 # Author: Brian Prince - brianpr@microsoft.com # Description: This script calls TS_GetEvents.ps1 to export Exchange Server and backup -related event logs #************************************************ PARAM([array]$EventLogNames=("Application","System"), $OutputFormats="", $ExclusionList="", $Days="", $EventLogAdvisorAlertXMLs ="", $SectionDescription="", $Prefix=$null, $Suffix=$null, $Query=$Null) #if($debug -eq $true){[void]$shell.popup("Run DC_ExchangeServerEventLogs.ps1")} Import-LocalizedData -BindingVariable ExchangeEventLogsStrings If ($Days -ne $null) { $Days = $Days } Else { $Days = 14 #Set default to fourteen days } #,"Microsoft-Windows-VHDMP/Operational" If ([environment]::osversion.Version.Major -gt 5) { $EventLogNames += "MSExchange Management","Exchange Auditing","Windows PowerShell" # Get all event logs with "Microsoft-Exchange" in event log name # specifically excluding most chatty/huge Exchange 2013 logs $EventLogNames += wevtutil.exe el | Select-String "Microsoft-Exchange" | Where-Object { ($_ -notlike "*-ActiveMonitoring/Maintenance*") -and ($_ -notlike "*-ActiveMonitoring/Monitor*") -and ($_ -notlike "*-ActiveMonitoring/Probe*") -and ($_ -notlike "*-ActiveMonitoring/Responder*") -and ($_ -notlike "*-HighAvailability/AppLogMirror") -and ($_ -notlike "*-HighAvailability/Monitoring") -and ($_ -notlike "*-ManagedAvailability/Invoke*") -and ($_ -notlike "*-ManagedAvailability/Monitoring*") -and ($_ -notlike "*-ManagedAvailability/Recovery*") -and ($_ -notlike "*-ManagedAvailability/Remote*") -and ($_ -notlike "*-ManagedAvailability/Startup*") } "EventLogNames: $EventLogNames" | WriteTo-StdOut .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -ExclusionList $ExclusionList -Days $Days -OutputFormats ("CSV","evtx") } Else { .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -ExclusionList $ExclusionList -Days $Days -OutputFormats ("CSV") } #.\TS_GetEvents.ps1 -EventLogNames $EventLogNames -ExclusionList $ExclusionList -Days $Days -OutputFormats ("CSV","evtx","evt") #-EventLogAdvisorAlertXMLs $EventLogAdvisorAlertXMLs # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDLCGmTqhybOTv9 # IUhMb6EMWyXGEz01miN8TPjB/KWa3aCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOQ2 # c1qMgg3rayFzCK1jPyXErEy1bpZqUuwDp8goZF/dMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEARWV1w1kEM7iac06PrDuvaljcCxx9AzLHSRGj # /W5qw75sgxgXKnSwAAToO38xiWP56s45+/TWrW+Pf3wIbcQyty7TVKrgApNDDVgH # RgNLEPqUGep+4BhT1JCAv60NPwYB0UoUvISVxoFrludmt4QMkrMOHOut6kRJ50YS # 4bVuJB07HElHblU/FY1C8Ln1htfGgMATv6cMm/6GrxuEVUPymSsp5sg84cf3EivT # XuW+WmGnuUvmHYA81lCO3ou/J3+1U+QMvneNyaqfSEUjZ+Dofu7y0fWYTIGb7NDG # SNjFnWW5ab8bKwpXz5J9Zu0TpSK6DaFabs++VERlOifeDfumy6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCD/l1VJXmD1sqxvrwA1LlILQtUee17J9nrE # 0zuG2wqdWQIGZutZ6YJ5GBMyMDI0MTAyODExNDA0NC40MjJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX # qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF # IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN # XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6 # cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN # h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69 # l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC # qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt # xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V # 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH # 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+ # nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL # ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i # O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q # +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF # RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d # 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di # rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+ # yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M # k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb # YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l # T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip # L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0 # MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA # AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr # /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3 # qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3 # 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk # wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP # 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQg2Kdt6tppM3nyTbjf1NveAY8Du0L0gnIEqoApsgcLOHIwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI # k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad # RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAGmqypxnNdIkWNxrxQATwHHp3jz5eMdW # TghS2P9ZzXiUH/7+QJuZBP7Kdbi3IR3K7kxmCRrKrru/RryPJjg1Y//i2fUhQH2V # DWzfXP/D2LGOYIT2hGffXPyMJyM/1RKizt8j098ZpRCguegszcj2w9olkEehs0e2 # 2sZPsH6kiYCJ+EGEoy+nCiN0E0bmo2nnbghHuJX/BZqauCMXuwJM3qK/adBpttl+ # 1YowRXuCwfTFnjnnZ1VjiMdbFatd47U6Bma4sOZ266ZN499xfbWNiexZIyFvwmiM # WP4jE0bVf1x0nGctPANy842K2naNoeGCSBggSm4LPLJDogBc9Rs6+Er5KVceDBzp # kJhNWnXcVPDLQi6q7Wwoo5dBdMVgg7GzzfKHwlUJoRHi6HJ5q6RGKvhUwNoW5dE4 # hkXBFF16cC60BS6mt8bNQ4y+GGFbTQBXZRWmpWAEJ99pN6XW4wpRMHE/N/nlyqDE # I5wTaFvcM5v21+pFAry9o1PGtdgAXguWEwrwEFHw7D6Js4ypG3umT/EQhUdhcfHo # SrCRqkujvkre30Akt08Lyii0K52qwBxkoFyYobP5/Gl8lFBW6eoZ9sq1coR7Is8E # +ExUKJXM56jJG+r2keJ9iFEZff9+oen9zx3QMevwed7VCgArj/W6dKVjtlQSfUMx # uMDFgsVRoqMR # SIG # End signature block
combined_dataset/train/non-malicious/2846.ps1
2846.ps1
function LoadModules { $currentConfig = $psake.context.peek().config if ($currentConfig.modules) { $scope = $currentConfig.moduleScope $global = [string]::Equals($scope, "global", [StringComparison]::CurrentCultureIgnoreCase) $currentConfig.modules | ForEach-Object { resolve-path $_ | ForEach-Object { "Loading module: $_" $module = Import-Module $_ -passthru -DisableNameChecking -global:$global if (!$module) { throw ($msgs.error_loading_module -f $_.Name) } } } "" } }
combined_dataset/train/non-malicious/Snippet Compiler_2.ps1
Snippet Compiler_2.ps1
#Required 2.0 $def = $(if ((gi .).FullName -eq (gi .).Root) { ([string](gi .).Root).TrimEnd("\\") } else { (gi .).FullName } ) ################################################################################################## $mnuOpen_Click= { (New-Object Windows.Forms.OpenFileDialog) | % { $_.FileName = "source" $_.Filter = "C# (*.cs)|*.cs" $_.InitialDirectory = $def if ($_.ShowDialog() -eq [Windows.Forms.DialogResult]::OK) { $sr = New-Object IO.StreamReader $_.FileName $txtEdit.Text = $sr.ReadToEnd() $sr.Close() } } } $mnuFont_Click= { (New-Object Windows.Forms.FontDialog) | % { $_.Font = "Lucida Console" $_.MinSize = 10 $_.MaxSize = 12 $_.ShowEffects = $false if ($_.ShowDialog() -eq [Windows.Forms.DialogResult]::OK) { $txtEdit.Font = $_.Font } } } $mnuOpaF_Click= { $frmMain.Opacity = 1 $cur.Checked = $false $mnuOpaF.Checked = $true $cur = $mnuOpaF } $mnuWrap_Click= { $toggle =! $mnuWrap.Checked $mnuWrap.Checked = $toggle $txtEdit.WordWrap = $toggle } $tbTools_ButtonClick= { switch ($_.Button.Tag) { "Atom" { Invoke-Atom; break } "Progress" { Show-Panel $mnuToS1 $scSplt1; break } "Params" { Show-Panel $mnuToS2 $scSplt2; break } "Build" { Invoke-Builder; break } "BuildEx" { Start-AfterBuilding; break } "Exit" { $frmMain.Close(); break } } } $cboPlat_SelectedIndexChanged= { switch ($cboPlat.SelectedIndex) { "0" { $lboRefs.Items.Remove("`"System.Core.dll`""); break } "1" { $lboRefs.Items.Add("`"System.Core.dll`""); break } } } $chkExec_Click= { switch ($chkExec.Checked) { $true { $txtIOut.Text = $def + '\\app.exe' $chkWApp.Enabled = $true $chkIMem.Enabled = $false $mnuBnRA.Enabled = $true $btnBnRA.Enabled = $true break } $false { $txtIOut.Text = $def + '\\lib.dll' $chkWApp.Enabled = $false $chkIMem.Enabled = $true $mnuBnRA.Enabled = $false $btnBnRA.Enabled = $false break } } } $chkWApp_Click= { switch ($chkWApp.Checked) { $true { $lboRefs.Items.AddRange(@("`"System.Drawing.dll`"", "`"System.Windows.Forms.dll`"")) break } $false { $lboRefs.Items.Remove("`"System.Windows.Forms.dll`"") $lboRefs.Items.Remove("`"System.Drawing.dll`"") break } } } $mnuICnM_Click= { $script:buff = $lboRefs.SelectedItem $lboRefs.Items.Remove($lboRefs.SelectedItem) } $mnuIIns_Click= { (New-Object Windows.Forms.OpenFileDialog) | % { $_.Filter = "PE File (*.dll)|*.dll" $_.InitialDirectory = [Runtime.InteropServices.RuntimeEnvironment]::GetRuntimeDirectory() if ($_.ShowDialog() -eq [Windows.Forms.DialogResult]::OK) { $lboRefs.Items.Add('"' + (Split-Path -leaf $_.FileName) + '"') } } } $frmMain_Load= { $txtIOut.Text = $def + '\\app.exe' $sbPnl_2.Text = "Str: 1, Col: 0" $lboRefs.Items.Add("`"System.dll`"") } ################################################################################################## function frmMain_Show { Add-Type -AssemblyName System.Windows.Forms [Windows.Forms.Application]::EnableVisualStyles() $ico = [Drawing.Icon]::ExtractAssociatedIcon($($PSHome + '\\powershell_ise.exe')) $cdcp = New-Object CodeDom.Compiler.CompilerParameters $dict = New-Object "Collections.Generic.Dictionary[String, String]" $dict.Add("CompilerVersion", "v3.5") $frmMain = New-Object Windows.Forms.Form $mnuMain = New-Object Windows.Forms.MainMenu $mnuFile = New-Object Windows.Forms.MenuItem $mnuAtom = New-Object Windows.Forms.MenuItem $mnuOpen = New-Object Windows.Forms.MenuItem $mnuEmp1 = New-Object Windows.Forms.MenuItem $mnuExit = New-Object Windows.Forms.MenuItem $mnuEdit = New-Object Windows.Forms.MenuItem $mnuUndo = New-Object Windows.Forms.MenuItem $mnuEmp2 = New-Object Windows.Forms.MenuItem $mnuCopy = New-Object Windows.Forms.MenuItem $mnuPast = New-Object Windows.Forms.MenuItem $mnuICut = New-Object Windows.Forms.MenuItem $mnuEmp3 = New-Object Windows.Forms.MenuItem $mnuSAll = New-Object Windows.Forms.MenuItem $mnuView = New-Object Windows.Forms.MenuItem $mnuFont = New-Object Windows.Forms.MenuItem $mnuEmp4 = New-Object Windows.Forms.MenuItem $mnuOpac = New-Object Windows.Forms.MenuItem $mnuOp50 = New-Object Windows.Forms.MenuItem $mnuOp60 = New-Object Windows.Forms.MenuItem $mnuOp70 = New-Object Windows.Forms.MenuItem $mnuOp80 = New-Object Windows.Forms.MenuItem $mnuOp90 = New-Object Windows.Forms.MenuItem $mnuOpaF = New-Object Windows.Forms.MenuItem $mnuTgls = New-Object Windows.Forms.MenuItem $mnuWrap = New-Object Windows.Forms.MenuItem $mnuToS1 = New-Object Windows.Forms.MenuItem $mnuToS2 = New-Object Windows.Forms.MenuItem $mnuMake = New-Object Windows.Forms.MenuItem $mnuBAsm = New-Object Windows.Forms.MenuItem $mnuBnRA = New-Object Windows.Forms.MenuItem $mnuHelp = New-Object Windows.Forms.MenuItem $mnuInfo = New-Object Windows.Forms.MenuItem $tbTools = New-Object Windows.Forms.ToolBar $btnAtom = New-Object Windows.Forms.ToolBarButton $btnToS1 = New-Object Windows.Forms.ToolBarButton $btnMake = New-Object Windows.Forms.ToolBarButton $btnBAsm = New-Object Windows.Forms.ToolBarButton $btnBnRA = New-Object Windows.Forms.ToolBarButton $btnExit = New-Object Windows.Forms.ToolBarButton $scSplt1 = New-Object Windows.Forms.SplitContainer $scSplt2 = New-Object Windows.Forms.SplitContainer $lstView = New-Object Windows.Forms.ListView $chPoint = New-Object Windows.Forms.ColumnHeader $chError = New-Object Windows.Forms.ColumnHeader $chCause = New-Object Windows.Forms.ColumnHeader $txtEdit = New-Object Windows.Forms.RichTextBox $gboMake = New-Object Windows.Forms.GroupBox $lblLab1 = New-Object Windows.Forms.Label $cboPlat = New-Object Windows.Forms.ComboBox $chkExec = New-Object Windows.Forms.CheckBox $chkWApp = New-Object Windows.Forms.CheckBox $chkIDbg = New-Object Windows.Forms.CheckBox $chkIMem = New-Object Windows.Forms.CheckBox $lblLab2 = New-Object Windows.Forms.Label $txtIOut = New-Object Windows.Forms.TextBox $lblLab3 = New-Object Windows.Forms.Label $lboRefs = New-Object Windows.Forms.ListBox $sbPanel = New-Object Windows.Forms.StatusBar $sbPnl_1 = New-Object Windows.Forms.StatusBarPanel $sbPnl_2 = New-Object Windows.Forms.StatusBarPanel $imgList = New-Object Windows.Forms.ImageList $mnuRefs = New-Object Windows.Forms.ContextMenu $mnuIMov = New-Object Windows.Forms.MenuItem $mnuICnM = New-Object Windows.Forms.MenuItem $mnuIBuf = New-Object Windows.Forms.MenuItem $mnuIIns = New-Object Windows.Forms.MenuItem # #mnuMain # $mnuMain.MenuItems.AddRange(@($mnuFile, $mnuEdit, $mnuView, $mnuMake, $mnuHelp)) # #mnuFile # $mnuFile.MenuItems.AddRange(@($mnuAtom, $mnuOpen, $mnuEmp1, $mnuExit)) $mnuFile.Text = "&File" # #mnuAtom # $mnuAtom.Shortcut = "F3" $mnuAtom.Text = "Nu&Clear..." $mnuAtom.Add_Click({Invoke-Atom}) # #mnuOpen # $mnuOpen.Shortcut = "CtrlO" $mnuOpen.Text = "&Open" $mnuOpen.Add_Click($mnuOpen_Click) # #mnuEmp1 # $mnuEmp1.Text = "-" # #mnuExit # $mnuExit.Shortcut = "CtrlX" $mnuExit.Text = "E&xit" $mnuExit.Add_Click({$frmMain.Close()}) # #mnuEdit # $mnuEdit.menuItems.AddRange(@($mnuUndo, $mnuEmp2, $mnuCopy, $mnuPast, $mnuICut, ` $mnuEmp3, $mnuSAll)) $mnuEdit.Text = "&Edit" # #mnuUndo # $mnuUndo.Shortcut = "CtrlZ" $mnuUndo.Text = "&Undo" $mnuUndo.Add_Click({$txtEdit.Undo()}) # #mnuEmp2 # $mnuEmp2.Text = "-" # #mnuCopy # $mnuCopy.Shortcut = "CtrlC" $mnuCopy.Text = "&Copy" $mnuCopy.Add_Click({if ($txtEdit.SelectionLength -ge 0) {$txtEdit.Copy()}}) # #mnuPast # $mnuPast.Shortcut = "CtrlV" $mnuPast.Text = "&Paste" $mnuPast.Add_Click({$txtEdit.Paste()}) # #mnuICut # $mnuICut.Shortcut = "Del" $mnuICut.Text = "Cut &Item" $mnuICut.Add_Click({if ($txtEdit.SelectionLength -ge 0) {$txtEdit.Cut()}}) # #mnuEmp3 # $mnuEmp3.Text = "-" # #mnuSAll # $mnuSAll.Shortcut = "CtrlA" $mnuSAll.Text = "Select &All" $mnuSAll.Add_Click({$txtEdit.SelectAll()}) # #mnuView # $mnuView.MenuItems.AddRange(@($mnuFont, $mnuEmp4, $mnuOpac, $mnuTgls)) $mnuView.Text = "&View" # #mnuFont # $mnuFont.Text = "&Font..." $mnuFont.Add_Click($mnuFont_Click) # #mnuEmp4 # $mnuEmp4.Text = "-" # #mnuOpac # $mnuOpac.MenuItems.AddRange(@($mnuOp50, $mnuOp60, $mnuOp70, $mnuOp80, $mnuOp90, $mnuOpaF)) $mnuOpac.Text = "&Opacity" # #mnuOp50 # $mnuOp50.Text = "50%" $mnuOp50.Add_Click({Set-Opacity $mnuOp50; $cur = $mnuOp50}) # #mnuOp60 # $mnuOp60.Text = "60%" $mnuOp60.Add_Click({Set-Opacity $mnuOp60; $cur = $mnuOp60}) # #mnuOp70 # $mnuOp70.Text = "70%" $mnuOp70.Add_Click({Set-Opacity $mnuOp70; $cur = $mnuOp70}) # #mnuOp80 # $mnuOp80.Text = "80%" $mnuOp80.Add_Click({Set-Opacity $mnuOp80; $cur = $mnuOp80}) # #mnuOp90 # $mnuOp90.Text = "90%" $mnuOp90.Add_Click({Set-Opacity $mnuOp90; $cur = $mnuOp90}) # #mnuOpaF # $cur = $mnuOpaF #checked item by default $mnuOpaF.Checked = $true $mnuOpaF.Text = "Opaque" $mnuOpaF.Add_Click($mnuOpaF_Click) # #mnuTgls # $mnuTgls.MenuItems.AddRange(@($mnuWrap, $mnuToS1, $mnuToS2)) $mnuTgls.Text = "&Toggles" # #mnuWrap # $mnuWrap.Checked = $true $mnuWrap.Shortcut = "CtrlW" $mnuWrap.Text = "&Wrap Mode" $mnuWrap.Add_Click($mnuWrap_Click) # #mnuToS1 # $mnuToS1.Checked = $true $mnuToS1.Text = "Building &Progress" $mnuToS1.Add_Click({Show-Panel $mnuToS1 $scSplt1}) # #mnuToS2 # $mnuToS2.Checked = $true $mnuToS2.Shortcut = "F12" $mnuToS2.Text = "Building P&roperties" $mnuToS2.Add_Click({Show-Panel $mnuToS2 $scSplt2}) # #mnuMake # $mnuMake.MenuItems.AddRange(@($mnuBAsm, $mnuBnRA)) $mnuMake.Text = "&Build" # #mnuBAsm # $mnuBAsm.Shortcut = "F5" $mnuBAsm.Text = "&Compile" $mnuBAsm.Add_Click({Invoke-Builder}) # #mnuBnRA # $mnuBnRA.Shortcut = "F9" $mnuBnRA.Text = "Compile And &Run" $mnuBnRA.Add_Click({Start-AfterBuilding}) # #mnuHelp # $mnuHelp.MenuItems.AddRange(@($mnuInfo)) $mnuHelp.Text = "&Help" # #mnuInfo # $mnuInfo.Text = "About..." $mnuInfo.Add_Click({frmInfo_Show}) # #tbTools # $tbTools.Buttons.AddRange(@($btnAtom, $btnToS1, $btnMake, $btnBAsm, $btnBnRA, $btnExit)) $tbTools.ImageList = $imgList $tbTools.Add_ButtonClick($tbTools_ButtonClick) # #btnAtom # $btnAtom.ImageIndex = 0 $btnAtom.Tag = "Atom" $btnAtom.ToolTipText = "NuClear (F3)" # #btnToS1 # $btnToS1.ImageIndex = 1 $btnToS1.Tag = "Progress" $btnToS1.ToolTipText = "Building Progress Panel" # #btnMake # $btnMake.ImageIndex = 2 $btnMake.Tag = "Params" $btnMake.ToolTipText = "Building Properties (F12)" # #btnBAsm # $btnBAsm.ImageIndex = 3 $btnBAsm.Tag = "Build" $btnBAsm.ToolTipText = "Compile (F5)" # #btnBnRA # $btnBnRA.ImageIndex = 4 $btnBnRA.Tag = "BuildEx" $btnBnRA.ToolTipText = "Compile And Run (F9)" # #btnExit # $btnExit.ImageIndex = 5 $btnExit.Tag = "Exit" $btnExit.ToolTipText = "Exit (Ctrl+X)" # #scSplt1 # $scSplt1.Anchor = "Left, Top, Right, Bottom" $scSplt1.Location = New-Object Drawing.Point(0, 28) $scSplt1.Orientation = "Horizontal" $scSplt1.Panel1.Controls.Add($scSplt2) $scSplt1.Panel2.Controls.Add($lstView) $scSplt1.Size = New-Object Drawing.Size(790, 500) $scSplt1.SplitterDistance = 410 $scSplt1.SplitterWidth = 1 # #scSplt2 # $scSplt2.Dock = "Fill" $scSplt2.Panel1.Controls.Add($txtEdit) $scSplt2.Panel2.Controls.Add($gboMake) $scSplt2.SplitterDistance = 510 $scSplt2.SplitterWidth = 1 # #lstView # $lstView.Columns.AddRange(@($chPoint, $chError, $chCause)) $lstView.Dock = "Fill" $lstView.FullRowSelect = $true $lstView.GridLines = $true $lstView.MultiSelect = $false $lstView.ShowItemToolTips = $true $lstView.SmallImageList = $imgList $lstView.View = "Details" # #chPoint # $chPoint.Text = "Line" $chPoint.Width = 50 # #chError # $chError.Text = "Error" $chError.TextAlign = "Right" $chError.Width = 65 # #chCause # $chCause.Text = "Description" $chCause.Width = 650 # #txtEdit # $txtEdit.AcceptsTab = $true $txtEdit.Dock = "Fill" $txtEdit.Font = New-Object Drawing.Font("Courier New", 10) $txtEdit.ScrollBars = "Both" $txtEdit.Add_Click({Write-CursorPoint}) $txtEdit.Add_KeyUp({Write-CursorPoint}) $txtEdit.Add_TextChanged({Write-CursorPoint}) # #gboMake # $gboMake.Controls.AddRange(@($lblLab1, $cboPlat, $chkExec, $chkWApp, $chkIDbg, ` $chkIMem, $lblLab2, $txtIOut, $lblLab3, $lboRefs)) $gboMake.Dock = "Fill" $gboMake.Text = "Building Parameters" # #lblLab1 # $lblLab1.Location = New-Object Drawing.Point(21, 33) $lblLab1.Text = "Platform:" $lblLab1.Width = 50 # #cboPlat # $cboPlat.Anchor = "Left, Top, Right" $cboPlat.Items.AddRange(@(".NET Framework 2.0", ".NET Framework 3.5")) $cboPlat.Location = New-Object Drawing.Point(71, 30) $cboPlat.SelectedItem = ".NET Framework 2.0" $cboPlat.Width = 180 $cboPlat.Add_SelectedIndexChanged($cboPlat_SelectedIndexChanged) # #chkExec # $chkExec.Checked = $true $chkExec.Location = New-Object Drawing.Point(23, 63) $chkExec.Text = "Create Executable" $chkExec.Width = 120 $chkExec.Add_Click($chkExec_Click) # #chkWApp # $chkWApp.Location = New-Object Drawing.Point(43, 83) $chkWApp.Text = "Windows Application" $chkWApp.Width = 130 $chkWApp.Add_Click($chkWApp_Click) # #chkIDbg # $chkIDbg.Checked = $true $chkIDbg.Location = New-Object Drawing.Point(23, 103) $chkIDbg.Text = "Include Debug Information" $chkIDbg.Width = 157 # #chkIMem # $chkIMem.Enabled = $false $chkIMem.Location = New-Object Drawing.Point(23, 123) $chkIMem.Text = "Building In Memory" $chkIMem.Width = 130 # #lblLab2 # $lblLab2.Location = New-Object Drawing.Point(23, 163) $lblLab2.Text = "Output:" $lblLab2.Width = 45 # #txtIOut # $txtIOut.Anchor = "Left, Top, Right" $txtIOut.Location = New-Object Drawing.Point(71, 160) $txtIOut.Width = 180 # #lblLab3 # $lblLab3.Location = New-Object Drawing.Point(23, 203) $lblLab3.Size = New-Object Drawing.Size(70, 17) $lblLab3.Text = "References:" # #lboRefs # $lboRefs.Anchor = "Left, Top, Right, Bottom" $lboRefs.ContextMenu = $mnuRefs $lboRefs.Location = New-Object Drawing.Point(23, 223) $lboRefs.SelectionMode = "One" $lboRefs.Size = New-Object Drawing.Size(229, 157) # #sbPanle # $sbPanel.Panels.AddRange(@($sbPnl_1, $sbPnl_2)) $sbPanel.ShowPanels = $true $sbPanel.SizingGrip = $false # #sbPnl_1 # $sbPnl_1.AutoSize = "Spring" # #sbPnl_2 # $sbPnl_2.Alignment = "Center" $sbPnl_2.AutoSize = "Contents" # #imgList # $i_1, $i_2, $i_3, $i_4, $i_5, $i_6, $i_7, $i_8 | % { $imgList.Images.Add((Get-Image $_)) } # #mnuRefs # $mnuRefs.MenuItems.AddRange(@($mnuIMov, $mnuICnM, $mnuIBuf, $mnuIIns)) # #mnuIMov # $mnuIMov.Shortcut = "Del" $mnuIMov.Text = "Remove Item" $mnuIMov.Add_Click({$lboRefs.Items.Remove($lboRefs.SelectedItem)}) # #mnuICnM # $mnuICnM.Shortcut = "CtrlM" $mnuICnM.Text = "Copy And Remove" $mnuICnM.Add_Click($mnuICnM_Click) # #mnuIBuf # $mnuIBuf.Text = "Insert Copied..." $mnuIBuf.Add_Click({if ($script:buff -ne $null) {$lboRefs.Items.Add($script:buff)}}) # #mnuIIns # $mnuIIns.Shortcut = "CtrlR" $mnuIIns.Text = "Add Reference" $mnuIIns.Add_Click($mnuIIns_Click) # #frmMain # $frmMain.ClientSize = New-Object Drawing.Size(790, 550) $frmMain.Controls.AddRange(@($tbTools, $scSplt1, $sbPanel)) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.Icon = $ico $frmMain.Menu = $mnuMain $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "Snippet Compiler" $frmMain.Add_Load($frmMain_Load) [void]$frmMain.ShowDialog() } ################################################################################################## function frmInfo_Show { $frmInfo = New-Object Windows.Forms.Form $pbImage = New-Object Windows.Forms.PictureBox $lblName = New-Object Windows.Forms.Label $lblCopy = New-Object Windows.Forms.Label $btnExit = New-Object Windows.Forms.Button # #pbImage # $pbImage.Location = New-Object Drawing.Point(16, 16) $pbImage.Size = New-Object Drawing.Size(32, 32) $pbImage.SizeMode = "StretchImage" # #lblName # $lblName.Font = New-Object Drawing.Font("Microsoft Sans Serif", 8, [Drawing.FontStyle]::Bold) $lblName.Location = New-Object Drawing.Point(53, 19) $lblName.Size = New-Object Drawing.Size(360, 18) $lblName.Text = "Snippet Compiler v2.54" # #lblCopy # $lblCopy.Location = New-Object Drawing.Point(67, 37) $lblCopy.Size = New-Object Drawing.Size(360, 23) $lblCopy.Text = "(C) 2012-2013 greg zakharov gregzakh@gmail.com" # #btnExit # $btnExit.Location = New-Object Drawing.Point(135, 67) $btnExit.Text = "OK" # #frmInfo # $frmInfo.AcceptButton = $btnExit $frmInfo.CancelButton = $btnExit $frmInfo.ClientSize = New-Object Drawing.Size(350, 110) $frmInfo.ControlBox = $false $frmInfo.Controls.AddRange(@($pbImage, $lblName, $lblCopy, $btnExit)) $frmInfo.ShowInTaskBar = $false $frmInfo.StartPosition = "CenterScreen" $frmInfo.Text = "About..." $frmInfo.Add_Load({$pbImage.Image = $ico.ToBitmap()}) [void]$frmInfo.ShowDialog() } ################################################################################################## function Invoke-Atom { if ($txtEdit.Text -ne "") { $res = [Windows.Forms.MessageBox]::Show("Do you want to save data before?", ` $frmMain.Text, [Windows.Forms.MessageBoxButtons]::YesNoCancel, ` [Windows.Forms.MessageBoxIcon]::Question) switch ($res) { 'Yes' { (New-Object Windows.Forms.SaveFileDialog) | % { $_.FileName = "source" $_.Filter = "C# (*.cs)|*.cs" $_.InitialDirectory = $def if ($_.ShowDialog() -eq [Windows.Forms.DialogResult]::OK) { Out-File $_.FileName -enc UTF8 -input $txtEdit.Text } } break } 'No' { $txtEdit.Clear(); break } 'Cancel' { return } } }#if } function Set-Opacity($obj) { $cur.Checked = $false $frmMain.Opacity = [float]('.' + $($obj.Text)[0]) $obj.Checked = $true } function Show-Panel($obj1, $obj2) { switch ($obj1.Checked) { $true {$obj1.Checked = $false; $obj2.Panel2Collapsed = $true; break } $false {$obj1.Checked = $true; $obj2.Panel2Collapsed = $false; break } } } function Get-CursorPoint { $z = $txtEdit.SelectionStart $y = $txtEdit.GetLineFromCharIndex($z) + 1 $x = $z - $txtEdit.GetFirstCharIndexOfCurrentLine() return (New-Object Drawing.Point($x, $y)) } function Write-CursorPoint { $sbPnl_2.Text = 'Str: ' + (Get-CursorPoint).Y.ToString() + ', Col: ' + ` (Get-CursorPoint).X.ToString() } function Invoke-Builder { $lstView.Items.Clear() if ($txtEdit.Text -ne "") { switch ($cboPlat.SelectedIndex) { "0" { $cscp = New-Object Microsoft.CSharp.CSharpCodeProvider; break } "1" { $cscp = New-Object Microsoft.CSharp.CSharpCodeProvider($dict); break} } $cdcp.GenerateExecutable = $chkExec.Checked if ($chkWApp.Checked) { $cdcp.CompilerOptions = "/t:winexe" } $cdcp.IncludeDebugInformation = $chkIDbg.Checked $cdcp.GenerateInMemory = $chkIMem.Checked if ($lboRefs.Items.Count -ne 0) { for ($i = 0; $i -lt $lboRefs.Items.Count; $i++) { $cdcp.ReferencedAssemblies.Add($lboRefs.Items[$i].ToString()) } } $cdcp.WarningLevel = 3 $cdcp.OutputAssembly = $txtIOut.Text $script:make = $cscp.CompileAssemblyFromSource($cdcp, $txtEdit.Text) $make.Errors | % { if ($_.Line -ne 0 -and $_.Column -ne 0) { $err = $_.Line.ToString() + ', ' + ($_.Column - 1).ToString() } elseif ($_.Line -ne 0 -and $_.Column -eq 0) { $err = $_.Line.ToString() + ', 0' } elseif ($_.Line -eq 0 -and $_.Column -eq 0) { $err = '*' } if (!($_.IsWarning)) { $lstView.ForeColor = [Drawing.Color]::Crimson $itm = $lstView.Items.Add($err, 6) } else { $lstView.ForeColor = [Drawing.Color]::Gray $itm = $lstView.Items.Add($err, 7) } $itm.SubItems.Add($_.ErrorNumber) $itm.SubItems.Add($_.ErrorText) } }#if } function Start-AfterBuilding { Invoke-Builder if ($script:make.Errors.Count -eq 0) { Invoke-Item $txtIOut.Text } } function Get-Image($img) { [Drawing.Image]::FromStream((New-Object IO.MemoryStream(($$ = ` [Convert]::FromBase64String($img)), 0, $$.Length))) } ################################################################################################## # #do not modify or remove this because these are images for toolbar and lower panel # $i_1 = "iVBORw0KGgoAAAANSUhEUgAAAA8AAAARCAIAAACNaGH2AAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + ` "AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAVFJREFUOE91kTGOgzAQRc2ZOA" + ` "s9lU+Uxj1lak7hMtJKVCjalSIZkpiEVbSN980Y2GijjEaDgTff3+PiNs/GmJQKKk+txuhboR9TsX7kCd22rXP" + ` "eeU/d7/eydr5pGuput6NO8yx5n810/4Z7vMT1kUjrCJod9G2h3XvaOp8ScqW1St8iTt5qW1dVVV3XpXXxHoVm" + ` "r3+0ejCDhveiTYPQcYqcbKN/wof+ddCkXyLhJE5XodFGjAaffIaeE21aVjqODCvTWYzd+75nXcqroATu4zSaG" + ` "Ee0IWjw3mbHzEE75UtusJwS+hIHxgkkB1KIPBwOyHddt/aIk8s1LDQc9KtpvWIJJij0+XzievOkqHi11ujdO7" + ` "Q336J9PgnNfW2j5ffz4NYJim+hx/EL7U0Dx8veG7hOcBw+heaU2GIvar7kvNYqiTATFDqE418Ox6A55AySz8A" + ` "v1EEhBG84RKcAAAAASUVORK5CYII=" $i_2 = "iVBORw0KGgoAAAANSUhEUgAAABIAAAARCAIAAABfOGuuAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + ` "AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAOVJREFUOE+VkUEOgyAQRfFMnM" + ` "NrzJ3Yu3TtKTiEaVOTFgICXXQ3nQG1xjapkOEzII8vQ5OeSQiB1IVoysBZGZY5Yp4vi7QNBWFKoVJ6U8g5Kaw" + ` "qQUuFrMCaUlwxjeoQfBbBHFtCZxEWV0wDMd8mbMj71iiGGYvRE/A63SRAiI6xYRiIwnNNyoxRL27nKPpPCCFj" + ` "1W6MzabOTcIcDGN93+dX+h9aa7obY94/6iopwfs7Y13XVZRkwdxUdzcA527Cu6nWjTFrr3VuEqy9MEZuVB96R" + ` "9ZfSdu2n3XImDHjFtaM+9h/OuRvranSBDuoeeYAAAAASUVORK5CYII=" $i_3 = "iVBORw0KGgoAAAANSUhEUgAAABIAAAAQCAIAAACUZLgLAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + ` "AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAWJJREFUOE+FkTFywjAQRcUROI" + ` "sqWnpKeirVHIFD0OwdqDnFnsANZiZFEguwncad8tYCm2Bmovksa3nffq08a38aN13psTXLyeM5/7MJ9kdtoyK" + ` "qBFbY7/fE3W4nIRyPR1EJGsxpiqUk2+02pWDSe1QNEjwtIA1r2muvS1ZZljQGoGJgLFGP2PTiKTPMOgiFmg9H" + ` "UWYWi0UPBFWv4pO4EaubyCyiSTUxTeL0wXOkzWaD53K5BOjlcPJIPIjjhw8M09MYhi5E8tVqxcG8d/P5nLher" + ` "/vXhri6/sKk67oYIzdBJKcNRZgAYEtBXX8iEh8MGTGqn9fhcOBURVHQCNuMAWS52816vDA81l0C0GQz40zZs0" + ` "bMvqYoQE6Yl0gO7EN4xa7Xj6lbtjI3bjglDkmZ6XKXG7DBLZsMhpBvsBjPb93G2Xq3SzyjGEtTdXZg3DsvmJv" + ` "4nOTHvF6xqjr9r+9TlfUo/gXNq15sSG6qYQAAAABJRU5ErkJggg==" $i_4 = "iVBORw0KGgoAAAANSUhEUgAAABQAAAARCAIAAABSJhvpAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + ` "AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAARRJREFUOE9tklFuxCAMROH+J9" + ` "jTNU1VabUQAmT/qc3AwNJYoyQEPzwYbH5fthRTo1iLN4a26LD0oYyRhFkNga8rQ/JdlR8PUzSMfEA1M6kkrUt" + ` "+yaDRzKuw8sDmGJWuPGBWa1uoldXmPwvNpsL5zDmIWA01p2ezQF8pB2jAUmR2C8NYAlMIkgqndMQURFgY+8ST" + ` "/LLtqMghYINnz51p3eIW2PkBx+hifLFb7DDOic7nY0vpJRLKANavGkhiKrq92B7weT6p5WB6WWXZsI98Dmbny" + ` "zktV20UC+H3rGLP6B+GedXYf0EgQ1j4eW+8WMuGSSrs/c/h90W3Bb3fq7679ntY1loKyp8b2LltkXfbrGn2y7" + ` "lZ2x9XMW8UGH69+AAAAABJRU5ErkJggg==" $i_5 = "iVBORw0KGgoAAAANSUhEUgAAABIAAAAQCAIAAACUZLgLAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + ` "AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAhNJREFUOE9jfPPyBgMZAKgNju" + ` "o2nlWtXqVVtQpOAhnIKGDqbohiBmQ9fXuv77rzbsOdtxC08dY7NLTu0tvgaXtQtOk3rQcq7Tv5BEheePFx4rm" + ` "X7SefQ1DrcRC7+9TLxVdfuEzdiaIN6IAZpx/V7r0F1Pbr77/7H382HH9eeugpEBXvA6GmA89699/OX3ISRVve" + ` "irNAPambrhXvubPzwXugznOvvmYffJq0/SEQxa+/V7ntYeHasyh+q1x3unLzhYTV53wWnw1afSVpx929jz8Bd" + ` "a66+8Fu8W3TKZd0u85FzbvqO20fijagC4Ha3OccNZ9+zGTOOasll6P2PHjx9fenn39MZ1xTaTqjUnEideYls9" + ` "aNKNqAoQx0pFbHTo2+Q0BtufsfPv3yC+i92A13gfYA9egWHMxfchFdm23Xlri5B4DarOadAAYX0HnAgHFdegP" + ` "oPL3mM5oVx8zKjhStuARUg2Jb1Kx9QTP3WE/bBwx6oMMaD98LX3sdEmnAuAIit8ZjQOd0br+I0Na27ULB4iPu" + ` "E7YA42T5hYdBi0+Y9O/3n3fmwL13Jx992nH9HRAFdZ0On30YnjZAqQRodeXyg5b1yzTKFwERMHEBkXbtLuPmg" + ` "0BkUHkE6DFgeAA9gqINmF6m7blQtfJQ/sL9+YsPAW0GxikYXYSg0mVXJ+6+DQw2FG1ADlAnWqpF40KSIro2ZC" + ` "Fi2ACR3EDpQ7cspgAAAABJRU5ErkJggg==" $i_6 = "iVBORw0KGgoAAAANSUhEUgAAAA8AAAANCAIAAAD5fKMWAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + ` "AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAJxJREFUKFONjEEOwyAMBMn/P5" + ` "lD1FSCENt5QLpgcA1tpaI52LtjFrk42LvvMi59r9uwwn4jJOAqwAS2llAoMCegHUsq9LWFVVAG22odADm12hS" + ` "JGyb1s8ioICgcBxudP8A620RPz/T91IZPG4m/8UI4z92AVOcH8AeaoPppfzvYQ86bgs/ysQ3U0ED1l91+hJ3i" + ` "mlLjiCsoidJzG15Z2J4gUYDWoQAAAABJRU5ErkJggg==" $i_7 = "iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAIAAACQkWg2AAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + ` "AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAsZJREFUOE9FkmtIk1EYx9/nvH" + ` "u3V+dUyltIIaI5DAsiyy5SlphmCprpirnp8MWaoEikXwzayrQgzTLtQ0hN0UIssyQv1AcnQnMaXlIzTDOsvG7" + ` "OnG7qTmdq+vBwLpzf/znP4fwBY0z9D6O+k6qpdlha5lOwsri4zDI2eSqz/4DQyWmLoYiAhNlg+JsQjzkOFxXh" + ` "ykpcUYELCnBGBo6Onj1xfH5iYgOzV9+gLafDcGoqVqlwYSHOzcUKBU5JsWd8PA4NnQvY211fty2Yi47CERE2i" + ` "eRDerotONjm7W1xdV11d1/192+NicFBQSaxWO/jM/Fz3H7DtE5nDgzEISHNKtXIzExTVtYUwC+A3wBPpFL96K" + ` "g2O9vg5TXg6VkadtIuGEpKMPj62vz8Rjhu1mIxLi015+aOATy7cvWP0UiIaaXyh0jU6eKicXXt7+ulevcFjnl" + ` "4kBqTLNsnkxms1sWVlX6t1mQ2E3qc477weH1CYZujY4ODw7VMJdW+c0ePs/N3F5dhgaAfoFuWvGyzEXQN428K" + ` "hQ5AzzA6gaCVz28QCKRxsVSrl6eWZT+zbA+f3wVQl5NjXSMwJqI2tbodoJ2mP/J4r2i6imEuno+img4famSYN" + ` "ob5hFCJXD41P0/oSY1mBeMFq/VldnYLQANCGoTu03RSQhzVVVJcw+O9BXisVE6uv7KP494BdHCcaXXVZLHU5+" + ` "VVkVOaTqbp/PyblMlorBYKNQCNEgmp2p2W9hrgDUJkbJHLib41MfEBwD2EgtzchgYH7D/dUV5WjlAZQK1Y/By" + ` "gmiRClQBPAaoCAu4C5CMUSdPy5Eub1iDTe7W6mHQJUAJQShoAeAhAtvkAKoBYhI4dPTK/3vCm+ciq/lHJDZHo" + ` "DkK3AW6tcyQzETrIspFnw41Gw7aXtpw4/HXwuuyyNFB8YZfXOU+PkD27w8+cqq19sbBg2mL+AY/qjcgixtNMA" + ` "AAAAElFTkSuQmCC" $i_8 = "iVBORw0KGgoAAAANSUhEUgAAAA8AAAAPCAIAAAC0tAIdAAAABGdBTUEAALGPC/xhBQAAAglJREFUKFN1jktoE" + ` "1EUhufMTCbJNNNFS01xZ9GFCCIYhBYUF1XR7nygSxvRVSS6kbQoEoklYggUiuJj300NkRpsXdqNZhHRpp1ETW" + ` "LSdJJ08piZmFGbx3EmDdoUvfxc/vvf/3wcArtPsXir2bBUq+bZ2Vc7vrQnsT1S1ZKYB0Rbq8F5vSM8n9wx0NU" + ` "uCK6axCCy2ByURMbhmPlvW1XLxQy5keu96aAWFqxYZ+65j6XT69sH/rILmQlVNLjdrBn2HRiyYbO/+M3k8wX+" + ` "0VZrlQ2exp/c00cMRx4ZGz6E2NeSmTuu0UpF+TPQYeeTt6spAypsOgZDg+efePejQuMPq7DM+v3BrrZak3IRQ" + ` "73QgwKJMowcvLwU6kcBUB1orFOuGyclqYPX2YWEW4pSKFowDViGC2eGy3FK9zlTq9SXCfdMT7/cwhP6xmFjY4" + ` "3DFI0JwAyEnlkxC7r/Cvh9dzNJTzpPyW08kefvKhEasxzGAD+DEqPck8Z3QbNejQOmTCjuyi6x/jaeyL811WM" + ` "s8hSuAPLwYIKxGPeeOHwa10BPooD5gUaUctrHZFkhsm/gV4Ta/EBqqn8kl+eNo7aj4cDVehQ64Se69p5afL5n" + ` "5vFr4st878ocuToHW4oHQFiERBBWX3QSLcyESNe142fPTRGKrDiv++zjnivj93XZNeNp35pvJ7o8Fy89LJWk3" + ` "9PM0i5eafwSAAAAAElFTkSuQmCC" ################################################################################################## frmMain_Show
combined_dataset/train/non-malicious/239.ps1
239.ps1
function Get-NetFrameworkTypeAccelerator { [Alias('Get-Acceletrator')] PARAM () [System.Management.Automation.PSObject].Assembly.GetType("System.Management.Automation.TypeAccelerators")::get }
combined_dataset/train/non-malicious/New-Struct 3.ps1
New-Struct 3.ps1
function New-Struct { #.Synopsis # Creates Struct types from a list of types and properties #.Description # A wrapper for Add-Type to create struct types. #.Example # New-Struct Song { # [string]$Artist # [string]$Album # [string]$Name # [TimeSpan]$Length # } -CreateConstructorFunction # # Description # ----------- # Creates a "Song" type with strongly typed Artist, Album, Name, and Length properties, with a simple constructor and a constructor function #.Example # New-Struct @{ # >> Product = { [string]$Name; [double]$Price; } # >> Order = { [Guid]$Id; [Product]$Product; [int]$Quantity } # >> Customer = { # >> [string]$FirstName # >> [string]$LastName # >> [int]$Age # >> [Order[]]$OrderHistory # >> } # >> } # >> # # Description # ----------- # To create a series of related struct types (where one type is a property of another type), you need to use the -Types hashtable parameter set. That way, all of the types will compiled together at once, so the compiler will be able to find them all. # [CmdletBinding(DefaultParameterSetName="Multiple")] param( # The name of the TYPE you are creating. Must be unique per PowerShell session. [ValidateScript({ if($_ -notmatch '^[a-z][a-z1-9_]*$') { throw "'$_' is invalid. A valid name identifier must start with a letter, and contain only alpha-numeric or the underscore (_)." } return $true })] [Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName = "Single")] [string]$Name , # A Scriptblock full of "[Type]$Name" definitions to show what properties you want on your Struct type [Parameter(Position=1, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName = "Single")] [ScriptBlock]$Property , # A Hashtable in the form @{Name={Properties}} with multiple Names and Property Scriptblocks to define related structs (see example 2). [Parameter(Position=0, Mandatory=$true, ParameterSetName = "Multiple")] [HashTable]$Types , # Generate a New-StructName shortcut function for each New-Object StructName [Alias("CTorFunction","ConstructorFunction")] [Switch]$CreateConstructorFunction , # Output the defined type(s) [Switch]$PassThru ) begin { if($PSCmdlet.ParameterSetName -eq "Multiple") { $Structs = foreach($key in $Types.Keys) { New-Object PSObject -Property @{Name=$key;Property=$Types.$key} } Write-Verbose ($Structs | Out-String) $Structs | New-Struct -Passthru:$Passthru -CreateConstructorFunction:$CreateConstructorFunction } else { $code = "using System;`nusing System.Collections;`nusing System.Management.Automation;`n" $function = "" } } process { if($PSCmdlet.ParameterSetName -ne "Multiple") { $parserrors = $null $tokens = [System.Management.Automation.PSParser]::Tokenize( $Property, [ref]$parserrors ) | Where-Object { "Newline","StatementSeparator" -notcontains $_.Type } # CODE GENERATION MAGIKS! $Name = $Name.ToUpper()[0] + $Name.SubString(1) $ctor = @() $setr = @() $prop = @() $parm = @() $cast = @() $hash = @() $2Str = @() $(while($tokens.Count -gt 0) { $typeToken,$varToken,$tokens = $tokens if($typeToken.Type -ne "Type") { throw "Syntax error on line $($typeToken.StartLine) Column $($typeToken.Start). Missing Type. The Struct Properties block must contain only statements of the form: [Type]`$Name, see Get-Help New-Struct -Parameter Properties.`n$($typeToken | Out-String)" } elseif($varToken.Type -ne "Variable") { throw "Syntax error on line $($varToken.StartLine) Column $($varToken.Start). Missing Name. The Struct Properties block must contain only statements of the form: [Type]`$Name, see Get-Help New-Struct -Parameter Properties.`n$($typeToken | Out-String)" } $varName = $varToken.Content.ToUpper()[0] + $varToken.Content.SubString(1) $varNameLower = $varName.ToLower()[0] + $varName.SubString(1) try { Write-Verbose "TypeToken: $($typeToken.Content) $varName" if($PSVersionTable.PSVersion.Major -lt 3) { $typeName = Invoke-Expression "[$($typeToken.Content)].FullName" } else { $typeName = Invoke-Expression "$($typeToken.Content).FullName" } } catch { ## It's probably a reference to another struct, so just put the name in if($PSVersionTable.PSVersion.Major -lt 3) { $typeName = $typeToken.Content } else { $typeName = $typeToken.Content -replace '\\[(.*)\\]','$1' } } Write-Verbose "Type Name: $typeName $varName" $prop += ' public {0} {1};' -f $typeName,$varName $setr += ' {0} = {1};' -f $varName,$varNameLower $ctor += '{0} {1}' -f $typeName,$varNameLower $cast += ' if(input.Properties["{0}"] != null){{ output.{0} = ({1})input.Properties["{0}"].Value; }}' -f $varName,$typeName $hash += ' if(hash.ContainsKey("{0}")){{ output.{0} = ({1})hash["{0}"]; }}' -f $varName,$typeName $2Str += '"{0} = [{1}]\\"" + {0}.ToString() + "\\""' -f $varName, $typeName if($CreateConstructorFunction) { $parm += '[{0}]${1}' -f $typeName,$varName } }) $code += @" public struct $Name { $($prop -join "`n") public $Name ($( $ctor -join ",")) { $($setr -join "`n") } public static implicit operator $Name(Hashtable hash) { $Name output = new $Name(); $($hash -join "`n") return output; } public static implicit operator $Name(PSObject input) { $Name output = new $Name(); $($cast -join "`n") return output; } public override string ToString() { return "@{" + $($2Str -join ' + "; " + ') + "}"; } } "@ if($CreateConstructorFunction) { $function += @" Function global:New-$Name { [CmdletBinding()] param( $( $parm -join ",`n" ) ) New-Object $Name -Property `$PSBoundParameters } "@ } }} end { if($PSCmdlet.ParameterSetName -ne "Multiple") { Write-Verbose "C# Code:`n$code" Write-Verbose "PowerShell Code:`n$function" Add-Type -TypeDefinition $code -PassThru:$Passthru -ErrorAction Stop if($CreateConstructorFunction) { Invoke-Expression $function } }}}
combined_dataset/train/non-malicious/sample_41_18.ps1
sample_41_18.ps1
# # Module manifest for module 'OCI.PSModules.Disasterrecovery' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Disasterrecovery.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c43e3d16-09c4-4426-9ab9-cdda84fd5f2c' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Disasterrecovery Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Disasterrecovery.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDisasterrecoveryDrPlan', 'Get-OCIDisasterrecoveryDrPlanExecution', 'Get-OCIDisasterrecoveryDrPlanExecutionsList', 'Get-OCIDisasterrecoveryDrPlansList', 'Get-OCIDisasterrecoveryDrProtectionGroup', 'Get-OCIDisasterrecoveryDrProtectionGroupsList', 'Get-OCIDisasterrecoveryWorkRequest', 'Get-OCIDisasterrecoveryWorkRequestErrorsList', 'Get-OCIDisasterrecoveryWorkRequestLogsList', 'Get-OCIDisasterrecoveryWorkRequestsList', 'Invoke-OCIDisasterrecoveryAssociateDrProtectionGroup', 'Invoke-OCIDisasterrecoveryDisassociateDrProtectionGroup', 'Invoke-OCIDisasterrecoveryIgnoreDrPlanExecution', 'Invoke-OCIDisasterrecoveryPauseDrPlanExecution', 'Invoke-OCIDisasterrecoveryResumeDrPlanExecution', 'Invoke-OCIDisasterrecoveryRetryDrPlanExecution', 'Move-OCIDisasterrecoveryDrProtectionGroupCompartment', 'New-OCIDisasterrecoveryDrPlan', 'New-OCIDisasterrecoveryDrPlanExecution', 'New-OCIDisasterrecoveryDrProtectionGroup', 'Remove-OCIDisasterrecoveryDrPlan', 'Remove-OCIDisasterrecoveryDrPlanExecution', 'Remove-OCIDisasterrecoveryDrProtectionGroup', 'Stop-OCIDisasterrecoveryDrPlanExecution', 'Stop-OCIDisasterrecoveryWorkRequest', 'Update-OCIDisasterrecoveryDrPlan', 'Update-OCIDisasterrecoveryDrPlanExecution', 'Update-OCIDisasterrecoveryDrProtectionGroup', 'Update-OCIDisasterrecoveryDrProtectionGroupRole' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Disasterrecovery' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_21_24.ps1
sample_21_24.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ ## ## TODO: Refactor the certificate generation and installation in smaller ## functions and move them (including enums) to ClusterSetupUtilities.psm1 module. ## param ( [Parameter(Mandatory=$True, ParameterSetName = "Install")] [switch] $Install, [Parameter(Mandatory=$True, ParameterSetName = "Clean")] [switch] $Clean, [Parameter(Mandatory=$False)] [string] $CertSubjectName = "CN=ServiceFabricDevClusterCert" ) function Cleanup-Cert([string] $CertSubjectName) { Write-Host "Cleaning existing certificates..." $cerLocations = @("cert:\LocalMachine\My", "cert:\LocalMachine\root", "cert:\LocalMachine\CA", "cert:\CurrentUser\My") foreach($cerLoc in $cerLocations) { Get-ChildItem -Path $cerLoc | ? { $_.Subject -like "*$CertSubjectName*" } | Remove-Item } Write-Host "Certificates removed." } $warningMessage = @" This will install certificate with '$CertSubjectName' in following stores: # LocalMachine\My # LocalMachine\root & # CurrentUser\My The CleanCluster.ps1 will clean these certificates or you can clean them up using script 'CertSetup.ps1 -Clean -CertSubjectName $CertSubjectName'. "@ $X509KeyUsageFlags = @{ DIGITAL_SIGNATURE = 0x80 KEY_ENCIPHERMENT = 0x20 DATA_ENCIPHERMENT = 0x10 } $X509KeySpec = @{ NONE = 0 KEYEXCHANGE = 1 SIGNATURE = 2 } $X509PrivateKeyExportFlags = @{ EXPORT_NONE = 0 EXPORT_FLAG = 0x1 PLAINTEXT_EXPORT_FLAG = 0x2 ARCHIVING_FLAG = 0x4 PLAINTEXT_ARCHIVING_FLAG = 0x8 } $X509CertificateEnrollmentContext = @{ USER = 0x1 MACHINE = 0x2 ADMINISTRATOR_FORCE_MACHINE = 0x3 } $EncodingType = @{ STRING_BASE64HEADER = 0 STRING_BASE64 = 0x1 STRING_BINARY = 0x2 STRING_BASE64REQUESTHEADER = 0x3 STRING_HEX = 0x4 STRING_HEXASCII = 0x5 STRING_BASE64_ANY = 0x6 STRING_ANY = 0x7 STRING_HEX_ANY = 0x8 STRING_BASE64X509CRLHEADER = 0x9 STRING_HEXADDR = 0xa STRING_HEXASCIIADDR = 0xb STRING_HEXRAW = 0xc STRING_NOCRLF = 0x40000000 STRING_NOCR = 0x80000000 } $InstallResponseRestrictionFlags = @{ ALLOW_NONE = 0x00000000 ALLOW_NO_OUTSTANDING_REQUEST = 0x00000001 ALLOW_UNTRUSTED_CERTIFICATE = 0x00000002 ALLOW_UNTRUSTED_ROOT = 0x00000004 } if($Install) { #cleanup previous installs of the certificate Cleanup-Cert -CertSubjectName $CertSubjectName Write-Host "Installing new certificates..." Write-Warning $warningMessage $identity = [Security.Principal.WindowsIdentity]::GetCurrent() $name = new-object -com "X509Enrollment.CX500DistinguishedName" $name.Encode($CertSubjectName, 0x00100000) $key = new-object -com "X509Enrollment.CX509PrivateKey.1" $key.ProviderName = "Microsoft RSA SChannel Cryptographic Provider" $key.ExportPolicy = $X509PrivateKeyExportFlags.PLAINTEXT_EXPORT_FLAG $key.KeySpec = $X509KeySpec.KEYEXCHANGE $key.Length = 1024 $sd = "D:PAI(A;;0xd01f01ff;;;SY)(A;;0xd01f01ff;;;BA)(A;;0xd01f01ff;;;NS)(A;;0xd01f01ff;;;" + $identity.User.Value + ")" $key.SecurityDescriptor = $sd $key.MachineContext = $TRUE $key.Create() #set server auth keyspec $serverauthoid = new-object -com "X509Enrollment.CObjectId.1" $serverauthoid.InitializeFromValue("1.3.6.1.5.5.7.3.1") $ekuoids = new-object -com "X509Enrollment.CObjectIds.1" $ekuoids.add($serverauthoid) $clientauthoid = new-object -com "X509Enrollment.CObjectId.1" $clientauthoid.InitializeFromValue("1.3.6.1.5.5.7.3.2") $ekuoids.add($clientauthoid) $ekuext = new-object -com "X509Enrollment.CX509ExtensionEnhancedKeyUsage.1" $ekuext.InitializeEncode($ekuoids) $keyUsageExt = New-Object -ComObject X509Enrollment.CX509ExtensionKeyUsage $keyUsageExt.InitializeEncode($X509KeyUsageFlags.KEY_ENCIPHERMENT -bor $X509KeyUsageFlags.DIGITAL_SIGNATURE) $certTemplateName = "" $cert = new-object -com "X509Enrollment.CX509CertificateRequestCertificate.1" $cert.InitializeFromPrivateKey($X509CertificateEnrollmentContext.MACHINE, $key, $certTemplateName) $cert.Subject = $name $cert.Issuer = $cert.Subject $notbefore = get-date $ts = new-timespan -Days 2 $cert.NotBefore = $notbefore.Subtract($ts) $cert.NotAfter = $cert.NotBefore.AddYears(1) $cert.X509Extensions.Add($ekuext) $cert.X509Extensions.Add($keyUsageExt) $cert.Encode() #install certificate in LocalMachine My store $enrollment = new-object -com "X509Enrollment.CX509Enrollment.1" $enrollment.InitializeFromRequest($cert) $certdata = $enrollment.CreateRequest($EncodingType.STRING_BASE64HEADER) $password = "" $enrollment.InstallResponse($InstallResponseRestrictionFlags.ALLOW_UNTRUSTED_CERTIFICATE, $certdata, $EncodingType.STRING_BASE64HEADER, $password) if (!$?) { Write-Warning "Failed to create certificates required for cluster" return } $srcStoreScope = "LocalMachine" $srcStoreName = "My" $srcStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $srcStoreName, $srcStoreScope $srcStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadOnly) $cert = $srcStore.certificates -match "$CertSubjectName" $dstStoreScope = "LocalMachine" $dstStoreName = "root" #copy cert to root store so chain build succeeds $dstStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $dstStoreName, $dstStoreScope $dstStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) foreach($c in $cert) { $dstStore.Add($c) } $dstStore.Close() $dstStoreScope = "CurrentUser" $dstStoreName = "My" $dstStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $dstStoreName, $dstStoreScope $dstStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) foreach($c in $cert) { $dstStore.Add($c) } $srcStore.Close() $dstStore.Close() } if($Clean) { Cleanup-Cert -CertSubjectName $CertSubjectName } # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAGpzFgtkUmO6NZ # gQoc/sFlY42MkN6RwnHH2QV8eo6TbqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFcvRHa4XgIJOKkSAuecsn67 # tMg/3wHCAyBogGj5bNKiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAM/9afC1Gzys9IpEmfdC2nzw4kSKdh7Fv5qN2MFtvKRbs8fkjaZlzwyLa # Qm1/VwfYxTzGcXfcT7jz8/AH26w6plm6K08JxZsEnOBb5kcx+GSrub3WZ7//Kl21 # tFHir35eoTBW7yuG8oNXubebYV0ZpnCkD2A4K4c/EBjKU1mKOWTw8AxvDRHoRm6I # CX4L7jQ3tLPj+jnChxfEg/AtMCDGH8RrkQfsxt2+QFhkKfEMYtTcwyKcekPYCL6u # wFX33+VZI3ggzDXMMeKGkY42utZ6/lrmi3cferHMKRkQrPXXY61qsCTnj5ioYSub # t0wP6fx/RbB+s8mbmUesLyCnjBvn8KGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDjpAv7c9zQ/zpxbPKnotQMf4kFlQWZEpVvzbCa+h/oLQIGZc4NjVSj # GBMyMDI0MDIxNTIxNDg1MS42MzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHsMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP # MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XiMBDAiGA8yMDI0MDIxNTEzMTEz # MloYDzIwMjQwMjE2MTMxMTMyWjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpeIwE # AgEAMAkCAQACAQYCAf8wBwIBAAICEGUwCgIFAOl53YQCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAAyppjNtMaK3exqVr0XKhQZ3TH629EVMQIJF583jdnZjx # pxjkULaLAkHOj8taW1HyxQ/uFJaba7yTfns/CIuGc2nLuRAr1+puVtc2Te/EzKcr # OhXgOcoThxjGGsyjA1wf4emKeRYExK7zOeFc2W3QYrw/U0J9dTI6OSGE8Ir2G3Yz # e7rTQ1UivDBOp5HhjkvmNNPvBm1vfS6iE6xW5ku7KQPtzmY8qdcVtujTqXFmeo2F # pAhaVVTFDFka6QWr0nME3XR1uLQe3X/0xia0Fa+VTmnWURAAN3DOZw13Ilu0rYsg # 81lb9cTgwMnNpHGDLB6SWNJyzCDpZyWt0VW2MIcTBjGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB88UKQ64DzB0xAAEAAAHz # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIIGiri98o9oBi0p9hqc4ALyOWZMyESdIei++JXufIH21 # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgGLzZNIu24bhWSnzAGYmT9P5E # CHzjWwb9oM7DGDo7YugwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAiBCAEb2+7Ts1WUcNQtYDML7vx8Jgp # 8YvKbMP/ElU6xdpRQTANBgkqhkiG9w0BAQsFAASCAgALJiTiXA2yhHAb7AaIDjXT # kY8M09LlUbsIRAmvHLu4GmXYlu7tacm1gKndhf6A69xP/WY8Tq3Ca/ISW4vesq8e # 3AHQOrNhGirzmJkykgP681hrbugi9mH1jgGiE/i1aGfnFcP9E+OF3T6QkcakA2QT # RJEFJkAAG+KUrAuQDC+GH3Kl8Zt5DLIwDLU9k/ZrLpy8xJ8ea+oVOzhYFCs4uCVj # Vw4Hx/ZadvqMtXh5cpEbSZiq47iGXd5AOKxbt90yLnpX/+J500NDKH+Bc1EuSNky # dxuj1loo9jo0/XZmeUcK5X1X5eoazJyEICkOQhvGGCosqH0Yq1eJmEhciH9cQYW6 # YmSppfkrBXtcFo2CaiFvE2nIXk37Gg5x+nJgGI88ewzu/qRcUVwnLF2Ph711AAvo # eK4mtulE6zud0PKazja6WrAhIXR/DITM3upibnXUHbHrEk0HOgU8NTfV8jsv7QBd # 3QQTmJ8eNMpNWaJQlBp7BzqBNI78p5GVSkUGHtBfAgIMrfJMLghlICK4huT13b+m # qZlVhALv2JmnGUOeJvC/Lt8HByQEckW1fGWrYUKmNPo4d2SE+HhRWa4amh5gGI3K # OAr/eGkESjMgq/D4Aijfs9ddP2DDxWlbwxkjzr9XvrLH7s4wvD3c1aTi7EnDDrMF # TtjbriG012Hbl+91hTjnhg== # SIG # End signature block
combined_dataset/train/non-malicious/sample_30_2.ps1
sample_30_2.ps1
# # Module manifest for module 'OCI.PSModules.Identitydomains' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identitydomains.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a6c13cbd-d51d-4887-9285-9eb20c02e9cc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identitydomains Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydomains.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIIdentitydomainsAccountMgmtInfo', 'Get-OCIIdentitydomainsAccountMgmtInfosList', 'Get-OCIIdentitydomainsAccountRecoverySetting', 'Get-OCIIdentitydomainsAccountRecoverySettingsList', 'Get-OCIIdentitydomainsApiKey', 'Get-OCIIdentitydomainsApiKeysList', 'Get-OCIIdentitydomainsApp', 'Get-OCIIdentitydomainsAppRole', 'Get-OCIIdentitydomainsAppRolesList', 'Get-OCIIdentitydomainsApprovalWorkflow', 'Get-OCIIdentitydomainsApprovalWorkflowAssignment', 'Get-OCIIdentitydomainsApprovalWorkflowAssignmentsList', 'Get-OCIIdentitydomainsApprovalWorkflowsList', 'Get-OCIIdentitydomainsApprovalWorkflowStep', 'Get-OCIIdentitydomainsApprovalWorkflowStepsList', 'Get-OCIIdentitydomainsAppsList', 'Get-OCIIdentitydomainsAuthenticationFactorSetting', 'Get-OCIIdentitydomainsAuthenticationFactorSettingsList', 'Get-OCIIdentitydomainsAuthToken', 'Get-OCIIdentitydomainsAuthTokensList', 'Get-OCIIdentitydomainsBrandingSetting', 'Get-OCIIdentitydomainsBrandingSettingsList', 'Get-OCIIdentitydomainsCloudGate', 'Get-OCIIdentitydomainsCloudGateMapping', 'Get-OCIIdentitydomainsCloudGateMappingsList', 'Get-OCIIdentitydomainsCloudGateServer', 'Get-OCIIdentitydomainsCloudGateServersList', 'Get-OCIIdentitydomainsCloudGatesList', 'Get-OCIIdentitydomainsCondition', 'Get-OCIIdentitydomainsConditionsList', 'Get-OCIIdentitydomainsCustomerSecretKey', 'Get-OCIIdentitydomainsCustomerSecretKeysList', 'Get-OCIIdentitydomainsDynamicResourceGroup', 'Get-OCIIdentitydomainsDynamicResourceGroupsList', 'Get-OCIIdentitydomainsGrant', 'Get-OCIIdentitydomainsGrantsList', 'Get-OCIIdentitydomainsGroup', 'Get-OCIIdentitydomainsGroupsList', 'Get-OCIIdentitydomainsIdentityPropagationTrust', 'Get-OCIIdentitydomainsIdentityPropagationTrustsList', 'Get-OCIIdentitydomainsIdentityProvider', 'Get-OCIIdentitydomainsIdentityProvidersList', 'Get-OCIIdentitydomainsIdentitySetting', 'Get-OCIIdentitydomainsIdentitySettingsList', 'Get-OCIIdentitydomainsKmsiSetting', 'Get-OCIIdentitydomainsKmsiSettingsList', 'Get-OCIIdentitydomainsMe', 'Get-OCIIdentitydomainsMyApiKey', 'Get-OCIIdentitydomainsMyApiKeysList', 'Get-OCIIdentitydomainsMyAppsList', 'Get-OCIIdentitydomainsMyAuthToken', 'Get-OCIIdentitydomainsMyAuthTokensList', 'Get-OCIIdentitydomainsMyCompletedApproval', 'Get-OCIIdentitydomainsMyCompletedApprovalsList', 'Get-OCIIdentitydomainsMyCustomerSecretKey', 'Get-OCIIdentitydomainsMyCustomerSecretKeysList', 'Get-OCIIdentitydomainsMyDevice', 'Get-OCIIdentitydomainsMyDevicesList', 'Get-OCIIdentitydomainsMyGroupsList', 'Get-OCIIdentitydomainsMyOAuth2ClientCredential', 'Get-OCIIdentitydomainsMyOAuth2ClientCredentialsList', 'Get-OCIIdentitydomainsMyPendingApproval', 'Get-OCIIdentitydomainsMyPendingApprovalsList', 'Get-OCIIdentitydomainsMyRequest', 'Get-OCIIdentitydomainsMyRequestableGroupsList', 'Get-OCIIdentitydomainsMyRequestsList', 'Get-OCIIdentitydomainsMySmtpCredential', 'Get-OCIIdentitydomainsMySmtpCredentialsList', 'Get-OCIIdentitydomainsMySupportAccount', 'Get-OCIIdentitydomainsMySupportAccountsList', 'Get-OCIIdentitydomainsMyTrustedUserAgent', 'Get-OCIIdentitydomainsMyTrustedUserAgentsList', 'Get-OCIIdentitydomainsMyUserDbCredential', 'Get-OCIIdentitydomainsMyUserDbCredentialsList', 'Get-OCIIdentitydomainsNetworkPerimeter', 'Get-OCIIdentitydomainsNetworkPerimetersList', 'Get-OCIIdentitydomainsNotificationSetting', 'Get-OCIIdentitydomainsNotificationSettingsList', 'Get-OCIIdentitydomainsOAuth2ClientCredential', 'Get-OCIIdentitydomainsOAuth2ClientCredentialsList', 'Get-OCIIdentitydomainsOAuthClientCertificate', 'Get-OCIIdentitydomainsOAuthClientCertificatesList', 'Get-OCIIdentitydomainsOAuthPartnerCertificate', 'Get-OCIIdentitydomainsOAuthPartnerCertificatesList', 'Get-OCIIdentitydomainsPasswordPoliciesList', 'Get-OCIIdentitydomainsPasswordPolicy', 'Get-OCIIdentitydomainsPoliciesList', 'Get-OCIIdentitydomainsPolicy', 'Get-OCIIdentitydomainsResourceTypeSchemaAttributesList', 'Get-OCIIdentitydomainsRule', 'Get-OCIIdentitydomainsRulesList', 'Get-OCIIdentitydomainsSchema', 'Get-OCIIdentitydomainsSchemasList', 'Get-OCIIdentitydomainsSecurityQuestion', 'Get-OCIIdentitydomainsSecurityQuestionSetting', 'Get-OCIIdentitydomainsSecurityQuestionSettingsList', 'Get-OCIIdentitydomainsSecurityQuestionsList', 'Get-OCIIdentitydomainsSelfRegistrationProfile', 'Get-OCIIdentitydomainsSelfRegistrationProfilesList', 'Get-OCIIdentitydomainsSetting', 'Get-OCIIdentitydomainsSettingsList', 'Get-OCIIdentitydomainsSmtpCredential', 'Get-OCIIdentitydomainsSmtpCredentialsList', 'Get-OCIIdentitydomainsUser', 'Get-OCIIdentitydomainsUserAttributesSetting', 'Get-OCIIdentitydomainsUserAttributesSettingsList', 'Get-OCIIdentitydomainsUserDbCredential', 'Get-OCIIdentitydomainsUserDbCredentialsList', 'Get-OCIIdentitydomainsUsersList', 'Invoke-OCIIdentitydomainsPatchAccountRecoverySetting', 'Invoke-OCIIdentitydomainsPatchApiKey', 'Invoke-OCIIdentitydomainsPatchApp', 'Invoke-OCIIdentitydomainsPatchAppRole', 'Invoke-OCIIdentitydomainsPatchApprovalWorkflow', 'Invoke-OCIIdentitydomainsPatchApprovalWorkflowStep', 'Invoke-OCIIdentitydomainsPatchAuthToken', 'Invoke-OCIIdentitydomainsPatchCloudGate', 'Invoke-OCIIdentitydomainsPatchCloudGateMapping', 'Invoke-OCIIdentitydomainsPatchCloudGateServer', 'Invoke-OCIIdentitydomainsPatchCondition', 'Invoke-OCIIdentitydomainsPatchCustomerSecretKey', 'Invoke-OCIIdentitydomainsPatchDynamicResourceGroup', 'Invoke-OCIIdentitydomainsPatchGrant', 'Invoke-OCIIdentitydomainsPatchGroup', 'Invoke-OCIIdentitydomainsPatchIdentityPropagationTrust', 'Invoke-OCIIdentitydomainsPatchIdentityProvider', 'Invoke-OCIIdentitydomainsPatchIdentitySetting', 'Invoke-OCIIdentitydomainsPatchKmsiSetting', 'Invoke-OCIIdentitydomainsPatchMe', 'Invoke-OCIIdentitydomainsPatchMyApiKey', 'Invoke-OCIIdentitydomainsPatchMyAuthToken', 'Invoke-OCIIdentitydomainsPatchMyCustomerSecretKey', 'Invoke-OCIIdentitydomainsPatchMyDevice', 'Invoke-OCIIdentitydomainsPatchMyOAuth2ClientCredential', 'Invoke-OCIIdentitydomainsPatchMyPendingApproval', 'Invoke-OCIIdentitydomainsPatchMyRequest', 'Invoke-OCIIdentitydomainsPatchMySmtpCredential', 'Invoke-OCIIdentitydomainsPatchNetworkPerimeter', 'Invoke-OCIIdentitydomainsPatchOAuth2ClientCredential', 'Invoke-OCIIdentitydomainsPatchPasswordPolicy', 'Invoke-OCIIdentitydomainsPatchPolicy', 'Invoke-OCIIdentitydomainsPatchRule', 'Invoke-OCIIdentitydomainsPatchSchema', 'Invoke-OCIIdentitydomainsPatchSecurityQuestion', 'Invoke-OCIIdentitydomainsPatchSecurityQuestionSetting', 'Invoke-OCIIdentitydomainsPatchSelfRegistrationProfile', 'Invoke-OCIIdentitydomainsPatchSetting', 'Invoke-OCIIdentitydomainsPatchSmtpCredential', 'Invoke-OCIIdentitydomainsPatchUser', 'Invoke-OCIIdentitydomainsPatchUserAttributesSetting', 'Invoke-OCIIdentitydomainsSearchAccountMgmtInfos', 'Invoke-OCIIdentitydomainsSearchApiKeys', 'Invoke-OCIIdentitydomainsSearchAppRoles', 'Invoke-OCIIdentitydomainsSearchApps', 'Invoke-OCIIdentitydomainsSearchAuthenticationFactorSettings', 'Invoke-OCIIdentitydomainsSearchAuthTokens', 'Invoke-OCIIdentitydomainsSearchCloudGateMappings', 'Invoke-OCIIdentitydomainsSearchCloudGates', 'Invoke-OCIIdentitydomainsSearchCloudGateServers', 'Invoke-OCIIdentitydomainsSearchConditions', 'Invoke-OCIIdentitydomainsSearchCustomerSecretKeys', 'Invoke-OCIIdentitydomainsSearchDynamicResourceGroups', 'Invoke-OCIIdentitydomainsSearchGrants', 'Invoke-OCIIdentitydomainsSearchGroups', 'Invoke-OCIIdentitydomainsSearchIdentityProviders', 'Invoke-OCIIdentitydomainsSearchIdentitySettings', 'Invoke-OCIIdentitydomainsSearchKmsiSettings', 'Invoke-OCIIdentitydomainsSearchMyApps', 'Invoke-OCIIdentitydomainsSearchMyGroups', 'Invoke-OCIIdentitydomainsSearchMyRequestableGroups', 'Invoke-OCIIdentitydomainsSearchMyRequests', 'Invoke-OCIIdentitydomainsSearchNetworkPerimeters', 'Invoke-OCIIdentitydomainsSearchNotificationSettings', 'Invoke-OCIIdentitydomainsSearchOAuth2ClientCredentials', 'Invoke-OCIIdentitydomainsSearchOAuthClientCertificates', 'Invoke-OCIIdentitydomainsSearchOAuthPartnerCertificates', 'Invoke-OCIIdentitydomainsSearchPasswordPolicies', 'Invoke-OCIIdentitydomainsSearchPolicies', 'Invoke-OCIIdentitydomainsSearchResourceTypeSchemaAttributes', 'Invoke-OCIIdentitydomainsSearchRules', 'Invoke-OCIIdentitydomainsSearchSchemas', 'Invoke-OCIIdentitydomainsSearchSecurityQuestions', 'Invoke-OCIIdentitydomainsSearchSecurityQuestionSettings', 'Invoke-OCIIdentitydomainsSearchSelfRegistrationProfiles', 'Invoke-OCIIdentitydomainsSearchSettings', 'Invoke-OCIIdentitydomainsSearchSmtpCredentials', 'Invoke-OCIIdentitydomainsSearchUserAttributesSettings', 'Invoke-OCIIdentitydomainsSearchUserDbCredentials', 'Invoke-OCIIdentitydomainsSearchUsers', 'New-OCIIdentitydomainsApiKey', 'New-OCIIdentitydomainsApp', 'New-OCIIdentitydomainsAppRole', 'New-OCIIdentitydomainsApprovalWorkflow', 'New-OCIIdentitydomainsApprovalWorkflowAssignment', 'New-OCIIdentitydomainsApprovalWorkflowStep', 'New-OCIIdentitydomainsAuthenticationFactorsRemover', 'New-OCIIdentitydomainsAuthToken', 'New-OCIIdentitydomainsCloudGate', 'New-OCIIdentitydomainsCloudGateMapping', 'New-OCIIdentitydomainsCloudGateServer', 'New-OCIIdentitydomainsCondition', 'New-OCIIdentitydomainsCustomerSecretKey', 'New-OCIIdentitydomainsDynamicResourceGroup', 'New-OCIIdentitydomainsGrant', 'New-OCIIdentitydomainsGroup', 'New-OCIIdentitydomainsIdentityPropagationTrust', 'New-OCIIdentitydomainsIdentityProvider', 'New-OCIIdentitydomainsMe', 'New-OCIIdentitydomainsMyApiKey', 'New-OCIIdentitydomainsMyAuthenticationFactorInitiator', 'New-OCIIdentitydomainsMyAuthenticationFactorsRemover', 'New-OCIIdentitydomainsMyAuthenticationFactorValidator', 'New-OCIIdentitydomainsMyAuthToken', 'New-OCIIdentitydomainsMyCustomerSecretKey', 'New-OCIIdentitydomainsMyOAuth2ClientCredential', 'New-OCIIdentitydomainsMyRequest', 'New-OCIIdentitydomainsMySmtpCredential', 'New-OCIIdentitydomainsMySupportAccount', 'New-OCIIdentitydomainsMyUserDbCredential', 'New-OCIIdentitydomainsNetworkPerimeter', 'New-OCIIdentitydomainsOAuth2ClientCredential', 'New-OCIIdentitydomainsOAuthClientCertificate', 'New-OCIIdentitydomainsOAuthPartnerCertificate', 'New-OCIIdentitydomainsPasswordPolicy', 'New-OCIIdentitydomainsPolicy', 'New-OCIIdentitydomainsRule', 'New-OCIIdentitydomainsSecurityQuestion', 'New-OCIIdentitydomainsSelfRegistrationProfile', 'New-OCIIdentitydomainsSmtpCredential', 'New-OCIIdentitydomainsUser', 'New-OCIIdentitydomainsUserDbCredential', 'Remove-OCIIdentitydomainsApiKey', 'Remove-OCIIdentitydomainsApp', 'Remove-OCIIdentitydomainsAppRole', 'Remove-OCIIdentitydomainsApprovalWorkflow', 'Remove-OCIIdentitydomainsApprovalWorkflowAssignment', 'Remove-OCIIdentitydomainsApprovalWorkflowStep', 'Remove-OCIIdentitydomainsAuthToken', 'Remove-OCIIdentitydomainsCloudGate', 'Remove-OCIIdentitydomainsCloudGateMapping', 'Remove-OCIIdentitydomainsCloudGateServer', 'Remove-OCIIdentitydomainsCondition', 'Remove-OCIIdentitydomainsCustomerSecretKey', 'Remove-OCIIdentitydomainsDynamicResourceGroup', 'Remove-OCIIdentitydomainsGrant', 'Remove-OCIIdentitydomainsGroup', 'Remove-OCIIdentitydomainsIdentityPropagationTrust', 'Remove-OCIIdentitydomainsIdentityProvider', 'Remove-OCIIdentitydomainsMyApiKey', 'Remove-OCIIdentitydomainsMyAuthToken', 'Remove-OCIIdentitydomainsMyCustomerSecretKey', 'Remove-OCIIdentitydomainsMyDevice', 'Remove-OCIIdentitydomainsMyOAuth2ClientCredential', 'Remove-OCIIdentitydomainsMySmtpCredential', 'Remove-OCIIdentitydomainsMySupportAccount', 'Remove-OCIIdentitydomainsMyTrustedUserAgent', 'Remove-OCIIdentitydomainsMyUserDbCredential', 'Remove-OCIIdentitydomainsNetworkPerimeter', 'Remove-OCIIdentitydomainsOAuth2ClientCredential', 'Remove-OCIIdentitydomainsOAuthClientCertificate', 'Remove-OCIIdentitydomainsOAuthPartnerCertificate', 'Remove-OCIIdentitydomainsPasswordPolicy', 'Remove-OCIIdentitydomainsPolicy', 'Remove-OCIIdentitydomainsRule', 'Remove-OCIIdentitydomainsSecurityQuestion', 'Remove-OCIIdentitydomainsSelfRegistrationProfile', 'Remove-OCIIdentitydomainsSmtpCredential', 'Remove-OCIIdentitydomainsUser', 'Remove-OCIIdentitydomainsUserDbCredential', 'Write-OCIIdentitydomainsAccountRecoverySetting', 'Write-OCIIdentitydomainsApp', 'Write-OCIIdentitydomainsApprovalWorkflow', 'Write-OCIIdentitydomainsAppStatusChanger', 'Write-OCIIdentitydomainsAuthenticationFactorSetting', 'Write-OCIIdentitydomainsCloudGate', 'Write-OCIIdentitydomainsCloudGateMapping', 'Write-OCIIdentitydomainsCloudGateServer', 'Write-OCIIdentitydomainsCondition', 'Write-OCIIdentitydomainsDynamicResourceGroup', 'Write-OCIIdentitydomainsGroup', 'Write-OCIIdentitydomainsIdentityPropagationTrust', 'Write-OCIIdentitydomainsIdentityProvider', 'Write-OCIIdentitydomainsIdentitySetting', 'Write-OCIIdentitydomainsKmsiSetting', 'Write-OCIIdentitydomainsMe', 'Write-OCIIdentitydomainsMePasswordChanger', 'Write-OCIIdentitydomainsNetworkPerimeter', 'Write-OCIIdentitydomainsNotificationSetting', 'Write-OCIIdentitydomainsPasswordPolicy', 'Write-OCIIdentitydomainsPolicy', 'Write-OCIIdentitydomainsRule', 'Write-OCIIdentitydomainsSchema', 'Write-OCIIdentitydomainsSecurityQuestionSetting', 'Write-OCIIdentitydomainsSelfRegistrationProfile', 'Write-OCIIdentitydomainsSetting', 'Write-OCIIdentitydomainsUser', 'Write-OCIIdentitydomainsUserCapabilitiesChanger', 'Write-OCIIdentitydomainsUserPasswordChanger', 'Write-OCIIdentitydomainsUserPasswordResetter', 'Write-OCIIdentitydomainsUserStatusChanger' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydomains' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Test-IsAdmin.ps1
Test-IsAdmin.ps1
Function Test-IsAdmin { <# .SYNOPSIS Function used to detect if current user is an Administrator. .DESCRIPTION Function used to detect if current user is an Administrator. Presents a menu if not an Administrator .NOTES Name: Test-IsAdmin Author: Boe Prox DateCreated: 30April2011 .EXAMPLE Test-IsAdmin Description ----------- Command will check the current user to see if an Administrator. If not, a menu is presented to the user to either continue as the current user context or enter alternate credentials to use. If alternate credentials are used, then the [System.Management.Automation.PSCredential] object is returned by the function. #> [cmdletbinding()] Param() Write-Verbose "Checking to see if current user context is Administrator" If (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Write-Warning "You are not currently running this under an Administrator account! `nThere is potential that this command could fail if not running under an Administrator account." Write-Verbose "Presenting option for user to pick whether to continue as current user or use alternate credentials" #Determine Values for Choice $choice = [System.Management.Automation.Host.ChoiceDescription[]] @("Use &Alternate Credentials","&Continue with current Credentials") #Determine Default Selection [int]$default = 0 #Present choice option to user $userchoice = $host.ui.PromptforChoice("Warning","Please select to use Alternate Credentials or current credentials to run command",$choice,$default) Write-Debug "Selection: $userchoice" #Determine action to take Switch ($Userchoice) { 0 { #Prompt for alternate credentials Write-Verbose "Prompting for Alternate Credentials" $Credential = Get-Credential Write-Output $Credential } 1 { #Continue using current credentials Write-Verbose "Using current credentials" Write-Output "CurrentUser" } } } Else { Write-Verbose "Passed Administrator check" } }
combined_dataset/train/non-malicious/sample_25_92.ps1
sample_25_92.ps1
version: '{build}' skip_tags: true clone_depth: 30 environment: JAVA_HOME: C:\Program Files\Java\jdk11 install: - ps: | Add-Type -AssemblyName System.IO.Compression.FileSystem if (!(Test-Path -Path "C:\maven\apache-maven-3.8.4" )) { (new-object System.Net.WebClient).DownloadFile( 'https://dlcdn.apache.org/maven/maven-3/3.8.4/binaries/apache-maven-3.8.4-bin.zip', 'C:\maven-bin.zip' ) [System.IO.Compression.ZipFile]::ExtractToDirectory("C:\maven-bin.zip", "C:\maven") } - cmd: SET PATH=C:\maven\apache-maven-3.8.4\bin;%JAVA_HOME%\bin;%PATH% build_script: - mvn clean install -B -DskipTests test_script: - mvn test -B -Dskip.systests=true --fail-at-end - mvn verify -pl systests/protocol-tests-amqp-1-0,systests/protocol-tests-amqp-0-8,systests/protocol-tests-amqp-0-10 -Dskip.unittests=true -B --fail-at-end on_failure: - ps: | 7z a -r surefire-reports.zip '**\target\surefire-reports\*' Push-AppveyorArtifact surefire-reports.zip -DeploymentName 'Surefire Reports' on_finish: - ps: | $url = "https://ci.appveyor.com/api/testresults/junit/$($env:APPVEYOR_JOB_ID)" $wc = New-Object 'System.Net.WebClient' $dirs = Get-ChildItem -Filter surefire-reports -Recurse ForEach ($dir in $dirs) { $files = Get-ChildItem -Path $dir.FullName -Filter TEST-*.xml ForEach ($file in $files) { $wc.UploadFile($url, (Resolve-Path $file.FullName)) } } cache: - C:\maven\apache-maven-3.8.4
combined_dataset/train/non-malicious/1277.ps1
1277.ps1
function Unlock-CIisConfigurationSection { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [string[]] $SectionPath ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $SectionPath | ForEach-Object { $section = Get-CIisConfigurationSection -SectionPath $_ $section.OverrideMode = 'Allow' if( $pscmdlet.ShouldProcess( $_, 'unlocking IIS configuration section' ) ) { $section.CommitChanges() } } }
combined_dataset/train/non-malicious/sample_4_84.ps1
sample_4_84.ps1
# Localized 10/16/2024 05:34 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=&Sì PromptNoString=&No BundleFound=Pacchetto trovato: {0} PackageFound=Pacchetto trovato: {0} EncryptedBundleFound=Bundle crittografato trovato: {0} EncryptedPackageFound=Pacchetto crittografato trovato: {0} CertificateFound=Certificato trovato: {0} DependenciesFound=Pacchetti di dipendenza trovati: GettingDeveloperLicense=Acquisizione della licenza per sviluppatori in corso... InstallingCertificate=Installazione del certificato in corso... InstallingPackage=\nInstallazione dell'applicazione in corso... AcquireLicenseSuccessful=Acquisizione di una licenza per sviluppatori completata. InstallCertificateSuccessful=Installazione del certificato completata. Success=\nOperazione completata: l'applicazione è stata installata. WarningInstallCert=\nVerrà installato un certificato digitale nell'archivio certificati Persone attendibili del computer. Questa operazione costituisce un grave rischio per la sicurezza e deve essere eseguita solo se si considera attendibile l'origine del certificato digitale.\n\nDopo aver terminato di usare l'app, è consigliabile rimuovere manualmente il certificato digitale associato. Le istruzioni necessarie sono disponibili all'indirizzo: http://go.microsoft.com/fwlink/?LinkId=243053\n\nContinuare?\n\n ElevateActions=\nPrima di installare questa applicazione, è necessario eseguire quanto segue: ElevateActionDevLicense=\t- Acquisire una licenza per sviluppatori ElevateActionCertificate=\t- Installare il certificato di firma ElevateActionsContinue=Per continuare sono necessarie credenziali di amministratore. Accettare l'avviso di Controllo dell'account utente e specificare, se richiesta, la password di amministratore. ErrorForceElevate=Per continuare è necessario specificare credenziali di amministratore. Eseguire questo script senza il parametro -Force oppure da una finestra di PowerShell con privilegi elevati. ErrorForceDeveloperLicense=L'acquisizione di una licenza per sviluppatori richiede l'intervento dell'utente. Eseguire di nuovo lo script senza il parametro -Force. ErrorLaunchAdminFailed=Errore: impossibile avviare un nuovo processo come amministratore. ErrorNoScriptPath=Errore: è necessario avviare questo script da un file. ErrorNoPackageFound=Errore: nessun pacchetto trovato nella directory dello script. Accertarsi che nella directory dello script sia presente il pacchetto da installare. ErrorManyPackagesFound=Errore: più pacchetti trovati nella directory dello script. Accertarsi che nella directory dello script sia presente solo il pacchetto da installare. ErrorPackageUnsigned=Errore: il pacchetto non è provvisto di firma digitale oppure la firma è danneggiata. ErrorNoCertificateFound=Errore: nessun certificato trovato nella directory dello script. Accertarsi che nella directory dello script sia presente il certificato utilizzato per firmare il pacchetto da installare. ErrorManyCertificatesFound=Errore: più certificati trovati nella directory dello script. Accertarsi che nella directory dello script sia presente solo il certificato utilizzato per firmare il pacchetto da installare. ErrorBadCertificate=Errore: il file "{0}" non è un certificato digitale valido. CertUtil terminato con codice di errore {1}. ErrorExpiredCertificate=Errore: il certificato "{0}" dello sviluppatore è scaduto. È possibile che l'orologio di sistema non sia impostato sulla data e sull'ora corrette. Se le impostazioni di sistema sono corrette, contattare il proprietario dell'applicazione per ricreare un pacchetto con un certificato valido. ErrorCertificateMismatch=Errore: il certificato non corrisponde a quello utilizzato per firmare il pacchetto. ErrorCertIsCA=Errore: il certificato non può essere un'autorità di certificazione. ErrorBannedKeyUsage=Errore: il certificato non può avere il seguente utilizzo chiavi: {0}. L'utilizzo chiavi deve essere non specificato o corrispondere a "DigitalSignature". ErrorBannedEKU=Errore: il certificato non può avere il seguente utilizzo chiavi avanzato: {0}. Sono consentiti solo utilizzi chiavi avanzati (EKU) Firma codice e Firma definitiva. ErrorNoBasicConstraints=Errore: il certificato non dispone dell'estensione Limitazioni di base. ErrorNoCodeSigningEku=Errore: il certificato non dispone dell'utilizzo chiavi avanzato per Firma codice. ErrorInstallCertificateCancelled=Errore: installazione del certificato annullata. ErrorCertUtilInstallFailed=Errore: impossibile installare il certificato. CertUtil terminato con codice di errore {0}. ErrorGetDeveloperLicenseFailed=Errore: impossibile acquisire una licenza per sviluppatori. Per ulteriori informazioni, vedere http://go.microsoft.com/fwlink/?LinkID=252740. ErrorInstallCertificateFailed=Errore: impossibile installare il certificato. Stato: {0}. Per ulteriori informazioni, vedere http://go.microsoft.com/fwlink/?LinkID=252740. ErrorAddPackageFailed=Errore: impossibile installare l'applicazione. ErrorAddPackageFailedWithCert=Errore: impossibile installare l'applicazione. Per garantire la sicurezza, provare a disinstallare il certificato di firma finché non risulta possibile installare l'applicazione. Le istruzioni necessarie sono disponibili qui:\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@
combined_dataset/train/non-malicious/sample_23_66.ps1
sample_23_66.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.ServiceBus.private.dll') # Load the internal module $internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.ServiceBus.internal.psm1' if(Test-Path $internalModulePath) { $null = Import-Module -Name $internalModulePath } # Export nothing to clear implicit exports Export-ModuleMember # Export script cmdlets Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias) # endregion # SIG # Begin signature block # MIIoOwYJKoZIhvcNAQcCoIIoLDCCKCgCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC1sWsmBhU6y3Cj # 53C7D2jiqPwYFOvVFboxLaRFWESOXqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFud # 40LtbzMPUcJo1l2Qr/CSBycfPSv86bY86eatVZqMMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEApWOPG1heesiPUFYF9UXjM1e3KGOomKnuhNtT # Vke7YwNRuLti2a/L884nRvKeEMm+NhHfWjhum1qri8j4eWFPSvpAw3ZldPgpkv5m # lWtO3KeEPajH2TrvgYRZmmh4eKVk24V/E1O90+oepe/QZwGg7j/gdasiPDyyAEQZ # 1P+EhSih4vdn4QtgCB2uVPnSKGUkPkYb5S5LC+wRpcZTIv59BOel64zKXNoBjvu5 # UmKWZWvweWUGO4C9L/jDsl+yl7RermPiP3TsTTzQJ3m6FurQvKfBHzmYgp6FmEcT # l7RlPhwVQM9uEBiFLENhlButnEmwy8uYpWcjXTXsnmsvhTYTw6GCF5YwgheSBgor # BgEEAYI3AwMBMYIXgjCCF34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCA0JCmCm/3tLrb63ZzAhkAWOP1q9eyj84za # TValwIUhCgIGZjOaa5vhGBIyMDI0MDUxNjA2NDIxMS40NlowBIACAfSggdGkgc4w # gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT # HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg # VFNTIEVTTjo5NjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEe0wggcgMIIFCKADAgECAhMzAAAB74k/VqFYzKjaAAEA # AAHvMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIzMTIwNjE4NDU0OFoXDTI1MDMwNTE4NDU0OFowgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5NjAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKMLWOKfDOAfCE5qRmrLXugT # gEgEqybmRfgNSYIFYjSUVWkSIrmZnYqHn2ygvieznamEUxBgYbmTKkKKm6eDA/02 # hvhUZUTpqgyjmFn03K1dHllGBv1nw1HoSYsogJGEPiyiM8yD9GcZFNx1/v9Ni/Iz # XSMuOYvIoR6Awd+8jA+Yz4A/uHNAt8TEN2oIna7rgZ3leWesU6S7lT2Ms4qTXLvR # z5PC3Tj9Euqu6/V8Y/wuZia0e+sHhNwGwANdKZwWOHRWBCRfjNcXCqcgbyuBj7MO # olhA1k/w7VijiRJyQdPjdcLSgzjTJ7b72X+tNiIMUzeeVl7aOG06QYI7oaqJOnnT # Ej0hOkleLS8R6TwB6NPg8owQ7Zs/FTrenre5luN03kv6WAhwI0wI0jRIiilLiBpV # HhLL8igO/W8Nal74jbz8rLyNZN553Q7cfE8kxmpfhAHcjoOfBmseIqfqgTfy2AFM # IIAq8Shg5ODuvaUXQi5u3/f5U+8q1MJRtk8U4byNm32roAWh2W9Ce2KiVghi2pKs # vJcBAiVcaFniA1y/h2/VgCKWdtYD0KydiH44oQWv/jDgzr2Uj7Jqhncv+39R9elP # /7JzuFL8WiVyasYUlMFiVLicTVy4puXBn9Q4bbpIuEM41ZcZkMowko3neg4tJKTi # V1HQeWxtPiF4uVaU4SUlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU7UxaooXCsJu2 # vD0/wDrdsBVInMswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBABgZlrdoIO51uT0R # V2Q/zFxAZm4gAg9HH0rUIDu5HMG3zR8LRpaS5hiFAy8cclEdShtIzhTDfM3t8cQ3 # yGFoENv01FoacVZ20fGYn14zPommfoqIjKL1Tk6DtAJNkyXXufbDh512rm+2TitF # Y5W+mIMEYkBEqJdYH27aLHRYfYQwUYeqMiGNZReE+BHgLo0oU1ce9a9d5wnZZesm # e+9AZcB80kYRMlkalHjWdQ3eKN+IJKMUPFqYY+zLmJi73Tge/265Jdh3mbQnF/ZY # 0lJeQ8aU2Gs7buk/GBPXXWbIBHrVLdLaFznvbM33KgkQ5sT3xXLkoQzdlfndwt58 # 3zUXUL2n9wAqQTq71XqvLKX+pKDG7VSp45kK0b+JodIoyjEzsyrhIwWw9P/yJ453 # AKVilzDQKNl7koHHbEtrgHWd4WJvwnz+BKiyMx0XeceLIfHVh51kO3FJKB6B4myL # R9tSB3OxUwli+pXDnZapA27QZELv1m5Wt5RUp0ImZQwEcGlOnpUWikvQl/hKuCD7 # NEP2LBtz25muf7z2h2kidvOdiuc8oeI7bqp7V6Q3CX93uujYi0/+WCHPQOgPuQQZ # 6KQolYd22jt5UmgmGStRxqdO5QfTyD41jAbpL4+MFIH83I0Xpsdr/FH5x4BiFyPH # SIGK/3QyfQmIZ+cDb+EuPl6+FNwCMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCA1AwggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj # YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUw # LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB # ATAHBgUrDgMCGgMVAEtwjzWDFt5rUTHaYVtfHtyT7SD/oIGDMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp7+RqMCIY # DzIwMjQwNTE2MDE0ODI2WhgPMjAyNDA1MTcwMTQ4MjZaMHcwPQYKKwYBBAGEWQoE # ATEvMC0wCgIFAOnv5GoCAQAwCgIBAAICBLcCAf8wBwIBAAICE3QwCgIFAOnxNeoC # AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEK # MAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAu0FKTif6tJN4xlBSGgn3YYZ2 # GP+OTvExcu7ZYXuFP2lEOtwPPK49v8uspVyoeviNCFuOSL6tjyEvTrOQfqex4nhb # TrzN4KE+02zSexJtOf18vtTdDm68e+sMQkWPqK9Oh7PwQYFppZvnUqXLxRU6DE5M # 7crAEcSzsBKZVUX2Clx0IW0cGABR3jeXqHL+UPga+argiwY+qFqqweFE0MfYX7NQ # 02NeFEIlno/dZIIJCu69qvem9B+gfOI8lH5fF71y2Xo9JxcAaMaUNzwzePtc6nFM # rfgL9wflGyW3k1BcJxtsbgSoVz+Ma8aGye8IDyJLcthG1s/qk57RZYQH5B8ZHDGC # BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 74k/VqFYzKjaAAEAAAHvMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx # DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIP+fYW/XYXpwlh81MPu1xUDG # jtHPk9od1OdMVFe6MaWUMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg8GEo # RbgWjfBTPT01DHZrQNtx2xfyOi8zkuLMeafJf6MwgZgwgYCkfjB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB7zAiBCByD+GC # ceSUCvMZsGSif6LO2ySKv160qRO0HLaEmDaX4zANBgkqhkiG9w0BAQsFAASCAgAh # bbMibeJqCP1hW09T39sYBkjCNs0xoeOrlccBwzwvBjE9iSlGR0o+Ec1IKCSbSLtw # lNtBoApBrkTVeMXvbO1u0eRxyWM03zOdZCGFZ0JT43t2emk6EZAblODmmCsLtVbC # 9F/fyr77R88aVKPdi/QlZr1rICoHXG4Vwg6ceMZ2KrqEPSem4OQnU9ipE/DNjMc7 # mqCw0c//YE41uSPiCRDhfmAz+xNygzToIpmis4mTt6ScMiL2Sx8FnciDKJRokayS # deJsLGQTdn+8Pd4zCp6XAwrsPsv5BQgYZ0GsuodmiLR6ZaUP76VW8PsZHPdIa1xG # tDDoQY8E759LNRHVb8wR9+2V28WBarMHXcN6VzH3maH+TpPMiRRwCB3kNRwnanyG # usjJT5FQ2q1/7mpchDns4E/RcLII84SUL5m1CXDVDv3ddnPhIrLE6HJJhoSDhPnb # DBqFtrK3Orio++mgi4LpGkFVao43jwygA2vq4pAUmx3X+xD/fM2YCLClwtNO9GY4 # YUYAiad0vdAkroNDMp753jLjFGUV4rWYdtUd3nhpHnsyk/WXEmceLCB/4woditPO # eSteSBCIasajSA9ce3eRfU6130uHoRliXjEAdEX0TafN3zjKjCpkOxEMBIhnYHCt # Y6H9dq6FFu/7mLI5htpoy5LaZ1q7ej+qngp29j8jTQ== # SIG # End signature block
combined_dataset/train/non-malicious/sample_19_78.ps1
sample_19_78.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> <# .SYNOPSIS Executes collection Diagnostic logs utilizing the JEA endpoint. .PARAMETER EndpointName The name of the JEA endpoint to access. .PARAMETER ComputerName The name of the computer on which to invoke the endpoint. .PARAMETER FromDate The starting window from which to start collection logs. By default this value is 4 hours before now. .PARAMETER ToDate The ending time window for collecting logs. .PARAMETER IncludeGetSDDCLogs If true, collect cluster logs. .PARAMETER FilterByRole The roles to filter on. .PARAMETER FilterByNode The nodes to filter on. .PARAMETER TimeoutInMinutes Timeout for gathering log data. .PARAMETER TracingContext Value passed to other script so that traces between components can be correlated. .PARAMETER IsAutonomous Whether this is an autonomous log collection. .PARAMETER LogCollectionJobType Whether the job is OnDemand or Scheduled .PARAMETER FallbackNotDistributed If present, log orchestration should collect logs from all nodes in the cluster. .OUTPUTS A result object continating the results of the log collection. #> function CollectDiagnosticLogsJEA { Param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $EndpointName, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$false)] [nullable[DateTime]] $FromDate, [Parameter(Mandatory=$false)] [nullable[DateTime]] $ToDate, [Parameter(Mandatory=$false)] [Switch] $IncludeGetSDDCLogs, [Parameter(Mandatory=$false)] [string[]] $FilterByRole, [Parameter(Mandatory=$false)] [string[]] $FilterByNode, [Parameter(Mandatory=$false)] [int] $TimeoutInMinutes, [Parameter(Mandatory=$false)] [Guid] $TracingContext = [Guid]::Empty, [Parameter(Mandatory=$false)] [bool] $IsAutonomous, [Parameter(Mandatory=$false)] [string] $LogCollectionJobType, [Parameter(Mandatory=$false)] [Switch] $FallbackNotDistributed ) try { if ($null -eq $FromDate) { $FromDate = (Get-Date).AddHours(-4) Write-Information "FromDate parameter not specified. Setting to default value: $FromDate" } if ($null -eq $ToDate) { $ToDate = Get-Date Write-Information "ToDate parameter not specified. Setting to default value: $ToDate" } $logResult = $null $arcAEnvironment = (Get-ItemProperty -Path "HKLM:\Software\Microsoft\ArcA\" -ErrorAction SilentlyContinue).IsArcAEnv if (-not $FallbackNotDistributed.IsPresent) { # Import the module (Get-DiagnosticLog) $module = Get-ChildItem -Include *Microsoft.AzureStack.Observability.LogOrchestrator.dll -Recurse Write-Information "Importing module: $($module.FullName)" Import-Module $module.FullName -Force -Verbose # Overrides for Arc-A if ($arcAEnvironment) { $IncludeGetSDDCLogsBool = $false $LogCollectionJobType = "OnDemand" $LocalMode = $true $BypassedObsAgent = $true } else { $IncludeGetSDDCLogsBool = $IncludeGetSDDCLogs.IsPresent $LocalMode = $true $BypassedObsAgent = $false } $getLogParams = @{ LogCollectionStartTimeUTC = $FromDate LogCollectionEndTimeUTC = $ToDate IncludeGetSDDCLogs = $IncludeGetSDDCLogsBool FilterByRole = $FilterByRole FilterByNode = $FilterByNode TimeoutInMinutes = $TimeoutInMinutes TracingContext = $TracingContext IsAutonomous = $IsAutonomous LogCollectionJobType = $LogCollectionJobType LocalMode = $LocalMode BypassedObsAgent = $BypassedObsAgent } Write-Information "Invoking Get-DiagnosticLog directly on $($env:COMPUTERNAME) with parameters: $($getLogParams | ConvertTo-Json)" $logResult = Get-DiagnosticLog @getLogParams } else { $getLogParams = @{ LogCollectionStartTimeUTC = $FromDate LogCollectionEndTimeUTC = $ToDate IncludeGetSDDCLogs = $IncludeGetSDDCLogs.IsPresent FilterByRole = $FilterByRole FilterByNode = $FilterByNode TimeoutInMinutes = $TimeoutInMinutes TracingContext = $TracingContext IsAutonomous = $IsAutonomous LogCollectionJobType = $LogCollectionJobType LocalMode = !$FallbackNotDistributed.IsPresent } $jeaSession = Get-JEASession -Endpoint $EndpointName -ComputerName $ComputerName $getLogScript = { param($pHash) Get-DiagnosticLog 6>&1 @pHash } Write-Information "Invoking Get-DiagnosticLog via JEA session with parameters: $($getLogParams | ConvertTo-Json)" $logResult = Invoke-Command -Session $jeaSession -ScriptBlock $getLogScript -ArgumentList $getLogParams } if ($null -ne $logResult) { Write-Information "Get-DiagnosticLog returned: $($logResult | ConvertTo-Json)" $genevaResult = @{ TotalFileCount = $logResult.GenevaConnector_TotalFileCount ParsedFileCount = $logResult.GenevaConnector_ParsedFileCount FailedFileCount = $logResult.GenevaConnector_FailedFileCount SkippedFileCount = $logResult.GenevaConnector_SkippedFileCount NotParsableFileCount = $logResult.GenevaConnector_NotParsableFileCount ExcludedFileCount = $logResult.GenevaConnector_ExcludedFileCount ParsedFileSizeInMB = $logResult.GenevaConnector_ParsedFileSizeInMB ElapsedTimeInMinutes = $logResult.GenevaConnector_ElapsedTimeInMinutes Failed = $logResult.GenevaConnector_Failed Exception = $logResult.GenevaConnector_Exception } return @{ OverallSuccess = $logResult.OverallSuccess IsClusterLogCollectionSuccessful = $logResult.IsGetSddcCollectionSuccessful ClusterLogCollectionExceptionMessage = $logResult.GetSddcCollectionException IncludeSDDCLogs = $logResult.IncludeSddcLogs IsDiagLogCollectionSuccessful = $logResult.IsGetAszLogCollectionSuccessful DiagLogCollectionExceptionMessage = $logResult.GetAszLogCollectionError LogCollectionExceptionMessage = $logResult.Exception GenevaResults = $genevaResult } } else { Write-Error "Get-DiagnosticLog failed to produce a result. Diagnostics data will not be collected." return $null } } catch { Write-Error "Get-DiagnosticLog failed with exception on $ComputerName with: $_" return $null } finally { if ($null -ne $jeaSession) { Write-Information "Removing JEA session $($jeaSession.InstanceId)" Remove-PSSession $jeaSession } } } <# .SYNOPSIS Initializes a JEA PS session. .DESCRIPTION Uses the current user's credentials to create a JEA PowerShell session. .PARAMETER EndpointName The name of the JEA endpoint. .PARAMETER ComputerName The name of the computer on which to invoke the endpoint. #> function Get-JEASession { Param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $EndpointName, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ComputerName ) $currentSessions = Get-PSSession -ComputerName $ComputerName -ConfigurationName $EndpointName # Remove any existing JEA sessions to this endpoint if ($null -ne $currentSessions) { # ASK-CEDRICDA-Couldn't we be closing a session that is currently in use? Write-Information "Found $($currentSessions.Count) open sessions for $EndpointName" -Verbose # TODO-CEDRICDA-Clean up sessions. See code from Hub } Write-Information "Opening session on $ComputerName with endpoint $EndpointName" -Verbose $psSessionOption = New-PSSessionOption -IdleTimeout 60000 # ASK-CEDRICDA-Are retries necessary? Hub code has it. # TODO-CEDRICDA-retries $jeaSession = New-PSSession -ComputerName $ComputerName -ConfigurationName $EndpointName -Verbose -SessionOption $psSessionOption -ErrorAction Stop return $jeaSession } function Get-EndpointExists { Param( [Parameter(Mandatory=$true)] [string] $EndpointName ) return $(Get-PSSessionConfiguration -Name $EndpointName -ErrorAction SilentlyContinue) } Export-ModuleMember -Function CollectDiagnosticLogsJEA # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC+w148JirzRvZF # 5ZJGmDzKzOJgFEQr53LhDRI4sGfYxqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHiS+4g8K7fLL4isd6ccBNSi # VaDng0gTEXENJhsMjO2uMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAdV2EppzqR89yWNvxbDsb8ln2tHvuTl2GIe16d5AhLl43N3TrBdTSnORR # 5mxAxabgCnOgfp+YMkQhFMccP8GphYmuIcHAFhnR7ewf/Re3V/9iNdRyi+Z7W1Vw # KxVa/Twq97CY6EWfoPE8W1iXIj7vzVDB8wCMI9MMU8i/59n1ExUzkgTGDPMWWoKM # JqzfHEOKj3c2MgtS6GJWHhZhlmDItIDKPkZk278bkrBEfC2liM1YtaD3rmGB2UdN # 1XB+0pI80moaIWH/pqrmT2UV+B3mC1ktsgnWEboPjAeH21LLN+HuGt7GlajjHJdZ # pkbS/d6PQLcjVkFtlPcAxuGEVcl3QKGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAhHYDZlSudmONWX3jh0/NWxoJ80JtUuNMeu4HVQWfMrAIGZbwTZ7ZS # GBIyMDI0MDIxMjE0MDkyMC42MlowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBNDAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # Ee0wggcgMIIFCKADAgECAhMzAAAB7OArpILQkVKAAAEAAAHsMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUz # OFoXDTI1MDMwNTE4NDUzOFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBNDAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBALBH9G4JNuDFRZWb9V26Xba7B0RmbQigAWzqgivf1Ur8 # i0/zRyf7xOa0/ruJpsHgOYAon0Yfp0kaEQ8mlji9MpFI7CtE3FUgqg895QXd/hXI # cRyj+7VBRp2XAPXfY25kLFueHoyLaUsbukO+zNmowbtLcwKLZuTae+0Yp14Agv4f # vuAvivTVNJZvuuwTYlvU/83pj9bUKoOLX8hvf/NGpZe3jPG90gZw+NLhkrJAQXdI # RkCrhciOLKjA8dqo1tnF1/aRY79qN19NTzm33fgJcCKdvSj65D0q1oo0tVVw1/lC # lLh/r8yxc68gW4JgxF0oOOma+jAB4v7WPbtsLEIGkNAetaR8/Nmn9f5u30LsTmE8 # /odVGioFhHu7WBR/kYSr7mvUcDSNqOfRDo699hyQTQd06/opZr6wCYkbs8O9Nlp7 # vuGibPHog+qCBWk1m4KTv1J9Wacq70XnxQCdTnxOoMcTMaxCcxRAqy1LfOOfpJTQ # 0sQU0J62W5oqSpYNFUsRZu7fb0gSHe2pc9d/LpGH/AJvB71IIkiiq0F7EGs/JBgD # ZdrPV8r3KxOzHSQD1XUnBVXjghr1z4zC0BHqyop0CBGj9uz9e7yC5rwsN7opbK73 # vh72YZbtk7ydqsMWsBPURcYcO57KBIq+/YrvAHyUCAwYmPvcJC+v6OqhbDHpd3J5 # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU9FrQR2T+K/XCFhCxXxSAR/hMhYYwHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAJK8xKQxKu+OUM9qDwBFvQ4WsBC1IswOk3RR # jcWO8+HAYoOuuLGae4x+OuZWNGrW7wiGQO8YX9t99sVOv4gCcNJ6DxMH3N8b/jJu # Se6imSVt4aNu3swvGl+GiUIRHIRzbQ8xkonP1K/N+47WfnGuss4vybSea/mQFy/7 # LUBcnlBwuJyaF7Yinf8PrsR3qg+pAjTeYONhpLU1CEE227nvA8pdnUSg1OgGTxsD # rzf3DXX1v5r1ZOioiyR1Eag/nGMMi/6ZzS8EeFkaQlW98iGbgCnzOm0LvFUCXLSN # 46/l1QYwJiBmO+hOaB3jluoDC6d2Y+Ua6vt6V5Zh50tB/uzcvn6p9pj/ESH/26jX # tKcz+AdVIYDO+et4aE6sHYu10qhVJ7kttimKFdy0N7vqJi0v6aHFc8SnN1rdsmWE # 9M5Dco4RkClUREGjnKW1aM8JaVfHIKmXmOP2djSd93TvVt6aei7wDetRmt2Aohq6 # 2wftIc6I55tkao277rba8m1rd4BiwIBrEBwH0GIk+Vrtdp32qtNh1PjlWUJhO0FJ # jihVGx51IAO/32O/+JggAbLVsLK25rSj9Cq/16sqbNAJNUxdoNzbkNMtwwYmtG5r # crTGK922egF7HNUmvrJeoz4FrbCEhVG8ZyuIGQpfQUkV5buvb1df6TR7gOcbqIEc # pCN5zpU3MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw # ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAI4c # +2BV3P0RbSI80v8FeomipUx/oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpdGiYMCIYDzIwMjQwMjEyMDk1MTIw # WhgPMjAyNDAyMTMwOTUxMjBaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl0aJgC # AQAwCgIBAAICJCgCAf8wBwIBAAICEx0wCgIFAOl1uhgCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAUFTrvzo7b1KQFRP6gLv9BydWF9M5Bby2GMNzRGhFgmIh # RE86TFE78iUN32VnWB8810Bj7y8ff4r3KbtZ+krhurTyPZvypUjqYns5RTUiolTl # VONABXwmvlvcGDPd3r3QKBPAtEO9sQjUHO4sE1x4sRMEO4Im3anqeX+5BPHp39JL # wsqD/V5I5Kqc/OgQarend7pnVekeUpFkVcNlFkTiEY+4+I03nZ+yxLvtYWZSA5Zq # +TTGmqsJcXEzJqUfpS5bgkM/R0YDgUSFvJLhbIMVLFCw9u2b8vWOSVF2HsKOV6gu # YglAnro0jOpD9yybnP6ySgO6W8J8I3PSubgdDhbcjTGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7OArpILQkVKAAAEAAAHs # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIC7ZEKrM+ZOgxHcr+c7D7uLKH4bb60AwizguBFnHRcET # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgJwnm9Wp9N8iHHbVAEFsrKj/F # yJAhdqgxZQt6MATVCoMwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAiBCDiH61S/YxE5U0K5l7Ehm708C7c # /DSEfwf9tSghQ1wO5TANBgkqhkiG9w0BAQsFAASCAgBK7q1dY0p+rXfZ4hGlZ3VJ # twY7+zXMc09vF0DXIh1UbizEUmBUeJLBo0TmU1OU18lIFMRI+eTkAKLD+Lq2M9vC # urI6vJEIZ4YGzqVzL8I50fhKpr4bMYKvdMSOIIBcrOMNOS63irI+/xYH0twA61qa # hdM64SJ9lhKFNFE9SH0n6VMaLI0Lf3IQ2y49wPXw9dpK18ffxpchHOKtzkfoLybM # pYt3KGW2cECqQJ4gAVCglKgLY6UvEmHeNUO8MeNiFL+5QTgUBeTvPPieekPaKh5s # uKXsCT01l2AQ/qxyFUxnRxWO4OOqIAVp1UlSj7iFl/YtlYIP95t1lYamJRbGfUg0 # 16WWKoZpeO52SkriYrem5sI/5IeAR15DB8LgRObNZM+h8nvCJDSV8Lcymkyf9tIE # eIccBB3aFadTdo354UwjRVeE6ENfmQifG/hiaFH6MGzOJp/S6N7LEaghoVy7I3I7 # 7Tmbyl3NAzL6p2JUK9jqDW2WCLoDsPfKTiP618y/kfL6s0IXkxPV5GuCXu/qYU6b # WXKA1FdiDEvcSnGUcxFee9pSnipHmxmpq2gqzPgCr+YRPtCjgc8369SkJBk2yWzL # AHi7sCNnpmMjdsIfOc0FBuwctKNu1Qq7nyKXiNov+giWjPd+eO1/n0l4gbO4TX03 # gHf8Ppx25G0cOG11Aw0QRA== # SIG # End signature block
combined_dataset/train/non-malicious/sample_5_17.ps1
sample_5_17.ps1
# # Module manifest for module 'OCI.PSModules.Resourcescheduler' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Resourcescheduler.dll' # Version number of this module. ModuleVersion = '92.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '410b94b1-9573-414c-8179-e65332969614' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Resourcescheduler Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcescheduler.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIResourceschedulerSchedule', 'Get-OCIResourceschedulerResourceTypesList', 'Get-OCIResourceschedulerSchedule', 'Get-OCIResourceschedulerSchedulesList', 'Get-OCIResourceschedulerWorkRequest', 'Get-OCIResourceschedulerWorkRequestErrorsList', 'Get-OCIResourceschedulerWorkRequestLogsList', 'Get-OCIResourceschedulerWorkRequestsList', 'Invoke-OCIResourceschedulerDeactivateSchedule', 'New-OCIResourceschedulerSchedule', 'Remove-OCIResourceschedulerSchedule', 'Stop-OCIResourceschedulerWorkRequest', 'Update-OCIResourceschedulerSchedule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcescheduler' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/New-StoredProcFunction_3.ps1
New-StoredProcFunction_3.ps1
# New-StoredProcFunction.ps1 # Steven Murawski # http://blog.usepowershell.com # 04/08/2009 # Replaced the parsing of the stored procedure text and use Information_Schema.Parameters to get the parameter information # Thanks to Chad Miller for the idea. # Example: ./New-StoredProcFunction.ps1 'Data Source=MySqlServer;Database=Northwind;User=AnythingButSa;Password=abc123' sp_createnewcustomer # Example 'sp_createnewcustomer | ./New-StoredProcFunction.ps1 'Data Source=MySqlServer;Database=Northwind;User=AnythingButSa;Password=abc123' param($ConnectionString, [String[]]$StoredProc= $null) BEGIN { if ($StoredProc.count -gt 0) { $StoredProc | ./New-StoredProcFunction $ConnectionString } function Invoke-SQLQuery() { param ($ConnectionString, $Query) $connection = New-Object System.Data.SqlClient.SqlConnection $connectionString $command = New-Object System.Data.SqlClient.SqlCommand $query,$connection $connection.Open() $adapter = New-Object System.Data.SqlClient.SqlDataAdapter $command $dataset = New-Object System.Data.DataSet [void] $adapter.Fill($dataSet) $connection.Close() $dataSet.Tables | ForEach-Object {$_.Rows} } function Get-FunctionParameter() { param($FunctionName, $ConnectionString) $query = @" SELECT parameter_Name, data_type, character_maximum_length, parameter_mode FROM INFORMATION_SCHEMA.Parameters WHERE specific_NAME LIKE '$FunctionName' "@ $Rows = Invoke-SQLQuery $ConnectionString $Query foreach ($Row in $Rows) { $Parameter = "" | Select-Object Name, DataType, Length, IsOutput $Parameter.Name = $row.parameter_Name $Parameter.DataType = $Row.data_type $Parameter.Length = $Row.character_maximum_length $Parameter.IsOutput = if ($Row.parameter_mode -eq 'INOUT'){$true} else {$false} $Parameter } } } PROCESS { if ($_ -ne $null) { $FunctionName = $_ $Parameters = Get-FunctionParameter $FunctionName $ConnectionString [String[]]$InputParamNames = $Parameters | where {-not $_.IsOutput} | ForEach-Object {$_.Name -replace '@' } [String[]]$OutputParameterNames = $Parameters | Where-Object {$_.IsOutput} | ForEach-Object {$_.Name -replace '@'} $ScriptText = ' ' if ($InputParamNames.count -gt 0) { $OFS = ', $' $ScriptText += 'param (${0})' -f $InputParamNames $ScriptText += "`n" $OFS = ', ' } $BodyTemplate = @' $connection = New-Object System.Data.SqlClient.SqlConnection('{0}') $command = New-Object System.Data.SqlClient.SqlCommand('{1}', $connection) $command.CommandType = [System.Data.CommandType]::StoredProcedure '@ $ScriptText += $BodyTemplate -f $ConnectionString, $FunctionName if ( ($Parameters -ne $null) -or ($Parameters.count -gt 1) ) { if ($OutputParameterNames.count -gt 0) { $ReturnText = "" $CommandOutput = "" | select $OutputParameterNames } #Add the parameters foreach ($param in $Parameters) { if ($param.length -isnot [DBNull]) { $ParamTemplate = '$command.Parameters.Add("{0}", "{1}", {2}) | out-null ' $ScriptText += "`n" $ScriptText += $ParamTemplate -f $param.name, $param.datatype, $param.length } else { $ParamTemplate = '$command.Parameters.Add("{0}", "{1}") | out-null ' $ScriptText += "`n" $ScriptText += $ParamTemplate -f $param.name, $param.datatype } if ($param.IsOutput) { $ScriptText += "`n" $ScriptText += '$command.Parameters["{0}"].Direction = [System.Data.ParameterDirection]::Output ' -f $param.Name $ReturnText += "`n" $ReturnText += '$CommandOutput.{1} = $command.Parameters["{0}"].Value' -f $param.name, ($param.name -replace '@') } else { $ScriptText += "`n" $ScriptText += '$command.Parameters["{0}"].Value = ${1} ' -f $param.name, ($param.name -replace '@') } } } $ScriptText += "`n" $ScriptText += @' $connection.Open() | out-null $command.ExecuteNonQuery() | out-null '@ if ($OutputParameterNames.count -gt 0) { $ScriptText += $ReturnText } $ScriptText += @' $connection.Close() | out-null return $CommandOutput '@ #$ScriptText Set-Item -Path function:global:$FunctionName -Value $scripttext } }
combined_dataset/train/non-malicious/Resolve-Aliases _1.7.ps1
Resolve-Aliases _1.7.ps1
#requires -version 2.0 ## ResolveAliases Module v 1.6 ######################################################################################################################## ## Sample Use: ## Resolve-Aliases Script.ps1 | Set-Content Script.Resolved.ps1 ## ls *.ps1 | Resolve-Aliases -Inplace ######################################################################################################################## ## Version History ## 1.0 - First Version. "It worked on my sample script" ## 1.1 - Now it parses the $(...) blocks inside strings ## 1.2 - Some tweaks to spacing and indenting (I really gotta get some more test case scripts) ## 1.3 - I went back to processing the whole script at once (instead of a line at a time) ## Processing a line at a time makes it impossible to handle Here-Strings... ## I'm considering maybe processing the tokens backwards, replacing just the tokens that need it ## That would mean I could get rid of all the normalizing code, and leave the whitespace as-is ## 1.4 - Now resolves parameters too ## 1.5 - Fixed several bugs with command resolution (the ? => ForEach-Object problem) ## - Refactored the Resolve-Line filter right out of existence ## - Created a test script for validation, and ## 1.6 - Added resolving parameter ALIASES instead of just short-forms ## 1.7 - Minor tweak to make it work in CTP3 ## ## * *TODO:* Put back the -FullPath option to resolve cmdlets with their snapin path ## * *TODO:* Add an option to put #requires statements at the top for each snapin used ######################################################################################################################## function which { PARAM( [string]$command ) # aliases, functions, cmdlets, scripts, executables, normal files $cmds = @(Get-Command $command -EA "SilentlyContinue") if($cmds.Count -gt 1) { $cmd = @( $cmds | Where-Object { $_.Name -match "^$([Regex]::Escape($command))" })[0] } else { $cmd = $cmds[0] } if(!$cmd) { $cmd = @(Get-Command "Get-$command" -EA "SilentlyContinue" | Where-Object { $_.Name -match "^Get-$([Regex]::Escape($command))" })[0] } if( $cmd.CommandType -eq "Alias" ) { $cmd = which $cmd.Definition } return $cmd } function Resolve-Aliases { [CmdletBinding(ConfirmImpact="low",DefaultParameterSetName="Files")] Param ( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Text")] [string]$Line , [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Files")] [Alias("FullName","PSChildName","PSPath")] [IO.FileInfo]$File , [Parameter(Position=1, ParameterSetName="Files")] [Switch]$InPlace ) BEGIN { Write-Debug $PSCmdlet.ParameterSetName } PROCESS { if($PSCmdlet.ParameterSetName -eq "Files") { if($File -is [System.IO.FileInfo]){ $Line = ((Get-Content $File) -join "`n") } else { throw "We can't resolve a whole folder at once yet" } } $Tokens = [System.Management.Automation.PSParser]::Tokenize($Line,[ref]$null) for($t = $Tokens.Count; $t -ge 0; $t--) { $token = $Tokens[$t] # DEBUG $token | fl * | out-host switch($token.Type) { "Command" { $cmd = which $token.Content Write-Debug "Command $($token.Content) => $($cmd.Name)" #if($cmd.CommandType -eq "Alias") { $Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, $cmd.Name ) #} } "CommandParameter" { Write-Debug "Parameter $($token.Content)" for($c = $t; $c -ge 0; $c--) { if( $Tokens[$c].Type -eq "Command" ) { $cmd = which $Tokens[$c].Content # if($cmd.CommandType -eq "Alias") { # $cmd = @(which $cmd.Definition)[0] # } $short = $token.Content -replace "^-?","^" Write-Debug "Parameter $short" $parameters = $cmd.ParameterSets | Select -expand Parameters $param = @($parameters | Where-Object { $_.Name -match $short -or $_.Aliases -match $short} | Select -Expand Name -Unique) if($param.Count -eq 1) { $Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, "-$($param[0])" ) } break } } } } } switch($PSCmdlet.ParameterSetName) { "Text" { $Line } "Files" { switch($File.GetType()) { "System.IO.FileInfo" { if($InPlace) { $Line | Set-Content $File } else { $Line } } default { throw "We can't resolve a whole folder at once yet" } } } default { throw "ParameterSet: $($PSCmdlet.ParameterSetName)" } } } }
combined_dataset/train/non-malicious/4056.ps1
4056.ps1
param([string]$RootDir, [string]$CertThumbPrint = 'BB25149CDAF879A29DB6A011F6FC874AF32CBF51') $cert = Get-ChildItem Cert:\CurrentUser\My\$CertThumbPrint Get-ChildItem $RootDir -Recurse -Include *.ps1,*.psm1,*.ps1xml -File | Where Name -ne 'Pscx.UserPreferences.ps1' | Foreach { Set-AuthenticodeSignature -Certificate $cert -TimestampServer http://timestamp.digicert.com $_.FullName }
combined_dataset/train/non-malicious/sample_44_9.ps1
sample_44_9.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Creates or updates a service hybrid connection. This operation is idempotent. .Description Creates or updates a service hybrid connection. This operation is idempotent. .Example Set-AzRelayHybridConnection -ResourceGroupName lucas-relay-rg -Namespace namespace-pwsh01 -Name connection-01 -UserMetadata "Test UserMetadata updated" | fl .Example $connection = Get-AzRelayHybridConnection -ResourceGroupName lucas-relay-rg -Namespace namespace-pwsh01 -Name connection-01 $connection.UserMetadata = "testHybirdConnection" Set-AzRelayHybridConnection -ResourceGroupName lucas-relay-rg -Namespace namespace-pwsh01 -Name connection-01 -InputObject $connection .Inputs Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IHybridConnection .Outputs Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IHybridConnection .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IHybridConnection>: Description of hybrid connection resource. [RequiresClientAuthorization <Boolean?>]: Returns true if client authorization is needed for this hybrid connection; otherwise, false. [SystemDataCreatedAt <DateTime?>]: The timestamp of resource creation (UTC). [SystemDataCreatedBy <String>]: The identity that created the resource. [SystemDataCreatedByType <CreatedByType?>]: The type of identity that created the resource. [SystemDataLastModifiedAt <DateTime?>]: The timestamp of resource last modification (UTC) [SystemDataLastModifiedBy <String>]: The identity that last modified the resource. [SystemDataLastModifiedByType <CreatedByType?>]: The type of identity that last modified the resource. [UserMetadata <String>]: The usermetadata is a placeholder to store user-defined string data for the hybrid connection endpoint. For example, it can be used to store descriptive data, such as a list of teams and their contact information. Also, user-defined configuration settings can be stored. .Link https://learn.microsoft.com/powershell/module/az.relay/set-azrelayhybridconnection #> function Set-AzRelayHybridConnection { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IHybridConnection])] [CmdletBinding(DefaultParameterSetName='UpdateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Alias('HybridConnectionName')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The hybrid connection name. ${Name}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The namespace name ${Namespace}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # Name of the Resource group within the Azure subscription. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # Subscription credentials which uniquely identify the Microsoft Azure subscription. # The subscription ID forms part of the URI for every service call. ${SubscriptionId}, [Parameter(ParameterSetName='Update', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IHybridConnection] # Description of hybrid connection resource. # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='UpdateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Body')] [System.String] # The usermetadata is a placeholder to store user-defined string data for the hybrid connection endpoint. # For example, it can be used to store descriptive data, such as a list of teams and their contact information. # Also, user-defined configuration settings can be stored. ${UserMetadata}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } # 1. Get $parameterSet = $PSCmdlet.ParameterSetName if (('Update', 'UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } $hybridConnection = $null $hasUserMetadata = $PSBoundParameters.Remove('UserMetadata') if ('UpdateExpanded' -contains $parameterSet) { $hybridConnection = Get-AzRelayHybridConnection @PSBoundParameters } if ('Update'-contains $parameterSet){ $hybridConnection = $InputObject } # 2. Put if ($hasUserMetadata) { $hybridConnection.UserMetadata = $UserMetadata } if ($PSCmdlet.ShouldProcess("WCF relay on namespace $($hybridConnection.Name)", "Update")) { Az.Relay.internal\Set-AzRelayHybridConnection -InputObject $hybridConnection @PSBoundParameters } } catch { throw } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA5my/h+46GRah5 # QVoHvh2Pb6PkTM5GWVFXfFB45PqTOKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICTWWCrW+5zHXiJy4oCzZ88K # sV/i3uliEqCanY7dQIYdMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAgPdGpSUNO806T6bMjWVN9TMUa1n1AyXuIorwOwaKHkM6p8o19WW7IRjD # QQ9XHDTttDmeMMXxyLaRunDq5jMLC0smZ6lGomydcyBCwdXPsG7LwMZQFzHjWLQn # MgrAsdRkJ5u0D4sE1lrOMaZd9wZv53Uni2zl++x5+16ee77rBNXzKLz49NT/zGsS # PxSy44UrlfIoqpjPNuXJd5/GmHnZpYbumT+NXDAlcoSFWj6MpDKRx9dODQzXQNKM # PJtqAsNRajzs8YfKVY7lRIa2xYdB0U6DRkPRQFn1FDZSTKp6GPD5SVP/PVRK8chc # 7GlHGry9GB5QKotPiBFbOivtJGF0zaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCQloIBVgV0Rba6k0u1uFVJbCvxp4b9sJHAmKSzfem/8wIGZh+4i4lP # GBMyMDI0MDQyMzEzMTUyMy45NzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnSH4QwIhgPMjAyNDA0MjMxOTUyMzZaGA8yMDI0MDQyNDE5NTIzNlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dIfhAIBADAHAgEAAgIU6jAHAgEAAgIRVDAKAgUA # 6dNxBAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACaiRtshc9G8WfVMjQ9x # gEYZNyoQzv72BU6LutxlZM2r2C6LuYvcx7q63PWs3MxkStXHAb2esRYvBMPDXsgq # +NN6fYXSMTKwpnHYRiK/t3Uv3SwtPXjykiR2mqVxj6/PkN2nsimpupdSo/lnOZCf # y706cQscQBC5MafJvRllTUbaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgn5+q5p39kcAvMxq2y8KThZc8rX9YCjUngQnzFVquJNwwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIFb/iamaUnR+fesQaHni5azXdqy22buGhS1oKaTDDm+J # MA0GCSqGSIb3DQEBCwUABIICAH/LGfiuII+rWF3L7dLPX7N3BqWAKJJNAERsefI+ # yLZ3+G51dDDuBtxbtffId6WhpqaLuZddxh46o1WJEjpp/B7HvAd0dFvFAEnScgpo # QbaAsMIrb+onuKwjf160oxoSPxSMLnc4bAP8lIGK4XCBrWzoLPqeZqTVlXoPSqJR # xfweExn1NxQcWemGVzYFm3Ufbohe59xRAZTUk+66UpdrXg8pqzSea1hAG3377AxH # VsZr315uFORY7/dd+qspgLrLkAL0uBqhg25+y//cSbK4auiCazIIz1stZm3tIIFB # VDzc09ukpdwpZlh135wND19N3c/SKohy6MOS4LeP77T8SWi7ka33dqJw+hlvqe9l # QBihX48HPciEg0jrliMmMwRvKFL5u1BGt62bHADLtIgHfBFxiMFNVoS5H2EyuWXj # lkK7VP/UTvCCmXAYrzt7wna0k+VrYYdthu9N2cUc75wWdeMn+UBpq8BZo1EoegW+ # HXQyun0ZnM0a8EWgBTO7XqGpAutHuLZfc2eWT0nCn4FRE1JTTJVLuDP7R6ShdTPP # eChgF/WU+YEZ8yERmaT1j/XLNqxc2Y6jcsuInvV90MUG2NgVjQLaqS1CdcSJXNxz # st/JfCda5vyNN/74u/lTo9BI3GDrRgth9MDOmtNZ6FZr6NqwgEOp7ipFf3Y6cz2R # sOhS # SIG # End signature block
combined_dataset/train/non-malicious/Remove-MyOldComputers.ps1
Remove-MyOldComputers.ps1
## # Remove-MyOldComputers.ps1 # # Makes certian assumptions about your computers naming scheme: mainly that all your # computers are named as follows: {username}* I.E. bob1, bob-test, bob-server, etc # ## param ( [String] $Name=((whoami).Split('\\')[1]), [Int32] $MaxDaysOld=20 ) $root = [ADSI]'' $searcher = new-object System.DirectoryServices.DirectorySearcher($root) $searcher.filter = "(Name=$Name*)" $computers = $searcher.findall() $computers | % { $Comp = [ADSI]$_.Path $LastChange = [DateTime]::Now - [DateTime][String]$Comp.WhenChanged if ($LastChange.TotalDays -gt $MaxDaysOld) { Write-Host Deleting $Comp.Name [$LastChangeTimeSpan.TotalDays days old] $Comp.psbase.DeleteTree() } }
combined_dataset/train/non-malicious/608.ps1
608.ps1
param( [string]$Version, [string]$Path, [switch]$Force, [switch]$Update, [switch]$Uninstall ) $Configs = @{ Url = "http://ola.hallengren.com/scripts/MaintenanceSolution.sql", "http://ola.hallengren.com/scripts/DatabaseBackup.sql", "http://ola.hallengren.com/scripts/DatabaseIntegrityCheck.sql", "http://ola.hallengren.com/scripts/IndexOptimize.sql", "http://ola.hallengren.com/scripts/CommandExecute.sql", "http://ola.hallengren.com/scripts/CommandLog.sql" } $Configs | ForEach-Object{ try{ $_.Result = $null if(-not $_.Path){$_.Path = $Path} $Config = $_ if(-not $Uninstall){ if($_.ConditionExclusion){ $_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue) } if(($_.ConditionExclusionResult -eq $null) -or $Force){ $_.Downloads = $_.Url | ForEach-Object{ Get-File -Url $_ -Path $Config.Path } if($Update){$_.Result = "AppUpdated";$_ }else{$_.Result = "AppInstalled";$_} }else{ $_.Result = "ConditionExclusion";$_ } }else{ $_.Result = "AppUninstalled";$_ } }catch{ $Config.Result = "Error";$Config } }
combined_dataset/train/non-malicious/443.ps1
443.ps1
Register-PSFConfigValidation -Name "datetime" -ScriptBlock { Param ( $Value ) $Result = New-Object PSObject -Property @{ Success = $True Value = $null Message = "" } try { [DateTime]$DateTime = $Value } catch { $Result.Message = "Not a DateTime: $Value" $Result.Success = $False return $Result } $Result.Value = $DateTime return $Result }
combined_dataset/train/non-malicious/sample_56_30.ps1
sample_56_30.ps1
# # Module manifest for module 'OCI.PSModules.Database' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Database.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e1b520e7-13c2-41a0-be48-3eacc401dff5' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Database Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Database.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabaseStorageCapacityCloudExadataInfrastructure', 'Add-OCIDatabaseStorageCapacityExadataInfrastructure', 'Add-OCIDatabaseVirtualMachineToCloudVmCluster', 'Add-OCIDatabaseVirtualMachineToVmCluster', 'Complete-OCIDatabaseExternalBackupJob', 'Confirm-OCIDatabaseVmClusterNetwork', 'Disable-OCIDatabaseAutonomousDatabaseManagement', 'Disable-OCIDatabaseAutonomousDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalContainerDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalContainerDatabaseStackMonitoring', 'Disable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring', 'Disable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalPluggableDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalPluggableDatabaseStackMonitoring', 'Disable-OCIDatabaseManagement', 'Disable-OCIDatabasePluggableDatabaseManagement', 'Edit-OCIDatabaseManagement', 'Edit-OCIDatabasePluggableDatabaseManagement', 'Enable-OCIDatabaseAutonomousDatabaseManagement', 'Enable-OCIDatabaseAutonomousDatabaseOperationsInsights', 'Enable-OCIDatabaseExadataInfrastructure', 'Enable-OCIDatabaseExternalContainerDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalContainerDatabaseStackMonitoring', 'Enable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights', 'Enable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring', 'Enable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalPluggableDatabaseOperationsInsights', 'Enable-OCIDatabaseExternalPluggableDatabaseStackMonitoring', 'Enable-OCIDatabaseManagement', 'Enable-OCIDatabasePluggableDatabaseManagement', 'Get-OCIDatabase', 'Get-OCIDatabaseApplicationVip', 'Get-OCIDatabaseApplicationVipsList', 'Get-OCIDatabaseAutonomousContainerDatabase', 'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociationsList', 'Get-OCIDatabaseAutonomousContainerDatabaseResourceUsage', 'Get-OCIDatabaseAutonomousContainerDatabasesList', 'Get-OCIDatabaseAutonomousContainerDatabaseVersionsList', 'Get-OCIDatabaseAutonomousDatabase', 'Get-OCIDatabaseAutonomousDatabaseBackup', 'Get-OCIDatabaseAutonomousDatabaseBackupsList', 'Get-OCIDatabaseAutonomousDatabaseCharacterSetsList', 'Get-OCIDatabaseAutonomousDatabaseClonesList', 'Get-OCIDatabaseAutonomousDatabaseDataguardAssociation', 'Get-OCIDatabaseAutonomousDatabaseDataguardAssociationsList', 'Get-OCIDatabaseAutonomousDatabaseRefreshableClonesList', 'Get-OCIDatabaseAutonomousDatabaseRegionalWallet', 'Get-OCIDatabaseAutonomousDatabasesList', 'Get-OCIDatabaseAutonomousDatabaseSoftwareImage', 'Get-OCIDatabaseAutonomousDatabaseSoftwareImagesList', 'Get-OCIDatabaseAutonomousDatabaseWallet', 'Get-OCIDatabaseAutonomousDbPreviewVersionsList', 'Get-OCIDatabaseAutonomousDbVersionsList', 'Get-OCIDatabaseAutonomousExadataInfrastructure', 'Get-OCIDatabaseAutonomousExadataInfrastructureShapesList', 'Get-OCIDatabaseAutonomousExadataInfrastructuresList', 'Get-OCIDatabaseAutonomousPatch', 'Get-OCIDatabaseAutonomousVirtualMachine', 'Get-OCIDatabaseAutonomousVirtualMachinesList', 'Get-OCIDatabaseAutonomousVmCluster', 'Get-OCIDatabaseAutonomousVmClusterAcdResourceUsageList', 'Get-OCIDatabaseAutonomousVmClusterResourceUsage', 'Get-OCIDatabaseAutonomousVmClustersList', 'Get-OCIDatabaseBackup', 'Get-OCIDatabaseBackupDestination', 'Get-OCIDatabaseBackupDestinationList', 'Get-OCIDatabaseBackupsList', 'Get-OCIDatabaseCloudAutonomousVmCluster', 'Get-OCIDatabaseCloudAutonomousVmClusterAcdResourceUsageList', 'Get-OCIDatabaseCloudAutonomousVmClusterResourceUsage', 'Get-OCIDatabaseCloudAutonomousVmClustersList', 'Get-OCIDatabaseCloudExadataInfrastructure', 'Get-OCIDatabaseCloudExadataInfrastructuresList', 'Get-OCIDatabaseCloudExadataInfrastructureUnallocatedResources', 'Get-OCIDatabaseCloudVmCluster', 'Get-OCIDatabaseCloudVmClusterIormConfig', 'Get-OCIDatabaseCloudVmClustersList', 'Get-OCIDatabaseCloudVmClusterUpdate', 'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntriesList', 'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntry', 'Get-OCIDatabaseCloudVmClusterUpdatesList', 'Get-OCIDatabaseConsoleConnection', 'Get-OCIDatabaseConsoleConnectionsList', 'Get-OCIDatabaseConsoleHistoriesList', 'Get-OCIDatabaseConsoleHistory', 'Get-OCIDatabaseConsoleHistoryContent', 'Get-OCIDatabaseContainerDatabasePatchesList', 'Get-OCIDatabaseDataGuardAssociation', 'Get-OCIDatabaseDataGuardAssociationsList', 'Get-OCIDatabaseDbHome', 'Get-OCIDatabaseDbHomePatch', 'Get-OCIDatabaseDbHomePatchesList', 'Get-OCIDatabaseDbHomePatchHistoryEntriesList', 'Get-OCIDatabaseDbHomePatchHistoryEntry', 'Get-OCIDatabaseDbHomesList', 'Get-OCIDatabaseDbNode', 'Get-OCIDatabaseDbNodesList', 'Get-OCIDatabaseDbServer', 'Get-OCIDatabaseDbServersList', 'Get-OCIDatabaseDbSystem', 'Get-OCIDatabaseDbSystemComputePerformancesList', 'Get-OCIDatabaseDbSystemPatch', 'Get-OCIDatabaseDbSystemPatchesList', 'Get-OCIDatabaseDbSystemPatchHistoryEntriesList', 'Get-OCIDatabaseDbSystemPatchHistoryEntry', 'Get-OCIDatabaseDbSystemShapesList', 'Get-OCIDatabaseDbSystemsList', 'Get-OCIDatabaseDbSystemStoragePerformancesList', 'Get-OCIDatabaseDbSystemUpgradeHistoryEntriesList', 'Get-OCIDatabaseDbSystemUpgradeHistoryEntry', 'Get-OCIDatabaseDbVersionsList', 'Get-OCIDatabaseExadataInfrastructure', 'Get-OCIDatabaseExadataInfrastructureOcpus', 'Get-OCIDatabaseExadataInfrastructuresList', 'Get-OCIDatabaseExadataInfrastructureUnAllocatedResources', 'Get-OCIDatabaseExadataIormConfig', 'Get-OCIDatabaseExternalBackupJob', 'Get-OCIDatabaseExternalContainerDatabase', 'Get-OCIDatabaseExternalContainerDatabasesList', 'Get-OCIDatabaseExternalDatabaseConnector', 'Get-OCIDatabaseExternalDatabaseConnectorsList', 'Get-OCIDatabaseExternalNonContainerDatabase', 'Get-OCIDatabaseExternalNonContainerDatabasesList', 'Get-OCIDatabaseExternalPluggableDatabase', 'Get-OCIDatabaseExternalPluggableDatabasesList', 'Get-OCIDatabaseFlexComponentsList', 'Get-OCIDatabaseGiVersionsList', 'Get-OCIDatabaseInfrastructureTargetVersions', 'Get-OCIDatabaseKeyStore', 'Get-OCIDatabaseKeyStoresList', 'Get-OCIDatabaseMaintenanceRun', 'Get-OCIDatabaseMaintenanceRunHistory', 'Get-OCIDatabaseMaintenanceRunHistoryList', 'Get-OCIDatabaseMaintenanceRunsList', 'Get-OCIDatabaseOneoffPatch', 'Get-OCIDatabaseOneoffPatchesList', 'Get-OCIDatabasePdbConversionHistoryEntriesList', 'Get-OCIDatabasePdbConversionHistoryEntry', 'Get-OCIDatabasePluggableDatabase', 'Get-OCIDatabasePluggableDatabasesList', 'Get-OCIDatabasesList', 'Get-OCIDatabaseSoftwareImage', 'Get-OCIDatabaseSoftwareImagesList', 'Get-OCIDatabaseSystemVersionsList', 'Get-OCIDatabaseUpgradeHistoryEntriesList', 'Get-OCIDatabaseUpgradeHistoryEntry', 'Get-OCIDatabaseVmCluster', 'Get-OCIDatabaseVmClusterNetwork', 'Get-OCIDatabaseVmClusterNetworksList', 'Get-OCIDatabaseVmClusterPatch', 'Get-OCIDatabaseVmClusterPatchesList', 'Get-OCIDatabaseVmClusterPatchHistoryEntriesList', 'Get-OCIDatabaseVmClusterPatchHistoryEntry', 'Get-OCIDatabaseVmClustersList', 'Get-OCIDatabaseVmClusterUpdate', 'Get-OCIDatabaseVmClusterUpdateHistoryEntriesList', 'Get-OCIDatabaseVmClusterUpdateHistoryEntry', 'Get-OCIDatabaseVmClusterUpdatesList', 'Invoke-OCIDatabaseAutonomousDatabaseManualRefresh', 'Invoke-OCIDatabaseCheckExternalDatabaseConnectorConnectionStatus', 'Invoke-OCIDatabaseConfigureAutonomousDatabaseVaultKey', 'Invoke-OCIDatabaseConfigureSaasAdminUser', 'Invoke-OCIDatabaseConvertToPdb', 'Invoke-OCIDatabaseConvertToRegularPluggableDatabase', 'Invoke-OCIDatabaseDbNodeAction', 'Invoke-OCIDatabaseDownloadExadataInfrastructureConfigFile', 'Invoke-OCIDatabaseDownloadOneoffPatch', 'Invoke-OCIDatabaseDownloadValidationReport', 'Invoke-OCIDatabaseDownloadVmClusterNetworkConfigFile', 'Invoke-OCIDatabaseFailoverAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseFailOverAutonomousDatabase', 'Invoke-OCIDatabaseFailoverDataGuardAssociation', 'Invoke-OCIDatabaseLaunchAutonomousExadataInfrastructure', 'Invoke-OCIDatabaseLocalClonePluggableDatabase', 'Invoke-OCIDatabaseMigrateExadataDbSystemResourceModel', 'Invoke-OCIDatabaseMigrateVaultKey', 'Invoke-OCIDatabaseRefreshPluggableDatabase', 'Invoke-OCIDatabaseReinstateAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseReinstateDataGuardAssociation', 'Invoke-OCIDatabaseRemoteClonePluggableDatabase', 'Invoke-OCIDatabaseResizeVmClusterNetwork', 'Invoke-OCIDatabaseResourcePoolShapes', 'Invoke-OCIDatabaseRotateAutonomousContainerDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateAutonomousDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateAutonomousVmClusterOrdsCerts', 'Invoke-OCIDatabaseRotateAutonomousVmClusterSslCerts', 'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterOrdsCerts', 'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterSslCerts', 'Invoke-OCIDatabaseRotateOrdsCerts', 'Invoke-OCIDatabaseRotatePluggableDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateSslCerts', 'Invoke-OCIDatabaseRotateVaultKey', 'Invoke-OCIDatabaseSaasAdminUserStatus', 'Invoke-OCIDatabaseScanExternalContainerDatabasePluggableDatabases', 'Invoke-OCIDatabaseShrinkAutonomousDatabase', 'Invoke-OCIDatabaseSwitchoverAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseSwitchoverAutonomousDatabase', 'Invoke-OCIDatabaseSwitchoverDataGuardAssociation', 'Invoke-OCIDatabaseTerminateAutonomousContainerDatabase', 'Invoke-OCIDatabaseTerminateAutonomousExadataInfrastructure', 'Invoke-OCIDatabaseTerminateDbSystem', 'Invoke-OCIDatabaseUpgradeDatabase', 'Invoke-OCIDatabaseUpgradeDbSystem', 'Move-OCIDatabaseAutonomousContainerDatabaseCompartment', 'Move-OCIDatabaseAutonomousDatabaseCompartment', 'Move-OCIDatabaseAutonomousDatabaseSoftwareImageCompartment', 'Move-OCIDatabaseAutonomousExadataInfrastructureCompartment', 'Move-OCIDatabaseAutonomousVmClusterCompartment', 'Move-OCIDatabaseBackupDestinationCompartment', 'Move-OCIDatabaseCloudAutonomousVmClusterCompartment', 'Move-OCIDatabaseCloudExadataInfrastructureCompartment', 'Move-OCIDatabaseCloudVmClusterCompartment', 'Move-OCIDatabaseDataguardRole', 'Move-OCIDatabaseDbSystemCompartment', 'Move-OCIDatabaseDisasterRecoveryConfiguration', 'Move-OCIDatabaseExadataInfrastructureCompartment', 'Move-OCIDatabaseExternalContainerDatabaseCompartment', 'Move-OCIDatabaseExternalNonContainerDatabaseCompartment', 'Move-OCIDatabaseExternalPluggableDatabaseCompartment', 'Move-OCIDatabaseKeyStoreCompartment', 'Move-OCIDatabaseKeyStoreType', 'Move-OCIDatabaseOneoffPatchCompartment', 'Move-OCIDatabaseSoftwareImageCompartment', 'Move-OCIDatabaseVmClusterCompartment', 'New-OCIDatabase', 'New-OCIDatabaseApplicationVip', 'New-OCIDatabaseAutonomousContainerDatabase', 'New-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'New-OCIDatabaseAutonomousDatabase', 'New-OCIDatabaseAutonomousDatabaseBackup', 'New-OCIDatabaseAutonomousDatabaseSoftwareImage', 'New-OCIDatabaseAutonomousDatabaseWallet', 'New-OCIDatabaseAutonomousVmCluster', 'New-OCIDatabaseBackup', 'New-OCIDatabaseBackupDestination', 'New-OCIDatabaseCloudAutonomousVmCluster', 'New-OCIDatabaseCloudExadataInfrastructure', 'New-OCIDatabaseCloudVmCluster', 'New-OCIDatabaseConsoleConnection', 'New-OCIDatabaseConsoleHistory', 'New-OCIDatabaseDataGuardAssociation', 'New-OCIDatabaseDbHome', 'New-OCIDatabaseDbSystem', 'New-OCIDatabaseExadataInfrastructure', 'New-OCIDatabaseExternalBackupJob', 'New-OCIDatabaseExternalContainerDatabase', 'New-OCIDatabaseExternalDatabaseConnector', 'New-OCIDatabaseExternalNonContainerDatabase', 'New-OCIDatabaseExternalPluggableDatabase', 'New-OCIDatabaseKeyStore', 'New-OCIDatabaseMaintenanceRun', 'New-OCIDatabaseOneoffPatch', 'New-OCIDatabasePluggableDatabase', 'New-OCIDatabaseRecommendedVmClusterNetwork', 'New-OCIDatabaseSoftwareImage', 'New-OCIDatabaseVmCluster', 'New-OCIDatabaseVmClusterNetwork', 'Register-OCIDatabaseAutonomousDatabaseDataSafe', 'Remove-OCIDatabase', 'Remove-OCIDatabaseApplicationVip', 'Remove-OCIDatabaseAutonomousDatabase', 'Remove-OCIDatabaseAutonomousDatabaseBackup', 'Remove-OCIDatabaseAutonomousDatabaseSoftwareImage', 'Remove-OCIDatabaseAutonomousVmCluster', 'Remove-OCIDatabaseBackup', 'Remove-OCIDatabaseBackupDestination', 'Remove-OCIDatabaseCloudAutonomousVmCluster', 'Remove-OCIDatabaseCloudExadataInfrastructure', 'Remove-OCIDatabaseCloudVmCluster', 'Remove-OCIDatabaseConsoleConnection', 'Remove-OCIDatabaseConsoleHistory', 'Remove-OCIDatabaseDbHome', 'Remove-OCIDatabaseExadataInfrastructure', 'Remove-OCIDatabaseExternalContainerDatabase', 'Remove-OCIDatabaseExternalDatabaseConnector', 'Remove-OCIDatabaseExternalNonContainerDatabase', 'Remove-OCIDatabaseExternalPluggableDatabase', 'Remove-OCIDatabaseKeyStore', 'Remove-OCIDatabaseOneoffPatch', 'Remove-OCIDatabasePluggableDatabase', 'Remove-OCIDatabaseSoftwareImage', 'Remove-OCIDatabaseVirtualMachineFromCloudVmCluster', 'Remove-OCIDatabaseVirtualMachineFromVmCluster', 'Remove-OCIDatabaseVmCluster', 'Remove-OCIDatabaseVmClusterNetwork', 'Restart-OCIDatabaseAutonomousContainerDatabase', 'Restart-OCIDatabaseAutonomousDatabase', 'Restore-OCIDatabase', 'Restore-OCIDatabaseAutonomousDatabase', 'Start-OCIDatabaseAutonomousDatabase', 'Start-OCIDatabasePluggableDatabase', 'Stop-OCIDatabaseAutonomousDatabase', 'Stop-OCIDatabaseBackup', 'Stop-OCIDatabasePluggableDatabase', 'Unregister-OCIDatabaseAutonomousDatabaseDataSafe', 'Update-OCIDatabase', 'Update-OCIDatabaseAutonomousContainerDatabase', 'Update-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'Update-OCIDatabaseAutonomousDatabase', 'Update-OCIDatabaseAutonomousDatabaseBackup', 'Update-OCIDatabaseAutonomousDatabaseRegionalWallet', 'Update-OCIDatabaseAutonomousDatabaseSoftwareImage', 'Update-OCIDatabaseAutonomousDatabaseWallet', 'Update-OCIDatabaseAutonomousExadataInfrastructure', 'Update-OCIDatabaseAutonomousVmCluster', 'Update-OCIDatabaseBackupDestination', 'Update-OCIDatabaseCloudAutonomousVmCluster', 'Update-OCIDatabaseCloudExadataInfrastructure', 'Update-OCIDatabaseCloudVmCluster', 'Update-OCIDatabaseCloudVmClusterIormConfig', 'Update-OCIDatabaseConsoleConnection', 'Update-OCIDatabaseConsoleHistory', 'Update-OCIDatabaseDataGuardAssociation', 'Update-OCIDatabaseDbHome', 'Update-OCIDatabaseDbNode', 'Update-OCIDatabaseDbSystem', 'Update-OCIDatabaseExadataInfrastructure', 'Update-OCIDatabaseExadataIormConfig', 'Update-OCIDatabaseExternalContainerDatabase', 'Update-OCIDatabaseExternalDatabaseConnector', 'Update-OCIDatabaseExternalNonContainerDatabase', 'Update-OCIDatabaseExternalPluggableDatabase', 'Update-OCIDatabaseKeyStore', 'Update-OCIDatabaseMaintenanceRun', 'Update-OCIDatabaseOneoffPatch', 'Update-OCIDatabasePluggableDatabase', 'Update-OCIDatabaseSoftwareImage', 'Update-OCIDatabaseVmCluster', 'Update-OCIDatabaseVmClusterNetwork' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Database' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_27_48.ps1
sample_27_48.ps1
# # Module manifest for module 'OCI.PSModules.Usage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Usage.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '9ad21498-2007-42f7-9492-bacc9b5b532f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Usage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Usage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIUsageLimitsList', 'Get-OCIUsageProductsList', 'Get-OCIUsageRedeemableUsersList', 'Get-OCIUsageRedemptionsList', 'Get-OCIUsageResourceQuotaList', 'Get-OCIUsageResourcesList', 'Get-OCIUsageRewardsList', 'New-OCIUsageRedeemableUser', 'Remove-OCIUsageRedeemableUser' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Usage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_48_38.ps1
sample_48_38.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\practice\demo\quick-reference\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/practice/demo/quick-reference/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$env_node_path$pathsep$new_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../../../../node_modules/.pnpm/prettier@3.2.5/node_modules/prettier/bin/prettier.cjs" $args } else { & "$basedir/node$exe" "$basedir/../../../../node_modules/.pnpm/prettier@3.2.5/node_modules/prettier/bin/prettier.cjs" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../../../../node_modules/.pnpm/prettier@3.2.5/node_modules/prettier/bin/prettier.cjs" $args } else { & "node$exe" "$basedir/../../../../node_modules/.pnpm/prettier@3.2.5/node_modules/prettier/bin/prettier.cjs" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/2519.ps1
2519.ps1
$MissingIndexesQuery = "sel_SQLIndexesMissingByDatabase" function Run-Query() { param ( $SqlQuery, $SqlServer, $SqlCatalog ) $SqlConnection = New-Object System.Data.SqlClient.SqlConnection("Data Source=$SqlServer;Integrated Security=SSPI;Initial Catalog=$SqlCatalog;"); $SqlCmd = New-Object System.Data.SqlClient.SqlCommand $sqlCmd.CommandTimeout = "300" $SqlCmd.CommandText = $SqlQuery $SqlCmd.Connection = $SqlConnection $SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter $SqlAdapter.SelectCommand = $SqlCmd $DataSet = New-Object System.Data.DataSet $a = $SqlAdapter.Fill($DataSet) $SqlConnection.Close() $DataSet.Tables | Select-Object -ExpandProperty Rows } $indexes = Run-Query -SqlQuery $MissingIndexesQuery -SqlServer XSQLUTIL18 -SqlCatalog Status $SpreadSheet = ("E:\Dexma\logs\IndexesMissing-" + (Get-Date -Format ddMMyyyy) + ".xlsx") $TempCSV = ($env:TEMP + "\" + ([System.GUID]::NewGuid()).ToString() + ".csv") $indexes | Export-Csv -Path $TempCSV -NoTypeInformation if (Test-Path -Path $SpreadSheet) { Remove-Item -Path $SpreadSheet } $erroractionpreference = "SilentlyContinue" $OutBook = New-Object -comobject Excel.Application $OutBook.visible = $False $Workbook = $OutBook.Workbooks.Open($TempCSV) $Workbook.Title = ("Missing Indexes reported by SQL Server DMVs" + (Get-Date -Format D)) $Workbook.Author = "Michael J. Messano" $Worksheet = $Workbook.Worksheets.Item(1) $LastColumn = ($worksheet.UsedRange.Columns.Count + 1 ) for ( $i = 1; $i -lt $LastColumn; $i++) { $Worksheet.Cells.item(1,$i).Interior.ColorIndex = 15 $Worksheet.Cells.item(1,$i).Font.ColorIndex = 5 $Worksheet.Cells.item(1,$i).Font.Bold = $True if ($i -gt 2) { $Worksheet.Cells.item(1,$i).Orientation = 90 } } $Worksheet.UsedRange.EntireColumn.Autofit() | Out-Null $Worksheet.Name = "Missing Indexes" $List = $Worksheet.ListObjects.Add([Microsoft.Office.Interop.Excel.XlListObjectSourceType]::xlSrcRange, $Worksheet.UsedRange, $null, [Microsoft.Office.Interop.Excel.X1YesNoGuess]::xlYes, $null) $List.Name = "Item Table" $LastRow = ($worksheet.UsedRange.Rows.Count + 1) for ( $i = 2; $i -lt $LastRow; $i++) { $Worksheet.Cells.item($i,3) = "=SUM(RC[1]" + ':' + "RC[" + ($worksheet.UsedRange.Columns.Count - 3) + "])" } $order = [Microsoft.Office.Interop.Excel.XlSortOrder]::xlDescending $xlDescending = 2 $hasHead = [Microsoft.Office.Interop.Excel.XlYesNoGuess]::xlYes $range = $worksheet.UsedRange $sortcolumn = $worksheet.Columns.Item(3) $range.Sort($sortcolumn, $xlDescending) $Workbook.SaveAs($SpreadSheet, 51) $Workbook.Saved = $true $Workbook.Close() [System.Runtime.InteropServices.Marshal]::ReleaseComObject($Workbook) | Out-Null $SpreadSheet.Quit() [System.Runtime.InteropServices.Marshal]::ReleaseComObject($SpreadSheet) | Out-Null [System.GC]::Collect() [System.GC]::WaitForPendingFinalizers() if (Test-Path -Path $TempCSV) { Remove-Item -Path $TempCSV }
combined_dataset/train/non-malicious/2205.ps1
2205.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [ValidateNotNullOrEmpty()] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Name of the collection to be used as limiting collection for all maintenance collections")] [ValidateNotNullOrEmpty()] [string]$LimitingCollectionName, [parameter(Mandatory=$false, HelpMessage="Name of a Device Collections folder where the collections will be created. If not specified, the collections will be created in the root of Device Collections")] [ValidateNotNullOrEmpty()] [string]$FolderName ) Begin { try { Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug "SiteCode: $($SiteCode)" } } } catch [Exception] { Write-Warning -Message "Unable to determine SiteCode" ; break } if (-not(Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($LimitingCollectionName)'")) { Write-Warning -Message "Unable to determine the existence of a collection named '$($LimitingCollectionName)'" ; break } } Process { function New-ScheduleToken { param( [parameter(Mandatory=$false)] [int]$DayDuration = 0, [parameter(Mandatory=$false)] [int]$DaySpan = 0, [parameter(Mandatory=$false)] [int]$HourDuration = 0, [parameter(Mandatory=$false)] [int]$HourSpan = 0, [parameter(Mandatory=$false)] [bool]$IsGMT = $false, [parameter(Mandatory=$false)] [int]$MinuteDuration = 0, [parameter(Mandatory=$false)] [int]$MinuteSpan = 0, [parameter(Mandatory=$true)] [int]$StartTimeHour = 0, [parameter(Mandatory=$true)] [int]$StartTimeMin = 0, [parameter(Mandatory=$true)] [int]$StartTimeSec = 0 ) $StartTime = [System.Management.ManagementDateTimeconverter]::ToDMTFDateTime((Get-Date -Hour $StartTimeHour -Minute $StartTimeMin -Second $StartTimeSec)) $ScheduleToken = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_ST_RecurInterval").CreateInstance() $ScheduleToken.DayDuration = $DayDuration $ScheduleToken.DaySpan = $DaySpan $ScheduleToken.HourDuration = $HourDuration $ScheduleToken.HourSpan = $HourSpan $ScheduleToken.IsGMT = $IsGMT $ScheduleToken.MinuteDuration = $MinuteDuration $ScheduleToken.MinuteSpan = $MinuteSpan $ScheduleToken.StartTime = $StartTime return $ScheduleToken } function Get-LimitingCollectionID { param( [parameter(Mandatory=$true)] [string]$LimitingCollection ) $LimitingCollectionID = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($LimitingCollectionName)'" | Select-Object -ExpandProperty CollectionID return $LimitingCollectionID } function Create-Collection { param( [parameter(Mandatory=$true)] [string]$CollectionName, [parameter(Mandatory=$true)] [string]$CollectionQuery, [parameter(Mandatory=$true)] [string]$QueryRuleName ) $ValidateQuery = Invoke-WmiMethod -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_CollectionRuleQuery -Name ValidateQuery -ArgumentList $CollectionQuery -ComputerName $SiteServer if ($ValidateQuery) { $NewRule = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_CollectionRuleQuery").CreateInstance() $NewRule.QueryExpression = $CollectionQuery $NewRule.RuleName = $QueryRuleName Write-Verbose -Message "Creating collection: $($CollectionName)" $NewDeviceCollection = ([WmiClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_Collection").CreateInstance() $NewDeviceCollection.Name = $CollectionName $NewDeviceCollection.OwnedByThisSite = $true $NewDeviceCollection.CollectionRules += $NewRule $NewDeviceCollection.LimitToCollectionID = (Get-LimitingCollectionID -LimitingCollection $LimitingCollectionName) $NewDeviceCollection.RefreshSchedule = (New-ScheduleToken -HourSpan 12 -StartTimeHour 7 -StartTimeMin 0 -StartTimeSec 0) $NewDeviceCollection.RefreshType = 2 $NewDeviceCollection.CollectionType = 2 $NewDeviceCollection.Put() | Out-Null if ((Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($CollectionName)'" | Measure-Object).Count -eq 1) { Write-Verbose -Message "Successfully created collection '$($CollectionName)'" } else { Write-Warning -Message "Unable to create collection '$($CollectionName)'" } if ($Script:PSBoundParameters["FolderName"]) { $CollectionID = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($CollectionName)' AND CollectionType = 2" | Select-Object -ExpandProperty CollectionID [int]$TargetFolder = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_ObjectContainerNode -ComputerName $SiteServer -Filter "ObjectType = 5000 AND Name like '$($FolderName)'" | Select-Object -ExpandProperty ContainerNodeID [int]$SourceFolder = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_ObjectContainerItem -ComputerName $SiteServer -Filter "InstanceKey like '$($CollectionID)'" | Select-Object -ExpandProperty ContainerNodeID $Parameters = ([WmiClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_ObjectContainerItem").GetMethodParameters("MoveMembers") $Parameters.ObjectType = 5000 $Parameters.ContainerNodeID = $SourceFolder $Parameters.TargetContainerNodeID = $TargetFolder $Parameters.InstanceKeys = $CollectionID $MoveCollectionToFolder = ([WmiClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_ObjectContainerItem").InvokeMethod("MoveMembers", $Parameters, $null) if ($MoveCollectionToFolder.ReturnValue -eq 0) { Write-Verbose -Message "Successfully moved collection '$($CollectionName)' to the '$($FolderName)' folder" } } $NewDeviceCollection.RequestRefresh() | Out-Null } } $CollectionsTable = @{ "ConfigMgr 2012 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7711.0000"' "ConfigMgr 2012 CU1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7711.0200"' "ConfigMgr 2012 CU2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7711.0301"' "ConfigMgr 2012 SP1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1000"' "ConfigMgr 2012 SP1 CU1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1202"' "ConfigMgr 2012 SP1 CU2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1300"' "ConfigMgr 2012 SP1 CU3 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1400"' "ConfigMgr 2012 SP1 CU4 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1500"' "ConfigMgr 2012 SP1 CU5 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1600"' "ConfigMgr 2012 R2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1000"' "ConfigMgr 2012 R2 KB2905002 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1101"' "ConfigMgr 2012 R2 CU1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1203"' "ConfigMgr 2012 R2 CU2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1303"' "ConfigMgr 2012 R2 CU3 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1401"' "ConfigMgr 2012 R2 CU4 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1501"' "ConfigMgr 2012 R2 CU5 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1604"' "ConfigMgr 2012 R2 SP1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8239.1000"' "ConfigMgr 2012 R2 SP1 CU1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8239.1203"' "ConfigMgr 2012 R2 SP1 CU2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8239.1301"' "ConfigMgr 2012 R2 SP1 CU3 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8239.1403"' "ConfigMgr 1511 Clients" = 'select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8325.1000"' "ConfigMgr 1602 Clients" = 'select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8355.1000"' } foreach ($Collection in $CollectionsTable.Keys) { Create-Collection -CollectionName $Collection -CollectionQuery $CollectionsTable["$Collection"] -QueryRuleName $Collection } }
combined_dataset/train/non-malicious/1291.ps1
1291.ps1
function Get-CPermission { [CmdletBinding()] [OutputType([System.Security.AccessControl.AccessRule])] param( [Parameter(Mandatory=$true)] [string] $Path, [string] $Identity, [Switch] $Inherited ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $account = $null if( $Identity ) { $account = Test-CIdentity -Name $Identity -PassThru if( $account ) { $Identity = $account.FullName } } if( -not (Test-Path -Path $Path) ) { Write-Error ('Path ''{0}'' not found.' -f $Path) return } Invoke-Command -ScriptBlock { Get-Item -Path $Path -Force | ForEach-Object { if( $_.PSProvider.Name -eq 'Certificate' ) { if( $_.HasPrivateKey -and $_.PrivateKey ) { $_.PrivateKey.CspKeyContainerInfo.CryptoKeySecurity } } else { $_.GetAccessControl([Security.AccessControl.AccessControlSections]::Access) } } } | Select-Object -ExpandProperty Access | Where-Object { if( $Inherited ) { return $true } return (-not $_.IsInherited) } | Where-Object { if( $Identity ) { return ($_.IdentityReference.Value -eq $Identity) } return $true } } Set-Alias -Name 'Get-Permissions' -Value 'Get-CPermission'
combined_dataset/train/non-malicious/Add new smtp_set prmary_2.ps1
Add new smtp_set prmary_2.ps1
#alias,addnewemailaddress import-csv .\\source.csv | foreach { $user = Get-Mailbox $_.alias $user.emailAddresses+= $_.addnewemailaddress $user.primarysmtpaddress = $_.addnewemailaddress Set-Mailbox $user -emailAddresses $user.emailAddresses set-Mailbox $user -PrimarySmtpAddress $user.primarysmtpaddress }
combined_dataset/train/non-malicious/sample_40_88.ps1
sample_40_88.ps1
/* ----------------------------------------------------------------------- Copyright (c) Microsoft Corporation. All rights reserved. ----------------------------------------------------------------------- */ let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl(); let scripts = [pluginUrl, "scripts/redux.js", "scripts/funcMap.js", "scripts/resources.js"]; let currentScriptElement = document.querySelector("script[src='scripts/plugin.js']"); if (currentScriptElement !== null) { scripts.forEach(element => { let newScriptElement = document.createElement("script"); newScriptElement.setAttribute("src", element); newScriptElement.setAttribute("type", "text/javascript"); newScriptElement.async = false; currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling); currentScriptElement = newScriptElement; }); } // SIG // Begin signature block // SIG // MIInzAYJKoZIhvcNAQcCoIInvTCCJ7kCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // 8AmDEstmvB46D02UrAEnWnsGP0ACic8C1MnCqO/b/Eeg // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghmfMIIZmwIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBXYjEFBNAxYAuP // SIG // E0/03D4QqNtJMbT0KkdlV/EhQrtlozBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAKa8JOJlbGJmbzDXYNaNwIQ4inTleS8s // SIG // i3kbOZ/jkzJKqUjaQpEhLVUvxOJ27PqIOa6wLyjb3MKj // SIG // zEudmXYL3YRRJciqVXl37UTacLsBDvIb9Y01Q2cTpJW7 // SIG // kmN0PPKfdCdgeOIhvgiv4gunB1DdbARBvDQ0dc6dSN/r // SIG // DDBmVjBxtg58ZWDTEgxG7p68lfd/wCpF/J+X79e43mhy // SIG // JUkdSJOTOxeI14RC2Prys6vWFGThgRj5uaESEkDv6lHy // SIG // fgBhLk4SvUnmuUlG+HGOH2jRwHo6ooCK1vuBOiGS7Jhu // SIG // 5VnEgGvh+BvMhtUycncuYZo5SF9bBINee1sjavSo8XRq // SIG // NhChghcpMIIXJQYKKwYBBAGCNwMDATGCFxUwghcRBgkq // SIG // hkiG9w0BBwKgghcCMIIW/gIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBWQYLKoZIhvcNAQkQAQSgggFIBIIBRDCCAUAC // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // 5lCIF7x4SJq509TlODFD+DTWWnTlPjIi6NEt5Sy0hTUC // SIG // BmYzqvfgSRgTMjAyNDA1MDgwNTEyMDUuMDY3WjAEgAIB // SIG // 9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG // SIG // A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u // SIG // cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT // SIG // Tjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9z // SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEXgwggcnMIIF // SIG // D6ADAgECAhMzAAAB3V1XHZXUraobAAEAAAHdMA0GCSqG // SIG // SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwMB4XDTIzMTAxMjE5MDcwOVoXDTI1MDExMDE5MDcw // SIG // OVowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT // SIG // JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt // SIG // aXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046ODZE // SIG // Ri00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBU // SIG // aW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB // SIG // AQUAA4ICDwAwggIKAoICAQCoTgOUROoud5x1ER+JZ3yi // SIG // 6fvSb4qbk7XLWoqwsTFEqz0suQlitg7a4kD/k+dh12zd // SIG // oOwJLUNaUGW0wxhcyundN72GDawj7iSvj0bD9hT1Q4wV // SIG // 8uZqy0RcyBxy2ogGqGxObxSbqMWdGVnSjArPGnI4R1Jn // SIG // 2mPu/fwke7jfgePsYyasL3aVP5qdJgKt3mq8h/gCpr+p // SIG // ZK0DfM4K3GwoB8LKr76k+pRBamKYu7ip+zAGG0ni3tKT // SIG // HWrVeRFujVZ1zGDk0Srhj38nwSnUobmpS6PPJBu6mtpm // SIG // wOZe+/l9OiQHrDJKMmK+P/QoAxYx1KXB0jg7o5RQSjIt // SIG // evM0XS3q3aVtGwV/RA7sdswTDGhCvDcsWsAhLgKu/vu5 // SIG // LRQG5d4VCrbs2AtRVGblJdgaulNe0uAirKkd4rS0/ajX // SIG // G9qQCeI6yA3ZZeU4KKnn+YKb/mHLwTPN+G1xTcMrXd7o // SIG // ww9uD/Q3fMX1Sb7po7AUEJCuU/6stx60CfLndZx0r7RV // SIG // YuUmv7mxrmBKUvIBehg1jefym73hZHbKE1SD6PKZFoYz // SIG // 7NEO5wOfrgcUAeM5YxIys+VluwQOMKZhZtuH4QZkY1eD // SIG // W6fp+/HIAI7w0n05QOg2AXL9pMdSR9nSIWkZ0njl3j0+ // SIG // oTBdCJeffCzLtK8N+VYlFnAEJFDVE8UZ6hhcc+cPmbrD // SIG // AwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFG6i9baMj1Ha // SIG // Rcsh0gylo9COJcPxMB8GA1UdIwQYMBaAFJ+nFV0AXmJd // SIG // g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js // SIG // L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy // SIG // MDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB // SIG // BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt // SIG // cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC // SIG // MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0P // SIG // AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAuVNmy // SIG // DS4FyB1mzHKlbn/Y5FE/yvM8iwb7uYfCa6mEds/3mjts // SIG // qNTqHPUocr8W3vRmQ7u5JFM8UsidSGZLGWcOhQ6usmTU // SIG // 9zxIwBJ0RKUQS/Evpm14PjuFS0tC0pm/FyGYi7GqmdHw // SIG // xHL9x3gPv8v6ipwkFpF4IaWhDMBjEM0ZIRsHBnV69cxq // SIG // UOx08b37ue8RcWV9TJCp1hRDSerq3fuLXlIF49J4CDsf // SIG // /5d1zCtx7fE9vs7xiTQBfuf+agZO569O/cyAmxV78bYn // SIG // TTeXqF3VvvawCJEvlBg9fQGXQa7benWfjnQKrgYg5GEO // SIG // ZFX1DCkt9ch0DhoJhcbgjs06Vh2pa6qXSJZbMvCjbI+V // SIG // PbDjYlgHfTzZchBx20GQ5ovfwTZTmMk7dGHoS2w6L5mV // SIG // DWs5O/TnfwPde5qgnU6qxMcARlD2zD/v73WFKmibKbqQ // SIG // Z1LYzn/++gwIVcvHv3us0ffD5KZZpYjtm6y90N6w+vmQ // SIG // lXaxjPUZuoVAwQZL2IfmI5hnXEORwelk/UXnPPqgx5m4 // SIG // S4V+GXWmq3efzl3i24Mdn+y+EEEI9yoKo6gzliJ1YTRN // SIG // YGLU1ix3uPPNnf5Oy7otCtYPBGayg+5mjq7CSyjypXoH // SIG // HifRQqmNbA1ClIUWtBB1FvmZCi5aISq0uxcI3ayDVpDw // SIG // YG0M5wo3RNpuO0I02zCCB3EwggVZoAMCAQICEzMAAAAV // SIG // xedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgx // SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u // SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jv // SIG // c29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy // SIG // MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy // SIG // NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd // SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi // SIG // MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM // SIG // 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/ // SIG // bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1 // SIG // jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx // SIG // XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41 // SIG // JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP // SIG // 1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3j // SIG // tIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF // SIG // 50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg // SIG // 3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F // SIG // 37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 // SIG // lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM // SIG // jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX // SIG // pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJ // SIG // YfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF // SIG // ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e // SIG // FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB // SIG // BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS // SIG // /mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A // SIG // XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB // SIG // BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBv // SIG // c2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZ // SIG // BgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E // SIG // BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW // SIG // gBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN // SIG // MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v // SIG // cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx // SIG // MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG // SIG // AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v // SIG // cGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz // SIG // LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf // SIG // ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx // SIG // Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6 // SIG // th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I // SIG // dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq // SIG // 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBew // SIG // VIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7 // SIG // bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa // SIG // 2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzH // SIG // VG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZ // SIG // c9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakUR // SIG // R6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs // SIG // QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi // SIG // excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN // SIG // uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/ // SIG // OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd // SIG // VTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIx // SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u // SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv // SIG // c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm // SIG // MCQGA1UECxMdVGhhbGVzIFRTUyBFU046ODZERi00QkJD // SIG // LTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0 // SIG // YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVADYjRxll // SIG // 2zWgz8Z8og2xDnIkoxYQoIGDMIGApH4wfDELMAkGA1UE // SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV // SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD // SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC // SIG // BQDp5WkwMCIYDzIwMjQwNTA4MTEwMDAwWhgPMjAyNDA1 // SIG // MDkxMTAwMDBaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIF // SIG // AOnlaTACAQAwBwIBAAICF1swBwIBAAICE3IwCgIFAOnm // SIG // urACAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGE // SIG // WQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq // SIG // hkiG9w0BAQUFAAOBgQAKF0eJj4HgbSk+2jh9oygsT4xQ // SIG // 8VbPjIlcGR30hgCZE/ck3X5J+gcfltEiXDP+zwJFEJ/t // SIG // pb2P+TyIG+0DhANgxBvumgfWm7ImJaV/f1yp3hhhNt9d // SIG // gg5AMLipvxhlC6RBzdTk66l3fTlGLlhCEp/TtUWYB6In // SIG // hbs1XwUab1h02DGCBA0wggQJAgEBMIGTMHwxCzAJBgNV // SIG // BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD // SIG // VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg // SIG // Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU // SIG // aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraob // SIG // AAEAAAHdMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG // SIG // 9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE // SIG // MSIEICKjyIPtb5B9ssSGfBBPKSIVXKgm67qW354UKDFL // SIG // W2oVMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg // SIG // Yf8OLZplrE94mZx7R9FZN+1AjdNpUcWPkYjjesAxY2Yw // SIG // gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK // SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG // SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD // SIG // VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx // SIG // MAITMwAAAd1dVx2V1K2qGwABAAAB3TAiBCATBhAqHbFv // SIG // PKJIzdXMVJMw9Xi2tvY+mhXuFsKnz3GYTjANBgkqhkiG // SIG // 9w0BAQsFAASCAgAtDNeg5/mvn4ckepwg0DecBVD6GtIe // SIG // awlGnpcAPJIrue2mq2YxI2SKTPhzZS4vsHbuDLoWyvFG // SIG // wAKPvqYzoDCRqPHX0yHXQCGzHbjBC2qr2d9ljuWzQBhr // SIG // Ip6//ezcl1xc4AZNthf3XlHsUwR0II0IQGo34IOp85TR // SIG // PvkasWSgNac1avI3Kr0z1Fi9wCIlUqolVdZZHOiBgplK // SIG // 6EB7egxBsrR+fnfQfbM/Dm0AIjx9aQySJ7I8f0U9Lxb7 // SIG // aBAiQgl/briznf4KrP1dMPUnFCGgSYHreWeXlZ5HA+Fh // SIG // KyeGroULNF5QAz5YR68Rpa8cgoktVBqbrkgQHHiDQ57C // SIG // yn9nVJjCxZSXf7tOt3RhmWdfKi+Xk2ggYP0ULnLPsc54 // SIG // 5g+LYZ4YLAtZ4K3zBTv8SiW0hQGajxzDpGTFLtea/gLa // SIG // huUeueVUWsrC/uZQ0KKZOQOjr57MZ8gB2+AFesE4Lpf7 // SIG // hnaVEHhzLiPhDEnl6PrJ5jlUWms50Zdv8JwaOyxj2OWs // SIG // +kbOOW3P2PNnVKaqKGXL3HLK5sl73CyGl/l6HYpTZ6rN // SIG // 1R5tRApkntQ5MJPVFrz2LJl9erKBs5oTpN6QkWZqXP03 // SIG // lSVceLQaLWCtpBD53ifooOSx+sOHWMNpfIUqWXF61py9 // SIG // jhrJ6LzqVFkco69of3I286XgWRVmj3b73fCbnQ== // SIG // End signature block
combined_dataset/train/non-malicious/Compare-Drive_1.ps1
Compare-Drive_1.ps1
param($ComputerName1,$ComputerName2) $a = gwmi win32_volume -filter "DriveType=3" -computername $ComputerName1 | where {@('Y:','Z:') -notcontains $_.DriveLetter} | select name, @{n='capacity'; e={[math]::truncate($_.Capacity/1GB)}} $b = gwmi win32_volume -filter "DriveType=3" -computername $ComputerName2 | where {@('Y:','Z:') -notcontains $_.DriveLetter} | select name, @{n='capacity'; e={[math]::truncate($_.Capacity/1GB)}} Compare-Object -ReferenceObject $a -DifferenceObject $b -Property name,capacity -PassThru | select-object name, @{n='ComputerName1';e={$ComputerName1}}, @{n='ComputerName2';e={$ComputerName2}}, @{n='Capacity1';e={$name = $_.name; $drive = $a | ? { $_.name -eq $name }; if ($drive.capacity) {$drive.capacity} else {0} }}, @{n='Capacity2';e={$name = $_.name; $drive = $b | ? { $_.name -eq $name }; if ($drive.capacity) {$drive.capacity} else {0} }} | Sort-Object -Property name -Unique #get-content .\\serverpairs.txt | %{$servers = $_ -split ','; .\\compare-drive.ps1 $servers[0] $servers[1] } | ogv
combined_dataset/train/non-malicious/sample_10_98.ps1
sample_10_98.ps1
ConvertFrom-StringData @' id_dpm_eventlog_activity=Gathering Eventlogs id_dpm_status_eventlogs=Running DC_DPMEventLogs.ps1 '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCObuswAI1rRsqh # d7RWCZa0JfwhUGuBtHS0Hxl78v2mwqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII3w # xI1xSVVKASXhbtY7YrZIC2LhVGZo8wfM77j0IL/bMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEABAlCgrWGFH38884KqUX98Lq2/rPhkMgq3t4E # d0ujvj8OeU5I4JpHcaTBBqlC7nzc4WRcE0vASuV4LZxqCEEpTnbA+a9SEk548aag # lgCwrFGXwC0mrtUkyM/DahNXPQe7R0hPWNCoEoKM9AMyzB2FmtdxPlPXwSNE4eKY # 7TeUBV3g776j2hrvhXx4hkw6VruOaTgx2oMHnWpbiT9eGRwVKa2BEAIwvIQC8rEu # xg+WYigp7CQsO+Q92nhF/pPKOB3TXelQ+xqKIbBuzEHD1sNzxEKrJbMhEvZuFL9K # zrw4yTH/X8Jz8xRKFFfQGq2x8TPTOvNYxyWlWBMSBpRwsd/JxKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDdpZxdzUCpvM4i9xeqZ8uDt8gA6reQ9dZH # UAqBF0HNCAIGZxqItyNJGBMyMDI0MTAyODExNDA0My40NjZaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAi # GA8yMDI0MTAyODA1NDg0MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyaQ5AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEg # Ea636VH1IhLDsW3Fa0ADcc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeq # PPb9X5bmbVFXObHp67WigFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/n # qvDz8msZXcAtE96/FvXd43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6 # hMlUIcog3CD8TCcit1MWEuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/ # jpNVEuQ5uey+mvVyZ/KaPkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa # JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDDsNkkWR0Ru4zcNJfjunNX8twH # 9OZCJMioKeiPBV9OZTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj # ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlH # i0Od4rfyi3FO/mCmLpu/ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIAbO7e # YMjPv7dUAHPzgkUiQrtTK95aiXIfBmvT/e1K5rrBiVHzlmopq9fmhm0ki0bhJ/jS # Zw5IDY4wgiaLZmKetxmSDpp2/y8INnJDMlenUGbH4X+p4h8n1hc5kJXZ3ruX8O99 # 7wEwrjaRFynJvAvVXOkiRYMLddF7+d3w07tECDCfQMFplR7aV2ZALpDWeG2TO3Y6 # cTpOr+GjPm4rGV50lwftmPPZ2GRIe6YnskIhPxvMOG5+xY66bd2NZRPHQlggR5pm # EHe4WyCaWmeyhN9MweQHmf2N8j20XJmCK/2ygvgQpfQuM0HW6bV/IU5nYrnJuxRW # Njf1FBJrpVN+7zq7AXEqoDbjXSRxSBAmx8i5RAig1oxWctn6eeWgvzc7FSqArP/j # QsroJcIqQ0akphI3ks/k8oRRweFq976aK4kCYfYJA+nQ2j1e2Ltagci4p4jIKhfv # YwN083Nperj4bovzHiz6U1viiYq6gSZWYaA4Ew7bf18AGaWMbIiGVAVKdVqT9SKr # 7JdU8PRHsD/FPK0zUlDm593AWViVI95sFqj3X9brGvFH1N0aGBgQCduqGyeTgX3S # zRli3Fpari/b+fbdJzrdy54dpsqu88U9tBDreViVQ2YAYlGpApnaOueob25O0MKD # pG3LEjT8czMCS21uG9WKAz2aIL0lL2JK/zye8a0= # SIG # End signature block
combined_dataset/train/non-malicious/Send-Mapi.ps1
Send-Mapi.ps1
############################################################################## #.AUTHOR # Josh Einstein # Einstein Technologies, LLC ############################################################################## ############################################################################## #.SYNOPSIS # Opens a new mail message window (without actually sending it) with the # To/CC/BCC/Subject/Body pre-filled with optional values and optional file # attachments added to the message. # #.DESCRIPTION # This function uses your default email client to display a new message # window with the specified file(s) attached and a pre-filled subject and # message body. # #.PARAMETER Path # Specifies the path to one or more attachments to add. Wildcards are permitted. # #.PARAMETER LiteralPath # Specifies the path to an item. Unlike Path, the value of LiteralPath is # used exactly as it is typed. No characters are interpreted as wildcards. # If the path includes escape characters, enclose it in single quotation marks. # Single quotation marks tell Windows PowerShell not to interpret any # characters as escape sequences. # #.PARAMETER To # Specifies one or more recipients on the To line. # #.PARAMETER CC # Specifies one or more recipients on the CC line. # #.PARAMETER BCC # Specifies one or more recipients on the BCC line. # #.PARAMETER Subject # The subject of the message. # #.PARAMETER Body # The body of the message. # #.EXAMPLE # Get-ChildItem C:\\temp\\*.txt | Send-MAPI -To josheinstein@hotmail.com ############################################################################## function Send-MAPI { [CmdletBinding(DefaultParameterSetName='Path')] param( [Parameter(ParameterSetName='Path', Position=1, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [String[]]$Path, [Alias("PSPath")] [Parameter(ParameterSetName='LiteralPath', Mandatory=$true, ValueFromPipelineByPropertyName=$true)] [String[]]$LiteralPath, [Parameter()] [String[]]$To, [Parameter()] [String[]]$CC, [Parameter()] [String[]]$BCC, [Parameter()] [String]$Subject, [Parameter()] [String]$Body ) begin { $Message = New-Object MAPI.Message $Message.AddRecipient($To) $Message.AddCC($CC) $Message.AddBCC($BCC) $Message.Subject = $Subject $Message.Body = $Body } process { switch ($PSCmdlet.ParameterSetName) { Path { $ResolvedPaths = @(Resolve-Path -Path:$Path) } LiteralPath { $ResolvedPaths = @(Resolve-Path -LiteralPath:$LiteralPath) } } foreach ($ResolvedPath in $ResolvedPaths) { Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand.Name) Processing $ResolvedPath" $Message.Attachments.Add($ResolvedPath.ProviderPath) } } end { if ($Message.Attachments.Count) { if (-not $Message.Subject) { $Message.Subject = "Emailing: $($Message.Attachments | %{ [IO.Path]::GetFileName($_) })" } if (-not $Message.Body) { $Message.Body = @" Your message is ready to be sent with the following file or link attachments: $(($Message.Attachments | %{ [IO.Path]::GetFileName($_) }) -join "`n" ) Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. Check your e-mail security settings to determine how attachments are handled. "@ } } $Message.Show() } } Add-Type @" // Credit goes to David M Brooks // http://www.codeproject.com/KB/IP/SendFileToNET.aspx using System; using System.Collections.Specialized; using System.Runtime.InteropServices; using System.IO; using System.Collections.Generic; using System.Threading; namespace MAPI { public sealed class Message { public Message() { Attachments = new List<string>(); } public string Subject; public string Body; public List<string> Attachments; public void AddRecipient(string[] email) { if (email == null || email.Length == 0) return; foreach ( string e in email) { AddRecipient(e, HowTo.MAPI_TO); } } public void AddCC(string[] email) { if (email == null || email.Length == 0) return; foreach ( string e in email ) { AddRecipient(e, HowTo.MAPI_TO); } } public void AddBCC(string[] email) { if (email == null || email.Length == 0) return; foreach ( string e in email ) { AddRecipient(e, HowTo.MAPI_TO); } } public void Show() { Thread t = new Thread((ThreadStart)delegate { SendMail(Subject, Body, MAPI_LOGON_UI | MAPI_DIALOG); }); t.SetApartmentState(ApartmentState.STA); t.Start(); } public void Send() { Thread t = new Thread((ThreadStart)delegate { SendMail(Subject, Body, MAPI_LOGON_UI); }); t.SetApartmentState(ApartmentState.STA); t.Start(); } [DllImport("MAPI32.DLL")] static extern int MAPISendMail(IntPtr sess, IntPtr hwnd, MapiMessage message, int flg, int rsv); int SendMail(string strSubject, string strBody, int how) { MapiMessage msg = new MapiMessage(); msg.subject = strSubject; msg.noteText = strBody; msg.recips = GetRecipients(out msg.recipCount); msg.files = GetAttachments(out msg.fileCount); m_lastError = MAPISendMail(new IntPtr(0), new IntPtr(0), msg, how, 0); if (m_lastError > 1) throw new Exception("MAPISendMail failed! " + GetLastError()); Cleanup(ref msg); return m_lastError; } bool AddRecipient(string email, HowTo howTo) { MapiRecipDesc recipient = new MapiRecipDesc(); recipient.recipClass = (int)howTo; recipient.name = email; m_recipients.Add(recipient); return true; } IntPtr GetRecipients(out int recipCount) { recipCount = 0; if (m_recipients.Count == 0) return IntPtr.Zero; int size = Marshal.SizeOf(typeof(MapiRecipDesc)); IntPtr intPtr = Marshal.AllocHGlobal(m_recipients.Count * size); int ptr = (int)intPtr; foreach (MapiRecipDesc mapiDesc in m_recipients) { Marshal.StructureToPtr(mapiDesc, (IntPtr)ptr, false); ptr += size; } recipCount = m_recipients.Count; return intPtr; } IntPtr GetAttachments(out int fileCount) { fileCount = 0; if (Attachments == null) return IntPtr.Zero; if ((Attachments.Count <= 0) || (Attachments.Count > maxAttachments)) return IntPtr.Zero; int size = Marshal.SizeOf(typeof(MapiFileDesc)); IntPtr intPtr = Marshal.AllocHGlobal(Attachments.Count * size); MapiFileDesc mapiFileDesc = new MapiFileDesc(); mapiFileDesc.position = -1; int ptr = (int)intPtr; foreach (string strAttachment in Attachments) { mapiFileDesc.name = Path.GetFileName(strAttachment); mapiFileDesc.path = strAttachment; Marshal.StructureToPtr(mapiFileDesc, (IntPtr)ptr, false); ptr += size; } fileCount = Attachments.Count; return intPtr; } void Cleanup(ref MapiMessage msg) { int size = Marshal.SizeOf(typeof(MapiRecipDesc)); int ptr = 0; if (msg.recips != IntPtr.Zero) { ptr = (int)msg.recips; for (int i = 0; i < msg.recipCount; i++) { Marshal.DestroyStructure((IntPtr)ptr, typeof(MapiRecipDesc)); ptr += size; } Marshal.FreeHGlobal(msg.recips); } if (msg.files != IntPtr.Zero) { size = Marshal.SizeOf(typeof(MapiFileDesc)); ptr = (int)msg.files; for (int i = 0; i < msg.fileCount; i++) { Marshal.DestroyStructure((IntPtr)ptr, typeof(MapiFileDesc)); ptr += size; } Marshal.FreeHGlobal(msg.files); } m_lastError = 0; } public string GetLastError() { if (m_lastError <= 26) return errors[ m_lastError ]; return "MAPI error [" + m_lastError.ToString() + "]"; } readonly string[] errors = new string[] { "OK [0]", "User abort [1]", "General MAPI failure [2]", "MAPI login failure [3]", "Disk full [4]", "Insufficient memory [5]", "Access denied [6]", "-unknown- [7]", "Too many sessions [8]", "Too many files were specified [9]", "Too many recipients were specified [10]", "A specified attachment was not found [11]", "Attachment open failure [12]", "Attachment write failure [13]", "Unknown recipient [14]", "Bad recipient type [15]", "No messages [16]", "Invalid message [17]", "Text too large [18]", "Invalid session [19]", "Type not supported [20]", "A recipient was specified ambiguously [21]", "Message in use [22]", "Network failure [23]", "Invalid edit fields [24]", "Invalid recipients [25]", "Not supported [26]" }; List<MapiRecipDesc> m_recipients = new List<MapiRecipDesc>(); int m_lastError = 0; const int MAPI_LOGON_UI = 0x00000001; const int MAPI_DIALOG = 0x00000008; const int maxAttachments = 20; enum HowTo{MAPI_ORIG=0, MAPI_TO, MAPI_CC, MAPI_BCC}; [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Ansi)] private class MapiMessage { public int reserved; public string subject; public string noteText; public string messageType; public string dateReceived; public string conversationID; public int flags; public IntPtr originator; public int recipCount; public IntPtr recips; public int fileCount; public IntPtr files; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Ansi)] private class MapiFileDesc { public int reserved; public int flags; public int position; public string path; public string name; public IntPtr type; } [StructLayout(LayoutKind.Sequential, CharSet=CharSet.Ansi)] private class MapiRecipDesc { public int reserved; public int recipClass; public string name; public string address; public int eIDSize; public IntPtr entryID; } } } "@
combined_dataset/train/non-malicious/4285.ps1
4285.ps1
$scriptblock = { param ($Payload) $PipeName = "PoshMSDaisy" $p = [System.IO.Directory]::GetFiles("\\.\\pipe\\") $start = $true foreach ($i in $p) { if ($i -like "*PoshMSDaisy") { $start = $false } } while ($start) { add-Type -assembly "System.Core" $PipeSecurity = New-Object System.IO.Pipes.PipeSecurity $AccessRule = New-Object System.IO.Pipes.PipeAccessRule( "Everyone", "ReadWrite", "Allow" ) $PipeSecurity.AddAccessRule($AccessRule) $Pipe = New-Object System.IO.Pipes.NamedPipeServerStream($PipeName,"InOut",100, "Byte", "None", 1024, 1024, $PipeSecurity) $pipe.WaitForConnection(); $pipeReader = new-object System.IO.StreamReader($pipe) $pipeWriter = new-object System.IO.StreamWriter($pipe) $pipeWriter.AutoFlush = $true $pipeWriter.WriteLine($Payload); $pipeReader.Dispose(); $pipe.Dispose(); } exit } add-Type -assembly "System.Core" $MaxThreads = 5 $RunspacePool = [RunspaceFactory]::CreateRunspacePool(1, $MaxThreads) $RunspacePool.Open() $Jobs = @() $Job = [powershell]::Create().AddScript($ScriptBlock).AddArgument($daisypayload) $Job.RunspacePool = $RunspacePool $Job.BeginInvoke() | Out-Null $pi = new-object System.IO.Pipes.NamedPipeClientStream(".", "PoshMSDaisy");
combined_dataset/train/non-malicious/sample_15_94.ps1
sample_15_94.ps1
# # Module manifest for module 'Microsoft.SME.StorageMigration' # @{ # Script module or binary module file associated with this manifest. RootModule = 'Microsoft.SME.StorageMigration.psm1' # Version number of this module. ModuleVersion = '4.9.0' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = 'efc37b2c-cc98-45c2-9b4f-497b9ad06e46' # Author of this module Author = 'SME' # Company or vendor of this module CompanyName = 'Microsoft' # Copyright statement for this module Copyright = '(c) 2018 Microsoft. All rights reserved.' # Description of the functionality provided by this module # Description = '' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @( 'Get-WACSMSCutoverSummary', 'Get-WACSMSInventoryConfigDetail', 'Get-WACSMSInventoryDFSNDetail', 'Get-WACSMSInventorySMBDetail', 'Get-WACSMSInventorySummary', 'Get-WACSMSSmbNetFirewallRule', 'Get-WACSMSSmsCutover', 'Get-WACSMSSmsCutoverPairing', 'Get-WACSMSSmsDestinationConfig', 'Get-WACSMSSmsFeature', 'Get-WACSMSSmsInventory', 'Get-WACSMSSmsNasPrescan', 'Get-WACSMSSmsRequiredVolumeSize', 'Get-WACSMSSmsState', 'Get-WACSMSSmsStats', 'Get-WACSMSSmsTransfer', 'Get-WACSMSSmsTransferExcludedShares', 'Get-WACSMSSmsTransferExcludedSharesAndAFS', 'Get-WACSMSSmsTransferPairing', 'Get-WACSMSSmsTransferVolumePairing', 'Get-WACSMSSmsVersion', 'Get-WACSMSTemporaryFile', 'Get-WACSMSTransferDFSNDetail', 'Get-WACSMSTransferFileDetail', 'Get-WACSMSTransferSMBDetail', 'Get-WACSMSTransferSummary', 'Get-WACSMSWinEvent', 'Get-WACSMSWindowsFeature', 'Import-WACSMSSmsModule', 'Install-WACSMSSmsFeature', 'Install-WACSMSSmsProxy', 'Install-WACSMSWindowsFeature', 'Invoke-WACSMSCommand', 'New-WACSMSSmsCutover', 'New-WACSMSSmsInventory', 'New-WACSMSSmsNasPrescan', 'New-WACSMSSmsTransfer', 'Register-WACSMSSmsProxy', 'Remove-WACSMSSmsCutoverPairing', 'Remove-WACSMSSmsInventory', 'Remove-WACSMSSmsTransferPairing', 'Resume-WACSMSSmsCutover', 'Resume-WACSMSSmsTransfer', 'Set-WACSMSSmsCutover', 'Set-WACSMSSmsCutoverPairing', 'Set-WACSMSSmsInventory', 'Set-WACSMSSmsTransfer', 'Set-WACSMSSmsTransferExcludedShares', 'Set-WACSMSSmsTransferExcludedSharesAndAFS', 'Set-WACSMSSmsTransferPairing', 'Set-WACSMSSmsTransferVolumePairings', 'Start-WACSMSSmsCutover', 'Start-WACSMSSmsInventory', 'Start-WACSMSSmsNasPrescan', 'Start-WACSMSSmsTransfer', 'Stop-WACSMSSmsCutover', 'Stop-WACSMSSmsInventory', 'Stop-WACSMSSmsTransfer', 'Suspend-WACSMSSmsInventory', 'Suspend-WACSMSSmsTransfer', 'Test-WACSMSLocal', 'Test-WACSMSSmsMigration', 'Clear-WACSMSEventLogChannel', 'Clear-WACSMSEventLogChannelAfterExport', 'Export-WACSMSEventLogChannel', 'Get-WACSMSCimEventLogRecords', 'Get-WACSMSCimWin32LogicalDisk', 'Get-WACSMSCimWin32NetworkAdapter', 'Get-WACSMSCimWin32PhysicalMemory', 'Get-WACSMSCimWin32Processor', 'Get-WACSMSClusterEvents', 'Get-WACSMSClusterInventory', 'Get-WACSMSClusterNodes', 'Get-WACSMSDecryptedDataFromNode', 'Get-WACSMSEncryptionJWKOnNode', 'Get-WACSMSEventLogDisplayName', 'Get-WACSMSEventLogFilteredCount', 'Get-WACSMSEventLogRecords', 'Get-WACSMSEventLogSummary', 'Get-WACSMSServerInventory', 'Set-WACSMSEventLogChannelStatus' ) # Function attributes: {"localScripts":["Get-WACSMSCutoverSummary","Get-WACSMSInventoryConfigDetail","Get-WACSMSInventoryDFSNDetail","Get-WACSMSInventorySMBDetail","Get-WACSMSInventorySummary","Get-WACSMSSmbNetFirewallRule","Get-WACSMSSmsCutover","Get-WACSMSSmsCutoverPairing","Get-WACSMSSmsDestinationConfig","Get-WACSMSSmsFeature","Get-WACSMSSmsInventory","Get-WACSMSSmsNasPrescan","Get-WACSMSSmsRequiredVolumeSize","Get-WACSMSSmsState","Get-WACSMSSmsStats","Get-WACSMSSmsTransfer","Get-WACSMSSmsTransferExcludedShares","Get-WACSMSSmsTransferExcludedSharesAndAFS","Get-WACSMSSmsTransferPairing","Get-WACSMSSmsTransferVolumePairing","Get-WACSMSSmsVersion","Get-WACSMSTemporaryFile","Get-WACSMSTransferDFSNDetail","Get-WACSMSTransferFileDetail","Get-WACSMSTransferSMBDetail","Get-WACSMSTransferSummary","Get-WACSMSWinEvent","Get-WACSMSWindowsFeature","Import-WACSMSSmsModule","Install-WACSMSSmsFeature","Install-WACSMSSmsProxy","Install-WACSMSWindowsFeature","Invoke-WACSMSCommand","New-WACSMSSmsCutover","New-WACSMSSmsInventory","New-WACSMSSmsNasPrescan","New-WACSMSSmsTransfer","Register-WACSMSSmsProxy","Remove-WACSMSSmsCutoverPairing","Remove-WACSMSSmsInventory","Remove-WACSMSSmsTransferPairing","Resume-WACSMSSmsCutover","Resume-WACSMSSmsTransfer","Set-WACSMSSmsCutover","Set-WACSMSSmsCutoverPairing","Set-WACSMSSmsInventory","Set-WACSMSSmsTransfer","Set-WACSMSSmsTransferExcludedShares","Set-WACSMSSmsTransferExcludedSharesAndAFS","Set-WACSMSSmsTransferPairing","Set-WACSMSSmsTransferVolumePairings","Start-WACSMSSmsCutover","Start-WACSMSSmsInventory","Start-WACSMSSmsNasPrescan","Start-WACSMSSmsTransfer","Stop-WACSMSSmsCutover","Stop-WACSMSSmsInventory","Stop-WACSMSSmsTransfer","Suspend-WACSMSSmsInventory","Suspend-WACSMSSmsTransfer","Test-WACSMSLocal","Test-WACSMSSmsMigration"],"externalScripts":["Clear-WACSMSEventLogChannel","Clear-WACSMSEventLogChannelAfterExport","Export-WACSMSEventLogChannel","Get-WACSMSCimEventLogRecords","Get-WACSMSCimWin32LogicalDisk","Get-WACSMSCimWin32NetworkAdapter","Get-WACSMSCimWin32PhysicalMemory","Get-WACSMSCimWin32Processor","Get-WACSMSClusterEvents","Get-WACSMSClusterInventory","Get-WACSMSClusterNodes","Get-WACSMSDecryptedDataFromNode","Get-WACSMSEncryptionJWKOnNode","Get-WACSMSEventLogDisplayName","Get-WACSMSEventLogFilteredCount","Get-WACSMSEventLogRecords","Get-WACSMSEventLogSummary","Get-WACSMSServerInventory","Set-WACSMSEventLogChannelStatus"]} # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBvVfgSc7n4+z+k # Fipa4u0qWHwwjuACuiRZKaGGR1ygrKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIPRlPfZVIV5byzL7Bq4XZjY # 22wZIoALh7f5zPHiwDo3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAd2UnlO9+WU3UxCakSCT+E0UKsesYiv2ca2WbrTozSEdaZB7sjvzIGRNv # FHEMrNnENbhrxHpWZFaGauOMHJ11cufD3BWdluizNEfymXUT7Qyca4SaXQDKO2Wk # aqW+iiy2dsR+KV0fY33ETXiWgR/J/P0e2qf1va9wsbqJSXztrwqvoGLXxif8TZU8 # p+QKeLzIC8K0DwPcUKm381eQnRy8Qzgo+FfVM/G4HMzVdlUlXnvNvqj6kuEajzuw # qfAcXUSZFYAJRxqc7g1cNXV2H44DrUvXuRMVESfLvDfbYI8GEAH0SFQENg20G7sg # yF/5FzTElcwAh3TAoYhe3vblo3qYWaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA4eiwtb6p8IBjhkXR3EL50HdxaihskiuLkvb/NEA0kWgIGZbqldNUi # GBMyMDI0MDIyMDIyNTUwMC4yNDJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl/gCkwIhgPMjAyNDAyMjEwMzQ2NDlaGA8yMDI0MDIyMjAzNDY0OVowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6X+AKQIBADAKAgEAAgIDZAIB/zAHAgEAAgITfzAK # AgUA6YDRqQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKpPt70uUsv1P4/X # ML85ps6mfxRTO8xnSz8/Ag8nRdL1xAJ/KYHxiVIL5noExa5QVaLZwvfQ3Q2uJTdK # e4/YCWkm++TDHUmHfG1c6vvEBXKUywKtNp1Rubum/PbOKB5nJpxFyAzjEbNApPaB # 6X2XKd08DNuzukJ4YZOmC7mFsBxAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQggJz0Wn92sDFBvEeLvnu/9DJDsa3MLnkC3BuxgS5BPXgwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLyl # xIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 3MHgjMJfWF6OAAEAAAHcMCIEIJHEw8XmJ0Cl6OeupdmUITCi2EYqR+P3f3c9SNhu # pHUjMA0GCSqGSIb3DQEBCwUABIICAESk1ROjpF3A4JNsLnzw9AuY6cxJB5Sqtu4+ # gcxD2nc4Wf4dBoamRbzsGQHZSbYYEGzMIc6BD0cQUVJJPsif5C/ScJzjr+Obk+Xa # f9k1L1M6hawAyPaw7dU/iQ5gaXb9VlkHzhL0rh4aKa415aBE9hFRAXfC/Fk8fSIi # jS3IxYptkfIfMZGKNEtrqZpVgG8g9Z2VSOJUmIqjRpnJYIsvzM6Kb4wCcN5sJMV4 # ukuceTMCiLsvltHFvX09wYCkhpVTbFScKEHOTgi5ib66rPOPTAKiOhYfovcm3QMO # BHlG6x11OsnKGC1Fd4BqDVvi2oINbpDgBuAn3f7PAeAXpYvsxVFL90DBQcyPx6PW # ppmNirxUOmvI7T1eXu0P76RrEQpiAqcFD542Q3euZ0Ojfstq2L++LyBRCy6B7pgJ # gkutnjGyZC6TymXMwNEK4K5GqbuKSAjV/cD7uQubK2QeMSBtqOVdicOGa7KYIxbG # cEyN83Rs8q3/5VX4GY6rZVcjw8DKk2kf6FFZv0aFUjYu2dpUFQvBBrl63fcHdvLJ # I8OiLJNl6Ms2SHnSLZFK27+im1PWgqxzLoaFaTkKOHnY5QtltyOAfUyEKiWBzvTD # ix4xHHSiJKKHpUf1afnjs/PRSwxtovIeKn+x5E4ifIWNwtXn5cV8ZZPm023ayS6Z # LlTS4R2R # SIG # End signature block
combined_dataset/train/non-malicious/sample_29_69.ps1
sample_29_69.ps1
TОбмеження PrintAllTranslations та IgnoreTranslations не можна використовувати разом.oОбчислюваний стовпець "%{ccon_column/}" не можна додавати до гібридної таблиці "%{ccon_table/}". Вилучіть його.‹Не можна додавати стовпець "alternateOf", що використовується для агрегацій, до гібридної таблиці "%{ccon_table/}". Вилучіть "alternateOf".õНе можна створювати стовпець "alternateOf", що використовуватиметься для агрегацій, з посиланням на гібридну таблицю "%{ccon_baseTable/}" як BaseTable. Укажіть посилання на базову таблицю в режимі DirectQuery або вилучіть стовпець "alternateOf".’Не можна створювати кілька розділів у режимі DirectQuery для таблиці "%{ccon_table/}". Підтримується використання лише одного розділу DirectQuery.ÊУ гібридній таблиці "%{ccon_table/}" типу сутності не можна створити розділ, що посилається на інший набір даних Power BI, SAP або Azure Analysis Services як на джерело DirectQuery. Вилучіть цей розділ.ǀНе можна налаштувати таблицю "%{ccon_table/}" як таблицю нарощуваного оновлення з розділом у реальному часі, оскільки вираз запиту даних посилається на кілька джерел даних (%d{datasourceNumber/}). Таблиця нарощуваного оновлення з розділом у реальному часі може використовувати лише одне джерело даних. Змініть вираз таблиці, щоб використовувати лише одне джерело даних. Докладніше див. за посиланням https://go.microsoft.com/fwlink/?linkid=2172127.aВластивість "%{property/}" в об’єкті ChangedProperty для батьківського типу "%{type/}" несумісна.rТип ArtifactType "%{ArtifactType/}" в об’єкті ExcludedArtifact для батьківського типу "%{parentType/}" несумісний.fКолекція об’єктів changedProperty "FormatString" уже існує. Тепер дозволено використовувати дублікати.aКолекція об’єктів changedProperty "Caption" уже існує. Тепер дозволено використовувати дублікати.eКолекція об’єктів changedProperty "Description" уже існує. Тепер дозволено використовувати дублікати.gКолекція об’єктів changedProperty "DisplayFolder" вже існує. Тепер дозволено використовувати дублікати.uТаблиця відомостей "%{ccon_table/}" негрупованого AlternateOf (наприклад, Sum/Min/Max) має бути таблицею DirectQuery.”Таблиця агрегації "%{ccon_table/}" не може бути в режимі DirectQuery, якщо її таблиця відомостей "%{ccon_basetable/}" перебуває в подвійному режимі.
combined_dataset/train/non-malicious/82bfeecc-3581-4dec-8684-4e98aef8a59a.ps1
82bfeecc-3581-4dec-8684-4e98aef8a59a.ps1
# Enumerate fan speeds on an ESX host that is running WSMAN. # This doesn't take advantage of CTP3's WSMAN cmdlets. # Needs winrm installed. $serverName = "your.server" $user = "root" $password = "password" $x = [xml](winrm enumerate ` http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_NumericSensor ` "-username:$user" "-password:$password" "-auth:basic" "-skipCAcheck" ` "-skipCNcheck" "-r:https://$serverName/wsman" "-format:pretty") $pattern = "(?<ID>FAN .)" $x.Results.OMC_NumericSensor
combined_dataset/train/non-malicious/Format-Column 0.3.ps1
Format-Column 0.3.ps1
function global:Format-Column { ################################################################ #.Synopsis # Formats incoming data to columns. #.Description # It works similarly as Format-Wide but it works vertically. Format-Wide outputs # the data row by row, but Format-Columns outputs them column by column. #.Parameter Property # Name of property to get from the object. # It may be # -- string - name of property. # -- scriptblock # -- hashtable with keys 'Expression' (value is string=property name or scriptblock) # and 'FormatString' (used in -f operator) #.Parameter Column # Number of columns to display. #.Parameter Autosize # Automatically calculate the number of columns to display. #.Parameter MaxColumn # Maximum number of columns to display if using Autosize. #.Parameter Flow # The direction of flow to display items. #.Parameter InputObject # Data to display. #.Example # PS> 1..150 | Format-Column -Autosize #.Example # PS> Format-Column -Col 3 -Input 1..130 #.Example # PS> Get-Process | Format-Column -prop @{Expression='Handles'; FormatString='{0:00000}'} -auto #.Example # PS> Get-Process | Format-Column -prop {$_.Handles} -auto #.Notes # Name: Format-Column # Author: stej, http://twitter.com/stejcz # Version 0.1 - January 6, 2010 - stej # Version 0.2 - January 14, 2010 - stej # - ADDED parameter MaxColumn # - FIXED displaying collection of 1 item was incorrect # Version 0.3 - March 14, 2012 - By Jason Archer (This Version) # - ADDED parameter Flow ################################################################ param( [Parameter(Position=0)][Object]$Property, [Parameter()][switch]$Autosize, [Parameter()][int]$Column, [Parameter()][int]$MaxColumn, [Parameter()][ValidateSet("Horizontal","Vertical")][String]$Flow = "Horizontal", [Parameter(Mandatory=$true,ValueFromPipeline=$true)][Object[]]$InputObject ) begin { [Object[]]$Values = @() } process { $Values += $InputObject } end { function ProcessValues { if ($Property -is [Hashtable]) { $exp = $Property.Expression if ($exp) { if ($exp -is [string]) { $Values = $Values | % { $_.($exp) } } elseif ($exp -is [scriptblock]) { $Values = $Values | % { & $exp $_} } else { throw 'Invalid Expression value' } } if ($Property.FormatString) { if ($Property.FormatString -is [string]) { $Values = $Values | % { $Property.FormatString -f $_ } } else { throw 'Invalid format string' } } } elseif ($Property -is [scriptblock]) { $Values = $Values | % { & $Property $_} } elseif ($Property -is [string]) { $Values = $Values | % { $_.$Property } } elseif ($Property -ne $null) { throw 'Invalid -Property type' } # in case there were some numbers, objects, etc., convert them to string $Values | % { $_.ToString() } } function Base($i) { [Math]::Floor($i) } function Max($i1, $i2) { [Math]::Max($i1, $i2) } if (!$Column) { $Autosize = $true } $Values = ProcessValues $valuesCount = $values.Count if ($valuesCount -eq 1) { $Values | Out-Host return } # For some reason the console host doesn't use the last column and writes to new line $consoleWidth = $Host.UI.RawUI.MaxWindowSize.Width - 1 $spaceWidthBetweenCols = 2 # get length of the longest string $Values | ForEach-Object -Begin { [int]$maxLength = -1 } -Process { $maxLength = Max $maxLength $_.Length } # get count of columns if not provided if ($Autosize) { $Column = Max (Base ($consoleWidth/($maxLength+$spaceWidthBetweenCols))) 1 $remainingSpace = $consoleWidth - $Column*($maxLength+$spaceWidthBetweenCols); if ($remainingSpace -ge $maxLength) { $Column++ } if ($MaxColumn -and $MaxColumn -lt $Column) { Write-Debug "Columns corrected to $MaxColumn (original: $Column)" $Column = $MaxColumn } } $countOfRows = [Math]::Ceiling($valuesCount / $Column) $maxPossibleLength = Base ($consoleWidth / $Column) # cut too long values, considers count of columns and space between them $Values = $Values | ForEach-Object { if ($_.length -gt $maxPossibleLength) { $_.Remove($maxPossibleLength-2) + '..' } else { $_ } } #add empty values so that the values fill rectangle (2 dim array) without space if ($Column -gt 1) { $Values += (@('') * ($countOfRows * $Column - $valuesCount)) } <# now we have values like this: 1, 2, 3, 4, 5, 6, 7, '' #> $formatString = (1..$Column | %{"{$($_-1),-$maxPossibleLength}"}) -join '' 1..$countOfRows | ForEach-Object { $r = $_ - 1 if ($Flow -eq "Horizontal") { <# Display them like this: 1 2 3 4 5 6 7 '' #> $line = @(1..$Column | % { $Values[($r * $Column) + ($_ - 1)]}) } else { <# Display them like this: 1 3 5 7 2 4 6 '' #> $line = @(1..$Column | % { $Values[$r + ($_ - 1) * $countOfRows]}) } $formatString -f $line | Out-Host } } }
combined_dataset/train/non-malicious/sample_34_97.ps1
sample_34_97.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis This operation disables the Disaster Recovery and stops replicating changes from primary to secondary namespaces .Description This operation disables the Disaster Recovery and stops replicating changes from primary to secondary namespaces #> function Set-AzEventHubGeoDRConfigurationBreakPair{ [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName = 'Break', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(ParameterSetName = 'Break', Mandatory, HelpMessage = "The name of the Consumer Group.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] ${Name}, [Parameter(ParameterSetName = 'Break', Mandatory, HelpMessage = "The name of EventHub namespace")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] # The name of EventHub namespace ${NamespaceName}, [Parameter(ParameterSetName = 'Break', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName = 'Break', HelpMessage = "The ID of the target subscription.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName = 'BreakViaIdentity', Mandatory, ValueFromPipeline, HelpMessage = "Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IEventHubIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(HelpMessage = "Run the command asynchronously")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process{ try{ $hasAsJob = $PSBoundParameters.Remove('AsJob') $null = $PSBoundParameters.Remove('WhatIf') $null = $PSBoundParameters.Remove('Confirm') $drConfig = Get-AzEventHubGeoDRConfiguration @PSBoundParameters # 2. PUT $null = $PSBoundParameters.Remove('InputObject') if ($hasAsJob) { $PSBoundParameters.Add('AsJob', $true) } if($PSCmdlet.ParameterSetName -eq 'Break'){ if ($PSCmdlet.ShouldProcess("EventHub Disaster Recovery Alias $($Name)", "Break Pair")) { Az.EventHub.private\Invoke-AzEventHubBreakDisasterRecoveryConfigPairing_Break @PSBoundParameters } } elseif($PSCmdlet.ParameterSetName -eq 'BreakViaIdentity'){ $EnvPSBoundParameters = @{} if ($PSBoundParameters.ContainsKey('Debug')) { $EnvPSBoundParameters['Debug'] = $Debug } if ($PSBoundParameters.ContainsKey('HttpPipelineAppend')) { $EnvPSBoundParameters['HttpPipelineAppend'] = $HttpPipelineAppend } if ($PSBoundParameters.ContainsKey('HttpPipelinePrepend')) { $EnvPSBoundParameters['HttpPipelinePrepend'] = $HttpPipelinePrepend } if ($PSBoundParameters.ContainsKey('Proxy')) { $EnvPSBoundParameters['Proxy'] = $Proxy } if ($PSBoundParameters.ContainsKey('ProxyCredential')) { $EnvPSBoundParameters['ProxyCredential'] = $ProxyCredential } if ($PSBoundParameters.ContainsKey('ProxyUseDefaultCredentials')) { $EnvPSBoundParameters['ProxyUseDefaultCredentials'] = $ProxyUseDefaultCredentials } if($InputObject.Id -ne $null){ $ResourceHashTable = ParseResourceId -ResourceId $InputObject.Id } else{ $ResourceHashTable = ParseResourceId -ResourceId $InputObject } if ($PSCmdlet.ShouldProcess("EventHub Disaster Recovery Alias $($InputObject.Name)", "Break Pair")) { Az.EventHub.private\Invoke-AzEventHubBreakDisasterRecoveryConfigPairing_Break -Name $ResourceHashTable['AliasName'] -NamespaceName $ResourceHashTable['NamespaceName'] -ResourceGroupName $ResourceHashTable['ResourceGroupName'] -SubscriptionId $ResourceHashTable['SubscriptionName'] @EnvPSBoundParameters } } } catch{ throw } } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAxr2HP4JVQ0HR5 # ek9XIoA7Reu+NiTCopGlWaHy1loa4qCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJMh # Pca+N2IQtY3wZR2zTO3HZxlE7wi2rQ0QJpggmePKMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAO0QQtE4ONloAb5sl6XRatfzJy2l2kjUiAHfA # No/UQe/58do0+sxaLeHX8fsE/JoP/KaRrt+RbWt+AhrcL6VXzxvGisesI8bgTezd # CROfjK5tCzTg437yU95BUEdPK67TeI56zOJmOIyft2tko6CSfWbBm7FhoqKFeDnr # IUHYK9lEgwVjT8P2wWz3FkVmqk24QlNUalNptnoz7IsRsO+HR3Ddq8Y4uiG/tkEA # TRykt3smN+P55HFz3BGGrEWu2xZ8jfUMbdUoGFyPWhMBzc6WzJH6BgFAS+5ZVrRG # ey2ccyBhzLrgeE999LFtIt8BdxSj+GCzuI5yq7jL+ChdhUL4b6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDxa5/PIODAMreA3t/BZAvoMn+A0ACUCI9Q # wCl3b9C7qgIGZjOb9uk/GBMyMDI0MDUxNjA2NDIxNC42NjlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QAB # AAAB5jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAj # cElGzflvKADZ1D+2d/ieYYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35 # Zx0gXJBE0zWanZEAjCjt4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo # /9t6OeNezIwX5E5+VwEG37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMs # zuucaR5nMwQN6sDjG99FzdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4J # uURUBRZ0JWu0NYQBp8khku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+l # RZAA4iMgbcLZ2P/xSdnKFxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/ # lJD1stdNo5wJG+mgXsE/zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCSceg # NzHeYtw5OmZ/7eVnRmjXlCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJ # NNjVndkpWy934PIZuWTMk360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8 # YB3M+u1tYeVDO/TcObGHxaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiF # Bf6iYYrCjtRwF7IPdQLFtQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+ # 11ZM+Qu7Q5rg3Fc9MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwS # kaFMQ6dyu8ZCYUpWQ8iIrbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VY # fxz1EIbPlt897MJ2sBGO2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQ # CJ55LLvyFlJ195AVo4Wy8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w7 # 2eRY/vWDuptrvzruFNmKCIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWk # rGjyeVJ+khzctxaLkklVwCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YR # a9pH2zvddsuBEfSFG6Cj0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh # 3ZOe+BFqJ57OXdeIDSHbvHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z # 1uB0XYQP60rsMLdTlVYEyZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMW # TTeQ0IwnWG98vWv/roPegCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4 # TbVj/Lw0XvnLYNwMUA9ouY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCff # CaspKUXC72YMu5W8L/zyTxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQDiWNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/l9jAi # GA8yMDI0MDUxNjAxNTUwMloYDzIwMjQwNTE3MDE1NTAyWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDp7+X2AgEAMAcCAQACAgwbMAcCAQACAhOhMAoCBQDp8Td2AgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAI7LY3XHCbPSeNy5R2v3jNqNjpn/ # TszpX4mYA7AOcRF0XrpxxC7Z4bDOG0gyEURJJkqTLJhlKyYKrLFmYjv5Z+KWlK9L # sV+QoOAydATsSdHO4XsZE0+eys7gz6D13zmrBUImPjpyfJ2cFzVA1aG8ttRPkjD0 # xhreQOE3X9nqnXLgi7aNWkQBJouuuB3zt0vAnNTZXy7p+s99aleGvZTSz5N9uN27 # 27aFHqElkN9fvWAOBaf8L/nuABEzCgPT8DaT0V9NEEMnKoVb/Q5vtDqhOYzYwU+m # u5Qtlr/Dg1K/GCC1RUj6UgLLEue1DFKWUT30PSOaVYBWbbv0PpSu/TnKYWkxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZ # Qp7qAPh94QABAAAB5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAU2jgCrmQdt9qiHjYG5N2sPTK5 # QmHGcorpcYl8d89L0jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4ao # HrMJaG8gnLO1q16hIYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQg/aC5e6EY # z2geYp/4pDtyItHIWei+WBH1MjDrz8KgtvwwDQYJKoZIhvcNAQELBQAEggIArt3E # +RcnbdOsal0gjAOPDo+8waAA9Ky14ofrb+iJpli8P7HvVMB9LHO7yD4wc5bHBtUv # hOSNh1wjqX66nzbpozbFQjSJDiQz838f3EdSnBJv7swIqFyvHnT6Exgd+dZNSo0S # fB5pVK8echZT7ehC9QroFy/xwKDLK0IcC9EkUCVG9Pnf6E96mH9Lg6slkTw4iaCF # /3leQ71/WzguuCcovR8dr6BpYiGWQa0PcRTyHc1DhkY23wiIwNCHuYp7c9pVbq+N # xJP+BvHZcN5ZSIPxUEsqOBlmM3JfnwEOdKeReyacZ0RhUvHmXuOCrq7rc4KM7DWv # dcYCgTkrCxZxI4AwxyIhvQNWhmZPgyzPYth/38bYejHuFKJ3TrZXtUqfhxwvMl7h # JYf37/tRjk8g2yLSDTpn1M234UzVkHHcQWG2HMsgOSeJZBK9fI2PcEavTL2xcazJ # tJG9Z+B1W6jE7+40bolLUnqb1bNwWgZwN24n0GJHqtkO+untJOTop/prM385PnTn # vQVm6t+2QNDuwqI2KZWvy5WFXq6B1MmnaMtqF4CV/FKvmc2V/9C7FuJs84xbqfOq # HQSN8+ryCHrnZuC4rVnscuHVA4qFPVl0P8dLl1fMZcvPJ6oakRQCMFOMjNAEAMQW # SNpKzawhNIDFW2EavaAYpxrq/1wnyDo/OMqgBEA= # SIG # End signature block
combined_dataset/train/non-malicious/Script-Object.ps1
Script-Object.ps1
#Copyright (c) 2011 Justin Dearing # #Permission is hereby granted, free of charge, to any person obtaining a copy #of this software and associated documentation files (the "Software"), to deal #in the Software without restriction, including without limitation the rights #to use, copy, modify, merge, publish, distribute, sublicense, and/or sell #copies of the Software, and to permit persons to whom the Software is #furnished to do so, subject to the following conditions: # #The above copyright notice and this permission notice shall be included in #all copies or substantial portions of the Software. # #THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR #IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, #FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE #AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER #LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, #OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN #THE SOFTWARE. param( [Parameter(Mandatory=$true, HelpMessage='The name of the stored procedure or user defined function to script')] [string] $ProcedureName, [string] $Path = "$($ProcedureName).sql", [string] $ConnectionString = 'Data Source=.\\sqlexpress2k8R2;Initial Catalog=master;Integrated Security=SSPI;' ); try { [System.Data.SqlClient.SqlConnection] $cn = New-Object System.Data.SqlClient.SqlConnection (,$ConnectionString); $cn.Open() > $null; $cmd = $cn.CreateCommand(); $cmd.CommandType = [System.Data.CommandType]::StoredProcedure; $cmd.CommandText = 'sp_helptext'; $cmd.Parameters.AddWithValue('@objname', $ProcedureName) > $null; [System.Data.IDataReader] $rdr = $cmd.ExecuteReader(); [string] $sproc_text = ''; while ($rdr.Read()) { $sproc_text += $rdr[0]; } $rdr.Close(); $sproc_text | Out-File -FilePath $Path; } finally { if ($cmd -ne $null) { $cmd.Dispose(); } if ($cn -ne $null) { $cn.Dispose(); } }
combined_dataset/train/non-malicious/ESXi Config BackupScript_1.ps1
ESXi Config BackupScript_1.ps1
###ESXi Configuration Backup Script #DESCRIPION: This Script takes a CSV file with the hostname, username, and password of a list of ESXi servers, and backs up their configurations to a specified Destination #USAGE: This script is meant to be run as a regular scheduled task or a pre-script for a backup job. There is no version control, so it is recommended to use an external backup program (Such as Backup Exec) to scan this. #LAST MODIFIED: 15 Dec 2009 by JGrote <jgrote AT enpointe NOSPAMDOT-com> #REQUIREMENTS: #VMWare Remote CLI (Tested with 4.0U1) ### SETTINGS #Location of the VMWare Remote CLI vicfg-cfgbackup.pl command (will be different for 32-bit systems) $vSphereCLIPath = "C:\\Program Files (x86)\\VMware\\VMware vSphere CLI\\" #Backup Destination Folder $BackupDest = "E:\\Backup\\ESXi" #Path to ESXi CSV File. APPLY STRICT PERMISSIONS TO THIS FILE SO THAT ONLY THE SCRIPTAND ADMINISTRATORS CAN READ IT! #Format: #1st Field - HOSTNAME - ESXi IP Address or Hostname #2nd Field - USERNAME - Local Username (usually root) #3rd Field - PASSWORD - Password # #Example: #HOSTNAME,USERNAME,PASSWORD #server1,root,password #server2,root,password2 #It is recommended to create and edit this file using Excel (Save as CSV) $ESXiCSV = "C:\\Scripts\\ESXiBackupList.csv" ### PREPARATION #Create an ESXi Backup Event Source if it doesn't already exist $eventsource = "Backup-ESXi" $eventlog = "Application" if (!(get-eventlog -logname $eventlog -source $eventsource)) {new-eventlog -logname $eventlog -source $eventsource} #Write an error and exit the script if an exception is ever thrown trap {write-eventlog -logname $eventlog -eventID 1 -source $eventsource -EntryType "Error" -Message "An Error occured during $($eventsource): $_ . Script run from $($MyInvocation.MyCommand.Definition)"; exit} #Path Verification #Verify that the following paths and files exist. If it is not there, it will throw an exception caught by the trap above that will exit the script. #Verify:ESX Config File $ESXiCSVIsPresentTest = Get-Item $ESXiCSV #Verify:VMWare Remote CLI Path $vSphereCLIISPresentTest = Get-Item $vSphereCLIPath #Verify:Backup Destination Directory $BackupDestIsPresentTest = Get-Item $BackupDest ### SCRIPT #Read Each Host from the File and back up the config to the backup directory import-csv $ESXiCSV | ForEach-Object { $BackupResult = invoke-expression "& '$vSphereCLIPath\\perl\\bin\\perl.exe' '$vSphereCLIPath\\bin\\vicfg-cfgbackup.pl' --server $($_.HOSTNAME) --username $($_.USERNAME) --password $($_.PASSWORD) --save $($BackupDest)\\$($_.HOSTNAME)-cfgbackup.tgz" if ($LastExitCode -ne 0) {throw "An Error occurred while executing $BackupBin for $($_.HOSTNAME): $BackupResult"} } #Compose and Write Success Event $successText = "ESXi Configurations were successfully backed up to $BackupDest. Script run from $($MyInvocation.MyCommand.Definition)" write-eventlog -logname $eventlog -eventID 1 -source $eventsource -EntryType "Information" -Message $successText
combined_dataset/train/non-malicious/get-serials.ps1
get-serials.ps1
<# .SYNOPSIS Get the BIOS serial numbers from computers in the domain. .DESCRIPTION Return a list of computers with their serial numbers. For Dell computers the Win32_BIOS.SerialNumber property is the service tag of the computer. This identifies the computer on the Dell support site, and with it you can get the proper drivers/manuals and warranty information. .PARAMETER ADSPath The location within Active Directory to find computers. .EXAMPLE .\\get-serials.ps1 -ADSPath "LDAP://OU=workstations,DC=company,DC=com" ComputerName ServiceTag ------------ ---------- Desktop-pc01 a1b2c3d Desktop-pc02 b2c3d4e Desktop-pc03 The RPC server is unavailable. (Exception from H ... Desktop-pc04 f4g5h6i Description ----------- This example shows the output of the command. .EXAMPLE .\\get-serials.ps1 -ADSPath "LDAP://OU=workstations,DC=company,DC=com" ` | Export-Csv .\\sample.csv -NoTypeInformation Description ----------- This example shows piping the output to a csv file. .NOTES .LINK http://scripts.patton-tech.com/wiki/PowerShell/Production/GetSerials #> Param ( [Parameter(Mandatory=$true)] $ADSPath ) Begin { $ScriptName = $MyInvocation.MyCommand.ToString() $LogName = "Application" $ScriptPath = $MyInvocation.MyCommand.Path $Username = $env:USERDOMAIN + "\\" + $env:USERNAME New-EventLog -Source $ScriptName -LogName $LogName -ErrorAction SilentlyContinue $Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nStarted: " + (Get-Date).toString() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message # Dotsource in the AD functions I need . .\\includes\\ActiveDirectoryManagement.ps1 } Process { $Workstations = Get-ADObjects -ADSPath $ADSPath $Jobs = @() foreach ($Workstation in $Workstations) { [string]$ThisWorkstation = $Workstation.Properties.name $ThisJob = New-Object PSobject if ($Workstation -eq $null){} else { Try { $ErrorActionPreference = "Stop" $Serial = Get-WmiObject -query "select SerialNumber from win32_bios" ` -computername $ThisWorkstation $Return = $serial.serialnumber } Catch { [string]$ThisError = $Error[0].Exception $ThisError = $ThisError.Substring($ThisError.IndexOf(":")) $ThisError = $ThisError.Substring(1,$ThisError.IndexOf("`r")) $return = $ThisError.Trim() } Add-Member -InputObject $ThisJob -MemberType NoteProperty -Name "ComputerName" ` -Value $ThisWorkstation Add-Member -InputObject $ThisJob -MemberType NoteProperty -Name "ServiceTag" -Value $Return } $Jobs += $ThisJob $ThisJob } $Message = [system.string]::Join("`n",($Jobs)) Write-EventLog -LogName $LogName -Source $ScriptName -EventId "101" -EntryType "Information" -Message $Message } End { $Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nFinished: " + (Get-Date).toString() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message }
combined_dataset/train/non-malicious/3216.ps1
3216.ps1
InModuleScope PoshBot { Describe ScheduledMessage { $msg = [Message]::new() $msg.Id = 1 $msg.Text = "This is a test message" $Interval = 'Days' $TimeValue = 1 $Message = $msg $StartAfter = (Get-Date).AddMinutes(1) Context "Constructor: String, Int, Message, DateTime" { $ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, $StartAfter) It 'TimeInterval should match argument' { $ScheduledMessage.TimeInterval | Should be $Interval } It 'TimeValue should match argument' { $ScheduledMessage.TimeValue | Should be $TimeValue } It 'Message Id should be 1' { $ScheduledMessage.Message.Id | Should be 1 } It 'Message Text should match argument' { $ScheduledMessage.Message.Text | Should match $msg.Text } It 'StartAfter value should match argument converted to UTC' { $ScheduledMessage.StartAfter | Should be $StartAfter.ToUniversalTime() } } Context "Constructor: String, Int, Message" { $ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message) It 'TimeInterval should match argument' { $ScheduledMessage.TimeInterval | Should be $Interval } It 'TimeValue should match argument' { $ScheduledMessage.TimeValue | Should be $TimeValue } It 'Message Id should be 1' { $ScheduledMessage.Message.Id | Should be 1 } It 'Message Text should match argument' { $ScheduledMessage.Message.Text | Should match $msg.Text } It 'Should have a StartAfter value without passing the argument' { $ScheduledMessage.StartAfter | Should not BeNullOrEmpty } } Context "Methods: Init()" { $Intervals = @( @{ Interval = 'Days' MS = 86400000 }, @{ Interval = 'Hours' MS = 3600000 }, @{ Interval = 'Minutes' MS = 60000 }, @{ Interval = 'Seconds' MS = 1000 } ) foreach ($Type in $Intervals) { It "Should calculate milliseconds for single $($Type.Interval) correctly" { $ScheduledMessage = [ScheduledMessage]::new($Type.Interval, 1, $Message) $ScheduledMessage.IntervalMS | Should be (1 * $Type.MS) } It "Should calculate milliseconds for multiple $($Type.Interval) correctly" { $ScheduledMessage = [ScheduledMessage]::new($Type.Interval, 5, $Message) $ScheduledMessage.IntervalMS | Should be (5 * $Type.MS) } } } Context "Method: HasElapsed()" { $ElapsedMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date).AddHours(-5)) $ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date).AddHours(5)) It 'Should return true when past the StartAfter DateTime' { $ElapsedMessage.HasElapsed() | Should be $true } It 'Should return false when before the StartAfter DateTime' { $ScheduledMessage.HasElapsed() | Should Not be $true } It 'TimesExecuted should be 1 after executing' { $ElapsedMessage.TimesExecuted | Should be 1 } } Context "Method: Disable()" { $ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date)) It 'Disables the instance when called' { $ScheduledMessage.Disable() $SceduleMessage.Enabled | Should Not be $true } It 'Does not throw an error when being called on an already-disabled instance' { $ScheduledMessage.Disable() $ScheduledMessage.Enabled | Should Not be $true } } Context "Method: Enable()" { $ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date)) It 'Enables the instance when called' { $ScheduledMessage.Disable() $ScheduledMessage.Enable() $ScheduledMessage.Enabled | Should be $true } It 'Does not throw an error when being called on an already-enabled instance' { $ScheduledMessage.Enable() $ScheduledMessage.Enabled | Should be $true } } Context "Method: RecalculateStartAfter()" { It 'Should increase the StartAfter property by IntervalMS' { $ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date)) $StartingValue = $ScheduledMessage.StartAfter $ScheduledMessage.RecalculateStartAfter() (New-TimeSpan $StartingValue $ScheduledMessage.StartAfter).TotalDays | Should Be 1 } It 'Should not reschedule a run before the current time' { $currentDate = (Get-Date).ToUniversalTime(); $startAfter = $currentDate.AddDays(-5); $ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, $startAfter) $ScheduledMessage.RecalculateStartAfter(); $ScheduledMessage.StartAfter | Should Not BeLessThan $currentDate } It 'Should only move StartAfter value forward' { $StartingValue = (Get-Date).AddDays($daysDifference).ToUniversalTime() $ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, $StartingValue) $ScheduledMessage.RecalculateStartAfter() $ScheduledMessage.StartAfter | Should Be $StartingValue.AddDays(1) } } } }
combined_dataset/train/non-malicious/bc7d5dc9-76a4-432e-ad15-2f3acae17658.ps1
bc7d5dc9-76a4-432e-ad15-2f3acae17658.ps1
param ( $UserName, $FilePath, [switch]$SaveCredential=$False, [switch]$RdpSaveCredential=$False, [switch]$DeleteCredential=$False, [switch]$Help=$False ) $ScriptFilenam = $MyInvocation.MyCommand.Name # ScriptFilename wo path. $ScriptUnbArgs = $MyInvocation.UnboundArguments # UnNamed Arguments of the PowerShell Script ($Args) $CredDir = $env:UserProfile # sotres credential files $RdpFilenam = $env:UserProfile + "\\My Documents\\Default.rdp" function Get-ScriptHelp { Write-Host -ForegroundColor:White " Usage:`t`t version 2009.10.07 ,karaszmiklos@gmail.com $ScriptFilenam [-UserName:]UserName [[-FilePath:]program [arg1] ['arg 2'] [arg...]] [-SaveCredential] [-RdpSaveCredential] [-DeleteCredential] [-Help] -UserName: Required parameter! There is no default value. 1st position if parameter name is not defined. Predefined user aliases: SU Local Admin (SID ending with 500) EMA Domain Admin (UserDomain\\uEMAsername) Alias1 Default alias for context menus. You can define aliases by runing: su AliasName -SaveCred -FilePath: Executable files. Default value:cmd.exe 2nd position if parameter name is not defined. -SaveCredential Switch parameter. Default value:$False Force asking and saving credential into efs encrypted file. -RdpSaveCredential Switch parameter. Default value:$False Force saving the specified credential into RDP profile:default.rdp -DeleteCredential Switch parameter. Default value:$False Forcing deletion of the specified credential. -Help Switch parameter. Default value:$False .\\ means current directory. Use 'single quotes' for programs and arguments containing spaces. Partial paramter names can be used while they are not ambiguous. Examples: su SU su EMA su EMA -Save su EMA -Rdp su EMA -Save -RdpSave su Alias1 -SaveCred su Alias1 -DeleteCred su Domain\\Username cmd powershell.exe $ScriptFilenam SU cmd.exe su SU sc.exe stop ccmexec powershell.exe $ScriptFilenam SU sc.exe stop ccmexec su.bat SU 'c:\\Directory with spaces\\procexp.exe' /t /p:r -accepteula " } function Export-PSCredential { #http://halr9000.com/article/531 param ( $Credential = (Get-Credential), $Path = "credentials.enc.xml" ) # Look at the object type of the $Credential parameter to determine how to handle it switch ( $Credential.GetType().Name ) { # It is a credential, so continue PSCredential { continue } # It is a string, so use that as the username and prompt for the password String { $Credential = Get-Credential -credential:$Credential } # In all other cases, throw an error and exit default { Throw "You must specify a credential object to export to disk." } } $export = New-Object PSObject # Create temporary object to be serialized to disk Add-Member -InputObject $export -Name:Username -Value:$Credential.Username -MemberType:NoteProperty # Encrypt SecureString password using Data Protection API $EncryptedPassword = $Credential.Password | ConvertFrom-SecureString Add-Member -InputObject:$export -Name:EncryptedPassword -Value:$EncryptedPassword -MemberType:NoteProperty $export.PSObject.TypeNames.Insert(0,’ExportedPSCredential’) # Give object a type name which can be identified later $export | Export-Clixml $Path # Export using the Export-Clixml cmdlet Write-Host -foregroundcolor:Green "Credential saved to: " Get-Item -Force $Path # Return FileInfo object referring to saved credentials } function Import-PSCredential { #http://halr9000.com/article/531 param ( [string]$Path = "credentials.enc.xml", [string]$CredentialVariable ) #to create a global credential with a specified name $import = Import-Clixml $Path # Import credential file # Test for valid import if ( !$import.UserName -or !$import.EncryptedPassword ) { Throw "Input is not a valid ExportedPSCredential object, exiting." } $Username = $import.Username $SecurePass = $import.EncryptedPassword | ConvertTo-SecureString # Decrypt the password and store as a SecureString object for safekeeping $PsCredential = New-Object System.Management.Automation.PSCredential $Username, $SecurePass # Build the new credential object if ($CredentialVariable) { New-Variable -Name:$CredentialVariable -Scope:Global -Value:$PsCredential } else { return $PsCredential } } if ( $Help ) { Get-ScriptHelp exit 0; } switch ($UserName) { $null { Write-Host -ForegroundColor:Red "UserName is not defined. Exiting..." Get-ScriptHelp exit 1; } "SU" { $CredUsrExpr = '(Get-WmiObject -Query "SELECT * FROM Win32_Account WHERE LocalAccount = True AND SID LIKE ""S-1-5-21-%-500""").Caption' $CredFilenam = Join-Path -Path:$CredDir -ChildPath:$($env:COMPUTERNAME+"_S-1-5-21--500") } "EMA" { $CredUsrExpr = '$env:UserDomain + "\\" + $env:UserName[0] + "ema" + $env:UserName.Remove(0,1)' $CredFilenam = Join-Path -Path:$CredDir -ChildPath:$($env:UserDomain+"_S-1-5-21--ema") } default { $CredUsrExpr = '$UserName' $CredFilenam = Join-Path -Path:$CredDir -ChildPath:$UserName.Replace("\\","_") } } #Test Credential Directory if ( -not(Test-Path $CredDir) ) { New-Item "$CredDir" -Type:Directory -Force -Confirm -Verbose if ( -not(Test-Path $CredDir) ) { Write-Warning "Credential directory ""$CredDir"" doesn't exist. Exiting..." exit 82; # 82 The directory or file cannot be created. } } if ( $DeleteCredential ) { if ( Test-Path $CredFilenam) { Write-Host "Deleting credential:""$CredFilenam"" ..." -ForegroundColor:Yellow Remove-Item -Path $CredFilenam -Force -Confirm -Verbose if ( -not(Test-Path $CredFilenam) ) { Write-Host -ForegroundColor:Green "$CredFilenam is deleted." } else { Write-Host -ForegroundColor:Yellow "$CredFilenam has not been deleted." } exit 0; } else { Write-Warning "Credential does not exist:$CredFilenam" exit 2; # 2 The system cannot find the file specified. } } if ( $SaveCredential -or !(Test-Path $CredFilenam) ) { try { $PsCred = Get-Credential -Credential:(Invoke-Expression $CredUsrExpr) } catch { "$($Error[0])" } } else { #Import Credential from encrypted file (if exists). if (Test-Path $CredFilenam) { $PsCred = Import-PSCredential -Path:"$CredFilenam" } } if ( !$PsCred ) { Write-Warning "Credential is not defined. Exiting..." exit 1326; # 1326 Logon failure: unknown user name or bad password. } try { #Setup arguments of Start-Process based on Script parameters if ( $FilePath ) { if ( $ScriptUnbArgs ) { if ( ( ".exe",".com",".bat",".cmd" | Foreach-Object { $FilePath.EndsWith($_) } ) -contains $True ) { Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:$FilePath -ArgumentList:$ScriptUnbArgs } else { Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:Cmd.exe -ArgumentList:"/C start ""PS_Process_Starter"" /B ""$FilePath"" $ScriptUnbArgs" } } else { # No args if ( ( ".exe",".com",".bat",".cmd" | Foreach-Object { $FilePath.EndsWith($_) } ) -contains $True ) { Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:$FilePath } else { Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:Cmd.exe -ArgumentList:"/C start ""PS_Process_Starter"" /B ""$FilePath""" } } } else { Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:Cmd.exe -ArgumentList:"/K Title $($PsCred.UserName): $($MyInvocation.Line)" } } catch { #Error handling... Write-Host -ForegroundColor:Red "runas:$($PsCred.UserName):`t $($MyInvocation.Line)" "$($Error[0])" #Password has been changed... if ( ($Error[0] -match "Logon failure: unknown user name or bad password") -and !$SaveCredential ) { if ( Test-Path $CredFilenam ) { Write-Host -ForegroundColor:Yellow "Deleting invalid credential. Use -SaveCredential next time to save it again." Remove-Item -Path $CredFilenam -Force -Confirm -Verbose if ( -not(Test-Path $CredFilenam) ) { Write-Host -ForegroundColor:Green "$CredFilenam is deleted. Exiting..." } else { Write-Host -ForegroundColor:Yellow "$CredFilenam has not been deleted." } exit 1326; # Logon failure: unknown user name or bad password. } } else { exit 1; } } if ( !$Error ) { # There were not errors: Write-Host -ForegroundColor:Green "runas:$($PsCred.UserName):`t $($MyInvocation.Line)" #Export credential: if ( $SaveCredential ) { Write-Host "Saving credential:""$CredFilenam"" ..." Export-PSCredential -Credential $PsCred -Path "$CredFilenam" try { (Get-Item -Force $CredFilenam).Encrypt() } catch { "$($Error[0])" } if ((Get-Item -Force $CredFilenam).Attributes -match "Encrypted") { Write-Host -ForegroundColor:Green "$((Get-Item -Force $CredFilenam).Attributes)" } else { Write-Warning "$CredFilenam is not encrypted. Deleting..." Remove-Item -Path "$CredFilenam" -Force -Confirm -Verbose } } if ( $RdpSaveCredential ) { if (Test-Path $RdpFilenam) { Write-Host "Saving credential:""$RdpFilenam"" $((Get-Item -Force $RdpFilenam).Attributes) ..." if ( (Get-Item -Force $RdpFilenam).Attributes -notmatch "Encrypted" ) { # ReadOnly, Archive, Encrypted (Get-Item -Force $RdpFilenam).Attributes = "Archive" try { (Get-Item -Force $RdpFilenam).Encrypt() } catch { "$($Error[0])" } } # if $RdpFilenam not Encrypted (Get-Item -Force $RdpFilenam).Attributes = "ReadOnly, Archive, Encrypted" if ( (Get-Item -Force $RdpFilenam).Attributes -notmatch "Encrypted" ) { Write-Warning "$RdpFilenam is not encrypted!" } Write-Host "Creating backup:" $RdpFileBak = $RdpFilenam + $(Get-Date -Format:_yyyyMMdd_HHmmss) Copy-Item $RdpFilenam $RdpFileBak -Force -Confirm if ( Test-Path $RdpFileBak ) { if ( !$PsCred.GetNetworkCredential().Domain ) { $PsCred.GetNetworkCredential().Domain = $env:ComputerName } $RdpFileLines = switch -regex -File:"$RdpFilenam" { "username:s:*" { } "domain:s:*" { } "password 51:b:*" { } default { $_ } } [array] $RdpFileLines += "username:s:" + $($PsCred.GetNetworkCredential().UserName) $RdpFileLines += "domain:s:" + $($PsCred.GetNetworkCredential().Domain) $RdpFileLines += "password 51:b:" + $($PsCred.Password | ConvertFrom-SecureString) Set-Content -Value:$RdpFileLines -Path:$RdpFilenam -Force Write-Host "Credential saved:""$RdpFilenam""`t $((Get-Item -Force $RdpFilenam).Attributes)" -ForegroundColor:Green $RdpFileLines | Select-Object -Last:3 } # if ( Test-Path $RdpFileBak ) } else { Write-Warning "File does not exist:""$RdpFilenam"". Generate an RDP profile first." exit 2; # 2 The system cannot find the file specified. } # if (Test-Path $RdpFilenam) } # if ( $RdpSaveCredential ) Start-Sleep -Milliseconds 2000 } else { exit 1; } # if ( !$Error ) # su.ps1 runs on powershell 2.0 only! http://connect.microsoft.com/PowerShell # Put su.ps1 and su.bat to a directory listed in PATH environment variables. # content of su.bat: (without hashmarks of course :) # #@echo off #PowerShell.exe -ExecutionPolicy RemoteSigned su.ps1 %* #if NOT [%ErrorLevel%] == [0] ( # if [%ErrorLevel%] == [9009] ( # echo PowerShell.exe is not under %%Path%% or Poweshell 2.0 has not been installed. # echo http://www.microsoft.com/powershell # ) # # if NOT [%1] == [] ( echo For usage type su -Help ) # pause #)